Ethical Man Month Essay

Improved Essays
Question 1: Using The Mythical Man Month reading found on the course homepage, read the project problems mentioned in the text. List the difficulties and errors that occurred in these failed programming projects.
In the Mythical Man reading the difficulties and errors that occurred include;
 Time complexity
 As input increases, Output decreases
 Communication Barriers
 High cost
According to Wikipedia..... "Complex programming projects cannot be perfectly partitioned into discrete tasks that can be worked on without communication between the workers and without establishing a set of complex interrelationships between tasks and the workers performing them.
Therefore, assigning more programmers to a project running behind schedule will make
…show more content…
As the system is connected to the internet its exposed to many threats (Security).( Lukas Johansson & Mikael Auno(2006))
2) When using a scalpel it’s essential that the scalpel does not hurt the patient or the surgeon (Safety). It’s also important that the scalpel follows the instructions of the surgeon precisely (Reliability). (Lukas Johansson & Mikael Auno(2006))
3) When launching satellites it is crucial that all calculations are performed correctly (Reliability), and that the system is ready to perform its purpose without fault when needed (Reliability).( Lukas Johansson & Mikael Auno(2006))
4) No unauthorized user may tamper with any of the data accessible in the system (Security). No errors may occur (Reliability). The system should be available as much as possible (Availability) but not at the expense of security and reliability. (Lukas Johansson & Mikael Auno(2006))
References:
Wikipedia (2015) The Mythical Man- Month . Retrieved

Related Documents

  • Improved Essays

    Nt1310 Unit 5 Lab Report

    • 483 Words
    • 2 Pages

     cuts - sharp edges / broken glassware / scalpel or blade Procedural:  fragile equipment □ Wash hands when finished  mains voltage power source □ Clean bench and work area  moving parts □ Safety and operational procedures Risk Level:…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 4

    • 239 Words
    • 1 Pages

    What are the security systems used other than Doctor Authentication? Structure Issues: 1. Missing: Some elaboration on any similar previous work that tried to use a similar method of analysis. 2. Fig.…

    • 239 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Is3350 Unit 3 Case Study

    • 201 Words
    • 1 Pages

    Although we are confident that our project will meet all of the requirements for the class, the following are a few concerns that have been brought up when discussing this project: 1. Will the client provide enough information or access required to properly complete the project? a. Having direct access to business information for this project is not required but it would definitely help us in primarily meeting our requirements for the class. 2. Will we be able adapt to changes and properly meet project requirements if the client decides to change his opinion on the initially agreed upon scope?…

    • 201 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    “Let's talk about that” is the notorious catchphrase of the viral and trendy YouTube duo, Rhett and Link. Their channel, Good Mythical Morning, is a series of talk show style videos with a humorous twist and arbitrary acts centering around easily entertaining the youth of today’s culture. Their shows ranges anywhere from pairing wine and bugs to cuddling each other while being covered with cockroaches to eating pig anus cupcakes. Rhett and Link give a hilarious, yet awkward performance in every one of their videos. Both characters, independently brilliant and entertaining, come together, and the audience can hardly stand to look away.…

    • 954 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Morality in “A Good Man is Hard to Find” In “A Good Man is Hard to Find” there is an interesting look at morality. I found this to be quite relevant as we have looked at morality as a concept since the beginning of the semester. This story presents an interesting concept because we typically think of morals or moral codes as something that causes a person to behave in a good way. However, here we see two completely opposing moral codes – one of which we cannot really see as good.…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Case Study 8 The Ccmma

    • 783 Words
    • 3 Pages

    The following bullet points illustrate some of the problems associated with traditional project scheduling: Padding task durations (providing worst-case estimates) is done to ensure a high probability of task completion. Starting work as early as possible, even when not scheduled, is a response to worst-case estimates. When workers give worst-case estimates, they don’t expect to stay busy with just one task – so they multi -task, working on several tasks at once by switching between them. The result is that everything takes a long time to complete and very little completes early.…

    • 783 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    College Security Risks

    • 1018 Words
    • 5 Pages

    As a security analyst in the Information technology environment at the Aim Higher College, I have seen many attacks from the hackers that attempt to steal the sensitive data of the college and expose it to the whole world or alter it in some way. I have seen the many threats that have existed on the college’s data and systems at one point. Furthermore, I discovered many vulnerabilities in college’s systems, I captured them before the intruders can get their hands on them and make an effort to exploit the vulnerabilities. Moreover, I gave many suggestions on how to fix and secure on many issues that were affecting the college’s network and systems.…

    • 1018 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Masculinity is, by definition, qualities and/or the appearance traditionally associated with men, especially strength and aggressiveness. This makes men have to appear to be bellicose or tough to impress society and prove themselves as being ‘manly’ men. Making it very difficult for young men and boys to truly express themselves and let others into their personal lives. Crying, self expression, and asking for help are healthy traits for the growth of young boys and men. Without them, young boys could very potentially not be mentally healthy, and may become hostile and unable to connect to other human beings later on in life.…

    • 792 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    1. The message I would have received as a hospital administrator from this video would have been: The importance of keeping my organization's information secure from anyone else not permitted to have my knowledge, and more specifically the knowledge of my patient's care as well as their demographic information. It is my responsibility as a hospital administrator to keep my data secure, and whether that means hiring a IT security company or maintaining a high security software is my responsibility in order to stay within HIPPA guidelines. 2.…

    • 477 Words
    • 2 Pages
    Improved Essays