Skip to main content

Currently Skimming:

Workshop Introduction
Pages 1-6

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 1...
... Speakers discussed experiences and challenges related to a range of issues surrounding software updates, reflecting on the historical evolution, exploring today's tools and gaps, and considering future concerns and opportunities, especially as related to software update as a tool for improved cybersecurity and resilience. Participants identified key questions, suggested ideas, and closely examined uncertainties involved in improving software updates today and tomorrow.
From page 2...
... Rebate and recycling programs, as well as laws criminalizing litter, evolved to address this problem, although, Schneider noted, "It took a while to put all the right mechanisms in place." Like the landscape of soda bottles littering our streets before recycling, we now live in a world that is fast accumulating the remnants of "disposable" software, Schneider said. People constantly replace their devices, and software vulnerabilities are constantly discovered and fixed.
From page 3...
... In short, cleaning up the "discarded soda bottles" of our Information Technology Ecosystem not only involves complex technical challenges, but economic, political, and social consequences, as well. The Forum provided a venue to dive into these issues, tease out nuances, and expose hidden assumptions surrounding the software updates.
From page 4...
... Consumers are familiar with updating operating systems and in dividual applications. Enterprise information technology departments typically develop processes for how software updates will be implemented for their users.
From page 5...
... Moreover, not all systems can be readily updated. Some IoT devices offer no obvious update capability -- they may lack regular Internet connectivity, or the device may not have the computing resources to validate and install updates, or updates may no longer be available from the company that sold them.
From page 6...
... Privacy, Conflicting Interests: Should vendors be permitted to leverage security update mechanisms as a way to achieve other business objectives, such as obtaining data from users (e.g., to train vendor artificial intelligence systems) , obtaining users' consent to vendor-chosen contractual obligations, modifying device capabili ties in ways that may be undesirable to the user, or pressing users to install software products unrelated to the one being updated?


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.