{"id":460,"date":"2009-01-16T21:23:46","date_gmt":"2009-01-17T05:23:46","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/?p=460"},"modified":"2009-01-17T00:07:11","modified_gmt":"2009-01-17T08:07:11","slug":"absent-student-forfeits-raffle","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2009\/01\/16\/absent-student-forfeits-raffle\/","title":{"rendered":"Absent student forfeits raffle"},"content":{"rendered":"<p>Here at the University of Washington CSE Department we often have events called Tech Talks, where guest companies come in and give a demonstration of their technologies and expertise. Tech talks are usually interesting, and the visiting companies usually bring free company-branded &#8220;swag&#8221; and often have raffles for bigger, more exciting prizes. But what usually draws hungry CS students (this one, anyway) is the free food that the company inevitably brings. I&#8217;ve never won anything.<\/p>\n<p>Last night we had a tech talk given by <a href=\"http:\/\/www.palantirtech.com\/\">Palantir Technologies<\/a>, a very promising-looking company that aims to transform the way people work with large data sets by making it easier to discover and visualizing trends and connections in the ever-accumulating mountains of data generated by our modern technological culture. They had a great sales pitch, a fascinating presentation, tons of free swag (hyperbole here, but it was really a lot), and quality free frood from Taco del Mar. And at the end of the evening they planned to raffle off an iPod touch. Not everyone stayed for the whole event, but as it wound down the time for the raffle finally came.<\/p>\n<p><!--more-->Normally everyone attending a tech talk who is interested in participating in a raffle writes their name on a piece of paper, folds it in half, and places it in a box\/hat\/whatever. Palantir had all the entries in a black beanie, and built up the suspense before reaching into the hat and pulling out a name. Drat, not me again. I could tell by the size and shape of the paper that some other student was the lucky recipient. But who? The Palantir rep unfolded the paper and read it aloud in stentorian tones: &#8220;John Smith!&#8221; (That&#8217;s not really his name, but that&#8217;s not the point of this story. We&#8217;ll call him &#8220;John Smith.&#8221;) I looked around for John, but couldn&#8217;t see him. &#8220;He&#8217;s not here!&#8221; I called, joined by several other voices. Maybe I&#8217;d have a chance to win this after all! &#8220;Not here?&#8221; asked the rep. &#8220;Well, we&#8217;ll just draw again.&#8221; He tossed the forfeited entry aside and reached into the hat again. Suspense built as he pulled out a piece of paper, unfolded it, and read aloud once again&#8230;. &#8220;John Smith!&#8221; The atrium was silent for a few seconds. After a moment or two had passed I said &#8220;Well, that explains a few things.&#8221;<\/p>\n<p>I&#8217;d always attributed to luck the fact that some people just seem to win more often in raffles like that. Naively you might expect not to see repeat winners (after all, it has to be spread around, right?), but a little bit of probabilistic reasoning tells you that runs or repeats may be improbable in any specific case but in general are to be expected. Now I suddenly admitted the possibility that while there was something chancey going on here, it wasn&#8217;t chance. And why not, right? If you&#8217;re having a one-item raffle there&#8217;s no reason not to put your name in more than once. No one&#8217;s going to go looking through the entries afterwards, and if you win you win. Unless, of course, you&#8217;re not there and you win. Twice.<\/p>\n<p>It&#8217;s possible that I&#8217;ve misunderstood all these years the unwritten rules that these raffle are run by, or perhaps more properly the unwritten rules that these raffles are <em>won<\/em> by. After all, there are many raffles, sweepstakes, etc. where multiple entries are accepted. But if not, well, that&#8217;s a different story.<\/p>\n<p>Obviously no one was hurt here, no bones broken and no innocents harmed (though perhaps some innocence was lost). But these sort of events should be treated seriously. Real things are at stake. I&#8217;ll list just some of the things I&#8217;ve seen go at tech talk raffles recently:<\/p>\n<ul>\n<li> iPod touch: <a href=\"http:\/\/www.apple.com\/ipodtouch\/\">at least $229<\/a><\/li>\n<li>Xbox 360: <a href=\"http:\/\/www.amazon.com\/s\/qid=1232169098\/ref=sr_nr_p_4_0?ie=UTF8&amp;rs=172282&amp;keywords=xbox%20360&amp;bbn=172282&amp;rnid=15784691&amp;rh=i%3Aaps%2Ck%3Axbox%20360%2Ci%3Aelectronics%2Cn%3A172282%2Cp_36%3A20000-99999999%2Cp_4%3AXBOX\">$300 or so<\/a><\/li>\n<li>Adobe Design suites: <a href=\"https:\/\/store1.adobe.com\/cfusion\/store\/html\/index.cfm?store=OLS-US&amp;promoid=121DJGPP_P_US_M_ABCD_MC_CS4_B_1&amp;event=displayProduct&amp;categoryPath=\/Applications\/CSMasterCollection&amp;distributionMethod=FULL&amp;fpr=true\">$&#8230; a whole lot<\/a><\/li>\n<li>Integrity? Priceless<\/li>\n<\/ul>\n<p>I guess in the broader context you&#8217;re not stealing anything by stuffing a raffle hat. Not from me anyway. But how far is it from there to stuffing ballot boxes? Bank accounts? Money is all just bits now anyway. A little extra here and there wouldn&#8217;t really hurt the economy. Should we be comfortable with this sort of attitude being held by the same people who may write the software that handles your bank account? I don&#8217;t think so. A paper-cut is a little thing, once. But this way of thinking, when carried to its natural conclusion, is not just one paper cut. It&#8217;s many. And that&#8217;s not sustainable.\u00a0 I used to think that around here we just didn&#8217;t have to worry about that sort of thing.<\/p>\n<p>I wish I could have kept thinking it, if just for a little longer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here at the University of Washington CSE Department we often have events called Tech Talks, where guest companies come in and give a demonstration of their technologies and expertise. Last night we had a tech talk given by Palantir Technologies, a very promising-looking company that aims to transform the way people work with large data sets by making it easier to discover and visualizing trends and connections in the ever-accumulating mountains of data generated by our modern technological culture. And at the end of the evening they planned to raffle off an iPod touch. <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2009\/01\/16\/absent-student-forfeits-raffle\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":105,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,7,10,13],"tags":[],"class_list":["post-460","post","type-post","status-publish","format-standard","hentry","category-current-events","category-ethics","category-integrity","category-physicalsecurity"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/105"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=460"}],"version-history":[{"count":6,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/460\/revisions"}],"predecessor-version":[{"id":487,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/460\/revisions\/487"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}