Open Source: Good and Bad
Introduction:
In the following paper I will be discussing the use of open source software as part of a larger project. Example uses of this include incorporating existing publicly available source code within another piece of software. Because the term open source has such broad implications, I will attempt to explain it within the context of this paper. Open source code comes with many different licenses such as GPL, BSD, and MIT. I will describe the most popular licensing options and how they differ. Many companies believe open source software projects have an immense lack of accountability; this is simply untrue. Lastly, open source software has recently received an abundance of attention in the media because of possible copyright violations. I will discuss some of the probable scenarios regarding copyright violations with open source and how to protect ones self. Throughout this paper, I hope to shed some light on the use of open source and how beneficial it truly can be to a company.
Open source software and code can be a wonderful and vastly useful tool. In today’s programming world, there is not much left in terms of new frontiers of programming. Most of the algorithms that programmers need have already been written. Why spend the time to rewrite a complicated algorithm or function when it has already been done and free for you to use? Luckily, other programmers have generously donated their time and money to provide you with free code. Before you dive in, there are a few details to be aware of.
Definition of open source:
The term open source refers to several different things. Sometimes it means a fully functional software program, available for free. Other times it is a C library, made available free of charge. For this paper, when I say open source, I mean the following: source code, in partial or complete form, with some form of public, free-of-charge licensing. I do not mean using open source tools to write software. A good example of what I am referring to would be heading over to Sourceforge (1) and grabbing a couple hundred lines of code from the CVS repository of the Gaim Project (2) for use inside your project. Note that 99 percent of the time when you engage in this type of activity, you are required to also copy the license at the top of the code. Basically, the licensing information must always be copied with ...
... middle of paper ...
...nderstand that open source as a whole is more than bits and bytes of code; it is a type of social movement that many people take very seriously. Instead of treating open source as an obstacle to profits, consider it as another tool used to develop a better product. The best form of advertising is word of mouth, even in the age of computers. If word gets around that you are an open source contributor or friend, I guarantee you will find yourself with extra customers.
Bibliography
1. SourceForge.net is the world's largest Open Source software development website.
Open Source Technology Group, 28 Apr. 2005. .
2. Hammond, Christian. “A multi-protocol instant messaging (IM) client.” 4 Apr 2005 .
3. “The MIT License.” The Open Source Initiative OSI. 2005 .
4. “What is copyleft.” “GNU Project – Free Software Foundation.” 26 Apr 2005 .
5. Taft, Darryl K. “Google Gives Behind-the-Scenes Peek” eWeek. 3 Mar. 2005 .
6. “News.” Open Source Risk Management. 15 Feb. 2005. .
7. Ante, Spencer. “A Linux Nemesis on the Rocks.” BusinessWeek. 3 Mar. 2005 .
8. “Offerings. “ Open Source Risk Management. 2004.
9. “Why Subscriptions.” Red Hat Corporation. 2005.
Virtualization is a technology that creates an abstract version of a complete operating environment including a processor, memory, storage, network links, and a display entirely in software. Because the resulting runtime environment is completely software based, the software produces what’s called a virtual computer or a virtual machine (M.O., 2012). To simplify, virtualization is the process of running multiple virtual machines on a single physical machine. The virtual machines share the resources of one physical computer, and each virtual machine is its own environment.
Taking a global perspective, one must keep in mind that the term “copyright” is not universally defined, accepted, or enforced. We must therefore use the term with the United State’s definition as a basis. However, absent U.S. law, we must also consider the creator’s intent as it relates to the distribution and use of his or her work. This exploration will lead us to a universal position – one that claims that the wide-scale, free exchange of Intellectual Property by means of P2P technology is unethical.
Source code is the lifeblood of all high tech software organizations. If it falls into the wrong hands, a company will very likely experience damagingly costly repercussions. As a result, most tech companies invest a relatively large chunk of their revenues into network security.
The use of bitcoins provides independence from centralized authorities, such as governments and corporations. • Transactions using bitcoins are fast and efficient. • The use of bitcoins can provide anonymity to users. • Bitcoin mining provides an incentive for users to keep the currency running. Cons of using Bitcoins • The security and protection provided by large bodies is absent, making bitcoins a volatile and insecure means of trading.
Outsourcing has been around for many years. In this paper I will discuss some of the history of outsourcing, the goods things about outsourcing, and the bad things about outsourcing.
The study of trust and control in a virtual organization has had researchers emphasizing on the importance of trust as a necessary condition for ensuring the success of these mentioned organizations (2001, p.277). Although we have been led to believe that this trust is the backbone of the virtual work environment, the author Michael Gallivan has explored the Open Source Software (OSS) movement and has made a case for the contrary. He states that “various control mechanisms can ensure the effective performance of autonomous agents who participate in virtual organizations”. He goes on to say that effective performance can be produced through control, efficiency, predictability, and calculability of processes can occur in the absence
Richard M. Nixon once said “The Cold War isn't thawing it's burning with a deadly heat. Communism isn’t sleeping it is always plotting, scheming, working, fighting.” The Cold War was a time when capitalist America was at war with the communist Union of Soviet Socialist Republics, or USSR, as they threatening each other with atomic warfare over political differences. Communism is an unjust society that needs to be stopped.
The analysis started in chapter two with examining the definition of software and the conditions and circumstances under which it is protected by two intellectual property rights, namely copyright and patent. In chapter three the questionable legal nature of software was reviewed and the possibilities to exploit rights in software –under licenses- were explained. Further, in chapter four, the definition of open source was introduced and major open source licenses currently in use were presented. A conclusion that came out was that the open-source licensing regimes are no longer confined to idealistic or academic programmers but have led to the creation of diverse licenses that provide for different possibilities and accordingly are more or less compatible with copyright protection. In chapter five the most important legal controversies around open source software licenses from a contractual point of view were put under scrutiny. This analysis estimated that the uncertainty around the contractual nature of ...
While China and the Soviet Union are regarded as successful manifestations of the communist model, they possess institutional inconsistencies and tensions which caused them to stray from Marxist ideology. Over time, the leaders of these nations adapted the Marxist ideology into unique political systems with varying degrees of deviance. Vladimir Lenin’s revolutionary take on communism permanently altered the global interpretation of the ideology, and today’s communism is a direct product of his vision for the Soviet Union. Furthermore, today’s surviving communist superpower, The People’s Republic of China, possesses a form of communist ideology which would be unrecognizable to a Marxist thinker. Ultimately, Marxism as an ideology and communism
On a recent search for "free software", at the website http://www.yahoo.com/, I found over two thousand websites that either distributed or provided links to free software on the Internet. Most of the software was available in one of two forms: shareware and freeware. Shareware is the term given too many trial versions, versions with a time limit that allows you to try it for free, with send-payment if you decide to keep it. Freeware is the name given to software that is distributed, with full knowledge and consent of the owner, in its entirety. [1] An example of this kind of software is the LINUX operating system. The LINUX operating system was invented by Linus Torvalds, one of the world’s best computer programmers. Fed up with the MS-DOS system in the PC’s in the early 1990’s, he started his own operating system and it took off like a rocket. “I had no idea what I was doing. I knew I was the best programmer in the world. Every 21-year-old programmer knows that. “How hard can it be, it’s just an operating system?”” [2] Furthermore he made his software available for the public to download this software off the internet, and spark the evolution of the open source software era, where people can just take whatever they want and making the Software companies feel the damages, because everyone is stealing their software instead of buying it.
Stallman, R. M. (2010). Free Software, Free Society (2nd Edition ed.). (2. J. Feller and others (Cambridge: MIT Press, Ed.) Boston: Free Software Foundation.
Creative Commons is an organization founded in 2001 whose goal is to help people share their creative work and knowledge using copyright licenses. Work shared through Creative Commons can be used and built upon by others freely and legally. Since it’s inception Creative Commons has gathered millions of works and made them available to the public including songs, photos, videos, and art as well as academic and research papers. This organization was created to support universal sharing of knowledge has been made possible with the relatively recent advent of the Internet. In turn, Creative Commons also seeks major reforms of copyright laws to become more suitable to the age of the Internet and achieve the goal of more universal sharing culture and information.
Software piracy is the illegal reproduction and distribution of software applications, whether it is for personal use or business. In society today, Internet users are obtaining millions of dollars in software illegally. Piracy includes the illegal copying of programs, counterfeiting and distributing software, and even sharing a program with a friend. Software has become such an important productivity tool, the illegal copying and distribution of software piracy persists globally. In fact, in the United States is one in four software programs that is unlicensed. According to the Business Software Alliance (BSA), more than 800,000 web sites illegally sell or distribute software (Microsoft.com).
The aim of this paper is to define the terms ‘Information and Communication Technologies’ (hereinafter ‘ICT’ without emphasis), ‘ICT Security’ and ‘Open Source Software’ (hereinafter ‘OSS’ without emphasis). This paper will focus on discussing the concept of ‘ICT Security in OSS’ suggested in well-known sources (The UNESCO 2007; Bakari 2007; Open Source Software Work Group 2010; Australian Government Information Management Office 2011).