Source code Essays

  • The Ethics of Source Code Theft

    2869 Words  | 6 Pages

    Introduction Source code is the lifeblood of all high tech software organizations. If it falls into the wrong hands, a company will very likely experience damagingly costly repercussions. As a result, most tech companies invest a relatively large chunk of their revenues into network security. Why do people pirate software? The obvious answer is: people want to use the software, but not pay for it. However, when we change the question slightly, to: “Why do people steal source code?” A variety

  • Githum is the Famous Code Repository Site for Open Source Projects

    1454 Words  | 3 Pages

    Github is a way for people to share open source code. It is a powerful and sophisticated repository web-system for developing software projects. It uses “Git revision control” system. It offers both paid plans for private repositories and free accounts for open source projects [1]. GitHub was the most popular and famous code repository site for the open source projects. GIT is developed by Linus Torvald. Before going in the core explanation of GitHub it’s better to describe the term “version control”

  • Twitter and Its Spatial Bias

    883 Words  | 2 Pages

    A medium is a means of mass communication, such as television, radio, or newspapers. Harold Innis, a leading scholar of communication and media theories, separated media into two categories, time-biased and space-biased. Time-biased media last longer but reach few, while space-biased mediums reach many but are short lived. Twitter is a social form of media, which sends short messages that have the potential of a massive audience on a global scale, putting in Harold Innis’ category of a space-biased

  • Operation Aurora And The Cyber Attack

    840 Words  | 2 Pages

    financial and defense corporations with valuable and confidential information. Some of the companies targeted were Adobe, Google, Juniper Network, Symantec, Morgan Stanley and Yahoo. The attackers were successful at the heist by manipulating computer codes to exploit windows internet explorer (IE) vulnerabilities, which were later discovered by Google in as earlier as September 2009. In the operation Aurora case, the attack utilized a combination of attacks that comprised of stealth hacking, an unknown

  • Flash vs HTML5

    1168 Words  | 3 Pages

    Flash being the latter. Even though 85% of the most-visited websites run on flash, HTML5 is the future because HTML5 combined with javascript and CSS3 offers the same capabilities as flash and HTML5 can avoid many issues that Flash faces by being open source. Flash first appeared in 1998 and was created by Adobe Systems. Flash quickly gained popularity and became the standard for web development shortly after. Flash uses the ActionScript programming language, which allows developers to create web animations

  • Automatic Parallelization Approach Based on Java Virtual Machine

    2090 Words  | 5 Pages

    as well as a parallel execution environment to execute parallelized code. We implement these techniques upon Jikes RVM. And finally, we evaluate our approach by parallelizing sequential benchmarks and comparing the performance to manually parallelized version of those benchmarks. According to the experimental results, our approach brings low overheads and achieves competitive speedups compared to manually parallelized code. 1 Introduction Multi-processor has already become mainstream in

  • Design Patterns

    1551 Words  | 4 Pages

    Design Patterns What is a Design Pattern? A design pattern solves a problem within a given context. The solution that is offered by implementing a pattern results in a system design structure, which balances the concerns of the design problem in a manner most appropriate for the given context. In “Understanding and Using Patterns in Software Development”, Dirk Riehle and Heinz Zullighaven offer a rather nice definition of what a design pattern is: “A pattern is the abstraction from a concrete

  • open source

    1136 Words  | 3 Pages

    aim of this paper is to define the terms ‘Information and Communication Technologies’ (hereinafter ‘ICT’ without emphasis), ‘ICT Security’ and ‘Open Source Software’ (hereinafter ‘OSS’ without emphasis). This paper will focus on discussing the concept of ‘ICT Security in OSS’ suggested in well-known sources (The UNESCO 2007; Bakari 2007; Open Source Software Work Group 2010; Australian Government Information Management Office 2011). In literature and research multiple definitions of ICT can be found

  • Pros And Cons Of Program Visualization

    1246 Words  | 3 Pages

    Abstract- It’s impractical to grasp complex data or explore large amounts of programming code, if we only use words or texts. The dynamic process is extremely difficult to convey using these static presentation media. Visualization tools are visual explanation of data, information or knowledge. Program visualization is one of the various techniques developed over the years to aid novices with their hitches in learning to program. It consists of different graphical – often animated – and textual objects

  • Ownership Issues with Commissioned Software Programs in Ireland

    1854 Words  | 4 Pages

    The ownership of commissioned software can often be misleading, and without a clearly defined contract between the client and software programmer, the lines can become blurred as to who holds the copyright of said software program code. A client commissioning a software program from a developer may assume that once they purchase and take ownership of the software, they also acquire the intellectual rights and copyright to the work. Before the Copyright and Related Rights Act, 2000 came into effect

  • Identifying and Preventing Weaknesses in Software Programs

    1512 Words  | 4 Pages

    exceptions are found then it can be said that weaknesses are present in the program and the software program is vulnerable. There are two different kinds of fuzzing namely black box and white box fuzzing. Black box testing does not take the program source code into consideration. It is only used to identify weaknesses in the different inputs that can be given to the program. Whereas, white box testing is used to test all the different possible paths of a program. However many challenges exist for both

  • The Advantages of Free Software

    901 Words  | 2 Pages

    help the community. First of all, Everyday businesses are facing constantly internal operational and technological changes and having free software is appropriate and secure to offer a solution to all this changes. Having access to the original source code is a huge advantage because businesses can make adjustments, corrections or simply add new functions that are exclusive for the organization. For example, it can be used to personalize printers, to accomplish a specific task, for security audits

  • Cyber Attacks: Operation Aurora

    780 Words  | 2 Pages

    first publicly disclosed by Google on January 12, 2010. A group named "Hidden Lynx” out of China is believed to be responsible. McAfee dubbed the Cyber-attack “Operation Aurora”. According to the anti-virus firm McAfee, the hackers were seeking source codes to Google, Adobe, Yahoo, and dozens of other high-profile companies (Zetter, 2010). McAfee firm reported the tactics used in the attack were unprecedented and used combined encryption and stealth programming to find an unknown backdoor into Microsoft

  • What is App Re-Skinning

    532 Words  | 2 Pages

    What is app re-skinning? By hearing the word “re-skinning” you might get a somewhat idea, but it doesn’t convey the complete meaning of how is it related to mobile application development or game designs. But knowing about re-skinning of mobile apps or graphic designs can surely add value to your business in case you are into mobile app development. Starting an app from the scratch can be a little wearisome task. You have to do brainstorming, gather your ideas and jot them down, tap onto a programmer…

  • Technology - Software Security Lacking in Face of Deadlines

    1450 Words  | 3 Pages

    Software Security Lacking in Face of Deadlines Abstract: This paper illustrates a moral dilemma regarding security measures of software releases. The presence of malicious hackers throughout the globe today is a practical reality; robust secure code ought to be a strong priority for software companies. However, faced with complications regarding deadline issues, language issues, security continues to pose problems with software today. Software companies must ultimately make a decision between

  • MapBot : An experiment in robotic mapping

    1701 Words  | 4 Pages

    Includes Source Code MapBot : An experiment in robotic mapping Abstract: Today Robots are often used to explore dangerous places where humans cannot go. However, what if there was a more easily available robot that could be used to explore places here on earth? This project is an attempt to build a very simple version of such a robot: a robot that follows a line, then creates a graph of the line on a computer. Exercises I did early in COSMOS gave me the backing I needed to attempt such

  • Essay On Cryptocurrency

    2272 Words  | 5 Pages

    information without a third party overseeing. This has been the primary way in which we have been able to securely transmit data, and this has been applied for use of ATMs, electronic commerce and passwords. The bases of cryptocurrency is essentially a code that allows private exchange of commerce. History Cryptocurrencies are filling a niche at a point in history when people are growing disconcerted with the actions of the financial sector. Cryptocurrency jurisdiction is outside of any central bank which

  • Acceptable Reuse of Code vs. Theft

    777 Words  | 2 Pages

    reuse of code and theft. The reuse of code can fall in too both categories, However this can be perfectly legal to do, it can also be considered theft. The reuse of your own code creations is just fine, but the use of third-party code may not be the case. There is a difference between the reuse of code and the theft of intellectual property. What is code reuse? Literal definition: Code reuse is the practice of using existing code over again. There are some benefits and drawbacks to code reuse as

  • Differences And Similarities Between A Current Affair And The Project

    1007 Words  | 3 Pages

    Programs that report on recent news stories follow a similar structure, however some aspects may vary. A Current Affair and The Project both qualify as a current affair programs as they focus on recent events. Both programs air at different time periods and have similar formats at times. A Current Affair produces more detail in a shorter time period, while using a formal tone. While The Project produces more stories with less detail for some of the stories, while it transitions between formal and

  • Krs 190 Case Study

    545 Words  | 2 Pages

    Under KRS 411.190 if a person is on the property for a recreational purpose and is not charged a fee by the possessor of the land then the statute applies, with recreational purpose defined in the statute to include, but not limited to, activities such as swimming, fishing, hunting, nature study, picnicking, or enjoying scenic sites. Ky. Rev. Stat. Ann. § 411.190. Immunity under KRS 411.190 is not conditioned upon the plaintiff's injury resulting from the recreational activity per se, as long as