...Free and Open Source Software (FOSS), by 2006, had allegedly violated 235 patents that Microsoft was in possession of, including the Linux Kernal, Samba, OpenOffice.org, and others. Three contracts were struck up between Novell and Microsoft, most notably, a patent agreement that stated, “Don’t sue us and we won’t sue you.” When this happened, some dire consequences were predicted for FOSS, however, it hasn’t exactly gone as predicted. FOSS has blossomed since then. It is my opinion, that in entering these contracts, Microsoft put more of a light on Open Source, which then attracted the attention of other programmers, and in general, people who like free things. There is a very strong market for Linux going right now with GUI enabled operating systems including Red Hat/Fedora, and Ubuntu. They are having great success and continue getting updates, and users, on a growing basis as people experience, and learn how to use the command line. It doesn’t seem like much impact has been made, other than most companies have started using Open Source as a way to make their product better and more efficient. A few years back both MySpace and Facebook open sourced Qizmt and Tornado, respectively, not to garner any love from the people, but to try and make them better, and more efficient (Asay Sept. 16, 2009). More than anything, I would say Microsoft is feeling the hurt, they are losing money with so many people looking toward the Free and Open Source Software markets. Who would want...
Words: 644 - Pages: 3
...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...
Words: 4114 - Pages: 17
...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...
Words: 4296 - Pages: 18