Free Essay

It302 Research Assignment 4.1

In:

Submitted By Aerias
Words 644
Pages 3
Free and Open Source Software (FOSS), by 2006, had allegedly violated 235 patents that Microsoft was in possession of, including the Linux Kernal, Samba, OpenOffice.org, and others. Three contracts were struck up between Novell and Microsoft, most notably, a patent agreement that stated, “Don’t sue us and we won’t sue you.” When this happened, some dire consequences were predicted for FOSS, however, it hasn’t exactly gone as predicted. FOSS has blossomed since then. It is my opinion, that in entering these contracts, Microsoft put more of a light on Open Source, which then attracted the attention of other programmers, and in general, people who like free things. There is a very strong market for Linux going right now with GUI enabled operating systems including Red Hat/Fedora, and Ubuntu. They are having great success and continue getting updates, and users, on a growing basis as people experience, and learn how to use the command line. It doesn’t seem like much impact has been made, other than most companies have started using Open Source as a way to make their product better and more efficient. A few years back both MySpace and Facebook open sourced Qizmt and Tornado, respectively, not to garner any love from the people, but to try and make them better, and more efficient (Asay Sept. 16, 2009). More than anything, I would say Microsoft is feeling the hurt, they are losing money with so many people looking toward the Free and Open Source Software markets. Who would want to pay hundreds of dollars, or as a company, millions for software licensing when you can just go open source and get a 100 percent discount? FOSS has definitely been helped as a result of everything that has happened, it is more visible than ever, and more companies than ever are making use of it. Google has been doing it for years now with their Android operating system which can be found on a majority of phones in the U.S. Android is leading Apple’s iOS 52.2% to 33.4% as of July 2012, comScore revealed in their latest report (Schroeder Sept. 5, 2012). The customization offered by Android over any other operating system is astounding, and personally my favorite. Not to say that Apple doesn’t make a quality product, also based off of the Linux kernel, they are just too strict with it, which doesn’t appeal to the tech-heads that exist today. Microsoft’s actions against FOSS have changed drastically since then. Microsoft is soon releasing their new Operating System titled “Windows 8” which had a Developer preview released specifically for developers of apps for the operating system and market. Microsoft has also pushed into the phone and tablet market and are trying to make headway there against the mobile giants Google and Apple. Microsoft’s app store is woefully lacking in comparison, and that’s a big reason they have turned to Free and Open sourcing to try and get that up to par so that they can be competitive. While I do enjoy the look of the Windows 8 RT version mainly for tablets, and phones, they won’t really be able to compete until they grow their apps, and have better security, that is offered by the differences in the operating systems of Android and Apple’s iOS.

References
Asay, Matt. C|Net, "World's biggest open-source company? Google." Last modified Sept. 16, 2009. Accessed October 19, 2012. http://news.cnet.com/8301-13505_3-10354530-16.html.

Parloff, Roger. CNN Money, "Microsoft takes on the free world." Last modified May 14, 2007. Accessed October 22, 2012. http://money.cnn.com/magazines/fortune/fortune_archive/2007/05/28/100033867/index3.htm.

Schroeder, Stan. Mashable, "Android Increases U.S. Market Share to 52 Percent [REPORT]." Last modified Sept. 5 2012. Accessed October 19, 2012. http://mashable.com/2012/09/05/android-52-percent/.

Similar Documents

Free Essay

It302 4.1 Research Assignment

...Linux Security Technologies There are many ways to have internet access these days. Coffee shops, libraries, airports and even public buses have free wireless access. With all these free accesses to the World Wide Web, there is also many potential ways for hackers to potentially get your personal information and use it for their gain. There are many ways to combat this situation by using several security measures with Linux programming, which the majority of the software is free. Some of those security technologies are SELinux, TCP Wrappers, IPtables and Chroot Jail to name a few. SELinux is a security enhancement to Linux which allows users and administrators more control over access control. Access can be constrained on such variables as which users and applications can access which resources. Was developed by the NSA in December of 2000. These resources may take the form of files. Standard Linux access controls, such as file modes (-rwxr-xr-x) are modifiable by the user and the applications which the user runs. Conversely, SELinux access controls are determined by a policy loaded on the system which may not be changed by careless users or misbehaving applications. SELinux also adds finer granularity to access controls. Instead of only being able to specify who can read, write or execute a file, for example, SELinux lets you specify who can unlink, append only, move a file and so on. SELinux allows you to specify access to many resources other than files as well, such...

Words: 1350 - Pages: 6

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18