Free Essay

Linux and Windows Server Critique

In:

Submitted By vmwareisgreat
Words 2469
Pages 10
Linux versus Windows
The purpose of this document is to explore the benefits or disadvantages of using UNIX® or Linux® versus Windows Server® for company business operations at Kudler Fine Foods.

Background
Three grocery stores in southern California comprise Kudler Fine Foods. Employing approximately 150 people, Kudler caters to people who enjoy gourmet-class foods, first-rate service, and a friendly atmosphere helps make a pleasant shopping experience. Current company information technology (IT) assets include local 10BaseT Ethernet networks at the three locations, Windows Server at the La Jolla headquarters, and 56kb modem links between the facilities enabling sharing of company information. At each store a point of service (POS) cash register application links the 20 total terminals to a proprietary purchasing application for inventory price lookup and monetary exchanges. The company also uses the Windows Server platform to run an e-commerce website for sales of select inventory over the Internet. Security
The Kudler Fine Foods e-commerce stores security of the server is the number one priority of team B. Which server is the most secure, Linux or Windows? Many information technicians have their favorite but the bottom line is, which operating system has the target on their back as far a security breaches. According to Noyes (2010) there are five key factors that make Linux superior to Windows.
• Privileges
• Social Engineering
• The Monoculture Effect
• Audience Size
• How Many Eyeballs
Windows users are assigned administrator privileges that gives those individuals full access to the entire system and all files. All it would take for a catastrophic system meltdown would be one disgruntled employee with access to load malicious code that could destroy the entire network. Conversely, Linux users are assigned lower-level accounts. This method greatly reduces the likelihood of a user loading malicious work that could infect the entire network. An attack is possible on the Linux server but the ability to spread it across the network with only a lower level account is virtually impossible.
Social engineering is the ability to spread viruses and worms across a network with ease. All it takes is for one employee to open an infected e-mail and within seconds the company’s network could be compromised. Windows systems allow the user to make this detrimental mistake. On the other hand, in order for a malicious attack to happen on the Linux server, “a Linux user would have to read the e-mail, save the attachment, give it executable permissions and then run the executable” (Noyes, 2010, p. 1).
The monoculture effect is that the Microsoft Windows system is a dominating force in the information technology field. Numerous corporations rely on this platform to conduct their daily business. This gives hackers the ability to hone in on these operating systems to find holes to infiltrate the networks. Linux, in contrast, is a different breed. Linux has numerous distributors of its platform which makes hacking more difficult. The audience size plays hand-in-hand with the monoculture effect. Because there are more Windows-based operating systems in use, the likelihood of attacks to Linux-based systems naturally declines.
“How many eyeballs” refers to how many people are looking for holes in the code of the operating system. Microsoft has a team of technologists that scour the code for flaws. Operating system code corrections are made, and a patch is sent to the users to update their systems. This leaves the operating system vulnerable until a patch is installed. Support for Linux is the opposite of this method. All users can view the code and once an error is found, it is corrected immediately. This is a security feature that sets Linux above Windows.

Administration
The Administration of the Kudler Finer Foods Information system will not undergo many changes. However, migrating from a Windows-based OS to a Unix-based operating system will pose some challenges to the people working in some of the departments that will require accessing system tools and features. These are the basic features that the administrator will have to take into account after the migration from windows to Unix-based OS.
Managing the Data
The system admin will need to wear several hats when running the Unix OS at Kudler. The daily operations of the store will require that the data be accessible at all times 24/7. There may be business hours operations and after hours administration duties for the website and other duties performed by the corporate staff that help the logistical and administrative operations of the stores. Administrators will need to focus on some areas to make sure that the network will run smoothly. Kudler’s network structures include three locations with a Point of Sale service at each one. All of these locations will be tied into a central server to gather the sales transactions, daily operations data and the current inventory levels.
Troubleshooting Hardware and Software Issues
Most of the hardware at these stores will be the cash registers that will record the sales transactions, process credit card purchases and transmit the data back to the central database that records and files all this data. The UNIX kernel should be able to serve these separate locations and make sure that the system resources are not usurped or served lopsidedly to one location while neglecting the others. The network OS should be able to handle request transactions from several users and locations. UNIX is designed to handle multiple simultaneous users and distributes the available processing power efficiently. When a new location is added to the network or current system hardware is updated, the system administrator will be at the forefront to make sure the installations or modifications go smoothly.
Security
The UNIX administrator will have the responsibility to make sure that the network is secured by different means. First, the POS systems will need passwords issued to its users apart from key card access to ensure non-unauthorized use from outside threats. Next, the general work population needs to be educated in the dangers of social engineering as well as cyber-attacks because of web surfing habits. In addition, it will be a prudent practice to make sure that passwords are changed on a regular basis. Finally, developing tiered access to the UNIX system to make sure that access to sensitive system folders and database networks are tightly controlled is paramount to properly securing the network.
File access
The Admin will be directly responsible for creating groups and granting file access as all the files and folders will be “owned” by a particular user on the network. In the case of Kudler, this could pose an issue with inventory data as more than one individual may require access to the current state of inventory or inventory changes.
Networking (Internet Protocol)
Both Windows Server and Linux Server can easily handle Kudler’s meager IT requirements. As currently configured, the company-wide network can communicate in a moderately secure fashion, sharing information as required for inventory, accounting, and payroll processing and distribution.
Modern computer networks rely on the TCP/IP protocol suite for communications between servers and clients as well as with outside networks including the Internet. Networks running a Linux Operating System (OS) function exceptionally well using TCP/IP. In fact, the original protocols that eventually became the latest version of the TCP/IP suite were created for a UNIX-based Berkley Software Distribution (Love, et. al, 2006), back in the 1970s. Capability such as DHCP for distribution of local network addresses, HTTP and IP for Internet access, SMTP and POP for e-mail operation, and IPSec for network security, all perform equally as well on a Linux network as they do on a Windows setup. In fact, from strictly a performance perspective, the Linux OS completes tasks such as I/O processing, boot up and shut down more quickly than does Windows. According to Paul Murphy from ZDnet, “There are a pair of two way comparisons in which both sides use the same database and the same Xeon hardware to produce a pure OS to OS comparison… Linux wins - usually by a wide margin.” (Murphy, p. 1)
Linux can utilize the network hardware currently in place at Kudlers. The network infrastructure including: hubs, routers, cat5 cabling, network interface cards, connectivity to the Internet through a service provider, etc., requires simply the loading of readily available drivers to retain full function of all hardware as currently implemented. One thing that bears mentioning is, the several client machines at Kudler that currently run Windows 98 are severely outdated and would benefit from an operating system upgrade to enhance performance and security. A modern Linux OS would provide a more stable, faster, and more secure network connection.

Market Share
The market share of UNIX-based platforms has grown significantly since introduction in the 1960s. This could be the result of a growing server market, but there are reasons to believe that the UNIX operating system (OS) may be showing signs of a slowdown. Studies performed in 2011 hint to the above mentioned. According to the Maxcer article from ITPro (2011), “The only area of the market that remained weak is the UNIX segment, Gartner reported, showing revenue decline 18.7 percent in the fourth quarter of 2010. UNIX vendors are squeezed between new investments in x86 platforms and the entrenched but strong installed base of System Z.” (Can Oracle or HP Take Some UNIX Blame?, para. 2). This shows that in today’s growing server market that the UNIX OS is falling behind.
IBM controls over 40% of the UNIX market share. This information can be controversial though, as IBM delivered more servers than any other company when this information was published. This information can be used to base server decisions for Kudler. IBM is the leading distributor of servers, and should be chosen as the vendor to supply the new UNIX server for Kudler. This ensures that the company will be around long enough to service the equipment and stand behind warranted items. Further, they continue to develop UNIX systems, ensuring that the server installed today will continue to work long into the future. In contrast, Microsoft (Leading OS market) products are not supported after a period of time following their release.

Chart 1 Source: http://blog.consumerpla.net/2011/05/os-market-share-april-2011.html

In Chart 1, it is clear that the Windows OS is dominating the market by a large margin, but this should not be a deterring factor. The UNIX OS has numerous benefits as outlined in the security and administration sections of this paper.

Additional Elements
Typical Microsoft installations include software in addition to Windows which is critical to the successful integration of company business operations. Microsoft Office software includes a spreadsheet application, a database application, an e-mail application, and a word processing application, among others. A large number of businesses have used these applications for years, and daily operations depend on them.
To fill this void for a typical Linux system, the open source community developed the OpenOffice software suite. It is no coincidence that the major applications in OpenOffice closely mirror the applications of Microsoft Office. In fact, OpenOffice strives to meet programming challenges that Microsoft has not addressed. The OpenOffice suite, "also includes features which some expensive rivals do not - for example, the ability to create .pdf files when you want to guarantee what the recipient sees on their computer." (OpenOffice.org, 2011, p. 1) Again, the OpenOffice suite is open source, and it is distributed free of charge. In comparison to Microsoft Office software which costs hundreds of dollars per license, it seems like quite a bargain, especially for a business with a limited budget.
It is worth mentioning that not all enterprise-level applications are available for Linux. Although business solutions can be created for Linux systems, the development environment is not as easily traversed as is a solution for a Windows environment. One thing that Microsoft does very well is supporting its software developers. Online forums, the Microsoft knowledgebase, and development helper programs makes code creation for a Windows-based system more user-friendly than its likely Linux-based counterpart. One final consideration: The point of service (POS) system in place at Kudler for cash register/monetary exchange and inventory system integration would need to be identified and screened for compatibility with a Linux system. Several boxed POS applications are available to fill this slot, should the current application prove incompatible. One such solution is available from IBM Corporation. Their SurePOS 100, 300, and 500 series software packages are tailor made for retail environments running Linux operating systems.

Conclusion
The long-running debate regarding whether Windows or Linux is the better operating system is not likely to end anytime soon. A business should carefully consider such things as stability, cost, performance, scalability, and application use and compatibility to determine which OS is most appropriate for its operation before deciding on a solution. In addition, the use of Linux necessitates the addition of a layer of expertise in the IT group to deal with what is a more specialized set of administrative tasks. As frequently seems to be the case in IT systems selection and implementation, the better performing solution is not the more popular or the more expensive. A Linux/OpenOffice system, which is open source and distributed free of charge, can integrate a business as effectively as a Windows/Office setup with the stifling cost and licensing requirements imposed by Microsoft. However, much of corporate America seems to be addicted to the Microsoft business solution, and any movement away from the tried-and-true architecture meets with resistance from the rank-and-file.
Indications are that the future will look much like the present for business system software in that there seems to be room for Windows and Linux to both thrive in business circles. In which circle a particular business chooses to reside is largely a matter of well considered choice. References

Noyes, K. Why Linux Is More Secure Than Windows. (2010) PC World. http://www.pcworld.com/businesscenter/article/202452/why_linux_is_more _secure_than_windows.html. Retrieved June 11, 2011.

Maxcer, C. Server Market Rockets up 16 Percent, UNIX Action Mixed. Power ITPro. (2011). Retrieved from http://www.poweritpro.com/Blogs/tabid/62/entryid/79/Server-Market-Rockets-up-16-Percent-UNIX-Action-Mixed.aspx
Cheung, M., & Dayley, A. (2011). Market Share Analysis: Operating System Software, Worldwide, 2010. Gartner Inc., ( ), Retrieved from: http://www.gartner.com/resId=1634314.
Love, P., Merlino, J., Reed, J., Zimmerman, C., Weinstein, P. (2005). Beginning Unix . Indiannapolis, Indiana: Wiley Publishing.
Murphy, P. The performance debate: Linux vs Windows. ZDnet.com (2006). As retrieved from: http://www.zdnet.com/blog/murphy/the-performance-debate-linux-vs-windows/514
OpenOffice.org. (2011). Why OpenOffice. Retrieved from http://why.openoffice.org/why_great.html

Similar Documents

Free Essay

Linux and Windows Server Critique

...Linux and Windows Server Critique Team C POS 420 June 25, 2012 Yevgeniy Tovshteyn Linux vs. Windows Both Linux and Windows are operating systems with advantages and differences in functionality and user friendliness. With networking becoming an important part of company operation in this day and age. Kudler will come to depend on networking for availability to the marketplace via the Internet, while requiring their internal systems for email, Voice over Internet Protocol (VoIP) phone systems, and using business data. Linux and Windows are the only 2 operating systems that have grown to the top level in the field of networking. Learning Team C examines these types of strengths and weaknesses regarding security, administration, performance, and programming. Kudler Fine Foods Current Systems: 3 locations: La Jolla, Del Mar, and Encinitas La Jolla Novell 4.11 Server for POS 4 POS Workstations with Pentium II, Windows 9X 1 Standalone UPS (Uninterruptable Power Supply) 1 Server with Inventory Spreadsheet with Pentium II, 64mg Ram, Windows 9X, external CD burner and bubble jet printer. 1 Server with NT Server 1 56K modem Del Mar Novell 4.11 Server for POS 4 POS Workstations with Pentium II, Windows 9X 1 Standalone UPS (Uninterruptable Power Supply) 1 Server with Inventory Spreadsheet with Pentium II, 64mg Ram, Windows 9X, external CD burner and bubble jet printer. 1 Server with NT Server 1 56K modem Encinitas Novell 4.11 Server for POS 4 POS...

Words: 1833 - Pages: 8

Premium Essay

Windows Server and Linux Critique

...Riordan’s Windows Server and Linux Critique Learning Team A POS/420 Date: Instructor: Riordan’s Windows Server and Linux Critique At the request of Riordan Manufacturing, Inc., the project team conducted a thorough review to compare the advantages and disadvantages of Windows Server and Linux. The recommendation of an operating system will ensure Riordan’s business operations continue with compatibility between all locations with the highest level of security, administration, networking, performance, and programmabilityimplemented. Security Although there are proponents everywhere for each type of operating system available on the market today, the focus of this project team, at the request of Riordan management, is to compare the security advantages and disadvantages of Windows Server and Linux. Windows Server Advantages. Windows Server has improved over the years in providing basic security provisions for administrators. Access to any system is extremely important to security professionals, such as domain name system (DNS), active directory domain services (AD), and access to web servers using Internet Information Services (IIS). DNS security extensions (DNSSEC) provide added security when a consumer is gaining access to a company’s website as well as how the company interacts...

Words: 1859 - Pages: 8

Premium Essay

Unix, Linux, and Windows Server Critique

...UNIX, Linux, and Windows Server Critique Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active are just a few of the ways that help close the gap...

Words: 2750 - Pages: 11

Free Essay

Linux

...students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Blum, R. (2008). Linux® command line and shell scripting bible. Indianapolis, IN: Wiley. Love, P., Merlino, J., Zimmerman, C., Reed, J. C., & Weinstein, P. (2005). Beginning Unix®. Indianapolis, IN: Wiley. Software RedHat Linux 5 (Virtual Desktop) Article References Ahmed, M. F., & Gokhale, S. (2009). Reliable operating systems: Overview and techniques. IETE Technical Review, 26(6), 461–469. Anthes, G. (2009, June 20-July 27). UNIX turns 40. Computerworld, 43(24), 16. Berlot, M., & Sang, J. (2008, January). Dealing with process overload attacks in UNIX. Information Security Journal: A Global Perspective, 17(1),...

Words: 1560 - Pages: 7

Premium Essay

Unix/Windows Systems Review

...Unix/Windows Systems Review for Riordan Manufacturing Micah Gerber POS/420 December 21, 2012 Charles Mathieu Abstract Riordan Manufacturing is the leader in the plastic injection molding industry with facilities in both the United States and China. As a large global operation, having adequate systems in place to support the organization network and databases is of upmost importance. A critique which addresses the benefits and disadvantages of using UNIX or Linux versus Microsoft Windows Server within Riordan Manufacturing will be completed by Team A. Areas to be addressed within the critique will cover security, administration, networking, performance, programmability, and reliability as it relates to UNIX or Linux and Microsoft Windows Server. Riordan Manufacturing currently has a combination of Unix and Windows servers which support the organization, however, the team will recommend that the organization standardize it’s systems to support one platform across the agency. Through this recommendation Riordan’s Manufacturing infrastructure will have one platform Security Review The histories of both Windows and UNIX security development have taken diametric paths. The Windows operating system (OS) is monolithic by design, which means that most of the features are integrated into a single unit and is located into the core of the OS. UNIX, on the other hand is based on the core of the operating systems residing in a distributed manner where...

Words: 1893 - Pages: 8

Premium Essay

Windows Server Proposal

...PropAdvwork Proposal University of Maryland University College Shiv LLC will greatly benefit from using Windows Server 2012 to manage their network. Windows Server 2012 brings great updates to security and functionality over past editions of Windows. In this proposal, the major areas I will cover are Active Directory, Group Policy, DNS, File Services, Remote Services, and WSUS (Windows Server Update Services). These major roles have features that will make Shiv LLC Company’s infrastructure run smoothly. Active Directory Shiv LLC will have sites across a large geographic location. Because of this, a regional domain model should be used. Domains will be broken down into where users are working. For example, currently Shiv LLC has three locations, Los Angeles, Dallas, and Houston. This means there will be three domains, representing each of these cities. This strategy will make sure the network can be maintained by regional administrators, who will only worry about users in their area of the network. With this style of deployment, it can be difficult to decide what will be the forest root domain. The main staff for the company is in two cities, Dallas and Houston. This makes it difficult to make one of these sites the forest root domain. To make this decision neutral, a dedicated forest root domain can be suggested. This domain will be created only to function as the forest root. It will not contain and users, except for service administrator accounts for the forest root....

Words: 466 - Pages: 2

Premium Essay

Unix/Linux

...UNIX, Linux, and Windows Server Critique POS/420 Name Professor Date University of Phoenix Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active...

Words: 2760 - Pages: 12

Free Essay

Linux

...Describe some reasons why Linux is installed on only a very small fraction of desktop computers. Are there particular categories of products or users who might see Linux as more appealing than conventional operating systems? Do you think Linux's share of the desktop market will increase? Why or why not? Linux is used proportionally due to the fact that we live in a Windows world. All of the name brand software applications like Office, Peachtree and QuickBooks are Windows based. I couldn’t imagine playing Call of Duty on Linux. Not saying it couldn’t happen. Without being said there is a huge demand to make Windows applications. The overall installation process for Linux is different. I won’t say difficult but different. Linux overall doesn’t have the virus issues that Windows tends to obtain. I know there are a ton of LIVE CD’s out there that is used for forensics, firewalls, backup and recovery. I have used a few of them in the past to recover partitions on hard drives unattainable by windows. I see windows becoming more and more of an online service in the future. If Microsoft goes this route, I can see users adapting to Linux just to avoid a big brother conspiracy. One thing that could also increase the usage of Linux might be those entities that are trying to implement technology with a tight budget. 2) What are some of the benefits of cloud computing? What are some of the drawbacks? Find an article about cloud computing online. Summarize and critique the article in your...

Words: 663 - Pages: 3

Premium Essay

Microsoft

... ©Copyright 2000, The Progress & Freedom Foundation. All rights reserved. TABLE OF CONTENTS EXECUTIVE SUMMARY iii I. INTRODUCTION 1 II. MICROSOFT’S OPERATING SYSTEM MONOPOLY 3 III. NEW MARKET DEVELOPMENTS 5 A. America Online/Netscape Merger 5 B. America Online/ Time Warner Merger 6 C. Linux 6 D. Information Appliances 6 E. Web-Based Computing 7 IV. ANTICOMPETITIVE ACTS: THE NETSCAPE BROWSER 8 A. Market Division Proposal 9 B. Exclusive Arrangements with Original Equipment Manufacturers (OEMs) 9 C. Exclusive Arrangements with Internet Access Providers (IAPs) 10 V. OTHER ANTICOMPETITIVE ACTS 12 A. Java 12 B. Intel 12 C. IBM 13 VI. HARM TO CONSUMERS 14 VII. ALTERNATIVE REMEDIES 16 A. Conduct Remedies 16 B. Structural Remedies 17 1. Functional Divestiture 18 2. Full Division Remedy 19 3. One-Time Licensing Auction 21 VIII. The Hybrid Structural Remedy 22 A. The Minimum Scope of the Windows Company 23 B. The Applications Company 24 C. Addition of Products into the Windows Companies 25 D. Other Operational Issues 26 1. Shareholders 26 2. Intellectual Property 27 3. Employees 27 4. Contracts 28 5. Pecuniary Assets and Investments 28 E. Measures to Preserve the Hybrid Structural Remedy 28 IX. BENEFITS OF THE HYBRID REMEDY 31 A. Operating Systems Competition 31 B. Competition in the...

Words: 15664 - Pages: 63

Free Essay

Re: Target Jbims.. Dream Team 2012.. Do You Have It in You...

...CSE- 401 DISTRIBUTED SYSTEMS [3 1 0 4] 1. Distributed System Models: Introduction , Examples , Architecture models , Fundamental models (1.1,1.2,1.4, 2.1-2.3 of Text1 ) ..2hrs 2. Interprocess Communication, Distributed Objects and Remote Invocation: Introduction , External data representation and marshalling, Communication models, Communication between distributed objects , Remote procedure call Case study: Interprocess communication in UNIX, Java RMI . (4.1-4.6, 5.1-5.5 of Text1) ..6hrs 3. Operating System Introduction , Operating system layer, Processes and threads, Communication and invocation, Architecture (6.1-6.6 of Text1) ..4hrs. 4. Distributed File Systems and Name Services: Introduction , File service architecture, Name services, Domain Name System, Directory and directory services. Case study: Sun network file system, Global name service. (8.1-8.3, 9.1-9.4 of Text1) …6hrs 5. Synchronization: Clock Synchronization, Physical clocks, Logical clocks, Global state (5.1-5.3 of Text2) ..5hrs 6. Transactions&...

Words: 5050 - Pages: 21

Premium Essay

Microsoft Antitrust

...The Microsoft Antitrust Case* by Nicholas Economides** Revised April 2, 2001 Abstract This paper analyzes the law and economics of United States v. Microsoft, a landmark case of antitrust intervention in network industries. The United States Department of Justice and 19 States sued Microsoft alleging (i) that it monopolized the market for operating systems of personal computers and took anti-competitive actions to illegally maintain its monopoly; (ii) that it attempted to monopolize the market for Internet browsers because such browsers would create competition for operating systems; (iii) that it bundled its browser (Internet Explorer) with Windows; and that it engaged in a number of other anti-competitive exclusionary arrangements with computer manufacturers, Internet service providers, and content providers attempting to thwart the distribution of Netscape’s browser. The District Court Judge found in most points for the plaintiffs and ordered the breakup of Microsoft into two companies, one with all the operating systems software, and one with all other products of the company. The District Court also imposed a number of severe restrictions on the business conduct of Microsoft. We analyze the economic issues related to liability. We also analyze the applicability and effectiveness of the remedies imposed by the District Court and contrast them with other potential remedies. * Forthcoming in Journal of Industry, Competition and Trade: From Theory to Policy (August 2001)...

Words: 17051 - Pages: 69

Free Essay

Cathbaz

...theories about so=ware engineering suggested by the history of Linux. I discuss these theories in terms of two fundamentally di:erent development styles, the “cathedral” model of most of the commercial world versus the “bazaar” model of the Linux world. I show that these models derive from opposing assumptions about the nature of the so=ware-debugging task. I then make a sustained argument from the Linux experience for the proposition that “Given enough eyeballs, all bugs are shallow”, suggest productive analogies with other self-correcting systems of selfish agents, and conclude with some exploration of the implications of this insight for the future of so=ware. 1 The Cathedral and the Bazaar Linux is subversive. Who would have thought even five years ago (1991) that a world-class operating system could coalesce as if by magic out of part-time hacking by several thousand developers scattered all over the planet, connected only by the tenuous strands of the Internet? Certainly not I. By the time Linux swam onto my radar screen in early 1993, I had already been involved in Unix and open-source development for ten years. I was one of the first gnu contributors in the mid-1980s. I had released a good deal of open-source so=ware onto the net, developing or co-developing several programs (nethack, Emacs’s vc and gud modes, xlife, and others) that are still in wide use today. I thought I knew how it was done. Linux overturned much of what I thought I knew. I had been preaching...

Words: 15545 - Pages: 63

Free Essay

Gestion de Log

...Projet de Fin d’Etudes Pour l’Obtention du Diplôme Master en Ingénierie Informatique et Internet Intitulé : Gestion et centralisation des logs avec leurs corrélations Présenté par : BENZIDANE KARIM Le, 06/07/2010 Encadrants : Moussaid Khaild , Faculté des Sciences, Casablanca Zoubir Sami , Crédit du Maroc, Casablanca Ouali Youness, Crédit du Maroc, Casablanca Membres du Jury : Mr Abghour, Faculté des Sciences, Casablanca Mr Bouzidi, Faculté des Sciences, Casablanca Mme Fetjah, Faculté des Sciences, Casablanca Année Universitaire 2009 / 2010 1 Remerciements J’adresse mon remercîment à Mr. Zoubir sami pour sa disponibilité et écoute ainsi de m’avoir accepté dans son département et m’avoir permis le choix du sujet. Je remercie également Mr. Youness OUALI pour ses valeureux conseils ainsi que son encadrement au cours de ce stage allant de la démarche du travail jusqu’au technique de déploiement. Je remercie également Mr Abderahim SEKKAKI pour nous avoir donnée l’opportunité d’acquérir ces connaissances, ainsi que tous les enseignants que j’ai eu au long de ces 2 années du Master. Un grand merci à mon encadrant Mr Moussaid pour son aide et conseil pour que ce stage soit réalisé et finalisé. Je tiens aussi à remercier toute l’équipe du plateau ou j’étais à CDM, pour leur aide afin de me fournir les informations nécessaires pour le bon déroulement du projet . Mes remerciements aux membres des jurys qui m’ont honoré en acceptant de juger ce travail. 2 Table des matieres Liste...

Words: 19106 - Pages: 77

Premium Essay

Termpaperwa

...MIS (Spring 2007) Information Systems Theory and Practice Professor: Professor Jason C.H. Chen, Ph.d. Class time: Tuesday (February 27 – June 16) E-mail: chen@jepson.gonzaga.edu URL: http://barney.gonzaga.edu/~chen Office: to be announced Office hour: to be announced and by appointment Required text: 1. Pearlson, K.E. and Saunders, C.S, Managing and Using Information Systems, Wiley, 2006 (3nd edition) 2. A package of Harvard Business School Case Studies Additional Readings and Cases: Class handouts as needed. Course Description and Goals This course is designed to provide the current and future managers with understanding and appreciation of the issues that are related to the organization’s information technology assets. The course is not to educate technical specialists, rather, it is to give students a managerial perspective on the use of, design of, and evaluations of information systems that exist in organizations today. The objective of this course is to prepare students to manage information services in both today’s and tomorrow’s environment with its managerial, social, political, ethical and global issues. Conduct of the Course All students are expected to read the assigned materials (text, end-of-chapter discussion board questions (DBQ) and Harvard Business School case studies- HBC) before coming to the class. Some days we will discuss the materials in the text book. You are expected to be prepared...

Words: 4164 - Pages: 17

Free Essay

Cyber Crime

...Cyber-crimes: A Practical Approach to the Application of Federal Computer Crime Laws Eric J. Sinrod† and William P. Reilly†† I. Introduction Cyber-crime, once the domain of disaffected genius teenagers as portrayed in the movies “War Games” and “Hackers,” has grown into a mature and sophisticated threat to the open nature of the Internet. “Cyber-criminals,” like their non-virtual traditional criminal counterparts, seek opportunity and are attracted to vacuums in law enforcement. The news media is filled with reports of debilitating denial of service attacks, defaced web sites, and new computer viruses worming their way through the nation’s computers. However, there are countless other cyber-crimes that are not made public due to private industry’s reluctance to publicize its vulnerability and the government’s concern for security.[1] Along with the phenomenal growth of the Internet has come the growth of cyber-crime opportunities.[2] As a result of rapid adoption of the Internet globally, computer crimes include not only hacking and cracking, but now also include extortion, child pornography, money laundering, fraud, software pirating, and corporate espionage, to name a few.[3] Law enforcement officials have been frustrated by the inability of legislators to keep cyber-crime legislation ahead of the fast-moving technological curve.[4] At the same time, legislators face the need to balance the competing interests between individual rights, such as privacy...

Words: 23991 - Pages: 96