Open source software has recently emerged as the frontrunner for many industries as the primary method of code production, as it is widely predicted to provide more options for its users in a quicker, quality improved, and cost effective format than the more traditional proprietary software. Linux, the dominant player in the market, is a considerable threat to the Microsoft operating system, which has successfully established itself in the global market. Beyond its commercial potential, open source software possesses a potential goldmine in the government sector. However, questions regarding security and privacy continue to plague government officials in their pursuits of this option. The following discussion will provide an overview of open source software as well as proprietary software and their primary components, an evaluation of government options in relation to the products available on the market, and the social construction of open source software vs. The technological determinism of proprietary software.
Discussion of Open Source Software
Open source software is distinctive in that it provides its users with free access to the object code as well as the source code, and when modifications are made, they must be made available to interested parties within the community. The primary criteria that distinguishes open source software from all other programs are the following (Lerner and Tirole 821):
The program must be distributed royalty free
All program modifications must be distributed under the same terms as the license of the original software
The source code must be released and made available to interested parties
In addition, open source software is subject to a strict code review process, which provides additional security measures for its users. As more people gain access to its code, they can identify flaws or errors in the system (Fisher 21).
However, it is also known that with every piece of software, there are disadvantages to its use. In the case of open source software, even the most brilliant programmers cannot escape the potential security breaches that may exist with this type of software. According to Farrow, "OSS programmers aren't generally paid to writer the software they maintain. These programmers are paid by becoming well-known for writing great software. Including backdoors would be the kiss of death for a programmer. Even security-related bugs hurt an OSS programmer's reputation" (73). Furthermore, Neumann states in an article by Fisher that "Unless there's a great deal of discipline underlying the development, there's no difference in the security. Open source is not inherently more secure. If everyone has the same bad skills, all the eyeballs in the world won't help you. Unless there's discipline, you still come up with garbage" (40). Some experts argue that the key components of secure software are attention to detail and careful coding, and that both proprietary and open source software can be very secure if carefully written (Fisher 20). This demonstrates that the knowledge of the programmer can strongly influence the security potential of a given software product.
One question that is raised in the utilization of open source software is why the product is given away at no cost to other users. A simple explanation may be that users find significant value in the product since it is much easier to manage open source software since it does not possess strict licensing requirements, such as those placed on Microsoft products (MacVittie and MacVittie 15). This is logical, since the cost of using the traditional Microsoft operating system can be excessive if a new license must be purchased for each user. Cost is more than likely one of the chief motivators in the decision to use open source software over the traditional proprietary methods.
The Linux operating system is the chief product that many new open source customers consider as their primary choice. Many IT experts find that Linux is more powerful when enthusiasm is brought into the picture (Zetlin 38). Therefore, learning the ins and outs of the system can take some time and may require some work beyond normal business hours. For this reason, training in Linux and other similar open source offerings should be a primary concern for IT professionals in order to improve its potential and to reduce the possibility of security flaws.
The potential cost of ownership of open source software is highly dependent on the business environment of the firm in question. According to Wheeler, "OSS/FS isn't cost-free, because you'll still spend money for paper documentation, support, training, system administration, and so on, just as you do with proprietary systems. In many cases, the actual programs in OSS/FS distributions can be acquired freely by downloading...
Social Science There are, of course, a number of theoretical approaches to social science -- and a number of sub-theories that construct a larger, more detailed template that helps us critique the differences between critical social science, and the positivist and interpretive views. Really, as noted, there are a number of means to an end. There are some fundamental questions that social scientists must answer that have been seminal questions
Open Source Intelligence and Organized Crime In the words of Bell and Congram (2014), TOC-Transnational Organized Crime can be defined as a crime carried out by an enduring organization or structure created and primarily involved in pursuing profits through several illegal businesses. It shares certain traits with formal organizations: using rules and codes to coordinate activities, division of labour, and allocating tasks with the aim of actualizing some given goals. While
" (Information Society and Media, 2005) f. The eContent Programme and the eTen Programme The 100 million dollar eContent Programme (2001-2005) focuses on encouraging growth and development of tie European digital content industry. This programme funds projects with short time-to-market and as well experiments with new models in business and partnerships through use of technology that is presently available. The programme's stated 'main thrust' is to; Improve access to an expand the
While these processes are based on facts, the discourses surrounding the term globalization are actually not. This means that globalization should not automatically be equated with neoliberalist economics and should not be imagined as making the nation-state concept obsolete (Kelly 1999). Thus it can be theorized that this discourse is open to change and interpretation, thereby leading to a wider set of alternative views regarding the term globalization. Various alternative views
Social Order in Public Spaces Every society has certain rules and regulations that help people live together harmoniously. Some of these rules are explicit and are openly known. Other rules are implicit and therefore subtle. Both implicit and explicit rules and regulations govern a society. However, when a person moves away from one particular society to another, he or she has difficulty in adjusting to the norms of that new society. Social
business2community.com/social-media/2012s-ten-worst-social-media-Disaster-0370309 Using contemporary illustrative examples from academic literature and reputable business publications, discuss the concept of "Social Business" and the resultant opportunity and challenges that are currently being faced by the retail industry globally. Concept of Social Business Concept of Social Business with Retailers Social Media and Retailing Best Practices in Administering Social Media There is a growing body of research that confirms that companies of all sizes and types can realize a wide array
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now