Premium Essay

Microsoft vs Foss

In:

Submitted By danny0914
Words 402
Pages 2
Research Paper
Microsoft and FOSS

4/23/2012

IT 302
Research Paper

Free Open Source Software also known as FOSS has fared pretty good since the Microsoft posted a high-level summary of 235 patents that were allegedly violated in 2006. Since this scenario happen FOSS has grown and partner up with big name companies. In an interview that Microsoft CEO Steve Ballmer said that ”We live in a world where we honor, and support the honoring of, intellectual property, FOSS patrons are going to have to play by the same rules as the rest of the business. What is fair is fair." Today FOSS is still going strong because of its high quality and because the most important reason it is FREE.

Software that is free is good to anybody. It’s good to individuals that used open source applications on their smart devices, to large companies which use these applications for daily activity for their need in their company. FOSS is great for everyone because it can be shared, copied, changed and of course downloaded. Everybody now in days have smart phones that carry FOSS operating systems. An everyday person likes FOSS instead of paying five dollars to 30 dollars for applications from apple, when if you have an Android phone it’s free. FOSS is not going anywhere just for the reason being that it’s free.

Since 2006 big corporate companies have been changing their philosophy on open source software. Major corporations like IBM, Oracle and Google have been using FOSS. They are big allies to FOSS so in my opinion I think it has helped them because then other small companies that actually look up to these powerful corporations would later start using FOSS. When something is starting to being used and downloaded on a constant basis, this means it’s becoming popular and it is in high demand. So it has helped them since then.

Some of Microsoft actions

Similar Documents

Free Essay

Microsoft vs Foss

...when Microsoft Corp. stated that the Linux kernel and other software’s violated their patents, deal has been struck between the FOSS community and Microsoft. Some customers actually entered into direct patent licenses with Microsoft and including some "major brand-name companies" in financial services, health care, insurance and information technology. (He says they don't want to be identified, presumably because they fear angering the FOSS community.) Others wanted Microsoft to work out the patent issues directly with the commercial distributors like Red Hat and Novell. (Red Hat has about 65 percent of the paid Linux server market, according to IDC, while Novell has 26 percent.) Microsoft and Novell agreed not to sue each other's customers for patent infringement. That would be okay, because it's something that the GPL does not address. On those terms, Novell agreed to give Microsoft a percentage of all its Linux revenue through 2011 (or a minimum of $40 million). The pact also included a marketing collaboration. Microsoft agreed to pay Novell $240 million for "coupons" that it could then resell to customers (theoretically for a profit), who would, in turn, trade them in for subscriptions to Novell's Linux server software. In addition, Microsoft gave Novell another $108 million as a "balancing payment" in connection with the patent part of the deal. It might seem counterintuitive that Microsoft would end up paying millions to Novell when Microsoft is the...

Words: 587 - Pages: 3

Free Essay

Research Paper

...1. How would you characterize the MySQL vs MariaDB problem? What were the key reasons for MariaDB's creation? Do you foresee this becoming the norm (corporate-community forks) or is this simply a set of really disagreeable personalities? Truly Open Source because all code in MariaDB is released under GPL, LPGL or BSD. MariaDB does not have closed source modules like the ones that can be found in MySQL Enterprise Edition. In fact, all the closed source features in MySQL 5.5 Enterprise Edition are found in the MariaDB open source version. MariaDB includes test cases for all fixed bugs. Oracle doesn't provide test cases for new bugs fixed in MySQL 5.5. All bugs and development plans are public. MariaDB is developed by the community in true open source spirit. MariaDB has a lot of new options, extension, storage engines and bug fixes that are not in MySQL. 2. How does GPL version 3 differ from GPL version 2? There are many differences between the two versions of the GNU Public License, but it’s important to note that GPLv3 serves as an alternative, rather than a replacement of GPLv2. The reason for this is that the two licenses are incompatible, and there is no legal way to combine any code that uses the GPLv2 with any code that will be used under the GPLv3. One of the common issues facing those who utilize GPLv2 software is the uncertainty as to whether other code that is used or distributed in conjunction with GPLv2 Code would be subject to the terms of the...

Words: 1284 - Pages: 6

Premium Essay

Fosbap

...YFOSBAPP Database A database is information organized in such a way that a computer program can quickly select pieces of data. You can think of it as an electronic filing system. A database is an organized collection of data. It is the collection of schemas, tables, queries, reports, views and other objects. Data Integration Data integration involves combining data residing in different sources and providing users with a unified view of these data. This process becomes significant in a variety of situations, which include both commercial (when two similar companies need to merge their databases) and scientific (combining research results from different bioinformatics repositories, for example) domains. Data integration appears with increasing frequency as the volume and the need to share existing data explodes. It has become the focus of extensive theoretical work, and numerous open problems remain Existing DBMSs provide various functions that allow management of a database and its data which can be classified into four main functional groups:  Data definition – Creation, modification and removal of definitions that define the organization of the data.  Update – Insertion, modification, and deletion of the actual data.  Retrieval – Providing information in a form directly usable or for further processing by other applications. The retrieved data may be made available in a form basically the same as it is stored in the database or in a new...

Words: 4053 - Pages: 17

Free Essay

Computer

...Hardware and software COMPUTERS 1   Computers ENIAC – 1950 2   What is a computer?  A  data  processing  device   designed  to:   }  input  …   }  data  (e.g.  mp3  3ile)   }  software  (e.g.,  iTunes)     }  process  data  by   applying  software   }  output  results   }  store  data  /  program  /   results  between  uses   Apple II – 1977 3   Computer hardware Storage Nonvolatile Non-portable (hard disk) Portable (e.g. CD) Battery Wall plug RAM (Random Access Memory) Volatile Power Source Mouse Keyboard Tablet Input Microphone Devices Webcam Accelerometer Central Central Processing Processing Units Units (cores) (cores) Monitor Printer Output Plotter Devices Projector Input Processing Output 4 Components of a computer }  Hardware   }  CPU    (Central   Processor  Unit):       }  I/O  devices     (Input  /  Output)   }  Storage   }  Power  source     }  Software   }  Operating  System   }  Applications   Is it a computer? Universal computation }  A  processor  with  the  right  software  can  emulate   any  other  data  processing  device   }  E.g.,  a  smartphone  can  be  a  music  player,   translator,  calculator,    GPS  navigator,...

Words: 2444 - Pages: 10

Premium Essay

Introduction to Reasearch Mathod

...Pg2Pg2 Dr. Sue Greener Business Research Methods ...

Words: 41014 - Pages: 165

Premium Essay

It and Its Scope

...UNIVERSITY OF MUMBAI Bachelor of Engineering Information Technology (Third Year – Sem. V & VI) Revised course (REV- 2012) from Academic Year 2014 -15 Under FACULTY OF TECHNOLOGY (As per Semester Based Credit and Grading System) University of Mumbai, Information Technology (semester V and VI) (Rev-2012) Page 1 Preamble To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of the program that is being accredited. In line with this Faculty of Technology of University of Mumbai has taken a lead in incorporating philosophy of outcome based education in the process of curriculum development. Faculty of Technology, University of Mumbai, in one of its meeting unanimously resolved that, each Board of Studies shall prepare some Program Educational Objectives (PEO‟s) and give freedom to affiliated Institutes to add few (PEO‟s) and course objectives and course outcomes to be clearly defined for each course, so that all faculty members in affiliated institutes understand the depth and approach of course to be taught, which will enhance learner‟s learning process. It was also resolved that, maximum senior faculty from colleges and experts from industry to be involved while revising the curriculum. I am happy to state...

Words: 10444 - Pages: 42

Premium Essay

None

...Comparative Study on Agile software development methodologies A B M Moniruzzaman abm.mzkhan@gmail.com Dr Syed Akhter Hossain aktarhossain@daffodilvarsity.edu.bd Abstract Today‘s business environment is very much dynamic, and organisations are constantly changing their software requirements to adjust with new environment. They also demand for fast delivery of software products as well as for accepting changing requirements. In this aspect, traditional plan-driven developments fail to meet up these requirements. Though traditional software development methodologies, such as life cycle-based structured and object oriented approaches, continue to dominate the systems development few decades and much research has done in traditional methodologies, Agile software development brings its own set of novel challenges that must be addressed to satisfy the customer through early and continuous delivery of the valuable software. It‘s a set of software development methods based on iterative and incremental development process, where requirements and development evolve through collaboration between self-organizing, cross-functional teams that allows rapid delivery of high quality software to meet customer needs and also accommodate changes in the requirements. In this paper, we significantly indentify and describe the major factors, that Agile development approach improves software development process to meet the rapid changing business environments. We also provide a brief comparison of...

Words: 7127 - Pages: 29

Free Essay

Idrivesa

...2007-2008 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, HYDERABAD B.TECH. ELECTRONICS AND COMMUNICATION ENGINEERING I YEAR COURSE STRUCTURE |Code |Subject |T |P/D |C | | |English |2+1 |- |4 | | |Mathematics - I |3+1 |- |6 | | |Mathematical Methods |3+1 |- |6 | | |Applied Physics |2+1 |- |4 | | |C Programming and Data Structures |3+1 |- |6 | | |Network Analysis |2+1 |- |4 | | |Electronic Devices and Circuits |3+1 |- |6 | | |Engineering Drawing |- |3 |4 | | |Computer Programming Lab. |- |3 |4 | | |IT Workshop |- |3 |4 | | |Electronic Devices and Circuits Lab |- |3...

Words: 26947 - Pages: 108

Premium Essay

Information Technology Cma

........................................................ 6 3.3 Link between Corporate Strategy and IT ............................................................... 9 3.4 Organization of IT departments ........................................................................... 10 3.4.1 Additional IT Human Resources Factors ...................................................... 11 3.5 Use of Consultants ............................................................................................... 11 3.6 Outsourcing .......................................................................................................... 12 3.7 Augmenting the Technology Decision Making Process ...................................... 14 3.7.1 Technology vs. The Marketplace .................................................................. 14 3.7.2 Comparing Vendors ...................................................................................... 16 3.8 Licensing Management / Piracy ........................................................................... 18 3.8.1 Transferring Licenses...

Words: 33324 - Pages: 134

Premium Essay

Crm Highlight

...Chapter 1 Introduction to customer relationship management This page intentionally left blank Chapter objectives By the end of this chapter, you will be aware of: 1. 2. 3. 4. 5. 6. four major perspectives on CRM: strategic, operational, analytical and collaborative several common misunderstandings about CRM a definition of CRM the six constituencies having an interest in CRM how important CRM issues vary across industries five generic models of CRM. Introduction The expression customer relationship management (CRM) has only been in use since the early 1990s. Since then there have been many attempts to define the domain of CRM, a number of which appear in Table 1.1. As a relatively immature business or organizational practice, a consensus has not yet emerged about what counts as CRM. Even the meaning of the three-letter acronym CRM is contested. For example, although most people would understand that CRM means customer relationship management, others have used the acronym to mean customer relationship marketing.1 Information technology (IT) companies have tended to use the term CRM to describe the software applications that automate the marketing, selling and service functions of businesses. This equates CRM with technology. Although the market for CRM software is now populated with many players, it started in 1993 when Tom Siebel founded Siebel Systems Inc. Use of the term CRM can be traced back to that period. Forrester, the technology research organization, estimates that...

Words: 8031 - Pages: 33

Premium Essay

Best Buy Overview

...BEST BUY [pic] [pic] Making Life Fun & Easy! [pic] Tiago Alves Andrew Bornstein Mae Brana Grace Tan Meredith Walters Table of Contents Business Summary 2 Vision Statement & Corporate Values 2 Rankings 2 Market Share 3 Stock Chart – 5 Year Performance 3 Financial Highlights 4 History 5 Key Executives 6 Strategy 7 Customer Centricity 7 Value-added Services Business 9 Supply Chain and IT Systems 9 New Store Openings 10 Mergers & Acquisitions 10 Employees 11 Key Competitors 12 5-Year Performance vs Key Competitors 13 Appendix 14 Business Summary Best Buy is a specialty retailer of consumer electronics, home-office products, entertainment software, appliances and related services in a superstore format. It operates retail stores and commercial Web sites in the U.S., Canada and China, under the brand names Best Buy (BestBuy.com and BestBuyCanada.ca), Future Shop (FutureShop.ca), Magnolia Audio Video (MagnoliaAV.com) and Geek Squad (GeekSquad.com and GeekSquad.ca). As of Feb 25 2006, Best Buy operated 742 Best Buy stores, 20 Magnolia Audio Video stores and 12 Geek Squad stores in the U.S.; and 118 Future Shop stores, 44 Best Buy stores and five Geek Squad stores in Canada. Best Buy operates two reportable segments: Domestic and International. The Domestic segment is comprised of all U.S. store and online operations, including Best Buy, Magnolia Audio Video and Geek Squad....

Words: 23684 - Pages: 95

Premium Essay

This Paper Provides an Overview of the Growing Cybercrime Problem and Reviews Two Criminological Theories That Have Been Applied to the Study of Cybercrime and Cybercrime Victimization. Legislation Which Defines

...An Examination of Cybercrime and Cybercrime Research: Self-control and Routine Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 3.1.2 Federal Laws .................................................................................7 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 3.4.2 Business Cyber Victimization ......................................................20 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ...................................................................

Words: 13816 - Pages: 56

Premium Essay

Cyber Crime

...An Examination of Cybercrime and Cybercrime Research: Self-control and Routine Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 Federal Laws .................................................................................7 3.1.2 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 Business Cyber Victimization ......................................................20 3.4.2 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ....................................

Words: 13816 - Pages: 56

Free Essay

Deep Learning Wikipedia

...Deep Learning more at http://ml.memect.com Contents 1 Artificial neural network 1 1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2.1 Improvements since 2006 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3.1 Network function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3.2 Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.3 Learning paradigms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.4 Learning algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.4 Employing artificial neural networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.5 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.5.1 Real-life applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.5.2 Neural networks and neuroscience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.6 Neural network software ...

Words: 55759 - Pages: 224

Premium Essay

Resource-Base View

...Stockholm School of Economics Department of Management and Organization Master Thesis, 20 credits “Can strategic analysis through a market and resource based view prevent the founding of companies with an unsustainable business strategy?” Abstract The Resource-based and Market-based views (RBV and MBV) are two theoretical frameworks which try to find an optimal structure for business strategy by focusing on key strategic points to gain the maximum output or return. During the peak and later upheaval of what is often called the “dot.com bubble” – business models, valuations and strategies were questioned with regards to their anchorage to reality and building endurable businesses. Based on a wide investigation of literature and reports within the Resource-based and Market-based view combined with first-hand interviews and second hand research, we have tried to find to what extent these strategies could or would have prevented investments in IT-ventures lacking the prerequisites for long term competitive advantage. The initial indications and rationale was that the information and frameworks would provide a structured strategic analysis that, if correctly used, could have prevented the poor investments and even lessened the impact of the crash. However, our conclusions are that a strategic analysis, using the MBV and RBV frameworks, would not have been able to give a correct strategic recommendation since the analysis would have been largely based on incorrect...

Words: 29865 - Pages: 120