Free Essay

Comparison of Opensource Os and Closed Source Os

In: Computers and Technology

Submitted By twallick
Words 976
Pages 4
Comparison of open source OS and closed source OS
Ted Wallick
University of Phoenix

The definition of closed source Operating System(OS), is any OS made but it's code and functionality is private to the vendor that made it. The end user can neither look at it's core/kernel or change it in any way. If an end user needs a change made, a change request has to be sent to the vendor to get adjustments made. This is how most commercial software is developed. Microsoft Windows OS (PC and mobile), Apple OS X, IOS, and UNIX, are primary examples of closed OS. Closed OS has some Pros and Cons.
Pros:
* Vendors have complete control over hardware and functionality. * The vendor gets to set some standards with how software and hardware are developed to work with the OS. * Vendor controls Versions and updates * Vendor controls any security issues (personally I would not want this hot potato) * Vendor has some control over what 3rd party developers make * Easier for the OS vendor and 3rd party developers to make money.
Cons:
* Response to system exploits (things that allow hackers to do whatever) is slower than open source OS due to a limited amount of code monkeys that have intimate knowledge and access to the OS code base * Closed OSs cost end users money hand over fist. Major upgrades will cost money. Most 3rd party software will cost large amounts of money. This is only fair to the people that put great time, effort and money to develop the tools we use. * The vendor is responsible for any bugs in the system The definition of Open Source OS is any OS that makes it's source code available to the public to look at, modify, and distribute. These OS tend to be free for anyone to use. There are some exceptions where a 3rd party developer makes something that is fairly specialized and wants to be compensated for the time and effort put into it. However there code still has to be made available to the public to use and modify. The only example, I can find, of an open source OS is Linux. Linux Comes in, what seems to be be, an infinite number of flavours called distributions. Five distributions(Distro) stand above the rest, Ubuntu, Mint, Debian, Fedora, and Red Hat. These distributions are complete general user and enterprise friendly distros of the Linux OS. The other distros seem to have a specific purpose in mind. This is the thing to keep in mind about Linux, it has, still is and always will be developed and maintained by anyone who wants to contribute to its development. Which is why there are many different distros.

If I was so inclined, I could make a whole new distro of Ubuntu and distribute it under my own name, Tiedie Ted. The major distributions, mentioned earlier, have huge followings of users and developers but each distro has it's way of being distinct from one another, usually in the interface style or arranging the output of information. Tiedie Ted is just a Ubuntu clone until I do something different, like add animation effects to folders, ooo glitter all over everything. This would require some jiggerhackery with the file system and possibly the kernel (which I am allowed to do because it's open source). This would make it my very own distro. Unless I did something to break the fundamental way Linux works, it will run and do everything Ubuntu can do and be. There is a problem with this. Tiedie Ted is a lot like Ubuntu but Ubuntu just released a new file system with functionality too good to pass up. OOPS, a lot of what makes Tidie Ted special is changes I made to the file system particularly the files that need to be updated. I can do without the new file system or modify the new FS to suite my needs.

Here are some Pros and Cons of Open Source OS.
Pros:
* Linux is largely bug free due to the huge community that intimately knows the OS. If a bug or vulnerability pops up, there is a solution within the day. * The price is right for everyone. FREE. If you have a problem with free, you need to get to a shrink fast. * Every user controls the source code. But I will be leaving the OS details up to Ubuntu, thank you. * If you have a problem regarding the OS, there is always someone that can solve it very quickly, especially on the development side of things. If you try to get help modifying the OS in a closed OS, you will be ignored, shot or sewed for the attempt.
Cons: If you really want to call them cons * No real control of updates * No standard Application Programming Interface. APIs are as diverse as Linux. If getting into programming you have to pick an API to use. * No patents no copyrights. If you make something useful, someone else can reap the rewards.

References
Members.apex-internet.com,. (2015).Windows vs. Linux - Open Source vs. Closed Source - Comparing Real Results. Retrieved 14 September 2015, from http://members.apex-internet.com/sa/windowslinux/02-politics.html

Quora.com,. (2015). What are the advantages/disadvantages of a closed-source, proprietary OS (mobile or not), like the BlackBerry OS, iOS, Windows 8, etc? - Quora. Retrieved 14 September 2015, from http://www.quora.com/What-are-the-advantages-disadvantages-of-a-closed-source-proprietary-OS-mobile-or-not-like-the-BlackBerry-OS-iOS-Windows-8-etc

Enderunix.org,. (2015). Open-Source versus Closed-Source Sytems. Retrieved 14 September 2015, from http://www.enderunix.org/docs/opensource_vs_closedsource.html

Howtogeek.com,. (2015). 10 of the Most Popular Linux Distributions Compared. Retrieved 14 September 2015, from http://www.howtogeek.com/191207/10-of-the-most-popular-linux-distributions-compared/

Similar Documents

Premium Essay

Intro to Linux

...A Practical Guide to Linux Commands, Editors, and Shell Programming SECOND EDITION ® Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Library of Congress......

Words: 228961 - Pages: 916

Free Essay

Ethical Hacking

...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or......

Words: 185373 - Pages: 742

Free Essay

Keylogging

...TRANSACTIONS ON MOBILE COMPUTING, VOL. 1, NO. 8, AUGUST 2014 1 Keylogging-resistant Visual Authentication Protocols DaeHun Nyang, Member, IEEE, Aziz Mohaisen, Member, IEEE, Jeonil Kang, Member, IEEE, Abstract—The design of secure authentication protocols is quite challenging, considering that various kinds of root kits reside in PCs (Personal Computers) to observe user’s behavior and to make PCs untrusted devices. Involving human in authentication protocols, while promising, is not easy because of their limited capability of computation and memorization. Therefore, relying on users to enhance security necessarily degrades the usability. On the other hand, relaxing assumptions and rigorous security design to improve the user experience can lead to security breaches that can harm the users’ trust. In this paper, we demonstrate how careful visualization design can enhance not only the security but also the usability of authentication. To that end, we propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature. Furthermore, using an extensive case study on a prototype of our protocols, we highlight the potential of our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements.......

Words: 12707 - Pages: 51

Free Essay

Computer Vision

...Learning OpenCV Gary Bradski and Adrian Kaehler Beijing · Cambridge · Farnham · Köln · Sebastopol · Taipei · Tokyo Learning OpenCV by Gary Bradski and Adrian Kaehler Copyright © 2008 Gary Bradski and Adrian Kaehler. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or corporate@oreilly.com. Editor: Mike Loukides Production Editor: Rachel Monaghan Production Services: Newgen Publishing and Data Services Cover Designer: Karen Montgomery Interior Designer: David Futato Illustrator: Robert Romano Printing History: September 2008: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Learning OpenCV, the image of a giant peacock moth, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of......

Words: 150684 - Pages: 603

Premium Essay

Essentials of Systems Analysis and Design

...Production Project Manager: Kelly Warsak Senior Operations Supervisor: Arnold Vila Operations Specialist: Cathleen Petersen Creative Director: Blair Brown Senior Art Director/Design Supervisor: Janet Slowik Text Designer: Michael Fruhbeis Creative Director/Cover: Jayne Conte Cover Designer: Suzanne Duda Cover Art: Fotolia/3d mosaic/©Redshinestudio Manager, Rights and Permissions: Hessa Albader Media Project Manager: Lisa Rinaldi Media Editor: Denise Vaughn Full-Service Project Management: Tiffany Timmerman/S4Carlisle Publishing Services Composition: S4Carlisle Publishing Services Printer/Binder: Courier/Kendallville Cover Printer: Lehigh-Phoenix Color/Hagerstown Text Font: ITCCentury Book Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation. Copyright © 2012, 2009, 2006, 2004, 2001 Pearson Education, Inc., publishing as Prentice Hall. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means,...

Words: 179288 - Pages: 718

Free Essay

Networks

...The Wealth of Networks The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press New Haven and London Copyright _ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. 10 9 8 7 6 5 4 3 2 1...

Words: 214717 - Pages: 859

Premium Essay

Dataminig

...Data Mining Third Edition This page intentionally left blank Data Mining Practical Machine Learning Tools and Techniques Third Edition Ian H. Witten Eibe Frank Mark A. Hall AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Morgan Kaufmann Publishers is an imprint of Elsevier Morgan Kaufmann Publishers is an imprint of Elsevier 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA This book is printed on acid-free paper. Copyright © 2011 Elsevier Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers......

Words: 194698 - Pages: 779