StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Open source and closed source approaches to developing operating systems - Research Paper Example

Cite this document
Summary
Approaches to Developing Operating Systems Author Institution Approaches to Developing Operating Systems Open source software is the software, which allow for sharing, modifying, distributing and viewing of code of the computer by other persons or entities…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Open source and closed source approaches to developing operating systems
Read Text Preview

Extract of sample "Open source and closed source approaches to developing operating systems"

Approaches to Developing Operating Systems Approaches to Developing Operating Systems Open source software is the software, which allow for sharing, modifying, distributing and viewing of code of the computer by other persons or entities. Closed software, on the other hand, is restricted to private use only. The two sources of software differ in terms of their innovation, security, usability, and cost and in the provision of supporting service. Regarding cost, open source software requires relatively low costs in its implementation and training.

It requires careful technical management of its content. Amongst the costs that persists while using open source software are those of implementing it, funding innovation, servicing, and expansion (Donaldson & Siegel, 2000). Those who provide open source add-ons and integration are increasing their charges with time. This has made the cost of owning open source software to be at par with those of closed source alternatives. The cost of closed source software depends on the sophistication of the option.

This cost compounds a base charge for the software, license, service and integration. The closed source software has trusted security, steady innovation and does not need a lot of technical training. It allows for exclusive customization and has a higher degree of functionality. Their websites are highly available relative to open source software. These elements warrant the relatively high costs of closed source software. Open source software counts on the online usage so as to give support through blogs and other avenues (Mu?nch, 2012).

Closed source software is high on service and support. Providers of closed source software are able to support their customers continually. They do so to supplement the use of manuals and in instances where a user is unable to utilize the manuals. Closed source software companies have workers who are reliably knowledgeable in their products, and this gives them a cutting edge on their delivery of service. As a result of the advantage of service that proprietary software enjoy over its counterpart, competition is stiff between proprietary software companies and this adds on to better service provision.

Open source software enjoys the benefit of flexibility which allows customers to use the software according to their convenience. Innovation in open source software though is individualized and may not reach all of its users. It follows then that unless persons who use this software take it upon themselves to look out for innovation, they may never know of its existence. Studies have suggested that changes to a computer code by an open source software user may restrict the future support and may tamper with the advancement of the software.

Users of closed source software do not have the freedom to modify the original computer code. Regardless of the view that this could be disadvantageous, it helps secure the authenticity of the software (Acuna & Juristo, 2005). Proprietary software suppliers can assist certain clients to customize the software to suit the demands. They also provide new products and upgrade their customers’ software. Online customers of closed source software give feedbacks and share ideas. This provides avenues for innovation and modification of the products with respect to the dynamic needs of the customers.

When there is an innovation it is made available to all clients. In most cases, the technology involved in production of open source software is not tested by experts. This has made it be accused of lack of usability. Its idiosyncratic production requires knowledge and skills to modify languages of programming lest it becomes difficult to correct errors. As it does not commonly utilize guides and manuals, these important items are not readily available. The documentation available for open source software is not sufficient to enlighten lay users.

Closed source software is tested promptly by experts before distribution (Donaldson & Siegel, 2000). It also has relatively specified users for whom it is specially made, and this builds on its usability. Proprietary software provides guides and manuals that are comprehensive and readily available. This effects clients’ learning and serves as a reference. Proprietary software companies conduct support services through training and seminars to effect better utility of the product. Increasingly, closed software companies are allowing teams of qualified individuals and agencies to modify the product.

In terms of security, open source software is developed by individuals who may not necessarily take it to completion. This poses a threat to the comprehensive communication about the software. Unscrupulous programmers can access users’ information without the knowledge of the users. The expertise needed to verify and analyze the source code is high. Open source software companies would need to put together teams of highly qualified individuals that would work with the support of online users, to mitigate the risk of fraudsters (Mu?nch, 2012).

Closed source software is developed by highly qualified teams who work harmoniously in controlled environments. In proprietary software, the computer code can only be viewed by these qualified individuals. This eliminates the risk of imprudent access of users’ information unknowingly. Software licensing regulates the use, modification and distribution of software. It makes the contract between the software developer and the user binding. Without licenses, software users would not know the restrictions attached to the software and developers would have a hard time regulating the way in which their products are used.

There are different types of software licenses. Proprietary licenses restrict the ways persons can use the software with regards to the rights of the business owner (Classen & American Bar Association, 2005). It prescribes the use of the software by a single user and prohibits redistribution, alteration, copying and derivatives of a person’s work. Products covered by proprietary license are in binary form with prohibition of examining source code unless during inspection. Free and open source software licensing allows flexibility in the use, distribution and innovation of software.

Many of these licenses differ in some aspects, but they all allow non-discriminatory use and modification of software. Hybrid software licensing combines free and open source software license with proprietary license. This differs from the other two in that the person with the rights over the software decides what to restrict and what to allow even in individual cases. This is meant to meet the demands of a situation where neither the free and open source software license nor proprietary license can individually fulfill (Gordon, 2008).

In the language of software licensing, permissive licenses are those that have few limitations and that allow indiscriminate dissemination of software requiring only that one acknowledges the developer of the software. Education Community License (ECL) and MIT are examples of permissive licenses. There are some licenses that use copyleft licenses. Copyleft requires that derivatives of other people’s works be disseminated under the same conditions of the original work. Although they are commonly regarded as restrictive, they allow perpetual access to the works of others.

General Public License (GPL), Mozilla Public License (MPL) and Lesser General Public License (LGPL) are examples of copyleft licenses (Classen & American Bar Association, 2005). The terms of copyleft license are also referred to as reciprocity provisions or requirements. Different copyleft has varying degrees of reciprocity, and General Public License has the highest degree of reciprocity. References Acuna, S. T., & Juristo, N. (2005). Software Process Modeling. New York: Springer Science+Business Media, Inc.

Classen, H. W., & American Bar Association. (2005). A practical guide to software licensing for licensees and licensors analyses and model forms: Analyses and model forms. Chicago, IL: American Bar Association, Section of Business Law. Donaldson, S. E., & Siegel, S. G. (2000). Successful software development. Upper Saddle River, NJ: Prentice Hall PTR. Gordon, J. I. (2008). Software licensing handbook. Raleigh, NC: Lulu. Mu?nch, J. (2012). Software process definition and management. Berlin: Springer.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Open source and closed source approaches to developing operating Research Paper”, n.d.)
Open source and closed source approaches to developing operating Research Paper. Retrieved from https://studentshare.org/information-technology/1481226-open-source-and-closed-source-approaches-to
(Open Source and Closed Source Approaches to Developing Operating Research Paper)
Open Source and Closed Source Approaches to Developing Operating Research Paper. https://studentshare.org/information-technology/1481226-open-source-and-closed-source-approaches-to.
“Open Source and Closed Source Approaches to Developing Operating Research Paper”, n.d. https://studentshare.org/information-technology/1481226-open-source-and-closed-source-approaches-to.
  • Cited: 0 times

CHECK THESE SAMPLES OF Open source and closed source approaches to developing operating systems

Open Source and Open Standards in E-Commerce

The paper ''open source and Open Standards in E-Commerce'' intends to provide a critical evaluation of two concepts that have an enormous impact on the manner electronic commerce is currently be handled in the future: open source, open standards.... The digital revolution that today's population is experiencing will have a lasting and major consequence on the evolution of future societies since the management of knowledge and information systems are and will continue to be handled by computers and digital devices....
15 Pages (3750 words) Essay

DELL Case Study Analysis (Marketing)

While most companies today look in to innovative distribution structures termed as Vertical Marketing systems which integrate the activities of each link in the distribution chain (Armstrong & Kotler 2000), Dell had chosen to do away completely with the distribution chain.... As Dells major US and European markets saturate, the company as other competitors in the industry needs to tap on to emerging markets such as China, India and other developing nations to support its growth....
4 Pages (1000 words) Essay

Source Code Analysis

SCA (source Code Analysis) is an automated technique employed for purposes of debugging a computer application prior to being distributed.... Software security is an important requirement for any business organization particularly the ones dealing with software development.... Getting all the involved stakeholders on board is vital for making certain that an organization's code remains secure devoid of compromising safety....
6 Pages (1500 words) Essay

Linux Corporation as the Market Leader in the Operating System Industry

I will analyze the different aspects of both operating systems and try to find out the main points.... Before going towards analysis of two operating systems we will discuss what an operating system is and how it works.... hellip; Another aim of this paper is to bring out the main reasons and points that make the Linux the most efficient operating system for all purposes.... An operating system is an incorporated set of programs that are used to deal with a range of resources and on the whole operations of a computer system....
25 Pages (6250 words) Research Paper

The Environmental Threats and Other Financial Aspects of the Euro Disney Operations

There are four approaches to managing risk.... In the case of the hotel service industry, a combination of all four approaches can be used depending on the situation.... The impact of risk has increased in terms of financial losses.... This is not only a consequence of the increased number of risks we are confronted with; the severity and frequency of disasters have increased as well....
16 Pages (4000 words) Research Paper

Microkernel Operating Systems - Approaches to Operating System Design

This paper "Microkernel operating systems - Approaches to Operating System Design" looks at the meaning of the microkernel operating system; approaches to operating system design; examples of microkernel OS; security and reliability concerns of the current OS; the future of microkernels in mainstream OS.... nbsp; Early Microkernel operating systems were smaller in size, partly due to limited computer memory.... The userspace contains actual services of the operating system such as user interface, device drivers, file systems, and protocol stacks....
12 Pages (3000 words) Essay

Open Source Enterprise-Wide Systems, Service-Oriented Architectures and Software as a Service

The technological infrastructure of the business such as computers, operating systems, and computer networks is another aspect in the enterprise architecture which is also crucial for the realization of the enterprise's overall goals and objectives.... … The paper “open source Enterprise-Wide Systems, Service-Oriented Architectures and Software as a Service ” is an outstanding variant of an essay on information technology.... The paper “open source Enterprise-Wide Systems, Service-Oriented Architectures and Software as a Service ” is an outstanding variant of an essay on information technology....
9 Pages (2250 words) Essay

Introduction to Information System

This report "Introduction to Information System" presents enterprise resource planning systems that involve business management software that permits some organizations to utilize a system of integrated applications to administer the business.... Solaricot manufacturing firm deals with marketing mostly, hence, when some customer makes some order, the process will have to start with some paper document, then it circulates to the whole company, in which case it is entered into the different computer systems....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us