The open source development model has unique characteristics that make it in
some instances a superior model for developing software compared to the
traditional software engineering cascade model. As with other practices, the
open source development model had its advantages and inconveniences. Will
adopting the open source development model improve the way your corporate
developers work and produce software? What are the best practices from the
open source development model that we can use in a corporate environment?
The open source software development model has a different process and set of
values than traditional proprietary software development model. The
traditional software development process consists of six activities
illustrated in Figure 1: collecting and analyzing requirements, designing a
solution approach, developing the code, testing, deploying, and ma... (more)
For this issue, I'm going to talk with long-time Linux author Mark Sobell.
Mark's first Linux book came out in 1996, when Linux was in its infancy. In
this interview Mark discusses Red Hat's Fedora Core 2 version of Linux and
his experiences writing Linux books.
LWM: I know you've written a lot of books. When did you write your first one?
MGS: My first book, A Practical Guide to the UNIX System, was published in
1982. At that time it was one of three or four books on UNIX. Since then,
I've written a number of books on System V and BSD UNIX, databases, Solaris,
and three books on L... (more)
Robert C. Seacord, a senior vulnerability analyst at the CERT/Coordination
Center at Carnegie Mellon University, has just published the book Secure
Coding in C and C++ (Addison-Wesley, 2005). I sat down with him to discuss
software security in the Linux environment and elsewhere.
LWM: There's an ongoing debate over whether Linux is more secure than
Windows. Some people argue that since Linux's source code is freely
available, it makes it easy for hackers to implement hacks and break into
Linux systems, whereas this becomes more difficult with proprietary operating
systems. What'... (more)
Organizations that gather and store critical information have to protect it.
While there are tried and true techniques for data protection, there are also
new and innovative ones. These new practices and tools greatly enhance an
organization's ability to protect mission-critical data. Linux and Open
Source users are specially challenged when trying to take advantage of much
of this new technology.
We asked technology analyst Tom Petrocelli about what is new and interesting
in data protection. Tom is president of Technology Alignment Partners
(www.techalignment.com) and author of... (more)
(SYS-CON Media) - Since the beginning of the software industry, nearly every
software company in the world has followed the same business model: its own
employees develop the software, which is closely held intellectual property,
the software is delivered to clients in binary form, and users run the
licensed software on their own computers. Today, this model has been
challenged by a new paradigm: open source. Developed and maintained by
volunteers across the world, distributed to users at no cost, and available
as source code, open source software is radically different from its ... (more)