Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Why I Use Generic Computers and Open Source Software
OSNews ^ | 24 November 2012 | Howard Fosdick

Posted on 11/26/2012 11:13:00 AM PST by ShadowAce

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-49 next last
To: Responsibility2nd
Or you could just source and store on the cloud. There. A 2 thousand word solution verses a 10 word solution.

I was thinking the same thing. I'm setting up a small business tech system right now, and I'm not going to have anything locally, no files, no applications, nothing except the operating system (right now, Google Chrome). All of the problems cited by the OP are thereby eliminated. Everything's backed up always, hardware failures will always result in zero downtime because there will always be other devices around to log-in from, no software to purchase, no compatibility issues, no malware, viruses, or manual updates. All files are available anywhere out in the field, from all kinds of device, including smartphones and tablets. Yes, it's not "confidential", but the only way to entirely eliminate the possibility of someone seeing your files is to stay off the internet completely (at least on the computer in question) and a computer not connected to the internet in 2012 makes about as much sense to me as a cell phone without a voice and data plan.

21 posted on 11/26/2012 12:21:39 PM PST by Behind the Blue Wall
[ Post Reply | Private Reply | To 4 | View Replies]

To: Behind the Blue Wall

That makes sense.


22 posted on 11/26/2012 12:28:02 PM PST by rurgan (give laws an expiration date:so the congress has to review every 4 years to see if needed)
[ Post Reply | Private Reply | To 21 | View Replies]

To: ShadowAce

This is great if your software requirements are vanilla, I suppose. If all we are talking about is Office type documents than fine. But good luck if you have any special needs as a business. Most of this article is generalized, self important claptrap.


23 posted on 11/26/2012 12:30:38 PM PST by Catholic Canadian
[ Post Reply | Private Reply | To 1 | View Replies]

To: oh8eleven

Ha ha! My first thought exactly. Fearless Fosdick. No school like the Old School.


24 posted on 11/26/2012 12:30:57 PM PST by Bloody Sam Roberts ('Need' now means wanting someone else's money. 'Greed' means wanting to keep your own...)
[ Post Reply | Private Reply | To 12 | View Replies]

To: DarthFuzball; 5thGenTexan

Well, you can see the source. If there is something malicious or bad, everyone familiar with that source in the world would be commenting/complaining about it.

A ticket gets opened, it gets fixed.

Yes, the projects (source) are locked down. It’s not like joe blow edits the master copies of the source files. They have a project team, source control, etc.

They just have the source publicly available for the world to see if they care to.

I like Linus’s comments. Lotsa dopes out there in high places, and he doesn’t mince words. Funny.

With windows, M$ keeps a monstrous stack of poo called their architecture with the source only known to M$.

So you’re relying on M$ to keep it secure and of good quality.

IMHO, they’ve got to be coding what amounts to empty loops to soak up CPU with the speed of today’s CPUs.

If they did a great job at keeping their architecture straightforward, extensible and secure, and they did not overcharge, open source would not really be necessary.

If Windows could be had for $29, and M$ was not trying to throw curve balls to developers and “lock them in” to M$, etc., by always implementing things their own weird way, and they kept configurations secure by default instead of insecure by default, and M$ never entered the applications market in a big way, using their brand name to blow away every application software company they could once their products got popular, they would have an OS platform that made sense to build software on.

But since they don’t do these things, a software company knows that M$ will only let them get so big before they crush them with an M$-branded competitive product (that stinks but will sell anyway) or buy them out for not too great of a price.

They got too big, however, with BG wanting to take over the whole software industry, instead of just run a business and leave it go at that, which leads to the trap of revenue increase addiction despite the fact that they’ve long since grew beyond the natural market size for an OS company. Such an addiction naturally motivates towards monopoly as opposed to efficiency and innovation to bring in more revenue. This is why MSFT share price in the last 10 years has gone - nowhere. It’s got nowhere to go.

And M$ has single-handedly held back innovation for all these years since most people are stuck with whatever Redmond comes up with.

Someday maybe we can get beyond the goofiness that OSs and the internet are today. Thanks to the idiocy of government, I’m in no hurry.


25 posted on 11/26/2012 1:00:20 PM PST by PieterCasparzen (We have to fix things ourselves.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: ShadowAce
Wow. If you want to do all that to avoid profiting big corps, fine. I have been using computers professionally for many, many years. The only hardware failures, I have had were from brown outs/ or power surges. Unplugging during lightning storms, and uninterruptable power supplies take care of that. Almost everything “problem” you mention, it seems like your solution is way overkill. If your happy with what your doing good for you. Thank God, I don’t have to go to that much trouble to be successful in computers.
26 posted on 11/26/2012 1:17:49 PM PST by EyeSalveRich (its not so hard)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Psycho_Bunny

Thought you were using some Linux.


27 posted on 11/26/2012 1:18:35 PM PST by Ernest_at_the_Beach ((The Global Warming Hoax was a Criminal Act....where is Al Gore?))
[ Post Reply | Private Reply | To 14 | View Replies]

To: Hardraade
And look at what Intel may do....FR Thread:

Intel kills off the desktop, PCs go with it

28 posted on 11/26/2012 1:20:57 PM PST by Ernest_at_the_Beach ((The Global Warming Hoax was a Criminal Act....where is Al Gore?))
[ Post Reply | Private Reply | To 15 | View Replies]

To: ShadowAce

I just want it to work... I don’t want to have a new hobby

Every few years we have to upgrade and it is 3 months of HELL... I would hate to deal with that on a daily basis... fix this, that doesn’t work, my printer doesn’t work etc etc etc

I could write DB Programs myself that did everything except have pretty pictures back during the dos days ... today ... not so much

TT


29 posted on 11/26/2012 1:25:04 PM PST by TexasTransplant (Radical islam is islam. Moderate islam is the Trojan Horse.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: roamer_1
Closed Source versus Open Source does not in and of itself make for better security. If that were the case, the discussions about the need for antivirus solutions on mobile devices would be around iOS, but they are not. They are about Android.

It has more to do with the target's market share than the sourcing model. Hacking Mac OS when it was 9% of the market share wouldn't make news. Hackers went after Windows because that made news. Interestingly, now that Mac OSX is getting to he 30% share, it is coming under attack. In the mobile space, Android is the market leader. So it gets teh attention target on its back.

The difference is that Android's internals are open for analysis. Yes, there is a large, faster moving community that is evolving the code base quicker than a big company minded Microsoft. But there is also opportunity for someone to find adn exploit the hole rather than fix it. This was exactly what happened with the Android game malware that sent your contacts adn personal information to a server in China a year or so ago. And that fast moving dynamic is changing as well under Google, who is becoming the big company minded beast. They will become "the man" to the economic politics driven hacker. And to the attention seeking hacker.

My comment on merging sources was that unless you personally review source changes to both the OS and the apps you use (compiling them all locally), you are placing some implicit trust in the open source community. Nothing more.

It is a matter of where you personally want to place trust and accept risk. Just don't be lulled into believing the open source community is fully trustworthy - remember, many of the Windows hackers are part of the open source community.

30 posted on 11/26/2012 1:37:50 PM PST by 5thGenTexan
[ Post Reply | Private Reply | To 19 | View Replies]

To: PieterCasparzen
Well, you can see the source. If there is something malicious or bad, everyone familiar with that source in the world would be commenting/complaining about it.

A ticket gets opened, it gets fixed.

If a ticket gets opened, it gets fixed. Or if a hacker finds it first, by reading the code, and exploits it without reporting it, as happened on Android recently.

And the apps go thru no review process at all. There are pluses and minuses to both models. And there is more than on closed source operating system out there. You just have to weight the risks and rewards and make the decision appropriate for you.

31 posted on 11/26/2012 1:51:19 PM PST by 5thGenTexan
[ Post Reply | Private Reply | To 25 | View Replies]

To: ShadowAce

Had a hardware crash on a Xp box. Yup, restoring the system is not just making a hard disk swap.


32 posted on 11/26/2012 1:59:28 PM PST by FastCoyote (I am intolerant of the intolerable.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 5thGenTexan

A couple thoughts:

No smartphones for me. I want control, or forget having the device. I don’t want auto updates on anything.

The only way something can get in is if something is listening or malicious code installs itself.

I keep only software that I want installed; my ports are essentially all not listening. And I know for a fact that nothing has changed, so there’s no new software that I don’t know about, no update, etc., that planted itself in my machine and by default is a hacker magnet. I do everything in paranoid mode.

I don’t want to deal with software on a simple device like a phone, then actually conduct personal transactions on it, save personal data on it, etc.

Unix in general is just a pc-like O/S, i.e., the default file systems are primitive. Root can write to executable files. It’s idiotic. It was never intended to be what it is today, that is, having to exist in the free-for-all unsecure world.

I would much prefer that several proprietary OSs were competing and available to give me a choice, but M$ killed all of them off.

Open Source works and it’s cheap. It’s also rinky-tink in terms of arbitrary, cryptic, cutesy naming conventions, commands that have bazillion options for a truckload of functionality in one command etc. TC/IP is nuts, IMHO.

But... at least I’m not paying thousands per year to M$ for the same amount of goofy complexity and having the whole thing change every 5 years or so. M$ is constant BS that one has to pay exhorbitant amounts for. An old executable on linux has a good shot a running.

IMHO, after 50 years, there should be OSs that had the core functions, be rock solid and cheap.

Yeh, I agree 100%, ya pay yer money, ya take yer choice.


33 posted on 11/26/2012 3:43:22 PM PST by PieterCasparzen (We have to fix things ourselves.)
[ Post Reply | Private Reply | To 31 | View Replies]

To: Responsibility2nd
There. A 2 thousand word solution verses a 10 word solution.

What about if you left your Ouija Board in your other suit and can't access the cloud?

34 posted on 11/26/2012 11:19:09 PM PST by publius911 (Formerly Publius 6961, formerly jennsdad)
[ Post Reply | Private Reply | To 4 | View Replies]

Bookmark


35 posted on 11/26/2012 11:30:23 PM PST by freds6girlies (many that are first shall be last; and the last shall be first. Mt. 19:30. R.I.P. G & J)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 5thGenTexan

That is a common critique but a baseless one in the case of the major open-source enterprise programs like Linux, Apache, etc. Those programs are rock-solid in security.


36 posted on 11/27/2012 5:45:18 AM PST by LifeComesFirst (http://rw-rebirth.blogspot.com/)
[ Post Reply | Private Reply | To 11 | View Replies]

To: LifeComesFirst
How can my critique baseless when it included specific real world examples in it? Android, an open source Linux based OS has been hit by malware attacks already. The need for anitivirus programs is being suggested by industry pundits.

Narrowing the discussion to only enterprise versions does not include the whole open source world. Having worked in the enterprise server industry for 25 years, I am well aware of where enterprise Linux is and how long it took to get there.

The premise I was addressing was the assertion that open source in and of itself creates more secure solutions. And his reference point was the personal desktop, not the enterprise server. If he must buy one of the enterprise Linux solutions to get the level of security you speak of, the price part of his argument goes out the window.

37 posted on 11/27/2012 6:32:05 AM PST by 5thGenTexan
[ Post Reply | Private Reply | To 36 | View Replies]

To: Ernest_at_the_Beach

Yes, where I can. Firewalls/DMZs - that kind of thing.

But - functionally - my employer is a mall, as opposed to a single-purpose business like a law firm. So, while I have just under 300 users, I have 8 primary database systems from different industries. As opposed to Seafirst Bank where we had 1 primary industry database system surrounded by a bunch of secondary systems.

So, I have no flexibility when it comes to software infrastructure.

Which sucks.


38 posted on 11/27/2012 8:27:48 AM PST by Psycho_Bunny (Thought Puzzle: Describe Islam without using the phrase "mental disorder" more than four times.)
[ Post Reply | Private Reply | To 27 | View Replies]

To: 5thGenTexan
Closed Source versus Open Source does not in and of itself make for better security. If that were the case, the discussions about the need for antivirus solutions on mobile devices would be around iOS, but they are not. They are about Android

Actually, the issues with mobile devices has more to do with the security model they implement. From what I've seen, with most of these devices, users are pretty much running as ROOT, which is a big no-no.

Your ideas about market share being such a large factor has been debunked so many times, I think a few FR posters have macros for it.

39 posted on 11/27/2012 8:38:11 AM PST by zeugma (Those of us who work for a living are outnumbered by those who vote for a living.)
[ Post Reply | Private Reply | To 30 | View Replies]

To: zeugma
True. Running as root is a big no-no. So system configuration is a big player in its security. A poorly configured open source system is less secure than a properly configured closed source system. So if security is the issue, the source model is orthogonal.

Your ideas about market share being such a large factor has been debunked so many times, I think a few FR posters have macros for it.

What is an alternative explanation for Android being a bigger target than iOS? If its not market share related, then what? Is Android inferior to iOS?

And if the market share aspect is not a part of why hackers target a given platform, why do so many former hackers who have gone public say it was? Many relish the notoriety they recieved by making the news. None of them got famous hacking Symbian or OS/2.

40 posted on 11/27/2012 10:15:23 AM PST by 5thGenTexan
[ Post Reply | Private Reply | To 39 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-49 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson