This document provides an overview of Free Libre Open Source Software (FLOSS) development. It discusses what FLOSS is, why to use and develop FLOSS, and how FLOSS is developed. FLOSS development is described as an open, collaborative process done within communities internationally. Developers work together decentralizedly using tools like mailing lists, version control systems, and bug trackers. New contributors start by engaging with communities, submitting issues and patches. Community leadership focuses on meritocracy, autonomy, and delegating tasks. Challenges to Cuban participation include internet access and license decisions, but these may be addressed through solutions.
This document discusses several types of computer security risks and methods to reduce risks. It describes common computer crimes like software piracy, hacking, and computer sabotage using malware. It also discusses how these risks affect personal privacy and intellectual property. Finally, it provides recommendations for protecting systems through physical access restrictions, passwords, firewalls, encryption, backups, and RAID technology to safeguard data integrity and availability.
This document discusses computer security risks. It defines computer security risks as events that could cause loss or damage to computer systems. It identifies several types of security risks, including internet and network attacks like malware, botnets, denial of service attacks and spoofing. It also discusses unauthorized access and use, hardware and software theft, information theft, and system failures. Malware types like viruses, worms, Trojan horses, rootkits, and spyware are explained in detail.
This document provides an agenda and information for an IT training session on security. The agenda includes covering Track-It, a tech blog, passwords, viruses, Trojan horses, worms, and spam. Details are given on properly using Track-It to log issues. Network security is discussed, including creating strong passwords and types of malware like viruses, Trojan horses, and worms. The training recommends keeping anti-virus software up-to-date and cautions against opening suspicious email attachments.
This document discusses various computer security risks and safeguards. It describes seven categories of cyber criminals including hackers, crackers, and cyber terrorists. It then covers specific risks such as computer viruses, denial of service attacks, and information theft. The document provides examples of safeguards against these risks, including antivirus software, firewalls, encryption, backups, and physical security measures.
The document defines various computer security and privacy terms and discusses risks and safeguards. It describes computer crimes like hacking, cracking, and cybercrimes. It also explains different types of attacks like viruses, worms, Trojan horses, botnets, denial of service attacks, back doors, and spoofing. Finally, it discusses safeguards against these threats like firewalls, antivirus software, access controls, encryption, backups, and physical security measures.
F. Questier, Computer security, workshop for Lib@web international training program 'Management of Electronic Information and Digital Libraries', university of Antwerp, October 2015
This document provides an overview of computer security. It discusses why security is needed to protect vital information and resources and authenticate users. Various security threats are described like viruses, hacking, and network attacks like eavesdropping. Different types of security are defined, including computer, network, and internet security. Common security attacks are outlined that target availability, confidentiality, integrity, and authenticity. The document also covers basic security concepts and terminology, cryptography techniques, and methods of defense.
Computer security is important to protect computing systems and data. There are various security threats like passive and active attacks, malicious software, and natural disasters. Passive attacks obtain information without altering data, while active attacks try to modify systems. Malicious software like viruses, worms, and Trojan horses can corrupt or delete data. Viruses attach to other programs to spread. Worms replicate across networks to consume resources. Trojan horses masquerade as useful programs to cause harm. Physical security threats also exist from disasters or theft.
This document discusses several types of computer security risks and methods to reduce risks. It describes common computer crimes like software piracy, hacking, and computer sabotage using malware. It also discusses how these risks affect personal privacy and intellectual property. Finally, it provides recommendations for protecting systems through physical access restrictions, passwords, firewalls, encryption, backups, and RAID technology to safeguard data integrity and availability.
This document discusses computer security risks. It defines computer security risks as events that could cause loss or damage to computer systems. It identifies several types of security risks, including internet and network attacks like malware, botnets, denial of service attacks and spoofing. It also discusses unauthorized access and use, hardware and software theft, information theft, and system failures. Malware types like viruses, worms, Trojan horses, rootkits, and spyware are explained in detail.
This document provides an agenda and information for an IT training session on security. The agenda includes covering Track-It, a tech blog, passwords, viruses, Trojan horses, worms, and spam. Details are given on properly using Track-It to log issues. Network security is discussed, including creating strong passwords and types of malware like viruses, Trojan horses, and worms. The training recommends keeping anti-virus software up-to-date and cautions against opening suspicious email attachments.
This document discusses various computer security risks and safeguards. It describes seven categories of cyber criminals including hackers, crackers, and cyber terrorists. It then covers specific risks such as computer viruses, denial of service attacks, and information theft. The document provides examples of safeguards against these risks, including antivirus software, firewalls, encryption, backups, and physical security measures.
The document defines various computer security and privacy terms and discusses risks and safeguards. It describes computer crimes like hacking, cracking, and cybercrimes. It also explains different types of attacks like viruses, worms, Trojan horses, botnets, denial of service attacks, back doors, and spoofing. Finally, it discusses safeguards against these threats like firewalls, antivirus software, access controls, encryption, backups, and physical security measures.
F. Questier, Computer security, workshop for Lib@web international training program 'Management of Electronic Information and Digital Libraries', university of Antwerp, October 2015
This document provides an overview of computer security. It discusses why security is needed to protect vital information and resources and authenticate users. Various security threats are described like viruses, hacking, and network attacks like eavesdropping. Different types of security are defined, including computer, network, and internet security. Common security attacks are outlined that target availability, confidentiality, integrity, and authenticity. The document also covers basic security concepts and terminology, cryptography techniques, and methods of defense.
Computer security is important to protect computing systems and data. There are various security threats like passive and active attacks, malicious software, and natural disasters. Passive attacks obtain information without altering data, while active attacks try to modify systems. Malicious software like viruses, worms, and Trojan horses can corrupt or delete data. Viruses attach to other programs to spread. Worms replicate across networks to consume resources. Trojan horses masquerade as useful programs to cause harm. Physical security threats also exist from disasters or theft.
The document discusses various topics related to computer security including definitions of computer security, cyber security, and IT security. It defines key concepts like confidentiality, integrity, and availability. It also defines common security threats like unauthorized access, hackers, vulnerabilities, and attacks. It discusses security measures like antivirus software, firewalls, and provides examples of computer crimes and viruses.
Computer security threats & prevention,Its a proper introduction about computer security and threats and prevention with reference. Have info about threats and their prevention.
This document discusses various computer security risks and precautions users can take. It defines different types of threats like hackers, crackers, and cybercriminals. It also explains different attacks like cyberterrorism and how viruses can spread. The document recommends precautions like not opening unexpected email attachments, using antivirus software, and updating signatures regularly to help safeguard against malware infections.
This document discusses basic concepts in computer security. It defines computer security as techniques for ensuring data cannot be read or compromised without authorization, usually through encryption and passwords. The three main goals of computer security are confidentiality, integrity, and availability. Vulnerabilities are weaknesses that can be exploited, and threats are circumstances with potential to cause harm. Common threats include interception, interruption, modification, and fabrication. Controls are protective measures used to reduce vulnerabilities, and physical security and security methods like antivirus software and firewalls can help secure computers.
This document is a project report submitted by Deeptika Soni on threats to computers. It discusses various types of threats like viruses, worms, hackers and their symptoms. It outlines system requirements and provides an index with sections on virus components, how threats are noticed, suggestions to prevent threats, and conclusions. The report references hardware and software vulnerabilities that can be exploited by interceptions, interruptions, modifications and fabrications. It notes threats involve theft, destruction or unauthorized access and tampering with computer assets.
Software theft involves illegally copying or distributing copyrighted software. There are four main types of software theft: [1] physically stealing software media or hardware, [2] disgruntled employees deleting programs from company computers, [3] widespread piracy of software manufacturers' products, and [4] obtaining registration codes illegally without purchase. To prevent software theft, owners should secure original materials, users should backup regularly, companies should escort terminated employees, and software companies enforce license agreements limiting legal use.
This document discusses computer security risks. It defines computer security risks as events that could cause loss or damage to computer systems. It then identifies and describes various types of security risks like internet and network attacks (e.g. malware, botnets, denial of service attacks), unauthorized access, hardware and software theft, information theft, and system failures. Specific malware types are also defined, including viruses, worms, Trojan horses, rootkits, and spyware.
The document discusses various topics relating to computer security, including:
1) Computer security risks such as hackers, crackers, and cybercrimes are described as well as ways to safeguard against internet and network attacks like viruses, worms, and Trojan horses.
2) Internet and network attacks are discussed along with symptoms of an infected computer. Precautions are presented to protect devices from malicious infections.
3) Techniques for preventing unauthorized computer access and use are covered, including firewalls, intrusion detection software, and honeypots. Encryption is explained as an important safeguard.
definition: types of security,media stories,goals of computer security,security basics,some of types attack,network attacks,web attacks,os,application and software are attacks,social engineering:network attacks ,packet sniffing,main in the middle,dns hacking......conclusion
Threats and Security Tips of Computer SystemFaruk_Hossen
This document summarizes various threats to computer systems and security tips. It discusses errors and accidents such as people errors, procedural errors, software errors, and electromechanical problems. It also covers natural hazards, crimes against IT like theft of hardware/software/information, crimes using IT, and computer viruses. The document provides tips on password security, personal firewalls, anti-virus software, avoiding installing bad applications, backing up data, and access controls/encryption. It concludes with a discussion on ethical issues in computing.
This document discusses various topics related to computer security including risks, attacks, safeguards, and ethics. It describes common security threats like viruses, hacking, denial of service attacks, and information theft. It also outlines methods to identify users, protect against threats, and investigate security incidents through digital forensics. Safeguards include firewalls, antivirus software, encryption, and physical access controls.
Security involves protecting computer resources from unauthorized access and natural disasters. It defines users' rights to keep personal data private. Most data damage is caused by errors and omissions, so organizations need accurate data for transactions, services, and decisions. Proper security controls are needed to prevent dishonest programmers from easily modifying software or stealing data. Security also addresses risks from misuse of computer resources, fires, floods and other natural disasters.
3 Most Common Threats Of Information SecurityAna Meskovska
The document discusses the most common threats to information security, including malware, email threats, spam, social engineering (phishing), and the top 10 internet threats. It provides details on each threat such as possible consequences and recommended protections. Some key threats mentioned are viruses, worms, Trojan horses, spyware, phishing scams seeking personal/financial information, and social engineering attacks. The document stresses the importance of user education, strong passwords/authentication, antivirus software, and caution when sharing information or opening email attachments.
This document discusses various security threats to computers and networks such as viruses, worms, Trojan horses, spyware, malware, spam, and hackers/crackers. It provides details on what each threat is and how it can harm users. The document also recommends using antivirus tools, backing up important data, and following security best practices like not sharing passwords or downloading files from unknown sources to help maintain computer security.
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
Computer viruses, worms, Trojan horses, spyware, and other malware can harm computer systems in various ways. Anti-virus software, firewalls, and other security measures help protect against malware threats. Digital certificates, digital signatures, strong passwords also help secure computer systems and networks from unauthorized access.
Computer , Internet and physical security.Ankur Kumar
It refers to protection of a computer and the information stored in it, from the unauthorised users.
Computer security is a branch of computer technology known as information security as applied to computers and networks.
How To Learn The Network Security
Slide berikut merupakan slide yang berisikan dasar-dasar bagi kita dalam memahami konsep keamanan jaringan komputer, baik dari sisi inftrastruktur, teknologi dan paradigma bagi pengguna.
Materi yang diberikan sudah disusun oleh Pakar yang merupakan Trainer CEH dan memang berkompeten dibidang keamanan jaringan.
Slide ini saya dapatkan dari beliau saat mengikut training Certified Computer Security Officer (CCSO) dan Certified Computer Security Analyst (CCSA) dari beliau.
Semoga bermanfaat sebagai acuan bagi kita untuk belajar tentang keamanan jaringan komputer.
Terimakasih
Free Libre Open Source Software - Business aspects of software industryFrederik Questier
F. Questier, Free Libre Open Source Software - Guest Lecture for the course Business Aspects of Software Industry of Prof. M. Goldchstein and Prof. T. Crispeels, with students from management science, computer science and civil engineering, Vrije Universiteit Brussel (17/04/13)
Free Libre Open Source Software - Business Aspects of Software IndustryFrederik Questier
This document provides an overview of a presentation about free libre open source software (FLOSS). The presentation discusses the ethics of software freedom, different software and development models, and various business models for FLOSS. It provides examples of successful FLOSS projects like Linux, Firefox, OpenOffice, Drupal, and others. The presentation addresses why FLOSS is not used more widely and argues that its total cost of ownership can be lower than closed source software.
The document discusses various topics related to computer security including definitions of computer security, cyber security, and IT security. It defines key concepts like confidentiality, integrity, and availability. It also defines common security threats like unauthorized access, hackers, vulnerabilities, and attacks. It discusses security measures like antivirus software, firewalls, and provides examples of computer crimes and viruses.
Computer security threats & prevention,Its a proper introduction about computer security and threats and prevention with reference. Have info about threats and their prevention.
This document discusses various computer security risks and precautions users can take. It defines different types of threats like hackers, crackers, and cybercriminals. It also explains different attacks like cyberterrorism and how viruses can spread. The document recommends precautions like not opening unexpected email attachments, using antivirus software, and updating signatures regularly to help safeguard against malware infections.
This document discusses basic concepts in computer security. It defines computer security as techniques for ensuring data cannot be read or compromised without authorization, usually through encryption and passwords. The three main goals of computer security are confidentiality, integrity, and availability. Vulnerabilities are weaknesses that can be exploited, and threats are circumstances with potential to cause harm. Common threats include interception, interruption, modification, and fabrication. Controls are protective measures used to reduce vulnerabilities, and physical security and security methods like antivirus software and firewalls can help secure computers.
This document is a project report submitted by Deeptika Soni on threats to computers. It discusses various types of threats like viruses, worms, hackers and their symptoms. It outlines system requirements and provides an index with sections on virus components, how threats are noticed, suggestions to prevent threats, and conclusions. The report references hardware and software vulnerabilities that can be exploited by interceptions, interruptions, modifications and fabrications. It notes threats involve theft, destruction or unauthorized access and tampering with computer assets.
Software theft involves illegally copying or distributing copyrighted software. There are four main types of software theft: [1] physically stealing software media or hardware, [2] disgruntled employees deleting programs from company computers, [3] widespread piracy of software manufacturers' products, and [4] obtaining registration codes illegally without purchase. To prevent software theft, owners should secure original materials, users should backup regularly, companies should escort terminated employees, and software companies enforce license agreements limiting legal use.
This document discusses computer security risks. It defines computer security risks as events that could cause loss or damage to computer systems. It then identifies and describes various types of security risks like internet and network attacks (e.g. malware, botnets, denial of service attacks), unauthorized access, hardware and software theft, information theft, and system failures. Specific malware types are also defined, including viruses, worms, Trojan horses, rootkits, and spyware.
The document discusses various topics relating to computer security, including:
1) Computer security risks such as hackers, crackers, and cybercrimes are described as well as ways to safeguard against internet and network attacks like viruses, worms, and Trojan horses.
2) Internet and network attacks are discussed along with symptoms of an infected computer. Precautions are presented to protect devices from malicious infections.
3) Techniques for preventing unauthorized computer access and use are covered, including firewalls, intrusion detection software, and honeypots. Encryption is explained as an important safeguard.
definition: types of security,media stories,goals of computer security,security basics,some of types attack,network attacks,web attacks,os,application and software are attacks,social engineering:network attacks ,packet sniffing,main in the middle,dns hacking......conclusion
Threats and Security Tips of Computer SystemFaruk_Hossen
This document summarizes various threats to computer systems and security tips. It discusses errors and accidents such as people errors, procedural errors, software errors, and electromechanical problems. It also covers natural hazards, crimes against IT like theft of hardware/software/information, crimes using IT, and computer viruses. The document provides tips on password security, personal firewalls, anti-virus software, avoiding installing bad applications, backing up data, and access controls/encryption. It concludes with a discussion on ethical issues in computing.
This document discusses various topics related to computer security including risks, attacks, safeguards, and ethics. It describes common security threats like viruses, hacking, denial of service attacks, and information theft. It also outlines methods to identify users, protect against threats, and investigate security incidents through digital forensics. Safeguards include firewalls, antivirus software, encryption, and physical access controls.
Security involves protecting computer resources from unauthorized access and natural disasters. It defines users' rights to keep personal data private. Most data damage is caused by errors and omissions, so organizations need accurate data for transactions, services, and decisions. Proper security controls are needed to prevent dishonest programmers from easily modifying software or stealing data. Security also addresses risks from misuse of computer resources, fires, floods and other natural disasters.
3 Most Common Threats Of Information SecurityAna Meskovska
The document discusses the most common threats to information security, including malware, email threats, spam, social engineering (phishing), and the top 10 internet threats. It provides details on each threat such as possible consequences and recommended protections. Some key threats mentioned are viruses, worms, Trojan horses, spyware, phishing scams seeking personal/financial information, and social engineering attacks. The document stresses the importance of user education, strong passwords/authentication, antivirus software, and caution when sharing information or opening email attachments.
This document discusses various security threats to computers and networks such as viruses, worms, Trojan horses, spyware, malware, spam, and hackers/crackers. It provides details on what each threat is and how it can harm users. The document also recommends using antivirus tools, backing up important data, and following security best practices like not sharing passwords or downloading files from unknown sources to help maintain computer security.
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
Computer viruses, worms, Trojan horses, spyware, and other malware can harm computer systems in various ways. Anti-virus software, firewalls, and other security measures help protect against malware threats. Digital certificates, digital signatures, strong passwords also help secure computer systems and networks from unauthorized access.
Computer , Internet and physical security.Ankur Kumar
It refers to protection of a computer and the information stored in it, from the unauthorised users.
Computer security is a branch of computer technology known as information security as applied to computers and networks.
How To Learn The Network Security
Slide berikut merupakan slide yang berisikan dasar-dasar bagi kita dalam memahami konsep keamanan jaringan komputer, baik dari sisi inftrastruktur, teknologi dan paradigma bagi pengguna.
Materi yang diberikan sudah disusun oleh Pakar yang merupakan Trainer CEH dan memang berkompeten dibidang keamanan jaringan.
Slide ini saya dapatkan dari beliau saat mengikut training Certified Computer Security Officer (CCSO) dan Certified Computer Security Analyst (CCSA) dari beliau.
Semoga bermanfaat sebagai acuan bagi kita untuk belajar tentang keamanan jaringan komputer.
Terimakasih
Free Libre Open Source Software - Business aspects of software industryFrederik Questier
F. Questier, Free Libre Open Source Software - Guest Lecture for the course Business Aspects of Software Industry of Prof. M. Goldchstein and Prof. T. Crispeels, with students from management science, computer science and civil engineering, Vrije Universiteit Brussel (17/04/13)
Free Libre Open Source Software - Business Aspects of Software IndustryFrederik Questier
This document provides an overview of a presentation about free libre open source software (FLOSS). The presentation discusses the ethics of software freedom, different software and development models, and various business models for FLOSS. It provides examples of successful FLOSS projects like Linux, Firefox, OpenOffice, Drupal, and others. The presentation addresses why FLOSS is not used more widely and argues that its total cost of ownership can be lower than closed source software.
This document provides an overview of free and open source software (FOSS). It discusses the history of software sharing and development, the rise of proprietary software, and the free software movement started by Richard Stallman. FOSS tools like Linux have seen widespread adoption and now dominate areas like web servers and supercomputing. The document examines motivations for using FOSS such as cost savings, security, and avoiding vendor lock-in. It also discusses the competitive advantages that FOSS provides for both individuals and institutions.
This presentation discusses Free and Open Source Software (FOSS). It begins with a brief history of software development and the early days of sharing source code. It then covers the definitions of free software, open source software, and different software licenses. Examples are given of the success and widespread adoption of Linux and open source browsers and office suites. Strategies for effective use of FOSS in academic environments are discussed, along with open content and OER. Reasons why individuals and institutions should use FOSS include control, security, avoidance of lock-in, cross-platform use, fun and learning, involvement of students, and reduced costs. The presentation concludes by discussing business opportunities involving FOSS.
The document discusses the history and development of free and open source software (FOSS). It describes how early software was freely shared among academic institutions and companies. Richard Stallman founded the GNU project in 1983 to develop free software and started the free software movement. Linux, developed by Linus Torvalds, expanded interest in FOSS using an open "bazaar" development model. Eric Raymond's 1997 essay promoted this decentralized model and helped popularize Linux. The document also outlines India's support for FOSS through initiatives like the National Resource Center for Free and Open Source Software.
The presentation contains some basic history of foss and it discuses cathedral vs bazaar model.
At last it discuses some current foss developments in india. Feel free to download and share and modify to make it more useful for everyone.
The document discusses the benefits of adopting open source software in educational institutions. It outlines the history and development of open source software. Key benefits mentioned include cost savings, ability to modify code, and collaborative nature which allows sharing knowledge. The conclusion recommends the school system adopt open source software for academic and financial reasons.
All About Open Source | Software Freedom | HacktoberfestMala Deep Upadhaya
Hacktoberfest is a month-long celebration of open source software and opens to everyone in our global community. Whether you’re a computer enthusiast, developer, student learning to code, company of any size, you can help drive the growth of open source and make positive contributions to an ever-growing community of great impact: Open-source.
This slide is for a beginner who wants to understand what Open Source, Free Software, FOSS and Hacktoberfest are.
This document provides an overview of open source software and its adoption in education. It discusses the history and key people involved in open source software development like Richard Stallman and Linus Torvalds. The document argues that open source software provides benefits to education like cost savings, collaboration, and allowing older hardware to run new software. It recommends that schools adopt open source software for academic and financial reasons.
This document discusses openness and open source principles. It provides examples of how O'Reilly Media has helped spread knowledge about new technologies. It discusses key open source concepts like free software, the Cathedral and the Bazaar development model, and the architecture of participation enabled by Unix and the Internet. It argues that to be successful, online education should embrace open source principles like using commodity components, providing customization, developing in public, and having an architecture that allows community participation.
A Roadmap for Students Using FOSS (Free and Open Source Software) and Reachin...PK Mishra
The document provides a roadmap for students to leverage free and open source software (FOSS) to become self-reliant. It discusses how FOSS like Linux can provide cost-effective alternatives to proprietary software. The roadmap suggests students learn programming, databases, and analytics skills in languages like C/C++, Java, Python and tools like MySQL and R. It also recommends areas like app development, Raspberry Pi, and data analytics for students to explore. Universities are urged to train faculty and incubate ideas to realize the goals of an self-reliant India by leveraging open source software and fostering entrepreneurship.
The Development of Open Source E-Learning Environments: the Chamilo ExperienceFrederik Questier
F. Questier, The development of Open Source e-learning environments: the Chamilo experience, guest lecture at Beijing Normal University, School of Educational Technology, Beijing, China, 21/10/2010
1) Open source software has been widely adopted in education due to the many free applications and cost savings that can be applied to other areas.
2) Key attributes of open source software that have helped drive adoption include unrestricted distribution, availability of source code, ability for modifications, and lack of licensing fees.
3) Open source software is now used by many learners around the world and its use is expected to continue expanding.
This document discusses open source software and its use and benefits in education. It provides a brief history of open source software from the 1960s to present. It describes how open source software allows for free collaboration and modification. The document also notes that open source software saves money, works on older hardware, and addresses security issues through open source codes. Popular open source products mentioned include Mozilla Firefox, Apache HTTP Server, Linux operating system, and GNU.
Open source software promotes quality and reliability through independent peer review and rapid code evolution. It has become pervasive as computers have become more of a commodity. While patents protect new inventions, open source relies on collaborative development by groups like Linux organizations. Main players include non-profit enthusiasts, for-profit support companies, and new open source capitalists at firms like IBM and HP. Open source faces challenges from lack of business applications and home use, but projects aim to solve such issues while new users may be more accepting. The growth of open source is inevitable but managerial ignorance benefits monopolists; overcoming this can accelerate appropriate industry acceptance.
Similar a Free Libre Open Source Software Development (20)
F. Questier, Ressources éducatives libres & droits d’auteurs, presented in the e-formation “Réussir l’enseignement à distance : de la scénarisation à l’évaluation” de l’Erasmus Academy, 1st of July 2020
This document summarizes a presentation on plagiarism prevention and detection. It defines plagiarism as using another's work without attribution. While not a legal crime, plagiarism is considered an academic offense. Both prevention through education and detection methods have limitations. Detection tools can be fooled and incorrectly flag original work. The best prevention strategies involve thorough education of students about proper citation and encouraging writing practices that promote original thought. Overall the presentation argues for focusing on prevention over problematic detection approaches.
This presentation discusses strategies and policies for promoting free/libre and open source software (FLOSS) in research and education. It provides a brief history of FLOSS, outlines reasons to use and develop FLOSS, and describes perceived barriers to adoption. It also summarizes a study on FLOSS knowledge, perceptions and adoption in Flemish schools, which developed a conceptual model of acceptance factors. The presentation concludes with recommendations for FLOSS policies and strategies for institutional migrations to FLOSS.
Here are some ways I would optimize the backup strategy:
- Only back up data directories instead of entire hard disks to reduce backup size and time.
- Stagger backups throughout the night instead of all at once to avoid overloading the network.
- Store backups offsite as well as on the NAS for disaster recovery in case the onsite storage is damaged.
- Consider cloud backup services for additional offsite storage.
- Encrypt backups for security and confidentiality.
- Test restores periodically to validate backups are working properly.
- Consider versioning backups to allow restoration of previous file versions.
- Automate verification of backups to catch any failures or corrupt backups.
- Review
Cite as: F. Questier, Open learning, Experiences from the MarMOOC project, Presented at University of Hasselt, Belgium, August 2018, VLIR-UOS international workshop interoperability between information platforms.
Authentication options for Open edX: focus on OAuth and OpenIDFrederik Questier
F. Questier, Authentication options for Open edX: focus on OAuth and OpenID, presentation for the Erasmus+ MarMOOC project, Universidade de Vigo, Spain, 04/04/2018
F. Questier, MOOCs & Openness. Les aspects ouverts des MOOC: clé pour un processus d'apprentissage réussi. Présenté à Université Ibn Tofaïl, Kénitra, Maroc, Avril 2017; Presented at Universidad de Vigo, May 2017
This document discusses new learning paradigms and technologies that can improve education. It suggests universities should change how they educate students to better prepare them for an unknown future with rapid technological changes. Modern teaching approaches are more student-centered, collaborative, and focus on developing skills for lifelong learning compared to traditional teaching. Educational technologies can augment teaching by supporting complex, contextualized learning activities. The document outlines strategies universities can take to promote educational innovation, such as establishing an innovation center, formalizing collaboration between faculties, and developing an educational vision.
Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...Frederik Questier
A. Lemus, F. Questier, F. Ciudad, Free Libre and Open Source Software Acceptance in the Cuban Higher Educational System, Tenth International Congress on Higher Education, Universidad 2016, Cuba.
Students' Experiential Knowledge Production in the Teaching-Learning Process ...Frederik Questier
D. Benítez-Erice, F. Questier, D. Pérez-Luján, Students Experiential Knowledge Production in the Teaching-Learning Process of Universities, Proceedings of 16th European Conference on Knowledge Management, ECKM 2015, pp. 132-14, ISBN 978-1-910810-47-7
Institutional strategies for educational innovation and e-learningFrederik Questier
This presentation discusses strategies for educational innovation and e-learning at Jimma University in Ethiopia. It recommends establishing an educational innovation center to provide resources and training to teaching staff. It also suggests formalizing contact with each faculty through an educational innovation committee and collaborating with educational researchers. Performing needs analyses of teachers and disseminating best practices are also presented as ways to support the adoption of innovative teaching methods using information and communication technologies.
This presentation discusses new learning paradigms and technologies. It begins by noting that the future is unpredictable and students today may not realize how much their professional lives will change. It then discusses trends like the technological singularity, increasing connectivity through devices and the internet of things, and how information abundance has replaced scarcity. The presentation advocates preparing students for this unknown future by focusing on skills like social skills, creativity, and lifelong learning rather than only transmitting knowledge. It also promotes active, collaborative, and constructionist approaches to learning over passive absorption of knowledge.
Challenges for 21st century education and blended learningFrederik Questier
F. Questier, Challenges for 21st century education and blended learning; Lecture for Masterclass professionele ontwerpteams, Associatie KU Leuven, 12/02/15 https://associatie.kuleuven.be/events/mcpot/programma
F. Questier, (Disruptive) innovations: education and society, lecture for Chinese Summerschool 'European languages, culture and educational systems', Vrije Universiteit Brussel, 07/07/2014
ICT-Competenties ethische kwesties en relatie met onderzoekscompetentiesFrederik Questier
F. Questier, ICT-Competenties: ethische kwesties en relatie met onderzoekscompetenties, presentation at IDLO studie en ontmoetingsdag 12/03/2014, Brussels
How Can Hiring A Mobile App Development Company Help Your Business Grow?ToXSL Technologies
ToXSL Technologies is an award-winning Mobile App Development Company in Dubai that helps businesses reshape their digital possibilities with custom app services. As a top app development company in Dubai, we offer highly engaging iOS & Android app solutions. https://rb.gy/necdnt
DevOps Consulting Company | Hire DevOps Servicesseospiralmantra
Spiral Mantra excels in providing comprehensive DevOps services, including Azure and AWS DevOps solutions. As a top DevOps consulting company, we offer controlled services, cloud DevOps, and expert consulting nationwide, including Houston and New York. Our skilled DevOps engineers ensure seamless integration and optimized operations for your business. Choose Spiral Mantra for superior DevOps services.
https://www.spiralmantra.com/devops/
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid
IBM watsonx Code Assistant for Z, our latest Generative AI-assisted mainframe application modernization solution. Mainframe (IBM Z) application modernization is a topic that every mainframe client is addressing to various degrees today, driven largely from digital transformation. With generative AI comes the opportunity to reimagine the mainframe application modernization experience. Infusing generative AI will enable speed and trust, help de-risk, and lower total costs associated with heavy-lifting application modernization initiatives. This document provides an overview of the IBM watsonx Code Assistant for Z which uses the power of generative AI to make it easier for developers to selectively modernize COBOL business services while maintaining mainframe qualities of service.
Photoshop Tutorial for Beginners (2024 Edition)alowpalsadig
Photoshop Tutorial for Beginners (2024 Edition)
Explore the evolution of programming and software development and design in 2024. Discover emerging trends shaping the future of coding in our insightful analysis."
Here's an overview:Introduction: The Evolution of Programming and Software DevelopmentThe Rise of Artificial Intelligence and Machine Learning in CodingAdopting Low-Code and No-Code PlatformsQuantum Computing: Entering the Software Development MainstreamIntegration of DevOps with Machine Learning: MLOpsAdvancements in Cybersecurity PracticesThe Growth of Edge ComputingEmerging Programming Languages and FrameworksSoftware Development Ethics and AI RegulationSustainability in Software EngineeringThe Future Workforce: Remote and Distributed TeamsConclusion: Adapting to the Changing Software Development LandscapeIntroduction: The Evolution of Programming and Software Development
Photoshop Tutorial for Beginners (2024 Edition)Explore the evolution of programming and software development and design in 2024. Discover emerging trends shaping the future of coding in our insightful analysis."Here's an overview:Introduction: The Evolution of Programming and Software DevelopmentThe Rise of Artificial Intelligence and Machine Learning in CodingAdopting Low-Code and No-Code PlatformsQuantum Computing: Entering the Software Development MainstreamIntegration of DevOps with Machine Learning: MLOpsAdvancements in Cybersecurity PracticesThe Growth of Edge ComputingEmerging Programming Languages and FrameworksSoftware Development Ethics and AI RegulationSustainability in Software EngineeringThe Future Workforce: Remote and Distributed TeamsConclusion: Adapting to the Changing Software Development LandscapeIntroduction: The Evolution of Programming and Software Development
The importance of developing and designing programming in 2024
Programming design and development represents a vital step in keeping pace with technological advancements and meeting ever-changing market needs. This course is intended for anyone who wants to understand the fundamental importance of software development and design, whether you are a beginner or a professional seeking to update your knowledge.
Course objectives:
1. **Learn about the basics of software development:
- Understanding software development processes and tools.
- Identify the role of programmers and designers in software projects.
2. Understanding the software design process:
- Learn about the principles of good software design.
- Discussing common design patterns such as Object-Oriented Design.
3. The importance of user experience (UX) in modern software:
- Explore how user experience can improve software acceptance and usability.
- Tools and techniques to analyze and improve user experience.
4. Increase efficiency and productivity through modern development tools:
- Access to the latest programming tools and languages used in the industry.
- Study live examples of applications
A neural network is a machine learning program, or model, that makes decisions in a manner similar to the human brain, by using processes that mimic the way biological neurons work together to identify phenomena, weigh options and arrive at conclusions.
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...Luigi Fugaro
Vector databases are transforming how we handle data, allowing us to search through text, images, and audio by converting them into vectors. Today, we'll dive into the basics of this exciting technology and discuss its potential to revolutionize our next-generation AI applications. We'll examine typical uses for these databases and the essential tools
developers need. Plus, we'll zoom in on the advanced capabilities of vector search and semantic caching in Java, showcasing these through a live demo with Redis libraries. Get ready to see how these powerful tools can change the game!
Transforming Product Development using OnePlan To Boost Efficiency and Innova...OnePlan Solutions
Ready to overcome challenges and drive innovation in your organization? Join us in our upcoming webinar where we discuss how to combat resource limitations, scope creep, and the difficulties of aligning your projects with strategic goals. Discover how OnePlan can revolutionize your product development processes, helping your team to innovate faster, manage resources more effectively, and deliver exceptional results.
Alluxio Webinar | 10x Faster Trino Queries on Your Data PlatformAlluxio, Inc.
Alluxio Webinar
June. 18, 2024
For more Alluxio Events: https://www.alluxio.io/events/
Speaker:
- Jianjian Xie (Staff Software Engineer, Alluxio)
As Trino users increasingly rely on cloud object storage for retrieving data, speed and cloud cost have become major challenges. The separation of compute and storage creates latency challenges when querying datasets; scanning data between storage and compute tiers becomes I/O bound. On the other hand, cloud API costs related to GET/LIST operations and cross-region data transfer add up quickly.
The newly introduced Trino file system cache by Alluxio aims to overcome the above challenges. In this session, Jianjian will dive into Trino data caching strategies, the latest test results, and discuss the multi-level caching architecture. This architecture makes Trino 10x faster for data lakes of any scale, from GB to EB.
What you will learn:
- Challenges relating to the speed and costs of running Trino in the cloud
- The new Trino file system cache feature overview, including the latest development status and test results
- A multi-level cache framework for maximized speed, including Trino file system cache and Alluxio distributed cache
- Real-world cases, including a large online payment firm and a top ridesharing company
- The future roadmap of Trino file system cache and Trino-Alluxio integration
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...XfilesPro
Wondering how X-Sign gained popularity in a quick time span? This eSign functionality of XfilesPro DocuPrime has many advancements to offer for Salesforce users. Explore them now!
Liberarsi dai framework con i Web Component.pptxMassimo Artizzu
In Italian
Presentazione sulle feature e l'utilizzo dei Web Component nell sviluppo di pagine e applicazioni web. Racconto delle ragioni storiche dell'avvento dei Web Component. Evidenziazione dei vantaggi e delle sfide poste, indicazione delle best practices, con particolare accento sulla possibilità di usare web component per facilitare la migrazione delle proprie applicazioni verso nuovi stack tecnologici.
The Comprehensive Guide to Validating Audio-Visual Performances.pdfkalichargn70th171
Ensuring the optimal performance of your audio-visual (AV) equipment is crucial for delivering exceptional experiences. AV performance validation is a critical process that verifies the quality and functionality of your AV setup. Whether you're a content creator, a business conducting webinars, or a homeowner creating a home theater, validating your AV performance is essential.
8 Best Automated Android App Testing Tool and Framework in 2024.pdfkalichargn70th171
Regarding mobile operating systems, two major players dominate our thoughts: Android and iPhone. With Android leading the market, software development companies are focused on delivering apps compatible with this OS. Ensuring an app's functionality across various Android devices, OS versions, and hardware specifications is critical, making Android app testing essential.
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...The Third Creative Media
"Navigating Invideo: A Comprehensive Guide" is an essential resource for anyone looking to master Invideo, an AI-powered video creation tool. This guide provides step-by-step instructions, helpful tips, and comparisons with other AI video creators. Whether you're a beginner or an experienced video editor, you'll find valuable insights to enhance your video projects and bring your creative ideas to life.
Mobile App Development Company In Noida | Drona InfotechDrona Infotech
React.js, a JavaScript library developed by Facebook, has gained immense popularity for building user interfaces, especially for single-page applications. Over the years, React has evolved and expanded its capabilities, becoming a preferred choice for mobile app development. This article will explore why React.js is an excellent choice for the Best Mobile App development company in Noida.
Visit Us For Information: https://www.linkedin.com/pulse/what-makes-reactjs-stand-out-mobile-app-development-rajesh-rai-pihvf/
Manyata Tech Park Bangalore_ Infrastructure, Facilities and Morenarinav14
Located in the bustling city of Bangalore, Manyata Tech Park stands as one of India’s largest and most prominent tech parks, playing a pivotal role in shaping the city’s reputation as the Silicon Valley of India. Established to cater to the burgeoning IT and technology sectors
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Free Libre Open Source Software Development
1. FLOSS
Free Libre Open Source Software
Development
Prof. dr. Frederik Questier - Vrije Universiteit Brussel
Presented for Cuba ELINF project april 2021
2.
3. 9
FLOSS development
workshops
I. What is FLOSS?
II. Why use FLOSS?
III. Why develop FLOSS?
IV. How to develop FLOSS?
Contributing to a FLOSS project
Starting a FLOSS project
4. In the beginning
almost all software was...
➢
produced by academic
& corporate researchers
in collaboration
➢
shared with source code
IBM “SHARE” user group (1955)
Digital Equipment Computer
Users' Society (DECUS, 1961)
Source code: if encrypt(password) == encryptedpassword, then login=1, end
Compiled code: 00100101110101001100110000111101100011000111000110101
5. … until Bill Gates
wrote an Open Letter
to Hobbyists:
“Your sharing is
stealing”
(1976)
6. 18
1986: Stallman defined
“Free Software”
as software with the freedoms to
➢
use
➢
study & modify
➢
share
➢
share modifications
7. The freedom to study & modify
requires access to source code
9. 22
Free software: idealism
Open Source: pragmatism
(almost identical)
software categories
together:
Free Open Source Software (FOSS)
Free Libre Open Source Software (FLOSS)
Spanish: “software libre y codigo abierto”
10. Software categories
➢
Anti-features are features that users don’t want, including:
➢
Copy-protection
➢
DRM = Digital Rights/Restrictions Management
➢
Data lock-in because of secret file formats
➢
Time-limit / Planned obsolescence
➢
Artificial limitations (e.g. limited RAM, HD and max 3 concurrent programs in MS Windows Vista Home)
➢
Advertisements
➢
Tracking / Spyware
11.
12. 1991 comp sci
student
Usenet posting to the
newsgroup
"comp.os.minix.":
“I'm doing a (free)
operating system (just a
hobby, won't be big and
professional like gnu) for
386(486) AT clones.”
14. "Congratulations, you're on the winning team.
Linux has crossed the chasm to mainstream adoption."
➢
Jeffrey Hammond, principal analyst at Forrester Research, LinuxCon, 2010
“Linux has come to dominate almost every category of
computing, with the exception of the desktop”
➢
Jim Zemlin, Linux Foundation Executive Director, 2011
“Linux is the benchmark of Quality”
➢
Coverity Report 2012
20. Free Software Licenses
➢
The 4 freedoms are guaranteed and enforced by licenses
➢
Copyleft licenses
➢
protect the freedoms for everyone
➢
e.g. GNU GPL (General Public License)
➢
Permissive licenses
➢
include the freedom to deny the freedoms for others
➢
e.g BSD (Berkeley Software Distribution)
→BSD code often in non-free closed source software (MS, Mac, ...)
25. Good reasons to
use FLOSS
➢
Stay in control
➢
Stay secure
➢
Avoid data lock in
➢
Avoid vendor lock in
➢
Interoperability
➢
Modularity
➢
Easy localization (including translation) and customization
➢
Most often cross platform
➢
Easier troubleshooting
➢
Sometimes better support
➢
Avoid license management and compliance issues
➢
Reduce costs
➢
Demanded when public funds are given
26. Row 1 Row 2 Row 3 Row 4
0
2
4
6
8
10
12
Column 1
Column 2
Column 3
Our social responsibility:
how open is the future?
27. Stay in control!
If you don't control the program,
the program controls you!
W
hy?
31. ➢
From the European Parliament investigation into the Echelon system (05/18/2001):
“If security is to be taken seriously, only those operating
systems should be used whose source code has been
published and checked, since only then can it be determined
with certainty what happens to the data.”
32. ➢
Cryptographer, computer security expert Bruce Schneier:
“Only bad security relies on secrecy”
“Demand open source code for anything related to security”
34. The (Unix) philosophy of
connectable and reusable
modular components
→ best modules are most reused
→ get most feedback
→ survival of the fittest
→ quality
W
hy?
37. FLOSS tools are
most often cross-platform
CPU architectures supported by
➢
Microsoft Windows
➢
x86, ARM
➢
Linux
➢
Alpha, Blackfin, ARM, Atmel AVR32, Axis Communications' ETRAX
CRIS, Texas Instruments TMS320, 68k, Fujitsu FR-V, Qualcomm
Hexagon, HP PA-RISC, H8, IBM System/390, IBM Z/Architecture, IA-64,
x86, M32R from Mitsubishi, Microblaze from Xilinx, MIPS, MN103 from
Panasonic Corporation, OpenRISC, Power Architecture, SPARC,
UltraSPARC, SuperH, Synopsys DesignWare ARC cores, S+core, Tilera,
Xtensa from Tensilica, UniCore32, ColdFire
W
hy?
41. Sometimes we really need to free ourselves
from corporate brainwashing!
Example:
Don't use personal operating systems
in multi-user environments
W
hy?
46. (K12)LTSP
Linux Terminal Server Project
Networked classrooms
Fat server
runs the applications
Thin clients
visualize the applications
need no hard disk
can be 15 years old PC's
47. Better support
Support is often core
of the FOSS business model
+ fair competition of service providers
Easier troubleshooting
Because of transparency
W
hy?
50. Good reasons to
develop FLOSS
➢
No need to start from scratch
➢
Easy localization and customization
➢
Network effects
➢
Get contributions from others
➢
Steer future developments
➢
Possibility to involve students
➢
Business opportunities
➢
Fun
➢
Learning
➢
Altruism
➢
Self-advertizing
51. 94
"Seven open source business strategies for competitive advantage”
John Koenig, IT Manager's Journal, 2004
“Companies continue to
waste their development
dollars on software
functionality that is
otherwise free and
available through Open
Source. They persist in
buying third-party
proprietary platforms or
creating their own
proprietary development
platforms that deliver
marginal product
differentiation and limited
value to customers”
Picture reproduced with permission
52. 95
Success in FLOSS requires you to serve
➢
those who spend time to save money
➢
those who spend money to save time
-- Mårten Mickos, CEO MySQL
53. Software freedom allows you to tap into
innovation power and network effects
otherwise not available
Mårten Mickos, CEO MySQL
54. Study on the Economic impact of open source software on innovation and the competitiveness of the
Information and Communication Technologies (ICT) sector in the EU, 2006, R.A. Ghosh, UNU-MERIT, NL.
et al., 287 pp.
55. Study on the Economic impact of open source software on innovation and the competitiveness of the
Information and Communication Technologies (ICT) sector in the EU, 2006, R.A. Ghosh, UNU-MERIT, NL.
et al., 287 pp.
56. 102
“Open Source ... it's just a
superior way of working together
and generating code.”
“Like science, Open Source
allows people to build on a solid
base of previous knowledge,
without some silly hiding.”
“you can obviously never do as
well in a closed environment as
you can with open scientific
methods.”
Linus Torvalds (2007-03-19). The Torvalds
Transcript: Why I 'Absolutely Love' GPL Version 2.
57. FLOSS
Free Libre Open Source Software
Development
Part II
Prof. dr. Frederik Questier - Vrije Universiteit Brussel
Presented for Cuba ELINF project april 2021
58. How is FLOSS developed?
➢
Openly
➢
Collaborative in communities
➢
Decentralized
➢
International
➢
With peer review
➢
Mainly by developers who are also users
62. 112
The Cathedral and the Bazaar
about developers
1. Every good work of software
starts by scratching a developer's personal itch.
2. Good programmers know what to write.
Great ones know what to rewrite (and reuse).
63. 113
The Cathedral and the Bazaar
about users
6. Treating your users as co-developers is your least-hassle
route to rapid code improvement and effective debugging.
7. Release early. Release often. And listen to your customers.
8. Given a large enough beta-tester and co-developer base,
almost every problem will be characterized quickly
and the fix obvious to someone.
11. The next best thing to having good ideas is
recognizing good ideas from your users.
Sometimes the latter is better.
64. 114
The Cathedral and the Bazaar
about development
17. A security system is only as secure as its secret.
Beware of pseudo-secrets.
18. To solve an interesting problem,
start by finding a problem that is interesting to you.
19. Provided the development coordinator
has a medium at least as good as the Internet,
and knows how to lead without coercion,
many heads are inevitably better than one.
66. Recommended best practices from the open source development model
From: Ibrahim Haddad, The Open Source Development Model:
Overview, Benefits and Recommendations
http://aaaea.org/Al-muhandes/2008/February/open_src_dev_model.htm
67. How is the software released?
➢
Live repository (mainly for devs)
➢
Nightly builds (mainly for automated testing)
➢
Newest releases
➢
Candidate releases
➢
Stable releases (e.g. every 6M)
➢
Long Term Support releases (e.g. every 2Y)
68. Feature life-cycle in the open source development model
Understanding the Open Source Development Model, 2011, Ibrahim Haddad, Brian Warner, The Linux Foundation
69. Tools used by FLOSS developers
➢
Mailing lists
➢
Wikis
➢
(Distributed) version control systems (Git)
➢
Bug trackers
➢
Task lists
➢
Testing and debugging tools
➢
Package management systems
➢
Web site
➢
Web forum for supporting users
74. Developers?
➢
Grow in their role
➢
Feedback
➢
Bug reports
➢
Feature requests
➢
Patches
➢
Core repository access
➢
Management / leadership roles (meritocracy)
➢
Usually not assigned tasks. Select tasks.
➢
Mix of volunteers and employees of different
organisations
76. How to start participating in a
FLOSS community?
➢
Explore the community
➢
Subscribe to the dev mailing list
➢
Create account for code repository
➢
Grow in your contributions
➢
Feedback
➢
Bug reports
➢
Feature requests
➢
Patches
➢
Core repository access
➢
Management / leadership role (meritocracy)
81. Drupal
Content Management Platform
➢
Powers 2% of websites
➢
USA White House, MTV UK, Sony Music, Al Jazeera, ...
➢
>2900 themes
➢
>30000 modules
➢
121000 active contributors
➢
>1.3M registered users on drupal.org
82.
83. ➢
Commercial Open Source company
➢
Founded 2007
➢
$173 million venture capital
➢
Over $200 million revenue in 2018
➢
3800 enterprise customers
➢
800 employees
➢
Fastest Growing Private Technology Company in North
America, 2013
➢
“A leader for Web Content Management” by the 2014
Gartner Magic Quadrant
84. The general open source system development cycle
Ming-Wei Wu and Ying-Dar Lin. 2001. Open Source Software Development: An Overview.
Computer 34, 6 (June 2001), 33–38. DOI:https://doi.org/10.1109/2.928619
85. Creating a
FLOSS project & community
➢
Build trust
➢
License, quality, documentation, support, …
➢
“Release early, release often”
➢
“Be open to the point of promiscuity”
➢
Users → Contributors → Developers
➢
Community tools
86. Creating a
FLOSS project & community
➢
Community leadership
➢
≠ management
➢
Influence is a matter of merit
➢
Show, don’t tell
➢
Autonomy of everyone
➢
Dare to delegate
87. FLOSS community partipation/creation
Cuban barriers & challenges?
➢
Internet connectivity limitations
➢
Embargo restrictions
➢
Local policies
➢
Autonomy versus local management
➢
License decisions?
➢
Spanish versus English?
➢
Culture & attitudes?
89. Assignment
➢
Search and list
➢
Website
➢
Source code repository
➢
License
➢
Documentation
➢
Communication channels
➢
Bug / feature request
tracking tool
➢
For these projects:
➢
ABCD v2
➢
ABCD v3
➢
EsFacil
➢
Moodle
➢
Vivo
➢
Dspace
➢
Invenio
➢
Polaris OS
90. Sources and
recommended readling
➢
The Cathedral and the Bazaar, by Eric S. Raymond
https://en.wikipedia.org/wiki/The_Cathedral_and_the_Bazaar
➢
Producing Open Source Software: How to Run a
Successful Free Software Project, by Karl Fogel, 2nd
edition 2017, https://producingoss.com/
➢
The Seven Laws Of Open Source Leadership, by
Adrian Bridgwater, Forbes 2016,
https://www.forbes.com/sites/adrianbridgwater/2015/09/06/the-seven-laws-of-open-source-leadership/
92. Additional credits
➢
Photo Linus Torvalds: GFDL. Permission of Martin Streicher, Editor-in-Chief,
LINUXMAG.com
➢
Picture (open source business strategies) from IT Manager's Journal, may 2004,
with personal permission from John Koenig
➢
Screenshot http://www.openhandsetalliance.com/
➢
Cartoon Open Source Fish by openssoft
➢
T-Shirt “Best things of life are free” by http://zazzle.com
➢
Drupalcon DC 2009 copyright by “Chris” (Flickr)
➢
Screenshot Acquia
➢
Internet map by The Opte Project, CC-by
➢
Open arrow, CC-by-nd by ChuckCoker
➢
Share matches CC-by-nc-nd by Josh Harper
➢
Question mark CC-by by Stefan Baudy
➢
Social Icons by Iconshock http://www.iconshock.com/social-icons/
93. This presentation was made with 100% Free Software
No animals were harmed
Questier.com
Frederik AT Questier.com
www.linkedin.com/in/fquestie
www.slideshare.net/Frederik_Questier
Q
uestions?
¿Preguntas?