Este documento resume los aspectos legales del software libre y código abierto. Explica las características del software libre como la disponibilidad del código fuente y la libertad de modificar, distribuir y mejorar el software. También describe los tipos de programas como comerciales, shareware y freeware. Además, presenta un proyecto de ley colombiano para incentivar el uso de software libre en el país.
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
Cloud Computing has received much attention by the IT-Business world. As compared to the common
computing platforms, cloud computing is more flexible in supporting real-time computation and is
considered a more powerful model for hosting and delivering services over the Internet. However, since
cloud computing is still at its infancy, it faces many challenges that stand against its growth and spread.
This article discusses some challenges facing cloud computing growth and conducts a comparison study
between Amazon EC2 and Windows Azure in dealing with such challenges. It concludes that Amazon EC2
generally offers better solutions than Windows Azure. Nevertheless, the selection between them depends on
the needs of customers.
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by
the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce,
education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks,
which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of
the Internet as a medium of operations. The paper highlights the increase of cyber related attacks in the
past ten years due to lack of transatlantic international corporation between participating countries,
coherent information security policies, data aggregation and sound international laws to facilitate
prosecution of perpetrators. The cyber space coupled with availability of free hacking tools has contributed
to resurgence in syndicated identity theft, corporate espionage and identity theft by organized crime
elements taking advantage of the Internet as a medium of operations. This paper presents conclusive
solution that users, organizations and consumers can enact to protect themselves from the threat of cyber
attacks culminating into identity theft, financial loss or both.
Available network bandwidth schema to improve performance in tcp protocolsIJCNCJournal
The TCP congestion control mechanism in standard implementations presents several problems, for
example, large queue lengths in network routers and packet losses, a misleading reduce of the transmission
rate when there are link failures, among others. This paper proposes a schema to congestion control in
TCP protocols, called NGWA, witch is based on the network bandwidth. The NGWA provides information
considering the available bandwidth of the network infrastructure to the endpoints of the TCP connection.
Hence, it helps in choosing a better transmission rate for TCP improving its performance. Simulation
results show superior performance of the proposed scheme when compared to those obtained by TCP New
Reno and standard TCP. A physical implementation in the Linux kernel was performed to prove the correct
operation of the proposal.
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
Cloud Computing has received much attention by the IT-Business world. As compared to the common
computing platforms, cloud computing is more flexible in supporting real-time computation and is
considered a more powerful model for hosting and delivering services over the Internet. However, since
cloud computing is still at its infancy, it faces many challenges that stand against its growth and spread.
This article discusses some challenges facing cloud computing growth and conducts a comparison study
between Amazon EC2 and Windows Azure in dealing with such challenges. It concludes that Amazon EC2
generally offers better solutions than Windows Azure. Nevertheless, the selection between them depends on
the needs of customers.
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by
the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce,
education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks,
which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of
the Internet as a medium of operations. The paper highlights the increase of cyber related attacks in the
past ten years due to lack of transatlantic international corporation between participating countries,
coherent information security policies, data aggregation and sound international laws to facilitate
prosecution of perpetrators. The cyber space coupled with availability of free hacking tools has contributed
to resurgence in syndicated identity theft, corporate espionage and identity theft by organized crime
elements taking advantage of the Internet as a medium of operations. This paper presents conclusive
solution that users, organizations and consumers can enact to protect themselves from the threat of cyber
attacks culminating into identity theft, financial loss or both.
Available network bandwidth schema to improve performance in tcp protocolsIJCNCJournal
The TCP congestion control mechanism in standard implementations presents several problems, for
example, large queue lengths in network routers and packet losses, a misleading reduce of the transmission
rate when there are link failures, among others. This paper proposes a schema to congestion control in
TCP protocols, called NGWA, witch is based on the network bandwidth. The NGWA provides information
considering the available bandwidth of the network infrastructure to the endpoints of the TCP connection.
Hence, it helps in choosing a better transmission rate for TCP improving its performance. Simulation
results show superior performance of the proposed scheme when compared to those obtained by TCP New
Reno and standard TCP. A physical implementation in the Linux kernel was performed to prove the correct
operation of the proposal.
5. CARACTERISTICAS DEL SOFTWARE
LIBRE
• Se encuentra disponible el código fuente del
software, por lo que puede modificarse el software
sin ningún límite.
• Libertad de estudiarlo y adaptarlo.
• Libertad de distribuir copias.
• Libertad de mejora y publicación de cambios.
• Libertad de usar el programa con cualquier
propósito.
• El software libre no es de dominio público, si tiene
esta característica, no puede ser utilizado,
mejorado y rediseñado o adaptado por cualquiera
6. LIBERTADES Y
FACULTADES DEL
SOFTWARE LIBRE
• Ejecutar el programa con cualquier propósito
• Estudiar su funcionamiento y adaptarlo a sus
necesidades
• Distribuir y redistribuir copias
• Mejorar el programa y poner estas mejoras a
disposición del publico
7. TIPOS O CLASES DE
PROGRAMAS
• Programas comerciales
• Shareware
• Freeware
• Dominio público
9. LICENCIA PÚBLICA
GENERAL
• La licencia GPL puede ser usada por cualquiera, su
finalidad es proteger los derechos de los usuarios
finales (usar, compartir, estudiar, modificar).
10. Comisión de sistemas informáticos
Principales funciones
• Crear, publicar y mantener actualizada una recopilación en
su sitio web de las herramientas del software libre.
• Promover o facilitar el desarrollo de un avance de software
libre, en especial aquel que sea de interés para el estado
• Garantizar el acceso de los ciudadanos al software, incluido
su código fuente, utilizado por el estado, salvo en aquellos
casos en que hacerlo pueda resultar arriesgado para la
seguridad nacional
• Realizar un inventario, según sectores de actividad, de las
carencias de software libre en función de las cuales otorgara
permisos de excepción
• Mantener un mecanismo de comunicación masivo basado
en internet que les permita a los ciudadanos y entidades
interesadas a participar en procesos de toma de decisiones
11. Proyecto de ley sobre
“software” libre en Colombia
Por medio de este Proyecto de Ley se busca
incentivar el uso de software libre como mecanismo
para fomentar el respeto a los derechos
constitucionales de los ciudadanos e incentivar el
desarrollo tecnológico de la nación.
12. PRINCIPIOS
• Control efectivo sobre los sistemas de información
• Priorización y promoción del uso del software libre
en el país
• Utilización de sistemas de información que no
permitan el acceso a personas no autorizadas,
para garantizar la seguridad y privacidad de los
ciudadanos
• Transparencia de las tecnologías utilizadas para el
funcionamiento del estado
13. POLITICA DE USO
Necesidad de establecer como política de estado el uso y
la aplicación de herramientas basadas en software libre
• Crear y publicar una red de servicios informáticos para
promover, facilitar e informar sobre las herramientas
para la oportuna adopción de software libre
• La capacitación en software libre y el fomento de una
cultura de su uso a los servidores publico
• La inclusión de proyectos educativos en software que
promuevan su uso, en las entidades de educación
publica