IT Governance, Risk, and Compliance:

ITKE grandparent

1

December 14, 2010  9:49 PM

Open Source Hardware and Software Licensing – Part VIII



Posted by: Robert Davis
Consumer, Copyright, Digital Millennium Copyright Act, DMCA, Domain, Intellectual Property Right, IPR, Licensing, Open Source, Open Source Hardware, Open Source Software, OSH, OSI, OSS, Peer Production, Source Code

Open source products have emerged as the dominant thyme for some IT development projects due to cost considerations. This rise in alternative IT development can be linked to tensions between creative practices that often involve base acquisitions requiring access to patented and/or copyrighted...

December 10, 2010  10:23 PM

Open Source Hardware and Software Licensing – Part VII



Posted by: Robert Davis
Consumer, Copyright, Digital Millennium Copyright Act, DMCA, Domain, Intellectual Property Right, IPR, Licensing, Open Source, Open Source Hardware, Open Source Software, OSH, OSI, OSS, Peer Production, Source Code

In many situations, open source licensing is an essential element enabling open source programs to qualify as open source software. However, there are numerous variations in the terms and conditions associated with an open software licensing agreement. To reduce misunderstandings that can lead to...


December 7, 2010  7:05 PM

Open Source Hardware and Software Licensing – Part VI



Posted by: Robert Davis
Consumer, Copyright, Digital Millennium Copyright Act, DMCA, Domain, Intellectual Property Right, IPR, Licensing, Open Source, Open Source Hardware, Open Source Software, OSH, OSI, OSS, Peer Production, Source Code

Primary open source software development conventions are ‘peer production’ by bartering and collaboration based on mutual interest in root materials (such as...


December 3, 2010  12:52 PM

Open Source Hardware and Software Licensing – Part V



Posted by: Robert Davis
Consumer, Copyright, Digital Millennium Copyright Act, DMCA, Domain, Intellectual Property Right, IPR, Licensing, Open Source, Open Source Hardware, Open Source Software, OSH, OSI, OSS, Peer Production, Source Code

Simplistically, open source software “refers to any program whose source code is made available for use or modification as users or other developers see fit. Open source software is usually developed as a public...


July 6, 2009  7:02 PM

Trans-border Communication Protection – Part IV



Posted by: Robert Davis
Configuration Items, Encapsulating Security Payload, Encapsulation, ESP, Infrastructure, Internet Protocol Security, IPSec, Open Systems Interconnection, OSI, Privacy, Secure Socket Layer, SSL, Transport Mode, Tunnel Mode, Virtual Private Network, VPN

The primary distinguishing feature between IPSec and SSL is their respective OSI reference model protocol communication tier levels. IPSec operates at the network layer of the


July 2, 2009  8:12 PM

Trans-border Communication Protection – Part III



Posted by: Robert Davis
Configuration Items, Encapsulating Security Payload, Encapsulation, ESP, Infrastructure, Internet Protocol Security, IPSec, Open Systems Interconnection, OSI, Privacy, Secure Socket Layer, SSL, Transport Mode, Tunnel Mode, Virtual Private Network, VPN

Generally, a VPN is recognized as a confidential data plexus that employs the public telecommunication infrastructure while maintaining...


March 3, 2009  4:05 AM

Peer-to-Peer Networking – Part 2



Posted by: Robert Davis
Applications, HDLC, Infrastructure, Network Access Protection, P2P, Password-Protected Share, Peer-to-Peer, Performance, Privacy, Security Risks, Share-level Security, X.25

Maybe, experientially, the small branch office with a P2P network has escaped a security incident since deployment. Even so, a functional P2P network unintentionally presents itself as a potential target waiting for someone capable of pulling the threat trigger to introduce a potent security...


February 26, 2009  6:49 PM

Peer-to-Peer Networking – Part 1



Posted by: Robert Davis
Applications, Infrastructure, Network Access Protection, P2P, Password-Protected Share, Peer-to-Peer, Performance, Privacy, Security Risks, Share-level Security

There are a variety of networking architectures available for deployment. Potential candidates include Peer-to-Peer, Client/Server and Master/Slave. However, Peer-to-Peer (P2P) architectures present unique governance issues to the information...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: