Feeds

Educating Verity

A breeze is riffling academia's pubic hair

Combat fraud and increase customer satisfaction

Stob It's my own fault. If you've told me once, you've told me a hundred times to ignore them. You know the sort of thing:

Bacheelor, MasteerMBA, and Doctoraate diplomas available in the field of your choice that's right, you can even become a Doctor and receive all the benefits that comes with it!

Last year, I fell victim to a hankering for a MasteerMSC in Software Development and receiving all the benefits that comes with it. I clicked the link and authorised a payment for the wrong end of a £thou from my Visa card.

But I should admit I have kidded you a little. The advertisement was not worded quite as I have indicated. For the website where I found it was none other than El Reg itself, and the organisation pushing the qualifications was the Open University. 

(Pause for a Proustian moment while everybody of my generation plays this trumpet involuntary on their mental televisions.)

M885 Analysis and design of enterprise systems: an object oriented approach arrives as a plastic, self-assembly box file, a three volume set of A4 books containing the course itself, an infuriating and dispiriting tome called The Good Study Guide full of timekeeping and studying advice that is meant to encourage but actually would put off all but the most hardened swot, and a vast amount of miscellaneous paperwork containing many assorted further instructions and prohibitions. 

Especially homework. One might expect a week or two's grace at the start of a course since, not yet having learned anything, one has nothing to regurgitate. However, at M885 they subscribe to the principle, familiar from schooldays, that if the hockey pitch is waterlogged, you can always send the kids on a run. Out of the frying pan and into the mud.

Week two's question required us to read a paper, originally published in the prestigious, peer-reviewed journal IEEE Software, called 'Open Source Reuse in Commercial Firms' by T. R. Madanmohan and Rahul De', associate professors at the Indian Institute of Management, Bangalore. When we were done reading it, we had to answer questions. (You may wonder what open source use has to do with object-oriented analysis and design. That would be both of us, then.)

Now I am going to have to ask you to be very brave, because if anything of what I have to say is to make sense then you, too, are going to taste a little of this paper. Calm down. By its own account, it's mostly just a survey asking people how they use open source software - how hard to read can that be? The following is one of the passages we were instructed to discuss in our homework. It purports to explain how companies choose open source software.

Open source projects that are too platform-specific aren't good either. For example, many open source content management system developers have based their spawning, multiple (often competing), and derivative projects on a single platform. To develop them into useful applications requires excessive, code-based customization. While extensibility is important, customers expect to see the inclusion of core features, together with the ability to configure key settings. Open source components with low code volatility, high platform heterogeneity, and high configuration and optimization space are the best choices. Robust test cases and user credibility are other dimensions developers must consider to identify the right components.

I assure you that context improves the sense of the above not one pica-jot. If you don't believe me, click here and you can read the whole thing for yourself… for $29.

SANS - Survey on application security programs

Next page: My analysis

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.