Feeds

Stob latest: It was a cunning trick, says Open University

Pull the other one

Internet Security Threat Report 2014

Perhaps sensing a PR disaster, the Open University's Communications Director Derek Prior got in touch.

The new explanation? It had been a trap for the unwary, he told us. In order to develop student's critical faculties, bad papers may be deliberately set. These papers may include gobbledygook, or meaningless phrases.

"If you telegraphed ahead that it was a rotten paper, it would not be a critical exercise."

Stob's reaction, he said, had been "exemplary", and the student had evidently tried to understand it from every which way.

Mr Prior told us he’d seen the marking guide from 2006 which noted that the splog paper referenced its own research material. No word of the tutors' views on its comprehensibility or plausibility.

Mr Prior was emphatic: The question required them to be critical of the paper.

Here’s the question again:


Question 2 (15 marks)

Read the following article which you can access from the Reader section of the M885 course website: Open Source Reuse in Commercial Firms, T.R. Madanmohan and Rahul De’, IEEE Software, vol. 21, no. 6, Nov.–Dec. 2004,

http://ieeexplore.ieee.org.libezproxy.open.ac.uk/iel5/52/29730/01353225. pdf?tp=&arnumber=1353225&isnumber=29730

Open source software is always software released under an Open Source Initiative (OSI) certified licence. Each of the licences approved by the OSI meets the conditions of the Open Source Definition [http://www.opensource.org/docs/definition.html]. That definition includes 10 criteria. Perhaps the most important of these are the free redistribution of the software, access to the source code, and the permission to allow modifications to the software and derived works that may be distributed under the same licensing conditions:

http://www.oss-watch.ac.uk/resources/opensourcesoftware.xml

Open Source raises interesting issues. This paper looks at the integration of open source components in commercial applications.

1 Suggest some open source software drawbacks when compared to commercial software development. [3]

2 The paper presents five critical issues for the reuse of open source components. Briefly discuss each of them. [12]

Note that the article mentions COTS, which means Commercial Off The Shelf. This term refers to software or hardware products that are ready-made and available for sale, lease, or license to the general public.


Except, as you can see, it didn’t.

Security for virtualized datacentres

Next page: Loose ends

More from The Register

next story
Microsoft WINDOWS 10: Seven ATE Nine. Or Eight did really
Windows NEIN skipped, tech preview due out on Wednesday
Business is back, baby! Hasta la VISTA, Win 8... Oh, yeah, Windows 9
Forget touchscreen millennials, Microsoft goes for mouse crowd
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
'Google is NOT the gatekeeper to the web, as some claim'
Plus: 'Pretty sure iOS 8.0.2 will just turn the iPhone into a fax machine'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.