OSS: Europe vs. The United States
She blasted proprietary software, saying that choosing it over Open Source alternatives can leave nations "unintentionally locked into proprietary technology for decades", and went on to note that even if Open Source options are later implemented, they "risk being systematically ignored."
Reading this prompted me to wonder if the United States had an equivalently highly-placed official with sufficient power to influence the US Government's decision process regarding OSS solutions. The closest I could find was Howard A. Schmidt, our current US DHS "Cybersecurity Czar". It didn't take much digging to begin to understand where Schmidt's priorities are likely to fall regarding OSS. From WhoRunsGov.com, we discover that Schmidt went to work for Microsoft in 1997 as their chief security officer. He remained in that position for 5 years, and in 1999 he donated $250 to the Microsoft Political Action Committee.
It comes as no great surprise to me that Microsoft's deep pockets have helped ensure that One Of Their Own is deeply embedded within US Government software decision making bureaucracy. It appears that the software industry in the United States is following the path laid out by the (formerly) Big 3 of the US automotive industry: attempting to eliminate competition by influencing the political process to adopt policies favorable to their industry. US government protectionist policies tailored to support Microsoft will invariably have the same net result of earlier US auto industry protectionist policies. Ultimately the inferior, but protected US product will be displaced in the global marketplace by superior product. In the meantime however, US productivity will suffer due the government's continued support of upgrade after expensive upgrade of the insecure Microsoft product that is in use throughout our national infrastructure.
As a footnote, let us not forget our newest Number One Ruthless Evil Empire. You guessed it: different company, same business model.
|Free Today: September Issue of Linux Journal (Retail value: $5.99)||Sep 27, 2016|
|nginx||Sep 27, 2016|
|Epiq Solutions' Sidekiq M.2||Sep 26, 2016|
|Nativ Disc||Sep 23, 2016|
|Android Browser Security--What You Haven't Been Told||Sep 22, 2016|
|The Many Paths to a Solution||Sep 21, 2016|
- Android Browser Security--What You Haven't Been Told
- Readers' Choice Awards 2013
- Free Today: September Issue of Linux Journal (Retail value: $5.99)
- Epiq Solutions' Sidekiq M.2
- Nativ Disc
- The Many Paths to a Solution
- Synopsys' Coverity
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- Returning Values from Bash Functions
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide