version 1.333, 2003/04/30 18:13:07 |
version 1.334, 2003/04/30 19:46:02 |
|
|
them explain their position concerning their "open" architecture |
them explain their position concerning their "open" architecture |
UltraSparc-III - and fails due to Sun's no response politics. |
UltraSparc-III - and fails due to Sun's no response politics. |
<p> |
<p> |
|
|
|
<li><font color="#009000"><strong> |
|
<a href="http://www.egovos.org/pdf/dodfoss.pdf">Use of Free and |
|
Open-Source Software (FOSS) in the U.S. Department of Defense</a>, |
|
MITRE Report Number MP 02 W0000101, revised January 2, 2003 |
|
</strong></font><br> |
|
Prepared by The MITRE Corporation for DISA (Defense Information Systems Agency), |
|
this report analyses how DOD uses open source software. |
|
The summary talks briefly about various terms (free, open source, etc.), |
|
then talks about the survey itself, one question of which was |
|
"... the hypothetical question ... |
|
of what would happen if FOSS software were banned in the DoD." |
|
<br> |
|
"The main conclusion of the analysis was that FOSS software plays |
|
a more critical role in the DoD than has generally been recognized. |
|
FOSS applications are most important in four broad areas: Infrastructure |
|
Support, Software Development, Security, and Research. One unexpected |
|
result was the degree to which Security depends on FOSS. Banning |
|
FOSS would remove certain types of infrastructure components (e.g., |
|
<a href="http://www.openbsd.org/">OpenBSD<a>) that currently help |
|
support network security. |
|
It would also limit DoD access to, and overall expertise in, the use of |
|
powerful FOSS analysis and detection applications that hostile groups could |
|
use to help stage cyberattacks. Finally, it would remove the |
|
demonstrated ability of FOSS applications to be updated rapidly in |
|
response to new types of cyberattack. Taken together, these factors |
|
imply that banning FOSS would have immediate, broad, and strongly |
|
negative impacts on the ability of many sensitive and security-focused |
|
DoD groups to defend against cyberattacks." |
|
<br> |
|
So, let's hope the policy wonks read this report. |
|
<p> |
|
|
</ul> |
</ul> |
|
|
<h2>December, 2002</h2> |
<h2>December, 2002</h2> |