Spyder News
  • Home
    • Home – Layout 1
  • Review
    Samsung Galaxy A32 5G review: 5G on a budget

    Samsung Galaxy A32 5G review: 5G on a budget

    Fujitsu UH-X laptop review

    Fujitsu UH-X laptop review

    Company finds fraud and viruses in 92% of illegal football broadcasts on the web

    Company finds fraud and viruses in 92% of illegal football broadcasts on the web

    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    American operator Verizon announces sale of Yahoo and AOL for $ 5 billion

    American operator Verizon announces sale of Yahoo and AOL for $ 5 billion

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

  • Gaming
    Gta Vi

    Gta Vi

    all about gta vi

    all about gta vi

    God Of War

    Whats new about God Of War ?

    God Of War

    New God Of War !

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

    Telegram: these are the new features that will arrive very soon

    Telegram: these are the new features that will arrive very soon

  • Gear
    • All
    • Audio
    • Camera
    • Laptop
    • Smartphone
    Company finds fraud and viruses in 92% of illegal football broadcasts on the web

    Company finds fraud and viruses in 92% of illegal football broadcasts on the web

    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    American operator Verizon announces sale of Yahoo and AOL for $ 5 billion

    American operator Verizon announces sale of Yahoo and AOL for $ 5 billion

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

    Experts use drone to hack Tesla car system vulnerable to Wi-Fi attack

    Experts use drone to hack Tesla car system vulnerable to Wi-Fi attack

    Telegram: these are the new features that will arrive very soon

    Telegram: these are the new features that will arrive very soon

    Trending Tags

    • Best iPhone 7 deals
    • Apple Watch 2
    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • iOS 10
    • iPhone 7
    • Sillicon Valley
  • Computers
    Fujitsu UH-X laptop review

    Fujitsu UH-X laptop review

    Company finds fraud and viruses in 92% of illegal football broadcasts on the web

    Company finds fraud and viruses in 92% of illegal football broadcasts on the web

    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    Glovo suffers a hack in Spain and the credentials of distributors and clients appear for sale on the Internet

    Glovo suffers a hack in Spain and the credentials of distributors and clients appear for sale on the Internet

    The dangerous paradox that threatens the throne of the PlayStation 5

    The dangerous paradox that threatens the throne of the PlayStation 5

    Facebook warns its advertisers: Apple is going to hurt them

    Facebook warns its advertisers: Apple is going to hurt them

  • Applications
    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    American operator Verizon announces sale of Yahoo and AOL for $ 5 billion

    American operator Verizon announces sale of Yahoo and AOL for $ 5 billion

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

    Experts use drone to hack Tesla car system vulnerable to Wi-Fi attack

    Experts use drone to hack Tesla car system vulnerable to Wi-Fi attack

    Glovo suffers a hack in Spain and the credentials of distributors and clients appear for sale on the Internet

    Glovo suffers a hack in Spain and the credentials of distributors and clients appear for sale on the Internet

    Telegram: these are the new features that will arrive very soon

    Telegram: these are the new features that will arrive very soon

  • Security
    The dangerous paradox that threatens the throne of the PlayStation 5

    The dangerous paradox that threatens the throne of the PlayStation 5

    YouTube’s invention so you don’t run out of mobile data

    YouTube’s invention so you don’t run out of mobile data

    European Union proposes rules for ‘high risk’ artificial intelligence

    European Union proposes rules for ‘high risk’ artificial intelligence

    U.S. senators question Apple and Google about dominance in app stores

    U.S. senators question Apple and Google about dominance in app stores

    Amazon opens UK hair salon with technology to predict the look

    Amazon opens UK hair salon with technology to predict the look

    CMS: what is it and how to use a Content Management System?

    CMS: what is it and how to use a Content Management System?

No Result
View All Result
  • Home
    • Home – Layout 1
  • Review
    Samsung Galaxy A32 5G review: 5G on a budget

    Samsung Galaxy A32 5G review: 5G on a budget

    Fujitsu UH-X laptop review

    Fujitsu UH-X laptop review

    Company finds fraud and viruses in 92% of illegal football broadcasts on the web

    Company finds fraud and viruses in 92% of illegal football broadcasts on the web

    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    American operator Verizon announces sale of Yahoo and AOL for $ 5 billion

    American operator Verizon announces sale of Yahoo and AOL for $ 5 billion

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

  • Gaming
    Gta Vi

    Gta Vi

    all about gta vi

    all about gta vi

    God Of War

    Whats new about God Of War ?

    God Of War

    New God Of War !

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

    Telegram: these are the new features that will arrive very soon

    Telegram: these are the new features that will arrive very soon

  • Gear
    • All
    • Audio
    • Camera
    • Laptop
    • Smartphone
    Company finds fraud and viruses in 92% of illegal football broadcasts on the web

    Company finds fraud and viruses in 92% of illegal football broadcasts on the web

    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    American operator Verizon announces sale of Yahoo and AOL for $ 5 billion

    American operator Verizon announces sale of Yahoo and AOL for $ 5 billion

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

    Experts use drone to hack Tesla car system vulnerable to Wi-Fi attack

    Experts use drone to hack Tesla car system vulnerable to Wi-Fi attack

    Telegram: these are the new features that will arrive very soon

    Telegram: these are the new features that will arrive very soon

    Trending Tags

    • Best iPhone 7 deals
    • Apple Watch 2
    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • iOS 10
    • iPhone 7
    • Sillicon Valley
  • Computers
    Fujitsu UH-X laptop review

    Fujitsu UH-X laptop review

    Company finds fraud and viruses in 92% of illegal football broadcasts on the web

    Company finds fraud and viruses in 92% of illegal football broadcasts on the web

    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    Glovo suffers a hack in Spain and the credentials of distributors and clients appear for sale on the Internet

    Glovo suffers a hack in Spain and the credentials of distributors and clients appear for sale on the Internet

    The dangerous paradox that threatens the throne of the PlayStation 5

    The dangerous paradox that threatens the throne of the PlayStation 5

    Facebook warns its advertisers: Apple is going to hurt them

    Facebook warns its advertisers: Apple is going to hurt them

  • Applications
    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    Google accidentally anticipates Mother’s Day tribute and removes Doodle from the air

    American operator Verizon announces sale of Yahoo and AOL for $ 5 billion

    American operator Verizon announces sale of Yahoo and AOL for $ 5 billion

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

    Microsoft finds 25 security holes in systems designed for ‘internet of things’ devices

    Experts use drone to hack Tesla car system vulnerable to Wi-Fi attack

    Experts use drone to hack Tesla car system vulnerable to Wi-Fi attack

    Glovo suffers a hack in Spain and the credentials of distributors and clients appear for sale on the Internet

    Glovo suffers a hack in Spain and the credentials of distributors and clients appear for sale on the Internet

    Telegram: these are the new features that will arrive very soon

    Telegram: these are the new features that will arrive very soon

  • Security
    The dangerous paradox that threatens the throne of the PlayStation 5

    The dangerous paradox that threatens the throne of the PlayStation 5

    YouTube’s invention so you don’t run out of mobile data

    YouTube’s invention so you don’t run out of mobile data

    European Union proposes rules for ‘high risk’ artificial intelligence

    European Union proposes rules for ‘high risk’ artificial intelligence

    U.S. senators question Apple and Google about dominance in app stores

    U.S. senators question Apple and Google about dominance in app stores

    Amazon opens UK hair salon with technology to predict the look

    Amazon opens UK hair salon with technology to predict the look

    CMS: what is it and how to use a Content Management System?

    CMS: what is it and how to use a Content Management System?

No Result
View All Result
Spyder News
No Result
View All Result
Home Computers

Open Source: what it is and how it works

spydernews by spydernews
April 15, 2021
in Computers, Gear, Security, Uncategorized
0
Open Source: what it is and how it works
467
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter

The term Open Source is widely used to refer to programs that have no cost to use. Generally, they are software that serve as alternatives to other products of large corporations.

However, there is much more behind this term than users realize. Next, understand what Open Source is and how it works!

What is Open Source?


In short, Open Source are programs or apps distributed with source code. This allows anyone with programming knowledge to use, modify, enhance and even share it on the internet.

Typically, the source code is a piece of software that most users never see. However, having access to it allows programmers to make changes and correct parts that may not be working properly.

The idea of ​​making the source code available for free came up with Richard Stallman in 1983. The MIT programmer suggests that the codes should be accessible to users so that they have the freedom to use, modify and improve them.

Thus, Stallman started to release the free codes on his license, the GNU Public License. So, this new approach started an ideology around the creation of software that extends today through the Open Source Initiative (OSI).

How does Open Source software work?


In general, “closed source” software allows only creators to make changes legally. Then, the user only buys a license for use, as with the popular Adobe Photoshop and Microsoft Office.

Meanwhile, some of the Open Source programs are shared on public websites. The source code is available for users to use for any purpose they wish and the programs have different licenses and terms of use for the product.

It is also important to note that not all open source software is completely free. Developers may charge a fee to release the use of the source code or the sale of the program.

Why do people use Open Source programs?


The use of Open Source software has some advantages. For example, it gives more control for programmers to examine the code and make sure it contains nothing they don’t want or change something they don’t like.

Many users also believe that open source programs are more secure and stable than “closed source” products. As well as, it is possible to fix the problems without waiting for an update from the creators.

Another positive point is the community involved around Open Source programs. They are programmers, developers and other technology experts who work to improve and promote certain software.

Finally, young programmers can use the products to study. They serve as training to understand how applications and programs work and thus become better professionals.

What are the disadvantages of Open Source?


On the other hand, programs with open source are not free from flaws in quality, performance or security. Unfortunately, it is possible to find products with bugs or other problems that may impair the experience.

Another disadvantage of Open Source is that many software are not friendly to people without programming experience. They demand certain knowledge that is not common for the most “lay”.

In addition, programs may have compatibility problems. For example, they may require specialized drivers or even a non-standard PC configuration.

Famous examples of Open Source software


There is a giant list of products and sites of public interest with open source that are part of the daily lives of many people. Perhaps, they don’t even realize that, in fact, they are all Open Source programs.

An example of this is the Firefox internet browser. Developed by the Mozilla Foundation, it has several collaborators who help to keep it always safe and stable for the more than 300 million users.

Another famous example is the Linux operating system. Created in 1991, the software inspired many developers to create programs for the platform, expanding the open source environment.

Interestingly, even Microsoft has used several Open Source software to develop its own. A fact that shows that even mega corporations can make use of these products.

Previous Post

People: what social networking is and how it works

Next Post

Vizer: understand the features and risks when downloading the app

Next Post
Vizer: understand the features and risks when downloading the app

Vizer: understand the features and risks when downloading the app

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

God Of War

New God Of War !

September 11, 2021
how to burn fat

how to burn fat

September 6, 2021

Trending.

Ibai’s PS5 unboxing: ‘fire’ in G2’s mansion and kiss with Barbe

Ibai’s PS5 unboxing: ‘fire’ in G2’s mansion and kiss with Barbe

March 29, 2021
US to revoke operating licenses for three Chinese telecommunications companies

US to revoke operating licenses for three Chinese telecommunications companies

April 4, 2021
promoneum

influencer marketing

September 2, 2021
Gta Vi

Gta Vi

September 20, 2021
all about gta vi

all about gta vi

September 20, 2021
Spyder News

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Gaming
  • Gear
  • Health
  • Laptop
  • Microsoft
  • Photography
  • Review
  • Security
  • Smartphone
  • Uncategorized
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Home
  • Review
  • Apple
  • Applications
  • Computers
  • Gaming
  • Gear
    • Audio
    • Camera
    • Smartphone
  • Microsoft
  • Photography
  • Security

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.