SlideShare a Scribd company logo
1 of 17
A REVIEW ON OPPORTUNITIES AND
CHALLENGES IN IMPLEMENTING FREE AND
OPEN SOURCE SOFTWARE IN CAS: AN
ALTERNATIVE EDUCATIONAL FRAMEWORK
MR. RAJASEKAR RAMALINGAM
DR. RAMKUMAR LAKSHMINARAYANAN
MR. SHIMAZ KHAN SHAIK
DEPARTMENT OF INFORMATION TECHNOLOGY
COLLEGE OF APPLIED SCIENCES
MINISTRY OF HIGHER EDUCATION
SUR, OMAN
1
3rd
International Conference of the Omani Society for
Educational Technology (ICOET 2015),
Gulf College, Muscat, Sultanate of Oman,
25th and 26th March, 2015.
1) Proprietary software - Nature
A fee - for commercial license agreement.
The buyer – No right to copy, modify, redistribute.
Restriction for using the software even for educational
purpose without license.
Most of the software used in CAS is proprietary.
Makes the students more dependent on the institutions for
the software installation purposes.
Plan for the budget to purchase necessary licenses.
Supposed to compromise in practical parts due to software
licensing conflict.
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
2
2. What FOSS provides:
User has the right to access, make changes, improvise
the source code and free to explore.
“The word Free in FOSS refers not to fiscal cost,
but to the autonomy rights that FOSS grants its
user. The phrase Open Source emphasizes the right
of users to study, change and improve the source
code”.
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
3
3. What we have done…
FOSS - a lot of potential in educational institutions.
Several pedagogical and administrational reasons - at
educational institutions.
increase in use of FOSS in educational institutions –
Studies shows.
Nationally and Globally.
Reasons:
 Various constraints in the proprietary software.
 Technical & non-technical reasons
 Poor guidance
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
4
 Proposed work:
 A detailed study has done to reveal the opportunities
and significance of using FOSS as alternative for
proprietary software in CAS, Oman.
 A framework has been proposed to identify, deploy and
monitor the suitable FOSS software’s for the IT
courses offered by the CAS.
 Our work identifies - The alternative FOSS tools for IT
Courses of CAS
 Reviewing various challenges like:
 lack of support
 interoperability and migration problems
 poor quality software
 non-suitability
 lack of staff experience
 legal issues and poor documentation.
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
5
4. Proposed framework for FOSS adoption in CAS
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
6
4.1 Strategic areas identified:
 Develop FOSS technical plan for CAS
 Form a monitoring committee
 Train the educators to support FOSS implementation
 Create awareness on FOSS initiatives
 Frame policies and guidelines
 Promote FOSS solutions to learner
 Identify the stakeholders and
Evaluate the outcome.
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
7
4.2 Policies identified
To support the strategic areas, eight polices are
identified as follows:
 Responsible
 Adoption
 Technology
 Develop
 Implement
 Training
 Teaching
 Awareness
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
8
Strategic areas Policies
Develop FOSS technical plan for
CAS
Responsible, Develop
Form a monitoring committee Responsible
Train the educators to support
FOSS implementation
Training, Teaching
Create awareness on FOSS
initiatives
Awareness
Frame policies and guidelines Responsible, Technology, Adoption
Promote FOSS solutions to
learner
Implementation, Technology
Identify the stakeholders Responsible
Evaluate the outcome Responsible
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
9
The matrix that highlights each strategic area with corresponding FOSS
implementation policies.
4.3 Strategic area and policy matrix
4.4 Proposed team shall consist of:
1.Programme Director (PD)
2.System Coordinator (SYSCO)
3.LRC
4.Educator
4.5 The roles & responsibilities of the team includes:
Define the policy guidelines
Identify the course level requirements to the FOSS usage
Perform change management programme
Construct the team to evaluate the FOSS initiatives.
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
10
4.6 Plan for the phased environment
Phase 1: IT foundation (Level 0)
Phase 2: All the courses of level 0 and level 1(Common
courses for IT Specialization)
Phase 3: Level 2, Specialization – SD / Network /
Security / DM
Phase 4: Level 3 and Level 4 (Advanced courses with all
electives)
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
11
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
12
Courses Open Source Software
• Introduction to Security
• Innovation in NW and Security
• Computer Security-A
• Computer Security-B
• Network Security-A
• Network Security-B
BackTrack Linux
WireShark
Nmap
OSSEC
Security Onion
Metasploit Framework
OpenSSH
Kali
Ostinato
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
13
FOSS Suitability: Security courses
5. An abstract / preliminary study:
Courses Open Source
• Programming Fundamentals
• Programming
• Data Structure
• Operating System
• Object Oriented Programming and
Interface
• Application Software Development
Python
PHP
Perl
C/C++
Java
FOSS Suitability: Programming Languages
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
14
FOSS Suitability: Operating System
Courses Open Source
• Operating System
• Network Technology
• Network Management
• Advanced Operating System
• Network Security A
Zentyal Linux Server
Amahi Home Server
Apachi Directory Project
Clear OS
CentOS
Ubuntu Server & Ubuntu Client
Gentoo Linux
FOSS Suitability: Network Simulators
Courses Open Source
• Networks 1
• Networks 2
• Network Technology
• Network Management
• Internetworking
GNS3
Cloonix
CORE
GNS3
IMUNES
Marionnet
Mininet
Netkit
Psimulator2
Virtualsquare
VNX and VNUML
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
15
6. Conclusion
Identified that there is a feasibility of implementing FOSS - courses
of CAS.
Extremely benefited from the copy right issues, low cost software
and availability of source code for learning.
The permission of customized distribution of software among the
CAS colleges and on demand support for software is possible.
The students’ expectations can be satisfied with the rising demand
for the latest technology on the campus.
Sharing content is as simple as granting someone access, which
facilitates collaboration without worrying about software licensing.
Implementation of FOSS considerably reduces the budget of
software purchase.
The learning curve is same as proprietary software.
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
16
The recommended framework for the
adoption of FOSS in CAS:
•Enables the possibility of using FOSS to the
maximum extent
•by addressing various challenges like
•lack of support,
•interoperability and migration problems,
•poor quality software,
•non-suitability,
•lack of staff experience,
•legal issues and
•poor documentation using effective planning and
training. 
AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND
OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK
17
References
[1] http://www.mohe.gov.om
 
[2] http://www.cas.edu.om/
 
[3] http://www.cas.edu.om/Pages/More-News.aspx?Qry=9
 
[4] Use of Free and Open Source Software (FOSS) in the US Department of Defense,
MITRE Report Number MP 02W0000101.
 
[5] N Pankaja , Mukund Raj P K , Proprietary software versus Open Source Software
for Education, American Journal of Engineering Research (AJER), ISSN: 2320 –
0936 Volume-02, Issue–07 , pp – 124 – 130.
 
[6] Oman Business Law Handbook, ISBN 1- 4387 -7070 – 7, Volume 1, Strategic
Information and Basic Laws, 2013, International Business Publications, USA.
 
[7] Amal S. Al-Badi, Ali H. Al-Badi, Open Source Software in Higher Education: Oman
SQU Case Study, International Science Index Vol:8, No:8, 2014.
 
[8] http://opensource.org/osd
 
[9] Robert W. Gomulkiewicz, Open Source License Profileration: Helpful Diversity of
Hopeless Confusion, Wash.U.J.Law& Policy, 2009.
 
[10] http://www.gnu.org/philosophy/categories.html

More Related Content

Similar to Opportunities and challenges in implementing free and open source software

Pawlik
PawlikPawlik
Pawlikanesah
 
OpenQAsS Newsletter nr. 3 (English)
OpenQAsS Newsletter nr. 3 (English) OpenQAsS Newsletter nr. 3 (English)
OpenQAsS Newsletter nr. 3 (English) OpenQAsS
 
Chapter 1 - Introduction
Chapter 1 - IntroductionChapter 1 - Introduction
Chapter 1 - IntroductionWaqar Ali
 
A new model for the selection of web development frameworks: application to P...
A new model for the selection of web development frameworks: application to P...A new model for the selection of web development frameworks: application to P...
A new model for the selection of web development frameworks: application to P...IJECEIAES
 
Sustainability Plan. Roadmap
Sustainability Plan. RoadmapSustainability Plan. Roadmap
Sustainability Plan. RoadmapSpeakApps Project
 
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...IJITE
 
S7 p5 milindcaneus
S7 p5 milindcaneusS7 p5 milindcaneus
S7 p5 milindcaneustough587
 
Foresight Methods and Practice: Lessons Learned from International Foresight ...
Foresight Methods and Practice: Lessons Learned from International Foresight ...Foresight Methods and Practice: Lessons Learned from International Foresight ...
Foresight Methods and Practice: Lessons Learned from International Foresight ...Totti Könnölä
 
Aralanet Ict Briefing V11
Aralanet Ict Briefing V11Aralanet Ict Briefing V11
Aralanet Ict Briefing V11John Macasio
 
Open Standards- the key to building digital learning environments
Open Standards- the key to building digital learning environmentsOpen Standards- the key to building digital learning environments
Open Standards- the key to building digital learning environmentscccschamp
 
Pre-Con Education: Introduction to Mainframe Academy With CA Technologies
Pre-Con Education: Introduction to Mainframe Academy With CA TechnologiesPre-Con Education: Introduction to Mainframe Academy With CA Technologies
Pre-Con Education: Introduction to Mainframe Academy With CA TechnologiesCA Technologies
 
Evaluvation of Applying Knowledge Management System Architecture in Software ...
Evaluvation of Applying Knowledge Management System Architecture in Software ...Evaluvation of Applying Knowledge Management System Architecture in Software ...
Evaluvation of Applying Knowledge Management System Architecture in Software ...IOSR Journals
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global softwareijseajournal
 
Cultivating Sustainable Software For Research
Cultivating Sustainable Software For ResearchCultivating Sustainable Software For Research
Cultivating Sustainable Software For ResearchNeil Chue Hong
 
SiavoshKaviani-CV[2021] francais.pdf
SiavoshKaviani-CV[2021] francais.pdfSiavoshKaviani-CV[2021] francais.pdf
SiavoshKaviani-CV[2021] francais.pdfsiavosh kaviani
 

Similar to Opportunities and challenges in implementing free and open source software (20)

Pawlik
PawlikPawlik
Pawlik
 
OpenQAsS Newsletter nr. 3 (English)
OpenQAsS Newsletter nr. 3 (English) OpenQAsS Newsletter nr. 3 (English)
OpenQAsS Newsletter nr. 3 (English)
 
Chapter 1 - Introduction
Chapter 1 - IntroductionChapter 1 - Introduction
Chapter 1 - Introduction
 
A new model for the selection of web development frameworks: application to P...
A new model for the selection of web development frameworks: application to P...A new model for the selection of web development frameworks: application to P...
A new model for the selection of web development frameworks: application to P...
 
Acca 15(software source&selection)
Acca 15(software source&selection)Acca 15(software source&selection)
Acca 15(software source&selection)
 
Acca 15(software source&selection)
Acca 15(software source&selection)Acca 15(software source&selection)
Acca 15(software source&selection)
 
Acca 15(software source&selection)
Acca 15(software source&selection)Acca 15(software source&selection)
Acca 15(software source&selection)
 
Sustainability Plan. Roadmap
Sustainability Plan. RoadmapSustainability Plan. Roadmap
Sustainability Plan. Roadmap
 
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
 
S7 p5 milindcaneus
S7 p5 milindcaneusS7 p5 milindcaneus
S7 p5 milindcaneus
 
Foresight Methods and Practice: Lessons Learned from International Foresight ...
Foresight Methods and Practice: Lessons Learned from International Foresight ...Foresight Methods and Practice: Lessons Learned from International Foresight ...
Foresight Methods and Practice: Lessons Learned from International Foresight ...
 
Kaptur mrd questions
Kaptur mrd questionsKaptur mrd questions
Kaptur mrd questions
 
Aralanet Ict Briefing V11
Aralanet Ict Briefing V11Aralanet Ict Briefing V11
Aralanet Ict Briefing V11
 
Open Standards- the key to building digital learning environments
Open Standards- the key to building digital learning environmentsOpen Standards- the key to building digital learning environments
Open Standards- the key to building digital learning environments
 
Pre-Con Education: Introduction to Mainframe Academy With CA Technologies
Pre-Con Education: Introduction to Mainframe Academy With CA TechnologiesPre-Con Education: Introduction to Mainframe Academy With CA Technologies
Pre-Con Education: Introduction to Mainframe Academy With CA Technologies
 
Evaluvation of Applying Knowledge Management System Architecture in Software ...
Evaluvation of Applying Knowledge Management System Architecture in Software ...Evaluvation of Applying Knowledge Management System Architecture in Software ...
Evaluvation of Applying Knowledge Management System Architecture in Software ...
 
Research Proposal V5
Research Proposal  V5Research Proposal  V5
Research Proposal V5
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
 
Cultivating Sustainable Software For Research
Cultivating Sustainable Software For ResearchCultivating Sustainable Software For Research
Cultivating Sustainable Software For Research
 
SiavoshKaviani-CV[2021] francais.pdf
SiavoshKaviani-CV[2021] francais.pdfSiavoshKaviani-CV[2021] francais.pdf
SiavoshKaviani-CV[2021] francais.pdf
 

More from CAS

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCAS
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4CAS
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1CAS
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodologyCAS
 
Can you solve this
Can you solve thisCan you solve this
Can you solve thisCAS
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentialityCAS
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authenticationCAS
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspectsCAS
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and proceduresCAS
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Human resources security
Human resources securityHuman resources security
Human resources securityCAS
 
Database security
Database securityDatabase security
Database securityCAS
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic toolsCAS
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)CAS
 

More from CAS (20)

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Human resources security
Human resources securityHuman resources security
Human resources security
 
Database security
Database securityDatabase security
Database security
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)
 

Recently uploaded

cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 

Recently uploaded (20)

cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 

Opportunities and challenges in implementing free and open source software

  • 1. A REVIEW ON OPPORTUNITIES AND CHALLENGES IN IMPLEMENTING FREE AND OPEN SOURCE SOFTWARE IN CAS: AN ALTERNATIVE EDUCATIONAL FRAMEWORK MR. RAJASEKAR RAMALINGAM DR. RAMKUMAR LAKSHMINARAYANAN MR. SHIMAZ KHAN SHAIK DEPARTMENT OF INFORMATION TECHNOLOGY COLLEGE OF APPLIED SCIENCES MINISTRY OF HIGHER EDUCATION SUR, OMAN 1 3rd International Conference of the Omani Society for Educational Technology (ICOET 2015), Gulf College, Muscat, Sultanate of Oman, 25th and 26th March, 2015.
  • 2. 1) Proprietary software - Nature A fee - for commercial license agreement. The buyer – No right to copy, modify, redistribute. Restriction for using the software even for educational purpose without license. Most of the software used in CAS is proprietary. Makes the students more dependent on the institutions for the software installation purposes. Plan for the budget to purchase necessary licenses. Supposed to compromise in practical parts due to software licensing conflict. AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK 2
  • 3. 2. What FOSS provides: User has the right to access, make changes, improvise the source code and free to explore. “The word Free in FOSS refers not to fiscal cost, but to the autonomy rights that FOSS grants its user. The phrase Open Source emphasizes the right of users to study, change and improve the source code”. AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK 3
  • 4. 3. What we have done… FOSS - a lot of potential in educational institutions. Several pedagogical and administrational reasons - at educational institutions. increase in use of FOSS in educational institutions – Studies shows. Nationally and Globally. Reasons:  Various constraints in the proprietary software.  Technical & non-technical reasons  Poor guidance AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK 4
  • 5.  Proposed work:  A detailed study has done to reveal the opportunities and significance of using FOSS as alternative for proprietary software in CAS, Oman.  A framework has been proposed to identify, deploy and monitor the suitable FOSS software’s for the IT courses offered by the CAS.  Our work identifies - The alternative FOSS tools for IT Courses of CAS  Reviewing various challenges like:  lack of support  interoperability and migration problems  poor quality software  non-suitability  lack of staff experience  legal issues and poor documentation. AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK 5
  • 6. 4. Proposed framework for FOSS adoption in CAS AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK 6
  • 7. 4.1 Strategic areas identified:  Develop FOSS technical plan for CAS  Form a monitoring committee  Train the educators to support FOSS implementation  Create awareness on FOSS initiatives  Frame policies and guidelines  Promote FOSS solutions to learner  Identify the stakeholders and Evaluate the outcome. AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK 7
  • 8. 4.2 Policies identified To support the strategic areas, eight polices are identified as follows:  Responsible  Adoption  Technology  Develop  Implement  Training  Teaching  Awareness AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK 8
  • 9. Strategic areas Policies Develop FOSS technical plan for CAS Responsible, Develop Form a monitoring committee Responsible Train the educators to support FOSS implementation Training, Teaching Create awareness on FOSS initiatives Awareness Frame policies and guidelines Responsible, Technology, Adoption Promote FOSS solutions to learner Implementation, Technology Identify the stakeholders Responsible Evaluate the outcome Responsible AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK 9 The matrix that highlights each strategic area with corresponding FOSS implementation policies. 4.3 Strategic area and policy matrix
  • 10. 4.4 Proposed team shall consist of: 1.Programme Director (PD) 2.System Coordinator (SYSCO) 3.LRC 4.Educator 4.5 The roles & responsibilities of the team includes: Define the policy guidelines Identify the course level requirements to the FOSS usage Perform change management programme Construct the team to evaluate the FOSS initiatives. AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK 10
  • 11. 4.6 Plan for the phased environment Phase 1: IT foundation (Level 0) Phase 2: All the courses of level 0 and level 1(Common courses for IT Specialization) Phase 3: Level 2, Specialization – SD / Network / Security / DM Phase 4: Level 3 and Level 4 (Advanced courses with all electives) AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK 11
  • 13. Courses Open Source Software • Introduction to Security • Innovation in NW and Security • Computer Security-A • Computer Security-B • Network Security-A • Network Security-B BackTrack Linux WireShark Nmap OSSEC Security Onion Metasploit Framework OpenSSH Kali Ostinato AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK 13 FOSS Suitability: Security courses 5. An abstract / preliminary study: Courses Open Source • Programming Fundamentals • Programming • Data Structure • Operating System • Object Oriented Programming and Interface • Application Software Development Python PHP Perl C/C++ Java FOSS Suitability: Programming Languages
  • 14. AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK 14 FOSS Suitability: Operating System Courses Open Source • Operating System • Network Technology • Network Management • Advanced Operating System • Network Security A Zentyal Linux Server Amahi Home Server Apachi Directory Project Clear OS CentOS Ubuntu Server & Ubuntu Client Gentoo Linux FOSS Suitability: Network Simulators Courses Open Source • Networks 1 • Networks 2 • Network Technology • Network Management • Internetworking GNS3 Cloonix CORE GNS3 IMUNES Marionnet Mininet Netkit Psimulator2 Virtualsquare VNX and VNUML
  • 15. AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK 15 6. Conclusion Identified that there is a feasibility of implementing FOSS - courses of CAS. Extremely benefited from the copy right issues, low cost software and availability of source code for learning. The permission of customized distribution of software among the CAS colleges and on demand support for software is possible. The students’ expectations can be satisfied with the rising demand for the latest technology on the campus. Sharing content is as simple as granting someone access, which facilitates collaboration without worrying about software licensing. Implementation of FOSS considerably reduces the budget of software purchase. The learning curve is same as proprietary software.
  • 16. AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK 16 The recommended framework for the adoption of FOSS in CAS: •Enables the possibility of using FOSS to the maximum extent •by addressing various challenges like •lack of support, •interoperability and migration problems, •poor quality software, •non-suitability, •lack of staff experience, •legal issues and •poor documentation using effective planning and training. 
  • 17. AREVIEWONOPPORTUNITIESANDCHALLENGESINIMPLEMENTINGFREEAND OPENSOURCESOFTWAREINCAS:ANALTERNATIVEEDUCATIONALFRAMEWORK 17 References [1] http://www.mohe.gov.om   [2] http://www.cas.edu.om/   [3] http://www.cas.edu.om/Pages/More-News.aspx?Qry=9   [4] Use of Free and Open Source Software (FOSS) in the US Department of Defense, MITRE Report Number MP 02W0000101.   [5] N Pankaja , Mukund Raj P K , Proprietary software versus Open Source Software for Education, American Journal of Engineering Research (AJER), ISSN: 2320 – 0936 Volume-02, Issue–07 , pp – 124 – 130.   [6] Oman Business Law Handbook, ISBN 1- 4387 -7070 – 7, Volume 1, Strategic Information and Basic Laws, 2013, International Business Publications, USA.   [7] Amal S. Al-Badi, Ali H. Al-Badi, Open Source Software in Higher Education: Oman SQU Case Study, International Science Index Vol:8, No:8, 2014.   [8] http://opensource.org/osd   [9] Robert W. Gomulkiewicz, Open Source License Profileration: Helpful Diversity of Hopeless Confusion, Wash.U.J.Law& Policy, 2009.   [10] http://www.gnu.org/philosophy/categories.html