section 1 the ancient history of free software. hack, hack, what are you doing? just hacking!

53
Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE

Upload: daniela-cocco

Post on 03-May-2015

219 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Section 1

THE ANCIENT HISTORY OF FREE SOFTWARE

Page 2: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Hack, hack, what are you doing?Just hacking!

Page 3: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Coffee-p ortea-p?

true!

Page 4: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

SUIT

Page 5: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

SNAFUsituation normal, all fu.....

Page 6: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

1985

Gnu is Not UnixGnu is Not Unix

Page 7: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

THE REVOLUTIONARY IDEOLOGY OF RICHARD STALLMAN

FREE SOFTWARE is aquestion of freedom not of price

Copyright is a violation of the right of knowledge of citizens anddiscourages collaboration among citizens

Not free software is harmfulto education

Competition on the market producesunuseful duplication of resources

Page 8: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Public domain

Copyleft

Freeware

Proprietary software

Is there acopycenter-left?

Page 9: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

1991

Page 10: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Internet, that is,miracolous network

“ Simon Pietro dragged to the beach the net full of 153 big fishes.They were so many, but the net did not tear…..”

(dal Vangelo secondo Giovanni)

Page 11: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

In the year ...

19571957

Page 12: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

The birth of ARPA(harp)

Advanced Research Project Ag.

Page 13: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

The objective of ARPA(according to military commanders)

Page 14: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

The intergalactic network of science according to James Killian

Page 15: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

ARPANET

19691969

Page 16: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Circuit switching

Page 17: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Starting station

ArrivalStation

Packet switching

Page 18: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

INTERNET is similar to a big railway

STAZIONE 1

STAZIONE 2

STAZIONE 3

IP

Page 19: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

INTERNET Engineering Task Force

Page 20: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

The rules of IETF

Everything “free”:

Participation

principles

ideascode

All we need isrough consensus and running code

Fly before buyFly before buy

Page 21: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

RFCrequest for comments

Write them in the toilet,Write them in the toilet,

but write them exact and clearbut write them exact and clear

Page 22: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

The dilemma of the teacher

Write many bits!

And then give them free?

Page 23: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

“This is a question of freedom not of money”

“FREE as in free speech not as in free beer”

Page 24: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

New models of businesshandbooks

newprograms

consultancies

Red Hat Walnut Creek S.u.S.E.Active State Send Mail Cygnus Solutions

Scryptics c2Net BSDI

Sometimes my masterseemsa teacher ofBocconi University

Page 25: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Krugle and the mountain of free software

100.000.000 pages

Page 26: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Section 2

FREE SOFTWARE IN ITALY

Page 27: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

2002 LUCIO STANCA CONSTITUTES THE FIRST

COMMITTEE ON OSS

Page 28: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Grazie !!

LUCIO STANCA

Page 29: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Grazie !!Anna Maria Guerrini

Giorgio Ausiello Giuseppe Attardi

Sergio Baldelli Maurizio Italo Balla

Carlo Batini Francesco Grasso

Giancarlo Galardi Alfonso Fuggetta

Luigi Ierna Adelmo Lodi Rizzini

Ciro Maddaloni Flavia Marzano

Alessandro Musumeci Vittorio Pagani

Ugo Simonetti Giovanna Sissa

Italo Volpe i 1000 auditi

gli amici del MIT e Atos Origin S.p.A.

Page 30: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Il TCO

Page 31: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

SECURITY AND ELECTRONIC SIGNATURE

Today a little cat in a dog pound

is more safe than proprietary software

Today a little cat in a dog pound

is more safe than proprietary software

Page 32: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Security through obscurity (STO)is as bad with computer systems as

it is with women

PRINCIPLE OF KERCHOFF (1883)

Page 33: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

VALUE FOR MONEY,THAT IS,

FORBIDDEN TO FORBID

Page 34: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Custom software belongs to P. A.

Can we receive some drops of custom milk ?

Little dogs from Canigattí

Little dogs from Canigattí

Little cats from Canigattí

Little cats from Canigattí

Page 35: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Inspection of proprietary software

Let me verify whether there is a backdoor…

WNTWNT

NSANSA

Page 36: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Tremonti e Veltroni must speak in XML

Bau, bau, bauin XML

Brr… Brr…in XML MFMF PCPC

CMCM

Page 37: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Archives for dinosaurs, wolves and deers

In XML

Page 38: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Stanca’s repositories

ARCHITECTUREAND SOFTWARE

LOW COSTDTD’S

XML - SCHEMATA

Stanca will give also bonesto good dogs ?

Page 39: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Procurement for PA’s

CONSIPCONSIPEVERYTHING

FOR PA’S

PENCILS OSS

Page 40: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

COMPETENCE CENTERS

Page 41: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

SCHOOLS

Page 42: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

RESEARCH

If Moratti and Stanca saw a bone of chicken, Tremonti will find a

a skeleton ofdinosaur

Page 43: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Art.68 del decreto legge 82/05noto come “Codice dell'Amministrazione Digitale”

“1. Le pubbliche amministrazioni .....acquisiscono ....programmi informatici a seguito di una valutazione comparativa di tipo tecnico ed economico tra le seguenti soluzioni disponibili sul mercato:

.....

\d)\ acquisizione di programmi informatici a codice sorgente aperto;

......

2. Le pubbliche amministrazioni nella predisposizione o nella acquisizione dei programmi informatici adottano soluzioni informatiche che assicurano l'interoperabilità e la cooperazione a applicativa ....e che consentono la rappresentazione dei dati e documenti in più formati, di cui almeno uno di tipo aperto.”

Page 44: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Competitive tenders of Italian P.A.’s

Questa amministrazione intende acquisire una serie di biciclette della Scrooge Corp., modello Paperon III, alle condizioni previste dall'Accordo Quadro sottoscritto da CNIPA con la Societa` Scrooge Corp.......La Societa` Scrooge Corp. ha indicato i prezzi unitari di riferimento che portano acomplessivi 4.5 milioni di euro.......Possono partecipare alla gara esclusivamente i “Rivenditori” autorizzatida Scrooge Corp.

Page 45: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

3G$

1$

ITALIAN TRADE BALANCE OF SOFTWARE

Page 46: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

If you do not own Internet explorer, fuori

dalle

error

Page 47: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Utilizzo di OSS nella P.A.L.

Centro Italia

Comuni 26,1 50,8 42,3 31,9 34,4

Comunità Montane 33,1 54,5 42,7 24,8 35,6

Province 82,6 85 81 71,1 78,4

Regioni e Pr. Autonome 100 100 100 100 100

26,8 51,6 43,3 32,3 35,2

tipologie di amministrazioni locali

Nord-ovest

Nord-est

Mezzogiorno

Totale Amministrazioni locali

Page 48: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Utilizzo di OSS nella P.A.L.

DBMS

Comuni 53,8 30 49,2 29 43,9 22,3 39,6

49,9 26,7 47,1 35,5 48,5 22,5 36,7

Province 86,2 20 55 77,5 61,2 67,5 50

100 36,4 59,1 95,5 54,5 63,6 50

54,8 29,6 49,3 31,1 44,6 23,8 39,9

tipologie di PAL

sistema operativo su

server

sistema operativo su Pc desktop

office automation

Web server

posta elettronica

software di sicurezza

Comunità Montane

Regioni e Pr. Autonome

Totale PAL

Page 49: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

Nicolais’ committee

Page 50: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

OCCORRE:

1. sostenere la diffusione dell'OS all'interno della PA 2. elaborare linee guida normative supporti tecnici gruppi di eccellenza3. tutelare i responsabili dei sistemi informativi4. potenziare le community OS5. creare sinergie con Mussi e Bersani6. aggiornare eventualmente la precedente direttiva Stanca e il codice dell'amministrazione digitale

Page 51: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

From the ashes of Bassanini, Monti, Cortiana, Magnolfi, Stanca...emerges

Page 52: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!
Page 53: Section 1 THE ANCIENT HISTORY OF FREE SOFTWARE. Hack, hack, what are you doing? Just hacking!

The importance of WRITING

Autore: Livio FaniaLicenza: Creative Commons Attribution 2.5