Find a copy online
Links to this item
Find a copy in the library
Finding libraries that hold this item...
|Additional Physical Format:||Print version:
Raymond, Eric S.
The Cathedral & the Bazaar : Musings on Linux and Open Source by an Accidental Revolutionary
Sebastopol : O'Reilly Media, Inc.,c2001
|Material Type:||Document, Internet resource|
|Document Type:||Internet Resource, Computer File|
|All Authors / Contributors:||
Eric S Raymond
|Notes:||Description based upon print version of record.|
|Description:||1 online resource (256 p.)|
|Contents:||Table of Contents; Foreword; Preface: Why You Should Care; Chapter 1. A Brief History of Hackerdom; Prologue: The Real Programmers; The Early Hackers; The Rise of Unix; The End of Elder Day s; The Proprietary-Unix Era; The Early Free Unixes; The Great Web Explosion; Chapter 2. The Cathedral and the Bazaar; The Cathedral and the Bazaar; The Mail Must Get Through; The Importance of Having Users; Release Early, Release Often; Many Eyeballs Tame Complexity; When Is a Rose Not a Rose?; Popclient Becomes Fetchmail; Fetchmail Grows Up; A Few More Lessons from Fetchmail Necessary Preconditions for the Bazaar StyleThe Social Context of Open-Source Software; On Management and the Maginot Line; Epilog: Netscape Embraces the Bazaar; Chapter 3. Homesteading the Noosphere; An Introductory Contradiction; The Varieties of Hacker Ideology; Promiscuous Theory, Puritan Practice; Ownership and Open Source; Locke and Land Title; The Hacker Milieu as Gift Culture; The Joy of Hacking; The Many Faces of Reputation; Ownership Rights and Reputation Incentives; The Problem of Ego; The Value of Humility; Global Implications of the Reputation-Game Model; How Fine a Gift? Noospheric Property and the Ethology of TerritoryCauses of Conflict; Project Structures and Ownership; Conflict and Conflict Resolution; Acculturation Mechanisms and the Link to Academia; Gift Outcompetes Exchange; Conclusion: From Custom to Customary Law; Questions for Further Research; Chapter 4. The Magic Cauldron; Indistinguishable from Magic; Beyond Geeks Bearing Gifts; The Manufacturing Delusion; The ''Information Wants to Be Free'' Myth; Reasons for Closing Source; Use-Value Funding Models; Why Sale Value Is Problematic; Indirect Sale-Value Models; When to Be Open, When to Be Closed Open Source as a Strategic WeaponOpen Source and Strategic Business Risk; The Business Ecology of Open Source; Coping with Success; Open R&D and the Reinvention of Patronage; Getting There from Here; Conclusion: Life After the Revolution; Afterword: Why Closing a Drivers Loses Its Vendor Money; Chapter 5. Revenge of the Hackers; Revenge of the Hackers; Beyond Brooks's Law; Memes and Mythmaking; The Road to Mountain View; The Origins of 'Open Source'; The Accidental Revolutionary; Phases of the Campaign; The Facts on the Ground; Into the Future; Afterword: Beyond Software? Appendix A. How to Become a HackerWhy This Document?; What Is a Hacker?; The Hacker Attitude; Basic Hacking Skills; Status in the Hacker Culture; The Hacker/Nerd Connection; Points for Style; Other Resources; Frequently Asked Questions; Appendix B. Statistical Trends in the Fetchmail Project's Growth; Notes, Bibliography, and Acknowledgments; A Brief History of Hackerdom; The Cathedral and the Bazaar; Homesteading the Noosphere; The Magic Cauldron; For Further Reading; Index; Colophon|