Encontrar uma cópia on-line
Links para este item
Encontrar uma cópia na biblioteca
Encontrando bibliotecas que possuem este item...
|Formato Físico Adicional:||Print version:
Raymond, Eric S.
Cathedral & amp; the Bazaar : Musings on Linux and Open Source by an Accidental Revolutionary.
Sebastopol : O'Reilly Media, Inc., ©2001
|Tipo de Material:||Documento, Recurso Internet|
|Tipo de Documento:||Recurso Internet, Arquivo de Computador|
|Todos os Autores / Contribuintes:||
Eric S Raymond
|Descrição:||1 online resource (256 pages)|
|Conteúdos:||Table of Contents; Foreword; Preface: Why You Should Care; Chapter 1. A Brief History of Hackerdom; Prologue: The Real Programmers; The Early Hackers; The Rise of Unix; The End of Elder Day s; The Proprietary-Unix Era; The Early Free Unixes; The Great Web Explosion; Chapter 2. The Cathedral and the Bazaar; The Cathedral and the Bazaar; The Mail Must Get Through; The Importance of Having Users; Release Early, Release Often; Many Eyeballs Tame Complexity; When Is a Rose Not a Rose?; Popclient Becomes Fetchmail; Fetchmail Grows Up; A Few More Lessons from Fetchmail. Necessary Preconditions for the Bazaar StyleThe Social Context of Open-Source Software; On Management and the Maginot Line; Epilog: Netscape Embraces the Bazaar; Chapter 3. Homesteading the Noosphere; An Introductory Contradiction; The Varieties of Hacker Ideology; Promiscuous Theory, Puritan Practice; Ownership and Open Source; Locke and Land Title; The Hacker Milieu as Gift Culture; The Joy of Hacking; The Many Faces of Reputation; Ownership Rights and Reputation Incentives; The Problem of Ego; The Value of Humility; Global Implications of the Reputation-Game Model; How Fine a Gift? Noospheric Property and the Ethology of TerritoryCauses of Conflict; Project Structures and Ownership; Conflict and Conflict Resolution; Acculturation Mechanisms and the Link to Academia; Gift Outcompetes Exchange; Conclusion: From Custom to Customary Law; Questions for Further Research; Chapter 4. The Magic Cauldron; Indistinguishable from Magic; Beyond Geeks Bearing Gifts; The Manufacturing Delusion; The ''Information Wants to Be Free'' Myth; Reasons for Closing Source; Use-Value Funding Models; Why Sale Value Is Problematic; Indirect Sale-Value Models; When to Be Open, When to Be Closed. Open Source as a Strategic WeaponOpen Source and Strategic Business Risk; The Business Ecology of Open Source; Coping with Success; Open R & amp;D and the Reinvention of Patronage; Getting There from Here; Conclusion: Life After the Revolution; Afterword: Why Closing a Drivers Loses Its Vendor Money; Chapter 5. Revenge of the Hackers; Revenge of the Hackers; Beyond Brooks's Law; Memes and Mythmaking; The Road to Mountain View; The Origins of 'Open Source'; The Accidental Revolutionary; Phases of the Campaign; The Facts on the Ground; Into the Future; Afterword: Beyond Software? Appendix A. How to Become a HackerWhy This Document?; What Is a Hacker?; The Hacker Attitude; Basic Hacking Skills; Status in the Hacker Culture; The Hacker/Nerd Connection; Points for Style; Other Resources; Frequently Asked Questions; Appendix B. Statistical Trends in the Fetchmail Project's Growth; Notes, Bibliography, and Acknowledgments; A Brief History of Hackerdom; The Cathedral and the Bazaar; Homesteading the Noosphere; The Magic Cauldron; For Further Reading; Index; Colophon.|