The cathedral and the bazaar musings on Linux and Open Source by an accidental revolutionary

Open source provides the competitive advantage in the Internet Age. According to the August Forrester Report, 56 percent of IT managers interviewed at Global 2,500 companies are already using some type of open source software in their infrastructure and another 6 percent will install it in the n...

Full description

Bibliographic Details
Main Author: Raymond, Eric S. (-)
Format: eBook
Language:Inglés
Published: Sebastopol, California : O'Reilly 2001.
Edition:Revised and expanded edition
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627057306719
Table of Contents:
  • Table of Contents; Foreword; Preface: Why You Should Care; Chapter 1. A Brief History of Hackerdom; Prologue: The Real Programmers; The Early Hackers; The Rise of Unix; The End of Elder Day s; The Proprietary-Unix Era; The Early Free Unixes; The Great Web Explosion; Chapter 2. The Cathedral and the Bazaar; The Cathedral and the Bazaar; The Mail Must Get Through; The Importance of Having Users; Release Early, Release Often; Many Eyeballs Tame Complexity; When Is a Rose Not a Rose?; Popclient Becomes Fetchmail; Fetchmail Grows Up; A Few More Lessons from Fetchmail
  • Necessary Preconditions for the Bazaar StyleThe Social Context of Open-Source Software; On Management and the Maginot Line; Epilog: Netscape Embraces the Bazaar; Chapter 3. Homesteading the Noosphere; An Introductory Contradiction; The Varieties of Hacker Ideology; Promiscuous Theory, Puritan Practice; Ownership and Open Source; Locke and Land Title; The Hacker Milieu as Gift Culture; The Joy of Hacking; The Many Faces of Reputation; Ownership Rights and Reputation Incentives; The Problem of Ego; The Value of Humility; Global Implications of the Reputation-Game Model; How Fine a Gift?
  • Noospheric Property and the Ethology of TerritoryCauses of Conflict; Project Structures and Ownership; Conflict and Conflict Resolution; Acculturation Mechanisms and the Link to Academia; Gift Outcompetes Exchange; Conclusion: From Custom to Customary Law; Questions for Further Research; Chapter 4. The Magic Cauldron; Indistinguishable from Magic; Beyond Geeks Bearing Gifts; The Manufacturing Delusion; The ''Information Wants to Be Free'' Myth; Reasons for Closing Source; Use-Value Funding Models; Why Sale Value Is Problematic; Indirect Sale-Value Models; When to Be Open, When to Be Closed
  • Open Source as a Strategic WeaponOpen Source and Strategic Business Risk; The Business Ecology of Open Source; Coping with Success; Open R&D and the Reinvention of Patronage; Getting There from Here; Conclusion: Life After the Revolution; Afterword: Why Closing a Drivers Loses Its Vendor Money; Chapter 5. Revenge of the Hackers; Revenge of the Hackers; Beyond Brooks's Law; Memes and Mythmaking; The Road to Mountain View; The Origins of 'Open Source'; The Accidental Revolutionary; Phases of the Campaign; The Facts on the Ground; Into the Future; Afterword: Beyond Software?
  • Appendix A. How to Become a HackerWhy This Document?; What Is a Hacker?; The Hacker Attitude; Basic Hacking Skills; Status in the Hacker Culture; The Hacker/Nerd Connection; Points for Style; Other Resources; Frequently Asked Questions; Appendix B. Statistical Trends in the Fetchmail Project's Growth; Notes, Bibliography, and Acknowledgments; A Brief History of Hackerdom; The Cathedral and the Bazaar; Homesteading the Noosphere; The Magic Cauldron; For Further Reading; Index; Colophon