Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
The Cathedral & the Bazaar
SPECIAL OFFER: Upgrade this ebook with O’Reilly
Dedication
Foreword
Preface: Why You Should Care
Revision Notes for the Second Edition
1. A Brief History of Hackerdom
Prologue: The Real Programmers
The Early Hackers
The Rise of Unix
The End of Elder Days
The Proprietary-Unix Era
The Early Free Unixes
The Great Web Explosion
2. The Cathedral and the Bazaar
The Cathedral and the Bazaar
The Mail Must Get Through
The Importance of Having Users
Release Early, Release Often
How Many Eyeballs Tame Complexity
When Is a Rose Not a Rose?
Popclient becomes Fetchmail
Fetchmail Grows Up
A Few More Lessons from Fetchmail
Necessary Preconditions for the Bazaar Style
The Social Context of Open-Source Software
On Management and the Maginot Line
Epilog: Netscape Embraces the Bazaar
3. Homesteading the Noosphere
An Introductory Contradiction
The Varieties of Hacker Ideology
Promiscuous Theory, Puritan Practice
Ownership and Open Source
Locke and Land Title
The Hacker Milieu as Gift Culture
The Joy of Hacking
The Many Faces of Reputation
Ownership Rights and Reputation Incentives
The Problem of Ego
The Value of Humility
Global Implications of the Reputation-Game Model
How Fine a Gift?
Noospheric Property and the Ethology of Territory
Causes of Conflict
Project Structures and Ownership
Conflict and Conflict Resolution
Acculturation Mechanisms and the Link to Academia
Gift Outcompetes Exchange
Conclusion: From Custom to Customary Law
Questions for Further Research
4. The Magic Cauldron
Indistinguishable From Magic
Beyond Geeks Bearing Gifts
The Manufacturing Delusion
The Information Wants to be Free Myth
The Inverse Commons
Reasons for Closing Source
Use-Value Funding Models
The Apache Case: Cost-Sharing
The Cisco Case: Risk-Spreading
Why Sale Value is Problematic
Indirect Sale-Value Models
Loss-Leader/Market Positioner
Widget Frosting
Give Away the Recipe, Open a Restaurant
Accessorizing
Free the Future, Sell the Present
Free the Software, Sell the Brand
Free the Software, Sell the Content
When to be Open, When to be Closed
What Are the Payoffs?
How Do They Interact?
Doom: A Case Study
Knowing When to Let Go
Open Source as a Strategic Weapon
Cost-sharing as a competitive weapon
Resetting the competition
Growing the pond
Preventing a choke hold
Open Source and Strategic Business Risk
The Business Ecology of Open Source
Coping with Success
Open R&D and the Reinvention of Patronage
Getting There From Here
Conclusion: Life after the Revolution
Afterword: Why Closing a Drivers Loses Its Vendor Money
5. Revenge of the Hackers
Revenge of the Hackers
Beyond Brooks's Law
Memes and Mythmaking
The Road to Mountain View
The Origins of Open Source
Forget Bottom-Up; Work on Top-Down
Linux is Our Best Demonstration Case
Capture the Fortune 500
Co-opt the Prestige Media that Serve the Fortune 500
Educate Hackers in Guerrilla Marketing Tactics
Use the Open Source Certification Mark to Keep Things Pure
The Accidental Revolutionary
Phases of the Campaign
The Facts on the Ground
Into the Future
6. Afterword: Beyond Software?
A. How to Become a Hacker
Why This Document?
What Is a Hacker?
The Hacker Attitude
Basic Hacking Skills
Status in the Hacker Culture
The Hacker/Nerd Connection
Points For Style
Other Resources
Frequently Asked Questions
B. Statistical Trends in the Fetchmail Project's Growth
C. Notes, Bibliography, and Acknowledgements
A Brief History of Hackerdom
Notes
Note 1
Note 2
Note 3
The Cathedral and the Bazaar
Notes
Note 4
Note 5
Note 6
Note 7
Note 8
Note 9
Note 10
Note 11
Note 12
Note 13
Bibliography
Acknowledgements
Homesteading the Noosphere
Notes
Note 14
Note 15
Note 16
Note 17
Note 18
Note 19
Note 20
Note 21
Note 22
Note 23
Note 24
Note 25
Bibliography
Note 26
Note 27
Note 28
Note 29
Note 30
Acknowledgements
The Magic Cauldron
Notes
Note 31
Note 32
Note 33
Note 34
Note 35
Bibliography
Note 36
Note 37
Note 38
Acknowledgements
For Further Reading:
Index
Colophon
SPECIAL OFFER: Upgrade this ebook with O’Reilly
← Prev
Back
Next →
← Prev
Back
Next →