The Cathedral & the Bazaar
Musings on Linux and Open Source by an Accidental Revolutionary
Publisher: O'Reilly Media
Release Date: July 2008
Pages: 256
Read on Safari with a 10-day trial
Start your free trial now Buy on AmazonWhere’s the cart? Now you can get everything on Safari. To purchase books, visit Amazon or your favorite retailer. Questions? See our FAQ or contact customer service:
1-800-889-8969 / 707-827-7019
support@oreilly.com
Table of Contents
-
Chapter 1 A Brief History of Hackerdom
-
Prologue: The Real Programmers
-
The Early Hackers
-
The Rise of Unix
-
The End of Elder Days
-
The Proprietary-Unix Era
-
The Early Free Unixes
-
The Great Web Explosion
-
-
Chapter 2 The Cathedral and the Bazaar
-
The Cathedral and the Bazaar
-
The Mail Must Get Through
-
The Importance of Having Users
-
Release Early, Release Often
-
How Many Eyeballs Tame Complexity
-
When Is a Rose Not a Rose?
-
Popclient becomes Fetchmail
-
Fetchmail Grows Up
-
A Few More Lessons from Fetchmail
-
Necessary Preconditions for the Bazaar Style
-
The Social Context of Open-Source Software
-
On Management and the Maginot Line
-
Epilog: Netscape Embraces the Bazaar
-
-
Chapter 3 Homesteading the Noosphere
-
An Introductory Contradiction
-
The Varieties of Hacker Ideology
-
Promiscuous Theory, Puritan Practice
-
Ownership and Open Source
-
Locke and Land Title
-
The Hacker Milieu as Gift Culture
-
The Joy of Hacking
-
The Many Faces of Reputation
-
Ownership Rights and Reputation Incentives
-
The Problem of Ego
-
The Value of Humility
-
Global Implications of the Reputation-Game Model
-
How Fine a Gift?
-
Noospheric Property and the Ethology of Territory
-
Causes of Conflict
-
Project Structures and Ownership
-
Conflict and Conflict Resolution
-
Acculturation Mechanisms and the Link to Academia
-
Gift Outcompetes Exchange
-
Conclusion: From Custom to Customary Law
-
Questions for Further Research
-
-
Chapter 4 The Magic Cauldron
-
Indistinguishable From Magic
-
Beyond Geeks Bearing Gifts
-
The Manufacturing Delusion
-
The Information Wants to be Free Myth
-
The Inverse Commons
-
Reasons for Closing Source
-
Use-Value Funding Models
-
Why Sale Value is Problematic
-
Indirect Sale-Value Models
-
When to be Open, When to be Closed
-
Open Source as a Strategic Weapon
-
Open Source and Strategic Business Risk
-
The Business Ecology of Open Source
-
Coping with Success
-
Open R&D and the Reinvention of Patronage
-
Getting There From Here
-
Conclusion: Life after the Revolution
-
Afterword: Why Closing a Drivers Loses Its Vendor Money
-
-
Chapter 5 Revenge of the Hackers
-
Revenge of the Hackers
-
Beyond Brooks's Law
-
Memes and Mythmaking
-
The Road to Mountain View
-
The Origins of Open Source
-
The Accidental Revolutionary
-
Phases of the Campaign
-
The Facts on the Ground
-
Into the Future
-
-
Chapter 6 Afterword: Beyond Software?
-
Appendix How to Become a Hacker
-
Why This Document?
-
What Is a Hacker?
-
The Hacker Attitude
-
Basic Hacking Skills
-
Status in the Hacker Culture
-
The Hacker/Nerd Connection
-
Points For Style
-
Other Resources
-
Frequently Asked Questions
-
-
Appendix Statistical Trends in the Fetchmail Project's Growth
-
Appendix Notes, Bibliography, and Acknowledgements
-
A Brief History of Hackerdom
-
The Cathedral and the Bazaar
-
Homesteading the Noosphere
-
The Magic Cauldron
-
For Further Reading:
-
-
Colophon