Books & Videos

Table of Contents

  1. Chapter 1 A Brief History of Hackerdom

    1. Prologue: The Real Programmers

    2. The Early Hackers

    3. The Rise of Unix

    4. The End of Elder Days

    5. The Proprietary-Unix Era

    6. The Early Free Unixes

    7. The Great Web Explosion

  2. Chapter 2 The Cathedral and the Bazaar

    1. The Cathedral and the Bazaar

    2. The Mail Must Get Through

    3. The Importance of Having Users

    4. Release Early, Release Often

    5. How Many Eyeballs Tame Complexity

    6. When Is a Rose Not a Rose?

    7. Popclient becomes Fetchmail

    8. Fetchmail Grows Up

    9. A Few More Lessons from Fetchmail

    10. Necessary Preconditions for the Bazaar Style

    11. The Social Context of Open-Source Software

    12. On Management and the Maginot Line

    13. Epilog: Netscape Embraces the Bazaar

  3. Chapter 3 Homesteading the Noosphere

    1. An Introductory Contradiction

    2. The Varieties of Hacker Ideology

    3. Promiscuous Theory, Puritan Practice

    4. Ownership and Open Source

    5. Locke and Land Title

    6. The Hacker Milieu as Gift Culture

    7. The Joy of Hacking

    8. The Many Faces of Reputation

    9. Ownership Rights and Reputation Incentives

    10. The Problem of Ego

    11. The Value of Humility

    12. Global Implications of the Reputation-Game Model

    13. How Fine a Gift?

    14. Noospheric Property and the Ethology of Territory

    15. Causes of Conflict

    16. Project Structures and Ownership

    17. Conflict and Conflict Resolution

    18. Acculturation Mechanisms and the Link to Academia

    19. Gift Outcompetes Exchange

    20. Conclusion: From Custom to Customary Law

    21. Questions for Further Research

  4. Chapter 4 The Magic Cauldron

    1. Indistinguishable From Magic

    2. Beyond Geeks Bearing Gifts

    3. The Manufacturing Delusion

    4. The Information Wants to be Free Myth

    5. The Inverse Commons

    6. Reasons for Closing Source

    7. Use-Value Funding Models

    8. Why Sale Value is Problematic

    9. Indirect Sale-Value Models

    10. When to be Open, When to be Closed

    11. Open Source as a Strategic Weapon

    12. Open Source and Strategic Business Risk

    13. The Business Ecology of Open Source

    14. Coping with Success

    15. Open R&D and the Reinvention of Patronage

    16. Getting There From Here

    17. Conclusion: Life after the Revolution

    18. Afterword: Why Closing a Drivers Loses Its Vendor Money

  5. Chapter 5 Revenge of the Hackers

    1. Revenge of the Hackers

    2. Beyond Brooks's Law

    3. Memes and Mythmaking

    4. The Road to Mountain View

    5. The Origins of Open Source

    6. The Accidental Revolutionary

    7. Phases of the Campaign

    8. The Facts on the Ground

    9. Into the Future

  6. Chapter 6 Afterword: Beyond Software?

  1. Appendix How to Become a Hacker

    1. Why This Document?

    2. What Is a Hacker?

    3. The Hacker Attitude

    4. Basic Hacking Skills

    5. Status in the Hacker Culture

    6. The Hacker/Nerd Connection

    7. Points For Style

    8. Other Resources

    9. Frequently Asked Questions

  2. Appendix Statistical Trends in the Fetchmail Project's Growth

  3. Appendix Notes, Bibliography, and Acknowledgements

    1. A Brief History of Hackerdom

    2. The Cathedral and the Bazaar

    3. Homesteading the Noosphere

    4. The Magic Cauldron

    5. For Further Reading:

  4. Colophon