Michael De Roover 40ea62567f | ||
---|---|---|
ch1 | ||
ch2 | ||
ch3 | ||
ch4 | ||
ch5 | ||
afterword.md | ||
intro.md | ||
readme.md |
readme.md
The Cathedral and the Bazaar
This is a book that was written by Eric S. Raymond, which you can read the original (and probably more up-to-date) version of here. It is released under the Open Publication License version 2.0. This mirror exists as an attempt to be easier to read and navigate.
You can start reading the book here.
Table of Contents
A Brief History of Hackerdom
- Prologue: The Real Programmers
- The Early Hackers
- The Rise of Unix
- The End of Elder Days
- The Proprietary-Unix Era
- The Early Free Unixes
- The Great Web Explosion
- Bibliography
The Cathedral and the Bazaar
- The Cathedral and the Bazaar
- The Mail Must Get Through
- The Importance of Having Users
- Release Early, Release Often
- How Many Eyeballs Tame Complexity
- When Is a Rose Not a Rose?
- Popclient becomes Fetchmail
- Fetchmail Grows Up
- A Few More Lessons from Fetchmail
- Necessary Preconditions for the Bazaar Style
- The Social Context of Open-Source Software
- On Management and the Maginot Line
- Epilog: Netscape Embraces the Bazaar
- Notes
- Bibliography
Homesteading the Noosphere
- An Introductory Contradiction
- The Varieties of Hacker Ideology
- Promiscuous Theory, Puritan Practice
- Ownership and Open Source
- Locke and Land Title
- The Hacker Milieu as Gift Culture
- The Joy of Hacking
- The Many Faces of Reputation
- Ownership Rights and Reputation Incentives
- The Problem of Ego
- The Value of Humility
- Global Implications of the Reputation-Game Model
- How Fine a Gift?
- Noospheric Property and the Ethology of Territory
- Causes of Conflict
- Project Structures and Ownership
- Conflict and Conflict Resolution
- Acculturation Mechanisms and the Link to Academia
- Gift Outcompetes Exchange
- Conclusion: From Custom to Customary Law
- Questions for Further Research
- Notes
- Bibliography
- Acknowledgements
The Magic Cauldron
- Indistinguishable From Magic
- Beyond Geeks Bearing Gifts
- The Manufacturing Delusion
- The "Information Wants to be Free" Myth
- The Inverse Commons
- Reasons for Closing Source
- Use-Value Funding Models
- Why Sale Value is Problematic
- Indirect Sale-Value Models
- When to be Open, When to be Closed
- Open Source as a Strategic Weapon
- Open Source as a Strategic Business Risk
- The Business Ecology of Open Source
- Coping with Success
- Open R&D and the Reinvention of Patronage
- Getting There From Here
- Conclusion: Life after the Revolution
- Afterword: Why Closing a Driver Loses Its Vendor Money
- Notes
- Bibliography
- Acknowledgements
Revenge of the Hackers
- Revenge of the Hackers
- Beyond Brooks's Law
- Memes and Mythmaking
- The Road to Mountain View
- The Origins of 'Open Source'
- The Accidental Revolutionary
- Phases of the Campaign
- The Facts on the Ground
- Into the Future
Afterword