Open Source Software Development: an Overview
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How to Use the Database Server Babbage.Cs.Abo.Fi a Mysql Database Server for Those Attending This Year's Course Is Installed on the Server Babbage.Cs.Abo.Fi
How to use the database server babbage.cs.abo.fi A MySQL database server for those attending this year's course is installed on the server babbage.cs.abo.fi. All the users are allowed to see all the databases there. A user has all priviledges to those databases that are called username_database. If your username is xxxx, you can create, change and drop (delete) databases calles xxxx_bank, xxxx_jobs, xxxx_courses etc. This is how you work with the system: You log on to babbage.cs.abo.fi using your normal userID and Unix-password (if you have not defined a separate password for unix, it is the same as your Windows password). You can use a communication program such as Putty och ssh Secure Shell, or just sit at one of the computers in the Linux-class (the penguin class) and use a terminal window. You get one by clicking the right mouse button and choosing Konsole. Or you can click the F-icon (lower left corner), the choose Applications, then Utilities, then Terminal. When you have this terminal window, you must use Linux-commands. You type the commands and push “enter”. Mouse-clicks do not work here. This is how you connect to babbage: ssh [email protected] Inside Åbo Akademi, using our network, it is enought to write ssh babbage From home or elsewhere, you must access babbage from tuxedo.abo.fi. First log onto tuxedo (normal userID, normal password), then write ssh [email protected] The computer now asks your password, and you give it the same Windows password. -
Oracle® Tuxedo Installing the Oracle Tuxedo Application Runtimes 12C Release 2 (12.1.3)
Oracle® Tuxedo Installing the Oracle Tuxedo Application Runtimes 12c Release 2 (12.1.3) April 2014 Installing the Oracle Tuxedo Application Runtimes, 12c Release 2 (12.1.3) Copyright © 1996, 2014, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. -
Behavior Based Software Theft Detection, CCS 2009
Behavior Based Software Theft Detection 1Xinran Wang, 1Yoon-Chan Jhi, 1,2Sencun Zhu, and 2Peng Liu 1Department of Computer Science and Engineering 2College of Information Sciences and Technology Pennsylvania State University, University Park, PA 16802 {xinrwang, szhu, jhi}@cse.psu.edu, [email protected] ABSTRACT (e.g., in SourceForge.net there were over 230,000 registered Along with the burst of open source projects, software open source projects as of Feb.2009), software theft has be- theft (or plagiarism) has become a very serious threat to the come a very serious concern to honest software companies healthiness of software industry. Software birthmark, which and open source communities. As one example, in 2005 it represents the unique characteristics of a program, can be was determined in a federal court trial that IBM should pay used for software theft detection. We propose a system call an independent software vendor Compuware $140 million dependence graph based software birthmark called SCDG to license its software and $260 million to purchase its ser- birthmark, and examine how well it reflects unique behav- vices [1] because it was discovered that certain IBM products ioral characteristics of a program. To our knowledge, our contained code from Compuware. detection system based on SCDG birthmark is the first one To protect software from theft, Collberg and Thoborson that is capable of detecting software component theft where [10] proposed software watermark techniques. Software wa- only partial code is stolen. We demonstrate the strength of termark is a unique identifier embedded in the protected our birthmark against various evasion techniques, including software, which is hard to remove but easy to verify. -
\", 22 \', 22 \(, 31, 32 \), 31, 32 \-, 26 \., 22 \=, 22 \[, 32 \], 32 \ˆ, 21, 22 \`, 22
i i i ‘beginlatex’ --- 2018/12/4 --- 23:30 --- page 289 --- #325 i Index Index See Table 2 on page xxx for the meanings of the typographic formatting used here and in the text. \", 22 \ae, 22 \', 22 \affiliation, 42 \(, 31, 32 afm2tfm, 234 \), 31, 32 textbf, 17 \-, 26 Apple Mac \., 22 editor, 189, 194 /p, 236 installation, 189 \=, 22 apt, 190 \@, 162, 164 apt-get, xxvi \[, 32 Aquamacs, 222 \], 32 \arabic, 170 \ˆ, 21, 22 ArcInfo, 96 \`, 22 textbf, 13 \ , 21, 22 array, 85 \arraybackslash, 85 10pt, 37 \arraystretch, 87 11pt, 37 article, 11, 35 12pt, 11, 37 \author, xxx, 42–44, 108, 162 AutoCAD, 95 a4paper, 36, 38 avant, 143 \AA, 22 \aa, 22 b, 100 AbiWord, 175, 177, 178 \b, 22 abstract, 44, 45 babel, 20, 30, 50, 120 \abstractname, 45 textbf, 9 abstracts, 44 textbf, 254 accents, 19 BaKoMa TEX, xxix Acrobat Reader, 185, 194, 222, 258 \baselinestretch, 133 acronym, 126 bbding, 73, 171 \addbibresource, 120 beer, 123 \addcontentsline, 52 lite, 123 \addtocontents, 53 American, 123 \AE, 22 Rogue £ Formatting Information ¢ 289 ¡ i i i i i i i ‘beginlatex’ --- 2018/12/4 --- 23:30 --- page 290 --- #326 i FORMATTING INFORMATION Chocolate Stout, 124 \centering, 29, 85, 87, 148 \begin, 20, 40, 41, 45, 74, 82, cep, 93 163, 180 chancery, 143 \bfseries, 12, 149 textbf, 247 biber, ix, 5, 19, 62, 112–114, 120– \chapter, 47, 48 122, 125 chapter, 170 biber, 247, 249 characters BIBINPUTS, 116 accented, 19 biblatex, 5, 112, 113 ASCII, 267 biblatex, ix, 5, 19, 112–114, 116– math, 31 121 special, 15, 31 biblatex-apa, 114 charmap, 21 biblatex-cheatsheet, 114 charter, -
Rkward: a Comprehensive Graphical User Interface and Integrated Development Environment for Statistical Analysis with R
JSS Journal of Statistical Software June 2012, Volume 49, Issue 9. http://www.jstatsoft.org/ RKWard: A Comprehensive Graphical User Interface and Integrated Development Environment for Statistical Analysis with R Stefan R¨odiger Thomas Friedrichsmeier Charit´e-Universit¨atsmedizin Berlin Ruhr-University Bochum Prasenjit Kapat Meik Michalke The Ohio State University Heinrich Heine University Dusseldorf¨ Abstract R is a free open-source implementation of the S statistical computing language and programming environment. The current status of R is a command line driven interface with no advanced cross-platform graphical user interface (GUI), but it includes tools for building such. Over the past years, proprietary and non-proprietary GUI solutions have emerged, based on internal or external tool kits, with different scopes and technological concepts. For example, Rgui.exe and Rgui.app have become the de facto GUI on the Microsoft Windows and Mac OS X platforms, respectively, for most users. In this paper we discuss RKWard which aims to be both a comprehensive GUI and an integrated devel- opment environment for R. RKWard is based on the KDE software libraries. Statistical procedures and plots are implemented using an extendable plugin architecture based on ECMAScript (JavaScript), R, and XML. RKWard provides an excellent tool to manage different types of data objects; even allowing for seamless editing of certain types. The objective of RKWard is to provide a portable and extensible R interface for both basic and advanced statistical and graphical analysis, while not compromising on flexibility and modularity of the R programming environment itself. Keywords: GUI, integrated development environment, plugin, R. -
Oracle Databases on Vmware Best Practices Guide Provides Best Practice Guidelines for Deploying Oracle Databases on Vmware Vsphere®
VMware Hybrid Cloud Best Practices Guide for Oracle Workloads Version 1.0 May 2016 © 2016 VMware, Inc. All rights reserved. Page 1 of 81 © 2016 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94304 www.vmware.com © 2016 VMware, Inc. All rights reserved. Page 2 of 81 VMware Hybrid Cloud Best Practices Guide for Oracle Workloads Contents 1. Introduction ...................................................................................... 9 2. vSphere ......................................................................................... 10 3. VMware Support for Oracle Databases on vSphere ....................... 11 3.1 VMware Oracle Support Policy .................................................................................... 11 3.2 VMware Oracle Support Process................................................................................. 12 4. Server Guidelines .......................................................................... 13 4.1 General Guidelines ...................................................................................................... 13 4.2 Hardware Assisted Virtualization ................................................................................ -
Peer Participation and Software
Peer Participation and Software This report was made possible by the grants from the John D. and Cath- erine T. MacArthur Foundation in connection with its grant-making initiative on Digital Media and Learning. For more information on the initiative visit www.macfound.org. The John D. and Catherine T. MacArthur Foundation Reports on Digital Media and Learning Peer Participation and Software: What Mozilla Has to Teach Government by David R. Booth The Future of Learning Institutions in a Digital Age by Cathy N. Davidson and David Theo Goldberg with the assistance of Zoë Marie Jones The Future of Thinking: Learning Institutions in a Digital Age by Cathy N. Davidson and David Theo Goldberg with the assistance of Zoë Marie Jones New Digital Media and Learning as an Emerging Area and “Worked Examples” as One Way Forward by James Paul Gee Living and Learning with New Media: Summary of Findings from the Digital Youth Project by Mizuko Ito, Heather Horst, Matteo Bittanti, danah boyd, Becky Herr-Stephenson, Patricia G. Lange, C. J. Pascoe, and Laura Robinson with Sonja Baumer, Rachel Cody, Dilan Mahendran, Katynka Z. Martínez, Dan Perkel, Christo Sims, and Lisa Tripp Young People, Ethics, and the New Digital Media: A Synthesis from the GoodPlay Project by Carrie James with Katie Davis, Andrea Flores, John M. Francis, Lindsay Pettingill, Margaret Rundle, and Howard Gardner Confronting the Challenges of Participatory Culture: Media Education for the 21st Century by Henry Jenkins (P.I.) with Ravi Purushotma, Margaret Weigel, Katie Clinton, and Alice J. Robison The Civic Potential of Video Games by Joseph Kahne, Ellen Middaugh, and Chris Evans Peer Production and Software What Mozilla Has to Teach Government David R. -
Jetnet/TUXEDO Installation This Software Manual Is Documentation for Panthert
JetNet/TUXEDO Installation This software manual is documentation for Panthert. It is as accurate as possible at this time; however, both this manual and Panther itself are subject to revision. Prolifics and JAM are registered trademarks and JAM/TPi and Panther are trademarks of JYACC, Inc. BEA TUXEDO is a registered trademark and BEA WebLogic Enterprise is a trademark of BEA Systems, Inc. DynaText is a registered trademark of Inso Corporation. FLEXlm is a registered trademark of GLOBEtrotter Software, Inc. HP is a trademark of Hewlett-Packard Company. INFORMIX and C-ISAM are registered trademarks of Informix Software, Inc. IBM, DB2, and RISC System/6000 are registered trademarks and CICS is a trademark of International Business Machines Corporation. Microsoft, MS-DOS, Windows, Windows NT, SQL Server, ActiveX, and Visual C++ are registered trade- marks and Microsoft Windows 95, Authenticode, Microsoft Transaction Server, Microsoft Access, Micro- soft Internet Explorer, Microsoft Internet Information Server, Microsoft Management Console, and Micro- soft Open Database Connectivity are trademarks of Microsoft Corporation. Motif is a trademark of the Open Software Foundation, Inc. Oracle and SQL*Net are registered trademarks and Oracle7, Oracle8, PL/SQL, Pro*C, Rdb7, and Rdb8 are trademarks of Oracle Corporation. Netscape and Netscape Navigator, and Netscape Fast Track Server are registered trademarks of Netscape Communications Corporation. Sun, SunOS, Solaris, JavaScript, JDK, and Java are trademarks and Sun Workstation is a registered trade- mark of Sun Microsystems, Inc. SYBASE is a registered trademark and Client-Library and DB-Library are trademarks of Sybase, Inc. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company Limited. -
John F. Kennedy School of Government Harvard University Faculty Research Working Papers Series
John F. Kennedy School of Government Harvard University Faculty Research Working Papers Series Code as Governance, The Governance of Code Serena Syme and L. Jean Camp April 2001 RWP01-014 The views expressed in the KSG Faculty Research Working Paper Series are those of the author(s) and do not necessarily reflect those of the John F. Kennedy School of Government or Harvard University. All works posted here are owned and copyrighted by the author(s). Papers may be downloaded for personal use only. THE GOVERNANCE OF CODE: CODE AS GOVERNANCE Page: 1 THE GOVERNANCE OF CODE: CODE AS GOVERNANCE Serena Syme1 L. Jean Camp2 Masters of Public Policy Assistant Professor Kennedy School of Government Kennedy School of Government Harvard University Harvard University Cambridge, MA 02138 Cambridge, MA 02138 [email protected] [email protected] 617-596-4738 617-496-6331 www.ljean.net The governance of a network society is tightly bound to the nature of property rights created for information. The establishment of a market involves the development of a bundle of rights that both create property and define the rules under which property-based transactions might occur. The fundamental thesis of this work is that the creation of property through licensing offers different views of the governance of the network society. Thus this article offers distinct views of the network society drawn from examinations of the various forms of governance currently applied to code, namely: open code licensing, public domain code, proprietary licenses, and the Uniform Computer Information Transactions Act (UCITA). The open code licenses addressed here are the GNU Public License, the BSD license, the artistic license, and the Mozilla license. -
Oracle® Tuxedo Programming an Oracle Tuxedo Application Using Java 12C Release 1 (12.1.1)
Oracle® Tuxedo Programming an Oracle Tuxedo Application Using Java 12c Release 1 (12.1.1) June 2012 Oracle Tuxedo Programming an Oracle Tuxedo Application Using Java, 12c Release 1 (12.1.1) Copyright © 1996, 2012, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. -
Coleman-Coding-Freedom.Pdf
Coding Freedom !" Coding Freedom THE ETHICS AND AESTHETICS OF HACKING !" E. GABRIELLA COLEMAN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright © 2013 by Princeton University Press Creative Commons Attribution- NonCommercial- NoDerivs CC BY- NC- ND Requests for permission to modify material from this work should be sent to Permissions, Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TW press.princeton.edu All Rights Reserved At the time of writing of this book, the references to Internet Web sites (URLs) were accurate. Neither the author nor Princeton University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. Library of Congress Cataloging-in-Publication Data Coleman, E. Gabriella, 1973– Coding freedom : the ethics and aesthetics of hacking / E. Gabriella Coleman. p. cm. Includes bibliographical references and index. ISBN 978-0-691-14460-3 (hbk. : alk. paper)—ISBN 978-0-691-14461-0 (pbk. : alk. paper) 1. Computer hackers. 2. Computer programmers. 3. Computer programming—Moral and ethical aspects. 4. Computer programming—Social aspects. 5. Intellectual freedom. I. Title. HD8039.D37C65 2012 174’.90051--dc23 2012031422 British Library Cataloging- in- Publication Data is available This book has been composed in Sabon Printed on acid- free paper. ∞ Printed in the United States of America 1 3 5 7 9 10 8 6 4 2 This book is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE !" We must be free not because we claim freedom, but because we practice it. -
Fifty Years of Open Source Movement: an Analysis Through the Prism of Copyright Law
FIFTY YEARS OF OPEN SOURCE MOVEMENT: AN ANALYSIS THROUGH THE PRISM OF COPYRIGHT LAW V.K. Unni* I. INTRODUCTION The evolution of the software industry is a case study in itself. This evolution has multiple phases and one such important phase, termed open source, deals with the manner in which software technology is held, developed, and distributed.1 Over the years, open source software has played a leading role in promoting the Internet infrastructure and thus programs utilizing open source software, such as Linux, Apache, and BIND, are very often used as tools to run various Internet and business applications.2 The origins of open source software can be traced back to 1964–65 when Bell Labs joined hands with the Massachusetts Institute of Technology (MIT) and General Electric (GE) to work on the development of MULTICS for creating a dynamic, modular computer system capable of supporting hundreds of users.3 During the early stages of development, open source software had a very slow beginning primarily because of some preconceived notions surrounding it. Firstly, open source software was perceived as a product of academics and hobbyist programmers.4 Secondly, it was thought to be technically inferior to proprietary software.5 However, with the passage of time, the technical issues got relegated to the backside and issues pertaining to copyright, licensing, warranty, etc., began to be debated across the globe.6 * Professor—Public Policy and Management, Indian Institute of Management Calcutta; Thomas Edison Innovation Fellow (2016–17), Center for the Protection of Intellectual Property, George Mason University School of Law. 1.