Special Topics in Graphic Design: Open Source Design Spring 2018

Total Page:16

File Type:pdf, Size:1020Kb

Special Topics in Graphic Design: Open Source Design Spring 2018 Special Topics in Graphic Design: Open Source Design Spring 2018 Syllabus 2 Reading 1 7 The GNU Manifesto Open Source Design Manifesto Open Source Design is now Open Design On Being a Unicorn: The Case for User-Involvement in F/LOSS Designing Open Source This is the First Day of my Life The Problem With Open Source Design Reading 2 17 The Cathedral and the Bazaar Reading 3 36 Autoprogettazione? Designer as Author Utopia is No Place Reading 4 47 Counterculture & Anti-Design: Postmodern Appropriations of Utopia The Global Style: Modernist Typography after Postmodernism Beyond the New: A Search For Ideals In Design The Whole Earth Catalog Reading 5 58 Vernacular: How Buildings Learn from Each Other Hacking Clothing: An Interview with Susan Spencer Friendlier Forks Specimen Reading 6 82 Awkward Gestures In Defense of the Cultural Commons Open Source as Culture/Culture as Open Source In Practice: RestructWeb Reading 7 91 Giving Things Away is Hard Work: Three Creative Commons Case Studies An Authentic Commons is not a Temporary Affair Oxygen’s Project Coordinator Nuno Pinheiro Interview Making the Switch Reading 8 103 Indigenous Domain: Pilgrims, Permaculture, and Perl 1 Special Topics in Graphic Design: Open Source Design GD 399.01 abandon whatever methods we have covered. I do Fridays not aim to proselytize. My main desire for you is 9:00am–3:00pm not to replicate my ideas and practices and beliefs, 3 Credits but come up with your own methodologies and BR206 systems and aesthetics that make sense based on your thoughts or understanding. Everything I will Kristian Bjørnard present is in the service of you coming up with [email protected] your own philosophy of Free/Libre/Open Source 507-301-8402 design and your own methodologies for your design practice. Office: BR309A Office Hours: Requirements Mondays, Tuesdays, Thursdays / 9:00am–5:00pm — Regular Attendance. Fridays / 3:30–5:00pm — Successful completion of all projects on the due (& by appointment) date(s). https://github.com/gd399-osd — Class participation. I will do my best to respond to your emails within 24 hours. — Completing readings and participating in discussions. Catalog Description — You should be doing at least 3 additional hours Special topics courses are developed to cover emerg- of work outside of class each week … ing issues or specialized content not offered as part of the core curriculum. These courses, typically not Attendance offered continuously in the department, provide Attendance and participation is mandatory. Arrive students and faculty the opportunity to explore on time to the start of each class and after each new content and course formats such as working break. Students who have the equivalent of more with community partners or corporate clients. than 3 absences are no longer eligible to earn credit for the course. Topic: Open Source Design. Irregular attendance or habitual tardi- This course introduces various facets of Free/Libre/ ness will lead to lower grades and, ultimately, to Open Source and demonstrates how its principles probation or dismissal. In the case of extended and philosophies can be applied within the visual illness or other legitimate absences that may keep design field. Students become familiar with history, the students from attending a class for more than trends, theories, and ideologies, along with practi- three meetings, students must contact the Student cal design needs. The main outcome for this course Development Specialist in the Division of Student will be a book and website the students will collab- Affairs so that instructors can be notified. orate on creating using all F/LOS content, tools, etc. If you miss a class, check the course web- documenting the term’s investigations. site (Canvas, or even better our class GitHub repo). Info will be posted each week on what we discussed Course Structure & Objectives and instructions, files, and readings that might be I’ll be presenting my ideas, philosophies, and work- needed. If you have additional questions please con- ing methods to you over the course of the term tact me immediately; don’t wait until the next week. (along with the work of other designers and think- You will still be expected to present or be prepared ers). You’ll be made to work in some of the ways I’ve for the following class after any absence. found useful in regards to how I think about “Free/ It is also important you show up to class on Libre/Open Source” in my design practice (this is time and prepared. We’ve got a lot to cover and it sort of a new interest of mine, so mostly there will sets the whole class behind when any of you shows be outside information, speakers, readings, etc. and up late. However, being late — even 2 hours late — is then just in and out of class experimenting). While favorable to not coming at all. I ask that you honestly and non-judgementally try these out, once the class is over you are free to Syllabus 2 https://github.com/gd399-osd Participation Materials You are expected to take an active part in this — A reliable way to transport and backup digital class. Come prepared to discuss readings and the works; strengths and weaknesses of your classmates work — Other materials may come up, I don’t foresee a (as well as your own). You are expected to offer, as lot of materials being required… well as accept, constructive criticism. The ability to effectively articulate and explain your ideas and Due Dates design decisions is a critical skill that you must All projects are due at the START of class on the develop. Treat your classmates professionally at all assigned due date. Projects turned in after that will times. We will have some sort of critique almost not be accepted. I repeat: Late projects will not be every class period and when we are not lecturing/ accepted. This means you will earn a zero for a late critiquing/doing demos you will be expected to project. If you will be unavailable on a due date work on the current project/experiment in class. make arrangements to turn it in early or by email This allows you the benefit of real time feedback during that class period. You are responsible for from both your peers and your instructor. Take turning in work on time regardless of attendance. advantage of your class time; the constant inter- Do keep in mind that something is better than change of ideas leads to better, stronger design nothing, so if you aren’t finished at least bring what solutions (& a better understanding of our world). you have so far to critique. In the case of school closing, projects will be due at the start of our next Technology Statement regularly scheduled class meeting. This course will use F/LOS tools. Nothing from Adobe, no other propietary fonts or software, etc. Grades will be allowed for the creation of projects, experi- Merely completing a project is absolutely not a ments, and new tools in our class setting. guarantee of a passing grade! You will eventually be hired based on your portfolio which art direc- In-class Technology Use tors will review and compare to other designer’s During class hours, please don’t chat online, send/ they’ve seen before hiring someone. Your ability check messages on phones/computers, check emails, to set yourself apart in concept and execution will communicate or browse content on social media determine your success in this field both academ- networks, nor browse the web for content that does ically and in the real world, so let’s practice that not relate directly to class. Please stow cell phones now. Be bold. Don’t be afraid of “failing” a project; out of sight! Failure to comply with this rule may be afraid of just unenthusiastically completing result in deductions from your final grade. the bare minimum requirements of a project. Your grade for the term will be an assessment of Complaints how completely you have explored your ideas, Students are encouraged to discuss complaints and researched each project, the success of the design concerns regarding a class, project or grade with me in solving the various assigned problems, unique- first, during my office hours or at a time chosen by ness, embracing of F/LOS, CRAFT and presentation. our mutual consent. Issues that students do not find to be resolved should then be reported to the Depart- A+ A A- Superior ment Chair (Brockett Horne, [email protected]). B+ B B- Above Average C+ C C- Average Readings D+ D D- Below Average The readings for this course are all in this booklet or F Failure else will be provided as links for reading online. We will have in class discussions each week following Plus or minus may be used. However, for purposes a reading. The readings will also be helpful in the of obtaining a quality point average, each grade formulating of your own opinions and ideas around category is assigned the following quality points: F/LOS as it pertains to design. They should also influ- A = 4 / B = 3 / C = 2 / D = 1 / F = 0 ence the Free/Libre/Open Source design decisions you are making on other projects through the term (For more information see the Statement of Aca- (and hopefully beyond). There is a sizeable amount demic Standards in the Student Handbook.) of reading, but nothing is too complicated or crazy. It is all in service of us thinking hard, researching, — Class participation is paramount & should show Syllabus and experimenting. marked progress in the student’s ability to talk about design intelligently & constructively.
Recommended publications
  • Oldschool E-Mail Setup Eine Freakshow
    Oldschool E-mail Setup Eine Freakshow [email protected] Chemnitzer Linuxtage, 2016 (Screenshot GMX vor >15 Jahren: Waybackmachine zu www.gmx.net) (Screenshot GMX heute) (Screenshot Gmail heute) Lösungen? ● Claws ● Mutt ● Eudora ● Netscape Navigator ● Evolution ● Opera M2 ● GMX ● Outlook ● Gnus ● SquirrelMail ● Hotmail ● The Bat! ● Hushmail ● Thunderbird ● KMail ● … Flußgrafik Email Netz MTA MRA MDA MUA MSA MTA Netz Hipster! ● KISS ● YAGNI ● DRY ● NIH ● Divide And Conquer ● Everything is a file ● No vendor lock-in ● Mißtraue Autoritäten – fördere Dezentralisierung Netz Netz Emails Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools mbox Maildir mh Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools mbox Maildir mh tmp 1439306571.1269_0.elvis ~/Post/Technik/Wikitech new 1448267819.5940_0.spencer ... 1457079728.2000_0.spencer:2, cur 1456839383.9873_0.nepomuk:2,SR 1457166567.23654_0.spencer:2,S ... Client, den ich Remote verwenden kann Leicht erweiterbar Filter Adressen Netz Netz Abholen Pull Subject Maildir Keine Spuren X-List-ID am Server Beliebige Header Client, den ich Remote verwenden kann Leicht erweiterbar Filter Adressen Netz Netz Abholen Pull Subject Maildir Keine Spuren X-List-ID am Server Beliebige Header fetchmail getmail mpop ..
    [Show full text]
  • Ultumix GNU/Linux 0.0.1.7 32 Bit!
    Welcome to Ultumix GNU/Linux 0.0.1.7 32 Bit! What is Ultumix GNU/Linux 0.0.1.7? Ultumix GNU/Linux 0.0.1.7 is a full replacement for Microsoft©s Windows and Macintosh©s Mac OS for any Intel based PC. Of course we recommend you check the system requirements first to make sure your computer meets our standards. The 64 bit version of Ultumix GNU/Linux 0.0.1.7 works faster than the 32 bit version on a 64 bit PC however the 32 bit version has support for Frets On Fire and a few other 32 bit applications that won©t run on 64 bit. We have worked hard to make sure that you can justify using 64 bit without sacrificing too much compatibility. I would say that Ultumix GNU/Linux 0.0.1.7 64 bit is compatible with 99.9% of all the GNU/Linux applications out there that will work with Ultumix GNU/Linux 0.0.1.7 32 bit. Ultumix GNU/Linux 0.0.1.7 is based on Ubuntu 8.04 but includes KDE 3.5 as the default interface and has the Mac4Lin Gnome interface for Mac users. What is Different Than Windows and Mac? You see with Microsoft©s Windows OS you have to defragment your computer, use an anti-virus, and run chkdsk or a check disk manually or automatically once every 3 months in order to maintain a normal Microsoft Windows environment. With Macintosh©s Mac OS you don©t have to worry about fragmentation but you do have to worry about some viruses and you still should do a check disk on your system every once in a while or whatever is equivalent to that in Microsoft©s Windows OS.
    [Show full text]
  • Branding Guidelines
    2020 v. 1 BRANDING GUIDELINES A visual identity guide for New Orleans Baptist Theological Seminary and Leavell College New Orleans Baptist Theological Seminary and Leavell College 01 2020 v. 1 CONTENTS COLORS 3 Primary Color 3 Secondary Colors 4 Grays LOGOS 5 Graduate Logo 7 Undergraduate Logo 9 Combining both Logos TYPOGRAPHY 10 Roboto Font Family 11 Utopia Font Family 12 Combining both Fonts 13 Branding Statements LAYOUT GUIDELINES Text and Images Margins and Bleeds White Space EXAMPLE PAGES New Orleans Baptist Theological Seminary and Leavell College 02 2020 v. 1 The primary purple and secondary colors should be utilized COLORS for all seminary and college designs. Generally, gray or white should be used for text. Limited use of primary and secondary colors is acceptable for headlines. The primary purple is Primary and intentionally contrasted and complemented by the secondary Secondary Colors colors. A balanced design is structured by the weight, proximity, and alignment of shapes, text, and photos. Photos should be bright and saturated. NOTE: If a printer is not accurate or the material does not hold ink effectively, the purple can easily skew to either a reddish or blueish hue. Primary Purple Secondary Gold Secondary Light Blue Cyan = 80 Cyan = 21 Cyan = 67 Magenta = 88 Magenta = 22 Magenta = 0 CMYK Yellow = 36 Yellow = 100 Yellow = 18 Black = 29 Black = 0 Black = 0 Red = 68 Red = 209 Red = 48 RGB Green = 48 Green = 180 Green = 192 Blue = 90 Blue = 43 Blue = 210 #44305a #d1b42b #30c0d2 HEX 2627 C 110 C 2627 U 110 U PANTONE New Orleans Baptist Theological Seminary and Leavell College 03 2020 v.
    [Show full text]
  • Resurrect Your Old PC
    Resurrect your old PCs Resurrect your old PC Nostalgic for your old beige boxes? Don’t let them gather dust! Proprietary OSes force users to upgrade hardware much sooner than necessary: Neil Bothwick highlights some great ways to make your pensioned-off PCs earn their keep. ardware performance is constantly improving, and it is only natural to want the best, so we upgrade our H system from time to time and leave the old ones behind, considering them obsolete. But you don’t usually need the latest and greatest, it was only a few years ago that people were running perfectly usable systems on 500MHz CPUs and drooling over the prospect that a 1GHz CPU might actually be available quite soon. I can imagine someone writing a similar article, ten years from now, about what to do with that slow, old 4GHz eight-core system that is now gathering dust. That’s what we aim to do here, show you how you can put that old hardware to good use instead of consigning it to the scrapheap. So what are we talking about when we say older computers? The sort of spec that was popular around the turn of the century. OK, while that may be true, it does make it seem like we are talking about really old hardware. A typical entry-level machine from six or seven years ago would have had something like an 800MHz processor, Pentium 3 or similar, 128MB of RAM and a 20- 30GB hard disk. The test rig used for testing most of the software we will discuss is actually slightly lower spec, it has a 700MHz Celeron processor, because that’s what I found in the pile of computer gear I never throw away in my loft, right next to my faithful old – but non-functioning – Amiga 4000.
    [Show full text]
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • SMTP (Simple Mail Transfer Protocol)
    P1: JsY JWBS001A-60.tex WL041/Bidgoli WL041-Bidgoli.cls May 12, 2005 3:27 Char Count= 0 SMTP (Simple Mail Transfer Protocol) Vladimir V. Riabov, Rivier College Introduction 1 SMTP Security Issues 12 SMTP Fundamentals 1 SMTP Vulnerabilities 12 SMTP Model and Protocol 2 SMTP Server Buffer Overflow Vulnerability 15 User Agent 4 Mail Relaying SMTP Vulnerability 15 Sending e-Mail 4 Mail Relaying SMTP Vulnerability in Microsoft Mail Header Format 4 Windows 2000 15 Receiving e-Mail 4 Encapsulated SMTP Address Vulnerability 15 The SMTP Destination Address 4 Malformed Request Denial of Service 16 Delayed Delivery 4 Extended Verb Request Handling Flaw 16 Aliases 5 Reverse DNS Response Buffer Overflow 16 Mail Transfer Agent 5 Firewall SMTP Filtering Vulnerability 16 SMTP Mail Transaction Flow 5 Spoofing 16 SMTP Commands 6 Bounce Attack 16 Mail Service Types 6 Restricting Access to an Outgoing Mail SMTP Service Extensions 8 Server 17 SMTP Responses 8 Mail Encryption 17 SMTP Server 8 Bastille Hardening System 17 On-Demand Mail Relay 8 POP and IMAP Vulnerabilities 17 Multipurpose Internet Mail Extensions Standards, Organizations, and (MIME) 8 Associations 18 MIME-Version 10 Internet Assigned Numbers Authority 18 Content-Type 10 Internet Engineering Task Force Working Content-Transfer-Encoding 10 Groups 18 Content-Id 11 Internet Mail Consortium 18 Content-Description 11 Mitre Corporation 18 Security Scheme for MIME 11 Conclusion 18 Mail Transmission Types 11 Glossary 18 Mail Access Modes 11 Cross References 19 Mail Access Protocols 11 References 19 POP3 11 Further Reading 22 IMAP4 12 INTRODUCTION and IMAP4), SMTP software, vulnerability and security issues, standards, associations, and organizations.
    [Show full text]
  • Understanding Post Office Protocol (POP3)
    Understanding Post Office Protocol (POP3) Author: Conrad Chung, 2BrightSparks Introduction Most Internet users with email accounts would have used some form of “client” software (Outlook, Thunderbird etc.) to access and manage their email at one point or another. To retrieve emails, these email clients may require the configuration of Post Office Protocol (or POP3) before messages can be downloaded from the server. This article will help readers understand what POP3 is and how it works. What is Post Office Protocol? The Post Office Protocol (POP3) is an Internet standard protocol used by local email software clients to retrieve emails from a remote mail server over a TCP/IP connection. Since the first version was created in 1984, the Post Office Protocol (currently at Version 3) has since became one of the most popular protocols and is used by virtually every email client to date. Its popularity lies in the protocol’s simplicity to configure, operate and maintain. Email servers hosted by Internet service providers also use POP3 to receive and hold emails intended for their subscribers. Periodically, these subscribers will use email client software to check their mailbox on the remote server and download any emails addressed to them. Once the email client has downloaded the emails, they are usually deleted from the server, although some email clients allow users to specify that mails be copied or saved on the server for a period of time. Email clients generally use the well-known TCP port 110 to connect to a POP3 server. If encrypted communication is supported on the POP3 server, users can optionally choose to connect either by using the STLS command after the protocol initiation stage or by using POP3S, which can use the Transport Layer Security (TLS) or Secure Sockets Layer (SSL) on TCP port 995 to connect to the server.
    [Show full text]
  • Font HOWTO Font HOWTO
    Font HOWTO Font HOWTO Table of Contents Font HOWTO......................................................................................................................................................1 Donovan Rebbechi, elflord@panix.com..................................................................................................1 1.Introduction...........................................................................................................................................1 2.Fonts 101 −− A Quick Introduction to Fonts........................................................................................1 3.Fonts 102 −− Typography.....................................................................................................................1 4.Making Fonts Available To X..............................................................................................................1 5.Making Fonts Available To Ghostscript...............................................................................................1 6.True Type to Type1 Conversion...........................................................................................................2 7.WYSIWYG Publishing and Fonts........................................................................................................2 8.TeX / LaTeX.........................................................................................................................................2 9.Getting Fonts For Linux.......................................................................................................................2
    [Show full text]
  • The GNOME Desktop Environment
    The GNOME desktop environment Miguel de Icaza ([email protected]) Instituto de Ciencias Nucleares, UNAM Elliot Lee ([email protected]) Federico Mena ([email protected]) Instituto de Ciencias Nucleares, UNAM Tom Tromey ([email protected]) April 27, 1998 Abstract We present an overview of the free GNU Network Object Model Environment (GNOME). GNOME is a suite of X11 GUI applications that provides joy to users and hackers alike. It has been designed for extensibility and automation by using CORBA and scripting languages throughout the code. GNOME is licensed under the terms of the GNU GPL and the GNU LGPL and has been developed on the Internet by a loosely-coupled team of programmers. 1 Motivation Free operating systems1 are excellent at providing server-class services, and so are often the ideal choice for a server machine. However, the lack of a consistent user interface and of consumer-targeted applications has prevented free operating systems from reaching the vast majority of users — the desktop users. As such, the benefits of free software have only been enjoyed by the technically savvy computer user community. Most users are still locked into proprietary solutions for their desktop environments. By using GNOME, free operating systems will have a complete, user-friendly desktop which will provide users with powerful and easy-to-use graphical applications. Many people have suggested that the cause for the lack of free user-oriented appli- cations is that these do not provide enough excitement to hackers, as opposed to system- level programming. Since most of the GNOME code had to be written by hackers, we kept them happy: the magic recipe here is to design GNOME around an adrenaline response by trying to use exciting models and ideas in the applications.
    [Show full text]
  • Gnuplot Programming Interview Questions and Answers Guide
    Gnuplot Programming Interview Questions And Answers Guide. Global Guideline. https://www.globalguideline.com/ Gnuplot Programming Interview Questions And Answers Global Guideline . COM Gnuplot Programming Job Interview Preparation Guide. Question # 1 What is Gnuplot? Answer:- Gnuplot is a command-driven interactive function plotting program. It can be used to plot functions and data points in both two- and three-dimensional plots in many different formats. It is designed primarily for the visual display of scientific data. gnuplot is copyrighted, but freely distributable; you don't have to pay for it. Read More Answers. Question # 2 How to run gnuplot on your computer? Answer:- Gnuplot is in widespread use on many platforms, including MS Windows, linux, unix, and OSX. The current source code retains supports for older systems as well, including VMS, Ultrix, OS/2, MS-DOS, Amiga, OS-9/68k, Atari ST, BeOS, and Macintosh. Versions since 4.0 have not been extensively tested on legacy platforms. Please notify the FAQ-maintainer of any further ports you might be aware of. You should be able to compile the gnuplot source more or less out of the box on any reasonable standard (ANSI/ISO C, POSIX) environment. Read More Answers. Question # 3 How to edit or post-process a gnuplot graph? Answer:- This depends on the terminal type you use. * X11 toolkits: You can use the terminal type fig and use the xfig drawing program to edit the plot afterwards. You can obtain the xfig program from its web site http://www.xfig.org. More information about the text-format used for fig can be found in the fig-package.
    [Show full text]
  • Gentlemen's Argument
    Copyright © 2007, Chicago-Kent Journal of Intellectual Property A GENTLEMEN'S AGREEMENT ASSESSING THE GNU GENERAL PUBLIC LICENSE AND ITS ADAPTATION TO LINUx Douglas A. Hass" Introduction "Starting this Thanksgiving, I am going to write a complete Unix-compatible software system called GNU (for GNU's Not Unix), and give it away free to everyone who can use it." With his post to the Usenet 2 newsgroup net.unix-wizards, 3 Richard Stallman launched a sea change in software development. In 1983, he could not have known that his lasting contribution would not be the GNU operating system, but instead the controversial software license that he would develop as its underpinning: the GNU General Public License (GPL).4 Today, the operating system most closely associated with the GPL is Linux, developed originally by Linus Torvalds, a Finnish university student.5 Research group IDC's Quarterly Server Tracker marked Linux server revenue growth at three times Microsoft Windows server growth in the first quarter of 2006, its fifteenth consecutive quarter of double-digit revenue growth. 6 British research firm Netcraft's July 2006 Web Server Survey gives Linux-based 7 Apache Web servers the largest market share among Web servers queried in its monthly survey. With Linux gaining an increasingly larger position in these markets, the validity of the GPL takes on increasing importance as well. The open source community's commercial and non-commercial members are conducting a robust debate on the intellectual property issues surrounding the GPL and Linux, its most * Douglas A. Hass, Director of Business Development, ImageStream; J.D.
    [Show full text]
  • Iaconelli Riccardo Giulio
    Curriculum vitae INFORMAZIONI PERSONALI Iaconelli Riccardo Giulio Milano (Italia) Data di nascita 11/12/1990 | Nazionalità Italiana ESPERIENZA PROFESSIONALE 2017–alla data attuale Open Source Leadership Mentor Mozilla Foundation Mentore per il programma di Open Source Leadership, un programma di Mozilla Foundation per formare project manager che seguano la metodologia Open Source. 2016–alla data attuale Technical Speaker Mozilla Foundation Parte del team di Developer Relations per la divulgazione di tecnologie Open Source e Open Web 2015–alla data attuale Open Source Maintainer WikiToLearn Maintainer di WikiToLearn, un progetto Open Source per l'editing e la creazione collaborativa di libri di testo. 2004–alla data attuale Open Source Contributor e Maintainer KDE - Contributor per il progetto Plasma, il più importante desktop environment Open Source, e altre parti del progetto, sempre open source, come: KDEGames, kde-i18n-it, KDE-PIM, Raptor, packaging. - Maintainer dei seguenti Componenti Open Source: Akunambol, KDELibs (Plasma Packages), Amarok QML UI - Parte del team di marketing e di Comunicazione 2008–2017 Mentore Google (Summer of Code) Mentore, in diverse annate nel periodo 2008-2017, per diversi progetti Open Source (Ruqola, Plasma, ...). 2011–2012 Co-Founder & CTO Ispirata Co-Foundere CTO di Ispirata SRL, un'azienda di consulenza che offre soluzioni basate su software Open Source. 2005–2010 Vice Coordinatore Oxygen Project ISTRUZIONE E FORMAZIONE 2015–alla data attuale Laurea Magistrale in Fisica Università degli Studi di Milano-Bicocca,
    [Show full text]