The Political Economy of Open Source Software Sweber@Socrates
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Full List of Signatures Is Here
IAVA Recipient: Secretary Mattis Letter: Greetings, First, thank you for your service and sacrifice and for your incredible leadership that so many in the military and veteran community have experienced and respect. As you know, more than 1.5 million veterans have have educated themselves with the Post-9/11 GI Bill, and almost 70% of Iraq and Afghanistan Veterans of America (IAVA) members have used or transferred this benefit to a dependent. It could very well be the most transformative federal benefit created. The new restriction on Post-9/11 GI Bill transferability to only those with less than 16 years of service is a completely unnecessary reduction of this critical benefit, and it will ultimately hurt our military recruitment and readiness. In a time of war, it remains enormously important to recruit and retain qualified servicemembers, especially with an ever-decreasing pool of eligible recruits. For years, IAVA has been at the forefront of this fight. We led the effort to establish this benefit in 2008 and we have successfully defended it in recent years. We cannot allow our GI Bill to be dismantled or abused. This is why I am standing with my fellow IAVA members to respectfully request that you reverse this counterproductive policy change that creates barriers to access to these transformative benefits. The GI Bill has been earned by millions of men and women on the battlefield and around the world and it should not be subjected to arbitrary restrictions that limit its use. Again, thank you for your leadership and I ask that you take action now to reverse this decision. -
ROADS and BRIDGES: the UNSEEN LABOR BEHIND OUR DIGITAL INFRASTRUCTURE Preface
Roads and Bridges:The Unseen Labor Behind Our Digital Infrastructure WRITTEN BY Nadia Eghbal 2 Open up your phone. Your social media, your news, your medical records, your bank: they are all using free and public code. Contents 3 Table of Contents 4 Preface 58 Challenges Facing Digital Infrastructure 5 Foreword 59 Open source’s complicated relationship with money 8 Executive Summary 66 Why digital infrastructure support 11 Introduction problems are accelerating 77 The hidden costs of ignoring infrastructure 18 History and Background of Digital Infrastructure 89 Sustaining Digital Infrastructure 19 How software gets built 90 Business models for digital infrastructure 23 How not charging for software transformed society 97 Finding a sponsor or donor for an infrastructure project 29 A brief history of free and public software and the people who made it 106 Why is it so hard to fund these projects? 109 Institutional efforts to support digital infrastructure 37 How The Current System Works 38 What is digital infrastructure, and how 124 Opportunities Ahead does it get built? 125 Developing effective support strategies 46 How are digital infrastructure projects managed and supported? 127 Priming the landscape 136 The crossroads we face 53 Why do people keep contributing to these projects, when they’re not getting paid for it? 139 Appendix 140 Glossary 142 Acknowledgements ROADS AND BRIDGES: THE UNSEEN LABOR BEHIND OUR DIGITAL INFRASTRUCTURE Preface Our modern society—everything from hospitals to stock markets to newspapers to social media—runs on software. But take a closer look, and you’ll find that the tools we use to build software are buckling under demand. -
An Automated Binary Security Update System for Freebsd
An Automated Binary Security Update System for FreeBSD Colin Percival Computing Lab, Oxford University [email protected] Abstract that a large number of people find the task of applying security patches and rebuilding affected programs to be difficult and/or confusing. Given that releases are on av- With the present trend towards increased reliance upon erage several months – and several security holes – old computer systems, the provision and prompt application by the time they are installed, the possibility arises that of security patches is becoming vital. Developers of all a new user will find his system compromised before he operating systems must generally be applauded for their has a chance to bring it up to date. success in this area; systems administrators, however, are often found lacking. Furthermore, there are some circumstances where build- ing from source is undesirable. Some embedded sys- Anecdotal evidence suggests that for FreeBSD much of tems might lack sufficient disk space to store the entire the difficulty arises out of the need to recompile from the source and object trees; some system administrators re- source code after applying security patches. Many peo- move part or all of the build toolchain in an (arguably ple, after spending years using closed-source point-and- misguided) attempt to thwart any attempt to build a click operating systems, find the concept of recompiling rootkit; and the purveyors of application-specific ‘toast- software to be entirely foreign, and even veteran users ers’ might very likely wish to keep the complexity of of open source software are often less than prompt about building from source entirely hidden from their users. -
New North Patrol Division Opens New North Patrol About 300 Will Serve the Community Growing West Side Members, Po- of the Northland
New North Patrol Division opens new North Patrol About 300 will serve the community growing west side members, po- of the Northland. lice and city “The Northland officials cele- is approximately brated the 40 percent devel- grand opening oped at this point, of the new with a strong po- North Patrol tential for popula- Division station tion growth and with tours and a commercial devel- ribbon-cutting opment,” Second ceremony on District City June 23. Councilmember “This facility Dan Fowler said. replaces the “The 15,000-acre rather iconic Twin Creeks de- building at Bar- velopment east of ry Road and the KCI Airport is 169 Highway expected to grow that many of As North Patrol Division officers held the ribbon, Major Roger Lewis and past, present Board of the population of you affection- Police Commissioners and City Councilmembers cut it to open the new station June 23. KCMO and Platte ately have County by 70,000 known as the ‘Bumblebee,’” Interim Chief of Police David Zim- people during the next 20 years, according to the Platte County Eco- merman said. “Well-known as it may be, that building could no nomic Development Council. It is likely the North Patrol Division offic- longer function as one of our police stations.” ers would serve all of those people.” When it opened in 1976, about 15 people were assigned to Community members who attended the ribbon-cutting event had the North Patrol Division. Commensurate with the area’s population opportunity to get a behind-the-scenes tour of the station in areas that growth, there are now 95 KCPD members assigned to North Pa- won’t be open to the public. -
Twenty Years of Berkeley Unix : from AT&T-Owned to Freely
Twenty Years of Berkeley Unix : From AT&T-Owned to Freely Redistributable Marshall Kirk McKusick Early History Ken Thompson and Dennis Ritchie presented the first Unix paper at the Symposium on Operating Systems Principles at Purdue University in November 1973. Professor Bob Fabry, of the University of California at Berkeley, was in attendance and immediately became interested in obtaining a copy of the system to experiment with at Berkeley. At the time, Berkeley had only large mainframe computer systems doing batch processing, so the first order of business was to get a PDP-11/45 suitable for running with the then-current Version 4 of Unix. The Computer Science Department at Berkeley, together with the Mathematics Department and the Statistics Department, were able to jointly purchase a PDP-11/45. In January 1974, a Version 4 tape was delivered and Unix was installed by graduate student Keith Standiford. Although Ken Thompson at Purdue was not involved in the installation at Berkeley as he had been for most systems up to that time, his expertise was soon needed to determine the cause of several strange system crashes. Because Berkeley had only a 300-baud acoustic-coupled modem without auto answer capability, Thompson would call Standiford in the machine room and have him insert the phone into the modem; in this way Thompson was able to remotely debug crash dumps from New Jersey. Many of the crashes were caused by the disk controller's inability to reliably do overlapped seeks, contrary to the documentation. Berkeley's 11/45 was among the first systems that Thompson had encountered that had two disks on the same controller! Thompson's remote debugging was the first example of the cooperation that sprang up between Berkeley and Bell Labs. -
What to Watch
WEDNESDAY, MARCH 17, 2021 had. Kevin (Casey Cott) and Fangs (Drew Ray ‘True Tanner) make a big decision about their future Conviction’ What together. MOVIES The Masked Singer YOU’LL LOVE to watch FOX, 7 p.m. Group B performers take to the stage for the first time, and one will be unmasked at the WEDNESDAY end of the new episode “Group B Premiere — March 17, 2021 Shamrock and Roll.” All times Mountain. Start times can vary based Chicago Med on cable/satellite provider. Confirm times on NBC, 7 p.m. your on-screen guide. In “For the Want of a Nail,” as Maggie ‘Alice in Wonderland’ (Marlyne Barrett) deals with her own trauma, DISNEY ENTERPRISES INC. My Feet Are Killing Me: she steps in to help a mother in need. The Peanuts Movie (2015, DISCOVERY COMMUNICATIONS Meanwhile, Dean (Steven Weber) continues Children) Noah Schnapp, Hadley Footnotes to stir the pot with more than one doctor, and Belle Miller FXM, 3:40 p.m. discovery+ (Season 5), “Chain of Command” (Season 6), a patient comes to Med needing immediate This program features never-before-seen “Tapestry” (Season 6) and the series finale, treatment but doesn’t want it from them. Scary Movie 2 (2001, Comedy) cases with your favorite foot doctors as well “All Good Things...” (Season 7). Shawn Wayans, Marlon Wayans as follow-ups with memorable patients to see Chicago Fire VH1, 6 p.m. how they are doing today. NHL Hockey NBC, 8 p.m. Alice in Wonderland (2010, NBCSN, beginning at 5:30 p.m. Live In “Double Red,” Mouch (Christian Stolte), Children) Johnny Depp, Mia True Conviction A pair of Wednesday Night Hockey matchups Gallo (Alberto Rosende), Ritter (Daniel Kyri) Wasikowska Freeform, 6:30 p.m. -
Annual Report 2018
Annual Report 2018 Valdez Museum & Historical Archive, Associaon, Inc. www.valdezmuseum.org To preserve, present & interpret the heritage & culture of Valdez, the Copper River Basin & Prince William Sound, Alaska. On behalf of the Valdez Museum and Historical Archive Board of Directors, I would like to present this annual State of the Museum report. It is our hope that this report will provide the City Council, the City Administraon and the City Members a clear accounng of the administrave status of the Museum and a full understanding of and appreciaon for the return on your investment. First of all, I feel that it is important to understand that the Valdez Museum was created for, belongs to and is all about the past, present and future residents of the City of Valdez. The exhibits are only objects but their value is in the stories of the people that they represent. I personally feel that an individual’s soul is reflected in their life story and similarly, the collecve soul of a city is reflected in the collecve stories of its residents. Our museum performs three funcons. First of all, it serves Board of Directors as a repository for these collecve stories in mul‐dimensional forms so that they will not be forgoen and are readily available. In addion, it provides a place and opportunies for people to add to their current life’s story through community President: Gary Minish interacon and special events. Last but not least, the museum provides educaonal opportunies for all ages which serves to develop and culvate their future life’s Vice‐President: Martha Barberio stories. -
Human' Jaspects of Aaonsí F*Oshv ÍK\ Tke Pilrns Ana /Movéis ÍK\ É^ of the 1980S and 1990S
DOCTORAL Sara MarHn .Alegre -Human than "Human' jAspects of AAonsí F*osHv ÍK\ tke Pilrns ana /Movéis ÍK\ é^ of the 1980s and 1990s Dirigida per: Dr. Departement de Pilologia jA^glesa i de oermanisfica/ T-acwIfat de Uetres/ AUTÓNOMA D^ BARCELONA/ Bellaterra, 1990. - Aldiss, Brian. BilBon Year Spree. London: Corgi, 1973. - Aldridge, Alexandra. 77» Scientific World View in Dystopia. Ann Arbor, Michigan: UMI Research Press, 1978 (1984). - Alexander, Garth. "Hollywood Dream Turns to Nightmare for Sony", in 77» Sunday Times, 20 November 1994, section 2 Business: 7. - Amis, Martin. 77» Moronic Inferno (1986). HarmorKlsworth: Penguin, 1987. - Andrews, Nigel. "Nightmares and Nasties" in Martin Barker (ed.), 77» Video Nasties: Freedom and Censorship in the MecBa. London and Sydney: Ruto Press, 1984:39 - 47. - Ashley, Bob. 77» Study of Popidar Fiction: A Source Book. London: Pinter Publishers, 1989. - Attebery, Brian. Strategies of Fantasy. Bloomington and Indianapolis: Indiana University Press, 1992. - Bahar, Saba. "Monstrosity, Historicity and Frankenstein" in 77» European English Messenger, vol. IV, no. 2, Autumn 1995:12 -15. - Baldick, Chris. In Frankenstein's Shadow: Myth, Monstrosity, and Nineteenth-Century Writing. Oxford: Oxford Clarendon Press, 1987. - Baring, Anne and Cashford, Jutes. 77» Myth of the Goddess: Evolution of an Image (1991). Harmondsworth: Penguin - Arkana, 1993. - Barker, Martin. 'Introduction" to Martin Barker (ed.), 77» Video Nasties: Freedom and Censorship in the Media. London and Sydney: Ruto Press, 1984(a): 1-6. "Nasties': Problems of Identification" in Martin Barker (ed.), 77» Video Nasties: Freedom and Censorship in the MecBa. London and Sydney. Ruto Press, 1984(b): 104 - 118. »Nasty Politics or Video Nasties?' in Martin Barker (ed.), 77» Video Nasties: Freedom and Censorship in the Medß. -
Undergraduate Commencement Program 2019
SOUTH DAKOTA STATE UNIVERSITY One Hundred Thirty-Third UNDERGRADUATE COMMENCEMENT Saturday, May 4, 2019 Frost Arena Stanley J. Marshall Center Brookings, South Dakota The Ceremonial Mace The Ceremonial Mace is traditionally carried by a university marshal at all formal academic occasions. The staff, which stands 36 inches high from top to bottom, is made of walnut with a mahogany finish. It is trimmed in 14k plated gold. At the top of the Mace is the great seal of South Dakota State University. The engraved inscription reads “South Dakota State University founded 1881.” The Mace was presented to the University as a gift from the SDSU Alumni Association and was used for the first time at President Peggy Gordon Miller’s inauguration, Sept. 19, 1998. The Ceremonial Mace has an ancient history as a symbol of authority. In medieval times it was a studded, clublike weapon, made of iron and capable of breaking armor. It became associated with the protection of the king in France and England and was carried by the king’s sergeant-at-arms. In the 13th century, it was used for civil purposes and figured in the processions of city mayors and other dignitaries. Eventually, the Mace became a symbol also for academic institutions, an emblem of order and authority in the pageantry of ceremonial occasions. The University Presidential Medallion The University Presidential Medallion, a traditional symbol of authority of the Office of the President, is a 14k gold replica of the University Seal, is 3 inches in diameter and is cast as a single piece. The reverse side of the Medallion is engraved with the names the University has formally held since its inception: Dakota Agricultural College, 1884-1889; South Dakota Agricultural College, 1890-1907; South Dakota State College of Agricultural and Mechanic Arts, 1907-June 30, 1964; and South Dakota State University, July 1, 1964-Present. -
Open Source Software Licenses: Perspectives of the End User and the Software Developer
White Paper: Open Source Software Licenses: Perspectives of the End User and the Software Developer By: Paul H. Arne Morris, Manning & Martin, L.L.P. Copyright © 2004 Morris, Manning & Martin, L.L.P. All rights reserved Table of Contents History of Open Source .........................................................................................................................2 Open Source Licenses Generally ..........................................................................................................3 Copyright Issues .........................................................................................................................3 Contract Considerations..............................................................................................................4 Limitation of Liability Clause.....................................................................................................5 Other Implied Warranties ...........................................................................................................6 UCITA ........................................................................................................................................6 Parties to License........................................................................................................................6 Specific Open Source Licenses..............................................................................................................7 GNU General Public License (GPL) ..........................................................................................7 -
Jay O'connell
JAY O’CONNELL Producer / UPM I MOM SO HARD (multi-cam pilot; UPM) – CBS/WBTV; Prods: Michelle Nader, Rob Thomas, Kristin Hensley, Jen Smedley; Dir: Don Scardino; w/ Freddie Prinze, Jr, David Fynn LIVING BIBLICALLY (multi-cam series; UPM) – CBS/WBTV; Prods: Patrick Walsh, Johnny Galecki, Spencer Medof, Andrew Haas; Dir: Andy Ackerman; w/ Jay Ferguson, Ian Gomez, David Krumholtz RELATIVELY HAPPY (multi-cam pilot; UPM) – CBS/WBTV; Prods: Max Mutchnick, Jeff Astrof; Dir: James Burrows; w/ Jane Lynch, Genevieve Angelson, Jon Rudnitsky, Stephen Guarino TWO BROKE GIRLS (multi-cam pilot and series, Co-Producer/UPM) – CBS / WBTV; Prods: Michael Patrick King, Whitney Cummings; Dir: Jim Burrows, Ted Wass, Scott Ellis, John Fortenberry, Fred Savage, Julie Anne Robinson, Thomas Kail, Michael McDonald, Don Scardino; w/ Kat Dennings, Beth Behrs MAN WITH A PLAN (multi-cam pilot; UPM) – CBS/CBSP; Prods: Jackie Filgo, Jeff Filgo, Michael Rotenberg, Matt LeBlanc; Dir: James Burrows; w/ Matt LeBlanc, Jenna Fischer, Grace Kaufman HAPPY LIFE (multi-cam pilot, UPM) – CBS / WBTV; Prods: Bill Wrubel; Dir: James Burrows; w/ Steven Weber, Duane Martin, Eric Petersen, Rita Moreno, Bill Smitrovich, Minnie Driver ONE BIG HAPPY (multi-cam pilot and series, UPM) – NBC/WBTV; Prods: Ellen DeGeneres, Liz Feldman, Jeff Kleeman; Dir: Scott Ellis; w/ Nick Zano, Elisha Cuthbert BIG BANG THEORY (multi-cam series, UPM) – CBS/WBTV; Prods: Chuck Lorre, Lee Aronsohn, Bill Prady; Dir: Mark Cendrowski; w/ Johnny Galecki, Jim Parsons, Kaley Cuoco, Simon Helberg, Kunal Nayyar PARTNERS -
Open Source Software: a History David Bretthauer University of Connecticut, [email protected]
University of Connecticut OpenCommons@UConn Published Works UConn Library 12-26-2001 Open Source Software: A History David Bretthauer University of Connecticut, [email protected] Follow this and additional works at: https://opencommons.uconn.edu/libr_pubs Part of the OS and Networks Commons Recommended Citation Bretthauer, David, "Open Source Software: A History" (2001). Published Works. 7. https://opencommons.uconn.edu/libr_pubs/7 Open Source Software: A History —page 1 Open Source Software: A History by David Bretthauer Network Services Librarian, University of Connecticut Open Source Software: A History —page 2 Abstract: In the 30 years from 1970 -2000, open source software began as an assumption without a name or a clear alternative. It has evolved into a s ophisticated movement which has produced some of the most stable and widely used software packages ever produced. This paper traces the evolution of three operating systems: GNU, BSD, and Linux, as well as the communities which have evolved with these syst ems and some of the commonly -used software packages developed using the open source model. It also discusses some of the major figures in open source software, and defines both “free software” and “open source software.” Open Source Software: A History —page 1 Since 1998, the open source softw are movement has become a revolution in software development. However, the “revolution” in this rapidly changing field can actually trace its roots back at least 30 years. Open source software represents a different model of software distribution that wi th which many are familiar. Typically in the PC era, computer software has been sold only as a finished product, otherwise called a “pre - compiled binary” which is installed on a user’s computer by copying files to appropriate directories or folders.