Producing Open Source Software How to Run a Successful Free Software Project

Total Page:16

File Type:pdf, Size:1020Kb

Producing Open Source Software How to Run a Successful Free Software Project Producing Open Source Software How to Run a Successful Free Software Project Karl Fogel Producing Open Source Software: How to Run a Successful Free Software Project by Karl Fogel Copyright © 2005-2017 Karl Fogel, under the CreativeCommons Attribution-ShareAlike (4.0) license. Version: 2.3088 Home site: http://producingoss.com/ Dedication This book is dedicated to two dear friends without whom it would not have been possible: Karen Under- hill and Jim Blandy. i Table of Contents Preface ............................................................................................................................. vi Why Write This Book? ............................................................................................... vi Who Should Read This Book? .................................................................................... vii Sources ................................................................................................................... vii Acknowledgements ................................................................................................... viii For the first edition (2005) ................................................................................ viii For the second edition (2017) ............................................................................... x Disclaimer .............................................................................................................. xiii 1. Introduction .................................................................................................................... 1 History ...................................................................................................................... 3 The Rise of Proprietary Software and Free Software ................................................. 4 "Free" Versus "Open Source" ............................................................................... 7 The Situation Today .................................................................................................... 9 2. Getting Started .............................................................................................................. 11 Starting From What You Have .................................................................................... 12 Choose a Good Name ........................................................................................ 13 Have a Clear Mission Statement .......................................................................... 15 State That the Project is Free .............................................................................. 15 Features and Requirements List ........................................................................... 16 Development Status ........................................................................................... 16 Downloads ....................................................................................................... 17 Version Control and Bug Tracker Access .............................................................. 18 Communications Channels .................................................................................. 19 Developer Guidelines ......................................................................................... 19 Documentation .................................................................................................. 20 Demos, Screenshots, Videos, and Example Output .................................................. 22 Hosting ............................................................................................................ 23 Choosing a License and Applying It ............................................................................. 24 The "Do Anything" Licenses ............................................................................... 24 The GPL ......................................................................................................... 24 How to Apply a License to Your Software ............................................................ 25 Setting the Tone ....................................................................................................... 26 Avoid Private Discussions .................................................................................. 26 Nip Rudeness in the Bud .................................................................................... 28 Codes of Conduct ............................................................................................. 29 Practice Conspicuous Code Review ...................................................................... 29 Be Open From Day One .................................................................................... 31 Opening a Formerly Closed Project .............................................................................. 33 Announcing .............................................................................................................. 34 3. Technical Infrastructure .................................................................................................. 37 What a Project Needs ................................................................................................ 38 Web Site ................................................................................................................. 39 Canned Hosting ................................................................................................ 40 Mailing Lists / Message Forums .................................................................................. 42 Choosing the Right Forum Management Software .................................................. 44 Version Control ........................................................................................................ 52 Version Control Vocabulary ................................................................................ 53 Choosing a Version Control System ..................................................................... 56 Using the Version Control System ....................................................................... 57 Receiving and Reviewing Contributions ................................................................ 60 Bug Tracker ............................................................................................................. 62 ii Producing Open Source Software Interaction with Email ........................................................................................ 64 Pre-Filtering the Bug Tracker .............................................................................. 65 IRC / Real-Time Chat Systems .................................................................................... 66 IRC Bots ......................................................................................................... 68 Archiving IRC .................................................................................................. 68 Wikis ...................................................................................................................... 69 Wikis and Spam ............................................................................................... 69 Choosing a Wiki ............................................................................................... 70 Q&A Forums ........................................................................................................... 70 Translation Infrastructure ............................................................................................ 71 Social Networking Services ........................................................................................ 71 4. Social and Political Infrastructure ..................................................................................... 73 Forkability ............................................................................................................... 73 Benevolent Dictators .................................................................................................. 74 Who Can Be a Good Benevolent Dictator? ............................................................ 74 Consensus-based Democracy ....................................................................................... 75 Version Control Means You Can Relax ................................................................ 76 When Consensus Cannot Be Reached, Vote ........................................................... 76 When To Vote .................................................................................................. 77 Who Votes? ..................................................................................................... 78 Polls Versus Votes ............................................................................................ 79 Vetoes ............................................................................................................. 79 Writing It All Down .................................................................................................. 80 Joining or Creating a Non-Profit Organization ................................................................ 81 5. Participating as a Business, Non-Profit, or Government Agency ............................................. 83 The Economics of Open Source .................................................................................. 83 Types of Corporate Involvement .................................................................................. 84 Governments
Recommended publications
  • The Jungle Through Javascript Frameworks
    The jungle through Javascript frameworks. Jonatan Karlsson Henrik Ölund Web Programming Web Programming 2013, BTH, Blekinge institute of 2013, BTH, Blekinge institute of technology technology Advanced topic in Web development, PA1426 Advanced topic in Web development, PA1426 HT15 HT15 Karlskrona, Sweden Karlskrona, Sweden [email protected] [email protected] PA1426 Revision C, Advanced topic in Web development 2015-11-05 Abstract In this article we have planned to dive into Javascripts world where new framework comes out “every day”. We will take the reader into a world where nothing are for granted and everything is a non-standard. In the current situation, there is a [3] tremendous amount of Javascript frameworks ​ and that makes it difficult for a ​ layman to choose the right framework, for the right task and this is something we will try figure out and explain to the reader. Keywords: Javascript, Framework, MV*, Client-side, React, Mithril, Backbone.js, ​ Ember.js 1 PA1426 Revision C, Advanced topic in Web development 2015-11-05 Abstract 1. Introduction 1.1 Background 1.2 Intention 1.3 Method First part Does the framework follow the MV*-pattern? Is the framework popular on google? Have the framework risen in popularity since 2013? Does the framework have any corporation that backs them? Second part 2. Result 2.1 Which frameworks did we select? 2.2 Not included 2.3 React What philosophies have pushed this framework forward? What kind of problem does this framework solve? Which famous products has been created with this framework?
    [Show full text]
  • Vulnerability Summary for the Week of September 4, 2017
    Vulnerability Summary for the Week of September 4, 2017 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9 Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9 High Vulnerabilities CVS S Primary Publishe Scor Source & Vendor -- Product Description d e Patch Info In libavformat/mxfdec.c in FFmpeg 3.3.3, a DoS in mxf_read_index_entry_array() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted MXF file, which claims a large "nb_index_entries" field in the header but does not contain sufficient backing data, is provided, the loop would consume huge CPU resources, since there is no EOF check inside the loop. Moreover, this big loop can be CVE-2017- invoked multiple times if there is more than 14170 one applicable data segment in the crafted 2017-09- CONFIRM(lin ffmpeg -- ffmpeg MXF file. 07 7.1 k is external) In libavformat/nsvdec.c in FFmpeg 3.3.3, a DoS in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted NSV file, which claims a large "table_entries_used" field in the header but does not contain sufficient backing data, is CVE-2017- provided, the loop over 'table_entries_used' 14171 would consume huge CPU resources, since 2017-09- CONFIRM(lin ffmpeg -- ffmpeg there is no EOF check inside the loop.
    [Show full text]
  • Enough Documentation Release 2.1.22
    Enough Documentation Release 2.1.22 Enough Community Sep 11, 2021 Infrastructure guide 1 Introduction 3 1.1 Requirements...............................................3 1.2 Quick start................................................4 2 Using Enough 5 2.1 Knowledge................................................5 2.2 Using the cloud or physical machines..................................5 2.3 Installation of the Enough CLI......................................5 2.4 Upgrade.................................................6 2.5 OpenStack Enough instance.......................................6 2.6 libvirt Enough instance..........................................7 2.7 Connecting libvirt and OpenStack Enough instances..........................8 2.8 Create or update a service........................................9 2.9 Restore a service............................................. 10 2.10 OpenStack infrastructure services and access.............................. 10 2.11 Certificates................................................ 11 2.12 OpenStack Attached volumes...................................... 12 2.13 Background tasks............................................. 13 2.14 Access.................................................. 13 2.15 OpenStack backups........................................... 13 2.16 Low level commands........................................... 15 3 Services 17 3.1 Nextcloud................................................ 17 3.2 Forum.................................................. 17 3.3 Mattermost...............................................
    [Show full text]
  • Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development
    J Bus Ethics DOI 10.1007/s10551-017-3504-8 ORIGINAL PAPER Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development 1 2 Katie Shilton • Daniel Greene Received: 10 August 2016 / Accepted: 7 March 2017 Ó The Author(s) 2017. This article is an open access publication Abstract Privacy is a critical challenge for corporate managers who wish to promote ethical practices in mobile social responsibility in the mobile device ecosystem. development. Mobile application firms can collect granular and largely unregulated data about their consumers, and must make Keywords Corporate social responsibility Á Occupational ethical decisions about how and whether to collect, store, ethics Á Privacy Á Qualitative analysis Á Technology ethics and share these data. This paper conducts a discourse analysis of mobile application developer forums to dis- cover when and how privacy conversations, as a repre- Introduction: Investigating Work Dynamics sentative of larger ethical debates, arise during that Impact Privacy Reflection development. It finds that online forums can be useful spaces for ethical deliberations, as developers use these Mobile technologies enable new forms of access to infor- spaces to define, discuss, and justify their values. It also mation and communication. But even as the capabilities of discovers that ethical discussions in mobile development mobile technologies advance, many fail to reflect and are prompted by work practices which vary considerably support the values of their users. Studies demonstrate a between iOS and Android, today’s two major mobile striking discord between user values such as privacy and platforms. For educators, regulators, and managers inter- implementation of these values in mobile technologies ested in encouraging more ethical discussion and deliber- (Martin and Shilton 2015).
    [Show full text]
  • Gradual Write-Barrier Insertion Into a Ruby Interpreter
    Gradual Write-Barrier Insertion into a Ruby Interpreter Koichi Sasada Cookpad Inc. Japan [email protected] Abstract older generation objects (old objects) to younger generation Ruby is a popular object-oriented programming language, objects (young objects) [2, 6]. If we forget to insert even one and the performance of the Ruby garbage collector (GC) di- WB, the young objects may be wrongly collected. Of course, rectly affects the execution time of Ruby programs. Ruby2.0 this would be a critical GC bug. and earlier versions employed an inefficient non-generational If you need to implement a generational GC on an inter- conservative mark-and-sweep GC. To improve this and make preter which does not have WBs yet, how can you implement it a generational collector, it is necessary to introduce write it? One straightforward approach is to completely introduce barriers (WBs), but this requires huge modification to exist- all WBs at once. However, if you cannot modify parts of the ing source code, including third-party C-extensions. To avoid source code writing to objects (e.g., in C-extensions), it is the need for adding WBs around legacy code, we invented a not possible to add all required WBs. new concept called “WB-unprotected objects”, which indi- This was the case for the Ruby interpreter in 2013 and cates to the GC to treat such objects more conservatively. By before. leveraging this design, we were able to improve the perfor- The Ruby object-oriented programming language [4] is mance of Ruby 2.1 with a generational GC and of Ruby 2.2 used worldwide, especially for web application development with an incremental GC while preserving compatibility with with the Ruby on Rails framework [11].
    [Show full text]
  • Asynchronous Intrusion Recovery for Interconnected Web Services
    Asynchronous intrusion recovery for interconnected web services The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation Chandra, Ramesh, Taesoo Kim, and Nickolai Zeldovich. “Asynchronous Intrusion Recovery for Interconnected Web Services.” Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles - SOSP ’13 (2013), Nov. 3-6, 2013, Farminton, Pennsylvania, USA. ACM. As Published http://dx.doi.org/10.1145/2517349.2522725 Publisher Association for Computing Machinery Version Author's final manuscript Citable link http://hdl.handle.net/1721.1/91473 Terms of Use Creative Commons Attribution-Noncommercial-Share Alike Detailed Terms http://creativecommons.org/licenses/by-nc-sa/4.0/ Asynchronous intrusion recovery for interconnected web services Ramesh Chandra, Taesoo Kim, and Nickolai Zeldovich MIT CSAIL Abstract in the access control service, she could give herself write access to the employee management service, use these Recovering from attacks in an interconnected system is new-found privileges to make unauthorized changes to difficult, because an adversary that gains access to one employee data, and corrupt other services. Manually re- part of the system may propagate to many others, and covering from such an intrusion requires significant effort tracking down and recovering from such an attack re- to track down what services were affected by the attack quires significant manual effort. Web services are an and what changes were made by the attacker. important example of an interconnected system, as they are increasingly using protocols such as OAuth and REST Many web services interact with one another using pro- APIs to integrate with one another.
    [Show full text]
  • Annual Report
    The Document Founda��on 2016 Annual Report Document Liberation Own your content Welcome This annual report is the sixth chapter in the story of a long journey, started by a group of people that were sharing the common goal of create something new – finally made by the community, for the community. Today, public administraons, enterprises and individual users worldwide can reap the benefits of the hard work made by a constantly growing community of volunteers and supporters. The report is a showcase of the acvies of the foundaon. Looking back, we have accomplished a large number of objecves in 2016 and we are on track for 2017. We have funded improvements to the organizaon and the product, and supported local acvies carried out by nave language projects. Behind the scenes, the foundaon is growing thanks to the commitment of an amazing group of people, with dozens of volunteers in every geography, and a Photo: Maeo G.P. Flora, CC BY-ND 2.5 few paid staff - led by Florian Effenberger - who take care of daily acvies related to documentaon, localizaon, markeng, design, development, QA, websites and system administraon. The management of a foundaon is somemes complicated; o5en you are called to take important decisions achieved only a5er longer debates. Thanks to the diverse approaches and aptudes the Directors are also focusing on new goals for keeping TDF in the right direcon. I would personally thank Thorsten Behrens, Osvaldo Gervasi, Jan Holesovsky, Andreas Mantke, Michael Meeks, Björn Michaelsen, Simon Phipps, Eike Rathke and Norbert Thiebaud for their big commitment to guide the foundaon where is it today.
    [Show full text]
  • Discord Music Bot Bad Request
    Discord Music Bot Bad Request MishnaicGuido consult Gabriel creditably. denounces Marc gnostically remains cultured and purblindly. after Tony autolyze well or rotes any riempie. Tremain usually infuriate eighth or revalidated groggily when This comes into discord music bot Botisimo Chatbot & Streamer Tools for Twitch YouTube. We never went through an odd idea but exercise, Built for Developers. To discord bot will mean for gamers and then attempt to malformed syntax. Keep your discord music bots that add localized video that. They were capable of sending stickers videos music locations documents and. 10 Best Discord Music Bots You business Use 2020 Beebom. Show you generate a bot in nature or swaying trees. Skype is deserve of salt high-definition video calls HD calls have clear video quality the audio is in sync and the experience is void as with you're bean in front bench the other person for full-HD Skype calls have some technical requirements. How to record better audio on only phone Popular Science. An automated processes, discord bots is arguably one request? It even when people on discord bot is bad video could not request has a way. But became really shouldn't cause that is one kiss Sends a gif of a fresh for mentioned. How discord bot user requests that have any comments cannot be patience for discord bot! Hydra lets you with critical reviews and not make the discord bot that monitor will code looks like top music, atom a token for membership and make the discord. Block this does not support the requester.
    [Show full text]
  • The E-Government Development Discourse
    The e-Government Development Discourse Analysing Contemporary and Future Growth Prospects in Developing and Emerging Economies Kelvin J. Bwalya The e-Government Development Discourse Analysing Contemporary and Future Growth Prospects in Developing and Emerging Economies Published by AOSIS (Pty) Ltd, 15 Oxford Street, Durbanville 7550, Cape Town, South Africa Postnet Suite #110, Private Bag X19, Durbanville 7551, South Africa Tel: +27 21 975 2602 Fax: +27 21 975 4635 Email: [email protected] Website: https://www.aosis.co.za Copyright © Kelvin J. Bwalya. Licensee: AOSIS (Pty) Ltd The moral right of the author has been asserted. Cover: Original design created with the use of images released under the CCO Creative Commons license. The images are https://pixabay.com/en/analytics-information- innovation-3088958/ and https://pixabay.com/en/cape-town-south-africa-historically-997524/. ISBN: 978-1-928396-55-0 (print) ISBN: 978-1-928396-56-7 (epub) ISBN: 978-1-928396-57-4 (pdf) DOI: https://doi.org/10.4102/aosis.2018.BK71 How to cite this work: Bwalya, K.J., 2018, The e-Government Development Discourse: Analysing Contemporary and Future Growth Prospects in Developing and Emerging Economies, pp. i–296, AOSIS, Cape Town. Printed and bound in South Africa. Listed in OAPEN (http://www.oapen.org), DOAB (http://www.doabooks.org/) and indexed by Google Scholar. Some rights reserved. This is an open access publication. Except where otherwise noted, this work is distributed under the terms of a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license (CC BY-NC-SA 4.0), a copy of which is available at https:// creativecommons.org/licenses/by-nc-sa/4.0/.
    [Show full text]
  • The Title of the Article
    OHDSI Cloud Architecture Lee D. Evans, LTS Computing LLC, West Chester PA Abstract The OHDSI cloud provides shared computing and collaboration tool services for the diverse global OHDSI community. It has been developed iteratively over a one year time frame based on expanding community needs. The OHDSI cloud has been operationally very stable and satisfies the performance and operational budget constraints. Declaration of Interests LTS Computing LLC delivers commercial IT projects/services for Life Sciences clients, including pharmaceutical companies. Introduction The OHDSI cloud supports five groups of services: OHDSI Community global collaboration tools Continuous integration build and automated deployment of OHDSI applications OHDSI applications sandbox/demonstration environments running the OHDSI WebAPI OHDSI LAERTES knowledge base ETL operational environment OHDSI research network data repository Infrastructure Ubuntu LTS 14.04 server images running on m3 medium EC2 servers in Amazon AWS. Windows 2012 server image running on an m3 medium server to support Windows based OHDSI tool continuous integration builds. PostgreSQL 9.3 databases running on Amazon EC2 and RDS. OHDSI Community global collaboration tools WordPress Web Site, Dokuwiki Wiki, Discourse Forums. Continuous integration build and automated deployment of OHDSI applications Linux builds are executed using Travis CI software as a service. Windows builds are executed on an AWS hosted Jenkins server. The builds and automated deployments are automatically triggered when new code is pushed to the OHDSI GitHub master repositories. OHDSI applications sandbox/demonstration environments running the OHDSI WebAPI The OHDSI web applications are automatically deployed to Tomcat and Apache servers running within Docker containers. Docker volumes are shared with the Amazon EC2 host servers for persistent storage.
    [Show full text]
  • Apple Report.Pdf
    Bachelor thesis, premaster New Media & Digital Culture, Utrecht University Author: Ryanne Turenhout (3555224) Date: January 28, 2011 Supervisor: Dr. I.O. de Vries Keywords: apple, google, open, closed, platforms, operating systems Android vs. iOS A critical analysis of the open vs. closed debate between Google and Apple Introduction On October 18th, 2010 Steve Jobs, CEO of Apple, made a rare appearance at the 4th quarter 2010 earning call of Apple. He publicly spoke out against Google Android and said, “Google loves to characterize Android as open, and iOS and iPhone as closed. We find this a bit disingenuous and clouding the real difference between our two approaches” (Snell, 2010). He went on to say that the real debate lies in ‘fragmented vs. integrated’. Android is very fragmented, has 100 different versions on 244 different handsets and the user is left to figure out how the Operating System (OS) works. This as opposed to the iPhone where every handset works the same and uses proprietary software with an integrated App Store (Snell, 2010). Briefly, the debate is between Android and iOS, both trying to dominate the mobile market. Android is open source and the iPhone uses the closed source iOS. The two different approaches, open and closed, are at the centre of the debate. The statement of Steve Jobs already implies the importance of this ongoing debate between open and closed mobile platforms. Tim Berners- Lee further shows the importance of this debate in a recent article, ‘Long Live the Web: A Call for Continued Open Standards and Neutrality’. In this article he said the following: [Not] using open standards creates closed worlds.
    [Show full text]
  • Virtual Coffee Room
    Virtual Coffee Room https://cafe.elixir.ut.ee Ivan Kuzmin, Hedi Peterson Contents 1 Motivation3 2 Choice of technical platform3 2.1 Technology stack.............................4 2.2 ELIXIR AAI integration.........................4 2.3 Groups, privacy levels..........................4 3 Use cases4 3.1 Basic usage by an ELIXIR member at cafe.elixir.ut.ee.........5 3.2 VCR as a Node support service.....................5 3.3 VCR as a bioinformatics service support................5 4 Shortcomings and future directions6 2 1 Motivation Large virtual organisations acting in international space need convenient technological platforms to ease communication among its members located in various countries. Communication that in local organisations might happen during specialised meetings or as ad hoc get togethers cannot take place the same way when members of the community meet face to face only a few times per year. Therefore, convenient virtual environments are needed to enhance knowledge exchange and seemingless sharing of best practices. StackOverflow and Biostars are Question & Answer platforms well received and used among the life science and bioinformatics community. However, these platforms are meant for more general questions about programming and bioin- formatics. So these existing platforms would not suit as a platform to discuss more specific topics about European Life Science Infrastructure ELIXIR. Thus, we de- cided to dedicate part of the ELIXIR-Excelerate project to provide a communication platform to enhance knowledge exchange among the hundreds of people working for ELIXIR across its 23 member countries. 2 Choice of technical platform There are several technological platforms developed by companies or open software enthusiasts that had the key features that we were looking for.
    [Show full text]