Free As in Freedom Richard Stallman's Crusade for Free Software

Total Page:16

File Type:pdf, Size:1020Kb

Free As in Freedom Richard Stallman's Crusade for Free Software Free as in Freedom Richard Stallman's Crusade for Free Software Sam Williams ∗ copy @ www.gnu.org ∗ Generated by SiSU www.jus.uio.no/sisu www.sisudoc.org Copyright © Sam Williams 2002, published under the GNU Free Documentation License. Per- mission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Document License, Version 1.1 or any later version published by the Free Software Foun- dation; with the Invariant Sections being no invariant sections, with the Front-Cover Texts being no invariant sections, and with the Back-Cover Texts being no invariant sections. A copy of the license is included in Appendix C, GNU Free Documentation License. All images are to be included verbatim when the document is copied, distributed, or modified under the terms of the GFDL. Generated by SiSU [ SiSU 0.63.0 of 2007w51/1 ] www.jus.uio.no/sisu Copyright © 1997, current 2007 Ralph Amissah, All Rights Reserved. SiSU is software for document structuring, publishing and search (with object citation numbering), www.sisudoc.org SiSU is released under GPL 3 or later, <http://www.fsf.org/licenses/gpl.html>. Document information: sourcefile free as in freedom.richard stallman crusade for free software.sam williams.sst Generated by SiSU www.jus.uio.no/sisu version information: SiSU 0.63.0 of 2007w51/1 For alternative output formats of this document check: <http://www.jus.uio.no/sisu/free as in freedom.richard stallman crusade for free software.sam williams/sisu manifest.html> SiSU www.gnu.org ii Contents Contents Free as in Freedom1 Richard Stallman's Crusade for Free Software2 By Sam Williams3 Preface..........................................4 Comments and Questions............................5 Acknowledgments................................5 Chapter 1 - For Want of a Printer............................6 Chapter 2 - 2001: A Hacker’s Odyssey......................... 14 Chapter 3 - A Portrait of the Hacker as a Young Man................. 22 Chapter 4 - Impeach God................................ 30 Chapter 5 - Small Puddle of Freedom.......................... 44 Chapter 6 - The Emacs Commune........................... 56 Chapter 7 - A Stark Moral Choice........................... 65 Chapter 8 - St. Ignucius................................. 78 Chapter 9 - The GNU General Public License..................... 87 Chapter 10 - GNU/Linux................................ 100 Chapter 11 - Open Source................................ 108 Chapter 12 - A Brief Journey Through Hacker Hell.................. 118 Chapter 13 - Continuing the Fight........................... 121 Chapter 14 - Epilogue: Crushing Loneliness...................... 128 Appendix A - Terminology............................... 139 Appendix B - Hack, Hackers, and Hacking....................... 140 Appendix C - GNU Free Documentation License (GFDL)............... 144 Document Information (metadata) 150 Metadata......................................... 150 Information on this document copy and an unofficial List of Some web related information and sources 151 Information on this document copy........................... 151 Links that may be of interest.............................. 151 SiSU www.gnu.org iii Contents FREE AS IN FREEDOM 1 SiSU www.gnu.org1 Contents RICHARD STALLMAN’S CRUSADE FOR FREE SOFTWARE 2 SiSU www.gnu.org2 Contents BY SAM WILLIAMS 3 SiSU www.gnu.org3 Free as in Freedom Preface 4 The work of Richard M. Stallman literally speaks for itself. From the documented source 5 code to the published papers to the recorded speeches, few people have expressed as much willingness to lay their thoughts and their work on the line. Such openness-if one can pardon a momentary un-Stallman adjective-is refreshing. After all, 6 we live in a society that treats information, especially personal information, as a valuable com- modity. The question quickly arises. Why would anybody want to part with so much informa- tion and yet appear to demand nothing in return? As we shall see in later chapters, Stallman does not part with his words or his work altruistically. 7 Every program, speech, and on-the-record bon mot comes with a price, albeit not the kind of price most people are used to paying. I bring this up not as a warning, but as an admission. As a person who has spent the last year 8 digging up facts on Stallman’s personal history, it’s more than a little intimidating going up against the Stallman oeuvre. “Never pick a fight with a man who buys his ink by the barrel,” goes the old Mark Twain adage. In the case of Stallman, never attempt the definitive biography of a man who trusts his every thought to the public record. For the readers who have decided to trust a few hours of their time to exploring this book, I 9 can confidently state that there are facts and quotes in here that one won’t find in any Slashdot story or Google search. Gaining access to these facts involves paying a price, however. In the case of the book version, you can pay for these facts the traditional manner, i.e., by purchasing the book. In the case of the electronic versions, you can pay for these facts in the free software manner. Thanks to the folks at O’Reilly and Associates, this book is being distributed under the GNU Free Documentation License, meaning you can help to improve the work or create a personalized version and release that version under the same license. If you are reading an electronic version and prefer to accept the latter payment option, that is, 10 if you want to improve or expand this book for future readers, I welcome your input. Starting in June, 2002, I will be publishing a bare bones HTML version of the book on the web site, <http://www.faifzilla.org>. My aim is to update it regularly and expand the Free as in Freedom story as events warrant. If you choose to take the latter course, please review Appendix C of this book. It provides a copy of your rights under the GNU Free Documentation License. For those who just plan to sit back and read, online or elsewhere, I consider your attention an 11 equally valuable form of payment. Don’t be surprised, though, if you, too, find yourself looking for other ways to reward the good will that made this work possible. One final note: this is a work of journalism, but it is also a work of technical documentation. 12 In the process of writing and editing this book, the editors and I have weighed the comments and factual input of various participants in the story, including Richard Stallman himself. We realize there are many technical details in this story that may benefit from additional or refined information. As this book is released under the GFDL, we are accepting patches just like we would with any free software program. Accepted changes will be posted electronically and will eventually be incorporated into future printed versions of this work. If you would like to contribute to the further improvement of this book, you can reach me at [email protected] SiSU www.gnu.org4 Free as in Freedom Comments and Questions 13 Please address comments and questions concerning this book to the publisher: 14 15 O’Reilly and Associates, Inc. 1005 Gravenstein Highway North Sebastopol, CA 95472 (800) 998-9938 (in the United States or Canada) (707) 829-0515 (international/local) (707) 829-0104 (fax) There is a web page for this book, which lists errata, examples, or any additional information. 16 The site also includes a link to a forum where you can discuss the book with the author and other readers. You can access this site at: <http://www.oreilly.com/catalog/freedom/> 17 To comment or ask technical questions about this book, send email to: 18 [email protected] 19 For more information about books, conferences, Resource Centers, and the O’Reilly Network, 20 see the O’Reilly web site at: <http://www.oreilly.com> 21 Acknowledgments 22 Special thanks to Henning Gutmann for sticking by this book. Special thanks to Aaron Oas 23 for suggesting the idea to Tracy in the first place. Thanks to Laurie Petrycki, Jeffrey Holcomb, and all the others at O’Reilly and Associates. Thanks to Tim O’Reilly for backing this book. Thanks to all the first-draft reviewers: Bruce Perens, Eric Raymond, Eric Allman, Jon Orwant, Julie and Gerald Jay Sussman, Hal Abelson, and Guy Steele. I hope you enjoy this typo-free version. Thanks to Alice Lippman for the interviews, cookies, and photographs. Thanks to my family, Steve, Jane, Tish, and Dave. And finally, last but not least: thanks to Richard Stallman for having the guts and endurance to “show us the code.” Sam Williams 24 SiSU www.gnu.org5 Free as in Freedom Chapter 1 - For Want of a Printer 25 I fear the Greeks. Even when they bring gifts. —Virgil The Aeneid 26 The new printer was jammed, again. 27 Richard M. Stallman, a staff software programmer at the Massachusetts Institute of Technol- 28 ogy’s Artificial Intelligence Laboratory (AI Lab), discovered the malfunction the hard way. An hour after sending off a 50-page file to the office laser printer, Stallman, 27, broke off a pro- ductive work session to retrieve his documents. Upon arrival, he found only four pages in the printer’s tray. To make matters even more frustrating, the four pages belonged to another user, meaning that Stallman’s print job and the unfinished portion of somebody else’s print job were still trapped somewhere within the electrical plumbing of the lab’s computer network. Waiting for machines is an occupational hazard when you’re a software programmer, so Stall- 29 man took his frustration with a grain of salt. Still, the difference between waiting for a machine and waiting on a machine is a sizable one. It wasn’t the first time he’d been forced to stand over the printer, watching pages print out one by one.
Recommended publications
  • FAI.Me a Build Service for Installation Images and Cloud Images
    FAI.me A Build Service for Installation Images and Cloud Images Thomas Lange, Debian Developer and sysadmin at the University of Cologne [email protected] MiniDebConf Hamburg 2018 1/19 finger Mrfai@localhost ◮ whoami ◮ Sysadmin for more than two and a half decades ◮ Debian developer since 2000 ◮ Diploma in computer science, University of Bonn, Germany ◮ SunOS 4.1.1 on SPARC hardware, then Solaris Jumpstart ◮ Started FAI in 1999 for my first cluster (16× Dual PII 400 MHz) ◮ Several talks and tutorials: Linux Kongress, Linuxtag, DebConf, SANE, LCA, FOSDEM, CeBit, OSDC, UKUUG, FrOSCon, Chemnitzer Linuxtag ◮ FAI trainings 2/19 Motivation ◮ Debian installer is not that easy for beginners ◮ Also FAI is not for beginners ◮ How to make FAI usable for beginners? 3/19 The idea ◮ An installer should cover the most usual installations ◮ Ignore the special cases ◮ Do only ask the really important questions ◮ Ask everything at the beginning ◮ Create a customized installation media ◮ Boot this installation media and get yourself a coffee ◮ Ready! 4/19 FAI ◮ FAI = Fully Automatic Installation ◮ FAI is a tool for experienced sysadmins ◮ You have to adjust the config files to your local needs ◮ How to make FAI usable for beginners? FAI.me 5/19 FAI.me 6/19 FAI.me ◮ Easy creation of the installation media (CD/USB stick) ◮ Customizations are easy to do (clicks on a web page) ◮ Lanuage, user name and pw, root pw ◮ Select one of the common desktops ◮ Additional packages ◮ Distributions: stable, stable+backports, testing 7/19 Some more advanced features ◮ A couple of different partitioning variants ◮ SSH key for root login ◮ Use your github account (ssh pub key) for the root login ◮ Add one public available repository 8/19 FAI.me for the cloud ◮ Cloud Images ◮ Get your customized cloud image by just a few clicks ◮ Disk size ◮ Disk image format (raw.xz, raw.zst, qcow2, vmdk,...) ◮ Hostname 9/19 FAI.me more ideas ◮ Make web page dynamic: easy mode Thanks Juri! ◮ Images for non-amd64 archs ◮ Other distributions (e.g.
    [Show full text]
  • Hal Abelson Education: Princeton AB (Summa Cum Laude)
    Hal Abelson Education: Princeton A.B. (summa cum laude) 1969 MIT Ph.D. (Mathematics) 1973 Professional Appointments: 1994–present MIT Class of 1922 Professor MIT 1991–present Full Professor of Computer Sci. and Eng. MIT 1982–1991 Associate Professor of Electrical Eng. and Computer Sci. MIT 1979–1982 Associate Professor, Dept. of EECS and Division for Study and Res. in Education MIT 1977–1979 Assistant Professor, Dept. of EECS and DSRE MIT 1974–1979 Lecturer, Dept. of Mathematics and DSRE MIT 1974–1979 Instructor, Dept. of Mathematics and DSRE MIT Selected publications relevant to this proposal: 1. “Transparent Accountable Data Mining: New Strategies for Privacy Protection,” with T. Berners- Lee, C. Hanson, J, Hendler, L. Kagal, D. McGuinness, G.J. Sussman, K. Waterman, and D. Weitzner. MIT CSAIL Technical Report, 2006-007, January 2006. 2. “Information Accountability,” with Daniel J. Weitzner, Tim Berners-Lee, Joan Feigenbaum, James Hendler, and Gerald Jay Sussman, MIT CSAIL Technical Report, 2007-034, June 2007. Available at http://hdl.handle.net/1721.1/37600. 3. “The Creation of OpenCourseWare at MIT,” J. Science Education and Technology, May, 2007. 4. Structure and Interpretation of Computer Programs, Hal Abelson, Gerald Jay Sussman and Julie Sussman, MIT Press and McGraw-Hill, 1985, (published translations in French, Polish, Chinese, Japanese, Spanish, and German). Second Edition, 1996. 5. “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption,” with Ross Ander- son, Steven Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter Neumann, Ronald Rivest, Jeffrey Schiller, and Bruce Schneier, in World Wide Web Journal, vol. 2, no.
    [Show full text]
  • Ethics in Security Testing
    Ethics in Security Testing Title Prepared by: Nick Dunn, Managing Security Consultant Table of contents Executive summary ................................................................... 3 Introduction ................................................................................4 Professional ethics .................................................................... 6 The hacker ethic ........................................................................ 9 Reconciling the ethical stances ............................................... 12 Conclusion ............................................................................... 16 References .............................................................................. 18 About NCC Group ................................................................... 20 2 NCC Group Whitepaper ©2018 Executive summary This paper discusses the similarities and differences between professional ethics in the information security industry and ethics in the hacker community. Sources of conflict between the two and shared values of the two are discussed in order to find some reconciliation and come to an understanding of how a shared set of ethics is possible. A reconciled set of ethics allows hackers to function within the corporate world without compromising their principles and allows the commercial world to benefit from some of the more progressive ideas within the hacker community. A reconciled set of ethics allows hackers to function within the corporate world without compromising their principles
    [Show full text]
  • Abuse of Dominantposition and Switching Costs
    UNIVERSITY OF LONDON REFUSAL TO LICENSE: ABUSE OF DOMINANT POSITION AND SWITCHING COSTS NET LE SUBMITTED TO THE LAW DEPARTMENT OF THE LONDON SCHOOL OF ECONOMICS AND POLITICAL SCIENCE FOR THE DEGREE OF DOCTOR OF PHILOSOPHY LONDON, MAY 2004 U /« 3 L \ * f LONDIU) \ WtfV. / UMI Number: U615726 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. Dissertation Publishing UMI U615726 Published by ProQuest LLC 2014. Copyright in the Dissertation held by the Author. Microform Edition © ProQuest LLC. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106-1346 Th e s e s F 353£ . Library British Library of Political and Economic Science IJW 5S 5 II ACKNOWLEDGEMENT Foremost, I wish to express my deep gratitude to my supervisors, Professor William T. Murphy and Mr. Andrew Murray for their continual support throughout this thesis. Their comments have helped to essentially improve the accuracy of my research. Further, I wish to thank Mr. Giorgio Monti for reviewing my drafts, sharing with me books, giving me invaluable feedback and assistance. Others from LSE whom I would like to thank include Doctors Carsten Sorensen and Ole Hanseth (Department of Information System), Professors Max Steuer, Dany Quah and Michele Picione (Department of Economics) for reading my drafts, generously sharing with me their knowledge, improving my understanding and moreover providing me with excellent research inspiration.
    [Show full text]
  • Learning React Functional Web Development with React and Redux
    Learning React Functional Web Development with React and Redux Alex Banks and Eve Porcello Beijing Boston Farnham Sebastopol Tokyo Learning React by Alex Banks and Eve Porcello Copyright © 2017 Alex Banks and Eve Porcello. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com/safari). For more information, contact our corporate/insti‐ tutional sales department: 800-998-9938 or [email protected]. Editor: Allyson MacDonald Indexer: WordCo Indexing Services Production Editor: Melanie Yarbrough Interior Designer: David Futato Copyeditor: Colleen Toporek Cover Designer: Karen Montgomery Proofreader: Rachel Head Illustrator: Rebecca Demarest May 2017: First Edition Revision History for the First Edition 2017-04-26: First Release See http://oreilly.com/catalog/errata.csp?isbn=9781491954621 for release details. The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Learning React, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. While the publisher and the authors have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the authors disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights.
    [Show full text]
  • Audiences, Gender and Community in Fan Vidding Katharina M
    University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections 2011 "Veni, Vidi, Vids!" audiences, gender and community in Fan Vidding Katharina M. Freund University of Wollongong, [email protected] Recommended Citation Freund, Katharina M., "Veni, Vidi, Vids!" audiences, gender and community in Fan Vidding, Doctor of Philosophy thesis, School of Social Sciences, Media and Communications, Faculty of Arts, University of Wollongong, 2011. http://ro.uow.edu.au/theses/3447 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] “Veni, Vidi, Vids!”: Audiences, Gender and Community in Fan Vidding A thesis submitted in fulfilment of the requirements for the award of the degree Doctor of Philosophy From University of Wollongong by Katharina Freund (BA Hons) School of Social Sciences, Media and Communications 2011 CERTIFICATION I, Katharina Freund, declare that this thesis, submitted in fulfilment of the requirements for the award of Doctor of Philosophy, in the Arts Faculty, University of Wollongong, is wholly my own work unless otherwise referenced or acknowledged. The document has not been submitted for qualifications at any other academic institution. Katharina Freund 30 September, 2011 i ABSTRACT This thesis documents and analyses the contemporary community of (mostly) female fan video editors, known as vidders, through a triangulated, ethnographic study. It provides historical and contextual background for the development of the vidding community, and explores the role of agency among this specialised audience community. Utilising semiotic theory, it offers a theoretical language for understanding the structure and function of remix videos.
    [Show full text]
  • Bringing GNU Emacs to Native Code
    Bringing GNU Emacs to Native Code Andrea Corallo Luca Nassi Nicola Manca [email protected] [email protected] [email protected] CNR-SPIN Genoa, Italy ABSTRACT such a long-standing project. Although this makes it didactic, some Emacs Lisp (Elisp) is the Lisp dialect used by the Emacs text editor limitations prevent the current implementation of Emacs Lisp to family. GNU Emacs can currently execute Elisp code either inter- be appealing for broader use. In this context, performance issues preted or byte-interpreted after it has been compiled to byte-code. represent the main bottleneck, which can be broken down in three In this work we discuss the implementation of an optimizing com- main sub-problems: piler approach for Elisp targeting native code. The native compiler • lack of true multi-threading support, employs the byte-compiler’s internal representation as input and • garbage collection speed, exploits libgccjit to achieve code generation using the GNU Com- • code execution speed. piler Collection (GCC) infrastructure. Generated executables are From now on we will focus on the last of these issues, which con- stored as binary files and can be loaded and unloaded dynamically. stitutes the topic of this work. Most of the functionality of the compiler is written in Elisp itself, The current implementation traditionally approaches the prob- including several optimization passes, paired with a C back-end lem of code execution speed in two ways: to interface with the GNU Emacs core and libgccjit. Though still a work in progress, our implementation is able to bootstrap a func- • Implementing a large number of performance-sensitive prim- tional Emacs and compile all lexically scoped Elisp files, including itive functions (also known as subr) in C.
    [Show full text]
  • GNU Guix Cookbook Tutorials and Examples for Using the GNU Guix Functional Package Manager
    GNU Guix Cookbook Tutorials and examples for using the GNU Guix Functional Package Manager The GNU Guix Developers Copyright c 2019 Ricardo Wurmus Copyright c 2019 Efraim Flashner Copyright c 2019 Pierre Neidhardt Copyright c 2020 Oleg Pykhalov Copyright c 2020 Matthew Brooks Copyright c 2020 Marcin Karpezo Copyright c 2020 Brice Waegeneire Copyright c 2020 Andr´eBatista Copyright c 2020 Christine Lemmer-Webber Copyright c 2021 Joshua Branson Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents GNU Guix Cookbook ::::::::::::::::::::::::::::::: 1 1 Scheme tutorials ::::::::::::::::::::::::::::::::: 2 1.1 A Scheme Crash Course :::::::::::::::::::::::::::::::::::::::: 2 2 Packaging :::::::::::::::::::::::::::::::::::::::: 5 2.1 Packaging Tutorial:::::::::::::::::::::::::::::::::::::::::::::: 5 2.1.1 A \Hello World" package :::::::::::::::::::::::::::::::::: 5 2.1.2 Setup:::::::::::::::::::::::::::::::::::::::::::::::::::::: 8 2.1.2.1 Local file ::::::::::::::::::::::::::::::::::::::::::::: 8 2.1.2.2 `GUIX_PACKAGE_PATH' ::::::::::::::::::::::::::::::::: 9 2.1.2.3 Guix channels ::::::::::::::::::::::::::::::::::::::: 10 2.1.2.4 Direct checkout hacking:::::::::::::::::::::::::::::: 10 2.1.3 Extended example ::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Hacker Culture & Politics
    HACKER CULTURE & POLITICS COMS 541 (CRN 15368) 1435-1725 Department of Art History and Communication Studies McGill University Professor Gabriella Coleman Fall 2012 Arts W-220/ 14:35-17:25 Professor: Dr. Gabriella Coleman Office: Arts W-110 Office hours: Sign up sheet Tuesday 2:30-3:30 PM Phone: xxx E-mail: [email protected] OVERVIEW This course examines computer hackers to interrogate not only the ethics and technical practices of hacking, but to examine more broadly how hackers and hacking have transformed the politics of computing and the Internet more generally. We will examine how hacker values are realized and constituted by different legal, technical, and ethical activities of computer hacking—for example, free software production, cyberactivism and hactivism, cryptography, and the prankish games of hacker underground. We will pay close attention to how ethical principles are variably represented and thought of by hackers, journalists, and academics and we will use the example of hacking to address various topics on law, order, and politics on the Internet such as: free speech and censorship, privacy, security, surveillance, and intellectual property. We finish with an in-depth look at two sites of hacker and activist action: Wikileaks and Anonymous. LEARNER OBJECTIVES This will allow us to 1) demonstrate familiarity with variants of hacking 2) critically examine the multiple ways hackers draw on and reconfigure dominant ideas of property, freedom, and privacy through their diverse moral 1 codes and technical activities 3) broaden our understanding of politics of the Internet by evaluating the various political effects and ramifications of hacking.
    [Show full text]
  • Fostering Learning in the Networked World: the Cyberlearning Opportunity and Challenge
    Inquiries or comments on this report may be directed to the National Science Foundation by email to: [email protected] “Any opinions, findings, conclusions and recommendations expressed in this report are those of the Task Force and do not necessarily reflect or represent the views of the National Science Foundation.” Fostering Learning in the Networked World: The Cyberlearning Opportunity and Challenge A 21st Century Agenda for the National Science Foundation1 Report of the NSF Task Force on Cyberlearning June 24, 2008 Christine L. Borgman (Chair), Hal Abelson, Lee Dirks, Roberta Johnson, Kenneth R. Koedinger, Marcia C. Linn, Clifford A. Lynch, Diana G. Oblinger, Roy D. Pea, Katie Salen, Marshall S. Smith, Alex Szalay 1 We would like to acknowledge and give special thanks for the continued support and advice from National Science Foundation staff Daniel Atkins, Cora Marrett, Diana Rhoten, Barbara Olds, and Jim Colby. Andrew Lau of the University of California at Los Angeles provided exceptional help and great spirit in making the distributed work of our Task Force possible. Katherine Lawrence encapsulated the Task Force’s work in a carefully crafted Executive Summary. Fostering Learning in the Networked World: The Cyberlearning Opportunity and Challenge A 21st Century Agenda for the National Science Foundation Science Foundation the National for A 21st Century Agenda Report of the NSF Task Force on Cyberlearning Table of Contents Executive Summary...............................................................................................................................................................................................................................5
    [Show full text]
  • UNIVERSITY of CALIFORNIA SAN DIEGO Simplifying Datacenter Fault
    UNIVERSITY OF CALIFORNIA SAN DIEGO Simplifying datacenter fault detection and localization A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science by Arjun Roy Committee in charge: Alex C. Snoeren, Co-Chair Ken Yocum, Co-Chair George Papen George Porter Stefan Savage Geoff Voelker 2018 Copyright Arjun Roy, 2018 All rights reserved. The Dissertation of Arjun Roy is approved and is acceptable in quality and form for publication on microfilm and electronically: Co-Chair Co-Chair University of California San Diego 2018 iii DEDICATION Dedicated to my grandmother, Bela Sarkar. iv TABLE OF CONTENTS Signature Page . iii Dedication . iv Table of Contents . v List of Figures . viii List of Tables . x Acknowledgements . xi Vita........................................................................ xiii Abstract of the Dissertation . xiv Chapter 1 Introduction . 1 Chapter 2 Datacenters, applications, and failures . 6 2.1 Datacenter applications, networks and faults . 7 2.1.1 Datacenter application patterns . 7 2.1.2 Datacenter networks . 10 2.1.3 Datacenter partial faults . 14 2.2 Partial faults require passive impact monitoring . 17 2.2.1 Multipath hampers server-centric monitoring . 18 2.2.2 Partial faults confuse network-centric monitoring . 19 2.3 Unifying network and server centric monitoring . 21 2.3.1 Load-balanced links mean outliers correspond with partial faults . 22 2.3.2 Centralized network control enables collating viewpoints . 23 Chapter 3 Related work, challenges and a solution . 24 3.1 Fault localization effectiveness criteria . 24 3.2 Existing fault management techniques . 28 3.2.1 Server-centric fault detection . 28 3.2.2 Network-centric fault detection .
    [Show full text]
  • Gentlemen's Argument
    Copyright © 2007, Chicago-Kent Journal of Intellectual Property A GENTLEMEN'S AGREEMENT ASSESSING THE GNU GENERAL PUBLIC LICENSE AND ITS ADAPTATION TO LINUx Douglas A. Hass" Introduction "Starting this Thanksgiving, I am going to write a complete Unix-compatible software system called GNU (for GNU's Not Unix), and give it away free to everyone who can use it." With his post to the Usenet 2 newsgroup net.unix-wizards, 3 Richard Stallman launched a sea change in software development. In 1983, he could not have known that his lasting contribution would not be the GNU operating system, but instead the controversial software license that he would develop as its underpinning: the GNU General Public License (GPL).4 Today, the operating system most closely associated with the GPL is Linux, developed originally by Linus Torvalds, a Finnish university student.5 Research group IDC's Quarterly Server Tracker marked Linux server revenue growth at three times Microsoft Windows server growth in the first quarter of 2006, its fifteenth consecutive quarter of double-digit revenue growth. 6 British research firm Netcraft's July 2006 Web Server Survey gives Linux-based 7 Apache Web servers the largest market share among Web servers queried in its monthly survey. With Linux gaining an increasingly larger position in these markets, the validity of the GPL takes on increasing importance as well. The open source community's commercial and non-commercial members are conducting a robust debate on the intellectual property issues surrounding the GPL and Linux, its most * Douglas A. Hass, Director of Business Development, ImageStream; J.D.
    [Show full text]