Gender Differences and Bias in Open Source: Pull Request Acceptance of Women Versus Men

Total Page:16

File Type:pdf, Size:1020Kb

Gender Differences and Bias in Open Source: Pull Request Acceptance of Women Versus Men Gender differences and bias in open source: pull request acceptance of women versus men Kabdo Choi, Hyunwoo Kim, Soyeon Jung 1 Contents Gender difference and bias in STEM, CS, and open source community Why it happens? The effect of gender bias in open source community Discussion 2 Gender difference and bias in STEM, CS, and open source community 3 Gender difference and bias in STEM [1] [2] [1] [2] Luke E. Holman, Devi E. Stuart-Fox, and Cindy E. Hauser. 2018. The gender gap in science: How long until women are equally represented? PLOS Biology 16, 4 (2018). DOI:http://dx.doi.org/10.1371/journal.pbio.2004956 4 Gender difference and bias in STEM [3] [4] [5] [3]C.A. Moss-Racusin, J.F. Dovidio, V.L. Brescoll, M.J. Graham, and J. Handelsman. 2012. Science faculty’s subtle gender biases favor male students. Proceedings of the National Academy of Sciences 109, 41 (2012), 16474–16479. DOI:http://dx.doi.org/10.1073/pnas.1211286109 [4]Silvia Knobloch-Westerwick, Carroll J. Glynn, and Michael Huge. 2013. The Matilda Effect in Science Communication. Science Communication 35, 5 (June 2013), 603–625. DOI:http://dx.doi.org/10.1177/1075547012472684 [5]Christine L. Nittrouer, Michelle R. Hebl, Leslie Ashburn-Nardo, Rachel C.E. Trump-Steele, David M. Lane, and Virginia Valian. 2017. Gender disparities in colloquium speakers at top universities. Proceedings of the National Academy of Sciences 115, 1 (2017), 104–108. DOI:http://dx.doi.org/10.1073/pnas.1708414115 5 Why gender diversity matters? [6] [7] [6] Bogdan Vasilescu et al. 2015. Gender and Tenure Diversity in GitHub Teams. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems - CHI 15 (2015). DOI:http://dx.doi.org/10.1145/2702123.2702549 [7] Sander Hoogendoorn, Hessel Oosterbeek, and Mirjam Van Praag. 2013. The Impact of Gender Diversity on the Performance of Business Teams: Evidence from a Field Experiment. Management Science 59, 7 (2013), 1514–1528. DOI:http://dx.doi.org/10.1287/mnsc.1120.1674 6 Q : Whose pull requests would be more likely to get accepted in GitHub? A : Women / Men / Almost same 7 Gender difference and bias in open source Main RQ To what extent does gender bias exist when pull requests are judged on GitHub? Methodology GHTorrent dataset on pull request from June, 7, 2010 to April 1, 2015 about pull request status, description, and comment Linking GH accounts with social media profiles Matching email address on the Google+ social network Identify 1,426,127 (35.3%) of GH users’ gender 8 Gender difference and bias in open source Result women tend to have their pull requests accepted at a higher rate than men Chart : acceptance rate of pull requests [8] Hypotheses Do women’s pull request acceptance rates start low and increase over time? Are women focusing their efforts on fewer projects? Are women making pull requests that are more needed? Are women making smaller changes? Are women’s pull requests more successful when contributing code? Is woman’s pull request accepted more often because she appears to be a women? Figure : Pull request acceptance rate over time. [8] [8] Josh Terrell et al. 2017. Gender differences and bias in open source: pull request acceptance of women versus men. PeerJ Computer Science 3 (January 2017). DOI:http://dx.doi.org/10.7717/peerj-cs.111 9 Gender difference and bias in open source Hypothesis Do women’s pull request acceptance rates start low and increase over time? Are women focusing their efforts on fewer projects? Are women making pull requests that are more needed? Are women making smaller changes? Are women’s pull requests more successful when contributing code? Is woman’s pull request accepted more often because she Figure : Pull request acceptance rate by gender and perceived gender [9] appears to be a women? [9] Josh Terrell et al. 2017. Gender differences and bias in open source: pull request acceptance of women versus men. PeerJ Computer Science 3 (January 2017). DOI:http://dx.doi.org/10.7717/peerj-cs.111 10 Gender bias: Why? 11 Gender imbalance Open source survey from GitHub[10], conducted in 2017 shows that 95% of the respondents were men, while only 3% of them were women. 22.6% of professional programmers in the U. S. are female[11]. [10] GitHub. 2017. Open Source Survey. Retrieved September 23, 2019 from https://opensourcesurvey.org/2017/ 12 [11] Klint Finley. 2019. Diversity in Open Source Is Even Worse Than in Tech Overall. (June 2017). Retrieved September 23, 2019 from https://www.wired.com/2017/06/diversity-open-source-even-worse-tech-overall/ What does the paper suggest? Women’s PRs tend to make larger changes and to get accepted more than that of men’s However, in cases of contribution from outsiders, acceptance rate was significantly lower for women Survivorship bias: While going through formal and informal education in computer science, only more competent women remain till they can commit to open source while less competent men may continue Women’s ratio in open source communities are significantly low, compared to that of programmers 13 Male-dominant and masculine community Women were more likely to encounter unwelcome language (25% vs 15%), stereotyping (12% vs 2%), and unsolicited sexual advances (6% vs 3%) compared to men [12]. “One event a group of men put print-outs of Hans Reiser on sticks and carried them around. They approached women (and possibly men) to tell us that every time we use ext3, Reiser will kill another woman.” “A presenter had a title slide followed by a slide of bikini-clad women holding laptops, which he said was just to get people to pay attention. I'm not sure if we were supposed to pay attention to the women or to what he was saying though.” "When strippers were hired to mix with people at the Saturday night event everyone attended, that made everyone uncomfortable." [13] 14 [12]GitHub. 2017. Open Source Survey. Retrieved September 23, 2019 from https://opensourcesurvey.org/2017/ [13]Valerie Aurora. 2019. The dark side of open source conferences (December 2010). Retrieved September 23, 2019 from https://lwn.net/Articles/417952/ Male-dominant and masculine community Richard Stallman Founder of GNU project “Guru” of free software Former president of Free Software Foundation and visiting scientist at MIT [14] 15 [14]Ruben Rodriguez. 2019. Richard Stallman, at LibrePlanet 2019. Retrieved September 23, 2019 from https://commons.wikimedia.org/wiki/File:Richard_Stallman_at_LibrePlanet_2019.jpg Male-dominant and masculine community [15] [16] [15]Jake Edge. 2018. A “joke” in the glibc manual. (November 2018). Retrieved September 23, 2019 from https://lwn.net/Articles/770966/ [16]Thomas Claburn. 2019. You have GNU sense of humor! Glibc abortion 'joke' diff tiff leaves Richard Stallman miffed. (May 2018). Retrieved September 23, 2019 from https://www.theregister.co.uk/2018/05/09/gnu_glic_abort_stallman/ 16 How does it affect the community? 17 [17] [17]Nasif Imtiaz, Justin Middleton, Joymallya Chakraborty, Neill Robson, Gina Bai, and Emerson Murphy-Hill. 2019. Investigating the effects of gender bias on GitHub. In Proceedings of the 41st International Conference on Software Engineering (ICSE '19). IEEE Press, Piscataway, NJ, USA, 700-711. DOI: https://doi.org/10.1109/ICSE.2019.00079 18 Four Effects of Gender Bias Prove-it-again Stricter standard, has to provide more evidence to show competence Tightrope Narrower band of socially acceptable behavior Maternal wall Disadvantages to working mothers Tug of war Women discourage other women 19 Four Effects of Gender Bias in GitHub: Hypotheses Prove-it-again: Stricter standard, has to provide more evidence to show competence → More description, push-back, signals of competence, and concentrated Tightrope: Narrower band of socially acceptable behavior → More restraint in showing emotions Maternal wall: Disadvantages to working mothers → Less displaying that they are parents Tug of war: Women discourage other women → Women being especially harsh on other women 20 Four Effects of Gender Bias in GitHub: Results Prove-it-again: Stricter standard, has to provide more evidence to show competence → More description, push-back, signals of competence, and concentrated Tightrope: Narrower band of socially acceptable behavior → More restraint in showing emotions (less politeness/profanity, sentiment-neutral) Maternal wall: Disadvantages to working mothers → Less displaying that they are parents Tug of war: Women discourage other women → Women being especially harsh on other women 21 Gender bias exists, and it (at least partially) affects the open source community. 22 Discussion How can we mitigate/overcome bias in OS? - Inclusion & diversity in STEM (Ada Lovelace Day, Women in Open Source Awards, Django girls, …) Other biases? - E.g., gender (male, female, transgender, agender, ...), race, ethnicity, country 23.
Recommended publications
  • Welcome to the Ally Skills Workshop
    @frameshiftllc Welcome to the Ally Skills Workshop Please fill out a name tag & include the pronouns you normally use. Examples: she/her/hers he/him/his they/them/theirs Pronouns Ally Skills Workshop Valerie Aurora http://frameshiftconsulting.com/ally-skills-workshop/ CC BY-SA Frame Shift Consulting LLC, Dr. Sheila Addison, The Ada Initiative @frameshiftllc Format of the workshop ● 30 minute introduction ● 45 minute group discussion of scenarios ● 15 minute break ● 75 minute group discussion of scenarios ● 15 minute wrap-up ~3 hours total @frameshiftllc SO LONG! 2 hour-long workshop: most common complaint was "Too short!" 3 hour-long workshop: only a few complaints that it was too short https://flic.kr/p/7NYUA3 CC BY-SA Toshiyuki IMAI @frameshiftllc Valerie Aurora Founder Frame Shift Consulting Taught ally skills to 2500+ people in Spain, Germany, Australia, Ireland, Sweden, Mexico, New Zealand, etc. Linux kernel and file systems developer for 10+ years Valerie Aurora @frameshiftllc Let’s talk about technical privilege We are more likely to listen to people who "are technical" … but we shouldn’t be "Technical" is more likely to be granted to white men I am using my technical privilege https://frYERZelic.kr/p/ CC BY @sage_solar to end technical privilege! @frameshiftllc What is an ally? Some terminology first: Privilege: an unearned advantage given by society to some people but not all Oppression: systemic, pervasive inequality that is present throughout society, that benefits people with more privilege and harms those with fewer privileges
    [Show full text]
  • Performance Evaluation of Filesystems Compression Features
    UNIVERSITY OF OSLO Department of Informatics Performance Evaluation Of FileSystems Compression Features Master Thesis In the field of Network and System Administration Solomon Legesse Oslo and Akerhus University College (hioa) In collaboration with University of Oslo (UiO) May 20, 2014 1 Performance Evaluation Of FileSystems Compression Features Master Thesis In the field of Network and System Administration Solomon Legesse Oslo and Akerhus University College (hioa) In collaboration with University of Oslo (UiO) May 20, 2014 Abstract The Linux operating system already provide a vast number of filesystems to the user community. In general, having a filesystem that can provide scala- bility, excellent performance and reliability is a requirement, especially in the lights of the very large data size being utilized by most IT data centers. Re- cently modern file systems has begun to include transparent compression as main features in their design strategy. Transparent compression is the method of compressing and decompressing data so that it takes relatively less space. Transparent compression can also improve IO performance by reducing IO traffic and seek distance and has a negative impact on performance only when single-thread I/O latency is critical. Two of the newer filesystem technologies that aim at addressing todays IO challenges are ZFS and Btrfs. Using high speed transparent compression algorithms like LZ4 and LZO with Btrfs and Zfs can greatly help to improve IO performance. The goal of this paper is threefold. 1st, to evaluate the impact of transparent compression on perfor- mance for Btrfs and ZFS, respectively. 2nd, to compare the two file system compression feature on performance.
    [Show full text]
  • The Kernel Report
    The Kernel Report RTLWS 11 edition Jonathan Corbet LWN.net [email protected] “Famous last words, but the actual patch volume _has_ to drop off one day. We have to finish this thing one day." -- Andrew Morton September, 2005 (2.6.14) 2.6.27 -> 2.6.31++ (October 9, 2008 to September 18, 2009) 48,000 changesets merged 2,500 developers 400 employers The kernel grew by 2.5 million lines 2.6.27 -> 2.6.31++ (October 9, 2008 to September 18, 2009) 48,000 changesets merged 2,500 developers 400 employers The kernel grew by 2.5 million lines That come out to: 140 changesets merged per day 7267 lines of code added every day The employer stats None 19% Atheros 2% Red Hat 12% academics 2% Intel 7% Analog Devices 2% IBM 6% AMD 1% Novell 6% Nokia 1% unknown 5% Wolfson Micro 1% Oracle 4% Vyatta 1% consultants 3% HP 1% Fujitsu 2% Parallels 1% Renesas Tech 2% Sun 1% 2.6.27 (October 9, 2008) Ftrace UBIFS Multiqueue networking gspca video driver set Block layer integrity checking 2.6.28 (December 24, 2008) GEM graphics memory manager ext4 is no longer experimental -staging tree Wireless USB Container freezer Tracepoints 2.6.29 (March 23, 2009) Kernel mode setting Filesystems Btrfs Squashfs WIMAX support 4096 CPU support 2.6.30 (June 9) TOMOYO Linux Object storage device support Integrity measurement FS-Cache ext4 robustness fixes Nilfs R6xx/R7xx graphics support preadv()/pwritev() Adaptive spinning Threaded interrupt mutexes handlers 2.6.31 (September 9) Performance counter support Char devices in user space Kmemleak fsnotify infrastructure TTM and Radeon KMS support Storage topology ...about finished? ...about finished? ...so what's left? 2.6.32 (early December) Devtmpfs Lots of block scalability work Performance counter improvements Scheduler tweaks Kernel Shared Memory HWPOISON Networking “Based on all the measurements I'm aware of, Linux has the fastest & most complete stack of any OS.” -- Van Jacobson But..
    [Show full text]
  • BTRFS: Investigation of Several Aspects Regarding Fragmentation
    BTRFS: AUTODEFRAG AND DEFRAGMENTATION Page 1 of 13 BTRFS: Investigation of several aspects regarding fragmentation Elijah D. Mirecki Athabasca University February 26, 2014 BTRFS: AUTODEFRAG AND DEFRAGMENTATION Page 2 of 13 Abstract BTRFS defragmentation is currently an active topic of discussion among operating system designers. Defragmentation is especially important for BTRFS because of its copy-on-write (COW) nature, which causes data extents to be scattered all over the system when writing occurs. This paper provides an investigation of the current BTRFS defragmentation algorithm as well as the autodefrag algorithm. Several illustrations have been created to represent how the defragmentation algorithm works at a high level. Discussion about possible solutions and ideas for defragmentation and autodefrag is also included. The main problem with the current defragmentation algorithm is that it sometimes merges more extents than are needed to provide relatively unfragmented files. Another problem is that when choosing which files to defragment, flash drives and disk drives are treated the same. This is an issue because the two drive types should have different goals. Disk drives aim for contiguous space, while flash drives need less writes to prolong their lifetime. The solutions and ideas discussed in this paper should theoretically allow defragmentation to merge extents more appropriately as well as meeting the goals for both flash and disk drives. This paper should be followed by simulations comparing several areas of defragmentation and file selection algorithms. Some implementation details are provided as well in case the simulations return positive. Several other filesystems are touched upon, including ext4, HFS+ and NTFS. Defragmentation and their fragmentation situation are both covered and compared briefly.
    [Show full text]
  • A Method of Merging Vmware Disk Images Through File System Unification by Sarah X
    A Method of Merging VMware Disk Images MASSACHUSETTS INSTITUTE through File System Unification OF TECHN4OLOGY by DEC 16 2010 Sarah X. Cheng LIBRARIES S.B., Computer Science and Engineering, Massachusetts Institute of Technology (2004) Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY ACHIVES February 2011 © Massachusetts Institute of Technology 2011. All rights reserved. -7--) Author ...... ...... Department of Electrical Enginer' d Computer Science October 5, 2010 ... s ..... Certified by............. Stephen A. Ward Professor Thesis Supervisor Accepted by........ Dr. Christopher J. Terman Chairman, Master of Engineering Thesis Committee 2 A Method of Merging VMware Disk Images through File System Unification by Sarah X. Cheng Submitted to the Department of Electrical Engineering and Computer Science on October 5, 2010, in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract This thesis describes a method of merging the contents of two VMware disk images by merging the file systems therein. Thus, two initially disparate file systems are joined to appear and behave as a single file system. The problem of file system namespace unification is not a new one, with predecessors dating as far back as 1988 to present-day descendants such as UnionFS and union mounts. All deal with the same major issues - merging directory contents of source branches and handling any naming conflicts (namespace de-duplication), and allowing top-level edits of file system unions in presence of read-only source branches (copy-on-write).
    [Show full text]
  • How to Respond to Code of Conduct Reports
    License and attribution Written by Valerie Aurora, based on a short guide written by Mary Gardiner Edited by Annalee Flower Horne https://www.flowerhorne.com/ ​ Copyright © 2019 Valerie Aurora https://valerieaurora.org/ ​ Copyright © 2012 Mary Gardiner https://mary.gardiner.id.au/ ​ Cover image © 2018 Mary Gardiner https://mary.gardiner.id.au/ ​ CC BY-SA 4.0 Valerie Aurora, Mary Gardiner, Annalee Flower Horne, DjangoCon EU, Write the ​ Docs EU 2016, PyGotham 2017 https://creativecommons.org/licenses/by-sa/4.0/ ​ Published by Frame Shift Consulting LLC https://frameshiftconsulting.com ​ ISBN: 9781386922575 Version history 2018-09-15: Version 0.9: Draft release for review 2018-11-26: Version 0.99: Pre-release version for review 2018-11-28: Version 1.0: First edition 2019-01-08: Version 1.1: Fix typos, simplify formatting for better ebook conversion, add/remove links, add email sign-up link, add more incident response guide examples, add ISBN Table of contents Introduction If you are in a hurry How to use this guide About the authors Terminology Chapter 1: Code of conduct theory Purpose of a code of conduct What a code of conduct should contain How a code of conduct works Education Norm-following Attraction and repulsion Deterrence Boundary setting The Paradox of Tolerance What a code of conduct can't do Codes of conduct govern community spaces Violations must have meaningful consequences Codes of conduct must apply to powerful people Visible enforcement is required Summary Chapter 2: Preparing to enforce a code of conduct Publicizing the
    [Show full text]
  • IBM Research Report
    RJ10501 (ALM1207-004) July 9, 2012 Computer Science IBM Research Report BTRFS: The Linux B-tree Filesystem Ohad Rodeh IBM Research Division Almaden Research Center 650 Harry Road San Jose, CA 95120-6099 USA Josef Bacik, Chris Mason FusionIO Research Division Almaden - Austin - Beijing - Cambridge - Haifa - India - T. J. Watson - Tokyo - Zurich LIMITED DISTRIBUTION NOTICE: This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g. , payment of royalties). Copies may be requested from IBM T. J. Watson Research Center , P. O. Box 218, Yorktown Heights, NY 10598 USA (email: [email protected]). Some reports are available on the internet at http://domino.watson.ibm.com/library/CyberDig.nsf/home . BTRFS: The Linux B-tree Filesystem Ohad Rodeh Josef Bacik Chris Mason IBM FusionIO FusionIO Abstract BTRFS is a Linux filesystem, headed towards mainline default sta- tus. It is based on copy-on-write, allowing for efficient snapshots and clones. It uses b-trees as its main on-disk data-structure. The de- sign goal is to work well for many use cases and workloads. To this end, much effort has been directed to maintaining even performance as the filesystem ages, rather than trying to support a particular narrow benchmark use case.
    [Show full text]
  • Gender Dimensions of Free and Open Source Development
    THE MAKING OF LABORER SUBJECTIVITY AND KNOWLEDGE IN THE INFORMATION INDUSTRY: GENDER DIMENSIONS OF FREE AND OPEN SOURCE DEVELOPMENT Yeon Ju Oh A Dissertation Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2013 Committee: Radhika Gajjala, Advisor Deborah G. Wooldridge Graduate Faculty Representative Oliver Boyd-Barrett Victoria S. Ekstrand ii ABSTRACT Radhika Gajjala, Advisor This study examines female software developers as knowledge laborers with a special emphasis on free and open source software (FOSS) development. In examining female developers as knowledge laborers, this study focuses on both labor and knowledge. Women’s low participation in FOSS development is not an issue of recent years, but a consequence of women’s overall status in the computing field over the last three decades. In order to explicate women’s low participation in FOSS development, a broader historical and economic analysis is needed. Thus, this study explores the historical context of computer science education and industry in the 1980s since this is when the groundwork for FOSS development was laid. Furthermore, the power of cultural discourses that maintain and reinforce the gendered construction of FOSS development is discussed to unpack how the gendered construction is interrelated with the labor relations in the knowledge industry. In addition to the labor relations in FOSS development, this study attends to the knowledge produced by FOSS development. Knowledge gains importance as a sum of values of the knowledge producers. Source codes written by software developers turn into products that engage users with certain utility.
    [Show full text]
  • R&S®TCE900 Open Source Acknowledgment
    R&S®TCE900 Series xx9 Transmitter Open Source Acknowledgment 2109.3806.00 – 02 7TA /RL/1/EN 01.00 / 3575.4620.02 M: - T - PAD Open Source Acknowledgment R&S TCE900 Introduction Contents 1 Introduction ......................................................................................... 3 1.1 Disclaimer ..................................................................................................................... 3 1.2 How to obtain the source code .................................................................................. 3 2 Software packages ............................................................................. 4 3 Verbatim license texts ........................................................................ 9 3.1 APACHE-LICENSE-2.0.txt ........................................................................................... 9 3.2 BSD-2-clause.txt ........................................................................................................12 3.3 BSD-3-clause.txt ........................................................................................................13 3.4 BSD-4-clause.txt ........................................................................................................14 3.5 GPLv2.txt ....................................................................................................................14 3.6 GPLv3.txt ....................................................................................................................21 3.7 LGPLv2.1.txt ...............................................................................................................33
    [Show full text]
  • State of the Union When You Don’T Need Union Mounts
    State of the Union When you don't need Union Mounts Jan Blunck Novell [email protected] 30. October 2009 What Union? I Not the European Union ... this is Dresden not Brussels I This is about Filesystems I In particular about Filesystem Namespace Unification What Union? I Not the European Union ... this is Dresden not Brussels I This is about Filesystems I In particular about Filesystem Namespace Unification What Union? I Not the European Union ... this is Dresden not Brussels I This is about Filesystems I In particular about Filesystem Namespace Unification Outline Introduction Where is the Problem? Unioning Filesystems UnionFS Another UnionFS UnionFS-FUSE mini fo Union Mount You probably don't need Union Mounts Device-Mapper Snapshot Delta Filesystem CLIC Filesystem SquashFS Fake Write Support Shared root filessytem - NFS Root Shared root filessytem - XIP Whats left to do than? Thanks Disclaimer I'm the author of the VFS based Union Mount patches. That somehow makes me biased. I'll try my very best though ... Where is the Problem? POSIX Requirements I seek to cookie POSIX is missing I whiteout filetype DT WHITEOUT I topology of mount tree I open (directories) by inode number Where is the Problem? POSIX Requirements I seek to cookie POSIX is missing I whiteout filetype DT WHITEOUT I topology of mount tree I open (directories) by inode number Where is the Problem? I NFS Sucks ftp://ftp.lst.de/pub/people/okir/papers/2006-OLS/ nfs-sucks-slides.pdf Where is the Problem? I NFS Sucks ftp://ftp.lst.de/pub/people/okir/papers/2006-OLS/ nfs-sucks-slides.pdf
    [Show full text]
  • Tlx9 Open Source Acknowledgment
    R&S®TLx9 Series xx9 Transmitter Open Source Acknowledgment 2507.3060.00 – 01 7TA /RL/1/EN 01.00 / 3575.4620.02 M: - T - PAD Open Source Acknowledgment R&S TLx9 Introduction Contents 1 Introduction ......................................................................................... 3 1.1 Disclaimer ..................................................................................................................... 3 1.2 How to obtain the source code .................................................................................. 3 2 Software packages ............................................................................. 4 3 Verbatim license texts ........................................................................ 9 3.1 APACHE-LICENSE-2.0.txt ........................................................................................... 9 3.2 BSD-2-clause.txt ........................................................................................................12 3.3 BSD-3-clause.txt ........................................................................................................13 3.4 BSD-4-clause.txt ........................................................................................................14 3.5 GPLv2.txt ....................................................................................................................14 3.6 GPLv3.txt ....................................................................................................................21 3.7 LGPLv2.1.txt ...............................................................................................................33
    [Show full text]
  • Generating Realistic Impressions for File-System Benchmarking
    Generating Realistic Impressions for File-System Benchmarking Nitin Agrawal, Andrea C. Arpaci-Dusseau and Remzi H. Arpaci-Dusseau Department of Computer Sciences, University of Wisconsin-Madison {nitina, dusseau, remzi}@cs.wisc.edu Abstract of the target usage scenario. Several factors contribute to file-system state, important amongst them are the in- The performance of file systems and related software de- memory state (contents of the buffer cache), the on-disk pends on characteristics of the underlying file-system im- state (disk layout and fragmentation) and the characteris- age (i.e., file-system metadata and file contents). Un- tics of the file-system image (files and directories belong- fortunately, rather than benchmarking with realistic file- ing to the namespace and file contents). system images, most system designers and evaluators rely on ad hoc assumptions and (often inaccurate) rules One well understood contributor to state is the in- memory state of the file system. Previous work has of thumb. Furthermore, the lack of standardization and shown that the contents of the cache can have signifi- reproducibility makes file system benchmarking ineffec- cant impact on the performance results [11]. Therefore, tive. To remedy these problems, we develop Impressions, system initialization during benchmarking typically con- a framework to generate statistically accurate file-system images with realistic metadata and content. Impressions sists of a cache “warm-up” phase wherein the workload is run for some time prior to the actual measurement is flexible, supporting user-specified constraints on vari- phase. Another important factor is the on-disk state of ous file-system parameters using a number of statistical techniques to generate consistent images.
    [Show full text]