Software As Text John Shaeffer

Total Page:16

File Type:pdf, Size:1020Kb

Software As Text John Shaeffer Santa Clara High Technology Law Journal Volume 33 | Issue 3 Article 1 2-20-2017 Software as Text John Shaeffer Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Intellectual Property Law Commons, and the Science and Technology Law Commons Recommended Citation John Shaeffer, Software as Text, 33 Santa Clara High Tech. L.J. 324 (2016). Available at: http://digitalcommons.law.scu.edu/chtlj/vol33/iss3/1 This Article is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized editor of Santa Clara Law Digital Commons. For more information, please contact [email protected]. SOFTWARE AS TEXT John Shaeffer† A computer program can be many things. As source code, it is unequivocally text and it is unpatentable written material. As text, it has syntactical structure, which allows a computer to respond to it, and meaning that it communicates to the programming community. A computer program is also an audio-visual work; we see it and hear it as we interact with it. In this way, protecting a computer program is like protecting music, which is often based on both the written score and the sounds we hear. But unlike modern music, which does not always depend on a written score, a computer program must always have source code before it can be heard. Much has already been written about whether computer programs should be copyrightable, but little has been written about access. If a computer program is written in a compiled, rather than an interpretive language, the source code will be converted into assembly or directly into machine code, neither of which has much meaning to anyone but a computer. Access to the audio-visual expression of a computer program is different than access to its source code, with the former much more likely circumscribed to the programs unprotected ideas and functions. The audio-visual structure of a computer program is something very different than from the architecture and structure of its source code. For this reason, the infringement analysis in Lotus Development Corporation v. Borland1—which was concerned with the identity in the visual structure of menus with no allegation of access to the source code used to depict the menus—has little in common with Oracle v. Google2—concerned with copying of standard tools used to write source code in the JAVA programming language. This article suggests that with a closer consideration of the practice of computer programming, intellectual property law † John Shaeffer is currently a partner at Fox Rothschild LLP in Los Angeles, CA and is an adjunct professor at Santa Clara School of Law. The views expressed in this article are those of the author and do not necessarily reflect those of For Rothschild LLP or its clients. 1. Lotus Dev. Corp. v. Borland Int’l, Inc., 49 F.3d 807 (1st Cir. 1995). 2. Oracle Am., Inc. v. Google, Inc., 750 F.3d 1339 (Fed. Cir. 2014). 324 2017] SOFTWARE AS TEXT 325 governing the scope and extent of its protection can brought more in line with actual practice. With such an understanding, the law as applied to computer software can better serve its constitutional purpose of promoting the public good. TABLE OF CONTENTS INTRODUCTION ................................................................................. 325 I. WHAT IS COMPUTER PROGRAMMING? ........................................ 333 A. Language As Instruction ..................................................... 333 B. What Is a Computer Program? ........................................... 337 C. How We Interact with Computer Programs ....................... 340 1. How Consumers Interact with Computer Programs ........ 340 2. How Programmers Interact with Computer Programs ..... 345 D. What Becomes a Computer Program ................................. 348 1. Technical Specifications, Design, and Degrees of Abstraction ............................................................................... 350 2. Object-Oriented Programming and Writing Code ........... 355 E. The Community of Programmers ........................................ 357 II. COPYRIGHT LAW ........................................................................ 360 A. Congress May Enact Laws To Promote Science and the Useful Arts ................................................................................... 360 B. Copyright’s Bargained-For Exchange: Protecting “How You Teach” In Exchange for “What You Teach” ............................... 362 C. Copyright and Code ............................................................ 370 D. Access to the Text of a Computer Program ........................ 373 E. While Substantial Similarity Is a Surrogate for Copying, Substantiality Should Not Be a Requirement for Infringement .... 380 F. A New Work That Is Less Than a Facsimile of the Work As a Whole Is a Derivate Work ............................................................ 383 G. A Work Derived From Another’s Expression Transforms the Original, So All Transformative Works Are Derivate Works ...... 386 H. The Problem of Fair Use. ................................................... 396 1. The Fair Use Doctrine As Applied .................................. 398 2. Why Courts Developed the Fair Use Defense and the Supreme Court’s Return to The Basics .................................... 404 III. CONCLUSION ............................................................................. 410 INTRODUCTION Source code is not functional. It is instructional. Source code describes one of several ways to obtain structured binary data that when sequenced to a processor in a particular order causes a computer 326 SANTA CLARA HIGH TECH. L.J. [Vol. 33 to perform particular functions. Programming a computer is creative in that the methods and styles used to execute the programmed functions say a lot about its creator. In the same manner that a composer learns from studying the musical scores of her predecessors, a novelist learns from reading novels, and a filmmaker learns from watching film, programmers learn their craft from studying source code and other software architecture documents. This is why “[a]ll coding inevitably involves double coding. ‘Good’ code simultaneously specifies a mechanical process and talks about this mechanical process to a human reader.”3 This is a central premise underlying the Free and Open Source Software Movement (FOSS), a premise currently shared with the constitutional underpinning of this country’s intellectual property laws that the public good is served by free and open access to the ideas and the expression of those ideas. “Free” here requires a precise definition: free as in “free speech” or “free trade,” not “free beer.”4 This article posits a disconnect between how programmers, and those who teach programming, view their craft, on the one hand, and the laws governing computer software and the academia supporting the governing legal structure, on the other. Much has already been written about the problems applying existing copyright and patent laws to computer programs as well as to the deficiencies in legal decisions making such efforts.5 An area less explored, however, is whether the law fits with the practice it governs. Little consideration has been given to whether the law comports with what programmers are actually doing and the product they and their employers make and own. The law curiously takes a myopic view of computer programs as being a utilitarian tool that allow computers to perform functions like word processing or reserving a seat on an airline. Programming is far more diverse than the law gives it credit for. Identifying the field of computer programming with the compiled copy of Microsoft Word is somewhat akin to characterizing all literature by referring to the design specifications for Boeing’s latest jet—albeit that such design 3. Michael Mateas & Nick Montfort, A Box, Darkly: Obfuscation, Weird Languages, and Code Aesthetics, in DIGITAL ARTS AND CULTURE: DIGITAL EXPERIENCE: DESIGN, AESTHETICS, PRACTICE (DAC 2005). 4. GEOFF COX & ALEX MCLEAN, SPEAKING CODE: CODING AS AESTHETIC AND POLITICAL EXPRESSION 77 (MIT Press 2012). 5. For example, some of the Federal Circuit continue to push to exclude computer programs from the breadth of section 101 of the Patent Act. Intellectual Ventures I LLC v. Symantec Corp., 838 F.3d 1307, 1328 (Fed. Cir. 2016) (Mayer, J., concurring) (“Declaring that software implemented on a generic computer falls outside of section 101 would provide much needed clarity and consistency in our approach to patent eligibility.”). 2017] SOFTWARE AS TEXT 327 specification would be more like the source code for Microsoft Word than the actual compiled program. By way of example, the musical duo Autechre years ago dispensed with conventional instruments in favor the visual coding language MAX/MPS.6 Their compositions today are distinct programs—referred to as patches—that result in computers performing functions that, with the help of digital to audio converters, generate complex sounds and rhythms. The spontaneity and creativity of an artist interacting with a guitar and keyboard is now left to a computer interacting with code in a spontaneous and not necessarily planned or expected way. Far from being an academic exercise, Autechre tours the world playing at large electronic dance music festivals and signed to a well-recognized music label.7 In this context, an Autechre patch functions like a
Recommended publications
  • IBM Platform Symphony V5.2 Enables Scalable, High- Performance Grid Services for a Variety of Parallel Compute and Data Intensive Applications
    IBM United States Software Announcement 212-204, dated June 4, 2012 IBM Platform Symphony V5.2 enables scalable, high- performance grid services for a variety of parallel compute and data intensive applications Table of contents 1 Overview 7 Publications 2 Key prerequisites 8 Technical information 2 Planned availability date 13 Ordering information 2 Description 16 Terms and conditions 4 Product positioning 19 Prices 6 Program number 20 Order now At a glance IBM® Platform SymphonyTM V5.2 helps you exceed your performance goals with a fast, efficient grid computing environment. You can realize: • Faster throughput and performance • Higher levels of resource utilization • Reduced infrastructure and management costs • Reduced application development and maintenance costs • The agility to respond instantly to real-time demands For ordering, contact Your IBM representative or an IBM Business Partner. For more information contact the Americas Call Centers at 800-IBM-CALL (426-2255). Reference: YE001 Overview IBM Platform Symphony V5.2 is an enterprise-class grid manager for running distributed application services on a scalable, shared, heterogeneous grid. It accelerates a wide variety of compute and data-intensive applications, quickly computing results while making optimal use of available infrastructure. Platform Symphony's efficient low-latency middleware and scheduling architecture is designed to provide the performance and agility required to predictably meet and exceed throughput goals for the most demanding analytic workloads. Designed
    [Show full text]
  • Information-09-00183.Pdf
    information Review AI to Bypass Creativity. Will Robots Replace Journalists? (The Answer Is “Yes”) Andrey Miroshnichenko ID York & Ryerson Joint Graduate Program in Communication & Culture, York University, Toronto, ON M3J 1P3, Canada; [email protected] Received: 1 July 2018; Accepted: 21 July 2018; Published: 23 July 2018 Abstract: This paper explores a practical application of a weak, or narrow, artificial intelligence (AI) in the news media. Journalism is a creative human practice. This, according to widespread opinion, makes it harder for robots to replicate. However, writing algorithms are already widely used in the news media to produce articles and thereby replace human journalists. In 2016, Wordsmith, one of the two most powerful news-writing algorithms, wrote and published 1.5 billion news stories. This number is comparable to or may even exceed work written and published by human journalists. Robo-journalists’ skills and competencies are constantly growing. Research has shown that readers sometimes cannot differentiate between news written by robots or by humans; more importantly, readers often make little of such distinctions. Considering this, these forms of AI can be seen as having already passed a kind of Turing test as applied to journalism. The paper provides a review of the current state of robo-journalism; analyses popular arguments about “robots’ incapability” to prevail over humans in creative practices; and offers a foresight of the possible further development of robo-journalism and its collision with organic forms of journalism. Keywords: artificial intelligence (AI); automated journalism; robo-journalism; writing algorithms; future of news; media ecology; Turing test 1. Introduction Artificial intelligence (AI) is usually defined in two ways that, in a sense, are contradictory.
    [Show full text]
  • Wait, I Don't Want to Be the Linux Administrator for SAS VA
    SESUG Paper 88-2017 Wait, I don’t want to be the Linux Administrator for SAS VA Jonathan Boase; Zencos Consulting ABSTRACT Whether you are a new SAS administrator or switching to a Linux environment, you have a complex mission. This job becomes even more formidable when you are working with a system like SAS Visual Analytics that requires multiple users loading data daily. Eventually a user will have data issues or create a disruption that causes the system to malfunction. When that happens, what do you do next? In this paper, we will go through the basics of a SAS Visual Analytics Linux environment and how to troubleshoot the system when issues arise. INTRODUCTION Many companies choose to implement SAS Visual Analytics in a Linux environment. With a distributed deployment, it’s the only choice but many chose this operating system because it reduces operating costs. If you are the newly chosen SAS platform administrator, you might be more versed in a Windows environment and feel intimidated by Linux. This paper introduces using basic Linux commands and methods for troubleshooting a SAS Visual Analytics environment. The paper assumes that SAS Visual Analytics is installed on a SAS 9.4 platform for Linux and that the reader has some familiarity with other operating systems, such as Windows. PLATFORM ADMINISTRATION 101 SAS platform administrators work with three main product areas. Each area provides a different functionality based on the task the administrator needs to perform. The following figure defines each area and provides a general overview of its purpose. Figure 1 Platform Administrator Tools Operating System SAS Management SAS Environment •Contains installed Console Manager software •Access and manage the •Monitor the •Contains logs used for metadata environment troubleshooting •Control database •Configure custom alerts •Administer host system connections users •Manage user accounts •Manage the LASR server With any operating system, there is always a lot to learn.
    [Show full text]
  • The Clon User Manual the Command-Line Options Nuker, Version 1.0 Beta 25 "Michael Brecker"
    The Clon User Manual The Command-Line Options Nuker, Version 1.0 beta 25 "Michael Brecker" Didier Verna <[email protected]> Copyright c 2010{2012, 2015, 2017, 2020, 2021 Didier Verna Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided also that the section entitled \Copy- ing" is included exactly as in the original. Permission is granted to copy and distribute translations of this manual into an- other language, under the above conditions for modified versions, except that this permission notice may be translated as well. Cover art by Alexis Angelidis. i Table of Contents Copying ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 1 1 Introduction :::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2 Installation:::::::::::::::::::::::::::::::::::::::::::::::::::::: 5 3 Quick Start ::::::::::::::::::::::::::::::::::::::::::::::::::::: 7 3.1 Full Source :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 7 3.2 Explanation ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 7 4 Using Clon :::::::::::::::::::::::::::::::::::::::::::::::::::: 11 4.1 Synopsis Definition ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 11 4.1.1 Synopsis Items ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 11 4.1.1.1 Text ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Abuse of Dominantposition and Switching Costs
    UNIVERSITY OF LONDON REFUSAL TO LICENSE: ABUSE OF DOMINANT POSITION AND SWITCHING COSTS NET LE SUBMITTED TO THE LAW DEPARTMENT OF THE LONDON SCHOOL OF ECONOMICS AND POLITICAL SCIENCE FOR THE DEGREE OF DOCTOR OF PHILOSOPHY LONDON, MAY 2004 U /« 3 L \ * f LONDIU) \ WtfV. / UMI Number: U615726 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. Dissertation Publishing UMI U615726 Published by ProQuest LLC 2014. Copyright in the Dissertation held by the Author. Microform Edition © ProQuest LLC. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106-1346 Th e s e s F 353£ . Library British Library of Political and Economic Science IJW 5S 5 II ACKNOWLEDGEMENT Foremost, I wish to express my deep gratitude to my supervisors, Professor William T. Murphy and Mr. Andrew Murray for their continual support throughout this thesis. Their comments have helped to essentially improve the accuracy of my research. Further, I wish to thank Mr. Giorgio Monti for reviewing my drafts, sharing with me books, giving me invaluable feedback and assistance. Others from LSE whom I would like to thank include Doctors Carsten Sorensen and Ole Hanseth (Department of Information System), Professors Max Steuer, Dany Quah and Michele Picione (Department of Economics) for reading my drafts, generously sharing with me their knowledge, improving my understanding and moreover providing me with excellent research inspiration.
    [Show full text]
  • Audiences, Gender and Community in Fan Vidding Katharina M
    University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections 2011 "Veni, Vidi, Vids!" audiences, gender and community in Fan Vidding Katharina M. Freund University of Wollongong, [email protected] Recommended Citation Freund, Katharina M., "Veni, Vidi, Vids!" audiences, gender and community in Fan Vidding, Doctor of Philosophy thesis, School of Social Sciences, Media and Communications, Faculty of Arts, University of Wollongong, 2011. http://ro.uow.edu.au/theses/3447 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] “Veni, Vidi, Vids!”: Audiences, Gender and Community in Fan Vidding A thesis submitted in fulfilment of the requirements for the award of the degree Doctor of Philosophy From University of Wollongong by Katharina Freund (BA Hons) School of Social Sciences, Media and Communications 2011 CERTIFICATION I, Katharina Freund, declare that this thesis, submitted in fulfilment of the requirements for the award of Doctor of Philosophy, in the Arts Faculty, University of Wollongong, is wholly my own work unless otherwise referenced or acknowledged. The document has not been submitted for qualifications at any other academic institution. Katharina Freund 30 September, 2011 i ABSTRACT This thesis documents and analyses the contemporary community of (mostly) female fan video editors, known as vidders, through a triangulated, ethnographic study. It provides historical and contextual background for the development of the vidding community, and explores the role of agency among this specialised audience community. Utilising semiotic theory, it offers a theoretical language for understanding the structure and function of remix videos.
    [Show full text]
  • Drilling Network Stacks with Packetdrill
    Drilling Network Stacks with packetdrill NEAL CARDWELL AND BARATH RAGHAVAN Neal Cardwell received an M.S. esting and troubleshooting network protocols and stacks can be in Computer Science from the painstaking. To ease this process, our team built packetdrill, a tool University of Washington, with that lets you write precise scripts to test entire network stacks, from research focused on TCP and T the system call layer down to the NIC hardware. packetdrill scripts use a Web performance. He joined familiar syntax and run in seconds, making them easy to use during develop- Google in 2002. Since then he has worked on networking software for google.com, the ment, debugging, and regression testing, and for learning and investigation. Googlebot web crawler, the network stack in Have you ever had the experience of staring at a long network trace, trying to figure out what the Linux kernel, and TCP performance and on earth went wrong? When a network protocol is not working right, how might you find the testing. [email protected] problem and fix it? Although tools like tcpdump allow us to peek under the hood, and tools like netperf help measure networks end-to-end, reproducing behavior is still hard, and know- Barath Raghavan received a ing when an issue has been fixed is even harder. Ph.D. in Computer Science from UC San Diego and a B.S. from These are the exact problems that our team used to encounter on a regular basis during UC Berkeley. He joined Google kernel network stack development. Here we describe packetdrill, which we built to enable in 2012 and was previously a scriptable network stack testing.
    [Show full text]
  • Omnipresent and Low-Overhead Application Debugging
    Omnipresent and low-overhead application debugging Robert Strandh [email protected] LaBRI, University of Bordeaux Talence, France ABSTRACT application programmers as opposed to system programmers. The state of the art in application debugging in free Common The difference, in the context of this paper, is that the tech- Lisp implementations leaves much to be desired. In many niques that we suggest are not adapted to debugging the cases, only a backtrace inspector is provided, allowing the system itself, such as the compiler. Instead, throughout this application programmer to examine the control stack when paper, we assume that, as far as the application programmer an unhandled error is signaled. Most such implementations do is concerned, the semantics of the code generated by the not allow the programmer to set breakpoints (unconditional compiler corresponds to that of the source code. or conditional), nor to step the program after it has stopped. In this paper, we are mainly concerned with Common Furthermore, even debugging tools such as tracing or man- Lisp [1] implementations distributed as so-called FLOSS, i.e., ually calling break are typically very limited in that they do \Free, Libre, and Open Source Software". While some such not allow the programmer to trace or break in important sys- implementations are excellent in terms of the quality of the tem functions such as make-instance or shared-initialize, code that the compiler generates, most leave much to be simply because these tools impact all callers, including those desired when it comes to debugging tools available to the of the system itself, such as the compiler.
    [Show full text]
  • UNIX X Command Tips and Tricks David B
    SESUG Paper 122-2019 UNIX X Command Tips and Tricks David B. Horvath, MS, CCP ABSTRACT SAS® provides the ability to execute operating system level commands from within your SAS code – generically known as the “X Command”. This session explores the various commands, the advantages and disadvantages of each, and their alternatives. The focus is on UNIX/Linux but much of the same applies to Windows as well. Under SAS EG, any issued commands execute on the SAS engine, not necessarily on the PC. X %sysexec Call system Systask command Filename pipe &SYSRC Waitfor Alternatives will also be addressed – how to handle when NOXCMD is the default for your installation, saving results, and error checking. INTRODUCTION In this paper I will be covering some of the basics of the functionality within SAS that allows you to execute operating system commands from within your program. There are multiple ways you can do so – external to data steps, within data steps, and within macros. All of these, along with error checking, will be covered. RELEVANT OPTIONS Execution of any of the SAS System command execution commands depends on one option's setting: XCMD Enables the X command in SAS. Which can only be set at startup: options xcmd; ____ 30 WARNING 30-12: SAS option XCMD is valid only at startup of the SAS System. The SAS option is ignored. Unfortunately, ff NOXCMD is set at startup time, you're out of luck. Sorry! You might want to have a conversation with your system administrators to determine why and if you can get it changed.
    [Show full text]
  • Harry Bassler
    the club joining the Western GA to make Over $50,000 a year in sales from 1941 caddie scholarships available and the an- to 1945 inclusive, this income derived each nual Caddies vs. Members softball game. year approximately as follows: Chicago and suburban newspapers were Club sales $30,000 kept supplied with information on the cam- Ball sales 10,000 paign and they gave it a good play. Accessory sales 5,000 Caddie Cart rentals 6,000 HARRY BASSLER Total $51,000 (Continued jrom page 34) Since 1945 when Bassler could start tak- ing time out to give lessons he has aver- dirt and papers, why Bassler grabs the aged over $5000 per year from this source, broom and takes care of the job then. giving as many as 15 lessons in a day. And Strange as it seems, Bassler says, after the remember: the above sales were made with assistants see you sweeping and cleaning a staff of 3 to 4 girls during the war years up, you will never have to ask them to as no young men were available. do it. Finally, Bassler is top money-winning But, best of all it gives you another pro in California area tournaments, add- chance to "shift around" your stock— ing in this manner an additional $1813 last which gives the appearance that you had year in money prizes he copped in 15 ac- to do so because you "sold out," or nearly credited tournaments. He is top money sold out, the items previously displayed winning pro in this area again so far this at certain spots.
    [Show full text]
  • EGO Reference
    EGO Reference Platform EGO Version 1.2.3 January 2008 Copyright © 1994-2007 Platform Computing Corporation All rights reserved. Although the information in this document has been carefully reviewed, Platform Computing Corporation (“Platform”) does not warrant it to be free of errors or omissions. Platform reserves the right to make corrections, updates, revisions or changes to the information in this document. UNLESS OTHERWISE EXPRESSLY STATED BY PLATFORM, THE PROGRAM DESCRIBED IN THIS DOCUMENT IS PROVIDED “AS IS” AND WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL PLATFORM COMPUTING BE LIABLE TO ANYONE FOR SPECIAL, COLLATERAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES, INCLUDING WITHOUT LIMITATION ANY LOST PROFITS, DATA, OR SAVINGS, ARISING OUT OF THE USE OF OR INABILITY TO USE THIS PROGRAM. We'd like to hear You can help us make this document better by telling us what you think of the content, organization, and usefulness of the information. from you If you find an error, or just want to make a suggestion for improving this document, please address your comments to [email protected]. Your comments should pertain only to Platform documentation. For product support, contact [email protected]. Document This document is protected by copyright and you may not redistribute or translate it into another language, in part or in whole. redistribution and translation Internal You may only redistribute this document internally within your organization (for example, on an intranet) provided that you continue redistribution to check the Platform Web site for updates and update your version of the documentation.
    [Show full text]
  • Installation Iraf
    INSTALLATION IRAF o IRAF: IMAGE REDUCTION AND ANALYSIS FACILITY (NOAO, TUCSON) SCISOFT (IRAF + DS9 + ...) MAC http://scisoftosx.dyndns.org/ LINUX http://www.eso.org/sci/software/scisoft/ P. OCVIRK - COURS DE REDUCTION DES DONNEES - M2 OBSERVATOIRE ASTRONOMIQUE DE STRASBOURG IRAF UBUNTU o DEPENDANCES o IRAF o CONFIG IRAF P. OCVIRK - COURS DE REDUCTION DES DONNEES - M2 OBSERVATOIRE ASTRONOMIQUE DE STRASBOURG INSTALLATION IRAF UBUNTU OCTOBRE 2012 Dependances (a installer avant iraf) o C’est peut-etre la premiere fois que vous devez installer des dependances. Vous aurez peut-etre l’impression de ne pas tout comprendre. Peu importe!! Le but c’est d’avoir iraf qui tourne! o Certaines sont deja presentes. Pour tester leur existence sur votre systeme: locate <ma dependance> o En general elles s’installent grace a apt-get: sudo apt-get install <ma dependance> o En cas de probleme avec une dependance, google est votre ami: faire une recherche “install SDL_image ubuntu” par exemple o Toutes les commandes de cette aide se lancent dans un terminal (ou xterm), la plupart (mais pas toutes!!) en mode super-user. Elles debutent alors par sudo (super-user do). P. OCVIRK - COURS DE REDUCTION DES DONNEES - M2 OBSERVATOIRE ASTRONOMIQUE DE STRASBOURG INSTALLATION IRAF UBUNTU OCTOBRE 2012 Dependances 1 o csh: sudo apt-get install csh o tcsh: sudo apt-get install tcsh o emacs (editeur de textes): sudo apt-get install emacs o SDL_image, SDL_ttf, libgfortran: deja installees? (me contacter si elles n’apparaissent pas avec un locate) P. OCVIRK - COURS DE REDUCTION DES DONNEES - M2 OBSERVATOIRE ASTRONOMIQUE DE STRASBOURG INSTALLATION IRAF UBUNTU OCTOBRE 2012 Dependances 2: le cas particuler de compat-libf2c-34.
    [Show full text]