How Power Users Help and Hinder Open Bug Reporting Amy J
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Origins of Severe Software Defects on Evolving Information Systems: a Double Case Study
Unicentre CH-1015 Lausanne http://serval.unil.ch Year : 2019 THE ORIGINS OF SEVERE SOFTWARE DEFECTS ON EVOLVING INFORMATION SYSTEMS: A DOUBLE CASE STUDY Hillah Nico Hillah Nico, 2019, THE ORIGINS OF SEVERE SOFTWARE DEFECTS ON EVOLVING INFORMATION SYSTEMS: A DOUBLE CASE STUDY Originally published at : Thesis, University of Lausanne Posted at the University of Lausanne Open Archive http://serval.unil.ch Document URN : urn:nbn:ch:serval-BIB_A02DBD5A439B3 Droits d’auteur L'Université de Lausanne attire expressément l'attention des utilisateurs sur le fait que tous les documents publiés dans l'Archive SERVAL sont protégés par le droit d'auteur, conformément à la loi fédérale sur le droit d'auteur et les droits voisins (LDA). A ce titre, il est indispensable d'obtenir le consentement préalable de l'auteur et/ou de l’éditeur avant toute utilisation d'une oeuvre ou d'une partie d'une oeuvre ne relevant pas d'une utilisation à des fins personnelles au sens de la LDA (art. 19, al. 1 lettre a). A défaut, tout contrevenant s'expose aux sanctions prévues par cette loi. Nous déclinons toute responsabilité en la matière. Copyright The University of Lausanne expressly draws the attention of users to the fact that all documents published in the SERVAL Archive are protected by copyright in accordance with federal law on copyright and similar rights (LDA). Accordingly it is indispensable to obtain prior consent from the author and/or publisher before any use of a work or part of a work for purposes other than personal use within the meaning of LDA (art. -
Marcia Knous: My Name Is Marcia Knous
Olivia Ryan: Can you just state your name? Marcia Knous: My name is Marcia Knous. OR: Just give us your general background. How did you come to work at Mozilla and what do you do for Mozilla now? MK: Basically, I started with Mozilla back in the Netscape days. I started working with Mozilla.org shortly after AOL acquired Netscape which I believe was in like the ’99- 2000 timeframe. I started working at Netscape and then in one capacity in HR shortly after I moved working with Mitchell as part of my shared responsibility, I worked for Mozilla.org and sustaining engineering to sustain the communicator legacy code so I supported them administratively. That’s basically what I did for Mozilla. I did a lot of I guess what you kind of call of blue activities where we have a process whereby people get access to our CVS repository so I was the gatekeeper for all the CVS forms and handle all the bugs that were related to CVS requests, that kind of thing. Right now at Mozilla, I do quality assurance and I run both our domestic online store as well as our international store where we sell all of our Mozilla gear. Tom Scheinfeldt: Are you working generally alone in small groups? In large groups? How do you relate to other people working on the project? MK: Well, it’s a rather interesting project. My capacity as a QA person, we basically relate with the community quite a bit because we have a very small internal QA organization. -
Mozilla Foundation and Subsidiary, December 31, 2018 and 2017
MOZILLA FOUNDATION AND SUBSIDIARY DECEMBER 31, 2018 AND 2017 INDEPENDENT AUDITORS’ REPORT AND CONSOLIDATED FINANCIAL STATEMENTS Mozilla Foundation and Subsidiary Independent Auditors’ Report and Consolidated Financial Statements Independent Auditors’ Report 1 - 2 Consolidated Financial Statements Consolidated Statement of Financial Position 3 Consolidated Statement of Activities and Change in Net Assets 4 Consolidated Statement of Functional Expenses 5 Consolidated Statement of Cash Flows 6 Notes to Consolidated Financial Statements 7 - 27 Independent Auditors’ Report THE BOARD OF DIRECTORS MOZILLA FOUNDATION AND SUBSIDIARY Mountain View, California Report on the Consolidated Financial Statements We have audited the accompanying consolidated financial statements of MOZILLA FOUNDATION AND SUBSIDIARY (Mozilla) which comprise the consolidated statement of financial position as of December 31, 2018 and 2017, and the related consolidated statements of activities and change in net assets, and cash flows for the years then ended, the statement of functional expenses for the year ended December 31, 2018, and the related notes to the consolidated financial statements (collectively, the financial statements). Management’s Responsibility for the Consolidated Financial Statements Management is responsible for the preparation and fair presentation of these financial statements in accordance with accounting principles generally accepted in the United States of America; this includes the design, implementation, and maintenance of internal control relevant to the preparation and fair presentation of financial statements that are free from material misstatement, whether due to fraud or error. Auditors’ Responsibility Our responsibility is to express an opinion on these financial statements based on our audits. We conducted our audits in accordance with auditing standards generally accepted in the United States of America. -
Desarrollo De Aplicaciones Web Abiertas Para La Plataforma Firefox Os
Universidad Politécnica de Madrid Escuela Técnica Superior de Ingenieros de Telecomunicación DESARROLLO DE APLICACIONES WEB ABIERTAS PARA LA PLATAFORMA FIREFOX OS TRABAJO FIN DE MÁSTER Omar Alejandro Sotelo Torres 2013 Universidad Politécnica de Madrid Escuela Técnica Superior de Ingenieros de Telecomunicación Máster Universitario en Ingeniería de Redes y Servicios Telemáticos TRABAJO FIN DE MÁSTER DESARROLLO DE APLICACIONES WEB ABIERTAS PARA LA PLATAFORMA FIREFOX OS Autor Omar Alejandro Sotelo Torres Director Santiago Pavón Gómez Departamento de Ingeniería de Sistemas Telemáticos 2013 Resumen Smartphones cada vez más potentes, con mejores funcionalidades y a un menor costo, hacen que el número de aplicaciones para estos dispositivos crezca de forma exponencial, tanto para uso personal como corporativo. Actualmente, el mercado de la telefonía móvil se encuentra dominado por los sistemas operativos Android de Google e iOS de Apple. Estos sistemas operativos han destacado entre los otros debido a su rendimiento, prestaciones y demás características que incentivan a los usuarios a su uso. Al igual que para la mayoría de los sistemas operativos móviles que existen hoy en día, para estos sistemas el desarrollo de las aplicaciones se hace generalmente de forma nativa, es decir aplicaciones programadas específicamente para cada sistema operativo, haciendo uso de APIs, librerías, kit de desarrollo y lenguajes de programación definidos por las compañías propietarias. EL surgimiento de HTML5 y la búsqueda de la estandarización de las aplicaciones para dispositivos móviles han impulsado el surgimiento de propuestas de desarrollo hibridas o puramente web, promoviendo por parte de Mozilla la idea de llevar las tecnologías web abiertas a los terminales móviles a través de un sistema operativo construido exclusivamente haciendo uso de estas, dando originen a Firefox OS. -
Mozillamessaging.Com Site Redesign Site Map — Version 3.0 — September 22, 2008
Mozillamessaging.com Site Redesign Site Map — Version 3.0 — September 22, 2008 While this document can be printed at 8.5” x 11” it may be hard to read and is intended to be printed at 11” x 17”. Mozillamessaging.com Site Redesign Version 3.0 Other Systems and Features 03 05 Mozilla Messaging Languages http://www.mozillamessaging.com/en-US/features.html http://www.mozillamessaging.com/en-US/all.html Thunderbird 02 Release Notes 04 Download Page 18 (Overview) http://www.mozillamessaging.com/ http://www.mozillamessaging.com/en-US/releasenotes/ http://www.mozillamessaging.com/en-US/download.html ?? URL TBD en-US/thunderbird Secure Email TBD http://www.mozillamessaging.com/en-US/email.html All Add-Ons https://addons.mozilla.org/en-US/thunderbird/ Supported Servers TBD http://www.mozillamessaging.com/en-US/servers Recommended https://addons.mozilla.org/en-US/thunderbird/recommended Add-Ons Popular https://addons.mozilla.org/en-US/ https://addons.mozilla.org/en-US/thunderbird/browse/type:1/cat:all?sort=popular thunderbird/ FAQ Themes http://www.mozilla.org/support/thunderbird/faq https://addons.mozilla.org/en-US/thunderbird/browse/type:2 Tips & Tricks Dictionaries http://www.mozilla.org/support/thunderbird/tips https://addons.mozilla.org/en-US/thunderbird/browse/type:3 Keyboard Shortcuts http://www.mozilla.org/support/thunderbird/keyboard Mouse Shortcuts Add-Ons Support 06 http://www.mozilla.org/support/thunderbird/mouse https://addons.mozilla.org/en-US/thunderbird/ (Overview) http://www.mozillamessaging.com/ Menu References Bugzilla en-US/support http://www.mozilla.org/support/thunderbird/menu https://bugzilla.mozilla.org/ Editing Config. -
A First Look at Firefox OS Security
A First Look at Firefox OS Security Daniel DeFreez∗, Bhargava Shastryy, Hao Chen∗, Jean-Pierre Seiferty ∗University of California, Davis fdcdefreez, [email protected] ySecurity in Telecommunications, Technische Universitat¨ Berlin fbshastry, [email protected] Abstract—With Firefox OS, Mozilla is making a serious push the abuse of vulnerable applications. All privileged appli- for an HTML5-based mobile platform. In order to assuage cations have a default Content Security Policy applied and security concerns over providing hardware access to web ap- are reviewed for conformance to security guidelines prior to plications, Mozilla has introduced a number of mechanisms that being distributed through the official Firefox Market. The make the security landscape of Firefox OS distinct from both Content Security Policy almost categorically prevents Cross- the desktop web and other mobile operating systems. From an Site Scripting (XSS) via JavaScript injection, and code re- application security perspective, the two most significant of these mechanisms are the the introduction of a default Content Security view should pick up any misuse of permissions or obvious Policy and code review in the market. This paper describes how security errors. This paper asks whether these mechanisms lightweight static analysis can augment these mechanisms to find are sufficient to prevent developers from making trivially vulnerabilities which have otherwise been missed. We provide preventable security blunders. We find that they are not. The examples of privileged applications in the market that contain most prevalent attack vector, without a doubt, is HTML in- vulnerabilities that can be automatically detected. jection, and .innerHTML1 is the culprit. -
Internal Message
Earlier today, Mozilla Corporation CEO and Mozilla Foundation Chairwoman Mitchell Baker sent the following message to Mozilla employees. We are making significant changes at Mozilla Corporation today. Pre-COVID, our plan for 2020 was a year of change: building a better internet by accelerating product value in Firefox, increasing innovation, and adjusting our finances to ensure financial stability over the long term. We started with immediate cost-saving measures such as pausing our hiring, reducing our wellness stipend and cancelling our All-Hands. But COVID-19 has accelerated the need and magnified the depth for these changes. Our pre-COVID plan is no longer workable. We have talked about the need for change — including the likelihood of layoffs — since the spring. Today these changes become real. We are also restructuring to put a crisper focus on new product development and go to market activities. In the long run, I am confident that the new organizational structure will serve our product and market impact goals well, but we will talk in detail about this in a bit. But, before that is the painful part. Yes — we need to reduce the size of our workforce. This is hard to internalize and I desperately wish there was some other way to set Mozilla up for success in building a better internet. I desperately wish that all those who choose Mozilla as an employer could stay as long as interest and skills connect. Unfortunately, we can’t make that happen today. We are reducing the size of the MoCo workforce by approximately 250 roles, including closing our current operations in Taipei, Taiwan. -
The Research of Multinational Enterprises Transnational Management
E3S Web of Conferences 235, 01007 (2021) https://doi.org/10.1051/e3sconf/202123501007 NETID 2020 The Research of Multinational Enterprises Transnational Management Li Chong1,a 1Faculty of International Trade, Shanxi University of Finance and Economics, Wucheng Road, Taiyuan, China Abstract. With the development of global business, MNEs are always sinking into various pressures which are related to economic factors, social factors and informational factors. This situation making MNEs’ strategies is supposed to achieve those requirements that including global market integration, national responsiveness, worldwide learning. There are four important strategies which are widely used in MNEs internationalization process that including multinational strategy, global strategy, international strategy, and transnational strategy. This essay will introduce pursuing transnational strategy and some difficulties existing in this process. Furthermore, an example of an entrepreneurial subsidiary will be chosen to explore and conduct further research. autonomy thus more difficult for the parent company to 1 INTRODUCTION manage them. The modern transnational strategy is attempting to be simultaneously both globally coordinated Getting benefits from the development of global business, and locally responsive. This strategy is not only MNEs are becoming one of the most pervasive types of emphasizing decentralized, interdependent, and business organization. A multinational enterprise is one specialized characteristics in MNEs' configuration of which controls -
Imagem Digitalizada
UNIVERSIDADE DE SÃO PAULO Instituto de Ciências Matemáticas e de Computação ISSN 0103-2569 Uma Introdução ao Bugzilla Leonardo Jorge Quemello Alexandre Michetti Manduca Renata P. M. Fortes Nº 253 RELATÓRIOS TÉCNICOS São Carlos — SP Fev./2005 SYSNO Jªxx aiº/%% DATA l _ [ [CMC — SEAB .) Uma Introdução ao Bugzilla Leonardo Jorge Quemello, AlexandreMichetti Manduca, Renata P. M. Fortes [leonardo, michetti) ©grad.icmc.usp.br , renata©icmc.usp.br Universidade de São Paulo Instituto de Ciências Matemáticas e de Computação São Carlos — SP, Brasil. CP: 668 CEP: 13560-970 São Carlos -SP - fevereiro de 2005 Índice 1- INTRODUÇÃO....................................................................................................3 2 — APRESENTAÇÃO DE BUGZILLA.......... 3 - OBJETIVO E RECURSOS DE BUGZILLA......................................................4 4 — VIS ÃO GERAL DO FUNCIONAMENTO DE BUGZILLA.............................5 4.1 — Produtos e Componentes................................................. 4.2 — Contas de usuário.............................................................................................5 4.3 — Níveis de usuário e permissões........................................................................5 4.4 — Ações...................................... 4.5 — Bugs................................................................................................................. 4.6 — Versões e Milestones....... 4.7 — Grupos.......................................................... 4.7 — Ciclo de vida dos bugs e funcionamento -
Amicus Briefs in Support of Petitioners: Consumers Union; Engine Advocacy; Jon Peha and Scott Jordan; Professors of Administrative, Communications, Energy
USCA Case #18-1051 Document #1747665 Filed: 08/27/2018 Page 1 of 49 ORAL ARGUMENT NOT YET SCHEDULED No. 18-1051 Consolidated with 18-1052, 18-1053, 18-1054, 18-1055, 18-1056, 18-1061, 18- 1062, 18-1064, 18-1065, 18-1066, 18-1067, 18-1068, 18-1088, 18-1089, 18-1105 IN THE United States Court of Appeals for the District of Columbia Circuit _______________ MOZILLA CORPORATION, et al., Petitioners, v. FEDERAL COMMUNICATIONS COMMISSION and UNITED STATES OF AMERICA, Respondents. _______________ On Petition for Review of an Order of the Federal Communications Commission _______________ BRIEF AMICI CURIAE OF THE AMERICAN COUNCIL ON EDUCATION AND 19 OTHER EDUCATION AND LIBRARY ASSOCIATIONS IN SUPPORT OF PETITIONERS _______________ PETER MCDONOUGH JESSICA L. ELLSWORTH VICE PRESIDENT AND GENERAL COUNSEL STEPHANIE GOLD AMERICAN COUNCIL ON EDUCATION MATTHEW HIGGINS One Dupont Circle N.W. HOGAN LOVELLS US LLP Washington, D.C. 20036 555 Thirteenth Street, N.W. (202) 939-9361 Washington, D.C. 20004 [email protected] (202) 637-5600 Counsel for American Council on Education [email protected] Counsel for Amici Curiae August 27, 2018 USCA Case #18-1051 Document #1747665 Filed: 08/27/2018 Page 2 of 49 CERTIFICATE AS TO PARTIES, RULINGS, AND RELATED CASES Pursuant to Circuit Rule 28(a)(1), amici curiae American Council on Education (ACE), Accreditation Council for Pharmacy Education (ACPE), American Association of Colleges for Teacher Education (AACTE), American Association of Colleges of Nursing (AACN), American Association of Community Colleges -
Firefox Hacks Is Ideal for Power Users Who Want to Maximize The
Firefox Hacks By Nigel McFarlane Publisher: O'Reilly Pub Date: March 2005 ISBN: 0-596-00928-3 Pages: 398 Table of • Contents • Index • Reviews Reader Firefox Hacks is ideal for power users who want to maximize the • Reviews effectiveness of Firefox, the next-generation web browser that is quickly • Errata gaining in popularity. This highly-focused book offers all the valuable tips • Academic and tools you need to enjoy a superior and safer browsing experience. Learn how to customize its deployment, appearance, features, and functionality. Firefox Hacks By Nigel McFarlane Publisher: O'Reilly Pub Date: March 2005 ISBN: 0-596-00928-3 Pages: 398 Table of • Contents • Index • Reviews Reader • Reviews • Errata • Academic Copyright Credits About the Author Contributors Acknowledgments Preface Why Firefox Hacks? How to Use This Book How This Book Is Organized Conventions Used in This Book Using Code Examples Safari® Enabled How to Contact Us Got a Hack? Chapter 1. Firefox Basics Section 1.1. Hacks 1-10 Section 1.2. Get Oriented Hack 1. Ten Ways to Display a Web Page Hack 2. Ten Ways to Navigate to a Web Page Hack 3. Find Stuff Hack 4. Identify and Use Toolbar Icons Hack 5. Use Keyboard Shortcuts Hack 6. Make Firefox Look Different Hack 7. Stop Once-Only Dialogs Safely Hack 8. Flush and Clear Absolutely Everything Hack 9. Make Firefox Go Fast Hack 10. Start Up from the Command Line Chapter 2. Security Section 2.1. Hacks 11-21 Hack 11. Drop Miscellaneous Security Blocks Hack 12. Raise Security to Protect Dummies Hack 13. Stop All Secret Network Activity Hack 14. -
An Empirical Analysis of the Bug-Fixing Process in Open Source
An Empirical Analysis of Bug Reports and Bug Fixing in Open Source Android Apps Pamela Bhattacharya Liudmila Ulanova Iulian Neamtiu Sai Charan Koduru Department of Computer Science and Engineering University of California, Riverside, CA, USA Email:fpamelab,lulan001,neamtiu,[email protected] Abstract—Smartphone platforms and applications (apps) empirical studies and provide a quantitative basis for im- have gained tremendous popularity recently. Due to the novelty proving the quality of open-source Android apps. To this of the smartphone platform and tools, and the low barrier to end, in this paper, we perform an in-depth empirical study entry for app distribution, apps are prone to errors, which affects user experience and requires frequent bug fixes. An on bugs in the Android Platform project and 24 widely-used essential step towards correcting this situation is understanding open-source Android apps from diverse categories such as the nature of the bugs and bug-fixing processes associated with communication, tools, media and productivity (Section II). smartphone platforms and apps. However, prior empirical bug Our analysis has three main thrusts—we chose these thrusts studies have focused mostly on desktop and server applications. to provide a good breadth–depth balance for our study. Therefore, in this paper, we perform an in-depth empirical study on bugs in the Google Android smartphone platform First, we define several metrics to understand the quality and 24 widely-used open-source Android apps from diverse of bug reports, and analyze the bug-fix process: bug-fix time, categories such as communication, tools, and media. Our bug categories, bug priority, status and the engagement of analysis has three main thrusts.