100 lines
4.7 KiB
Markdown
100 lines
4.7 KiB
Markdown
#### The Cathedral and the Bazaar
|
|
|
|
This is a book that was written by Eric S. Raymond, which you can read the original (and probably more up-to-date) version of [here](http://www.catb.org/~esr/writings/cathedral-bazaar). It is released under the Open Publication License version 2.0. This mirror exists as an attempt to be easier to read and navigate.
|
|
|
|
You can start reading the book [here](intro.md).
|
|
|
|
#### Table of Contents
|
|
|
|
[Introduction](intro.md)
|
|
|
|
A Brief History of Hackerdom
|
|
- [Prologue: The Real Programmers](ch1/real-programmers.md)
|
|
- [The Early Hackers](ch1/early-hackers.md)
|
|
- [The Rise of Unix](ch1/rise-unix.md)
|
|
- [The End of Elder Days](ch1/end-elder-days.md)
|
|
- [The Proprietary-Unix Era](ch1/proprietary-unix.md)
|
|
- [The Early Free Unixes](ch1/free-unix.md)
|
|
- [The Great Web Explosion](ch1/web-explosion.md)
|
|
- [Bibliography](ch1/bibliography.md)
|
|
|
|
The Cathedral and the Bazaar
|
|
- [The Cathedral and the Bazaar](ch2/cathedral-bazaar.md)
|
|
- [The Mail Must Get Through](ch2/mail-through.md)
|
|
- [The Importance of Having Users](ch2/having-users.md)
|
|
- [Release Early, Release Often](ch2/release.md)
|
|
- [How Many Eyeballs Tame Complexity](ch2/eyeballs-complexity.md)
|
|
- [When Is a Rose Not a Rose?](ch2/rose-not-rose.md)
|
|
- [Popclient becomes Fetchmail](ch2/fetchmail.md)
|
|
- [Fetchmail Grows Up](ch2/fetchmail-grows-up.md)
|
|
- [A Few More Lessons from Fetchmail](ch2/lessons-fetchmail.md)
|
|
- [Necessary Preconditions for the Bazaar Style](ch2/necessary-preconditions.md)
|
|
- [The Social Context of Open-Source Software](ch2/social-context.md)
|
|
- [On Management and the Maginot Line](ch2/management-maginot.md)
|
|
- [Epilog: Netscape Embraces the Bazaar](ch2/netscape.md)
|
|
- [Notes](ch2/notes.md)
|
|
- [Bibliography](ch2/bibliography.md)
|
|
|
|
Homesteading the Noosphere
|
|
- [An Introductory Contradiction](ch3/introductory-contradiction.md)
|
|
- [The Varieties of Hacker Ideology](ch3/hacker-ideology.md)
|
|
- [Promiscuous Theory, Puritan Practice](ch3/puritan-practice.md)
|
|
- [Ownership and Open Source](ch3/ownership.md)
|
|
- [Locke and Land Title](ch3/locke-land.md)
|
|
- [The Hacker Milieu as Gift Culture](ch3/gift-culture.md)
|
|
- [The Joy of Hacking](ch3/joy-hacking.md)
|
|
- [The Many Faces of Reputation](ch3/reputation.md)
|
|
- [Ownership Rights and Reputation Incentives](ch3/ownership-reputation.md)
|
|
- [The Problem of Ego](ch3/problem-ego.md)
|
|
- [The Value of Humility](ch3/humility.md)
|
|
- [Global Implications of the Reputation-Game Model](ch3/global-implications.md)
|
|
- [How Fine a Gift?](ch3/fine-gift.md)
|
|
- [Noospheric Property and the Ethology of Territory](ch3/noospheric-property.md)
|
|
- [Causes of Conflict](ch3/conflict.md)
|
|
- [Project Structures and Ownership](ch3/project-structures.md)
|
|
- [Conflict and Conflict Resolution](ch3/conflict-resolution.md)
|
|
- [Acculturation Mechanisms and the Link to Academia](ch3/acculturation-mechanisms.md)
|
|
- [Gift Outcompetes Exchange](ch3/gift-outcompetes-exchange.md)
|
|
- [Conclusion: From Custom to Customary Law](ch3/conclusion.md)
|
|
- [Questions for Further Research](ch3/further-research.md)
|
|
- [Notes](ch3/notes.md)
|
|
- [Bibliography](ch3/bibliography.md)
|
|
- [Acknowledgements](ch3/acknowledgements.md)
|
|
|
|
The Magic Cauldron
|
|
- [Indistinguishable From Magic](ch4/magic.md)
|
|
- [Beyond Geeks Bearing Gifts](ch4/geeks-gifts.md)
|
|
- [The Manufacturing Delusion](ch4/manufacturing-delusion.md)
|
|
- [The "Information Wants to be Free" Myth](ch4/information-myth.md)
|
|
- [The Inverse Commons](ch4/inverse-commons.md)
|
|
- [Reasons for Closing Source](ch4/closing-source.md)
|
|
- [Use-Value Funding Models](ch4/funding-models.md)
|
|
- [Why Sale Value is Problematic](ch4/sale-value.md)
|
|
- [Indirect Sale-Value Models](ch4/indirect-models.md)
|
|
- [When to be Open, When to be Closed](ch4/open-closed.md)
|
|
- [Open Source as a Strategic Weapon](ch4/strategic-weapon.md)
|
|
- [Open Source as a Strategic Business Risk](ch4/business-risk.md)
|
|
- [The Business Ecology of Open Source](ch4/business-ecology.md)
|
|
- [Coping with Success](ch4/success.md)
|
|
- [Open R&D and the Reinvention of Patronage](ch4/reinvention-patronage.md)
|
|
- [Getting There From Here](ch4/getting-there.md)
|
|
- [Conclusion: Life after the Revolution](ch4/conclusion.md)
|
|
- [Afterword: Why Closing a Driver Loses Its Vendor Money](ch4/afterword.md)
|
|
- [Notes](ch4/notes.md)
|
|
- [Bibliography](ch4/bibliography.md)
|
|
- [Acknowledgements](ch4/acknowledgements.md)
|
|
|
|
Revenge of the Hackers
|
|
- [Revenge of the Hackers](ch5/revenge-hackers.md)
|
|
- [Beyond Brooks's Law](ch5/brooks-law.md)
|
|
- [Memes and Mythmaking](ch5/memes-mythmaking.md)
|
|
- [The Road to Mountain View](ch5/mountain-view.md)
|
|
- [The Origins of 'Open Source'](ch5/origins.md)
|
|
- [The Accidental Revolutionary](ch5/accidental-revolutionary.md)
|
|
- [Phases of the Campaign](ch5/phases-campaign.md)
|
|
- [The Facts on the Ground](ch5/facts-ground.md)
|
|
- [Into the Future](ch5/future.md)
|
|
|
|
Afterword
|
|
- [Author's Afterword](afterword.md)
|