Introductions - UNIX® Unix, and Not-Unix Part I - Capital drawing on public research 65 Part II - Commodity code vs Hacker Ethics 75 Part III - Mighty BSD: seeding and ceding 79 Part IV - OS abstraction to a fault: EULA 80 Part V - Community repair: GNU/GPL 85 |
Part VI - Network maturity: GNU/Linux 90 Part VII - Desktop browser infection 93 Part VIII - Browser Wars opening closed 95 Part IX - Reaction: Open Source 98 Part X - Open Season 00 Epilogue - Market update 05 |