Skip to main content

论开源

 发信人: guvest (我爱你老婆Anna), 信区: Programming
标  题: 论开源
发信站: BBS 未名空间站 (Mon Aug 10 23:18:55 2020, 美东)

开源软件乃是建立在Bill Gates文章为开端的,对软件的一系列权力的主张的基础上的
。70年代微软就打一系列官司。你做一个硬件,可以兼容Windows,他就可能和你打官司
,收钱,这绝对不是夸张。开源软件承认这个人造的”软件”概念。放弃的那部分,我
认为和主要的法权没有关系。所以可以看作是对闭源软件根本部分的再次确认。也是对
这个所谓的“软件产业”的发展。

但是这显然不是先天真理。我可以承认代码,不承认软件。代码的权力归于其物理驻地
(硬件)。这话说着拗口,其实很简单。最早代码都是随着硬件免费给的。iphone一开
始就是如此。卖法决定设计。既然软硬件是不分的,那么一体化设计占上风。
70年代以前,美国有几样家用电器是一体化设计上的杰作。80年代日本的walkman,德
国的相机收音机
什么的也展示了同样的风格。

就算今天,我在屋子里转一圈,只有windows的laptop,两个游戏机,router是软硬件分
开的。
冰箱,微波炉,电视机遥控器,...mac book pro...几十个东西都是一体设计的产物。

我认为以下两个集合有很大可能重叠:
1.形状丑陋的电器
2.用linux开源的驱动软件之类的开源软件的电器

所以我的说法是有实证根据的。一个屋子里一体设计的消费电子设备,从数量上讲,占
多数,为什么?我认为这是因为人们的生活不需要分割成那么多可替换的部分。电视机
遥控器,按个按钮刷firmware?手机玩的还不累吗。

但是也有反例。我听说的,过去美国的拖拉机,农民都可以自己修修,小改一下什么的
。近来一个拖拉机公司,用发动机软件锁死了农民修拖拉机的权力,引发了游行。厂商
给的理由是:
“One tweak could cascade throughout an entire software system and lead to
unintended consequences,” says Julian Sanchez, Deere’s director of
precision agriculture strategy and business development.

这就跟mbp用八角螺丝钉,焊死内存条...差不多。但apple似乎没有在法权上,不准你
改。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...