MindTouch learns the open source walk


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News MindTouch learns the open source walk
# 1  
Old 03-07-2008
MindTouch learns the open source walk

Fri, 07 Mar 2008 19:00:00 GMT
How do two former Microsoft employees end up heading an open source company? In the case of Aaron Fulkerson and Steve Bjork of MindTouch, the decision was based on the wish for independence and to work more closely with customers, according to Fulkerson. The two partners suffered some initial criticism because of their past employment, but have largely survived it by learning how to interact with the free software community.


Source...
Login or Register to Ask a Question

Previous Thread | Next Thread

5 More Discussions You Might Find Interesting

1. Fedora

Is UNIX an open source OS ?

Hi everyone, I know the following questions are noobish questions but I am asking them because I am confused about the basics of history behind UNIX and LINUX. Ok onto business, my questions are-: Was/Is UNIX ever an open source operating system ? If UNIX was... (21 Replies)
Discussion started by: sreyan32
21 Replies

2. Shell Programming and Scripting

Open source project

Hi Guys, This might not be the right place to ask but I want to contribute to some open source project. Can anyone please help me to how to start and where to start? (3 Replies)
Discussion started by: tapan singh
3 Replies

3. Shell Programming and Scripting

Open Source

Hi Friends I'm new to this UNIX - I'm working on the porting project from Solaris To Linux i just want to map some commands from solaris to Linux so can any one please tell me how to get the source code of the commands like "ls", "cu", "du" Regards sabee (1 Reply)
Discussion started by: sabee.prakash
1 Replies

4. Cybersecurity

is open source more secure ?

Hi Guys, I'd like to know your opinion. A friend of mine claims, an open source OS like linux is more secure than a closed one like AIX because 'if he is hacked, he can do countermeasures'. I believe the opposite is the case - it's more secure if not everybody knows the kernel and is able to... (6 Replies)
Discussion started by: zxmaus
6 Replies

5. IP Networking

Open Source NMS

Hello there, I wanted to know the members' opinion about the best open source network management software which uses a web browser to show its interface and results. I am interested in the software for both windows and Linux OSs. Thanks. (4 Replies)
Discussion started by: Jawwad
4 Replies
Login or Register to Ask a Question
OPEN(5) 							File Formats Manual							   OPEN(5)

NAME
open, create - prepare a fid for I/O on an existing or new file SYNOPSIS
Topen tag[2] fid[2] mode[1] Ropen tag[2] fid[2] qid[8] Tcreate tag[2] fid[2] name[28] perm[4] mode[1] Rcreate tag[2] fid[2] qid[8] DESCRIPTION
The open request asks the file server to check permissions and prepare a fid for I/O with subsequent read and write messages. The mode field determines the type of I/O: 0, 1, 2, and 3 mean read access, write access, read and write access, and execute access, to be checked against the permissions for the file. In addition, if mode has the OTRUNC (0x10) bit set, the file is to be truncated, which requires write permission (if the file is append-only, and permission is granted, the open succeeds but the file will not be truncated); if the mode has the ORCLOSE (0x40) bit set, the file is to be removed when the fid is clunked, which requires permission to remove the file from its directory. If other bits are set in mode they will be ignored. It is illegal to write a directory, truncate it, or attempt to remove it on close. If the file is marked for exclusive use (see stat(5)), only one client can have the file open at any time. That is, after such a file has been opened, no other open will succeed until fid has been clunked. All these permissions are checked at the time of the open request; subsequent changes to the permissions of files do not affect the ability to read, write, or remove an open file. The create request asks the file server to create a new file with the name supplied, in the directory (dir) represented by fid, and requires write permission in the directory. The owner of the file is the implied user id of the request, the group of the file is the same as dir, and the permissions are the value of (perm&(~0777|0111)) | (dir.perm&perm&0666) if a regular file is being created and (perm&~0777) | (dir.perm&perm&0777) if a directory is being created. This means, for example, that if the create allows read permission to others, but the containing direc- tory does not, then the created file will not allow others to read the file. Finally, the newly created file is opened according to mode, and fid will represent the newly opened file. Mode is not checked against the permissions in perm. The qid for the new file is returned with the create reply message. Directories are created by setting the CHDIR bit (0x80000000) in the perm. The names . and .. are special; it is illegal to create files with these names. It is an error for either of these messages if the fid is already the product of a successful open or create message. An attempt to create a file in a directory where the given name already exists will be rejected; in this case, the create system call (see open(2)) uses open with truncation. The algorithm used by create is: first walk to the directory to contain the file. If that fails, return an error. Next walk to the specified file. If the walk succeeds, send a request to open and truncate the file and return the result, successful or not. If the walk fails, send a create message. If that fails, it may be because the file was created by another process after the previous walk failed, so (once) try the walk and open again. For the behavior of create on a union directory, see bind(2). ENTRY POINTS
Open and create both generate open messages; only create generates a create message. OPEN(5)