Skip to main content

Home/ Linux/ Group items tagged as

Rss Feed Group items tagged

hpmaxi -

How to Make Wealth - 0 views

  • Startups usually involve technology, so much so that the phrase "high-tech startup" is almost redundant. A startup is a small company that takes on a hard technical problem.
  • Here is a brief sketch of the economic proposition. If you're a good hacker in your mid twenties, you can get a job paying about $80,000 per year. So on average such a hacker must be able to do at least $80,000 worth of work per year for the company just to break even
  • and if you focus you can probably get three times as much done in an hour
  • ...30 more annotations...
  • I'm claiming you could be 36 times more productive than you're expected to be in a random corporate job.
  • then a smart hacker working very hard without any corporate bullshit to slow him down should be able to do work worth about $3 million a year
  • f you want to make a million dollars, you have to endure a million dollars' worth of pain.
  • Bill Gates is a smart, determined, and hardworking man, but you need more than that to make as much money as he has. You also need to be very lucky.
  • If you want to create wealth, it will help to understand what it is. Wealth is not the same thing as money. [3] Wealth is as old as human history. Far older, in fact; ants have wealth. Money is a comparatively recent invention.
  • talking about making money can make it harder to understand how to make money.
  • the craftsmen. Their hand-made objects become store-bought ones.
  • A programmer can sit down in front of a computer and create wealth. A good piece of software is, in itself, a valuable thing.
  • And so it's clearer to programmers that wealth is something that's made, rather than being distributed, like slices of a pie, by some imaginary Daddy
  • we had one programmer who was a sort of monster of productivity
  • A great programmer, on a roll, could create a million dollars worth of wealth in a couple weeks. A mediocre programmer over the same period will generate zero or even negative wealth (e.g. by introducing bugs).
  • The top 5% of programmers probably write 99% of the good software.
  • Hackers often donate their work by writing open source software that anyone can use for free. I am much the richer for the operating system FreeBSD, which I'm running on the computer I'm using now, and so is Yahoo, which runs it on all their servers.
  • You can't go to your boss and say, I'd like to start working ten times as hard, so will you please pay me ten times as much?
  • A programmer, for example, instead of chugging along maintaining and updating an existing piece of software, could write a whole new piece of software, and with it create a new source of revenue.
  • All a company is is a group of people working together to do something people want. It's doing something people want that matters, not joining the group
  • To get rich you need to get yourself in a situation with two things, measurement and leverage. You need to be in a position where your performance can be measured, or there is no way to get paid more by doing more. And you have to have leverage, in the sense that the decisions you make have a big effect.
  • If you're in a job that feels safe, you are not going to get rich, because if there is no danger there is almost certainly no leverage.
  • All you need to do is be part of a small group working on a hard problem
  • Steve Jobs once said that the success or failure of a startup depends on the first ten employees. I agree
  • What is technology? It's technique. It's the way we all do things. And when you discover a new way to do things, its value is multiplied by all the people who use it. It is the proverbial fishing rod, rather than the fish. That's the difference between a startup and a restaurant or a barber shop. You fry eggs or cut hair one customer at a time. Whereas if you solve a technical problem that a lot of people care about, you help everyone who uses your solution. That's leverage
  • If there were two features we could add to our software, both equally valuable in proportion to their difficulty, we'd always take the harder one
  • I can remember times when we were just exhausted after wrestling all day with some horrible technical problem. And I'd be delighted, because something that was hard for us would be impossible for our competitors
  • Start by picking a hard problem, and then at every decision point, take the harder choice.
  • You'd think that a company about to buy you would do a lot of research and decide for themselves how valuable your technology was.
  • Not at all. What they go by is the number of users you have
  • Wealth is what people want, and if people aren't using your software, maybe it's not just because you're bad at marketing. Maybe it's because you haven't made what they want.
  • Now we can recognize this as something hackers already know to avoid: premature optimization. Get a version 1.0 out there as soon as you can. Until you have some users to measure, you're optimizing based on guesses.
  • In that respect the Cold War teaches the same lesson as World War II and, for that matter, most wars in recent history. Don't let a ruling class of warriors and politicians squash the entrepreneurs
  • Let the nerds keep their lunch money, and you rule the world.
Djiezes Kraaijst

Legal Pad - Fortune on CNNMoney.com - 0 views

  • A no-fly zone to protect Linux from patent trolls
  • initiative designed to help shield the open-source software community from threats posed by companies or individuals holding dubious software patents and seeking payment for alleged infringements by open-source software products.
  • call to independent open-source software developers all over the world to start submitting their new software inventions to Linux Defenders (Web site due to be operational Tuesday) so that the group’s attorneys and engineers can, for no charge, help shape, structure, and document the invention in the form of a “defensive publication.”
  • ...5 more annotations...
  • In effect, the defensive-publications initiative mounts a preemptive attack upon those who would try to patent purported software inventions that are not truly novel — i.e., innovations that are already known and in use, though no one may have ever previously bothered to document them, let alone obtain a patent on them, a process usually requiring the hiring of attorneys as well as payment of significant filing fees.
  • The Linux Defenders program is largely the brainchild of Bergelt, who took over as Open Invention Network’s CEO this past February. The program also reflects a new, more proactive role Bergelt envisions for OIN than the group has played in the past.
  • The Linux Defenders program will actually have three components. The first will be a peer-to-patent component that, like New York Law School’s existing program, will reach out to the open-source community in search of evidence of “prior art” — proof of preexisting knowledge or use of certain inventions — that can be used to challenge applications for patents that have been filed but not yet granted.
  • The second component will be a natural extension of the first, to be known as “Post-Grant Peer to Patent,” which will enlist similar community assistance in the search for prior art relevant to patents that have already actually issued. In this case, the goal would be — assuming such prior art is found — to initiate an administrative reexamination proceeding before the U.S. PTO to get the patent invalidated
  • The third component is the defensive-publications initiative.
  •  
    On Tuesday a consortium of technology companies, including IBM (IBM), will launch a new initiative designed to help shield the open-source software community from threats posed by companies or individuals holding dubious software patents and seeking payment for alleged infringements by open-source software products. The most novel feature of the new program, to be known as Linux Defenders, will be its call to independent open-source software developers all over the world to start submitting their new software inventions to Linux Defenders (Web site due to be operational Tuesday) so that the group's attorneys and engineers can, for no charge, help shape, structure, and document the invention in the form of a "defensive publication."
Tim M

Google Android x86 1.6-r28.5.01 Screencast Review Install Tutorial - 0 views

  •  
    Review style Screencast Tutorial on how-to Install and use Google Android x86 1.6-r28.5.01 Project ISO on a Sun VirtualBox Virtual Machine using Kubuntu 9.10 64bit as the host Operating System. We take a close-up in-depth look at this Mobile Phone OS features such as the App Store.
Djiezes Kraaijst

Computerworld - The A-Z of Programming Languages: BASH/Bourne-Again Shell - 0 views

  • Interviews The A-Z of Programming Languages: BASH/Bourne-Again ShellWhen the Bourne Shell found its identity
  • in this article we chat to Chet Ramey about his experience maintaining Bash.
  • In BASH's case, the problem to be solved was a free software version of the Posix standard shell to be part of the GNU system.
  • ...3 more annotations...
  • the original Bourne Shell was very influential, the various System V shell releases preserved that heritage, and the Posix committee used those versions as the basis for the standard they developed. Certainly the basic language syntax and built-in commands are direct descendants of the Bourne Shell's. Bash's additional features and functionality build on what the Bourne shell provided. As for source code and internal implementation, there's no relationship at all
  • Bash will continue to evolve as both an interactive environment and a programming language. I'd like to add more features that allow interested users to extend the shell in novel ways. The programmable completion system is an example of that kind of extension.
  • Do you have any advice for up-and-coming programmers? Find an area that interests you and get involved with an existing community. There are free software projects in just about any area of programming. The nuts-and-bolts -- which language you use, what programming environment you use, where you do your work -- are not as important as the passion and interest you bring to the work itself.
  •  
    an interview with Chet Ramey, maintainer of the bash-shell
Marco Castellani

DistroWatch.com: Put the fun back into computing. Use Linux, BSD. - 0 views

  • So what is the main benefit of choosing Slackware Linux over other distributions? First and foremost, it's the clean and uncomplicated system, with no hidden surprises, that is perhaps Slackware's biggest asset. As commented recently by a poster on a popular web site, it is the only major distribution that has resisted the temptation to add custom features and other bloat to Linux. Slackware is as pure and natural as a Linux distribution can be - it comes with a vanilla kernel and it includes just the necessary libraries, as well as a well-balanced set of development tools, desktop and server packages. Nothing more and nothing less.
Frank Boros

How to improve battery life of Linux System / Laptop / PC - 0 views

  •  
    In this tutorial i will show you how to improve battery life of linux system or laptop. For Linux users who enjoy a fragmentation-free and virus-immune laptop, there's barely anything that makes them whine as much as their Redmond-loving counterparts. Linux, on a fully compatible machine, achieves
anonymous

Debian Sources List Generator - 0 views

  •  
    Sources List Generator for Debian. It features the official Debian repositories as well as other 3rd party repos.
anonymous

OOM Killer - linux-mm.org Wiki - 0 views

  •  
    The functions, code excerpts and comments discussed below here are from mm/oom_kill.c unless otherwise noted. It is the job of the linux 'oom killer' to sacrifice one or more processes in order to free up memory for the system when all else fails. It will also kill any process sharing the same mm_struct as the selected process, for obvious reasons. Any particular process leader may be immunized against the oom killer if the value of its /proc//oomadj is set to the constant OOM_DISABLE (currently defined as -17). The function which does the actual scoring of a process in the effort to find the best candidate for elimination is called badness(), which results from the following call chain: _alloc_pages -> out_of_memory() -> select_bad_process() -> badness() The comments to badness() pretty well speak for themselves:
Scott Beamer

Splunk | IT Search for Log Management, Operations, Security and Compliance - 3 views

  •  
    Splunk is the world's leading software used to monitor, report and analyze live streaming IT data as well as terabytes of historical data - located on-premises or in the cloud. More than 1,850 organizations in 70 countries use Splunk to gain valuable insights from their IT data to improve service levels, reduce IT operations costs, mitigate security risks, and drive new levels of operational visibility.
Paul Sydney Orozco

http://www.adobocode.com/spring/marshallingunmarshalling-java-objects-into-xml-file-usi... - 0 views

  •  
    The release 3.0 of Spring Framework added the Spring Module OXM which supports the marshalling and unmarshalling of Java objects and XML documents.In this post, we will be using Spring OXM to take a Java object, convert it to a XML-format and save it in the hard-disk as an XML file containing information of that Java object. We will also cover how to retrieve back the serialized state of that XML file and reconstruct it back to it's original state as a Java object.
Sandra Nowakowski

CCSP Study - 0 views

  •  
    Managing The Transition To Climate Stabilization File Type:pdf - Download Pdf Reader Ccsp Study Design ... Ccsp Study Design. Develop Reference (business As Usual) Case ... Goal Of Present Study. To Extend Earlier Work Done As Part Of Us Climate ... ...
1 - 20 of 165 Next › Last »
Showing 20 items per page