Proprietary software (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Proprietary software" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
1,475th place
1,188th place
272nd place
225th place
6th place
6th place
2nd place
2nd place
3rd place
3rd place
153rd place
151st place
26th place
20th place
9th place
13th place
low place
low place
12th place
11th place
low place
low place
1,131st place
850th place
low place
low place
580th place
462nd place
32nd place
21st place
low place
low place
low place
low place
2,435th place
1,699th place
low place
low place
low place
6,986th place
low place
low place
low place
low place
11th place
8th place
99th place
77th place
1,631st place
1,239th place
low place
low place
low place
low place
low place
low place
14th place
14th place
4,491st place
2,855th place
2,429th place
1,561st place
68th place
117th place
low place
8,630th place
low place
7,194th place
8,240th place
4,998th place
low place
low place
low place
low place
low place
low place
low place
low place
3,857th place
2,958th place
low place
low place
8,246th place
5,418th place
3,959th place
3,208th place
low place
7,385th place

adobe.com

archive.org

archive.today

  • Tony Patton (2008-11-21). "Protect your JavaScript with obfuscation". TechRepublic. Archived from the original on March 15, 2014. Retrieved May 2, 2022. While the Web promotes the sharing of such code, there are times when you or a client may not want to share their JavaScript code. This may be due to the sensitive nature of data within the code, proprietary calculations, or any other scenario.

berkeley.edu

scholarship.law.berkeley.edu

bitlaw.com

  • Daniel A. Tysver (2008-11-23). "Why Protect Software Through Patents". Bitlaw. Retrieved 2009-06-03. In connection with the software, an issued patent may prevent others from utilizing a certain algorithm (such as the GIF image compression algorithm) without permission, or may prevent others from creating software programs that perform a function in a certain way. In connection with computer software, copyright law can be used to prevent the total duplication of a software program, as well as the copying of a portion of software code.

bloomberg.com

books.google.com

  • Saraswati Experts. "2.5.3". COMPUTER SCIENCE WITH C++. Saraswati House Pvt Ltd. p. 1.27. ISBN 978-93-5199-877-8. Retrieved 29 June 2017.
  • Brendan Scott (March 2003). "Why Free Software's Long Run TCO must be lower". AUUGN. 24 (1). AUUG, Inc. 1. Definitions. Retrieved 29 June 2017.
  • Gallant, John (1985-03-18). "IBM policy draws fire - Users say source code rules hamper change". Computerworld. Retrieved 2015-12-27. While IBM's policy of withholding source code for selected software products has already marked its second anniversary, users are only now beginning to cope with the impact of that decision. But whether or not the advent of object-code-only products has affected their day-to-day DP operations, some users remain angry about IBM's decision. Announced in February 1983, IBM's object-code-only policy has been applied to a growing list of Big Blue system software products

catb.org

  • Eric S. Raymond (2003-12-29). "Proprietary, Jargon File". Retrieved 2009-06-12. Proprietary software should be distinguished from commercial software. It is possible for the software to be commercial [...] without being proprietary. The reverse is also possible, for example in binary-only freeware.

cnet.com

computerworld.com

crn.com

debian.org

  • Havoc Pennington (2008-03-02). "Debian Tutorial". Archived from the original on 2018-01-29. Retrieved 2009-06-04. It is important to distinguish commercial software from proprietary software. Proprietary software is non-free software, while commercial software is software sold for money.

doi.org

dwheeler.com

europa.eu

ec.europa.eu

ghostarchive.org

gnu.org

gsf-soft.com

iam-magazine.com

  • Engelfriet, Arnoud (August–September 2006). "The best of both worlds". Intellectual Asset Management (IAM) (19). Gavin Stewart. Archived from the original on 2013-09-14. Retrieved 2008-05-19.

ibm.com

www-03.ibm.com

  • "Chronological History of IBM: 1960s". IBM. n.d. Archived from the original on July 3, 2016. Retrieved May 28, 2016. Rather than offer hardware, services and software exclusively in packages, marketers 'unbundled' the components and offered them for sale individually. Unbundling gave birth to the multibillion-dollar software and services industries, of which IBM is today a world leader.

ifla.org

informit.com

insidemacgames.com

  • Largent, Andy (October 8, 2003). "Homeworld Source Code Released". Inside Mac Games. Archived from the original on October 12, 2013. Retrieved November 24, 2012. With the release of Homeworld 2 for the PC, Relic Entertainment has decided to give back to their impressive fan community by releasing the source code to the original Homeworld.

internetlegal.com

johnpbell.com

  • Bell, John (October 1, 2009). "Opening the Source of Art". Technology Innovation Management Review. Archived from the original on March 30, 2014. Retrieved May 2, 2022. that no further patches to the title would be forthcoming. The community was predictably upset. Instead of giving up on the game, users decided that if Activision wasn't going to fix the bugs, they would. They wanted to save the game by getting Activision to open the source so it could be kept alive beyond the point where Activision lost interest. With some help from members of the development team that were active on fan forums, they were eventually able to convince Activision to release Call to Power II's source code in October of 2003.

jstor.org

landley.net

  • Landley, Rob (2009-05-23). "May 23, 2009". landley.net. Retrieved 2024-06-22. So if open source used to be the norm back in the 1960's and 70's, how did this _change_? Where did proprietary software come from, and when, and how? How did Richard Stallman's little utopia at the MIT AI lab crumble and force him out into the wilderness to try to rebuild it? Two things changed in the early 80's: the exponentially growing installed base of microcomputer hardware reached critical mass around 1980, and a legal decision altered copyright law to cover binaries in 1983. Increasing volume: The microprocessor creates millions of identical computers
  • "Distribution of IBM Licensed Programs and Licensed Program Materials and Modified Agreement for IBM Licensed Programs". Announcement Letters. IBM. February 8, 1983. 283-016.

leasegenie.com

  • "The History of Equipment Leasing", Lease Genie, archived from the original on April 11, 2008, retrieved November 12, 2010, In the 1960s, IBM and Xerox recognized that substantial sums could be made from the financing of their equipment. The leasing of computer and office equipment that occurred then was a significant contribution to leasings [sic] growth, since many companies were exposed to equipment leasing for the first time when they leased such equipment.

linfo.org

  • The Linux Information Project (2006-04-29). "Vendor Lock-in Definition". Retrieved 2009-06-11. Vendor lock-in, or just lock-in, is the situation in which customers are dependent on a single manufacturer or supplier for some product [...] This dependency is typically a result of standards that are controlled by the vendor [...] It can grant the vendor some extent of monopoly power [...] The best way for an organization to avoid becoming a victim of vendor lock-in is to use products that conform to free, industry-wide standards. Free standards are those that can be used by anyone and are not controlled by a single company. In the case of computers, this can usually be accomplished by using free software rather than proprietary software (i.e., commercial software).

linux.com

linuxdevcenter.com

  • Wen, Howard (June 10, 2004). "Keeping the Myths Alive". Linux Dev Center. Archived from the original on April 6, 2013. Retrieved December 22, 2012. fans of the Myth trilogy have taken this idea a step further: they have official access to the source code for the Myth games. Organized under the name MythDevelopers, this all-volunteer group of programmers, artists, and other talented people devote their time to improving and supporting further development of the Myth game series.

linuxjournal.com

  • Michael K. Johnson (1996-09-01). "Licenses and Copyright". Retrieved 2009-06-16. If you program for Linux, you do need to understand licensing, no matter if you are writing free software or commercial software.

linuxtoday.com

microsoft.com

open-bar.org

richmond.edu

jolt.richmond.edu

semanticscholar.org

api.semanticscholar.org

  • Donovan, S. (1994). "Patent, copyright and trade secret protection for software". IEEE Potentials. 13 (3): 20. doi:10.1109/45.310923. S2CID 19873766. Essentially there are only three ways to protect computer software under the law: patent it, register a copyright for it, or keep it as a trade secret.

techrepublic.com

  • Tony Patton (2008-11-21). "Protect your JavaScript with obfuscation". TechRepublic. Archived from the original on March 15, 2014. Retrieved May 2, 2022. While the Web promotes the sharing of such code, there are times when you or a client may not want to share their JavaScript code. This may be due to the sensitive nature of data within the code, proprietary calculations, or any other scenario.

techtarget.com

searchenterpriselinux.techtarget.com

theguardian.com

theinquirer.net

web.archive.org

wikimedia.org

upload.wikimedia.org

youtube.com

zdnetasia.com