Proprietary software (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Proprietary software" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
1,475th place
1,188th place
272nd place
225th place
6th place
6th place
2nd place
2nd place
3rd place
3rd place
153rd place
151st place
26th place
20th place
9th place
13th place
low place
low place
12th place
11th place
low place
low place
18th place
17th place
1,131st place
850th place
low place
low place
580th place
462nd place
730th place
468th place
32nd place
21st place
low place
low place
low place
low place
low place
low place
2,435th place
1,699th place
low place
low place
low place
6,986th place
low place
low place
low place
low place
11th place
8th place
99th place
77th place
1,631st place
1,239th place
low place
low place
low place
low place
low place
low place
14th place
14th place
4,491st place
2,855th place
2,429th place
1,561st place
68th place
117th place
low place
8,630th place
low place
7,194th place
8,240th place
4,998th place
low place
low place
low place
low place
low place
low place
low place
low place
3,857th place
2,958th place
low place
low place
8,246th place
5,418th place
3,959th place
3,208th place
low place
7,385th place
40th place
58th place

adobe.com (Global: 1,631st place; English: 1,239th place)

archive.org (Global: 6th place; English: 6th place)

archive.today (Global: 14th place; English: 14th place)

  • Tony Patton (2008-11-21). "Protect your JavaScript with obfuscation". TechRepublic. Archived from the original on March 15, 2014. Retrieved May 2, 2022. While the Web promotes the sharing of such code, there are times when you or a client may not want to share their JavaScript code. This may be due to the sensitive nature of data within the code, proprietary calculations, or any other scenario.

berkeley.edu (Global: 580th place; English: 462nd place)

scholarship.law.berkeley.edu

bitlaw.com (Global: low place; English: low place)

  • Daniel A. Tysver (2008-11-23). "Why Protect Software Through Patents". Bitlaw. Retrieved 2009-06-03. In connection with the software, an issued patent may prevent others from utilizing a certain algorithm (such as the GIF image compression algorithm) without permission, or may prevent others from creating software programs that perform a function in a certain way. In connection with computer software, copyright law can be used to prevent the total duplication of a software program, as well as the copying of a portion of software code.

bloomberg.com (Global: 99th place; English: 77th place)

books.google.com (Global: 3rd place; English: 3rd place)

  • Saraswati Experts. "2.5.3". COMPUTER SCIENCE WITH C++. Saraswati House Pvt Ltd. p. 1.27. ISBN 978-93-5199-877-8. Retrieved 29 June 2017.
  • Brendan Scott (March 2003). "Why Free Software's Long Run TCO must be lower". AUUGN. 24 (1). AUUG, Inc. 1. Definitions. Retrieved 29 June 2017.
  • Gallant, John (1985-03-18). "IBM policy draws fire - Users say source code rules hamper change". Computerworld. Retrieved 2015-12-27. While IBM's policy of withholding source code for selected software products has already marked its second anniversary, users are only now beginning to cope with the impact of that decision. But whether or not the advent of object-code-only products has affected their day-to-day DP operations, some users remain angry about IBM's decision. Announced in February 1983, IBM's object-code-only policy has been applied to a growing list of Big Blue system software products

britannica.com (Global: 40th place; English: 58th place)

catb.org (Global: 3,959th place; English: 3,208th place)

  • Eric S. Raymond (2003-12-29). "Proprietary, Jargon File". Retrieved 2009-06-12. Proprietary software should be distinguished from commercial software. It is possible for the software to be commercial [...] without being proprietary. The reverse is also possible, for example in binary-only freeware.

cnet.com (Global: 272nd place; English: 225th place)

computerworld.com (Global: 2,429th place; English: 1,561st place)

congress.gov (Global: 730th place; English: 468th place)

crn.com (Global: 8,240th place; English: 4,998th place)

debian.org (Global: 3,857th place; English: 2,958th place)

  • Havoc Pennington (2008-03-02). "Debian Tutorial". Archived from the original on 2018-01-29. Retrieved 2009-06-04. It is important to distinguish commercial software from proprietary software. Proprietary software is non-free software, while commercial software is software sold for money.

doi.org (Global: 2nd place; English: 2nd place)

dwheeler.com (Global: low place; English: low place)

europa.eu (Global: 68th place; English: 117th place)

ec.europa.eu

geeksforgeeks.org (Global: low place; English: low place)

ghostarchive.org (Global: 32nd place; English: 21st place)

gnu.org (Global: 1,475th place; English: 1,188th place)

gsf-soft.com (Global: low place; English: low place)

harvard.edu (Global: 18th place; English: 17th place)

ui.adsabs.harvard.edu

iam-magazine.com (Global: low place; English: low place)

  • Engelfriet, Arnoud (August–September 2006). "The best of both worlds". Intellectual Asset Management (19). Gavin Stewart. Archived from the original on 2013-09-14. Retrieved 2008-05-19.

ibm.com (Global: 1,131st place; English: 850th place)

www-03.ibm.com

  • "Chronological History of IBM: 1960s". IBM. n.d. Archived from the original on July 3, 2016. Retrieved May 28, 2016. Rather than offer hardware, services and software exclusively in packages, marketers 'unbundled' the components and offered them for sale individually. Unbundling gave birth to the multibillion-dollar software and services industries, of which IBM is today a world leader.

ifla.org (Global: low place; English: low place)

informit.com (Global: low place; English: 7,385th place)

insidemacgames.com (Global: low place; English: low place)

  • Largent, Andy (October 8, 2003). "Homeworld Source Code Released". Inside Mac Games. Archived from the original on October 12, 2013. Retrieved November 24, 2012. With the release of Homeworld 2 for the PC, Relic Entertainment has decided to give back to their impressive fan community by releasing the source code to the original Homeworld.

internetlegal.com (Global: low place; English: low place)

johnpbell.com (Global: low place; English: low place)

  • Bell, John (October 1, 2009). "Opening the Source of Art". Technology Innovation Management Review. Archived from the original on March 30, 2014. Retrieved May 2, 2022. that no further patches to the title would be forthcoming. The community was predictably upset. Instead of giving up on the game, users decided that if Activision wasn't going to fix the bugs, they would. They wanted to save the game by getting Activision to open the source so it could be kept alive beyond the point where Activision lost interest. With some help from members of the development team that were active on fan forums, they were eventually able to convince Activision to release Call to Power II's source code in October of 2003.

jstor.org (Global: 26th place; English: 20th place)

landley.net (Global: low place; English: low place)

  • Landley, Rob (2009-05-23). "May 23, 2009". landley.net. Retrieved 2024-06-22. So if open source used to be the norm back in the 1960s and 70s, how did this _change_? Where did proprietary software come from, and when, and how? How did Richard Stallman's little utopia at the MIT AI lab crumble and force him out into the wilderness to try to rebuild it? Two things changed in the early 80's: the exponentially growing installed base of microcomputer hardware reached critical mass around 1980, and a legal decision altered copyright law to cover binaries in 1983. Increasing volume: The microprocessor creates millions of identical computers
  • "Distribution of IBM Licensed Programs and Licensed Program Materials and Modified Agreement for IBM Licensed Programs". Announcement Letters. IBM. February 8, 1983. 283-016.

leasegenie.com (Global: low place; English: low place)

  • "The History of Equipment Leasing", Lease Genie, archived from the original on April 11, 2008, retrieved November 12, 2010, In the 1960s, IBM and Xerox recognized that substantial sums could be made from the financing of their equipment. The leasing of computer and office equipment that occurred then was a significant contribution to leasings [sic] growth, since many companies were exposed to equipment leasing for the first time when they leased such equipment.

linfo.org (Global: low place; English: 8,630th place)

  • The Linux Information Project (2006-04-29). "Vendor Lock-in Definition". Retrieved 2009-06-11. Vendor lock-in, or just lock-in, is the situation in which customers are dependent on a single manufacturer or supplier for some product [...] This dependency is typically a result of standards that are controlled by the vendor [...] It can grant the vendor some extent of monopoly power [...] The best way for an organization to avoid becoming a victim of vendor lock-in is to use products that conform to free, industry-wide standards. Free standards are those that can be used by anyone and are not controlled by a single company. In the case of computers, this can usually be accomplished by using free software rather than proprietary software (i.e., commercial software).

linux.com (Global: low place; English: 7,194th place)

linuxdevcenter.com (Global: low place; English: low place)

  • Wen, Howard (June 10, 2004). "Keeping the Myths Alive". Linux Dev Center. Archived from the original on April 6, 2013. Retrieved December 22, 2012. fans of the Myth trilogy have taken this idea a step further: they have official access to the source code for the Myth games. Organized under the name MythDevelopers, this all-volunteer group of programmers, artists, and other talented people devote their time to improving and supporting further development of the Myth game series.

linuxjournal.com (Global: 8,246th place; English: 5,418th place)

  • Michael K. Johnson (1996-09-01). "Licenses and Copyright". Retrieved 2009-06-16. If you program for Linux, you do need to understand licensing, no matter if you are writing free software or commercial software.

linuxtoday.com (Global: low place; English: low place)

microsoft.com (Global: 153rd place; English: 151st place)

open-bar.org (Global: low place; English: low place)

richmond.edu (Global: low place; English: 6,986th place)

jolt.richmond.edu

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

  • Donovan, S. (1994). "Patent, copyright and trade secret protection for software". IEEE Potentials. 13 (3): 20. doi:10.1109/45.310923. S2CID 19873766. Essentially there are only three ways to protect computer software under the law: patent it, register a copyright for it, or keep it as a trade secret.

techrepublic.com (Global: 4,491st place; English: 2,855th place)

  • Tony Patton (2008-11-21). "Protect your JavaScript with obfuscation". TechRepublic. Archived from the original on March 15, 2014. Retrieved May 2, 2022. While the Web promotes the sharing of such code, there are times when you or a client may not want to share their JavaScript code. This may be due to the sensitive nature of data within the code, proprietary calculations, or any other scenario.

techtarget.com (Global: 2,435th place; English: 1,699th place)

searchenterpriselinux.techtarget.com

theguardian.com (Global: 12th place; English: 11th place)

theinquirer.net (Global: low place; English: low place)

web.archive.org (Global: 1st place; English: 1st place)

wikimedia.org (Global: low place; English: low place)

upload.wikimedia.org

youtube.com (Global: 9th place; English: 13th place)

zdnetasia.com (Global: low place; English: low place)