Özel mülk yazılım (Turkish Wikipedia)

Analysis of information sources in references of the Wikipedia article "Özel mülk yazılım" in Turkish language version.

refsWebsite
Global rank Turkish rank
1st place
1st place
1,475th place
1,727th place
272nd place
461st place
153rd place
226th place
3rd place
5th place
9th place
13th place
8,472nd place
9,402nd place
12th place
44th place
6th place
6th place
low place
low place
1,131st place
1,720th place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
2nd place
4th place
99th place
191st place
1,631st place
2,104th place
low place
low place
low place
low place
14th place
20th place
4,491st place
low place
low place
low place
68th place
79th place
low place
low place
low place
low place
4,522nd place
5,559th place
low place
2,879th place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
3,857th place
6,460th place
low place
low place
8,246th place
low place
3,959th place
low place
low place
low place
low place
low place
2,435th place
3,253rd place
low place
low place
low place
low place
30th place
88th place

adobe.com

archive.org

archive.today

  • Tony Patton (21 Kasım 2008). "Protect your JavaScript with obfuscation". 15 Mart 2014 tarihinde kaynağından arşivlendi. Erişim tarihi: 12 Haziran 2009. While the Web promotes the sharing of such code, there are times when you or a client may not want to share their JavaScript code. This may be due to the sensitive nature of data within the code, proprietary calculations, or any other scenario. 

bitlaw.com

  • Daniel A. Tysver (23 Kasım 2008). "Why Protect Software Through Patents". Bitlaw.com. 17 Ağustos 2017 tarihinde kaynağından arşivlendi. Erişim tarihi: 3 Haziran 2009. In connection with software, an issued patent may prevent others from utilizing a certain algorithm (such as the GIF image compression algorithm) without permission, or may prevent others from creating software programs that perform a function in a certain way. In connection with computer software, copyright law can be used to prevent the total duplication of a software program, as well as the copying of a portion of software code. 

bloomberg.com

books.google.com

  • AUUG, Inc. (Mart 2003). "Chapter 1. Definitions". AUUGN. AUUG, Inc. s. 51. 16 Eylül 2019 tarihinde kaynağından arşivlendi. Erişim tarihi: 29 Haziran 2017. 
  • Gallant, John (18 Mart 1985). "IBM policy draws fire - Users say source code rules hamper change". Computerworld. 18 Şubat 2018 tarihinde kaynağından arşivlendi. Erişim tarihi: 27 Aralık 2015. While IBM's policy of withholding source code for selected software products has already marked its second anniversary, users are only now beginning to cope with the impact of that decision. But whether or not the advent of object-code-only products has affected their day-to-day DP operations, some users remain angry about IBM's decision. Announced in February 1983, IBM's object-code-only policy has been applied to a growing list of Big Blue system software products 

catb.org

  • Eric S. Raymond (29 Aralık 2003). "Proprietary, Jargon File". 15 Ekim 2016 tarihinde kaynağından arşivlendi. Erişim tarihi: 12 Haziran 2009. Proprietary software should be distinguished from commercial software. It is possible for software to be commercial [...] without being proprietary. The reverse is also possible, for example in binary-only freeware. 

cnet.com

news.cnet.com

reviews.cnet.com

debian.org

  • Havoc Pennington (2 Mart 2008). "Debian Tutorial". 29 Ocak 2018 tarihinde kaynağından arşivlendi. Erişim tarihi: 4 Haziran 2009. It is important to distinguish commercial software from proprietary software. Proprietary software is non-free software, while commercial software is software sold for money. 

doi.org

  • Donovan, S. (1994). "Patent, copyright and trade secret protection for software". Potentials, IEEE. 13 (3). s. 20. doi:10.1109/45.310923. Essentially there are only three ways to protect computer software under the law: patent it, register a copyright for it, or keep it as a trade secret. 

doomwiki.org

  • ZDaemon 27 Mart 2018 tarihinde Wayback Machine sitesinde arşivlendi. Starting with the 1.07 release in July 2005, the ZDaemon project does not make the source code available anymore and has remained closed source from that point forward

dwheeler.com

europa.eu

ec.europa.eu

fsf.org

gnu.org

iam-magazine.com

  • Engelfriet, Arnoud (Ağustos–Eylül 2006). "The best of both worlds". Intellectual Asset Management (IAM), 19. New Hibernia House, Winchester Walk, London Bridge, London SE1 9AG, United Kingdom: Gavin Stewart. 14 Eylül 2013 tarihinde kaynağından arşivlendi19 Mayıs 2008. 

ibm.com

www-03.ibm.com

  • IBM (n.d.). "Chronological History of IBM: 1960s". 18 Ağustos 2017 tarihinde kaynağından arşivlendi. Erişim tarihi: 28 Mayıs 2016. Rather than offer hardware, services and software exclusively in packages, marketers 'unbundled' the components and offered them for sale individually. Unbundling gave birth to the multibillion-dollar software and services industries, of which IBM is today a world leader. 

ifla.org

informationweek.com

informit.com

insidemacgames.com

  • Largent, Andy (8 Ekim 2003). "Homeworld Source Code Released". www.insidemacgames.com. 12 Ekim 2013 tarihinde kaynağından arşivlendi. Erişim tarihi: 24 Kasım 2012. With the release of Homeworld 2 for the PC, Relic Entertainment has decided to give back to their impressive fan community by releasing the source code to the original Homeworld. 

internetlegal.com

landley.net

  • Landley, Rob (23 Mayıs 2009). "23-05-2009". landley.net. 7 Ocak 2018 tarihinde kaynağından arşivlendi. Erişim tarihi: 2 Aralık 2015. So if open source used to be the norm back in the 1960's and 70's, how did this _change_? Where did proprietary software come from, and when, and how? How did Richard Stallman's little utopia at the MIT AI lab crumble and force him out into the wilderness to try to rebuild it? Two things changed in the early 80's: the exponentially growing installed base of microcomputer hardware reached critical mass around 1980, and a legal decision altered copyright law to cover binaries in 1983. Increasing volume: The microprocessor creates millions of identical computers 

leasegenie.com

  • "The History of Equipment Leasing", Lease Genie, n.d., 11 Nisan 2008 tarihinde kaynağından arşivlendi12 Kasım 2010, In the 1960s, IBM and Xerox recognized that substantial sums could be made from the financing of their equipment. The leasing of computer and office equipment that occurred then was a significant contribution to leasings [sic] growth, since many companies were exposed to equipment leasing for the first time when they leased such equipment. 

linfo.org

  • The Linux Information Project (29 Nisan 2006). "Vendor Lock-in Definition". 10 Aralık 2017 tarihinde kaynağından arşivlendi. Erişim tarihi: 11 Haziran 2009. Vendor lock-in, or just lock-in, is the situation in which customers are dependent on a single manufacturer or supplier for some product [...] This dependency is typically a result of standards that are controlled by the vendor [...] It can grant the vendor some extent of monopoly power [...] The best way for an organization to avoid becoming a victim of vendor lock-in is to use products that conform to free, industry-wide standards. Free standards are those that can be used by anyone and are not controlled by a single company. In the case of computers, this can usually be accomplished by using free software rather than proprietary software (i.e., commercial software). 

linux.com

linuxdevcenter.com

  • Wen, Howard (10 Haziran 2004). "Keeping the Myths Alive". linuxdevcenter.com. 6 Nisan 2013 tarihinde kaynağından arşivlendi. Erişim tarihi: 22 Aralık 2012. [...]fans of the Myth trilogy have taken this idea a step further: they have official access to the source code for the Myth games. Organized under the name MythDevelopers, this all-volunteer group of programmers, artists, and other talented people devote their time to improving and supporting further development of the Myth game series. 

linuxjournal.com

  • Michael K. Johnson (1 Eylül 1996). "Licenses and Copyright". 13 Aralık 2017 tarihinde kaynağından arşivlendi. Erişim tarihi: 16 Haziran 2009. If you program for Linux, you do need to understand licensing, no matter if you are writing free software or commercial software. 

linuxtoday.com

microsoft.com

open-bar.org

richmond.edu

jolt.richmond.edu

rosenlaw.com

stromian.com

techrepublic.com

blogs.techrepublic.com

  • Tony Patton (21 Kasım 2008). "Protect your JavaScript with obfuscation". 15 Mart 2014 tarihinde kaynağından arşivlendi. Erişim tarihi: 12 Haziran 2009. While the Web promotes the sharing of such code, there are times when you or a client may not want to share their JavaScript code. This may be due to the sensitive nature of data within the code, proprietary calculations, or any other scenario. 

techtarget.com

searchenterpriselinux.techtarget.com

techworld.com

features.techworld.com

telegraph.co.uk

theguardian.com

theinquirer.net

timreview.ca

  • Bell, John (1 Ekim 2009). "Opening the Source of Art". Technology Innovation Management Review. 30 Mart 2014 tarihinde kaynağından arşivlendi. Erişim tarihi: 30 Aralık 2012. [...]that no further patches to the title would be forthcoming. The community was predictably upset. Instead of giving up on the game, users decided that if Activision wasn't going to fix the bugs, they would. They wanted to save the game by getting Activision to open the source so it could be kept alive beyond the point where Activision lost interest. With some help from members of the development team that were active on fan forums, they were eventually able to convince Activision to release Call to Power II's source code in October of 2003. 

web.archive.org

wikimedia.org

upload.wikimedia.org

youtube.com

zdnetasia.com