× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



I have to agree with this point.  For some reason in programming plagiarism
is not only accepted practice but in some cases promoted.  If I wrote a book
tomorrow with 5 chapters from a previously published book I'd be sued.  If a
wrote a program with 5 functions from someone else's program I'd get a raise
for my increased productivity.
I think one should at least give credit where it's due.  I have no problem
with someone using my code as long as they give me credit.

Eric Graeb
AS/400 Administrator
King Optical Group Inc.
----- Original Message -----
From: "Mike Naughton" <mnaughton@juddwire.com>
To: <midrange-l@midrange.com>
Sent: Friday, April 26, 2002 1:41 PM
Subject: Re: Source code (was: The Wilkes-Barre fiasco...)


> Or, in fairness, because a third party could take a peek and find some
> actually pretty clever coding methods and techniques and incorporate them
> into their own code, which they would then sell for a cheaper price
> without bothering to give credit.
>
> I'm not really taking sides in this discussion (I've been on both sides)
> -- just pointing out that a world where everyone is out to cheat you is a
> world where _everyone_ is out to cheat you. IMHO, the world that each of
> us actually lives in is -- by no means completely, but to some degree -- a
> matter of personal choice. . . .
>
> James Kilgore writes:
> >Buck,
> >
> >It's widely believed to be a poor business decision because the business
> >making
> >that decision can not hold the code for ransom or charge outrageous fees
> >for
> >trivial upgrades or have a third party take a peek at what a piece of
> >cra* the
> >system might actually be.
> >
> >Buck Calabro wrote:
> >>
> >
> >> I work for a software vendor, and it's widely believed that giving the
> >> source code to the customer is a poor business decision.  Our code is
> >indeed
> >> in escrow, as is the Cool:2E (Synon) model that it was generated from.
>
>
> Mike Naughton
> Senior Programmer/Analyst
> Judd Wire, Inc.
> 124 Turnpike Road
> Turners Falls, MA  01376
> 413-863-4357 x444
> mnaughton@juddwire.com
>
> _______________________________________________
> This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list
> To post a message email: MIDRANGE-L@midrange.com
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/cgi-bin/listinfo/midrange-l
> or email: MIDRANGE-L-request@midrange.com
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/midrange-l.
>



As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.