On Fri, Mar 23, 2012 at 7:35 PM, nchurch <nchubr...@gmail.com> wrote: > I like BernardH's idea of doing it anonymously; if nobody from Core > minds, we could set up an anonymous survey to see how much interest > there is. > > cej38, your suggestions are very sound----personally, I would love to > see curated, distilled APIs for common things a Clojure programmer > needs to do from Java or JavaScript, not just I/O.
I'd suggest the I/O library for ClojureJVM be a moderately-thick wrapper around java.io, java.nio, and java.net, incorporating the existing clojure.java.io things and with-open of course. Then implement it on ClojureCLR and ClojureScript (and any others?) to present the same API to users, while doing whatever is necessary under the hood. This *should* work reasonably well, since java.io is already, out of necessity, a common-denominator cross-platform I/O abstraction. > In the long term, offering bounties for specific things might be a way > to spur fast progress of needed things, but I feel that should only be > tried after basic community funding works. An alternative would be to go outside clojure.core and set up a kind of "Kickstarter for programmers" where people can propose and pledge money to various software developments in general, and those who code and release (with an open license) something that fits the bill get to collect the bounty. (There'd be some interesting dynamics. For instance, someone who can code feature X for Clojure, Debian, or whatever might be tempted to code it but hold off on releasing it until the bounty accumulates more pledges, but that risks being scooped by someone else who started coding later but isn't as greedy. Also, pledges would presumably be expiring, the money returned to the donor from escrow N weeks after being pledged if the program/feature isn't released by then.) Established FOSS development teams like clojure.core could also claim the pot for something they did themselves. Of course, for the requirements for a new feature for an existing FOSS program to be met would require that its devteam accept the patch and release a new version (a public beta, at minimum) with the patch, in most cases; I suppose those who proposed the bounty can decide in advance whether to accept a fork or only a new official version in that case. They need to set criteria for what qualifies as fulfulling the bounty regardless, so that would just be one more criterion. > It seems like open source software development settles into a groove > that isn't Pareto efficient, even if it's much better than closed > source. Think about how much time we all invest in learning and > developing Clojure. The more the ecosystem expands, the more our > investments of learning and development come to be worth, and the less > likely we are to lose them to some other technology taking over down > the road. And yet the ecosystem itself only gets worked on as a > second priority to other work. That's probably as it should be. The ecosystem itself is, after all, a means to an ends (useful software tools) rather than an end in itself. Things that directly improve the ends (the tools coded in Clojure) will naturally get some priority over things that do so indirectly (ecosystem improvements). That said, one of the less efficient things about the Clojure development process is the whole CA thing. A lot of FOSS projects seem to get by fine without erecting such a barrier to participation. On top of that, I'm not sure the CA thing really protects Clojure from the boogeyman of someone later deciding to rescind their permission to use code they wrote. After 35 years, someone who signed their CA and sent it in can claim termination rights and effectively undo the CA, and if you don't think their code will still be in use in 35 years, sorry, but that isn't where a betting man should be putting his chips. The guys that wrote all those two-digit date fields in all that old COBOL code for various banking systems back in the early 60s clearly didn't expect that code to still be in use on January 1, 2000, and look what happened. :) > It's a dilemma: either you get unsharable, secret technology worked on > full-time, or you get sharable technology part-time (with maintenance > dependent on the vicissitudes of life). I'd like to think a generous > and not overly expectatious community can transcend it. Lots already have, notably the Linux community. OT side issue, added because this is the main group of outside-opinion techies I have access to: a Vista box we use for miscellaneous purposes got hit by the "System Fix" scareware recently. Diagnosis was easy and recovery was complete and only took tdsskiller, another malware scrubber, four reboots, and a couple of hours (aided by having physically shut off the power and restarted in Safe Mode as soon as it was clear that the box had somehow been hacked), but I'd very much like to know how that box got hacked in the first place. Nobody that has access to it isn't tech-savvy. IE isn't used on that machine, or Outlook, or any other notorious giant security hole masquerading as a MS network client, the OS and Firefox on it are kept patched up to date, both had just *been* updated (Firefox 11 had just been installed a day or two earlier, and the March Patch Tuesday Vista patches a few days before that), and it had antivirus with up-to-date definitions (Avast!, which updates itself on all our boxes two or three times daily to judge by the chorus of annoying "Avast virus database has been updated!" voice clips that echoes through the place every few hours.) Everyone using it knows better than to open a suspicious email attachment or similarly. Furthermore, I was sat at the keyboard myself when the attack apparently occurred, just browsing idly while waiting for something-or-other. Firefox suddenly disappeared, Avast! warned that a process with a suspiciously nonsensical filename was trying to disable the ability to use task manager, and then other things started crashing, without my having run anything from any source. Improbably, it seems that it must have been a new version of the scareware (thus invisible to Avast! until it tried to do something sufficiently naughty, instead of being identified and quarantined instantly on launch) that was deployed via a zero-day (or nearly so) exploit in Firefox 11 that isn't blocked by Vista's Data Execution Protection settings (which I just verified my currently running Firefox process is protected by) and was hosted by a seemingly reputable site (no way am I dumb/crazy enough to surf porn or warez sites from work). Just to make sure this sinks in, this was ahead of an OS's security patches from less than two weeks prior, ahead of a browser's security patches from less than one week prior, and ahead of virus definition updates from less than *eight hours* prior, AND not stopped by the DEP on the Firefox process, as well as not hit by surfing a seedy back alley of the internet but rather by surfing along cyber Wall Street and e-Broadway. Does anyone on this list have any idea how to ensure it never happens again? Nobody here has a clue. Every security precaution was taken, other than "using the machine while logged in as administrator", which is more or less necessary when doing lots of software development; nobody admits to doing anything dumb like opening a questionable email attachment, and nobody here would lie about something like that; the browser history had no sites of dubious morality/legality in it. So, this simply should not have been possible. Other than "don't use the web until Mozilla releases Firefox 12 with yet more security patches", how is a recurrence to be avoided? Even two hours of lost productivity (with zero data loss) is two hours too many, and as far as I'm concerned what happened was a violation of our property rights not much less severe than if someone broke a window and tried to abscond with the hardware in the dead of night, thwarted only by the machine being chained with one of those anti-theft doodads to the desk and the desk itself being too big to fit through the window. Short of having any way of siccing the cops on the burglar, I'd at least like a way of making that glass shatterproof and rigged to an alarm from now on, so to speak. -- You received this message because you are subscribed to the Google Groups "Clojure" group. To post to this group, send email to clojure@googlegroups.com Note that posts from new members are moderated - please be patient with your first post. To unsubscribe from this group, send email to clojure+unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/clojure?hl=en