On the open-sourcing of OpenLaszlo

My friend and colleague Sarah Allen has a nice little essay on her blog Ultrasaurus about what it was like to be part of a project that took a closed-source platform (“Laszlo Presentation Server”) and made it open (OpenLaszlo).

Like Sarah, I found that changing to the “open” way of doing software development took a little getting used to. One of the most profound, and yet most mundane differences is how you use email. Before we went open, if I had a technical question for, say, Tucker, I would send him an email; perhaps I would copy a few other interested parties.

Now, however, if I have technical question for Tucker, I send it to him and copy the OpenLaszlo Developer’s list or the OpenLaszlo User’s list. Which means that hundreds of people, at least, may be reading my messages. Similarly, all development work (including my baliwick, the documentation) is driven by tasks and bugs listed in the OpenLaszlo JIRA database. All of our code, communication, and planning, is in the open.

Sometimes this does make one feel a little awkward– like when you have to ask a question that you think you should know the answer to, and are embarrassed. But the “upside” is tremendous, as you often get helpful answers from people you’ve never heard of, in far off places, who are part of the OpenLaszlo community.

Scaling to the Enterprise (Part 1 of 4)

Croquet is built on some well-used, but not mainstream technologies. A colleague has asked “Why should we believe that Squeak scales to the enterprise?” I’d like to share my answer, to solicit comment.

It is good to ask this, and there are several aspects to the answer:
1. How reliable is the underlying software?
2. How much use can the software support?
3. How will applications be developed?
4. How reliable is the community.

Part 1 of 4.

Continue reading

components status

I had hoped to have a usable version of the components framework by now. Instead, I have a reasonably self-consistent set of scaffolding that illustrates a lot of the concepts. It isn’t at a critical mass of functionality, and it has a lot of bugs and mis-steps. I was sure that copy semantics, multiple views, and event handling were going to be hard, as would getting enough corners tacked down so that I could start to cut the cloth. But they turned out to be much harder than I imagined. Nonetheless, I’ve now got a stake in the ground as the starting point. Maybe now there’s enough ‘it’ there that I can next report, “made ‘it’ do such-and-such”, or “added X to ‘it’.”

Below the fold is a diary/log of how I got to this point. (I originally called this a “bootstrapping” architecture, because components allow people to build their Croquet models from within Croquet itself.)

Continue reading

Inventing the Future: Jasmine release

Croquet is still being designed. Personally, I’d like to see something useable this summer, but that remains to be seen.

There is a “developer’s version” available now, called Jasmine, but there’s some confusion as to what Jasmine is in relation to the real thing. I’m going to try to straighten that out here.

Continue reading

Infected major Websites spreading malware via Internet Explorer security holes

Normally, I figure that people will hear about these sorts of things on other sites, but I figured that this was important enough to post it up here. According to ZDNet, malicious hackers have compromised several “major websites.” They didn’t deface these sites with the usual “1 0wNez joo, biatch!” (forgive my poor leet speak). Rather, they installed their own software to take advantage of Internet Explorer’s unpatched security holes to install software on visitor’s PCs. The owners of the sites are apparently unaware of the fact that they are infecting their visitors, and visitors are probably complacent that they only visit “reputable” sites and have nothing to fear from spyware.

If you’re reading this using Internet Explorer (on Windows, at least), please, go download the latest version of Mozilla (or their up-and-coming new browser, Firefox). It’s free, and it’s a much more useful browser than IE, nevermind the fact that it doesn’t have the known gaping security holes that IE does. It’s also a supported application under constant development, unlike Internet Explorer.

(Updated: It appears that the problem will only affect users of Internet Explorer 6, not earlier versions. According to Microsoft, if you have installed WIndows XP service Pack 2 Beta (which 99% of you haven’t, I’d guess) then you’re safe as well.)

Continue reading