Figure 1 - uploaded by Masayuki Hatta
Content may be subject to copyright.
Dependency (Munroe, n.d.) Source: https://xkcd.com/2347/ (CC BY-NC 2.5).

Dependency (Munroe, n.d.) Source: https://xkcd.com/2347/ (CC BY-NC 2.5).

Source publication
Article
Full-text available
In the world of open source constructed on the basis of the Unix philosophy, there are cases of unsung heroic programs in obscure locations being maintained in a detailed way by a single unknown person or a small number of unknown people, mainly for personal reasons. However, if once these small programs close to the bottom rung of the ladder break...

Contexts in source publication

Context 1
... we can estimate that it was from 2020. The Munroe comic entitled "dependency" is shown in Figure 1, and the rectangular block represents the program development project for configuring the system. Upper-level blocks are placed on lower-level blocks and the programs constituting the upper level depend on the programs constituting the lower level. ...
Context 2
... vulnerability (CVE-2016-3714) nicknamed ImageTragick was discovered. 3 Figure 1 depicts the existence of open source projects that have many bugs, even though they are widely used. ...
Context 3
... the author of the xkcd cartoon in Figure 1 does not appear to give any special meaning to the length and width of the block, based on the discussion in this paper we can say that the essence of the Nebraska problem becomes clear if we consider the complexity and quantity of the code to be expressed by the height of the block, and the width to represent the amount of attention, or "number of eyeballs." In fact, even if it is high, it will be stable if it is wide, but easy to break if narrow. ...
Context 4
... we can estimate that it was from 2020. The Munroe comic entitled "dependency" is shown in Figure 1, and the rectangular block represents the program development project for configuring the system. Upper-level blocks are placed on lower-level blocks and the programs constituting the upper level depend on the programs constituting the lower level. ...
Context 5
... vulnerability (CVE-2016-3714) nicknamed ImageTragick was discovered. 3 Figure 1 depicts the existence of open source projects that have many bugs, even though they are widely used. ...
Context 6
... the author of the xkcd cartoon in Figure 1 does not appear to give any special meaning to the length and width of the block, based on the discussion in this paper we can say that the essence of the Nebraska problem becomes clear if we consider the complexity and quantity of the code to be expressed by the height of the block, and the width to represent the amount of attention, or "number of eyeballs." In fact, even if it is high, it will be stable if it is wide, but easy to break if narrow. ...

Similar publications

Article
Full-text available
The large amounts of information produced daily by organizations and enterprises have led to the development of specialized software that can process high volumes of data. Given that the technologies and methodologies used to develop software are constantly changing, offering significant market opportunities, organizations turn to patenting their i...