官术网_书友最值得收藏!

Chapter 1. Cloning Internet Applications

This book is about copying. Copying has an unpleasant reputation in these copyright and intellectual property sensitive times, but it's probably unknown to many, that it has an illustrious past. When we were babies, the main way we learnt was through copying what our parents did. If you have young children you soon learn to your regret the first time you utter any insalubrious words and how quickly your child copies your exclamation and mannerisms. Our number system was copied from the Arabs (that's why they are called Arabic numerals) but it was first used by the Indians from the Indian subcontinent, and subsequently copied by the Arabs in the Middle-East. The English language regularly copies words from other languages. In fact the word 'copy' comes from the Old French word copie which comes from the Medieval Latin word copia.

That is not to say infringing copyright is the right thing to do when someone else has spent tremendous effort in coming up with the original. However, it should be recognized that not all things are copyrightable, patentable, or can be trademarked, and that is for a good reason. Ideas for example are generally not considered as intellectual property. Copyright is the protection of expressions of ideas, not the protection of the ideas themselves. Patent law is used for the protection of inventions for a limited time in return for the disclosure of the invention. Again it is not a protection of ideas; the concept of patent law is to promote the liberation of the idea in exchange for limited monopoly. Google is well known to have dominance in the search engine market but it doesn't mean it has monopoly on search engines. Anyone else is free to write his/her own search engine (though taking part of Google's search engine code to write your own search engine is copyright infringement).

This idea of copying is the basis of the book you are holding. In short, the premise of this book is to learn how each of the popular Internet applications we clone work through copying the ideas behind them.

In this chapter we will cover:

  • A brief description of the type of people who would like to read this book
  • The popular Internet applications described in this book and why we chose them
  • The various technologies used in this book, including Sinatra, DataMapper, and Haml
主站蜘蛛池模板: 古田县| 樟树市| 临海市| 大新县| 靖江市| 建水县| 隆化县| 宁国市| 兖州市| 湟中县| 翼城县| 象州县| 东源县| 洛阳市| 封丘县| 夏津县| 永嘉县| 中阳县| 常德市| 台山市| 辰溪县| 广东省| 偃师市| 石首市| 西畴县| 大冶市| 宿州市| 凤翔县| 罗山县| 泰州市| 琼中| 仲巴县| 共和县| 新邵县| 长治县| 开远市| 柘荣县| 察哈| 江永县| 上栗县| 香格里拉县|