On Mon, 21 Mar 2011, Francesco Poli wrote:
However, we also have to consider this: in some cases, when the
uncompressed form is hundreds of times larger than the compressed form,
the former may be really unpractical to handle. In those cases, maybe
we prefer to use some compressed form to make fu
On Mon, 21 Mar 2011 08:12:11 -0700 (PDT) Ken Arromdee wrote:
> On Fri, 18 Mar 2011, Don Armstrong wrote:
> > Yes, but this isn't something that a sane upstream is ever going to
> > do, so it's not worth discussing much. [And frankly, if it's something
> > that upstream does do, one should strongly
On Fri, 18 Mar 2011, Don Armstrong wrote:
Yes, but this isn't something that a sane upstream is ever going to
do, so it's not worth discussing much. [And frankly, if it's something
that upstream does do, one should strongly question whether Debian
should actually be distributing the work in quest
On Fri, Mar 18, 2011 at 03:47:39PM -0700, Don Armstrong wrote:
> On Fri, 18 Mar 2011, Mark Weyer wrote:
> > Just to make sure there is no misunderstanding, let me rephrase my
> > scenario: Someone modifies a GPLed work, say a program written in C.
> > Between compiling and distributing, he delibera
On Fri, 18 Mar 2011, Mark Weyer wrote:
> Just to make sure there is no misunderstanding, let me rephrase my
> scenario: Someone modifies a GPLed work, say a program written in C.
> Between compiling and distributing, he deliberately deletes the C
> files. Then he distributes the compiled binary. By
On Wed, Mar 16, 2011 at 01:25:57PM -0700, Don Armstrong wrote:
> On Wed, 16 Mar 2011, Mark Weyer wrote:
> > I always thought that such distribution would be in breach of the
> > GPL, or more generally of copyleft. After all, it is impossible to
> > distinguish, from the outside, between lost and se
On Wed, 16 Mar 2011, Mark Weyer wrote:
> I always thought that such distribution would be in breach of the
> GPL, or more generally of copyleft. After all, it is impossible to
> distinguish, from the outside, between lost and secret sources.
In such a case, where you suspected secret sources, you'
On Wed, Mar 16, 2011 at 07:39:58PM +0100, Francesco Poli wrote:
> On Wed, 16 Mar 2011 09:26:39 + (GMT) MJ Ray wrote:
> > Sure, it should be - what happens if [the source] no longer exists? That
> > seems
> > quite possible for a years-old journal paper.
>
> This seems to be a FAQ...
>
> Wel
8 matches
Mail list logo