Assignment 4 Peer Review: Difference between revisions

From Technologies of Politics and Control
Jump to navigation Jump to search
No edit summary
(Replaced content with "If you'd like to receive or give feedback from/to other students on your rough drafts, please submit them here. ----")
 
(26 intermediate revisions by 6 users not shown)
Line 2: Line 2:


----
----
Brandon A. Ceranowicz
Draft 2.2:
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc
Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0.
[[User:BrandonAndrzej|BrandonAndrzej]] 16:18, 26 April 2011 (UTC)
Brandon A. Ceranowicz
Draft 2.5:
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.5.doc
Conclusion is live! Take a look. Theoretical framework still to come.
[[User:BrandonAndrzej|BrandonAndrzej]] 23:14, 27 April 2011 (UTC)
In this paper, Brandon skillfully guides a detailed tour of open source licenses. The composition's robust structure ably contains the fine points of the subject matter. There is enough information here for several projects. One possible new work would be a more generalized overview of open source licenses for the layman. Even in the paper's current format, a summary table comparing the basic aspects of the individual licenses would be useful. --[[User:SCL|SCL]] 18:07, 1 May 2011 (UTC)
Thank you for your excellent advice! I have incorporated a visual representation of license content into the next draft.[[User:BrandonAndrzej|BrandonAndrzej]] 01:25, 2 May 2011 (UTC)
Onyema Ajuogu: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_infiltration_to_Nigeria_burden_of_cybercrime_to_ecommerce_assign-4.pdf  Internet infiltration to Nigeria:  burden of cyber-crime to e-commerce]

Latest revision as of 16:04, 24 January 2013

If you'd like to receive or give feedback from/to other students on your rough drafts, please submit them here.