SlideShare a Scribd company logo
1 of 25
Download to read offline
STRATEGIES TO REAP THE BENEFITS OF
SOFTWARE PATENTS IN AN OPEN
SOURCE SOFTWARE ENVIRONMENT
November 8, 2017
Mary Lou Wakimura
Giovanna Fessenden
2
The opinions expressed herein are solely those of Mary Lou
Wakimura and Giovanna H. Fessenden, do not necessarily
represent those of Hamilton Brook Smith Reynolds, or any client or
organization, and are not to be considered legal advice.
STRATEGIES TO REAP THE BENEFITS OF
SOFTWARE PATENTS IN AN OPEN SOURCE
SOFTWARE ENVIRONMENT
2
Offices
Boston
Seaport Innovation District
Concord
Route 128 Technology Corridor
By the Numbers
1980
Year Founded
22
Technology Specialties
Bioinformatics
Biotechnology & Life Sciences
Biologics & Immunotherapeutics
Chemical Engineering
Pharmaceuticals
Chemistry
Material Sciences
Clean Technology
Medical Devices
Medical Imaging
Mechanical Engineering
Electrical Engineering
Semiconductors
Optics
Robotics
Mobile
Internet of Things
Network Infrastructure
Telecommunications
Computer Hardware
Computer Software
Business Methods
38
Attorneys,
Patents Agents,
Technology Specialists
20
Firm accolades since
2010, including:
3
4
Mary Lou
Wakimura
Principal
 Background in computer-
related technologies
 30 years of IP law
experience
 Technical expertise in
imaging, video
applications, medical
systems, business or
transactional methods,
bio/chemical analysis,
alternative energy, social
networks, and electro-
mechanical devices
Recent Publications and Speaking
Engagements
 "Innovating Outside the Patent: Copyrights,
Trademarks and Software" Association of University
Technology Managers’ (AUTM) Eastern Region
Meeting, Boston, MA, October 3, 2017
 “Smart Cyber Security, Patent and Trade Secret
Protection for Startups,” MIT Enterprise Forum of
Cambridge/Hamilton Brook Smith Reynolds Lecture,
Cambridge, MA, November 17, 2016
 Open Source Software Solutions (Part 3): Educating
your Employees about Open Source Software Issues,
Hamilton Brook Smith Reynolds, 2016
 Open Source Software Solutions (Part 2):
Understanding Open Source Software License Trigger
Points and Resulting Obligations, Hamilton Brook
Smith Reynolds, 2016
 Open Source Software Solutions (Part 1): Getting to
Know the Open Source Software in Your Products,
Hamilton Brook Smith Reynolds, 2016
 “Strategies for Commercial Software Developers
Using Open Source Code in Proprietary Software,”
Hamilton Brook Smith Reynolds Webcast, 2016
5
Giovanna
Fessenden
Of Counsel
Focus Areas
 block chain technology
 search engines / ad serving systems
 video compression / codecs
 trusted computing and encryption
 cryptocurrency wallet
 analytics
 video on demand (VOD) systems
 VoIP and video conferencing systems
 social media software
 database and storage systems
 recommendation systems
 integrated development
environments (IDEs), compilers and
interpreters
 iPhone™, Android™ and tablet
applications
 CT imaging technologies
 wearable computing technologies
 semi-conductor manufacturing
systems
Recent Publications and Speaking
Engagements
 “Law for ICOs and Blockchain,” Meetup at Alley,
Cambridge, October 2017
 Open Source Software Solutions (Part 3): Educating
your Employees about Open Source Software
Issues, Hamilton Brook Smith Reynolds, 2016
 Open Source Software Solutions (Part 2):
Understanding Open Source Software License
Trigger Points and Resulting Obligations, Hamilton
Brook Smith Reynolds, 2016
 Open Source Software Solutions (Part 1): Getting to
Know the Open Source Software in Your Products,
Hamilton Brook Smith Reynolds, 2016
 “Strategies for Commercial Software Developers
Using Open Source Code in Proprietary Software,”
Hamilton Brook Smith Reynolds Webcast, 2016
 “Block Chain Revolution,” TEDx Berkshires,
Stockbridge, MA, 2016
 "Block Chain Innovations are Changing the Digital
World," Hamilton Brook Smith Reynolds Webcast,
2016
 TEDx Berkshires, Stockbridge, MA, November 2015
 “Strategies for Maximizing Value of Intellectual
Property,” 1Berkshire Entrepreneurial Meetup,
Stockbridge, MA, 2015
 "Strategies for Managing Open Source Software,"
Hamilton Brook Smith Reynolds Lecture,
Cambridge, MA, 2015
Key Goals of Commercial Software
Vendors Who Use OSS
6
G
 Maintain ability to deliver
 Protect IP from devaluation
 Mitigate security vulnerabilities
 Control contributions to OSS community
 Avoid exposure to Copyright Trolls
 Use OSS to increase market share and
interoperability through dual licensing
Trends In American Innovations
Agriculture
7
Medicine
Trends In American Innovations
Transportation
8
Electronics and Communications
Patents 25%
Trademarks
25%
Trade
Secrets,
25%
Copyrights
25%
Business Models – Portfolio Trends
9
Patents
Trademarks
Trade
Secrets
Copyrights
Patents
Trademarks
Copyrights
Proprietary
Licensing
OSS
Licensing
Trade
Secrets
Traditional New
Licensing
Trends In IP Enforcement
10
1960's-1980's 1990's-2000's 2010 +
Patents
Copyrights
OSS Licensing
Example OSS Licenses
More
Restrictive
(Copyleft)
More
Permissive
(Copyright)
GNU
GPL
Mozilla Apache
MIT
variant
Copyleft Software Distributed Outside
the Company Must be Compliant
 Comply with all applicable licenses and obligations
 Provide OSS education and training
 Conduct due diligence to identify, track, and manage
Copyleft code
 Check that each seller in your supply chain ensures
compliance of its entire supply chain
 Make clearing an integral part of the software
development process
 Utilize your in-house clearing resources
 Consider scanning software code for Copyleft code
13
OSS/Proprietary Licensing
and Patent Rights
Open Source Software (OSS) License:
 Licensing mechanism in which an owner surrenders
some IP rights, e.g. right to access, use, and modify
distributed “source code” without obtaining explicit
permission from the owner.
Proprietary License:
 Retains intellectual property rights—usually copyright
of the source code, and patent rights.
Patent Rights:
 A patent gives its owner right to exclude others from
making, using, and selling the claimed invention.
OSS Dual Licensing
 Dual licensing enables distribution of software to
licensees under a proprietary model as well as an
open source model, allowing the licensor to
simultaneously leverage the advantages of both types
of licenses.
 One well known example of dual licensing is Oracle’s
MySQL database management system.
14
OSS Dual Licensing Example
15
Linux/OSS Community
End Users
OEM/Customer
Integrated
Circuit
Firmware
Software
OSS
Proprietary
Patent
Application
Proprietary/OSS Dual Licensing
Artifex v. Hancom Case Study
 Artifex is owner of “Ghostscript”, which is dual
GPLv2/Proprietary licensed
 Artifex sued Hancom alleging:
 Hancom incorporated GPLv2 version of Ghostscript into
Hancom’s commercial software, and was not GPLv2
compliant
 GPLv2 requires Hancom to distribute the source of (i)
Ghostscript and (ii) Hancom's commercial product;
 Hancom’s failure to distribute this source code breached
Hancom’s GPLv2 license, triggering a termination of the
license.
16
17
Patents and OSS
 Copyleft OSS not a bar to patent protection
 If distributed source code implements a patented
invention, then the “recipient” of distributed source
code may automatically receive a limited license to
the patented invention
 Patent conveyances via distributed OSS are severely
curtailed
Patent Rights and
Open Source Licensing
18
Patent Grants: Breadth Cont. Examples
 Broad Grant - GPLv3 requires distributors of modified
versions to grant an explicit patent license for the
whole program.
 Narrower Grant - Apache License 2.0 requires a
patent license for the changes made by a distributor.
If distributed source code implements a patented
invention, then the “recipient” of distributed source
code may automatically receive a limited license to
the patented invention.
Evaluating Patent Clauses
in OSS Licenses
19
 Apache 2.0:
“… each Contributor hereby grants to You a perpetual, worldwide, non-
exclusive, no-charge, royalty-free, irrevocable (except as stated in this
section) patent license to make, have made, use, offer to sell, sell, import,
and otherwise transfer the Work, where such license applies only to those
patent claims licensable by such Contributor that are necessarily infringed by
their Contribution(s) alone or by combination of their Contribution(s) with
the Work to which such Contribution(s) was submitted.”
 GPLv3 states:
“... When you distribute a covered work, you grant a patent license to the
recipient, and to anyone that receives any version of the work, permitting,
for any and all versions of the covered work…This patent license…covers all
patent claims you control or have the right to sublicense, at the time you
distribute the covered work or in the future, that would be infringed or
violated by the covered work or any reasonably contemplated use of the
covered work….”
Example
OSS Patent Grants
20
Retaliation clauses retract the granted rights from anyone who initiates litigation.
This allows the distributor to use their patents to defend against aggression.
 Example GPLv3 Retaliation Clause:
If You institute patent litigation against any entity (including a cross-claim or
counterclaim in a lawsuit) alleging that the Work or a Contribution
incorporated within the Work constitutes direct or contributory patent
infringement, then any patent licenses granted to You under this License for
that Work shall terminate as of the date such litigation is filed.
 Example Apache 2.0 Retaliation Clause:
…you may not impose a license fee, royalty, or other charge for exercise of
rights granted under this License, and you may not initiate litigation
(including a cross-claim or counterclaim in a lawsuit) alleging that any patent
claim is infringed by making, using, selling, offering for sale, or importing the
Program or any portion of it.
Evaluating Patent Clauses
in OSS Licenses
21
Permission to use/redistribute the software arguably
implies copyright/patent grants
 GPLv2 arguably includes a patent grant in stating
that patent rights can be necessary for
use/distribution and that distributors must pass on
permission to use/modify/redistribute, thus
forming an implicit patent grant that is quite clear
 BSD arguably contains implicit patent grant:
Redistribution and use in source and binary forms,
with or without modification, are permitted (...)
OSS Implied Patent Grants
Examples of Patenting OSS Technologies
Blockchain Patent Applications
 At least 390 applications related to
blockchain technology filed in 2017
OSS Blockchains
 Ethereum - OSS
 Hyperledger – Apache 2.0 (patent grant)
 Bitcoin – MIT/OSS
22
23
 Potential Reasons to Patent:
 Secure competitive edge
 License the patent to others to produce a revenue
stream
 Assert patent rights against redistributors who are
non-compliant with copyleft terms
 Enforce patent rights as an offensive or defensive
Dual license (proprietary and copyleft)
 Position your company for acquisition
Why Patent An Invention That Is Going
To Be Distributed Under An OSS License?
Essential Guidance for
Releasing Software
Before distributing your software product:
 Inventory your code/software in the product
for clearance purposes
 Protect IP
 Devise licensing strategy
 Modify code to conform to licensing strategy
 Contact IP counsel to assist
24
Questions
25
Mary Lou Wakimura
MaryLou.Wakimura@hbsr.com
978.341.0036 X3214
Giovanna Fessenden
Giovanna.Fessenden@hbsr.com
978.341.0036 X3466

More Related Content

What's hot

Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Black Duck by Synopsys
 
The Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementThe Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementBlack Duck by Synopsys
 
What in the World is Going on at The Linux Foundation?
What in the World is Going on at The Linux Foundation?What in the World is Going on at The Linux Foundation?
What in the World is Going on at The Linux Foundation?Black Duck by Synopsys
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Black Duck by Synopsys
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Synopsys Software Integrity Group
 
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudShift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudBlack Duck by Synopsys
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Black Duck by Synopsys
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOpsBlack Duck by Synopsys
 
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...Black Duck by Synopsys
 
Making the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationMaking the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationBlack Duck by Synopsys
 
Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Synopsys Software Integrity Group
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...Black Duck by Synopsys
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksSynopsys Software Integrity Group
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsSynopsys Software Integrity Group
 
The Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and CybersecurityThe Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and CybersecurityBlack Duck by Synopsys
 

What's hot (20)

Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
The Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementThe Case for Continuous Open Source Management
The Case for Continuous Open Source Management
 
What in the World is Going on at The Linux Foundation?
What in the World is Going on at The Linux Foundation?What in the World is Going on at The Linux Foundation?
What in the World is Going on at The Linux Foundation?
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
 
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudShift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
 
DevSecOps: The Open Source Way
DevSecOps: The Open Source WayDevSecOps: The Open Source Way
DevSecOps: The Open Source Way
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 
Making the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationMaking the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network Communication
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
 
Webinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilitiesWebinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilities
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
 
The Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and CybersecurityThe Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and Cybersecurity
 

Similar to Strategies to Reap the Benefits of Software Patents in an Open Source Software Environment

Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementSebastiano Cobianco
 
Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensingRowan Wilson
 
Exploring Open Source Licensing
Exploring Open Source LicensingExploring Open Source Licensing
Exploring Open Source LicensingStefano Fago
 
Introduction To Open Source Licensing
Introduction To Open Source LicensingIntroduction To Open Source Licensing
Introduction To Open Source LicensingMark Radcliffe
 
Legal and Practical Concerns with Software Development
Legal and Practical Concerns with Software DevelopmentLegal and Practical Concerns with Software Development
Legal and Practical Concerns with Software DevelopmentRogue Wave Software
 
Copyright or Copy left by manoranjan, glc, tvpm
Copyright or Copy left by manoranjan, glc, tvpmCopyright or Copy left by manoranjan, glc, tvpm
Copyright or Copy left by manoranjan, glc, tvpmAdvocate
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresAntara Rastogi
 
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?Jennifer O'Neill
 
Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...Mary Lou Wakimura
 
10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...Kyiv National Economic University
 
Open source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsOpen source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsRogue Wave Software
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...Black Duck by Synopsys
 
Understanding Open Source
Understanding Open SourceUnderstanding Open Source
Understanding Open SourceJody Garnett
 
Implementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash CourseImplementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash CourseFINOS
 
Implementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash CourseImplementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash CourseOpen Source Strategy Forum
 
Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?
Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?
Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?Jennifer O'Neill
 
Osborne Clarke - OpenChain - FOSSmatrix
Osborne Clarke - OpenChain - FOSSmatrixOsborne Clarke - OpenChain - FOSSmatrix
Osborne Clarke - OpenChain - FOSSmatrixShane Coughlan
 
Open Source And the Internet Of Things
Open Source And the Internet Of ThingsOpen Source And the Internet Of Things
Open Source And the Internet Of ThingsProgrammableWeb
 
Open source initiative osi mozilla public license
Open source initiative osi   mozilla public licenseOpen source initiative osi   mozilla public license
Open source initiative osi mozilla public licensecbartowski
 
Business models of open hardware
Business models of open hardwareBusiness models of open hardware
Business models of open hardwareRobert Viseur
 

Similar to Strategies to Reap the Benefits of Software Patents in an Open Source Software Environment (20)

Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk Management
 
Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensing
 
Exploring Open Source Licensing
Exploring Open Source LicensingExploring Open Source Licensing
Exploring Open Source Licensing
 
Introduction To Open Source Licensing
Introduction To Open Source LicensingIntroduction To Open Source Licensing
Introduction To Open Source Licensing
 
Legal and Practical Concerns with Software Development
Legal and Practical Concerns with Software DevelopmentLegal and Practical Concerns with Software Development
Legal and Practical Concerns with Software Development
 
Copyright or Copy left by manoranjan, glc, tvpm
Copyright or Copy left by manoranjan, glc, tvpmCopyright or Copy left by manoranjan, glc, tvpm
Copyright or Copy left by manoranjan, glc, tvpm
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source Softwares
 
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
 
Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...
 
10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...
 
Open source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the detailsOpen source software for IoT – The devil’s in the details
Open source software for IoT – The devil’s in the details
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
Understanding Open Source
Understanding Open SourceUnderstanding Open Source
Understanding Open Source
 
Implementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash CourseImplementing and Managing an Open Source Compliance Program: A Crash Course
Implementing and Managing an Open Source Compliance Program: A Crash Course
 
Implementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash CourseImplementing and Managing Open Source Compliance Programs - A Crash Course
Implementing and Managing Open Source Compliance Programs - A Crash Course
 
Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?
Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?
Outbound Licensing Strategies: Is Open Source the Right Model for Your Company?
 
Osborne Clarke - OpenChain - FOSSmatrix
Osborne Clarke - OpenChain - FOSSmatrixOsborne Clarke - OpenChain - FOSSmatrix
Osborne Clarke - OpenChain - FOSSmatrix
 
Open Source And the Internet Of Things
Open Source And the Internet Of ThingsOpen Source And the Internet Of Things
Open Source And the Internet Of Things
 
Open source initiative osi mozilla public license
Open source initiative osi   mozilla public licenseOpen source initiative osi   mozilla public license
Open source initiative osi mozilla public license
 
Business models of open hardware
Business models of open hardwareBusiness models of open hardware
Business models of open hardware
 

More from Black Duck by Synopsys

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubBlack Duck by Synopsys
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...Black Duck by Synopsys
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub Black Duck by Synopsys
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Black Duck by Synopsys
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Black Duck by Synopsys
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Black Duck by Synopsys
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Black Duck by Synopsys
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsBlack Duck by Synopsys
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...Black Duck by Synopsys
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming Black Duck by Synopsys
 
Open Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOpsOpen Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOpsBlack Duck by Synopsys
 

More from Black Duck by Synopsys (20)

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
 
Open Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOpsOpen Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOps
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Strategies to Reap the Benefits of Software Patents in an Open Source Software Environment

  • 1. STRATEGIES TO REAP THE BENEFITS OF SOFTWARE PATENTS IN AN OPEN SOURCE SOFTWARE ENVIRONMENT November 8, 2017 Mary Lou Wakimura Giovanna Fessenden
  • 2. 2 The opinions expressed herein are solely those of Mary Lou Wakimura and Giovanna H. Fessenden, do not necessarily represent those of Hamilton Brook Smith Reynolds, or any client or organization, and are not to be considered legal advice. STRATEGIES TO REAP THE BENEFITS OF SOFTWARE PATENTS IN AN OPEN SOURCE SOFTWARE ENVIRONMENT
  • 3. 2 Offices Boston Seaport Innovation District Concord Route 128 Technology Corridor By the Numbers 1980 Year Founded 22 Technology Specialties Bioinformatics Biotechnology & Life Sciences Biologics & Immunotherapeutics Chemical Engineering Pharmaceuticals Chemistry Material Sciences Clean Technology Medical Devices Medical Imaging Mechanical Engineering Electrical Engineering Semiconductors Optics Robotics Mobile Internet of Things Network Infrastructure Telecommunications Computer Hardware Computer Software Business Methods 38 Attorneys, Patents Agents, Technology Specialists 20 Firm accolades since 2010, including: 3
  • 4. 4 Mary Lou Wakimura Principal  Background in computer- related technologies  30 years of IP law experience  Technical expertise in imaging, video applications, medical systems, business or transactional methods, bio/chemical analysis, alternative energy, social networks, and electro- mechanical devices Recent Publications and Speaking Engagements  "Innovating Outside the Patent: Copyrights, Trademarks and Software" Association of University Technology Managers’ (AUTM) Eastern Region Meeting, Boston, MA, October 3, 2017  “Smart Cyber Security, Patent and Trade Secret Protection for Startups,” MIT Enterprise Forum of Cambridge/Hamilton Brook Smith Reynolds Lecture, Cambridge, MA, November 17, 2016  Open Source Software Solutions (Part 3): Educating your Employees about Open Source Software Issues, Hamilton Brook Smith Reynolds, 2016  Open Source Software Solutions (Part 2): Understanding Open Source Software License Trigger Points and Resulting Obligations, Hamilton Brook Smith Reynolds, 2016  Open Source Software Solutions (Part 1): Getting to Know the Open Source Software in Your Products, Hamilton Brook Smith Reynolds, 2016  “Strategies for Commercial Software Developers Using Open Source Code in Proprietary Software,” Hamilton Brook Smith Reynolds Webcast, 2016
  • 5. 5 Giovanna Fessenden Of Counsel Focus Areas  block chain technology  search engines / ad serving systems  video compression / codecs  trusted computing and encryption  cryptocurrency wallet  analytics  video on demand (VOD) systems  VoIP and video conferencing systems  social media software  database and storage systems  recommendation systems  integrated development environments (IDEs), compilers and interpreters  iPhone™, Android™ and tablet applications  CT imaging technologies  wearable computing technologies  semi-conductor manufacturing systems Recent Publications and Speaking Engagements  “Law for ICOs and Blockchain,” Meetup at Alley, Cambridge, October 2017  Open Source Software Solutions (Part 3): Educating your Employees about Open Source Software Issues, Hamilton Brook Smith Reynolds, 2016  Open Source Software Solutions (Part 2): Understanding Open Source Software License Trigger Points and Resulting Obligations, Hamilton Brook Smith Reynolds, 2016  Open Source Software Solutions (Part 1): Getting to Know the Open Source Software in Your Products, Hamilton Brook Smith Reynolds, 2016  “Strategies for Commercial Software Developers Using Open Source Code in Proprietary Software,” Hamilton Brook Smith Reynolds Webcast, 2016  “Block Chain Revolution,” TEDx Berkshires, Stockbridge, MA, 2016  "Block Chain Innovations are Changing the Digital World," Hamilton Brook Smith Reynolds Webcast, 2016  TEDx Berkshires, Stockbridge, MA, November 2015  “Strategies for Maximizing Value of Intellectual Property,” 1Berkshire Entrepreneurial Meetup, Stockbridge, MA, 2015  "Strategies for Managing Open Source Software," Hamilton Brook Smith Reynolds Lecture, Cambridge, MA, 2015
  • 6. Key Goals of Commercial Software Vendors Who Use OSS 6 G  Maintain ability to deliver  Protect IP from devaluation  Mitigate security vulnerabilities  Control contributions to OSS community  Avoid exposure to Copyright Trolls  Use OSS to increase market share and interoperability through dual licensing
  • 7. Trends In American Innovations Agriculture 7 Medicine
  • 8. Trends In American Innovations Transportation 8 Electronics and Communications
  • 9. Patents 25% Trademarks 25% Trade Secrets, 25% Copyrights 25% Business Models – Portfolio Trends 9 Patents Trademarks Trade Secrets Copyrights Patents Trademarks Copyrights Proprietary Licensing OSS Licensing Trade Secrets Traditional New Licensing
  • 10. Trends In IP Enforcement 10 1960's-1980's 1990's-2000's 2010 + Patents Copyrights OSS Licensing
  • 12. Copyleft Software Distributed Outside the Company Must be Compliant  Comply with all applicable licenses and obligations  Provide OSS education and training  Conduct due diligence to identify, track, and manage Copyleft code  Check that each seller in your supply chain ensures compliance of its entire supply chain  Make clearing an integral part of the software development process  Utilize your in-house clearing resources  Consider scanning software code for Copyleft code
  • 13. 13 OSS/Proprietary Licensing and Patent Rights Open Source Software (OSS) License:  Licensing mechanism in which an owner surrenders some IP rights, e.g. right to access, use, and modify distributed “source code” without obtaining explicit permission from the owner. Proprietary License:  Retains intellectual property rights—usually copyright of the source code, and patent rights. Patent Rights:  A patent gives its owner right to exclude others from making, using, and selling the claimed invention.
  • 14. OSS Dual Licensing  Dual licensing enables distribution of software to licensees under a proprietary model as well as an open source model, allowing the licensor to simultaneously leverage the advantages of both types of licenses.  One well known example of dual licensing is Oracle’s MySQL database management system. 14
  • 15. OSS Dual Licensing Example 15 Linux/OSS Community End Users OEM/Customer Integrated Circuit Firmware Software OSS Proprietary Patent Application
  • 16. Proprietary/OSS Dual Licensing Artifex v. Hancom Case Study  Artifex is owner of “Ghostscript”, which is dual GPLv2/Proprietary licensed  Artifex sued Hancom alleging:  Hancom incorporated GPLv2 version of Ghostscript into Hancom’s commercial software, and was not GPLv2 compliant  GPLv2 requires Hancom to distribute the source of (i) Ghostscript and (ii) Hancom's commercial product;  Hancom’s failure to distribute this source code breached Hancom’s GPLv2 license, triggering a termination of the license. 16
  • 17. 17 Patents and OSS  Copyleft OSS not a bar to patent protection  If distributed source code implements a patented invention, then the “recipient” of distributed source code may automatically receive a limited license to the patented invention  Patent conveyances via distributed OSS are severely curtailed Patent Rights and Open Source Licensing
  • 18. 18 Patent Grants: Breadth Cont. Examples  Broad Grant - GPLv3 requires distributors of modified versions to grant an explicit patent license for the whole program.  Narrower Grant - Apache License 2.0 requires a patent license for the changes made by a distributor. If distributed source code implements a patented invention, then the “recipient” of distributed source code may automatically receive a limited license to the patented invention. Evaluating Patent Clauses in OSS Licenses
  • 19. 19  Apache 2.0: “… each Contributor hereby grants to You a perpetual, worldwide, non- exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted.”  GPLv3 states: “... When you distribute a covered work, you grant a patent license to the recipient, and to anyone that receives any version of the work, permitting, for any and all versions of the covered work…This patent license…covers all patent claims you control or have the right to sublicense, at the time you distribute the covered work or in the future, that would be infringed or violated by the covered work or any reasonably contemplated use of the covered work….” Example OSS Patent Grants
  • 20. 20 Retaliation clauses retract the granted rights from anyone who initiates litigation. This allows the distributor to use their patents to defend against aggression.  Example GPLv3 Retaliation Clause: If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.  Example Apache 2.0 Retaliation Clause: …you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it. Evaluating Patent Clauses in OSS Licenses
  • 21. 21 Permission to use/redistribute the software arguably implies copyright/patent grants  GPLv2 arguably includes a patent grant in stating that patent rights can be necessary for use/distribution and that distributors must pass on permission to use/modify/redistribute, thus forming an implicit patent grant that is quite clear  BSD arguably contains implicit patent grant: Redistribution and use in source and binary forms, with or without modification, are permitted (...) OSS Implied Patent Grants
  • 22. Examples of Patenting OSS Technologies Blockchain Patent Applications  At least 390 applications related to blockchain technology filed in 2017 OSS Blockchains  Ethereum - OSS  Hyperledger – Apache 2.0 (patent grant)  Bitcoin – MIT/OSS 22
  • 23. 23  Potential Reasons to Patent:  Secure competitive edge  License the patent to others to produce a revenue stream  Assert patent rights against redistributors who are non-compliant with copyleft terms  Enforce patent rights as an offensive or defensive Dual license (proprietary and copyleft)  Position your company for acquisition Why Patent An Invention That Is Going To Be Distributed Under An OSS License?
  • 24. Essential Guidance for Releasing Software Before distributing your software product:  Inventory your code/software in the product for clearance purposes  Protect IP  Devise licensing strategy  Modify code to conform to licensing strategy  Contact IP counsel to assist 24
  • 25. Questions 25 Mary Lou Wakimura MaryLou.Wakimura@hbsr.com 978.341.0036 X3214 Giovanna Fessenden Giovanna.Fessenden@hbsr.com 978.341.0036 X3466