SlideShare a Scribd company logo
1 of 9
Download to read offline
Free/Open Source Software
                                           Angelo Corsaro
                           Strategic and Technological Planning Directorate
                                              SELEX SI
                                     angelo.corsaro@selex-si.com


Abstract.
This position paper provides an overview of the Open Source Software movement and defines how companies
can approach, exploit, and learn from it. More specifically, this position paper will first provide the needed
details on Open Source licensing models – a key element to be aware of in order to safely approach Open
Source. Then, it will provide motivating rationales for getting involved in Open Source software production. It
will define a reference innovation model which might be used as a basis for Open Source projects, along with a
few suggestions on how to protect Intellectual Properties associated to Open Source Projects.

Key Points.
After reading this document you will learn about the following key points:

       Free/Open Source (F/OSS) Software does not mean free as in “free beer” but free as in “free speech”.
        This means that F/OSS can, and it is not rare, be commercialized.
       F/OSS is a term referred to software which is licensed according to one of the licenses approved and
        maintained by the Open Source Initiative (OSI).
       GNU Public License (GPL) and Lesser/Library GPL (LGPL) are the two most common licensing
        schemes applied to F/OSS. The key concepts of these licensing model are based on the copyright law
        and are thus strongly based on derivative work.
       The GPL license is typically referred as viral, while the LGPL is typically safe w.r.t. proprietary SW.
        This document highlights under which circumstances the GPL licensed SW contaminates proprietary
        SW.
       Depending on (1) the interactions of proprietary developed software and F/OSS, and (2) on the F/OSS
        license, then, some parts of the proprietary developed software might be licensed as Open Source–
        however, this does not mean that sources have to be provided for free, i.e., a fee might be charged.
       The Open Source paradigm enables and promotes user-driven innovation and its underlying innovation
        model – the private/collective innovation model – can be used as a model for enterprise innovation.
       Open Source is not naïve as it provides some effective means for intellectual property and assets
        protections.

Executives Roadmap.
The document is organized into three different sections. Section 1 provides a historical overview of the F/OSS
movement. Section 2 explains the F/OSS licensing models, and Section 3 provides an Innovation model which
can be used in Open Source projects. Depending on your immediate needs and interest the document can be
read all at once, or at different times following the roadmap outlined below:

           Understand F/OSS Licensing – Read Section 1 and 2.
           Innovation Models for F/OSS – Read Section 3.




                                                                                                              1
Introduction
In the past several years, the Free/Open-Source Software (F/OSS) community has been enjoying a vibrant
software development activity which has made available several high quality software artefacts. Some of the
most notable examples of this productive activity are the GNU/Linux Operating System, the Apache web
server, the GNU C Compiler (GCC) family, etc. As the quality of many F/OSS is quite outstanding, and their
source code is available and can be readily adapted and extended to user needs, a growing number of corporate
have started to increasingly adopt F/OSS as a valid counterpart to commercial and proprietary software.

Due to the increasing importance of F/OSS, this position paper has the goal of clarifying what F/OSS actually
is, what are the terms associated with its use, and what other hints which can be gained from this movement.

1.1. Historical Background
The sparkle which gave birth to the whole movement was Richard Stallman, which in 1983 started the GNU
(GNU is Not Unix) Project [2] with the intent of building a free computing platform. In 1985, Stallman,
founded the Free Software Foundation (FSF) [1] to support the GNU Project for bringing freedom to software
user and developers. Stallman, along with other members of the FSF, contributed to the seminal development
and diffusion of legal mechanism that could preserve free access to the software developed under the FSF,
specifically the GNU General Public License (GPL).
As stated in the FSF manifesto, their interpretation of Free Software is as in free speech and not as in free bear.
This means that they tolerate that free software might be available at a fee, however the presence of the term
“free” has historically created confusion and has often more or less mistakenly interpreted as “for free”–
meaning at no fee. This interpretation had for sometimes limited the adoption of the ideas promoted by the FSF
within the mainstream industry. To overcome this issue, in 1998, Bruce Perens and Eric Raymond funded the
Open Source Initiative (OSI) movement. Open Source Software relies on the same licensing schemes of FSF,
and its main differences with respect to the FSF are philosophical–preferring the pragmatic benefits of the GPL
licensing schemes over the ideological and moral rightness of granting user freedom.

In the reminder of this document we will fly over these philosophical differences and will refer to Free and
Open Source Software as a single entity identified by the acronym F/OSS.


1.2. Paper Organization
The reminder of this paper is organized as follows, Section 2 will provide an overview of the issues which
should be considered when using F/OSS, and specifically it will explain to a certain details F/OSS licensing;
Section 3 will describe in which cases proactively making F/OSS can be a good strategic choice for a company,
and will describe the techniques which can be used to protect the investment as well as the underlying
innovation model which should be considered.


2. Using Free/Open-Source Software
The key distinguishing characteristics of F/OSS, with respect to traditional software, is its licensing scheme. A
software artefact can be labelled as Open Source, if and only if its licensing scheme has been accepted by
the Open Software Initiative (OSI) [5]. Currently1 are available more than fifty licenses, but the most
frequently used licenses are respectively the GPL and the Library or “Lesser” GPL (LGPL). Just for sake of
completeness, it is worth mentioning that the Free Software Foundation has a stricter perspective and allows as
the only possible licensing scheme the GPL and in some rare cases the Library or “Lesser” GPL (LGPL).
Since the difference in terms of rights and obligations depends on the kind of F/OSS license, developing an
understanding of the basic concepts is fundamental to avoid issues sometimes caused by the viral effect of
some of these licenses. In this section we will provide an overview of the major F/OSS licensing schemes, and
will dispel some misconceptions and misunderstanding about typical F/OSS licensing, as well as outline some
areas of shades. In the reminder of this Section we will provide a brief overview of the basics of Copyright law,
and then we will dwell on Open Source Licensing.


1
 At the time of writing the OSI website lists 58 Open Source licenses. (http://www.opensource.org/licenses/ accessed on
April 13th, 2006).
                                                                                                                          2
2.1. Open Source Licensing and Copyright
Open Source Licensing has the peculiarity of exploiting certain features of the Copyright law in an extremely
creative way. Thus, before proceeding with the explanation of some of the implications of the most popular
Open Source licenses, it is worth reviewing the basic principles of Copyright Law. As defined by the Berne
Convention and the World Trade Organization agreement on Intellectual Property Rights, copyright is
automatically attached to every novel expression of an idea, whether through text, sounds or drawings.
Nobody, other than the copyright holder, has under the copyright law, the rights to create derivative work, i.e.,
work that depends or extends the original copyrighted work. This characteristic of the copyright is particularly
relevant to Open Source licenses as it is used in a way that is in a way opposite to the original intention of the
copyright law.

Based on the copyright law, works created “for hire” are still subject to the copyright protection, however,
in this case the copyright belongs to the employer of the creator, or the person who commissioned the
work, not the creator. The copyright legislation also contemplates the concepts of “fair use” of copyrighted
material as non infringing, and “transformative derivative work”. “Fair Use” allows persons other than the
creator to make certain limited use of the copyrighted material for commenting or criticizing the work, for
reporting, or teaching related to the copyright protected material. “Transformative derivative work” is one
that fundamentally alters the work on which is based upon to result in a new work, as a consequence the
copyright holder of the original work has no rights on the transformative derivative work.

Finally, it is worth mentioning that the copyright protection is limited in time. Specifically, the copyright
expires either with the death of the author, or after a specific amount of time after the creation. Once the
copyright protection expires, the work goes into the “public domain”.


2.2. F/OSS Licensing
The goal of F/OSS licensing is to deny to anybody the right to exclusively exploit a work, so to allow a broader
community to exploit and further develop the original work. To do so, the F/OSS licensing exploits the
copyright law so to obtain a result which is at the odds with the usual intent of copyright. Specifically, the key
intent of F/OSS licensing is that of promoting derivative work, under certain constraint, instead of
restricting it. Depending on what is imposed on derivative work, Open Source licenses can be distinguished
between those subject to generational limitation and those that are not. The generational limitation consists on
requiring that derivative work is distributed under the same licensing scheme of the original work—this is
typically used to enforce that all derivation of a F/OSS remain open.

To the date several different licenses exist which are recognized as Open Source. These licenses are maintained
by the Open Source Initiative (OSI) web site [2], and typically range from very restrictive such as the GNU
General Public (GPL) license to quite generous such as the BSD or the MIT licenses. In the reminder of this
Section we will provide a detailed description of some of the more representative F/OSS licenses.


2.2.1. GNU General Public License (GPL)
The GNU GPL is the one of the most widely used licenses for Open Source Software, and it is the preferred
FSF license. The GPL employs copyright to suspend the usual operation of copyright within the domain of
F/OSS development. This license defines two important terms, (1) “the Program” means a work subject to the
license, and (2) a “work based on the Program” which refers to any derivative work under the copyright law:
that is to say, a work containing “the Program” or a portion of it, either verbatim or with modifications and/or
translated into another language. The main purpose of the GPL license can be reassumed into three points:

     1. Keep “the Program” free so that it can be distributed and modified without additional permissions of
        the licensor.

     2. Ensure that licensees are aware that “the Program” under license is distributed “as is” and without
        warranty.

     3. Ensure that the licensed “Program” is free of restrictive patents. Specifically, if a patent applies to the
        licensed “Program” it should be licensed in parallel with the code.

                                                                                                                      3
The Program is kept free by relying on generational limitation and requiring that derivative work of “the
Program” be GPL licensed. Failing to comply with this requirement immediately terminates the validity of the
license—this restriction is typically referred as copyleft. Because of this generational limitation, for which GPL
has gained the appellative of viral license, is extremely important to understand the scope of derivate work as
applicable, based on the GPL license ,and the copyright law.


  “the Program”              “another Program”               “the Program”                “the Program”

            extension                                                 generates                        interaction
                               “the Program”

  “the Program”                                           “another Program”             “another Program”


         (a)                         (b)                            (c)                          (d)
                                Figure 1 – Classification of GPL Derivative Work.


Figure 1 shows graphically a classification of interactions between “the Program”, here assumed as a GPL
licensed software, and “another Program”. Depending on the kind of interaction, “another Program” might be
considered as derivative work of “the Program”—in this case would have to be GPL licensed—or not.
The most straightforward case of derivate work of “the Program” is represented by any extension or
modification of “the Program” itself, as depicted Figure 1(a). Another case of derivative work is depicted in
Figure 1(b), in which “another Program” combines the “the Program” by either including its source or by
statically linking it. In both of these cases “another Program” is derived work under the copyright law, and has
to be GPL licensed. The case depicted in Figure 1(c) covers the case in which “the Program” generates code.
The generated code has to be considered as derivative work of “the Program” only if part of “the Program”
source code are copied into the generated code. Otherwise the generated code cannot be considered as derived
work and can then be used in proprietary software without any fears.
Figure 1(d) refers to the case in which “another Program” interacts at runtime with “the Program”. In this case
depending on how the interaction happens the answer differs – and for some instances of these case, there are
no clear answers, as it depends on how strictly the concept of derived work is interpreted. At the risk of getting
to technical, we provide a few examples, adapted from [4], of cases for which, depending on the kind of
interaction, “another Program” would be considered a derivative work of “the Program” or not.

Dynamically Linked Library. If “the Program” is a library and “another Program” links it dynamically than it
is considered to be derivative work, and will have to be GPL licensed.

Plug-in. If we assume that “another Program” is a plug-in for “the Program”, then it depends on how “the
Program” invokes its plug-ins. If “the Program” uses fork and exec to invoke plug-ins, then the plug-ins are
separate programs, so the license for the main program makes no requirements for them – which means that
“another Program” is not considered derivative work of “the Program”. If “the Program” dynamically links
plug-ins, and they make function calls to each other and share data structures, the FSF and OSI believe they
form a single program, which must be treated as an extension of both the main program and the plug-ins. This
means the plug-ins must be released under the GPL or a GPL-compatible free software license, and that the
terms of the GPL must be followed when those plug-ins are distributed. If “the Program” dynamically links
plug-ins, but the communication between them is limited to invoking the `main' function of the plug-in with
some options and waiting for it to return, that is a borderline case.

Aggregation and Combination. Mere aggregation of two programs means putting them side by side on the
same medium such as a CD-ROM or an hard disk. Thus the term aggregation is used when the two program
are separate, not parts of a single program. In this case, if one of the two programs is covered by the GPL, this
has no effect on the other program. Combining two modules means connecting them together so that they form
a single larger program. If either part is covered by the GPL, the whole combination must also be released
under the GPL. What constitutes combining two parts into one program is a legal question, which ultimately
judges will decide. A proper criterion depends both on the mechanism of communication (exec, pipes, rpc,
function calls within a shared address space, etc.) and the semantics of the communication (what kinds of

                                                                                                                     4
information are interchanged). If the modules are included in the same executable file, they are definitely
combined in one program. If modules are designed to run linked together in a shared address space, that almost
surely means combining them into one program. By contrast, pipes, sockets and command-line arguments are
communication mechanisms normally used between two separate programs. So when they are used for
communication, the modules normally are separate programs. But if the semantics of the communication are
intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two
parts as combined into a larger program.

Finally, it is worth pointing a few points, (1) the sources for the derived work have to be made available only if
the derived work is distributed. This means that if the derived work is used within the an enterprise, no source-
code has to be made available, (2) currently there is a theoretical, but remote, possibility that the copyright
holder of the GPL licensed program might terminate the license to switch to a proprietary one. This possibility
might be forbidden by future extensions of the GPL license, (3) a company can sell GPL licensed software to a
client for a fee, but once bought, unless other restriction are imposed, the client has all the rights granted by the
GPL license, which means he can copy, modify, distributed, etc.


2.2.2. GNU Lesser or Library General Public License (LGPL)
The GNU Lesser General Public License (LGPL) has been created by the FSF for allowing the combination of
certain class of programs, i.e., libraries, with non GPL, and proprietary, software programs. This license
specifically address the case depicted in Figure 1(d) when the interaction is due to “the Program” being linked
into “another Program”. Essentially what this license does is to reduce the scope of derivative work as intended
for regular GPL licenses, by allowing a program which interacts with a GPL program by linking it, not to be
considered as derived work.
Finally it is worth noticing that the FSF only accepts and recognizes as F/OSS licenses the GPL and LGPL,
moreover, the preferred license is GPL – the use of LGPL is discouraged as much as possible, and limited to
some special cases, for example the most common case is when a free library’s features are readily available
for proprietary software through other alternative libraries. In that case, the library cannot give free software
any particular advantage, so it is better to use the LGPL for that library.

Table 1 summarizes the relation between “the Program” licensing and “another Program” implied licensing
depending on the interaction between the two.

        Table 1—Summary of derivative work licensing implications.

                                   “the Program” License              “another Program” License
                                              GPL                                     GPL
              Extension                       LGPL                                   LGPL
                                              GPL                                     GPL
             Combination                      LGPL                                   LGPL
                                                                   GPL only if generated code contains part
                                               GPL
                                                                   of “the Program”
              Generation                                           LGPL only if generated code contains part
                                              LGPL
                                                                   of “the Program”
                                              GPL                     Depends on the details of interaction
              Interaction                     LGPL                                    Any



2.2.3. MIT License
The MIT license is perhaps one of the earliest Open Source License. This license is extremely generous and
permissive as it grants practically all the rights to the licensee. More specifically, the license only requires that
the copyright notice be included in derived work, but then does not impose any restriction on availability and
licensing of the derived code. Thus differently from what was required by the GPL license, the MIT license
does not impose any generational limitation.




                                                                                                                        5
2.2.4. BSD License
The BSD, along with the MIT license, is one of the earliest and more generous Open Source Licenses.
However, compared with the MIT license, the BSD is a little bit more restrictive as it requires that neither the
name of the organization nor the name of the authors might be used to endorse or promote products derived
from this software without any prior written permission
.
To avoid the incorrect use of the first author’s name, some old versions of this license used on distribution of
BSD Unix, included a clause, named “advertising clause” , stating; “All advertising materials mentioning
features or use of this software must display the following acknowledgement: this product includes software
developed by the University of California, Berkeley and its contributions.”

The above mentioned clause never took away the freedom nor the correspondence to F/OSS criteria, but could
create practical problems for the compatibility with the GPL; in fact the union of code parts with the two
licenses may be actually prevented owing to GPL clause that prevents from adding further conditions.
Currently, Berkeley University has removed this clause from all codes created by the University itself; the
clause was officially rescinded by the Director of the Office of Technology Licensing of the University of
California on July 22 1999. He states that clause 3 is “hereby deleted in its entirety.”

In this Section we have explained the basic principles on which Open Source licenses rely upon, and have
provided an overview of the most popular Open Source licenses. The interested reader can refer to the OSI [1]
web site for a complete list of all the recognized Open Source licenses. We believe that what explained in this
Section should provide the basic background information needed for easily understanding the difference
between different licenses.




                                  Figure 2 – Private/Collective Innovation Model

3. Making Free/Open-Source Software
For a long time F/OSS has been puzzling many researcher at top business schools around the world, such as the
Harvard Business School or the MIT Sloan School of Management, etc. What was not clear to researcher, and
still is partially understood, were the motivations and economics behind F/OSS. At first sight, in their eyes,
F/OSS was economically a hard to explain movement. Today, many of the key researcher working on
understanding the success of F/OSS, and formalizing some of its alchemy, have provided basic economical
models [6], innovation models [7], and protection models [8] for F/OSS projects. Other very inspiring and
influencing contributions, which are worth exploring from a corporate perspective, are in the area of
organizational science.

It is fair to say that the understanding of F/OSS is increasing both in the academia and in the industry. The
latter is learning how to exploit F/OSS as a non-zero-sum, or win-win, game, in which innovation and

                                                                                                                   6
competitive advantage is gained in an open and shared environment. F/OSS principles are also being exploited
for governance and innovation model within large corporate. Due to the growing importance of the basic
principles behind F/OSS, in the reminder of this Section we will provide an overview of (1) the innovation
model which can be assumed as a model organizing F/OSS projects, and (2) the techniques which can be used
to protect intellectual properties in an open and shared environment.


3.1. Private/Collective Innovation Model
The F/OSS movement has defined a novel and successful alternative to traditional innovation model. This
alternative, which is often referred as Private/Collective Innovation Model [7] is opposed to the usual Private
Innovation model which assumes that innovation is supported by private investments and private returns. In
private innovation model, to encourage private investments in innovation, the society grants to innovators some
payback in the form of intellectual property law mechanisms, such as copyrights, patents, trade secrets, etc.
These can be exploited by innovator in order to have competitive advantage and private returns from their
innovation investments.
On the other hand the Private/Collective Innovation model combines the private investment model with the
model of free revealing and sharing of innovation which is typical of collective innovation models. This is
based under the assumption that sharing innovation is not detrimental for private investment, but actually
fosters and catalyses more innovation. graphically illustrates the concepts behind the Private/Collective
Innovation Model. Here it can be seen how a smaller core, denoted by the private set, proactively contributes to
the F/OSS project by providing a combination of their time, skills, technology, funds etc., depending on
whether they are individual contributors or corporations. At the same time they get back, improved skills,
technology, reputation, career opportunity, fun, etc. What makes this scheme interesting is that even free-riders
—those that use without consciously contributing—contribute positively to this ecosystem by testing the used
technology, and building up popularity, credibility and acceptance for the technology under development.

Critical for the success of a F/OSS project is the composition of the private portion of the model. Several
studies suggest that the right ecosystem should contain other than initial investors, members of the user
community, Small Medium Enterprises which will commercialize the development of the ecosystem. It is not
rare that the parties funding the project also come from the user community, and are motivated by satisfying
some of their need which are not currently well captured by the market, or commoditizing some technology. As
a practical example of this kind of ecosystems, shows the CARDAMOM ecosystem.


CARDAMOM is a project jointly developed by SELEX Sistemi Integrati (SI) and THALES whose goal is the
creation of a standard-based middleware platform for near real-time fault-tolerant mission and safety critical
systems, such as Air Traffic Control Systems, Combat Management Systems, Airborne Systems, etc. The first
main user of the CARDAMOM technology will be the European Flight Data Processor (FDP) project which
SELEX-SI and THALES are developing for Italian (ENAV), French (STNA) and Swiss (Skyguide), national
aviation administrations.
This complex ecosystems shows that there are two parties, SELEX-SI and THALES, which through a Common
Development Organization (CDO), are committed to the development of the CARDAMOM project. Then,
within the ecosystem, there is also a PrismTech, a SME which will provide commercial support for
CARDAMOM and ObjectWeb which is an OpenSource consortium providing some help in giving
CARDAMOM visibility within the open source community.
An additional element present in , is the Object Management Group (OMG), through which the CARDAMOM
technology is standardized.




                                                                                                               7
Figure 3—The CARDAMOM Ecosystem.

3.2. Protecting Open Source
As it was described earlier in this Section the F/OSS development model can be a viewed as a way of
fostering innovation, especially in sectors which are characterized by high level of user-driven
innovation. In the reminder of this Section we will tackle the issue of protecting the investment. To this end we
will provide a list of practices which have been adopted with good success for avoiding hijacking, and
protecting the investment by many F/OSS projects, and which might be relevant for a company of the group. In
what follows we will provide a list of practices adopted by most representative F/OSS projects such as the
GNU Project, Linux. Apache. etc.
 Licensing. One practice that is followed, by all F/OSS projects is that of adopting software licensing with
    distribution terms that restrict proprietary appropriation. This is typically done by adopting GPL, LGPL, or
    another of the available Open Source licenses which impose the generational limitation. As an example, the
    CARDAMOM project is licensed as LGPL. This choice was made to avoid hijacking by other companies,
    and to make it possible that our own proprietary software build upon CARDAMOM does not need to be
    Open Source (see Section 2.2.2).
 Trademarks and Logos. The main motivation for filing a trademark is to ensure that the project is
    uniquely distinguished and to prevent others from confusing a project with other related work. Often it is
    recognized that some form of active protection of the trademark is needed in order to prevent the project
    name or symbol from misuse. As an example the name CARDAMOM™ is a shared trademark between
    SELEX-SI and THALES, its visual logo has also been registered to be the CARDAMOM text in green.
 Legal and Normative Sanctions. Compliance with licensing terms through normative and legal sanctions
    should be encouraged. For instance the Free Software Foundation (FSF) will pursue violations of GPLed
    work which they holds copyrights and offer assistance to other copyright holders as requested. It is worth
    pointing out that the FSF is quite active in pursuing violation, the last most notable case of copyright
    infringement is that of TomTom a Dutch vendor of navigation systems (see [9]).

   Other practices which are often used by F/OSS projects, and either trivially apply, or, might not directly
    applicable, to our case consist of, Incorporate to hold assets and protect individual contributors from
    liability, transfer individual property rights to corporation, and assigning trademarks to a foundation.

    If these practices are used in synergy make a F/OSS quite robust with respect to hijacking and provide a
good protection of investments and intellectual properties. To make sense of all of this require a different
perspective and a paradigm shift, but it should be recognized that there is a lot of potential for exploiting the
power of F/OSS.


                                                                                                                    8
References

[1] “Free Software Foundation”, http://www.fsf.org/

[1] “Open Source Initiative”, http://www.opensource.org/

[2] J. Feller, B. Fitzgerald S. A. Hissam, K. R. Lakhani editors, “Perspectives on Free and Open
Source Software”, The MIT Press, 2005

[3] L. Rosen, “The Unreasonable Fear of Infection”, http://www.rosenlaw.com/html/GPL. DF
                                                                                    P

[4] “Frequently Asked Questions about the GNU GPL”, http://www.gnu.org/licenses/gpl-faq.html

[5] “The GNU Project”, http://www.gnu.org

[6] J. Lerner, J. Tirole, “The Simple Economics of Open Source”, Journal of Industrial Economics, 50
(June 2002): 197-234. Also available at http://www.people.hbs.edu/jlerner/publications.html.

[7] E. von Hippel, G. von Krogh, “Open Source Software and the „Private-Collective“ Innovation
Model: Issues for Organizetion Science“, Organization Science, 14 (2), 209-223. Also available at
http://opensource.mit.edu/papers/hippelkrogh.pdf.

[8] S. O’Mahony, “Guarding the Commons: how Community Managed Software Projects Protect their
Work”, Elsevier Research Policy, 32 (7), 1179-1198, Also available at
http://www.people.hbs.edu/somahony/Research%20Policy%20article.pdf

[9] http://www.gpl-violations.org/news/20041024-linux-tomtom.html




                                                                                                    9

More Related Content

Viewers also liked

BioStrategy - Feb 09 - Role of CFO at a new venture
BioStrategy - Feb 09 - Role of CFO at a new ventureBioStrategy - Feb 09 - Role of CFO at a new venture
BioStrategy - Feb 09 - Role of CFO at a new venturethess1121
 
Joe Pollaro Obama look alike
Joe Pollaro Obama look alikeJoe Pollaro Obama look alike
Joe Pollaro Obama look alikeJoe Pollaro
 
learning: yankin' out an engine
learning: yankin' out an enginelearning: yankin' out an engine
learning: yankin' out an engineKristin Cline
 
Redshift Company Credentials
Redshift Company CredentialsRedshift Company Credentials
Redshift Company CredentialsLisa_Bella
 
my presentation
my presentationmy presentation
my presentationguestae089
 
High Performance Websites By Souders Steve
High Performance Websites By Souders SteveHigh Performance Websites By Souders Steve
High Performance Websites By Souders Stevew3guru
 
Living in a Post-Morrison World: NAPPA Working Group
Living in a Post-Morrison World: NAPPA Working GroupLiving in a Post-Morrison World: NAPPA Working Group
Living in a Post-Morrison World: NAPPA Working GroupReed Kathrein
 

Viewers also liked (20)

soal-pemrograman-b
soal-pemrograman-bsoal-pemrograman-b
soal-pemrograman-b
 
Linkedin
LinkedinLinkedin
Linkedin
 
BioStrategy - Feb 09 - Role of CFO at a new venture
BioStrategy - Feb 09 - Role of CFO at a new ventureBioStrategy - Feb 09 - Role of CFO at a new venture
BioStrategy - Feb 09 - Role of CFO at a new venture
 
Sph 106 Ch 12
Sph 106 Ch 12Sph 106 Ch 12
Sph 106 Ch 12
 
Halloween Party
Halloween PartyHalloween Party
Halloween Party
 
Al- Andalus
Al- AndalusAl- Andalus
Al- Andalus
 
Joe Pollaro Obama look alike
Joe Pollaro Obama look alikeJoe Pollaro Obama look alike
Joe Pollaro Obama look alike
 
Stem And Leaf
Stem And LeafStem And Leaf
Stem And Leaf
 
learning: yankin' out an engine
learning: yankin' out an enginelearning: yankin' out an engine
learning: yankin' out an engine
 
IKD312-01-pendahuluan
IKD312-01-pendahuluanIKD312-01-pendahuluan
IKD312-01-pendahuluan
 
Redshift Company Credentials
Redshift Company CredentialsRedshift Company Credentials
Redshift Company Credentials
 
Er Verbs
Er VerbsEr Verbs
Er Verbs
 
my presentation
my presentationmy presentation
my presentation
 
2010 Regs&Medi Links2
2010 Regs&Medi Links22010 Regs&Medi Links2
2010 Regs&Medi Links2
 
Sph 106 Ch 3
Sph 106 Ch 3Sph 106 Ch 3
Sph 106 Ch 3
 
High Performance Websites By Souders Steve
High Performance Websites By Souders SteveHigh Performance Websites By Souders Steve
High Performance Websites By Souders Steve
 
Living in a Post-Morrison World: NAPPA Working Group
Living in a Post-Morrison World: NAPPA Working GroupLiving in a Post-Morrison World: NAPPA Working Group
Living in a Post-Morrison World: NAPPA Working Group
 
Option 2 - Coast
Option 2 - CoastOption 2 - Coast
Option 2 - Coast
 
ikp213-06-template-c++
ikp213-06-template-c++ikp213-06-template-c++
ikp213-06-template-c++
 
PréSphuk
PréSphukPréSphuk
PréSphuk
 

Similar to Free/Open Source Software

Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensingRowan Wilson
 
FOSS Intro
FOSS IntroFOSS Intro
FOSS Introosswatch
 
Open Source Software_The Future Ahead
Open Source Software_The Future AheadOpen Source Software_The Future Ahead
Open Source Software_The Future AheadSanjanaa Chindalia
 
Open source software vs proprietary software
Open source software vs proprietary softwareOpen source software vs proprietary software
Open source software vs proprietary softwareLavan1997
 
Fundamentals of Free and Open Source Software
Fundamentals of Free and Open Source SoftwareFundamentals of Free and Open Source Software
Fundamentals of Free and Open Source SoftwareRoss Gardler
 
Introduction To Open Source Licensing
Introduction To Open Source LicensingIntroduction To Open Source Licensing
Introduction To Open Source LicensingMark Radcliffe
 
Intro to FOSS
Intro to FOSSIntro to FOSS
Intro to FOSSmgamal87
 
Introduction to FOSS
Introduction to FOSSIntroduction to FOSS
Introduction to FOSSmgamal87
 
A Social History of Free and Open Source Software
A Social History of Free and Open Source SoftwareA Social History of Free and Open Source Software
A Social History of Free and Open Source SoftwareLeslie Hawthorn
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresAntara Rastogi
 
Open Source Developer by Binary Semantics
Open Source Developer by Binary SemanticsOpen Source Developer by Binary Semantics
Open Source Developer by Binary SemanticsBinary Semantics
 
Open Source Your Project (With Jasig)
Open Source Your Project (With Jasig)Open Source Your Project (With Jasig)
Open Source Your Project (With Jasig)John Lewis
 
10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...Kyiv National Economic University
 

Similar to Free/Open Source Software (20)

Mis full
Mis fullMis full
Mis full
 
Copyright in Software and Open Source licensing
Copyright in Software and Open Source licensingCopyright in Software and Open Source licensing
Copyright in Software and Open Source licensing
 
FOSS Intro
FOSS IntroFOSS Intro
FOSS Intro
 
Open Source Software_The Future Ahead
Open Source Software_The Future AheadOpen Source Software_The Future Ahead
Open Source Software_The Future Ahead
 
1 Open Source Business
1 Open Source Business1 Open Source Business
1 Open Source Business
 
Open source software vs proprietary software
Open source software vs proprietary softwareOpen source software vs proprietary software
Open source software vs proprietary software
 
Fundamentals of Free and Open Source Software
Fundamentals of Free and Open Source SoftwareFundamentals of Free and Open Source Software
Fundamentals of Free and Open Source Software
 
Introduction To Open Source Licensing
Introduction To Open Source LicensingIntroduction To Open Source Licensing
Introduction To Open Source Licensing
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Open source
Open sourceOpen source
Open source
 
Intro to FOSS
Intro to FOSSIntro to FOSS
Intro to FOSS
 
Introduction to FOSS
Introduction to FOSSIntroduction to FOSS
Introduction to FOSS
 
A Social History of Free and Open Source Software
A Social History of Free and Open Source SoftwareA Social History of Free and Open Source Software
A Social History of Free and Open Source Software
 
Legitimacy of Open Source Softwares
Legitimacy of Open Source SoftwaresLegitimacy of Open Source Softwares
Legitimacy of Open Source Softwares
 
Open Source Developer by Binary Semantics
Open Source Developer by Binary SemanticsOpen Source Developer by Binary Semantics
Open Source Developer by Binary Semantics
 
Coursework
CourseworkCoursework
Coursework
 
Open Source Your Project (With Jasig)
Open Source Your Project (With Jasig)Open Source Your Project (With Jasig)
Open Source Your Project (With Jasig)
 
10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...
 
Ijcet 06 08_001
Ijcet 06 08_001Ijcet 06 08_001
Ijcet 06 08_001
 
Ijcet 06 08_001
Ijcet 06 08_001Ijcet 06 08_001
Ijcet 06 08_001
 

More from Angelo Corsaro

zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data FabricAngelo Corsaro
 
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationAngelo Corsaro
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computeAngelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingAngelo Corsaro
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing InfrastructureAngelo Corsaro
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeAngelo Corsaro
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing PlatformAngelo Corsaro
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture FourAngelo Corsaro
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture ThreeAngelo Corsaro
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture TwoAngelo Corsaro
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture OneAngelo Corsaro
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsAngelo Corsaro
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security StandardAngelo Corsaro
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution ServiceAngelo Corsaro
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsAngelo Corsaro
 

More from Angelo Corsaro (20)

Zenoh: The Genesis
Zenoh: The GenesisZenoh: The Genesis
Zenoh: The Genesis
 
zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data Fabric
 
Zenoh Tutorial
Zenoh TutorialZenoh Tutorial
Zenoh Tutorial
 
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query compute
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
 
Eastern Sicily
Eastern SicilyEastern Sicily
Eastern Sicily
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructure
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT Age
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing Platform
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture Four
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture Three
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture Two
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture One
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution Service
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming Ruminations
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Free/Open Source Software

  • 1. Free/Open Source Software Angelo Corsaro Strategic and Technological Planning Directorate SELEX SI angelo.corsaro@selex-si.com Abstract. This position paper provides an overview of the Open Source Software movement and defines how companies can approach, exploit, and learn from it. More specifically, this position paper will first provide the needed details on Open Source licensing models – a key element to be aware of in order to safely approach Open Source. Then, it will provide motivating rationales for getting involved in Open Source software production. It will define a reference innovation model which might be used as a basis for Open Source projects, along with a few suggestions on how to protect Intellectual Properties associated to Open Source Projects. Key Points. After reading this document you will learn about the following key points:  Free/Open Source (F/OSS) Software does not mean free as in “free beer” but free as in “free speech”. This means that F/OSS can, and it is not rare, be commercialized.  F/OSS is a term referred to software which is licensed according to one of the licenses approved and maintained by the Open Source Initiative (OSI).  GNU Public License (GPL) and Lesser/Library GPL (LGPL) are the two most common licensing schemes applied to F/OSS. The key concepts of these licensing model are based on the copyright law and are thus strongly based on derivative work.  The GPL license is typically referred as viral, while the LGPL is typically safe w.r.t. proprietary SW. This document highlights under which circumstances the GPL licensed SW contaminates proprietary SW.  Depending on (1) the interactions of proprietary developed software and F/OSS, and (2) on the F/OSS license, then, some parts of the proprietary developed software might be licensed as Open Source– however, this does not mean that sources have to be provided for free, i.e., a fee might be charged.  The Open Source paradigm enables and promotes user-driven innovation and its underlying innovation model – the private/collective innovation model – can be used as a model for enterprise innovation.  Open Source is not naïve as it provides some effective means for intellectual property and assets protections. Executives Roadmap. The document is organized into three different sections. Section 1 provides a historical overview of the F/OSS movement. Section 2 explains the F/OSS licensing models, and Section 3 provides an Innovation model which can be used in Open Source projects. Depending on your immediate needs and interest the document can be read all at once, or at different times following the roadmap outlined below:  Understand F/OSS Licensing – Read Section 1 and 2.  Innovation Models for F/OSS – Read Section 3. 1
  • 2. Introduction In the past several years, the Free/Open-Source Software (F/OSS) community has been enjoying a vibrant software development activity which has made available several high quality software artefacts. Some of the most notable examples of this productive activity are the GNU/Linux Operating System, the Apache web server, the GNU C Compiler (GCC) family, etc. As the quality of many F/OSS is quite outstanding, and their source code is available and can be readily adapted and extended to user needs, a growing number of corporate have started to increasingly adopt F/OSS as a valid counterpart to commercial and proprietary software. Due to the increasing importance of F/OSS, this position paper has the goal of clarifying what F/OSS actually is, what are the terms associated with its use, and what other hints which can be gained from this movement. 1.1. Historical Background The sparkle which gave birth to the whole movement was Richard Stallman, which in 1983 started the GNU (GNU is Not Unix) Project [2] with the intent of building a free computing platform. In 1985, Stallman, founded the Free Software Foundation (FSF) [1] to support the GNU Project for bringing freedom to software user and developers. Stallman, along with other members of the FSF, contributed to the seminal development and diffusion of legal mechanism that could preserve free access to the software developed under the FSF, specifically the GNU General Public License (GPL). As stated in the FSF manifesto, their interpretation of Free Software is as in free speech and not as in free bear. This means that they tolerate that free software might be available at a fee, however the presence of the term “free” has historically created confusion and has often more or less mistakenly interpreted as “for free”– meaning at no fee. This interpretation had for sometimes limited the adoption of the ideas promoted by the FSF within the mainstream industry. To overcome this issue, in 1998, Bruce Perens and Eric Raymond funded the Open Source Initiative (OSI) movement. Open Source Software relies on the same licensing schemes of FSF, and its main differences with respect to the FSF are philosophical–preferring the pragmatic benefits of the GPL licensing schemes over the ideological and moral rightness of granting user freedom. In the reminder of this document we will fly over these philosophical differences and will refer to Free and Open Source Software as a single entity identified by the acronym F/OSS. 1.2. Paper Organization The reminder of this paper is organized as follows, Section 2 will provide an overview of the issues which should be considered when using F/OSS, and specifically it will explain to a certain details F/OSS licensing; Section 3 will describe in which cases proactively making F/OSS can be a good strategic choice for a company, and will describe the techniques which can be used to protect the investment as well as the underlying innovation model which should be considered. 2. Using Free/Open-Source Software The key distinguishing characteristics of F/OSS, with respect to traditional software, is its licensing scheme. A software artefact can be labelled as Open Source, if and only if its licensing scheme has been accepted by the Open Software Initiative (OSI) [5]. Currently1 are available more than fifty licenses, but the most frequently used licenses are respectively the GPL and the Library or “Lesser” GPL (LGPL). Just for sake of completeness, it is worth mentioning that the Free Software Foundation has a stricter perspective and allows as the only possible licensing scheme the GPL and in some rare cases the Library or “Lesser” GPL (LGPL). Since the difference in terms of rights and obligations depends on the kind of F/OSS license, developing an understanding of the basic concepts is fundamental to avoid issues sometimes caused by the viral effect of some of these licenses. In this section we will provide an overview of the major F/OSS licensing schemes, and will dispel some misconceptions and misunderstanding about typical F/OSS licensing, as well as outline some areas of shades. In the reminder of this Section we will provide a brief overview of the basics of Copyright law, and then we will dwell on Open Source Licensing. 1 At the time of writing the OSI website lists 58 Open Source licenses. (http://www.opensource.org/licenses/ accessed on April 13th, 2006). 2
  • 3. 2.1. Open Source Licensing and Copyright Open Source Licensing has the peculiarity of exploiting certain features of the Copyright law in an extremely creative way. Thus, before proceeding with the explanation of some of the implications of the most popular Open Source licenses, it is worth reviewing the basic principles of Copyright Law. As defined by the Berne Convention and the World Trade Organization agreement on Intellectual Property Rights, copyright is automatically attached to every novel expression of an idea, whether through text, sounds or drawings. Nobody, other than the copyright holder, has under the copyright law, the rights to create derivative work, i.e., work that depends or extends the original copyrighted work. This characteristic of the copyright is particularly relevant to Open Source licenses as it is used in a way that is in a way opposite to the original intention of the copyright law. Based on the copyright law, works created “for hire” are still subject to the copyright protection, however, in this case the copyright belongs to the employer of the creator, or the person who commissioned the work, not the creator. The copyright legislation also contemplates the concepts of “fair use” of copyrighted material as non infringing, and “transformative derivative work”. “Fair Use” allows persons other than the creator to make certain limited use of the copyrighted material for commenting or criticizing the work, for reporting, or teaching related to the copyright protected material. “Transformative derivative work” is one that fundamentally alters the work on which is based upon to result in a new work, as a consequence the copyright holder of the original work has no rights on the transformative derivative work. Finally, it is worth mentioning that the copyright protection is limited in time. Specifically, the copyright expires either with the death of the author, or after a specific amount of time after the creation. Once the copyright protection expires, the work goes into the “public domain”. 2.2. F/OSS Licensing The goal of F/OSS licensing is to deny to anybody the right to exclusively exploit a work, so to allow a broader community to exploit and further develop the original work. To do so, the F/OSS licensing exploits the copyright law so to obtain a result which is at the odds with the usual intent of copyright. Specifically, the key intent of F/OSS licensing is that of promoting derivative work, under certain constraint, instead of restricting it. Depending on what is imposed on derivative work, Open Source licenses can be distinguished between those subject to generational limitation and those that are not. The generational limitation consists on requiring that derivative work is distributed under the same licensing scheme of the original work—this is typically used to enforce that all derivation of a F/OSS remain open. To the date several different licenses exist which are recognized as Open Source. These licenses are maintained by the Open Source Initiative (OSI) web site [2], and typically range from very restrictive such as the GNU General Public (GPL) license to quite generous such as the BSD or the MIT licenses. In the reminder of this Section we will provide a detailed description of some of the more representative F/OSS licenses. 2.2.1. GNU General Public License (GPL) The GNU GPL is the one of the most widely used licenses for Open Source Software, and it is the preferred FSF license. The GPL employs copyright to suspend the usual operation of copyright within the domain of F/OSS development. This license defines two important terms, (1) “the Program” means a work subject to the license, and (2) a “work based on the Program” which refers to any derivative work under the copyright law: that is to say, a work containing “the Program” or a portion of it, either verbatim or with modifications and/or translated into another language. The main purpose of the GPL license can be reassumed into three points: 1. Keep “the Program” free so that it can be distributed and modified without additional permissions of the licensor. 2. Ensure that licensees are aware that “the Program” under license is distributed “as is” and without warranty. 3. Ensure that the licensed “Program” is free of restrictive patents. Specifically, if a patent applies to the licensed “Program” it should be licensed in parallel with the code. 3
  • 4. The Program is kept free by relying on generational limitation and requiring that derivative work of “the Program” be GPL licensed. Failing to comply with this requirement immediately terminates the validity of the license—this restriction is typically referred as copyleft. Because of this generational limitation, for which GPL has gained the appellative of viral license, is extremely important to understand the scope of derivate work as applicable, based on the GPL license ,and the copyright law. “the Program” “another Program” “the Program” “the Program” extension generates interaction “the Program” “the Program” “another Program” “another Program” (a) (b) (c) (d) Figure 1 – Classification of GPL Derivative Work. Figure 1 shows graphically a classification of interactions between “the Program”, here assumed as a GPL licensed software, and “another Program”. Depending on the kind of interaction, “another Program” might be considered as derivative work of “the Program”—in this case would have to be GPL licensed—or not. The most straightforward case of derivate work of “the Program” is represented by any extension or modification of “the Program” itself, as depicted Figure 1(a). Another case of derivative work is depicted in Figure 1(b), in which “another Program” combines the “the Program” by either including its source or by statically linking it. In both of these cases “another Program” is derived work under the copyright law, and has to be GPL licensed. The case depicted in Figure 1(c) covers the case in which “the Program” generates code. The generated code has to be considered as derivative work of “the Program” only if part of “the Program” source code are copied into the generated code. Otherwise the generated code cannot be considered as derived work and can then be used in proprietary software without any fears. Figure 1(d) refers to the case in which “another Program” interacts at runtime with “the Program”. In this case depending on how the interaction happens the answer differs – and for some instances of these case, there are no clear answers, as it depends on how strictly the concept of derived work is interpreted. At the risk of getting to technical, we provide a few examples, adapted from [4], of cases for which, depending on the kind of interaction, “another Program” would be considered a derivative work of “the Program” or not. Dynamically Linked Library. If “the Program” is a library and “another Program” links it dynamically than it is considered to be derivative work, and will have to be GPL licensed. Plug-in. If we assume that “another Program” is a plug-in for “the Program”, then it depends on how “the Program” invokes its plug-ins. If “the Program” uses fork and exec to invoke plug-ins, then the plug-ins are separate programs, so the license for the main program makes no requirements for them – which means that “another Program” is not considered derivative work of “the Program”. If “the Program” dynamically links plug-ins, and they make function calls to each other and share data structures, the FSF and OSI believe they form a single program, which must be treated as an extension of both the main program and the plug-ins. This means the plug-ins must be released under the GPL or a GPL-compatible free software license, and that the terms of the GPL must be followed when those plug-ins are distributed. If “the Program” dynamically links plug-ins, but the communication between them is limited to invoking the `main' function of the plug-in with some options and waiting for it to return, that is a borderline case. Aggregation and Combination. Mere aggregation of two programs means putting them side by side on the same medium such as a CD-ROM or an hard disk. Thus the term aggregation is used when the two program are separate, not parts of a single program. In this case, if one of the two programs is covered by the GPL, this has no effect on the other program. Combining two modules means connecting them together so that they form a single larger program. If either part is covered by the GPL, the whole combination must also be released under the GPL. What constitutes combining two parts into one program is a legal question, which ultimately judges will decide. A proper criterion depends both on the mechanism of communication (exec, pipes, rpc, function calls within a shared address space, etc.) and the semantics of the communication (what kinds of 4
  • 5. information are interchanged). If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program. By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program. Finally, it is worth pointing a few points, (1) the sources for the derived work have to be made available only if the derived work is distributed. This means that if the derived work is used within the an enterprise, no source- code has to be made available, (2) currently there is a theoretical, but remote, possibility that the copyright holder of the GPL licensed program might terminate the license to switch to a proprietary one. This possibility might be forbidden by future extensions of the GPL license, (3) a company can sell GPL licensed software to a client for a fee, but once bought, unless other restriction are imposed, the client has all the rights granted by the GPL license, which means he can copy, modify, distributed, etc. 2.2.2. GNU Lesser or Library General Public License (LGPL) The GNU Lesser General Public License (LGPL) has been created by the FSF for allowing the combination of certain class of programs, i.e., libraries, with non GPL, and proprietary, software programs. This license specifically address the case depicted in Figure 1(d) when the interaction is due to “the Program” being linked into “another Program”. Essentially what this license does is to reduce the scope of derivative work as intended for regular GPL licenses, by allowing a program which interacts with a GPL program by linking it, not to be considered as derived work. Finally it is worth noticing that the FSF only accepts and recognizes as F/OSS licenses the GPL and LGPL, moreover, the preferred license is GPL – the use of LGPL is discouraged as much as possible, and limited to some special cases, for example the most common case is when a free library’s features are readily available for proprietary software through other alternative libraries. In that case, the library cannot give free software any particular advantage, so it is better to use the LGPL for that library. Table 1 summarizes the relation between “the Program” licensing and “another Program” implied licensing depending on the interaction between the two. Table 1—Summary of derivative work licensing implications. “the Program” License “another Program” License GPL GPL Extension LGPL LGPL GPL GPL Combination LGPL LGPL GPL only if generated code contains part GPL of “the Program” Generation LGPL only if generated code contains part LGPL of “the Program” GPL Depends on the details of interaction Interaction LGPL Any 2.2.3. MIT License The MIT license is perhaps one of the earliest Open Source License. This license is extremely generous and permissive as it grants practically all the rights to the licensee. More specifically, the license only requires that the copyright notice be included in derived work, but then does not impose any restriction on availability and licensing of the derived code. Thus differently from what was required by the GPL license, the MIT license does not impose any generational limitation. 5
  • 6. 2.2.4. BSD License The BSD, along with the MIT license, is one of the earliest and more generous Open Source Licenses. However, compared with the MIT license, the BSD is a little bit more restrictive as it requires that neither the name of the organization nor the name of the authors might be used to endorse or promote products derived from this software without any prior written permission . To avoid the incorrect use of the first author’s name, some old versions of this license used on distribution of BSD Unix, included a clause, named “advertising clause” , stating; “All advertising materials mentioning features or use of this software must display the following acknowledgement: this product includes software developed by the University of California, Berkeley and its contributions.” The above mentioned clause never took away the freedom nor the correspondence to F/OSS criteria, but could create practical problems for the compatibility with the GPL; in fact the union of code parts with the two licenses may be actually prevented owing to GPL clause that prevents from adding further conditions. Currently, Berkeley University has removed this clause from all codes created by the University itself; the clause was officially rescinded by the Director of the Office of Technology Licensing of the University of California on July 22 1999. He states that clause 3 is “hereby deleted in its entirety.” In this Section we have explained the basic principles on which Open Source licenses rely upon, and have provided an overview of the most popular Open Source licenses. The interested reader can refer to the OSI [1] web site for a complete list of all the recognized Open Source licenses. We believe that what explained in this Section should provide the basic background information needed for easily understanding the difference between different licenses. Figure 2 – Private/Collective Innovation Model 3. Making Free/Open-Source Software For a long time F/OSS has been puzzling many researcher at top business schools around the world, such as the Harvard Business School or the MIT Sloan School of Management, etc. What was not clear to researcher, and still is partially understood, were the motivations and economics behind F/OSS. At first sight, in their eyes, F/OSS was economically a hard to explain movement. Today, many of the key researcher working on understanding the success of F/OSS, and formalizing some of its alchemy, have provided basic economical models [6], innovation models [7], and protection models [8] for F/OSS projects. Other very inspiring and influencing contributions, which are worth exploring from a corporate perspective, are in the area of organizational science. It is fair to say that the understanding of F/OSS is increasing both in the academia and in the industry. The latter is learning how to exploit F/OSS as a non-zero-sum, or win-win, game, in which innovation and 6
  • 7. competitive advantage is gained in an open and shared environment. F/OSS principles are also being exploited for governance and innovation model within large corporate. Due to the growing importance of the basic principles behind F/OSS, in the reminder of this Section we will provide an overview of (1) the innovation model which can be assumed as a model organizing F/OSS projects, and (2) the techniques which can be used to protect intellectual properties in an open and shared environment. 3.1. Private/Collective Innovation Model The F/OSS movement has defined a novel and successful alternative to traditional innovation model. This alternative, which is often referred as Private/Collective Innovation Model [7] is opposed to the usual Private Innovation model which assumes that innovation is supported by private investments and private returns. In private innovation model, to encourage private investments in innovation, the society grants to innovators some payback in the form of intellectual property law mechanisms, such as copyrights, patents, trade secrets, etc. These can be exploited by innovator in order to have competitive advantage and private returns from their innovation investments. On the other hand the Private/Collective Innovation model combines the private investment model with the model of free revealing and sharing of innovation which is typical of collective innovation models. This is based under the assumption that sharing innovation is not detrimental for private investment, but actually fosters and catalyses more innovation. graphically illustrates the concepts behind the Private/Collective Innovation Model. Here it can be seen how a smaller core, denoted by the private set, proactively contributes to the F/OSS project by providing a combination of their time, skills, technology, funds etc., depending on whether they are individual contributors or corporations. At the same time they get back, improved skills, technology, reputation, career opportunity, fun, etc. What makes this scheme interesting is that even free-riders —those that use without consciously contributing—contribute positively to this ecosystem by testing the used technology, and building up popularity, credibility and acceptance for the technology under development. Critical for the success of a F/OSS project is the composition of the private portion of the model. Several studies suggest that the right ecosystem should contain other than initial investors, members of the user community, Small Medium Enterprises which will commercialize the development of the ecosystem. It is not rare that the parties funding the project also come from the user community, and are motivated by satisfying some of their need which are not currently well captured by the market, or commoditizing some technology. As a practical example of this kind of ecosystems, shows the CARDAMOM ecosystem. CARDAMOM is a project jointly developed by SELEX Sistemi Integrati (SI) and THALES whose goal is the creation of a standard-based middleware platform for near real-time fault-tolerant mission and safety critical systems, such as Air Traffic Control Systems, Combat Management Systems, Airborne Systems, etc. The first main user of the CARDAMOM technology will be the European Flight Data Processor (FDP) project which SELEX-SI and THALES are developing for Italian (ENAV), French (STNA) and Swiss (Skyguide), national aviation administrations. This complex ecosystems shows that there are two parties, SELEX-SI and THALES, which through a Common Development Organization (CDO), are committed to the development of the CARDAMOM project. Then, within the ecosystem, there is also a PrismTech, a SME which will provide commercial support for CARDAMOM and ObjectWeb which is an OpenSource consortium providing some help in giving CARDAMOM visibility within the open source community. An additional element present in , is the Object Management Group (OMG), through which the CARDAMOM technology is standardized. 7
  • 8. Figure 3—The CARDAMOM Ecosystem. 3.2. Protecting Open Source As it was described earlier in this Section the F/OSS development model can be a viewed as a way of fostering innovation, especially in sectors which are characterized by high level of user-driven innovation. In the reminder of this Section we will tackle the issue of protecting the investment. To this end we will provide a list of practices which have been adopted with good success for avoiding hijacking, and protecting the investment by many F/OSS projects, and which might be relevant for a company of the group. In what follows we will provide a list of practices adopted by most representative F/OSS projects such as the GNU Project, Linux. Apache. etc.  Licensing. One practice that is followed, by all F/OSS projects is that of adopting software licensing with distribution terms that restrict proprietary appropriation. This is typically done by adopting GPL, LGPL, or another of the available Open Source licenses which impose the generational limitation. As an example, the CARDAMOM project is licensed as LGPL. This choice was made to avoid hijacking by other companies, and to make it possible that our own proprietary software build upon CARDAMOM does not need to be Open Source (see Section 2.2.2).  Trademarks and Logos. The main motivation for filing a trademark is to ensure that the project is uniquely distinguished and to prevent others from confusing a project with other related work. Often it is recognized that some form of active protection of the trademark is needed in order to prevent the project name or symbol from misuse. As an example the name CARDAMOM™ is a shared trademark between SELEX-SI and THALES, its visual logo has also been registered to be the CARDAMOM text in green.  Legal and Normative Sanctions. Compliance with licensing terms through normative and legal sanctions should be encouraged. For instance the Free Software Foundation (FSF) will pursue violations of GPLed work which they holds copyrights and offer assistance to other copyright holders as requested. It is worth pointing out that the FSF is quite active in pursuing violation, the last most notable case of copyright infringement is that of TomTom a Dutch vendor of navigation systems (see [9]).  Other practices which are often used by F/OSS projects, and either trivially apply, or, might not directly applicable, to our case consist of, Incorporate to hold assets and protect individual contributors from liability, transfer individual property rights to corporation, and assigning trademarks to a foundation. If these practices are used in synergy make a F/OSS quite robust with respect to hijacking and provide a good protection of investments and intellectual properties. To make sense of all of this require a different perspective and a paradigm shift, but it should be recognized that there is a lot of potential for exploiting the power of F/OSS. 8
  • 9. References [1] “Free Software Foundation”, http://www.fsf.org/ [1] “Open Source Initiative”, http://www.opensource.org/ [2] J. Feller, B. Fitzgerald S. A. Hissam, K. R. Lakhani editors, “Perspectives on Free and Open Source Software”, The MIT Press, 2005 [3] L. Rosen, “The Unreasonable Fear of Infection”, http://www.rosenlaw.com/html/GPL. DF P [4] “Frequently Asked Questions about the GNU GPL”, http://www.gnu.org/licenses/gpl-faq.html [5] “The GNU Project”, http://www.gnu.org [6] J. Lerner, J. Tirole, “The Simple Economics of Open Source”, Journal of Industrial Economics, 50 (June 2002): 197-234. Also available at http://www.people.hbs.edu/jlerner/publications.html. [7] E. von Hippel, G. von Krogh, “Open Source Software and the „Private-Collective“ Innovation Model: Issues for Organizetion Science“, Organization Science, 14 (2), 209-223. Also available at http://opensource.mit.edu/papers/hippelkrogh.pdf. [8] S. O’Mahony, “Guarding the Commons: how Community Managed Software Projects Protect their Work”, Elsevier Research Policy, 32 (7), 1179-1198, Also available at http://www.people.hbs.edu/somahony/Research%20Policy%20article.pdf [9] http://www.gpl-violations.org/news/20041024-linux-tomtom.html 9