The document discusses the background and agenda of an expert on open source history and licenses. The agenda includes topics on the history of free and open source software, copyright and patents regarding open source, open source licenses, and open source business models. The expert's background includes being an attorney and co-founding several open source organizations.
The article discusses the availability of information about Open Source Software for LMS and digitization. The term open source describes practices in production and development that promote access to the end product's source materials which is freely available throughout the web.
Open Source Pharma: OSDD: An innovative model for distributed co-creationOpen Source Pharma
Presentation given by Samir Brahmachari about the open research model used by Open Source Drug Discovery. The talk was given at the Open Source Pharma Conference at Rockefeller Foundation Bellagio Center in July 2014.
Samir Brahmachari Bio:
http://www.opensourcepharma.net/participants/samir-brahmachari
Conference Agenda (see Day 1, Session 4):
http://www.opensourcepharma.net/agenda.html
Open Source is one of the core tenets of the PHP language and the community. PHP would not be here if it was not for some of the ideals around software development that occurred in the 50's, 60's, and 70's. How did the open source movement start, and why is PHP one of the few languages that still hold true to those early days of programming? Let's talk about where open source started, and find out how we got here.
With a record-breaking 1,300 respondents, the 2015 Future of Open Source Survey results highlight record levels of corporate participation in open source, as well as the greater impact OSS is having on technology and security. Yet, this year's results also reveal a reported lack of formal company policies and processes for consuming and managing open source and its associated legal, operational, and security risks.
Learn more at www.blackducksoftware.com/future-of-open-source
The article discusses the availability of information about Open Source Software for LMS and digitization. The term open source describes practices in production and development that promote access to the end product's source materials which is freely available throughout the web.
Open Source Pharma: OSDD: An innovative model for distributed co-creationOpen Source Pharma
Presentation given by Samir Brahmachari about the open research model used by Open Source Drug Discovery. The talk was given at the Open Source Pharma Conference at Rockefeller Foundation Bellagio Center in July 2014.
Samir Brahmachari Bio:
http://www.opensourcepharma.net/participants/samir-brahmachari
Conference Agenda (see Day 1, Session 4):
http://www.opensourcepharma.net/agenda.html
Open Source is one of the core tenets of the PHP language and the community. PHP would not be here if it was not for some of the ideals around software development that occurred in the 50's, 60's, and 70's. How did the open source movement start, and why is PHP one of the few languages that still hold true to those early days of programming? Let's talk about where open source started, and find out how we got here.
With a record-breaking 1,300 respondents, the 2015 Future of Open Source Survey results highlight record levels of corporate participation in open source, as well as the greater impact OSS is having on technology and security. Yet, this year's results also reveal a reported lack of formal company policies and processes for consuming and managing open source and its associated legal, operational, and security risks.
Learn more at www.blackducksoftware.com/future-of-open-source
Full Stack Squared 2022 - Power of Open SourceChris Swan
An examination of open source freedoms (free like beer
free like speech, and free like puppy), the people behind open source and how anybody can get involved.
Frontera распределенный робот для обхода веба в больших объемах / Александр С...Ontico
В этом докладе я собираюсь поделиться нашим опытом обхода испанского интернета. Мы поставили перед собой задачу обойти около 600 тысяч веб-сайтов в зоне .es с целью сбора статистики об узлах и их размерах. Я расскажу об архитектуре робота, хранилища, проблемах, с которыми мы столкнулись при обходе, и их решении.
Наше решение доступно в форме open source фреймворка Frontera. Фреймворк позволяет построить распределенного робота для скачивания страниц из Интернета в больших объемах в реальном времени. Также он может быть использован для построения сфокусированных роботов для выкачивания подмножества заранее известных веб-сайтов.
Фреймворк предлагает: настраиваемое хранилище URL документов (RDBMS или Key Value), управление стратегиями обхода, абстракцию транспортного уровня, абстракцию модуля загрузки.
Доклад построен в увлекательной форме: описание проблемы, решение и проблемы, которые возникли в ходе разработки решения.
Open Sourcing The Analyst Business Apachecon 2009James Governor
Keynote for ApacheCon Europe 2009 in Amsterdam. A humourous look at how the industry analyst business is subject to some of the same pressures as proprietary software. Examining the impact of open source, web collaboration, coordination and peer production mechanisms on the sector, and how RedMonk has tried to ride this wave.
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017ProQuest
Library information security and privacy are both fundamental and challenging. Help is coming as Internet leaders push heavier use of encryption, a move that highlights the differences between secure and non-secure online use. How can libraries help prepare and educate users to work within a more difficult Internet environment? How can they inspire more private online behavior in the year ahead? Join the leader of ProQuest’s Information Security Office to discuss emerging issues in cybersecurity and privacy for libraries and information providers. Attendees will get tips for protecting the privacy of your patrons and for educating them on how to use information services securely. This session will also cover the differences between the privacy of consumer services and professional Information services, and best practices for patrons to protect their own personal information as they access public and library resources both in the library and remotely as the footprint of the library expands along with mobile device adoption.
Targeted trojan attacks first attracted attention in early 2005, when the UK NISCC warned of their wide spread use in attacks on UK national infrastructure. Incidents such as "Titan Rain" and the compromise of US Department of State computer systems have increased their profile in the last two years. This presentation will consist of hard, technical information on attacks in the form of a case study of an actual attack ongoing since 2005. It covers exploitation techniques, draws general conclusions on attack methodologies and focuses on how to defend against the dark arts.
Competitive Intelligence - Fast, Cheap & Ethical By Rob Duncan March 5, 2009Dr. Rob Duncan
Join professional speaker and critically acclaimed author Rob Duncan for this valuable presentation on how you can gather top quality competitive intelligence without breaking the bank!
WSO2Con EU 2015: Open Source Journey at Ordnance SurveyWSO2
WSO2Con EU 2015: Open Source Journey at Ordnance Survey
When five years ago the outgoing Minister of Finance Liam Burne left a note at the treasury that said “there’s no cash left” it concentrated minds in the Civil Service and an ‘Open Source First’ policy was born. This led to a successful WSO2 engagement, the proliferation of open source solutions at OS, and ultimately a significant saving in software costs. This session will discusses the highlights and pitfalls along the way.
Presenter:
Hillary Corney
Principle Architect,
Ordnance Survey
Turning search upside down with powerful open source search softwareCharlie Hull
Turning Search Upside Down - how Flax works with media monitoring companies to build powerful and scalable 'inverted search' systems, applying hundreds of thousands of stored queries to millions of documents in real time. Features Apache Lucene/Solr as a replacement for Autonomy IDOL and our Luwak library as a replacement for Autonomy Verity.
Open Data Semantic Web Community Barn RaisingBoris Mann
Open source is now a term that is increasingly understood, or at least talked about. One of the next battles in keeping the web open is keeping data open - from the content we "generate" for many social sites to the closed silos of government and businesses.
Just like open source, open data is a mix of technology, licensing, and attitude. Here in Vancouver, we've started experimenting with what I like to call a Semantic Web Community "Barn Raising" effort. Lots of people are interested in open data and related technology that supports it, like the semantic web, RDF, etc. But it's very hard to just have nice thought experiments about all this, we learn best by doing.
Recently, I gave a talk at DrupalCon Washington DC talking about the semantic web. I said that RDFa is "food for robots", so what better data to experiment with than something related to food?
The project we're tackling is to collectively source restaurant information. The information will be stored in part on Freebase, as well as various front end mashups, iPhone apps, and other tools. Eventually, we hope to create an economic incentive so that some restaurants and/or restaurant directory websites will expose their data semantically.
The talk will be a mix of community, policy, hand waving, and technology, as well as an open call to help with this project in your own city. You'll leave with some food for thought on how open data and the semantic web are evolving, and what you can do with it today.
Full Stack Squared 2022 - Power of Open SourceChris Swan
An examination of open source freedoms (free like beer
free like speech, and free like puppy), the people behind open source and how anybody can get involved.
Frontera распределенный робот для обхода веба в больших объемах / Александр С...Ontico
В этом докладе я собираюсь поделиться нашим опытом обхода испанского интернета. Мы поставили перед собой задачу обойти около 600 тысяч веб-сайтов в зоне .es с целью сбора статистики об узлах и их размерах. Я расскажу об архитектуре робота, хранилища, проблемах, с которыми мы столкнулись при обходе, и их решении.
Наше решение доступно в форме open source фреймворка Frontera. Фреймворк позволяет построить распределенного робота для скачивания страниц из Интернета в больших объемах в реальном времени. Также он может быть использован для построения сфокусированных роботов для выкачивания подмножества заранее известных веб-сайтов.
Фреймворк предлагает: настраиваемое хранилище URL документов (RDBMS или Key Value), управление стратегиями обхода, абстракцию транспортного уровня, абстракцию модуля загрузки.
Доклад построен в увлекательной форме: описание проблемы, решение и проблемы, которые возникли в ходе разработки решения.
Open Sourcing The Analyst Business Apachecon 2009James Governor
Keynote for ApacheCon Europe 2009 in Amsterdam. A humourous look at how the industry analyst business is subject to some of the same pressures as proprietary software. Examining the impact of open source, web collaboration, coordination and peer production mechanisms on the sector, and how RedMonk has tried to ride this wave.
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017ProQuest
Library information security and privacy are both fundamental and challenging. Help is coming as Internet leaders push heavier use of encryption, a move that highlights the differences between secure and non-secure online use. How can libraries help prepare and educate users to work within a more difficult Internet environment? How can they inspire more private online behavior in the year ahead? Join the leader of ProQuest’s Information Security Office to discuss emerging issues in cybersecurity and privacy for libraries and information providers. Attendees will get tips for protecting the privacy of your patrons and for educating them on how to use information services securely. This session will also cover the differences between the privacy of consumer services and professional Information services, and best practices for patrons to protect their own personal information as they access public and library resources both in the library and remotely as the footprint of the library expands along with mobile device adoption.
Targeted trojan attacks first attracted attention in early 2005, when the UK NISCC warned of their wide spread use in attacks on UK national infrastructure. Incidents such as "Titan Rain" and the compromise of US Department of State computer systems have increased their profile in the last two years. This presentation will consist of hard, technical information on attacks in the form of a case study of an actual attack ongoing since 2005. It covers exploitation techniques, draws general conclusions on attack methodologies and focuses on how to defend against the dark arts.
Competitive Intelligence - Fast, Cheap & Ethical By Rob Duncan March 5, 2009Dr. Rob Duncan
Join professional speaker and critically acclaimed author Rob Duncan for this valuable presentation on how you can gather top quality competitive intelligence without breaking the bank!
WSO2Con EU 2015: Open Source Journey at Ordnance SurveyWSO2
WSO2Con EU 2015: Open Source Journey at Ordnance Survey
When five years ago the outgoing Minister of Finance Liam Burne left a note at the treasury that said “there’s no cash left” it concentrated minds in the Civil Service and an ‘Open Source First’ policy was born. This led to a successful WSO2 engagement, the proliferation of open source solutions at OS, and ultimately a significant saving in software costs. This session will discusses the highlights and pitfalls along the way.
Presenter:
Hillary Corney
Principle Architect,
Ordnance Survey
Turning search upside down with powerful open source search softwareCharlie Hull
Turning Search Upside Down - how Flax works with media monitoring companies to build powerful and scalable 'inverted search' systems, applying hundreds of thousands of stored queries to millions of documents in real time. Features Apache Lucene/Solr as a replacement for Autonomy IDOL and our Luwak library as a replacement for Autonomy Verity.
Open Data Semantic Web Community Barn RaisingBoris Mann
Open source is now a term that is increasingly understood, or at least talked about. One of the next battles in keeping the web open is keeping data open - from the content we "generate" for many social sites to the closed silos of government and businesses.
Just like open source, open data is a mix of technology, licensing, and attitude. Here in Vancouver, we've started experimenting with what I like to call a Semantic Web Community "Barn Raising" effort. Lots of people are interested in open data and related technology that supports it, like the semantic web, RDF, etc. But it's very hard to just have nice thought experiments about all this, we learn best by doing.
Recently, I gave a talk at DrupalCon Washington DC talking about the semantic web. I said that RDFa is "food for robots", so what better data to experiment with than something related to food?
The project we're tackling is to collectively source restaurant information. The information will be stored in part on Freebase, as well as various front end mashups, iPhone apps, and other tools. Eventually, we hope to create an economic incentive so that some restaurants and/or restaurant directory websites will expose their data semantically.
The talk will be a mix of community, policy, hand waving, and technology, as well as an open call to help with this project in your own city. You'll leave with some food for thought on how open data and the semantic web are evolving, and what you can do with it today.
Similar to Open Source History And Licenses (15 04 2009) (20)
My presentation (in Danish) at the second day (21 April 2012) of the annual meeting of the Danish Association of Media and Entertainment Law at Sophienberg, Copenhagen, on openness, sharing and new business models post ACTA
My presentation (in Danish) at the first day (20 April 2012) of the annual meeting of the Danish Association of Media and Entertainment Law at Sophienberg, Copenhagen, on the new intermediaries of the publishing industry
My presentation on the trend towards more permissive licensing in open source at Itechlaw Asia 2012 on 23 February 2012 in Bangalore. My paper for the presentation can be downloaded at http://cl.ly/282g0I0q450g2A2T1M1M
My presentation on "Balancen mellem hensynet til rettighedshavere og til brugere i forbindelse med ophavsrettens udvikling" at Going Local 2011, København: Digitalt indhold som driver for det digitale indre marked, 8 December 2011, cf. http://ec.europa.eu/information_society/events/cf/daelocal/item-display.cfm?id=7016&lang=en
My presentation (in Danish) on open business models from seminar at the Danish IT-University 6 December 2011. This presentation is largely identical with the previous presentation dated 30 November 2011
Min præsentation på dansk på Seminar 1: Åbne forretningsmodeller i SMV servicevirksomheder der innoverer kl. 13 – 16, onsdag den 30. november 2011
hos Teknologisk Institut
Gregersensvej 3, Indgang 3, lokale 36, 2630 Taastrup
My slides for presentation in Copenhagen 11 November 2011 on Creative Commons at the "Sharing is caring: Digitized cultural heritage for all" seminar organized by the Association of Danish Museums
The slides - based on my first attempt with a Prezi presentation - for a presentation at conference on entreprenuership at Danish Confederation of Industries that took place 31 March 2011
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
32. Linux and Open source
• Linus Torvalds
– Linux released under the GPL v2
6
33. Linux and Open source
• Linus Torvalds
– Linux released under the GPL v2
• Eric Raymonds
6
34. Linux and Open source
• Linus Torvalds
– Linux released under the GPL v2
• Eric Raymonds
– Cathedral and the Bazaar
6
35. Linux and Open source
• Linus Torvalds
– Linux released under the GPL v2
• Eric Raymonds
– Cathedral and the Bazaar
• Bruce Perens
6
36. Linux and Open source
• Linus Torvalds
– Linux released under the GPL v2
• Eric Raymonds
– Cathedral and the Bazaar
• Bruce Perens
– Open Source Initiative
6
67. Free Software ideology
• “All software should be free”
• You get the four freedoms
• You shall preserve these freedoms
10
68. Free Software ideology
• “All software should be free”
• You get the four freedoms
• You shall preserve these freedoms
• So when you redistribute, copyleft
secures that the next persons gets the
same freedoms
10
73. Open Source principles
• Free redistribution
• Source code
• Derived work
• Integrity of The Author's
Source Code
11
74. Open Source principles
• Free redistribution
• Source code
• Derived work
• Integrity of The Author's
Source Code
• 5-10: Non-discrimination
11
75. Copyright
The programmer or the producer owns the
●
software
Property rights are limited
●
Copyright is limited in time
●
The user is a user not an owner
●
The license is an agreement not a law
●
The license grants positively defined user
●
rights.
All residual rights belongs to the licensor
●
Without copyright no licenses
●
77. Patents
• “A set of exclusive rights granted by a state to
an inventor or his assignee for a limited period
of time in exchange for a disclosure of an
invention”
13
78. Patents
• “A set of exclusive rights granted by a state to
an inventor or his assignee for a limited period
of time in exchange for a disclosure of an
invention”
• FSF: “a patent on any performance of a
computer realised by means of a computer
programquot;
13
79. Patents
• “A set of exclusive rights granted by a state to
an inventor or his assignee for a limited period
of time in exchange for a disclosure of an
invention”
• FSF: “a patent on any performance of a
computer realised by means of a computer
programquot;
• Licensor shall not restrict use by patents
13
80. Patents
• “A set of exclusive rights granted by a state to
an inventor or his assignee for a limited period
of time in exchange for a disclosure of an
invention”
• FSF: “a patent on any performance of a
computer realised by means of a computer
programquot;
• Licensor shall not restrict use by patents
• OSS licensee shall not claim patents against
licensor or sublicensee
13
95. Copyleft - the basics
• You don’t have to redistribute or distribute
15
96. Copyleft - the basics
• You don’t have to redistribute or distribute
• (Exception: “written offer valid for any
third party” in GPL, v. 2)
15
97. Copyleft - the basics
• You don’t have to redistribute or distribute
• (Exception: “written offer valid for any
third party” in GPL, v. 2)
• Comply or cease use, or call back
distribution
15
98. Copyleft - the basics
• You don’t have to redistribute or distribute
• (Exception: “written offer valid for any
third party” in GPL, v. 2)
• Comply or cease use, or call back
distribution
• Make combined program, including
modifications and otherwise closed code
available under GPL (or compatible licens)
15
101. Derivative work
• A work based on one or more pre-
existing works
• Improvement, translation, correction
16
102. Derivative work
• A work based on one or more pre-
existing works
• Improvement, translation, correction
• Not collective work
16
103. Derivative work
• A work based on one or more pre-
existing works
• Improvement, translation, correction
• Not collective work
• Modifications are copyrighted
themselves
16
104. Derivative work
• A work based on one or more pre-
existing works
• Improvement, translation, correction
• Not collective work
• Modifications are copyrighted
themselves
• Very few court cases
16
105. Derivative work
• A work based on one or more pre-
existing works
• Improvement, translation, correction
• Not collective work
• Modifications are copyrighted
themselves
• Very few court cases
• GPL: Combinations
16
108. Combination
• Combination of code into a whole
• NB: All combinations are permitted and
“private” combinations have no restrictions
17
109. Combination
• Combination of code into a whole
• NB: All combinations are permitted and
“private” combinations have no restrictions
• Mechanism of communication
17
110. Combination
• Combination of code into a whole
• NB: All combinations are permitted and
“private” combinations have no restrictions
• Mechanism of communication
• Semantics of the communication
17
111. Combination
• Combination of code into a whole
• NB: All combinations are permitted and
“private” combinations have no restrictions
• Mechanism of communication
• Semantics of the communication
• Output not covered
17
112. Combination
• Combination of code into a whole
• NB: All combinations are permitted and
“private” combinations have no restrictions
• Mechanism of communication
• Semantics of the communication
• Output not covered
• (Exc: GPL program copies text into output)
17
113. Combination
• Combination of code into a whole
• NB: All combinations are permitted and
“private” combinations have no restrictions
• Mechanism of communication
• Semantics of the communication
• Output not covered
• (Exc: GPL program copies text into output)
• Output of language interpreter
17
114. Combination
• Combination of code into a whole
• NB: All combinations are permitted and
“private” combinations have no restrictions
• Mechanism of communication
• Semantics of the communication
• Output not covered
• (Exc: GPL program copies text into output)
• Output of language interpreter
• (Exc: “bindings” interpreter to program)
17
115. Combination
• Combination of code into a whole
• NB: All combinations are permitted and
“private” combinations have no restrictions
• Mechanism of communication
• Semantics of the communication
• Output not covered
• (Exc: GPL program copies text into output)
• Output of language interpreter
• (Exc: “bindings” interpreter to program)
• Library is under GPL, program is not
17
116. Combination
• Combination of code into a whole
• NB: All combinations are permitted and
“private” combinations have no restrictions
• Mechanism of communication
• Semantics of the communication
• Output not covered
• (Exc: GPL program copies text into output)
• Output of language interpreter
• (Exc: “bindings” interpreter to program)
• Library is under GPL, program is not
• Program is under GPL, module is not
17
120. Combination cont.
• CMS Templates
– Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
18
121. Combination cont.
• CMS Templates
– Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program
18
122. Combination cont.
• CMS Templates
– Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program
– dynamically linked plug-ins
18
123. Combination cont.
• CMS Templates
– Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program
– dynamically linked plug-ins
– fork and exec to invoke plug-ins
18
124. Combination cont.
• CMS Templates
– Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program
– dynamically linked plug-ins
– fork and exec to invoke plug-ins
• System library exception
18
125. Combination cont.
• CMS Templates
– Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program
– dynamically linked plug-ins
– fork and exec to invoke plug-ins
• System library exception
• Aggregate work is not combined work
18
126. Combination cont.
• CMS Templates
– Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program
– dynamically linked plug-ins
– fork and exec to invoke plug-ins
• System library exception
• Aggregate work is not combined work
• Linking exception
18
127. Combination cont.
• CMS Templates
– Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program
– dynamically linked plug-ins
– fork and exec to invoke plug-ins
• System library exception
• Aggregate work is not combined work
• Linking exception
• LGPL allows linking to closed applications
18
128. Combination cont.
• CMS Templates
– Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program
– dynamically linked plug-ins
– fork and exec to invoke plug-ins
• System library exception
• Aggregate work is not combined work
• Linking exception
• LGPL allows linking to closed applications
– Java archive files
18
132. Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
19
133. Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception
19
134. Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception
• Affero Public License
19
135. Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception
• Affero Public License
• Contractors on/off-site
19
136. Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception
• Affero Public License
• Contractors on/off-site
• Outsourcing
19
137. Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception
• Affero Public License
• Contractors on/off-site
• Outsourcing
• Mergers and Acquisitions
19
138. Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception
• Affero Public License
• Contractors on/off-site
• Outsourcing
• Mergers and Acquisitions
• Let recipient download the GPL’ed code
19
139. Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception
• Affero Public License
• Contractors on/off-site
• Outsourcing
• Mergers and Acquisitions
• Let recipient download the GPL’ed code
19
140. Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception
• Affero Public License
• Contractors on/off-site
• Outsourcing
• Mergers and Acquisitions
• Let recipient download the GPL’ed code
19
145. Escapes
• Make deal with licensor
• Replace code
• Work around
• GPL v3, sec. 8
20
146. Escapes
• Make deal with licensor
• Replace code
• Work around
• GPL v3, sec. 8
– Termination notice
20
147. Escapes
• Make deal with licensor
• Replace code
• Work around
• GPL v3, sec. 8
– Termination notice
• NDA: Developer can agree not to
release changes at all
20
148. Escapes
• Make deal with licensor
• Replace code
• Work around
• GPL v3, sec. 8
– Termination notice
• NDA: Developer can agree not to
release changes at all
• NDA: Developer can agree only to
release changes to customer
20
160. Damages
• Compensation under copyright
• No penal damages or stipulated
damages
• Economic loss suffered by licensor
22
161. Damages
• Compensation under copyright
• No penal damages or stipulated
damages
• Economic loss suffered by licensor
• Rule of thumb: 2 x license fee
22
162. Damages
• Compensation under copyright
• No penal damages or stipulated
damages
• Economic loss suffered by licensor
• Rule of thumb: 2 x license fee
• Injunction
22
163. Damages
• Compensation under copyright
• No penal damages or stipulated
damages
• Economic loss suffered by licensor
• Rule of thumb: 2 x license fee
• Injunction
• Legal fees
22
178. LEGO goes open source
1 May 2006. LEGO press release
Hackers, Get Ready! LEGO Group
Announces Open Source Firmware,
Developer Kits for LEGO®
MINDSTORMS® NXT
Consumer-directed robotics experience
creation to enter “NXT” phase with open
firmware, Software, Hardware and
Bluetooth Developer Kits to launch in
August
180. Background
Mindstorms robots launched in 1998
●
181. Background
Mindstorms robots launched in 1998
●
The best-selling LEGO product ever
●
182. Background
Mindstorms robots launched in 1998
●
The best-selling LEGO product ever
●
Huge Mindstorm community
●
183. Background
Mindstorms robots launched in 1998
●
The best-selling LEGO product ever
●
Huge Mindstorm community
●
LEGO was and is not a software
●
company
184. Background
Mindstorms robots launched in 1998
●
The best-selling LEGO product ever
●
Huge Mindstorm community
●
LEGO was and is not a software
●
company
Only minor upgrades to the firmware
●
185. Background
Mindstorms robots launched in 1998
●
The best-selling LEGO product ever
●
Huge Mindstorm community
●
LEGO was and is not a software
●
company
Only minor upgrades to the firmware
●
Several parallel Mindstorms OS’s
●
187. Challenges
LEGO was not comfortable with “openess”
●
188. Challenges
LEGO was not comfortable with “openess”
●
LEGO has been and is extremely reliant
●
on strong IPRs
189. Challenges
LEGO was not comfortable with “openess”
●
LEGO has been and is extremely reliant
●
on strong IPRs
”You don't give away IPRs for free”
●
190. Challenges
LEGO was not comfortable with “openess”
●
LEGO has been and is extremely reliant
●
on strong IPRs
”You don't give away IPRs for free”
●
Turbulent period for LEGO in general
●
191. Challenges
LEGO was not comfortable with “openess”
●
LEGO has been and is extremely reliant
●
on strong IPRs
”You don't give away IPRs for free”
●
Turbulent period for LEGO in general
●
Third party software included
●
194. Solution
Embrace User driven innovation
●
Open source as the enabler
●
195. Solution
Embrace User driven innovation
●
Open source as the enabler
●
Third party permission for
●
redistribution under an OS license
196. Solution
Embrace User driven innovation
●
Open source as the enabler
●
Third party permission for
●
redistribution under an OS license
Choice of license
●
197. Solution
Embrace User driven innovation
●
Open source as the enabler
●
Third party permission for
●
redistribution under an OS license
Choice of license
●
”Genuine” open source licence
−
198. Solution
Embrace User driven innovation
●
Open source as the enabler
●
Third party permission for
●
redistribution under an OS license
Choice of license
●
”Genuine” open source licence
−
Permissive (Academic) or Copyleft
−
(reciprocal license)
200. The OS license choice
Mozilla Public license v. 1.1
●
29
201. The OS license choice
Mozilla Public license v. 1.1
●
Weak copyleft
●
29
202. The OS license choice
Mozilla Public license v. 1.1
●
Weak copyleft
●
Modification is limited altering
●
the files
29
203. The OS license choice
Mozilla Public license v. 1.1
●
Weak copyleft
●
Modification is limited altering
●
the files
“I did not understand GPL v.2”
●
29
204. The OS license choice
Mozilla Public license v. 1.1
●
Weak copyleft
●
Modification is limited altering
●
the files
“I did not understand GPL v.2”
●
LEGO was only concerned with
●
modifications of the actual files
29
206. The “beauty” of the solution!
• Huge press coverage and goodwill
30
207. The “beauty” of the solution!
• Huge press coverage and goodwill
• Large number of downloads of
code
30
208. The “beauty” of the solution!
• Huge press coverage and goodwill
• Large number of downloads of
code
• Much more “intelligence” in the
bricks
30
209. The “beauty” of the solution!
• Huge press coverage and goodwill
• Large number of downloads of
code
• Much more “intelligence” in the
bricks
• Convincing strategy towards
competitors
30
210. The “beauty” of the solution!
• Huge press coverage and goodwill
• Large number of downloads of
code
• Much more “intelligence” in the
bricks
• Convincing strategy towards
competitors
• Option to “close” the code again
30
211. The “beauty” of the solution!
• Huge press coverage and goodwill
• Large number of downloads of
code
• Much more “intelligence” in the
bricks
• Convincing strategy towards
competitors
• Option to “close” the code again
• Many more bricks sold!
30
213. CASE: MySQL
Dual-licensing
• The software company perspective
31
214. CASE: MySQL
Dual-licensing
• The software company perspective
• The same code is licensed under two
different licences:
31
215. CASE: MySQL
Dual-licensing
• The software company perspective
• The same code is licensed under two
different licences:
– MySQL Community Server: GPL v.
2 with FOSS exception
31
216. CASE: MySQL
Dual-licensing
• The software company perspective
• The same code is licensed under two
different licences:
– MySQL Community Server: GPL v.
2 with FOSS exception
– MySQL Enterprise: Commercial
license
31
218. Owner's prerogative
The owner can decide to release under
●
any and as many terms she likes
219. Owner's prerogative
The owner can decide to release under
●
any and as many terms she likes
Dual licensing is only possible for
●
owner's own modfications
220. Owner's prerogative
The owner can decide to release under
●
any and as many terms she likes
Dual licensing is only possible for
●
owner's own modfications
Or assigned modifications
●
221. Owner's prerogative
The owner can decide to release under
●
any and as many terms she likes
Dual licensing is only possible for
●
owner's own modfications
Or assigned modifications
●
Control is necessary to mitigate liability
●
222. Owner's prerogative
The owner can decide to release under
●
any and as many terms she likes
Dual licensing is only possible for
●
owner's own modfications
Or assigned modifications
●
Control is necessary to mitigate liability
●
”Closing in” the code again
●
225. Copyright and control
• MySQL has exclusive copyright
to the code
• MySQL controls and certifies the
code
33
226. Copyright and control
• MySQL has exclusive copyright
to the code
• MySQL controls and certifies the
code
• The GPL does not give any
rights to use MySQLs
trademarks
33
236. CASE: NITA
• Danish National IT and Telecom
Agency
• eFaktura (eInvoice)
36
237. CASE: NITA
• Danish National IT and Telecom
Agency
• eFaktura (eInvoice)
• Electronic invoices to, from and
between public agencies
36
238. CASE: NITA
• Danish National IT and Telecom
Agency
• eFaktura (eInvoice)
• Electronic invoices to, from and
between public agencies
• Core service: UDDI registry for
webservice to identify senders
and receivers
36
242. Challenges
• Two applications provided by
NITA to user (e.g. ERP
vendors)
• API between users’ ERPs and
UDDI WS
• Reference implementation
integrating API with ERP
37
243. Challenges
• Two applications provided by
NITA to user (e.g. ERP
vendors)
• API between users’ ERPs and
UDDI WS
• Reference implementation
integrating API with ERP
• NITA wanted to release the
application under an OS
license
37
247. Goals
• Satisfying the politicians
• Wide adoption of UDDI
• Community based
improvement of the API
38
248. Goals
• Satisfying the politicians
• Wide adoption of UDDI
• Community based
improvement of the API
• Many vendors should
integrate API into their ERP
38
252. Solutions
• API
– Copyleft
– Mozilla public license v. 1.1
(maybe EUPL v. 1.1)
39
253. Solutions
• API
– Copyleft
– Mozilla public license v. 1.1
(maybe EUPL v. 1.1)
• Reference implementation
39
254. Solutions
• API
– Copyleft
– Mozilla public license v. 1.1
(maybe EUPL v. 1.1)
• Reference implementation
– Permissive licence
39
255. Solutions
• API
– Copyleft
– Mozilla public license v. 1.1
(maybe EUPL v. 1.1)
• Reference implementation
– Permissive licence
– FreeBSD license
39
Editor's Notes
Ad pind 1) Hvad kræver persondataloven?
Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
Ad pind 1) Hvad kræver persondataloven?
Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
Ad pind 1) Hvad kræver persondataloven?
Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
Ad pind 1) Hvad kræver persondataloven?
Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
Ad pind 1) Hvad kræver persondataloven?
Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
Ad pind 1) Hvad kræver persondataloven?
Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
Ad pind 1) Hvad kræver persondataloven?
Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
Ad pind 1) Hvad kræver persondataloven?
Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program.
By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program.
SYSTEM LIBRARIES
However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program.
By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program.
SYSTEM LIBRARIES
However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program.
By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program.
SYSTEM LIBRARIES
However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program.
By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program.
SYSTEM LIBRARIES
However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program.
By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program.
SYSTEM LIBRARIES
However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program.
By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program.
SYSTEM LIBRARIES
However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program.
By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program.
SYSTEM LIBRARIES
However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program.
By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program.
SYSTEM LIBRARIES
However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program.
By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program.
SYSTEM LIBRARIES
However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program.
By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program.
SYSTEM LIBRARIES
However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program.
By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program.
SYSTEM LIBRARIES
However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.