SlideShare a Scribd company logo
Open Source History and
       Licenses

  Advokat Martin von Haller Groenbaek
  Partner, Bender von Haller Dragsted

     SonyEricsson / Purple Scout, Malmö




                                          2
Personalia




             2
Personalia
• Attorney-at-law, Bender von Haller Dragsted




                                                2
Personalia
• Attorney-at-law, Bender von Haller Dragsted
• Co-founder, Open Source Vendors Ass. (OSL)




                                                2
Personalia
• Attorney-at-law, Bender von Haller Dragsted
• Co-founder, Open Source Vendors Ass. (OSL)
• Co-founder, Creative Commons DK




                                                2
Personalia
• Attorney-at-law, Bender von Haller Dragsted
• Co-founder, Open Source Vendors Ass. (OSL)
• Co-founder, Creative Commons DK
• Co-founder, Danish Internet Society Chapter




                                                2
Personalia
• Attorney-at-law, Bender von Haller Dragsted
• Co-founder, Open Source Vendors Ass. (OSL)
• Co-founder, Creative Commons DK
• Co-founder, Danish Internet Society Chapter




                                                2
Personalia
• Attorney-at-law, Bender von Haller Dragsted
• Co-founder, Open Source Vendors Ass. (OSL)
• Co-founder, Creative Commons DK
• Co-founder, Danish Internet Society Chapter


• http://suse.groenbaek.net/openlife




                                                2
Personalia
• Attorney-at-law, Bender von Haller Dragsted
• Co-founder, Open Source Vendors Ass. (OSL)
• Co-founder, Creative Commons DK
• Co-founder, Danish Internet Society Chapter


• http://suse.groenbaek.net/openlife
• http://www.linkedin.com/in/vonhaller




                                                2
Personalia
• Attorney-at-law, Bender von Haller Dragsted
• Co-founder, Open Source Vendors Ass. (OSL)
• Co-founder, Creative Commons DK
• Co-founder, Danish Internet Society Chapter


• http://suse.groenbaek.net/openlife
• http://www.linkedin.com/in/vonhaller
• http://www.23hq.com/mhg



                                                2
Personalia
• Attorney-at-law, Bender von Haller Dragsted
• Co-founder, Open Source Vendors Ass. (OSL)
• Co-founder, Creative Commons DK
• Co-founder, Danish Internet Society Chapter


• http://suse.groenbaek.net/openlife
• http://www.linkedin.com/in/vonhaller
• http://www.23hq.com/mhg
• http://www.facebook.com/profile.php?id=672056156

                                                2
Personalia
• Attorney-at-law, Bender von Haller Dragsted
• Co-founder, Open Source Vendors Ass. (OSL)
• Co-founder, Creative Commons DK
• Co-founder, Danish Internet Society Chapter


• http://suse.groenbaek.net/openlife
• http://www.linkedin.com/in/vonhaller
• http://www.23hq.com/mhg
• http://www.facebook.com/profile.php?id=672056156

                                                2
Agenda




         3
Agenda




         3
Agenda
• The History of FLOSS




                            3
Agenda
• The History of FLOSS
• Copyright and OSS




                            3
Agenda
• The History of FLOSS
• Copyright and OSS
• Patents and OSS




                             3
Agenda
• The History of FLOSS
• Copyright and OSS
• Patents and OSS
• OSS Licenses




                             3
Agenda
• The History of FLOSS
• Copyright and OSS
• Patents and OSS
• OSS Licenses
• Copyleft




                             3
Agenda
• The History of FLOSS
• Copyright and OSS
• Patents and OSS
• OSS Licenses
• Copyleft
• Business models




                             3
Agenda
• The History of FLOSS
• Copyright and OSS
• Patents and OSS
• OSS Licenses
• Copyleft
• Business models
• Cases




                             3
http://vodpod.com/watch/
46377-revolution-os-1hr-25-
            mins
                         4
Free Software




                5
Free Software
• Hacker culture




                        5
Free Software
• Hacker culture
• Richard Stallman




                        5
Free Software
• Hacker culture
• Richard Stallman
• Free Software Foundation




                             5
Free Software
• Hacker culture
• Richard Stallman
• Free Software Foundation
• Software should be free




                             5
Free Software
• Hacker culture
• Richard Stallman
• Free Software Foundation
• Software should be free
• GNU “GNU is not Unix”




                             5
Free Software
• Hacker culture
• Richard Stallman
• Free Software Foundation
• Software should be free
• GNU “GNU is not Unix”
• BSD and ATT




                             5
Linux and Open source




                    6
Linux and Open source
• Linus Torvalds




                          6
Linux and Open source
• Linus Torvalds
   – Linux released under the GPL v2




                                       6
Linux and Open source
• Linus Torvalds
   – Linux released under the GPL v2
• Eric Raymonds




                                       6
Linux and Open source
• Linus Torvalds
   – Linux released under the GPL v2
• Eric Raymonds
   – Cathedral and the Bazaar




                                       6
Linux and Open source
• Linus Torvalds
   – Linux released under the GPL v2
• Eric Raymonds
   – Cathedral and the Bazaar
• Bruce Perens




                                       6
Linux and Open source
• Linus Torvalds
   – Linux released under the GPL v2
• Eric Raymonds
   – Cathedral and the Bazaar
• Bruce Perens
   – Open Source Initiative




                                       6
OSS and Microsoft




                    7
OSS and Microsoft
• 2002




                        7
OSS and Microsoft
• 2002
   – Steve Balmer: “Copyright cancer”,
     “communism”




                                         7
OSS and Microsoft
• 2002
   – Steve Balmer: “Copyright cancer”,
     “communism”
• 2004




                                         7
OSS and Microsoft
• 2002
   – Steve Balmer: “Copyright cancer”,
     “communism”
• 2004
   – SCO, Patent threaths, “Beware of
     infectious GPL”




                                         7
OSS and Microsoft
• 2002
   – Steve Balmer: “Copyright cancer”,
     “communism”
• 2004
   – SCO, Patent threaths, “Beware of
     infectious GPL”
• 2008




                                         7
OSS and Microsoft
• 2002
   – Steve Balmer: “Copyright cancer”,
     “communism”
• 2004
   – SCO, Patent threaths, “Beware of
     infectious GPL”
• 2008
   – Peaceful co-existence, Novell dea



                                         7
OSS Business




               8
OSS Business
• 1998




                   8
OSS Business
• 1998
   – Netscape




                    8
OSS Business
• 1998
   – Netscape
• 1999




                    8
OSS Business
• 1998
   – Netscape
• 1999
   – Cygnus




                    8
OSS Business
• 1998
   – Netscape
• 1999
   – Cygnus
• 2000




                    8
OSS Business
• 1998
   – Netscape
• 1999
   – Cygnus
• 2000
   – VA Linux, RedHat




                        8
OSS Business
• 1998
   – Netscape
• 1999
   – Cygnus
• 2000
   – VA Linux, RedHat
• 2005




                        8
OSS Business
• 1998
   – Netscape
• 1999
   – Cygnus
• 2000
   – VA Linux, RedHat
• 2005
   – IBM, SUN




                        8
OSS Business
• 1998
   – Netscape
• 1999
   – Cygnus
• 2000
   – VA Linux, RedHat
• 2005
   – IBM, SUN
• 2006



                        8
OSS Business
• 1998
   – Netscape
• 1999
   – Cygnus
• 2000
   – VA Linux, RedHat
• 2005
   – IBM, SUN
• 2006
   – Purple Scout, Redpill Linpro

                                    8
OSS Business
• 1998
   – Netscape
• 1999
   – Cygnus
• 2000
   – VA Linux, RedHat
• 2005
   – IBM, SUN
• 2006
   – Purple Scout, Redpill Linpro
• 2008
                                    8
OSS Business
• 1998
   – Netscape
• 1999
   – Cygnus
• 2000
   – VA Linux, RedHat
• 2005
   – IBM, SUN
• 2006
   – Purple Scout, Redpill Linpro
• 2008
   – MySQL sold to SUN, Symbian     8
Names




        9
Names
• Free software




                   9
Names
• Free software
• Open source software




                         9
Names
• Free software
• Open source software
• Free Libre Open Source Software




                                    9
Names
• Free software
• Open source software
• Free Libre Open Source Software
• Copyleft




                                    9
Names
• Free software
• Open source software
• Free Libre Open Source Software
• Copyleft
• Free Software Foundation




                                    9
Names
• Free software
• Open source software
• Free Libre Open Source Software
• Copyleft
• Free Software Foundation
• Open Source Initiative




                                    9
Free Software ideology




                    10
Free Software ideology
• “All software should be free”




                                  10
Free Software ideology
• “All software should be free”
• You get the four freedoms




                                  10
Free Software ideology
• “All software should be free”
• You get the four freedoms
• You shall preserve these freedoms




                                      10
Free Software ideology
• “All software should be free”
• You get the four freedoms
• You shall preserve these freedoms
• So when you redistribute, copyleft
  secures that the next persons gets the
  same freedoms




                                       10
Open Source principles




                    11
Open Source principles
  • Free redistribution




                          11
Open Source principles
  • Free redistribution
  • Source code




                          11
Open Source principles
  • Free redistribution
  • Source code
  • Derived work




                          11
Open Source principles
  • Free redistribution
  • Source code
  • Derived work
  • Integrity of The Author's
    Source Code




                                11
Open Source principles
  • Free redistribution
  • Source code
  • Derived work
  • Integrity of The Author's
    Source Code
  • 5-10: Non-discrimination




                                11
Copyright
    The programmer or the producer owns the
●

    software
    Property rights are limited
●



    Copyright is limited in time
●



    The user is a user not an owner
●



    The license is an agreement not a law
●



    The license grants positively defined user
●


    rights.
    All residual rights belongs to the licensor
●



    Without copyright no licenses
●
Patents




          13
Patents
• “A set of exclusive rights granted by a state to
  an inventor or his assignee for a limited period
  of time in exchange for a disclosure of an
  invention”




                                             13
Patents
• “A set of exclusive rights granted by a state to
  an inventor or his assignee for a limited period
  of time in exchange for a disclosure of an
  invention”
• FSF: “a patent on any performance of a
  computer realised by means of a computer
  programquot;




                                             13
Patents
• “A set of exclusive rights granted by a state to
  an inventor or his assignee for a limited period
  of time in exchange for a disclosure of an
  invention”
• FSF: “a patent on any performance of a
  computer realised by means of a computer
  programquot;
• Licensor shall not restrict use by patents




                                               13
Patents
• “A set of exclusive rights granted by a state to
  an inventor or his assignee for a limited period
  of time in exchange for a disclosure of an
  invention”
• FSF: “a patent on any performance of a
  computer realised by means of a computer
  programquot;
• Licensor shall not restrict use by patents
• OSS licensee shall not claim patents against
  licensor or sublicensee

                                               13
Licenses




           14
Licenses
• Academic or permissive licenses




                                    14
Licenses
• Academic or permissive licenses
   – Apache License v2




                                    14
Licenses
• Academic or permissive licenses
   – Apache License v2
   – MIT License




                                    14
Licenses
• Academic or permissive licenses
   – Apache License v2
   – MIT License
   – New BSD license




                                    14
Licenses
• Academic or permissive licenses
   – Apache License v2
   – MIT License
   – New BSD license
• Copyleft, reciprocal or hereditary licences




                                           14
Licenses
• Academic or permissive licenses
   – Apache License v2
   – MIT License
   – New BSD license
• Copyleft, reciprocal or hereditary licences
   – Weak copyleft




                                           14
Licenses
• Academic or permissive licenses
   – Apache License v2
   – MIT License
   – New BSD license
• Copyleft, reciprocal or hereditary licences
   – Weak copyleft
      • Artistic license v1




                                           14
Licenses
• Academic or permissive licenses
   – Apache License v2
   – MIT License
   – New BSD license
• Copyleft, reciprocal or hereditary licences
   – Weak copyleft
      • Artistic license v1
      • Eclipse Public License




                                           14
Licenses
• Academic or permissive licenses
   – Apache License v2
   – MIT License
   – New BSD license
• Copyleft, reciprocal or hereditary licences
   – Weak copyleft
      • Artistic license v1
      • Eclipse Public License
      • Mozilla Public License v.1.1



                                           14
Licenses
• Academic or permissive licenses
   – Apache License v2
   – MIT License
   – New BSD license
• Copyleft, reciprocal or hereditary licences
   – Weak copyleft
      • Artistic license v1
      • Eclipse Public License
      • Mozilla Public License v.1.1
   – Strong copyleft

                                           14
Licenses
• Academic or permissive licenses
   – Apache License v2
   – MIT License
   – New BSD license
• Copyleft, reciprocal or hereditary licences
   – Weak copyleft
      • Artistic license v1
      • Eclipse Public License
      • Mozilla Public License v.1.1
   – Strong copyleft
      • GNU GPL v1 and v2
                                           14
Licenses
• Academic or permissive licenses
   – Apache License v2
   – MIT License
   – New BSD license
• Copyleft, reciprocal or hereditary licences
   – Weak copyleft
      • Artistic license v1
      • Eclipse Public License
      • Mozilla Public License v.1.1
   – Strong copyleft
      • GNU GPL v1 and v2
      • GNU LGPL v1 and v2                 14
Copyleft - the basics




                        15
Copyleft - the basics
• You don’t have to redistribute or distribute




                                           15
Copyleft - the basics
• You don’t have to redistribute or distribute
• (Exception: “written offer valid for any
  third party” in GPL, v. 2)




                                             15
Copyleft - the basics
• You don’t have to redistribute or distribute
• (Exception: “written offer valid for any
  third party” in GPL, v. 2)
• Comply or cease use, or call back
  distribution




                                             15
Copyleft - the basics
• You don’t have to redistribute or distribute
• (Exception: “written offer valid for any
  third party” in GPL, v. 2)
• Comply or cease use, or call back
  distribution
• Make combined program, including
  modifications and otherwise closed code
  available under GPL (or compatible licens)



                                             15
Derivative work




                  16
Derivative work
• A work based on one or more pre-
  existing works




                                     16
Derivative work
• A work based on one or more pre-
  existing works
• Improvement, translation, correction




                                         16
Derivative work
• A work based on one or more pre-
  existing works
• Improvement, translation, correction
• Not collective work




                                         16
Derivative work
• A work based on one or more pre-
  existing works
• Improvement, translation, correction
• Not collective work
• Modifications are copyrighted
  themselves




                                         16
Derivative work
• A work based on one or more pre-
  existing works
• Improvement, translation, correction
• Not collective work
• Modifications are copyrighted
  themselves
• Very few court cases




                                         16
Derivative work
• A work based on one or more pre-
  existing works
• Improvement, translation, correction
• Not collective work
• Modifications are copyrighted
  themselves
• Very few court cases
• GPL: Combinations




                                         16
Combination




              17
Combination
• Combination of code into a whole




                                     17
Combination
• Combination of code into a whole
• NB: All combinations are permitted and
  “private” combinations have no restrictions




                                     17
Combination
• Combination of code into a whole
• NB: All combinations are permitted and
  “private” combinations have no restrictions
• Mechanism of communication




                                     17
Combination
• Combination of code into a whole
• NB: All combinations are permitted and
  “private” combinations have no restrictions
• Mechanism of communication
• Semantics of the communication




                                     17
Combination
• Combination of code into a whole
• NB: All combinations are permitted and
  “private” combinations have no restrictions
• Mechanism of communication
• Semantics of the communication
• Output not covered




                                     17
Combination
• Combination of code into a whole
• NB: All combinations are permitted and
  “private” combinations have no restrictions
• Mechanism of communication
• Semantics of the communication
• Output not covered
• (Exc: GPL program copies text into output)




                                     17
Combination
• Combination of code into a whole
• NB: All combinations are permitted and
  “private” combinations have no restrictions
• Mechanism of communication
• Semantics of the communication
• Output not covered
• (Exc: GPL program copies text into output)
• Output of language interpreter




                                     17
Combination
• Combination of code into a whole
• NB: All combinations are permitted and
  “private” combinations have no restrictions
• Mechanism of communication
• Semantics of the communication
• Output not covered
• (Exc: GPL program copies text into output)
• Output of language interpreter
• (Exc: “bindings” interpreter to program)



                                     17
Combination
• Combination of code into a whole
• NB: All combinations are permitted and
  “private” combinations have no restrictions
• Mechanism of communication
• Semantics of the communication
• Output not covered
• (Exc: GPL program copies text into output)
• Output of language interpreter
• (Exc: “bindings” interpreter to program)
• Library is under GPL, program is not


                                     17
Combination
• Combination of code into a whole
• NB: All combinations are permitted and
  “private” combinations have no restrictions
• Mechanism of communication
• Semantics of the communication
• Output not covered
• (Exc: GPL program copies text into output)
• Output of language interpreter
• (Exc: “bindings” interpreter to program)
• Library is under GPL, program is not
• Program is under GPL, module is not
                                     17
Combination cont.




              18
Combination cont.
• CMS Templates




                   18
Combination cont.
• CMS Templates
   – Exc: Javascript calls




                             18
Combination cont.
• CMS Templates
   – Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs




                                   18
Combination cont.
• CMS Templates
   – Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program




                                   18
Combination cont.
• CMS Templates
   – Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program
   – dynamically linked plug-ins




                                   18
Combination cont.
• CMS Templates
   – Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program
   – dynamically linked plug-ins
   – fork and exec to invoke plug-ins




                                   18
Combination cont.
• CMS Templates
   – Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program
   – dynamically linked plug-ins
   – fork and exec to invoke plug-ins
• System library exception




                                   18
Combination cont.
• CMS Templates
   – Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program
   – dynamically linked plug-ins
   – fork and exec to invoke plug-ins
• System library exception
• Aggregate work is not combined work




                                   18
Combination cont.
• CMS Templates
   – Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program
   – dynamically linked plug-ins
   – fork and exec to invoke plug-ins
• System library exception
• Aggregate work is not combined work
• Linking exception



                                   18
Combination cont.
• CMS Templates
   – Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program
   – dynamically linked plug-ins
   – fork and exec to invoke plug-ins
• System library exception
• Aggregate work is not combined work
• Linking exception
• LGPL allows linking to closed applications

                                    18
Combination cont.
• CMS Templates
   – Exc: Javascript calls
• Microsoft Visual C++ (or Visual Basic) DLLs
• Plug-ins under a GPL program
   – dynamically linked plug-ins
   – fork and exec to invoke plug-ins
• System library exception
• Aggregate work is not combined work
• Linking exception
• LGPL allows linking to closed applications
   – Java archive files
                                    18
Distribution




               19
Distribution
• GPL v2: Distribution




                          19
Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance




                                 19
Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware




                                 19
Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception




                                  19
Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception
• Affero Public License




                                  19
Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception
• Affero Public License
• Contractors on/off-site




                                  19
Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception
• Affero Public License
• Contractors on/off-site
• Outsourcing




                                  19
Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception
• Affero Public License
• Contractors on/off-site
• Outsourcing
• Mergers and Acquisitions




                                  19
Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception
• Affero Public License
• Contractors on/off-site
• Outsourcing
• Mergers and Acquisitions
• Let recipient download the GPL’ed code



                                    19
Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception
• Affero Public License
• Contractors on/off-site
• Outsourcing
• Mergers and Acquisitions
• Let recipient download the GPL’ed code



                                    19
Distribution
• GPL v2: Distribution
• GPL v3: Propagation and Conveyance
• In soft- and hardware
• ASP loophole og network exception
• Affero Public License
• Contractors on/off-site
• Outsourcing
• Mergers and Acquisitions
• Let recipient download the GPL’ed code



                                    19
Escapes




          20
Escapes
• Make deal with licensor




                            20
Escapes
• Make deal with licensor
• Replace code




                            20
Escapes
• Make deal with licensor
• Replace code
• Work around




                            20
Escapes
• Make deal with licensor
• Replace code
• Work around
• GPL v3, sec. 8




                            20
Escapes
• Make deal with licensor
• Replace code
• Work around
• GPL v3, sec. 8
   – Termination notice




                            20
Escapes
• Make deal with licensor
• Replace code
• Work around
• GPL v3, sec. 8
   – Termination notice
• NDA: Developer can agree not to
  release changes at all




                                    20
Escapes
• Make deal with licensor
• Replace code
• Work around
• GPL v3, sec. 8
   – Termination notice
• NDA: Developer can agree not to
  release changes at all
• NDA: Developer can agree only to
  release changes to customer



                                     20
Enforcement




              21
Enforcement
• The GPL is enforceable!




                            21
Enforcement
• The GPL is enforceable!
   – Germany 2004: Netfilter/Iptables;
     2006: D-Link




                                21
Enforcement
• The GPL is enforceable!
   – Germany 2004: Netfilter/Iptables;
     2006: D-Link
   – US 2007: BusyBox; 2008: Jacobsen
     vs. Katzer




                                21
Enforcement
• The GPL is enforceable!
   – Germany 2004: Netfilter/Iptables;
     2006: D-Link
   – US 2007: BusyBox; 2008: Jacobsen
     vs. Katzer
   – SCO




                                21
Enforcement
• The GPL is enforceable!
   – Germany 2004: Netfilter/Iptables;
     2006: D-Link
   – US 2007: BusyBox; 2008: Jacobsen
     vs. Katzer
   – SCO
• Copyright holder




                                21
Enforcement
• The GPL is enforceable!
   – Germany 2004: Netfilter/Iptables;
     2006: D-Link
   – US 2007: BusyBox; 2008: Jacobsen
     vs. Katzer
   – SCO
• Copyright holder
• Licensee




                                21
Enforcement
• The GPL is enforceable!
   – Germany 2004: Netfilter/Iptables;
     2006: D-Link
   – US 2007: BusyBox; 2008: Jacobsen
     vs. Katzer
   – SCO
• Copyright holder
• Licensee
• GPL-VIOLATIONS.ORG



                                21
Damages




          22
Damages
• Compensation under copyright




                                 22
Damages
• Compensation under copyright
• No penal damages or stipulated
  damages




                                 22
Damages
• Compensation under copyright
• No penal damages or stipulated
  damages
• Economic loss suffered by licensor




                                 22
Damages
• Compensation under copyright
• No penal damages or stipulated
  damages
• Economic loss suffered by licensor
• Rule of thumb: 2 x license fee




                                   22
Damages
• Compensation under copyright
• No penal damages or stipulated
  damages
• Economic loss suffered by licensor
• Rule of thumb: 2 x license fee
• Injunction




                                   22
Damages
• Compensation under copyright
• No penal damages or stipulated
  damages
• Economic loss suffered by licensor
• Rule of thumb: 2 x license fee
• Injunction
• Legal fees




                                   22
Business models




                  23
Business models
• Dual licensing




                   23
Business models
• Dual licensing
   – Warranties




                   23
Business models
• Dual licensing
   – Warranties
   – Copyleft exemptions




                           23
Business models
• Dual licensing
   – Warranties
   – Copyleft exemptions
• Services




                           23
Business models
• Dual licensing
   – Warranties
   – Copyleft exemptions
• Services
   – Warranties




                           23
Business models
• Dual licensing
   – Warranties
   – Copyleft exemptions
• Services
   – Warranties
   – Support and maintenance




                               23
Business models
• Dual licensing
   – Warranties
   – Copyleft exemptions
• Services
   – Warranties
   – Support and maintenance
   – Consultancy




                               23
Business models
• Dual licensing
   – Warranties
   – Copyleft exemptions
• Services
   – Warranties
   – Support and maintenance
   – Consultancy
   – Accesories



                               23
Business models
• Dual licensing
   – Warranties
   – Copyleft exemptions
• Services
   – Warranties
   – Support and maintenance
   – Consultancy
   – Accesories
• Marketing and distribution

                               23
Business models
• Dual licensing
   – Warranties
   – Copyleft exemptions
• Services
   – Warranties
   – Support and maintenance
   – Consultancy
   – Accesories
• Marketing and distribution
• Hardware sales
                               23
The Mindstorm story
The Mindstorm story
LEGO goes open source
LEGO goes open source
1 May 2006. LEGO press release

Hackers, Get Ready! LEGO Group
Announces Open Source Firmware,
Developer Kits for LEGO®
MINDSTORMS® NXT

Consumer-directed robotics experience
creation to enter “NXT” phase with open
firmware, Software, Hardware and
Bluetooth Developer Kits to launch in
August
Background
Background
    Mindstorms robots launched in 1998
●
Background
    Mindstorms robots launched in 1998
●



    The best-selling LEGO product ever
●
Background
    Mindstorms robots launched in 1998
●



    The best-selling LEGO product ever
●



    Huge Mindstorm community
●
Background
    Mindstorms robots launched in 1998
●



    The best-selling LEGO product ever
●



    Huge Mindstorm community
●



    LEGO was and is not a software
●

    company
Background
    Mindstorms robots launched in 1998
●



    The best-selling LEGO product ever
●



    Huge Mindstorm community
●



    LEGO was and is not a software
●

    company
    Only minor upgrades to the firmware
●
Background
    Mindstorms robots launched in 1998
●



    The best-selling LEGO product ever
●



    Huge Mindstorm community
●



    LEGO was and is not a software
●

    company
    Only minor upgrades to the firmware
●



    Several parallel Mindstorms OS’s
●
Challenges
Challenges
    LEGO was not comfortable with “openess”
●
Challenges
    LEGO was not comfortable with “openess”
●



    LEGO has been and is extremely reliant
●


    on strong IPRs
Challenges
    LEGO was not comfortable with “openess”
●



    LEGO has been and is extremely reliant
●


    on strong IPRs
    ”You don't give away IPRs for free”
●
Challenges
    LEGO was not comfortable with “openess”
●



    LEGO has been and is extremely reliant
●


    on strong IPRs
    ”You don't give away IPRs for free”
●



    Turbulent period for LEGO in general
●
Challenges
    LEGO was not comfortable with “openess”
●



    LEGO has been and is extremely reliant
●


    on strong IPRs
    ”You don't give away IPRs for free”
●



    Turbulent period for LEGO in general
●



    Third party software included
●
Solution
Solution
    Embrace User driven innovation
●
Solution
    Embrace User driven innovation
●



    Open source as the enabler
●
Solution
    Embrace User driven innovation
●



    Open source as the enabler
●



    Third party permission for
●


    redistribution under an OS license
Solution
    Embrace User driven innovation
●



    Open source as the enabler
●



    Third party permission for
●


    redistribution under an OS license
    Choice of license
●
Solution
    Embrace User driven innovation
●



    Open source as the enabler
●



    Third party permission for
●


    redistribution under an OS license
    Choice of license
●



         ”Genuine” open source licence
     −
Solution
    Embrace User driven innovation
●



    Open source as the enabler
●



    Third party permission for
●


    redistribution under an OS license
    Choice of license
●



         ”Genuine” open source licence
     −

         Permissive (Academic) or Copyleft
     −
         (reciprocal license)
The OS license choice




                 29
The OS license choice
    Mozilla Public license v. 1.1
●




                                    29
The OS license choice
    Mozilla Public license v. 1.1
●



    Weak copyleft
●




                                    29
The OS license choice
    Mozilla Public license v. 1.1
●



    Weak copyleft
●



    Modification is limited altering
●


    the files




                                       29
The OS license choice
    Mozilla Public license v. 1.1
●



    Weak copyleft
●



    Modification is limited altering
●


    the files
    “I did not understand GPL v.2”
●




                                       29
The OS license choice
    Mozilla Public license v. 1.1
●



    Weak copyleft
●



    Modification is limited altering
●


    the files
    “I did not understand GPL v.2”
●



    LEGO was only concerned with
●


    modifications of the actual files




                                        29
The “beauty” of the solution!




                        30
The “beauty” of the solution!
    • Huge press coverage and goodwill




                                         30
The “beauty” of the solution!
    • Huge press coverage and goodwill
    • Large number of downloads of
      code




                                         30
The “beauty” of the solution!
    • Huge press coverage and goodwill
    • Large number of downloads of
      code
    • Much more “intelligence” in the
      bricks




                                         30
The “beauty” of the solution!
    • Huge press coverage and goodwill
    • Large number of downloads of
      code
    • Much more “intelligence” in the
      bricks
    • Convincing strategy towards
      competitors




                                         30
The “beauty” of the solution!
    • Huge press coverage and goodwill
    • Large number of downloads of
      code
    • Much more “intelligence” in the
      bricks
    • Convincing strategy towards
      competitors
    • Option to “close” the code again




                                         30
The “beauty” of the solution!
    • Huge press coverage and goodwill
    • Large number of downloads of
      code
    • Much more “intelligence” in the
      bricks
    • Convincing strategy towards
      competitors
    • Option to “close” the code again
    • Many more bricks sold!


                                         30
CASE: MySQL
Dual-licensing




                 31
CASE: MySQL
      Dual-licensing
• The software company perspective




                               31
CASE: MySQL
      Dual-licensing
• The software company perspective
• The same code is licensed under two
  different licences:




                                31
CASE: MySQL
      Dual-licensing
• The software company perspective
• The same code is licensed under two
  different licences:
   – MySQL Community Server: GPL v.
     2 with FOSS exception




                                31
CASE: MySQL
      Dual-licensing
• The software company perspective
• The same code is licensed under two
  different licences:
   – MySQL Community Server: GPL v.
     2 with FOSS exception
   – MySQL Enterprise: Commercial
     license



                                31
Owner's prerogative
Owner's prerogative
    The owner can decide to release under
●

    any and as many terms she likes
Owner's prerogative
    The owner can decide to release under
●

    any and as many terms she likes
    Dual licensing is only possible for
●


    owner's own modfications
Owner's prerogative
    The owner can decide to release under
●

    any and as many terms she likes
    Dual licensing is only possible for
●


    owner's own modfications
    Or assigned modifications
●
Owner's prerogative
    The owner can decide to release under
●

    any and as many terms she likes
    Dual licensing is only possible for
●


    owner's own modfications
    Or assigned modifications
●



    Control is necessary to mitigate liability
●
Owner's prerogative
    The owner can decide to release under
●

    any and as many terms she likes
    Dual licensing is only possible for
●


    owner's own modfications
    Or assigned modifications
●



    Control is necessary to mitigate liability
●



    ”Closing in” the code again
●
Copyright and control




                    33
Copyright and control
 • MySQL has exclusive copyright
   to the code




                                   33
Copyright and control
 • MySQL has exclusive copyright
   to the code
 • MySQL controls and certifies the
   code




                                      33
Copyright and control
 • MySQL has exclusive copyright
   to the code
 • MySQL controls and certifies the
   code
 • The GPL does not give any
   rights to use MySQLs
   trademarks




                                      33
Why pay?




           34
Why pay?

• Certification of the code




                              34
Why pay?

• Certification of the code
• Warranties




                              34
Why pay?

• Certification of the code
• Warranties
• Maintenance and support




                              34
Why pay?

• Certification of the code
• Warranties
• Maintenance and support
• Copyleft exemption




                              34
Still not convinced?




                       35
Still not convinced?

• MySQL AB was in 2008 bought
  by Sun Microsystem, Inc. for
  approximately USD $1 billion in
  total consideration




                                    35
CASE: NITA




             36
CASE: NITA
• Danish National IT and Telecom
  Agency




                               36
CASE: NITA
• Danish National IT and Telecom
  Agency
• eFaktura (eInvoice)




                               36
CASE: NITA
• Danish National IT and Telecom
  Agency
• eFaktura (eInvoice)
• Electronic invoices to, from and
  between public agencies




                                 36
CASE: NITA
• Danish National IT and Telecom
  Agency
• eFaktura (eInvoice)
• Electronic invoices to, from and
  between public agencies
• Core service: UDDI registry for
  webservice to identify senders
  and receivers




                                    36
Challenges




             37
Challenges
• Two applications provided by
  NITA to user (e.g. ERP
  vendors)




                                 37
Challenges
• Two applications provided by
  NITA to user (e.g. ERP
  vendors)
• API between users’ ERPs and
  UDDI WS




                                 37
Challenges
• Two applications provided by
  NITA to user (e.g. ERP
  vendors)
• API between users’ ERPs and
  UDDI WS
• Reference implementation
  integrating API with ERP




                                 37
Challenges
• Two applications provided by
  NITA to user (e.g. ERP
  vendors)
• API between users’ ERPs and
  UDDI WS
• Reference implementation
  integrating API with ERP
• NITA wanted to release the
  application under an OS
  license


                                 37
Goals




        38
Goals
• Satisfying the politicians




                               38
Goals
• Satisfying the politicians
• Wide adoption of UDDI




                               38
Goals
• Satisfying the politicians
• Wide adoption of UDDI
• Community based
  improvement of the API




                               38
Goals
• Satisfying the politicians
• Wide adoption of UDDI
• Community based
  improvement of the API
• Many vendors should
  integrate API into their ERP




                                 38
Solutions




            39
Solutions
• API




                    39
Solutions
• API
   – Copyleft




                        39
Solutions
• API
   – Copyleft
   – Mozilla public license v. 1.1
     (maybe EUPL v. 1.1)




                                     39
Solutions
• API
   – Copyleft
   – Mozilla public license v. 1.1
     (maybe EUPL v. 1.1)
• Reference implementation




                                     39
Solutions
• API
   – Copyleft
   – Mozilla public license v. 1.1
     (maybe EUPL v. 1.1)
• Reference implementation
   – Permissive licence




                                     39
Solutions
• API
   – Copyleft
   – Mozilla public license v. 1.1
     (maybe EUPL v. 1.1)
• Reference implementation
   – Permissive licence
   – FreeBSD license




                                     39

More Related Content

Similar to Open Source History And Licenses (15 04 2009)

Full Stack Squared 2022 - Power of Open Source
Full Stack Squared 2022   - Power of Open SourceFull Stack Squared 2022   - Power of Open Source
Full Stack Squared 2022 - Power of Open Source
Chris Swan
 
Frontera распределенный робот для обхода веба в больших объемах / Александр С...
Frontera распределенный робот для обхода веба в больших объемах / Александр С...Frontera распределенный робот для обхода веба в больших объемах / Александр С...
Frontera распределенный робот для обхода веба в больших объемах / Александр С...
Ontico
 
Open Sourcing The Analyst Business Apachecon 2009
Open Sourcing The Analyst Business Apachecon 2009Open Sourcing The Analyst Business Apachecon 2009
Open Sourcing The Analyst Business Apachecon 2009
James Governor
 
Smau Milano 2016 - Fabio Alessandro Locati
Smau Milano 2016 - Fabio Alessandro LocatiSmau Milano 2016 - Fabio Alessandro Locati
Smau Milano 2016 - Fabio Alessandro Locati
SMAU
 
Os Lanphier Brashears
Os Lanphier BrashearsOs Lanphier Brashears
Os Lanphier Brashearsoscon2007
 
Open Social Shindig Preso for FB and OpenSocial Meetup
Open Social Shindig Preso for FB and OpenSocial MeetupOpen Social Shindig Preso for FB and OpenSocial Meetup
Open Social Shindig Preso for FB and OpenSocial Meetup
Chris Schalk
 
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
ProQuest
 
Crouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden TrojanCrouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden Trojan
guest17b7c7
 
Competitive Intelligence - Fast, Cheap & Ethical By Rob Duncan March 5, 2009
Competitive Intelligence -  Fast, Cheap & Ethical By Rob Duncan March 5, 2009Competitive Intelligence -  Fast, Cheap & Ethical By Rob Duncan March 5, 2009
Competitive Intelligence - Fast, Cheap & Ethical By Rob Duncan March 5, 2009
Dr. Rob Duncan
 
OpenSource
OpenSourceOpenSource
OpenSource
Adeyemi Fowe
 
English: Web 2.0's Universal Language
English: Web 2.0's Universal LanguageEnglish: Web 2.0's Universal Language
English: Web 2.0's Universal LanguageSmokler
 
Open source
Open sourceOpen source
Open source
Ashesh R
 
State Of Opensocial
State Of OpensocialState Of Opensocial
State Of Opensocial
Patrick Chanezon
 
WSO2Con EU 2015: Open Source Journey at Ordnance Survey
WSO2Con EU 2015: Open Source Journey at Ordnance SurveyWSO2Con EU 2015: Open Source Journey at Ordnance Survey
WSO2Con EU 2015: Open Source Journey at Ordnance Survey
WSO2
 
Turning search upside down with powerful open source search software
Turning search upside down with powerful open source search softwareTurning search upside down with powerful open source search software
Turning search upside down with powerful open source search software
Charlie Hull
 
Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)
dmgerman
 
Stanford Ee380
Stanford Ee380Stanford Ee380
Stanford Ee380
Tim O'Reilly
 
2nd
2nd2nd
2nd
Erm78
 
2nd
2nd2nd
2nd
Erm78
 
Open Data Semantic Web Community Barn Raising
Open Data Semantic Web Community Barn RaisingOpen Data Semantic Web Community Barn Raising
Open Data Semantic Web Community Barn Raising
Boris Mann
 

Similar to Open Source History And Licenses (15 04 2009) (20)

Full Stack Squared 2022 - Power of Open Source
Full Stack Squared 2022   - Power of Open SourceFull Stack Squared 2022   - Power of Open Source
Full Stack Squared 2022 - Power of Open Source
 
Frontera распределенный робот для обхода веба в больших объемах / Александр С...
Frontera распределенный робот для обхода веба в больших объемах / Александр С...Frontera распределенный робот для обхода веба в больших объемах / Александр С...
Frontera распределенный робот для обхода веба в больших объемах / Александр С...
 
Open Sourcing The Analyst Business Apachecon 2009
Open Sourcing The Analyst Business Apachecon 2009Open Sourcing The Analyst Business Apachecon 2009
Open Sourcing The Analyst Business Apachecon 2009
 
Smau Milano 2016 - Fabio Alessandro Locati
Smau Milano 2016 - Fabio Alessandro LocatiSmau Milano 2016 - Fabio Alessandro Locati
Smau Milano 2016 - Fabio Alessandro Locati
 
Os Lanphier Brashears
Os Lanphier BrashearsOs Lanphier Brashears
Os Lanphier Brashears
 
Open Social Shindig Preso for FB and OpenSocial Meetup
Open Social Shindig Preso for FB and OpenSocial MeetupOpen Social Shindig Preso for FB and OpenSocial Meetup
Open Social Shindig Preso for FB and OpenSocial Meetup
 
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
 
Crouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden TrojanCrouching Powerpoint, Hidden Trojan
Crouching Powerpoint, Hidden Trojan
 
Competitive Intelligence - Fast, Cheap & Ethical By Rob Duncan March 5, 2009
Competitive Intelligence -  Fast, Cheap & Ethical By Rob Duncan March 5, 2009Competitive Intelligence -  Fast, Cheap & Ethical By Rob Duncan March 5, 2009
Competitive Intelligence - Fast, Cheap & Ethical By Rob Duncan March 5, 2009
 
OpenSource
OpenSourceOpenSource
OpenSource
 
English: Web 2.0's Universal Language
English: Web 2.0's Universal LanguageEnglish: Web 2.0's Universal Language
English: Web 2.0's Universal Language
 
Open source
Open sourceOpen source
Open source
 
State Of Opensocial
State Of OpensocialState Of Opensocial
State Of Opensocial
 
WSO2Con EU 2015: Open Source Journey at Ordnance Survey
WSO2Con EU 2015: Open Source Journey at Ordnance SurveyWSO2Con EU 2015: Open Source Journey at Ordnance Survey
WSO2Con EU 2015: Open Source Journey at Ordnance Survey
 
Turning search upside down with powerful open source search software
Turning search upside down with powerful open source search softwareTurning search upside down with powerful open source search software
Turning search upside down with powerful open source search software
 
Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)
 
Stanford Ee380
Stanford Ee380Stanford Ee380
Stanford Ee380
 
2nd
2nd2nd
2nd
 
2nd
2nd2nd
2nd
 
Open Data Semantic Web Community Barn Raising
Open Data Semantic Web Community Barn RaisingOpen Data Semantic Web Community Barn Raising
Open Data Semantic Web Community Barn Raising
 

More from Martin von Haller Groenbaek

Joomladay 2014 - Open source licenses
Joomladay 2014 - Open source licensesJoomladay 2014 - Open source licenses
Joomladay 2014 - Open source licenses
Martin von Haller Groenbaek
 
Internet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industryInternet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industry
Martin von Haller Groenbaek
 
Sophienberg 2012 (20 04-2012)
Sophienberg 2012 (20 04-2012) Sophienberg 2012 (20 04-2012)
Sophienberg 2012 (20 04-2012)
Martin von Haller Groenbaek
 
Sophienberg 2012 (19 04-2012)
Sophienberg 2012 (19 04-2012)Sophienberg 2012 (19 04-2012)
Sophienberg 2012 (19 04-2012)
Martin von Haller Groenbaek
 
Making Open Source More Open (23 02-2012)
Making Open Source More Open (23 02-2012)Making Open Source More Open (23 02-2012)
Making Open Source More Open (23 02-2012)
Martin von Haller Groenbaek
 
BAG om Creative Commons (13 01-2012)
BAG om Creative Commons (13 01-2012)BAG om Creative Commons (13 01-2012)
BAG om Creative Commons (13 01-2012)
Martin von Haller Groenbaek
 
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Martin von Haller Groenbaek
 
Going local (08-12-2011)
Going local (08-12-2011)Going local (08-12-2011)
Going local (08-12-2011)
Martin von Haller Groenbaek
 
Åbne Forretningsmodeller ITU (06-12-2011)
Åbne Forretningsmodeller ITU (06-12-2011)Åbne Forretningsmodeller ITU (06-12-2011)
Åbne Forretningsmodeller ITU (06-12-2011)
Martin von Haller Groenbaek
 
Åbne forretningsmodeller TI (30-11-2011)
Åbne forretningsmodeller TI (30-11-2011)Åbne forretningsmodeller TI (30-11-2011)
Åbne forretningsmodeller TI (30-11-2011)
Martin von Haller Groenbaek
 
Sharing is caring (11-11-2011)
Sharing is caring (11-11-2011)Sharing is caring (11-11-2011)
Sharing is caring (11-11-2011)
Martin von Haller Groenbaek
 
Advokaters brug af sociale medier (01 11-2011)
Advokaters brug af sociale medier (01 11-2011)Advokaters brug af sociale medier (01 11-2011)
Advokaters brug af sociale medier (01 11-2011)
Martin von Haller Groenbaek
 
CC UnConvention (08-10-2011)
CC UnConvention (08-10-2011)CC UnConvention (08-10-2011)
CC UnConvention (08-10-2011)
Martin von Haller Groenbaek
 
Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)
Martin von Haller Groenbaek
 
Åbne Forretningsmodeller (31-03-2011)
Åbne Forretningsmodeller (31-03-2011)Åbne Forretningsmodeller (31-03-2011)
Åbne Forretningsmodeller (31-03-2011)
Martin von Haller Groenbaek
 
Creative commons webgrrls (22 02-2011)
Creative commons webgrrls (22 02-2011)Creative commons webgrrls (22 02-2011)
Creative commons webgrrls (22 02-2011)
Martin von Haller Groenbaek
 
Open source i det offentlige (24 11-2010)
Open source i det offentlige (24 11-2010)Open source i det offentlige (24 11-2010)
Open source i det offentlige (24 11-2010)
Martin von Haller Groenbaek
 
Creative commons ebøger etc (02 11-2010)
Creative commons ebøger etc (02 11-2010)Creative commons ebøger etc (02 11-2010)
Creative commons ebøger etc (02 11-2010)
Martin von Haller Groenbaek
 
Creative commons juridisk diskussionsklub (04 11-2010)
Creative commons juridisk diskussionsklub (04 11-2010)Creative commons juridisk diskussionsklub (04 11-2010)
Creative commons juridisk diskussionsklub (04 11-2010)
Martin von Haller Groenbaek
 

More from Martin von Haller Groenbaek (20)

Joomladay 2014 - Open source licenses
Joomladay 2014 - Open source licensesJoomladay 2014 - Open source licenses
Joomladay 2014 - Open source licenses
 
Internet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industryInternet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industry
 
Sophienberg 2012 (20 04-2012)
Sophienberg 2012 (20 04-2012) Sophienberg 2012 (20 04-2012)
Sophienberg 2012 (20 04-2012)
 
Sophienberg 2012 (19 04-2012)
Sophienberg 2012 (19 04-2012)Sophienberg 2012 (19 04-2012)
Sophienberg 2012 (19 04-2012)
 
Making Open Source More Open (23 02-2012)
Making Open Source More Open (23 02-2012)Making Open Source More Open (23 02-2012)
Making Open Source More Open (23 02-2012)
 
BAG om Creative Commons (13 01-2012)
BAG om Creative Commons (13 01-2012)BAG om Creative Commons (13 01-2012)
BAG om Creative Commons (13 01-2012)
 
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
 
Going local (08-12-2011)
Going local (08-12-2011)Going local (08-12-2011)
Going local (08-12-2011)
 
Åbne Forretningsmodeller ITU (06-12-2011)
Åbne Forretningsmodeller ITU (06-12-2011)Åbne Forretningsmodeller ITU (06-12-2011)
Åbne Forretningsmodeller ITU (06-12-2011)
 
Åbne forretningsmodeller TI (30-11-2011)
Åbne forretningsmodeller TI (30-11-2011)Åbne forretningsmodeller TI (30-11-2011)
Åbne forretningsmodeller TI (30-11-2011)
 
Sharing is caring (11-11-2011)
Sharing is caring (11-11-2011)Sharing is caring (11-11-2011)
Sharing is caring (11-11-2011)
 
Advokaters brug af sociale medier (01 11-2011)
Advokaters brug af sociale medier (01 11-2011)Advokaters brug af sociale medier (01 11-2011)
Advokaters brug af sociale medier (01 11-2011)
 
CC UnConvention (08-10-2011)
CC UnConvention (08-10-2011)CC UnConvention (08-10-2011)
CC UnConvention (08-10-2011)
 
IDC Skyen eller Tågen (29-09-2011)
IDC Skyen eller Tågen (29-09-2011)IDC Skyen eller Tågen (29-09-2011)
IDC Skyen eller Tågen (29-09-2011)
 
Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)
 
Åbne Forretningsmodeller (31-03-2011)
Åbne Forretningsmodeller (31-03-2011)Åbne Forretningsmodeller (31-03-2011)
Åbne Forretningsmodeller (31-03-2011)
 
Creative commons webgrrls (22 02-2011)
Creative commons webgrrls (22 02-2011)Creative commons webgrrls (22 02-2011)
Creative commons webgrrls (22 02-2011)
 
Open source i det offentlige (24 11-2010)
Open source i det offentlige (24 11-2010)Open source i det offentlige (24 11-2010)
Open source i det offentlige (24 11-2010)
 
Creative commons ebøger etc (02 11-2010)
Creative commons ebøger etc (02 11-2010)Creative commons ebøger etc (02 11-2010)
Creative commons ebøger etc (02 11-2010)
 
Creative commons juridisk diskussionsklub (04 11-2010)
Creative commons juridisk diskussionsklub (04 11-2010)Creative commons juridisk diskussionsklub (04 11-2010)
Creative commons juridisk diskussionsklub (04 11-2010)
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

Open Source History And Licenses (15 04 2009)

  • 1. Open Source History and Licenses Advokat Martin von Haller Groenbaek Partner, Bender von Haller Dragsted SonyEricsson / Purple Scout, Malmö 2
  • 4. Personalia • Attorney-at-law, Bender von Haller Dragsted • Co-founder, Open Source Vendors Ass. (OSL) 2
  • 5. Personalia • Attorney-at-law, Bender von Haller Dragsted • Co-founder, Open Source Vendors Ass. (OSL) • Co-founder, Creative Commons DK 2
  • 6. Personalia • Attorney-at-law, Bender von Haller Dragsted • Co-founder, Open Source Vendors Ass. (OSL) • Co-founder, Creative Commons DK • Co-founder, Danish Internet Society Chapter 2
  • 7. Personalia • Attorney-at-law, Bender von Haller Dragsted • Co-founder, Open Source Vendors Ass. (OSL) • Co-founder, Creative Commons DK • Co-founder, Danish Internet Society Chapter 2
  • 8. Personalia • Attorney-at-law, Bender von Haller Dragsted • Co-founder, Open Source Vendors Ass. (OSL) • Co-founder, Creative Commons DK • Co-founder, Danish Internet Society Chapter • http://suse.groenbaek.net/openlife 2
  • 9. Personalia • Attorney-at-law, Bender von Haller Dragsted • Co-founder, Open Source Vendors Ass. (OSL) • Co-founder, Creative Commons DK • Co-founder, Danish Internet Society Chapter • http://suse.groenbaek.net/openlife • http://www.linkedin.com/in/vonhaller 2
  • 10. Personalia • Attorney-at-law, Bender von Haller Dragsted • Co-founder, Open Source Vendors Ass. (OSL) • Co-founder, Creative Commons DK • Co-founder, Danish Internet Society Chapter • http://suse.groenbaek.net/openlife • http://www.linkedin.com/in/vonhaller • http://www.23hq.com/mhg 2
  • 11. Personalia • Attorney-at-law, Bender von Haller Dragsted • Co-founder, Open Source Vendors Ass. (OSL) • Co-founder, Creative Commons DK • Co-founder, Danish Internet Society Chapter • http://suse.groenbaek.net/openlife • http://www.linkedin.com/in/vonhaller • http://www.23hq.com/mhg • http://www.facebook.com/profile.php?id=672056156 2
  • 12. Personalia • Attorney-at-law, Bender von Haller Dragsted • Co-founder, Open Source Vendors Ass. (OSL) • Co-founder, Creative Commons DK • Co-founder, Danish Internet Society Chapter • http://suse.groenbaek.net/openlife • http://www.linkedin.com/in/vonhaller • http://www.23hq.com/mhg • http://www.facebook.com/profile.php?id=672056156 2
  • 13. Agenda 3
  • 14. Agenda 3
  • 16. Agenda • The History of FLOSS • Copyright and OSS 3
  • 17. Agenda • The History of FLOSS • Copyright and OSS • Patents and OSS 3
  • 18. Agenda • The History of FLOSS • Copyright and OSS • Patents and OSS • OSS Licenses 3
  • 19. Agenda • The History of FLOSS • Copyright and OSS • Patents and OSS • OSS Licenses • Copyleft 3
  • 20. Agenda • The History of FLOSS • Copyright and OSS • Patents and OSS • OSS Licenses • Copyleft • Business models 3
  • 21. Agenda • The History of FLOSS • Copyright and OSS • Patents and OSS • OSS Licenses • Copyleft • Business models • Cases 3
  • 25. Free Software • Hacker culture • Richard Stallman 5
  • 26. Free Software • Hacker culture • Richard Stallman • Free Software Foundation 5
  • 27. Free Software • Hacker culture • Richard Stallman • Free Software Foundation • Software should be free 5
  • 28. Free Software • Hacker culture • Richard Stallman • Free Software Foundation • Software should be free • GNU “GNU is not Unix” 5
  • 29. Free Software • Hacker culture • Richard Stallman • Free Software Foundation • Software should be free • GNU “GNU is not Unix” • BSD and ATT 5
  • 30. Linux and Open source 6
  • 31. Linux and Open source • Linus Torvalds 6
  • 32. Linux and Open source • Linus Torvalds – Linux released under the GPL v2 6
  • 33. Linux and Open source • Linus Torvalds – Linux released under the GPL v2 • Eric Raymonds 6
  • 34. Linux and Open source • Linus Torvalds – Linux released under the GPL v2 • Eric Raymonds – Cathedral and the Bazaar 6
  • 35. Linux and Open source • Linus Torvalds – Linux released under the GPL v2 • Eric Raymonds – Cathedral and the Bazaar • Bruce Perens 6
  • 36. Linux and Open source • Linus Torvalds – Linux released under the GPL v2 • Eric Raymonds – Cathedral and the Bazaar • Bruce Perens – Open Source Initiative 6
  • 39. OSS and Microsoft • 2002 – Steve Balmer: “Copyright cancer”, “communism” 7
  • 40. OSS and Microsoft • 2002 – Steve Balmer: “Copyright cancer”, “communism” • 2004 7
  • 41. OSS and Microsoft • 2002 – Steve Balmer: “Copyright cancer”, “communism” • 2004 – SCO, Patent threaths, “Beware of infectious GPL” 7
  • 42. OSS and Microsoft • 2002 – Steve Balmer: “Copyright cancer”, “communism” • 2004 – SCO, Patent threaths, “Beware of infectious GPL” • 2008 7
  • 43. OSS and Microsoft • 2002 – Steve Balmer: “Copyright cancer”, “communism” • 2004 – SCO, Patent threaths, “Beware of infectious GPL” • 2008 – Peaceful co-existence, Novell dea 7
  • 46. OSS Business • 1998 – Netscape 8
  • 47. OSS Business • 1998 – Netscape • 1999 8
  • 48. OSS Business • 1998 – Netscape • 1999 – Cygnus 8
  • 49. OSS Business • 1998 – Netscape • 1999 – Cygnus • 2000 8
  • 50. OSS Business • 1998 – Netscape • 1999 – Cygnus • 2000 – VA Linux, RedHat 8
  • 51. OSS Business • 1998 – Netscape • 1999 – Cygnus • 2000 – VA Linux, RedHat • 2005 8
  • 52. OSS Business • 1998 – Netscape • 1999 – Cygnus • 2000 – VA Linux, RedHat • 2005 – IBM, SUN 8
  • 53. OSS Business • 1998 – Netscape • 1999 – Cygnus • 2000 – VA Linux, RedHat • 2005 – IBM, SUN • 2006 8
  • 54. OSS Business • 1998 – Netscape • 1999 – Cygnus • 2000 – VA Linux, RedHat • 2005 – IBM, SUN • 2006 – Purple Scout, Redpill Linpro 8
  • 55. OSS Business • 1998 – Netscape • 1999 – Cygnus • 2000 – VA Linux, RedHat • 2005 – IBM, SUN • 2006 – Purple Scout, Redpill Linpro • 2008 8
  • 56. OSS Business • 1998 – Netscape • 1999 – Cygnus • 2000 – VA Linux, RedHat • 2005 – IBM, SUN • 2006 – Purple Scout, Redpill Linpro • 2008 – MySQL sold to SUN, Symbian 8
  • 57. Names 9
  • 59. Names • Free software • Open source software 9
  • 60. Names • Free software • Open source software • Free Libre Open Source Software 9
  • 61. Names • Free software • Open source software • Free Libre Open Source Software • Copyleft 9
  • 62. Names • Free software • Open source software • Free Libre Open Source Software • Copyleft • Free Software Foundation 9
  • 63. Names • Free software • Open source software • Free Libre Open Source Software • Copyleft • Free Software Foundation • Open Source Initiative 9
  • 65. Free Software ideology • “All software should be free” 10
  • 66. Free Software ideology • “All software should be free” • You get the four freedoms 10
  • 67. Free Software ideology • “All software should be free” • You get the four freedoms • You shall preserve these freedoms 10
  • 68. Free Software ideology • “All software should be free” • You get the four freedoms • You shall preserve these freedoms • So when you redistribute, copyleft secures that the next persons gets the same freedoms 10
  • 70. Open Source principles • Free redistribution 11
  • 71. Open Source principles • Free redistribution • Source code 11
  • 72. Open Source principles • Free redistribution • Source code • Derived work 11
  • 73. Open Source principles • Free redistribution • Source code • Derived work • Integrity of The Author's Source Code 11
  • 74. Open Source principles • Free redistribution • Source code • Derived work • Integrity of The Author's Source Code • 5-10: Non-discrimination 11
  • 75. Copyright The programmer or the producer owns the ● software Property rights are limited ● Copyright is limited in time ● The user is a user not an owner ● The license is an agreement not a law ● The license grants positively defined user ● rights. All residual rights belongs to the licensor ● Without copyright no licenses ●
  • 76. Patents 13
  • 77. Patents • “A set of exclusive rights granted by a state to an inventor or his assignee for a limited period of time in exchange for a disclosure of an invention” 13
  • 78. Patents • “A set of exclusive rights granted by a state to an inventor or his assignee for a limited period of time in exchange for a disclosure of an invention” • FSF: “a patent on any performance of a computer realised by means of a computer programquot; 13
  • 79. Patents • “A set of exclusive rights granted by a state to an inventor or his assignee for a limited period of time in exchange for a disclosure of an invention” • FSF: “a patent on any performance of a computer realised by means of a computer programquot; • Licensor shall not restrict use by patents 13
  • 80. Patents • “A set of exclusive rights granted by a state to an inventor or his assignee for a limited period of time in exchange for a disclosure of an invention” • FSF: “a patent on any performance of a computer realised by means of a computer programquot; • Licensor shall not restrict use by patents • OSS licensee shall not claim patents against licensor or sublicensee 13
  • 81. Licenses 14
  • 82. Licenses • Academic or permissive licenses 14
  • 83. Licenses • Academic or permissive licenses – Apache License v2 14
  • 84. Licenses • Academic or permissive licenses – Apache License v2 – MIT License 14
  • 85. Licenses • Academic or permissive licenses – Apache License v2 – MIT License – New BSD license 14
  • 86. Licenses • Academic or permissive licenses – Apache License v2 – MIT License – New BSD license • Copyleft, reciprocal or hereditary licences 14
  • 87. Licenses • Academic or permissive licenses – Apache License v2 – MIT License – New BSD license • Copyleft, reciprocal or hereditary licences – Weak copyleft 14
  • 88. Licenses • Academic or permissive licenses – Apache License v2 – MIT License – New BSD license • Copyleft, reciprocal or hereditary licences – Weak copyleft • Artistic license v1 14
  • 89. Licenses • Academic or permissive licenses – Apache License v2 – MIT License – New BSD license • Copyleft, reciprocal or hereditary licences – Weak copyleft • Artistic license v1 • Eclipse Public License 14
  • 90. Licenses • Academic or permissive licenses – Apache License v2 – MIT License – New BSD license • Copyleft, reciprocal or hereditary licences – Weak copyleft • Artistic license v1 • Eclipse Public License • Mozilla Public License v.1.1 14
  • 91. Licenses • Academic or permissive licenses – Apache License v2 – MIT License – New BSD license • Copyleft, reciprocal or hereditary licences – Weak copyleft • Artistic license v1 • Eclipse Public License • Mozilla Public License v.1.1 – Strong copyleft 14
  • 92. Licenses • Academic or permissive licenses – Apache License v2 – MIT License – New BSD license • Copyleft, reciprocal or hereditary licences – Weak copyleft • Artistic license v1 • Eclipse Public License • Mozilla Public License v.1.1 – Strong copyleft • GNU GPL v1 and v2 14
  • 93. Licenses • Academic or permissive licenses – Apache License v2 – MIT License – New BSD license • Copyleft, reciprocal or hereditary licences – Weak copyleft • Artistic license v1 • Eclipse Public License • Mozilla Public License v.1.1 – Strong copyleft • GNU GPL v1 and v2 • GNU LGPL v1 and v2 14
  • 94. Copyleft - the basics 15
  • 95. Copyleft - the basics • You don’t have to redistribute or distribute 15
  • 96. Copyleft - the basics • You don’t have to redistribute or distribute • (Exception: “written offer valid for any third party” in GPL, v. 2) 15
  • 97. Copyleft - the basics • You don’t have to redistribute or distribute • (Exception: “written offer valid for any third party” in GPL, v. 2) • Comply or cease use, or call back distribution 15
  • 98. Copyleft - the basics • You don’t have to redistribute or distribute • (Exception: “written offer valid for any third party” in GPL, v. 2) • Comply or cease use, or call back distribution • Make combined program, including modifications and otherwise closed code available under GPL (or compatible licens) 15
  • 100. Derivative work • A work based on one or more pre- existing works 16
  • 101. Derivative work • A work based on one or more pre- existing works • Improvement, translation, correction 16
  • 102. Derivative work • A work based on one or more pre- existing works • Improvement, translation, correction • Not collective work 16
  • 103. Derivative work • A work based on one or more pre- existing works • Improvement, translation, correction • Not collective work • Modifications are copyrighted themselves 16
  • 104. Derivative work • A work based on one or more pre- existing works • Improvement, translation, correction • Not collective work • Modifications are copyrighted themselves • Very few court cases 16
  • 105. Derivative work • A work based on one or more pre- existing works • Improvement, translation, correction • Not collective work • Modifications are copyrighted themselves • Very few court cases • GPL: Combinations 16
  • 106. Combination 17
  • 107. Combination • Combination of code into a whole 17
  • 108. Combination • Combination of code into a whole • NB: All combinations are permitted and “private” combinations have no restrictions 17
  • 109. Combination • Combination of code into a whole • NB: All combinations are permitted and “private” combinations have no restrictions • Mechanism of communication 17
  • 110. Combination • Combination of code into a whole • NB: All combinations are permitted and “private” combinations have no restrictions • Mechanism of communication • Semantics of the communication 17
  • 111. Combination • Combination of code into a whole • NB: All combinations are permitted and “private” combinations have no restrictions • Mechanism of communication • Semantics of the communication • Output not covered 17
  • 112. Combination • Combination of code into a whole • NB: All combinations are permitted and “private” combinations have no restrictions • Mechanism of communication • Semantics of the communication • Output not covered • (Exc: GPL program copies text into output) 17
  • 113. Combination • Combination of code into a whole • NB: All combinations are permitted and “private” combinations have no restrictions • Mechanism of communication • Semantics of the communication • Output not covered • (Exc: GPL program copies text into output) • Output of language interpreter 17
  • 114. Combination • Combination of code into a whole • NB: All combinations are permitted and “private” combinations have no restrictions • Mechanism of communication • Semantics of the communication • Output not covered • (Exc: GPL program copies text into output) • Output of language interpreter • (Exc: “bindings” interpreter to program) 17
  • 115. Combination • Combination of code into a whole • NB: All combinations are permitted and “private” combinations have no restrictions • Mechanism of communication • Semantics of the communication • Output not covered • (Exc: GPL program copies text into output) • Output of language interpreter • (Exc: “bindings” interpreter to program) • Library is under GPL, program is not 17
  • 116. Combination • Combination of code into a whole • NB: All combinations are permitted and “private” combinations have no restrictions • Mechanism of communication • Semantics of the communication • Output not covered • (Exc: GPL program copies text into output) • Output of language interpreter • (Exc: “bindings” interpreter to program) • Library is under GPL, program is not • Program is under GPL, module is not 17
  • 118. Combination cont. • CMS Templates 18
  • 119. Combination cont. • CMS Templates – Exc: Javascript calls 18
  • 120. Combination cont. • CMS Templates – Exc: Javascript calls • Microsoft Visual C++ (or Visual Basic) DLLs 18
  • 121. Combination cont. • CMS Templates – Exc: Javascript calls • Microsoft Visual C++ (or Visual Basic) DLLs • Plug-ins under a GPL program 18
  • 122. Combination cont. • CMS Templates – Exc: Javascript calls • Microsoft Visual C++ (or Visual Basic) DLLs • Plug-ins under a GPL program – dynamically linked plug-ins 18
  • 123. Combination cont. • CMS Templates – Exc: Javascript calls • Microsoft Visual C++ (or Visual Basic) DLLs • Plug-ins under a GPL program – dynamically linked plug-ins – fork and exec to invoke plug-ins 18
  • 124. Combination cont. • CMS Templates – Exc: Javascript calls • Microsoft Visual C++ (or Visual Basic) DLLs • Plug-ins under a GPL program – dynamically linked plug-ins – fork and exec to invoke plug-ins • System library exception 18
  • 125. Combination cont. • CMS Templates – Exc: Javascript calls • Microsoft Visual C++ (or Visual Basic) DLLs • Plug-ins under a GPL program – dynamically linked plug-ins – fork and exec to invoke plug-ins • System library exception • Aggregate work is not combined work 18
  • 126. Combination cont. • CMS Templates – Exc: Javascript calls • Microsoft Visual C++ (or Visual Basic) DLLs • Plug-ins under a GPL program – dynamically linked plug-ins – fork and exec to invoke plug-ins • System library exception • Aggregate work is not combined work • Linking exception 18
  • 127. Combination cont. • CMS Templates – Exc: Javascript calls • Microsoft Visual C++ (or Visual Basic) DLLs • Plug-ins under a GPL program – dynamically linked plug-ins – fork and exec to invoke plug-ins • System library exception • Aggregate work is not combined work • Linking exception • LGPL allows linking to closed applications 18
  • 128. Combination cont. • CMS Templates – Exc: Javascript calls • Microsoft Visual C++ (or Visual Basic) DLLs • Plug-ins under a GPL program – dynamically linked plug-ins – fork and exec to invoke plug-ins • System library exception • Aggregate work is not combined work • Linking exception • LGPL allows linking to closed applications – Java archive files 18
  • 130. Distribution • GPL v2: Distribution 19
  • 131. Distribution • GPL v2: Distribution • GPL v3: Propagation and Conveyance 19
  • 132. Distribution • GPL v2: Distribution • GPL v3: Propagation and Conveyance • In soft- and hardware 19
  • 133. Distribution • GPL v2: Distribution • GPL v3: Propagation and Conveyance • In soft- and hardware • ASP loophole og network exception 19
  • 134. Distribution • GPL v2: Distribution • GPL v3: Propagation and Conveyance • In soft- and hardware • ASP loophole og network exception • Affero Public License 19
  • 135. Distribution • GPL v2: Distribution • GPL v3: Propagation and Conveyance • In soft- and hardware • ASP loophole og network exception • Affero Public License • Contractors on/off-site 19
  • 136. Distribution • GPL v2: Distribution • GPL v3: Propagation and Conveyance • In soft- and hardware • ASP loophole og network exception • Affero Public License • Contractors on/off-site • Outsourcing 19
  • 137. Distribution • GPL v2: Distribution • GPL v3: Propagation and Conveyance • In soft- and hardware • ASP loophole og network exception • Affero Public License • Contractors on/off-site • Outsourcing • Mergers and Acquisitions 19
  • 138. Distribution • GPL v2: Distribution • GPL v3: Propagation and Conveyance • In soft- and hardware • ASP loophole og network exception • Affero Public License • Contractors on/off-site • Outsourcing • Mergers and Acquisitions • Let recipient download the GPL’ed code 19
  • 139. Distribution • GPL v2: Distribution • GPL v3: Propagation and Conveyance • In soft- and hardware • ASP loophole og network exception • Affero Public License • Contractors on/off-site • Outsourcing • Mergers and Acquisitions • Let recipient download the GPL’ed code 19
  • 140. Distribution • GPL v2: Distribution • GPL v3: Propagation and Conveyance • In soft- and hardware • ASP loophole og network exception • Affero Public License • Contractors on/off-site • Outsourcing • Mergers and Acquisitions • Let recipient download the GPL’ed code 19
  • 141. Escapes 20
  • 142. Escapes • Make deal with licensor 20
  • 143. Escapes • Make deal with licensor • Replace code 20
  • 144. Escapes • Make deal with licensor • Replace code • Work around 20
  • 145. Escapes • Make deal with licensor • Replace code • Work around • GPL v3, sec. 8 20
  • 146. Escapes • Make deal with licensor • Replace code • Work around • GPL v3, sec. 8 – Termination notice 20
  • 147. Escapes • Make deal with licensor • Replace code • Work around • GPL v3, sec. 8 – Termination notice • NDA: Developer can agree not to release changes at all 20
  • 148. Escapes • Make deal with licensor • Replace code • Work around • GPL v3, sec. 8 – Termination notice • NDA: Developer can agree not to release changes at all • NDA: Developer can agree only to release changes to customer 20
  • 149. Enforcement 21
  • 150. Enforcement • The GPL is enforceable! 21
  • 151. Enforcement • The GPL is enforceable! – Germany 2004: Netfilter/Iptables; 2006: D-Link 21
  • 152. Enforcement • The GPL is enforceable! – Germany 2004: Netfilter/Iptables; 2006: D-Link – US 2007: BusyBox; 2008: Jacobsen vs. Katzer 21
  • 153. Enforcement • The GPL is enforceable! – Germany 2004: Netfilter/Iptables; 2006: D-Link – US 2007: BusyBox; 2008: Jacobsen vs. Katzer – SCO 21
  • 154. Enforcement • The GPL is enforceable! – Germany 2004: Netfilter/Iptables; 2006: D-Link – US 2007: BusyBox; 2008: Jacobsen vs. Katzer – SCO • Copyright holder 21
  • 155. Enforcement • The GPL is enforceable! – Germany 2004: Netfilter/Iptables; 2006: D-Link – US 2007: BusyBox; 2008: Jacobsen vs. Katzer – SCO • Copyright holder • Licensee 21
  • 156. Enforcement • The GPL is enforceable! – Germany 2004: Netfilter/Iptables; 2006: D-Link – US 2007: BusyBox; 2008: Jacobsen vs. Katzer – SCO • Copyright holder • Licensee • GPL-VIOLATIONS.ORG 21
  • 157. Damages 22
  • 159. Damages • Compensation under copyright • No penal damages or stipulated damages 22
  • 160. Damages • Compensation under copyright • No penal damages or stipulated damages • Economic loss suffered by licensor 22
  • 161. Damages • Compensation under copyright • No penal damages or stipulated damages • Economic loss suffered by licensor • Rule of thumb: 2 x license fee 22
  • 162. Damages • Compensation under copyright • No penal damages or stipulated damages • Economic loss suffered by licensor • Rule of thumb: 2 x license fee • Injunction 22
  • 163. Damages • Compensation under copyright • No penal damages or stipulated damages • Economic loss suffered by licensor • Rule of thumb: 2 x license fee • Injunction • Legal fees 22
  • 165. Business models • Dual licensing 23
  • 166. Business models • Dual licensing – Warranties 23
  • 167. Business models • Dual licensing – Warranties – Copyleft exemptions 23
  • 168. Business models • Dual licensing – Warranties – Copyleft exemptions • Services 23
  • 169. Business models • Dual licensing – Warranties – Copyleft exemptions • Services – Warranties 23
  • 170. Business models • Dual licensing – Warranties – Copyleft exemptions • Services – Warranties – Support and maintenance 23
  • 171. Business models • Dual licensing – Warranties – Copyleft exemptions • Services – Warranties – Support and maintenance – Consultancy 23
  • 172. Business models • Dual licensing – Warranties – Copyleft exemptions • Services – Warranties – Support and maintenance – Consultancy – Accesories 23
  • 173. Business models • Dual licensing – Warranties – Copyleft exemptions • Services – Warranties – Support and maintenance – Consultancy – Accesories • Marketing and distribution 23
  • 174. Business models • Dual licensing – Warranties – Copyleft exemptions • Services – Warranties – Support and maintenance – Consultancy – Accesories • Marketing and distribution • Hardware sales 23
  • 177. LEGO goes open source
  • 178. LEGO goes open source 1 May 2006. LEGO press release Hackers, Get Ready! LEGO Group Announces Open Source Firmware, Developer Kits for LEGO® MINDSTORMS® NXT Consumer-directed robotics experience creation to enter “NXT” phase with open firmware, Software, Hardware and Bluetooth Developer Kits to launch in August
  • 180. Background Mindstorms robots launched in 1998 ●
  • 181. Background Mindstorms robots launched in 1998 ● The best-selling LEGO product ever ●
  • 182. Background Mindstorms robots launched in 1998 ● The best-selling LEGO product ever ● Huge Mindstorm community ●
  • 183. Background Mindstorms robots launched in 1998 ● The best-selling LEGO product ever ● Huge Mindstorm community ● LEGO was and is not a software ● company
  • 184. Background Mindstorms robots launched in 1998 ● The best-selling LEGO product ever ● Huge Mindstorm community ● LEGO was and is not a software ● company Only minor upgrades to the firmware ●
  • 185. Background Mindstorms robots launched in 1998 ● The best-selling LEGO product ever ● Huge Mindstorm community ● LEGO was and is not a software ● company Only minor upgrades to the firmware ● Several parallel Mindstorms OS’s ●
  • 187. Challenges LEGO was not comfortable with “openess” ●
  • 188. Challenges LEGO was not comfortable with “openess” ● LEGO has been and is extremely reliant ● on strong IPRs
  • 189. Challenges LEGO was not comfortable with “openess” ● LEGO has been and is extremely reliant ● on strong IPRs ”You don't give away IPRs for free” ●
  • 190. Challenges LEGO was not comfortable with “openess” ● LEGO has been and is extremely reliant ● on strong IPRs ”You don't give away IPRs for free” ● Turbulent period for LEGO in general ●
  • 191. Challenges LEGO was not comfortable with “openess” ● LEGO has been and is extremely reliant ● on strong IPRs ”You don't give away IPRs for free” ● Turbulent period for LEGO in general ● Third party software included ●
  • 193. Solution Embrace User driven innovation ●
  • 194. Solution Embrace User driven innovation ● Open source as the enabler ●
  • 195. Solution Embrace User driven innovation ● Open source as the enabler ● Third party permission for ● redistribution under an OS license
  • 196. Solution Embrace User driven innovation ● Open source as the enabler ● Third party permission for ● redistribution under an OS license Choice of license ●
  • 197. Solution Embrace User driven innovation ● Open source as the enabler ● Third party permission for ● redistribution under an OS license Choice of license ● ”Genuine” open source licence −
  • 198. Solution Embrace User driven innovation ● Open source as the enabler ● Third party permission for ● redistribution under an OS license Choice of license ● ”Genuine” open source licence − Permissive (Academic) or Copyleft − (reciprocal license)
  • 199. The OS license choice 29
  • 200. The OS license choice Mozilla Public license v. 1.1 ● 29
  • 201. The OS license choice Mozilla Public license v. 1.1 ● Weak copyleft ● 29
  • 202. The OS license choice Mozilla Public license v. 1.1 ● Weak copyleft ● Modification is limited altering ● the files 29
  • 203. The OS license choice Mozilla Public license v. 1.1 ● Weak copyleft ● Modification is limited altering ● the files “I did not understand GPL v.2” ● 29
  • 204. The OS license choice Mozilla Public license v. 1.1 ● Weak copyleft ● Modification is limited altering ● the files “I did not understand GPL v.2” ● LEGO was only concerned with ● modifications of the actual files 29
  • 205. The “beauty” of the solution! 30
  • 206. The “beauty” of the solution! • Huge press coverage and goodwill 30
  • 207. The “beauty” of the solution! • Huge press coverage and goodwill • Large number of downloads of code 30
  • 208. The “beauty” of the solution! • Huge press coverage and goodwill • Large number of downloads of code • Much more “intelligence” in the bricks 30
  • 209. The “beauty” of the solution! • Huge press coverage and goodwill • Large number of downloads of code • Much more “intelligence” in the bricks • Convincing strategy towards competitors 30
  • 210. The “beauty” of the solution! • Huge press coverage and goodwill • Large number of downloads of code • Much more “intelligence” in the bricks • Convincing strategy towards competitors • Option to “close” the code again 30
  • 211. The “beauty” of the solution! • Huge press coverage and goodwill • Large number of downloads of code • Much more “intelligence” in the bricks • Convincing strategy towards competitors • Option to “close” the code again • Many more bricks sold! 30
  • 213. CASE: MySQL Dual-licensing • The software company perspective 31
  • 214. CASE: MySQL Dual-licensing • The software company perspective • The same code is licensed under two different licences: 31
  • 215. CASE: MySQL Dual-licensing • The software company perspective • The same code is licensed under two different licences: – MySQL Community Server: GPL v. 2 with FOSS exception 31
  • 216. CASE: MySQL Dual-licensing • The software company perspective • The same code is licensed under two different licences: – MySQL Community Server: GPL v. 2 with FOSS exception – MySQL Enterprise: Commercial license 31
  • 218. Owner's prerogative The owner can decide to release under ● any and as many terms she likes
  • 219. Owner's prerogative The owner can decide to release under ● any and as many terms she likes Dual licensing is only possible for ● owner's own modfications
  • 220. Owner's prerogative The owner can decide to release under ● any and as many terms she likes Dual licensing is only possible for ● owner's own modfications Or assigned modifications ●
  • 221. Owner's prerogative The owner can decide to release under ● any and as many terms she likes Dual licensing is only possible for ● owner's own modfications Or assigned modifications ● Control is necessary to mitigate liability ●
  • 222. Owner's prerogative The owner can decide to release under ● any and as many terms she likes Dual licensing is only possible for ● owner's own modfications Or assigned modifications ● Control is necessary to mitigate liability ● ”Closing in” the code again ●
  • 224. Copyright and control • MySQL has exclusive copyright to the code 33
  • 225. Copyright and control • MySQL has exclusive copyright to the code • MySQL controls and certifies the code 33
  • 226. Copyright and control • MySQL has exclusive copyright to the code • MySQL controls and certifies the code • The GPL does not give any rights to use MySQLs trademarks 33
  • 227. Why pay? 34
  • 228. Why pay? • Certification of the code 34
  • 229. Why pay? • Certification of the code • Warranties 34
  • 230. Why pay? • Certification of the code • Warranties • Maintenance and support 34
  • 231. Why pay? • Certification of the code • Warranties • Maintenance and support • Copyleft exemption 34
  • 233. Still not convinced? • MySQL AB was in 2008 bought by Sun Microsystem, Inc. for approximately USD $1 billion in total consideration 35
  • 234. CASE: NITA 36
  • 235. CASE: NITA • Danish National IT and Telecom Agency 36
  • 236. CASE: NITA • Danish National IT and Telecom Agency • eFaktura (eInvoice) 36
  • 237. CASE: NITA • Danish National IT and Telecom Agency • eFaktura (eInvoice) • Electronic invoices to, from and between public agencies 36
  • 238. CASE: NITA • Danish National IT and Telecom Agency • eFaktura (eInvoice) • Electronic invoices to, from and between public agencies • Core service: UDDI registry for webservice to identify senders and receivers 36
  • 239. Challenges 37
  • 240. Challenges • Two applications provided by NITA to user (e.g. ERP vendors) 37
  • 241. Challenges • Two applications provided by NITA to user (e.g. ERP vendors) • API between users’ ERPs and UDDI WS 37
  • 242. Challenges • Two applications provided by NITA to user (e.g. ERP vendors) • API between users’ ERPs and UDDI WS • Reference implementation integrating API with ERP 37
  • 243. Challenges • Two applications provided by NITA to user (e.g. ERP vendors) • API between users’ ERPs and UDDI WS • Reference implementation integrating API with ERP • NITA wanted to release the application under an OS license 37
  • 244. Goals 38
  • 245. Goals • Satisfying the politicians 38
  • 246. Goals • Satisfying the politicians • Wide adoption of UDDI 38
  • 247. Goals • Satisfying the politicians • Wide adoption of UDDI • Community based improvement of the API 38
  • 248. Goals • Satisfying the politicians • Wide adoption of UDDI • Community based improvement of the API • Many vendors should integrate API into their ERP 38
  • 249. Solutions 39
  • 251. Solutions • API – Copyleft 39
  • 252. Solutions • API – Copyleft – Mozilla public license v. 1.1 (maybe EUPL v. 1.1) 39
  • 253. Solutions • API – Copyleft – Mozilla public license v. 1.1 (maybe EUPL v. 1.1) • Reference implementation 39
  • 254. Solutions • API – Copyleft – Mozilla public license v. 1.1 (maybe EUPL v. 1.1) • Reference implementation – Permissive licence 39
  • 255. Solutions • API – Copyleft – Mozilla public license v. 1.1 (maybe EUPL v. 1.1) • Reference implementation – Permissive licence – FreeBSD license 39

Editor's Notes

  1. Ad pind 1) Hvad kræver persondataloven? Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
  2. Ad pind 1) Hvad kræver persondataloven? Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
  3. Ad pind 1) Hvad kræver persondataloven? Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
  4. Ad pind 1) Hvad kræver persondataloven? Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
  5. Ad pind 1) Hvad kræver persondataloven? Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
  6. Ad pind 1) Hvad kræver persondataloven? Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
  7. Ad pind 1) Hvad kræver persondataloven? Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
  8. Ad pind 1) Hvad kræver persondataloven? Ad pind 2) Og hvad hvis det er en medarbejder, som har oprettet profilen for virksomheden?
  9. If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program. By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program. SYSTEM LIBRARIES However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
  10. If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program. By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program. SYSTEM LIBRARIES However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
  11. If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program. By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program. SYSTEM LIBRARIES However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
  12. If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program. By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program. SYSTEM LIBRARIES However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
  13. If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program. By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program. SYSTEM LIBRARIES However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
  14. If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program. By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program. SYSTEM LIBRARIES However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
  15. If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program. By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program. SYSTEM LIBRARIES However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
  16. If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program. By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program. SYSTEM LIBRARIES However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
  17. If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program. By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program. SYSTEM LIBRARIES However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
  18. If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program. By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program. SYSTEM LIBRARIES However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
  19. If the modules are included in the same executable file, they are definitely combined in one program. If modules are designed to run linked together in a shared address space, that almost surely means combining them into one program. By contrast, pipes, sockets and command-line arguments are communication mechanisms normally used between two separate programs. So when they are used for communication, the modules normally are separate programs. But if the semantics of the communication are intimate enough, exchanging complex internal data structures, that too could be a basis to consider the two parts as combined into a larger program. SYSTEM LIBRARIES However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.