SlideShare a Scribd company logo
LA-UR 11-04994




                       Leveraging Software Disclosures
                         into Licensable Technologies


                                                                 Aaron G. Sauers
                                             Technology Transfer Division
                                         Los Alamos National Laboratory




                                                                            UNCLASSIFIED     Slide 1

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA



Wednesday, September 28, 2011
LA-UR 11-04994


    Agenda
             What is a copyright?
             Copyright Disclosure information capture
             Decision criteria
             Diligence: License compatibility
             Should we license?
             Passive marketing
             Active marketing
             Exclusive / Multiple non-exclusive
             Exclusive licensing
             Preparing principal investigators



                                                                            UNCLASSIFIED     Slide 2

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA



Wednesday, September 28, 2011
LA-UR 11-04994


    What is a Copyright?


              Copyright protection subsists….in original works of authorship
              fixed in any tangible medium of expression …..otherwise
              communicated, either directly or with the aid of a machine or
              device. (17 U.S.C. §102)
              • Applicable for:
                 — Software

                 — Schematics/drawings
                 — Firmware

                 — Publications (technical/journal articles, etc.)




                                                                            UNCLASSIFIED     Slide 3

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA



Wednesday, September 28, 2011
LA-UR 11-04994


    Copyright Disclosure Information Capture
             Abstract (functionality)
              •      Why was this developed? Is this not available commercially? What does it do?
              •      Technology Maturity (is there a Graphic User Interface?)
             Authorship
              •      Internal Authors? Collaboration across internal divisions?
              •      External Authors?
                     —   Commercial, Open Source, Collaboration across National Laboratories?
              •      Intended Distribution? (Policy versus Practical Considerations)
                     —   Controlled?
                     —   Open?
                             •     Open Source? (GPL, LGPL, BSD, etc.)
                             •     Publicly Available?
              •      Assert Copyright as a Gov. Owned Contractor Operated (GOCO) lab?
                     —  Open Source Software?
                     —  Commercial?


                                                                            UNCLASSIFIED            Slide 4

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA



Wednesday, September 28, 2011
LA-UR 11-04994


    Decision Criteria
             Are there pre-existing License Requirements?
              • Open Source Software? (GPL, LGPL, BSD, etc.?)
              • 3rd Party Contributions?
                — Royalty Sharing Agreement in place?

              • Are there reach-through license requirements stemming from the
                compiler?
              • Multi-Lab Collaboration Incorporating GOGOs?
                — Is there an IP Management Agreement?

                — Partnership intermediary?

              • Are There Related Patents?




                                                                            UNCLASSIFIED     Slide 5

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA



Wednesday, September 28, 2011
LA-UR 11-04994


    Diligence: License Compatibility




     http://www.dwheeler.com/essays/floss-license-slide.html


                                                                            UNCLASSIFIED     Slide 6

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA



Wednesday, September 28, 2011
LA-UR 11-04994


    License Compatibility (continued)
             Take note of the compiler(s) your PIs are using
              •      Compilers turn human-readable (source) code into executable (target) code
              •      Most compilers combine portions of certain header files and runtime libraries with
                     the compiled program. As a result, the compiled code is technically a derivative
                     work of the compiler
              •      Take care to read the license language associated with any compilers that were
                     used
             There are several popular GPL open source compilers
              •      Target code produced using an open source compiler could inherit a viral license
              •      Some of these open source compilers, such as G95, contain exceptions that allow
                     you to propagate derivative works in cases that would otherwise violate the terms
                     of the GPL license: e.g. GCC Runtime Library Exception, GNU Classpath, etc.
             Some commercial compilers contain reach-through requirements
              •      Absoft requires execution of an “Absoft Runtime Redistribution License” prior to
                     distribution of compressed works


                                                                            UNCLASSIFIED            Slide 7

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA



Wednesday, September 28, 2011
LA-UR 11-04994


    Should we License?
             Market Value
              • Smaller cost of protection of copyright versus patent; thus, multiple
                non-exclusive agreements often make good business sense
              • The smaller capital outlay required for software makes arms-
                length, transactional management of codes a viable
                commercialization option, whereas patents are almost always
                strategic
             Laboratory Brand Recognition
             Can we Build a Laboratory Capability?
             Can we Bring an Author or Division into the TT Network?
              • Author self-selection helps



                                                                            UNCLASSIFIED     Slide 8

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA



Wednesday, September 28, 2011
LA-UR 11-04994


    Passive Marketing
     Hosted on LANL webpage
     Minimal effort— Title, Abstract,
     Tracking Number
     Meets Fairness Of Opportunity
     (FOO) Requirements
     Gives authors a place to direct
     colleagues to demonstrate their
     code developments
     TT receives 20-30 inquiries
     annually as a result of this
     passive marketing




                                                                            UNCLASSIFIED     Slide 9

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA



Wednesday, September 28, 2011
LA-UR 11-04994


    Active Marketing
     Moderate   effort— a
     more targeted
     approach to marketing
     May be technology-
     specific or a broad
     capability description
     for Sponsored
     Research (CRADA or
     WFO opportunity)
     Serves as a nice pre-
     phone call marketing
     element



                                                                            UNCLASSIFIED     Slide 10

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA



Wednesday, September 28, 2011
LA-UR 11-04994


    Exclusive / Multiple Non-exclusive
     For reduced-functionality
     executable codes
     Best suited for mature, user-
     friendly software
     Facilitates collection of basic
     market information
     Builds a user community to
     promote software adoption
     Easily builds brand
     recognition with hassle-free
     download                                                                                For Executables Only




                                                                            UNCLASSIFIED                            Slide 11

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA



Wednesday, September 28, 2011
LA-UR 11-04994


    Commercialization Workshop
     Strategic               licensing
     Appropriate  for
     exclusive licensing in
     defined fields of use
     Best suited for portfolios
     of technologies including
     software




                                                                            UNCLASSIFIED     Slide 12

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA



Wednesday, September 28, 2011
LA-UR 11-04994


    Prepare your Principal Investigators
             The PI is the strongest advocate for the technology. By preparing
              software authors prior to presentations and publications, you leverage
              word-of-mouth marketing within the author’s peer groups
             This can help you find technical champions within potential licensees’
              organizations (in some cases they will even reach out to TT)




                                                                            UNCLASSIFIED     Slide 13

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA



Wednesday, September 28, 2011
Questions?

            Aaron G. Sauers
            Technology Transfer
            Los Alamos National Laboratory
            505-665-0132
            asauers@lanl.gov




                                                                            UNCLASSIFIED     Slide 14

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA



Wednesday, September 28, 2011

More Related Content

Similar to Leveraging software disclosures into licensable technologies

An Open Source Case Study
An Open Source Case StudyAn Open Source Case Study
An Open Source Case Study
webhostingguy
 
Riak Use Cases : Dissecting The Solutions To Hard Problems
Riak Use Cases : Dissecting The Solutions To Hard ProblemsRiak Use Cases : Dissecting The Solutions To Hard Problems
Riak Use Cases : Dissecting The Solutions To Hard Problems
Andy Gross
 
Open source software licenses
Open source software licensesOpen source software licenses
Open source software licenses
DrexelELC
 
Is Exascale the End of the Line for Commodity Networks?
Is Exascale the End of the Line for Commodity Networks?Is Exascale the End of the Line for Commodity Networks?
Is Exascale the End of the Line for Commodity Networks?
Scott Pakin
 
Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...
Rogue Wave Software
 
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Splunk
 
Open Source Training
Open Source Training Open Source Training
Open Source Training
GovLoop
 
Open Source vs Proprietary
Open Source vs ProprietaryOpen Source vs Proprietary
Open Source vs Proprietary
M. Antoinette Jerom
 
Harnessing the Power of the Cloud Part 1
Harnessing the Power of the Cloud Part 1Harnessing the Power of the Cloud Part 1
Harnessing the Power of the Cloud Part 1
GovLoop
 
SolarWinds Log & Event Manager vs Splunk. What's the Difference?
SolarWinds Log & Event Manager vs Splunk. What's the Difference?SolarWinds Log & Event Manager vs Splunk. What's the Difference?
SolarWinds Log & Event Manager vs Splunk. What's the Difference?
SolarWinds
 
SplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - Interac
Splunk
 
System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...
System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...
System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...
Amazon Web Services
 
Opensource Presentation
Opensource PresentationOpensource Presentation
Opensource Presentation
Sarah Cortes
 
LCE13: Closing Keynote: David Rusling
LCE13: Closing Keynote: David RuslingLCE13: Closing Keynote: David Rusling
LCE13: Closing Keynote: David Rusling
Linaro
 
Folt - Open TMS - A presentation for universities
Folt - Open TMS - A presentation for universitiesFolt - Open TMS - A presentation for universities
Folt - Open TMS - A presentation for universities
Klemens Waldhör
 
Merit Event - Open Your Mind To Open Source Software
Merit Event - Open Your Mind To Open Source SoftwareMerit Event - Open Your Mind To Open Source Software
Merit Event - Open Your Mind To Open Source Software
meritnorthwest
 
Mark Logic Digital Publishing Summit, Kellogg
Mark Logic Digital Publishing Summit, KelloggMark Logic Digital Publishing Summit, Kellogg
Mark Logic Digital Publishing Summit, Kellogg
Dave Kellogg
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
itdepartmentkct
 
Erlang os
Erlang osErlang os
Erlang os
Pinche12345
 
Open source software 101: Compliance and risk management
Open source software 101: Compliance and risk managementOpen source software 101: Compliance and risk management
Open source software 101: Compliance and risk management
Osler, Hoskin & Harcourt LLP
 

Similar to Leveraging software disclosures into licensable technologies (20)

An Open Source Case Study
An Open Source Case StudyAn Open Source Case Study
An Open Source Case Study
 
Riak Use Cases : Dissecting The Solutions To Hard Problems
Riak Use Cases : Dissecting The Solutions To Hard ProblemsRiak Use Cases : Dissecting The Solutions To Hard Problems
Riak Use Cases : Dissecting The Solutions To Hard Problems
 
Open source software licenses
Open source software licensesOpen source software licenses
Open source software licenses
 
Is Exascale the End of the Line for Commodity Networks?
Is Exascale the End of the Line for Commodity Networks?Is Exascale the End of the Line for Commodity Networks?
Is Exascale the End of the Line for Commodity Networks?
 
Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...
 
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
 
Open Source Training
Open Source Training Open Source Training
Open Source Training
 
Open Source vs Proprietary
Open Source vs ProprietaryOpen Source vs Proprietary
Open Source vs Proprietary
 
Harnessing the Power of the Cloud Part 1
Harnessing the Power of the Cloud Part 1Harnessing the Power of the Cloud Part 1
Harnessing the Power of the Cloud Part 1
 
SolarWinds Log & Event Manager vs Splunk. What's the Difference?
SolarWinds Log & Event Manager vs Splunk. What's the Difference?SolarWinds Log & Event Manager vs Splunk. What's the Difference?
SolarWinds Log & Event Manager vs Splunk. What's the Difference?
 
SplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - Interac
 
System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...
System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...
System z Mainframe Data with Amazon S3 and Amazon Glacier (ENT107) | AWS re:I...
 
Opensource Presentation
Opensource PresentationOpensource Presentation
Opensource Presentation
 
LCE13: Closing Keynote: David Rusling
LCE13: Closing Keynote: David RuslingLCE13: Closing Keynote: David Rusling
LCE13: Closing Keynote: David Rusling
 
Folt - Open TMS - A presentation for universities
Folt - Open TMS - A presentation for universitiesFolt - Open TMS - A presentation for universities
Folt - Open TMS - A presentation for universities
 
Merit Event - Open Your Mind To Open Source Software
Merit Event - Open Your Mind To Open Source SoftwareMerit Event - Open Your Mind To Open Source Software
Merit Event - Open Your Mind To Open Source Software
 
Mark Logic Digital Publishing Summit, Kellogg
Mark Logic Digital Publishing Summit, KelloggMark Logic Digital Publishing Summit, Kellogg
Mark Logic Digital Publishing Summit, Kellogg
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
Erlang os
Erlang osErlang os
Erlang os
 
Open source software 101: Compliance and risk management
Open source software 101: Compliance and risk managementOpen source software 101: Compliance and risk management
Open source software 101: Compliance and risk management
 

Recently uploaded

Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 

Recently uploaded (20)

Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 

Leveraging software disclosures into licensable technologies

  • 1. LA-UR 11-04994 Leveraging Software Disclosures into Licensable Technologies Aaron G. Sauers Technology Transfer Division Los Alamos National Laboratory UNCLASSIFIED Slide 1 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA Wednesday, September 28, 2011
  • 2. LA-UR 11-04994 Agenda  What is a copyright?  Copyright Disclosure information capture  Decision criteria  Diligence: License compatibility  Should we license?  Passive marketing  Active marketing  Exclusive / Multiple non-exclusive  Exclusive licensing  Preparing principal investigators UNCLASSIFIED Slide 2 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA Wednesday, September 28, 2011
  • 3. LA-UR 11-04994 What is a Copyright? Copyright protection subsists….in original works of authorship fixed in any tangible medium of expression …..otherwise communicated, either directly or with the aid of a machine or device. (17 U.S.C. §102) • Applicable for: — Software — Schematics/drawings — Firmware — Publications (technical/journal articles, etc.) UNCLASSIFIED Slide 3 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA Wednesday, September 28, 2011
  • 4. LA-UR 11-04994 Copyright Disclosure Information Capture  Abstract (functionality) • Why was this developed? Is this not available commercially? What does it do? • Technology Maturity (is there a Graphic User Interface?)  Authorship • Internal Authors? Collaboration across internal divisions? • External Authors? — Commercial, Open Source, Collaboration across National Laboratories? • Intended Distribution? (Policy versus Practical Considerations) — Controlled? — Open? • Open Source? (GPL, LGPL, BSD, etc.) • Publicly Available? • Assert Copyright as a Gov. Owned Contractor Operated (GOCO) lab? — Open Source Software? — Commercial? UNCLASSIFIED Slide 4 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA Wednesday, September 28, 2011
  • 5. LA-UR 11-04994 Decision Criteria  Are there pre-existing License Requirements? • Open Source Software? (GPL, LGPL, BSD, etc.?) • 3rd Party Contributions? — Royalty Sharing Agreement in place? • Are there reach-through license requirements stemming from the compiler? • Multi-Lab Collaboration Incorporating GOGOs? — Is there an IP Management Agreement? — Partnership intermediary? • Are There Related Patents? UNCLASSIFIED Slide 5 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA Wednesday, September 28, 2011
  • 6. LA-UR 11-04994 Diligence: License Compatibility http://www.dwheeler.com/essays/floss-license-slide.html UNCLASSIFIED Slide 6 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA Wednesday, September 28, 2011
  • 7. LA-UR 11-04994 License Compatibility (continued)  Take note of the compiler(s) your PIs are using • Compilers turn human-readable (source) code into executable (target) code • Most compilers combine portions of certain header files and runtime libraries with the compiled program. As a result, the compiled code is technically a derivative work of the compiler • Take care to read the license language associated with any compilers that were used  There are several popular GPL open source compilers • Target code produced using an open source compiler could inherit a viral license • Some of these open source compilers, such as G95, contain exceptions that allow you to propagate derivative works in cases that would otherwise violate the terms of the GPL license: e.g. GCC Runtime Library Exception, GNU Classpath, etc.  Some commercial compilers contain reach-through requirements • Absoft requires execution of an “Absoft Runtime Redistribution License” prior to distribution of compressed works UNCLASSIFIED Slide 7 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA Wednesday, September 28, 2011
  • 8. LA-UR 11-04994 Should we License?  Market Value • Smaller cost of protection of copyright versus patent; thus, multiple non-exclusive agreements often make good business sense • The smaller capital outlay required for software makes arms- length, transactional management of codes a viable commercialization option, whereas patents are almost always strategic  Laboratory Brand Recognition  Can we Build a Laboratory Capability?  Can we Bring an Author or Division into the TT Network? • Author self-selection helps UNCLASSIFIED Slide 8 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA Wednesday, September 28, 2011
  • 9. LA-UR 11-04994 Passive Marketing Hosted on LANL webpage Minimal effort— Title, Abstract, Tracking Number Meets Fairness Of Opportunity (FOO) Requirements Gives authors a place to direct colleagues to demonstrate their code developments TT receives 20-30 inquiries annually as a result of this passive marketing UNCLASSIFIED Slide 9 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA Wednesday, September 28, 2011
  • 10. LA-UR 11-04994 Active Marketing Moderate effort— a more targeted approach to marketing May be technology- specific or a broad capability description for Sponsored Research (CRADA or WFO opportunity) Serves as a nice pre- phone call marketing element UNCLASSIFIED Slide 10 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA Wednesday, September 28, 2011
  • 11. LA-UR 11-04994 Exclusive / Multiple Non-exclusive For reduced-functionality executable codes Best suited for mature, user- friendly software Facilitates collection of basic market information Builds a user community to promote software adoption Easily builds brand recognition with hassle-free download For Executables Only UNCLASSIFIED Slide 11 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA Wednesday, September 28, 2011
  • 12. LA-UR 11-04994 Commercialization Workshop Strategic licensing Appropriate for exclusive licensing in defined fields of use Best suited for portfolios of technologies including software UNCLASSIFIED Slide 12 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA Wednesday, September 28, 2011
  • 13. LA-UR 11-04994 Prepare your Principal Investigators  The PI is the strongest advocate for the technology. By preparing software authors prior to presentations and publications, you leverage word-of-mouth marketing within the author’s peer groups  This can help you find technical champions within potential licensees’ organizations (in some cases they will even reach out to TT) UNCLASSIFIED Slide 13 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA Wednesday, September 28, 2011
  • 14. Questions? Aaron G. Sauers Technology Transfer Los Alamos National Laboratory 505-665-0132 asauers@lanl.gov UNCLASSIFIED Slide 14 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA Wednesday, September 28, 2011

Editor's Notes

  1. Approximately 25 minutes per presentation, then Q&A.
  2. Less mature codes may need additional development by means of WFO or CRADA