The Big Guns: Oracle V Google , IBM, and the Java Software Community
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
SFLC V Conservancy
Trademark Trial and Appeal Board Electronic Filing System. http://estta.uspto.gov ESTTA Tracking number: ESTTA863914 Filing date: 12/11/2017 IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE TRADEMARK TRIAL AND APPEAL BOARD Proceeding 92066968 Party Defendant Software Freedom Conservancy Correspondence PAMELA S CHESTECK Address CHESTEK LEGAL P O BOX 2492 RALEIGH, NC 27602 UNITED STATES Email: [email protected] Submission Motion for Summary Judgment Yes, the Filer previously made its initial disclosures pursuant to Trademark Rule 2.120(a); OR the motion for summary judgment is based on claim or issue pre- clusion, or lack of jurisdiction. The deadline for pretrial disclosures for the first testimony period as originally set or reset: 07/20/2018 Filer's Name Pamela S Chestek Filer's email [email protected] Signature /Pamela S Chestek/ Date 12/11/2017 Attachments Motion for SJ on affirmative defenses-signed.pdf(756280 bytes ) Kuhn-Declara- tion_summary-judgment_as-submitted_reduced-size-signed.pdf(2181238 bytes ) Sandler-declara- tion_summary-judgment_as-submitted-reduced-size-signed.pdf(1777273 bytes ) Chestek declaration_summary-judgment-signed-with-exhibits.pdf(2003142 bytes ) IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE TRADEMARK TRIAL AND APPEAL BOARD In the Mater of Registraion No. 4212971 Mark: SOFTWARE FREEDOM CONSERVANCY Registraion date: September 25, 2012 Sotware Freedom Law Center Peiioner, v. Cancellaion No. 92066968 Sotware Freedom Conservancy Registrant. RESPONDENT’S MOTION FOR SUMMARY JUDGMENT ON ITS AFFIRMATIVE DEFENSES Introducion The Peiioner, Sotware Freedom Law Center (“SFLC”), is a provider of legal services. It had the idea to create an independent enity that would ofer inancial and administraive services for free and open source sotware projects. -
Oracle Fusion Middleware Integration Overview for Oracle Identity Management Suite, 11G Release 1 (11.1.1) E15477-01
Oracle® Fusion Middleware Integration Overview for Oracle Identity Management Suite 11g Release 1 (11.1.1) E15477-01 June 2010 Oracle Fusion Middleware Integration Overview for Oracle Identity Management Suite, 11g Release 1 (11.1.1) E15477-01 Copyright © 2010, Oracle and/or its affiliates. All rights reserved. Primary Author: Vinaye Misra Contributing Author: Stephen Lee Contributors: Sidhartha Das, Ellen Desmond, Subbu Devulapalli, Sandy Lii, Kavya Muthanna, Sanjay Rallapalli, Vinay Shukla, Olaf Stullich, Lyju Vadassery, Mark Wilcox This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). -
Overview and Frequently Asked Questions
Overview and Frequently Asked Questions OVERVIEW Oracle Buys Open Source Software Company Sleepycat - Expands Embedded Database Product Line with Berkeley DB Oracle has expanded its embedded Oracle’s portfolio of embedded database technologies provide database offerings through the customers with a range of technical options to meet their diverse needs, with the backing of a global support organization. Oracle acquisition of Sleepycat Software, Inc., and Sleepycat’s complementary products, expertise and resources a privately held supplier of open source will help accelerate innovation and provide customers with richer, database software for developers of more complete solutions. Oracle currently intends to continue embedded applications. Sleepycat’s dual license model and plans to continue to invest in the Berkeley DB products and support offerings, and to utilize Oracle’s global channel reach to service even more customers. With the proliferation of new applications, devices, appliances, Web Services and highly available Software as a Service (SaaS), In conjunction with the expansion of available embedded there is significant and growing demand for embedded databases. database options, Oracle has formed a global initiative focused In addition to Oracle Database Lite Edition for mobile devices on marketing, selling and servicing the Oracle Lite, TimesTen and Oracle TimesTen In-Memory Database for highly dynamic, and Berkeley DB products. This will include support procedures standards-compliant applications, Oracle now adds Berkeley DB and product release cycles tuned to the rapid-response needs database products for developers of tightly embedded, highly of embedded systems developers, and packaging and pricing customized applications. Berkeley DB is added to the Oracle flexibility that adjusts to the needs of Oracle’s partners. -
PETITIONER, V
No. In the Supreme Court of the United States ORACLE AMERICA, INC., PETITIONER, v. UNITED STATES AND AMAZON WEB SERVICES, INC. ON PETITION FOR A WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE FEDERAL CIRCUIT PETITION FOR A WRIT OF CERTIORARI R. REEVES ANDERSON ALLON KEDEM ARNOLD & PORTER Counsel of Record KAYE SCHOLER LLP CRAIG A. HOLMAN 1144 Fifteenth Street SALLY L. PEI Suite 3100 SEAN A. MIRSKI Denver, CO 80202 NATHANIEL E. CASTELLANO (303) 863-1000 ARNOLD & PORTER KAYE SCHOLER LLP 601 Massachusetts Ave., NW Washington, DC 20001 (202) 942-5000 [email protected] i QUESTIONS PRESENTED The Department of Defense structured its procurement for cloud-computing services, worth up to $10 billion, for award to a single bidder. Petitioner Oracle America, Inc. filed a bid protest, arguing that the single-bidder award violated federal law, which requires agencies to choose multiple bidders for contracts of this size and type. The Federal Circuit agreed with Oracle that the procurement violated federal law, yet declined to remand the issue to the agency as required by SEC v. Chenery Corp., 318 U.S. 80 (1943). Instead, the court applied its own “harmless error” exception to conclude that even if the agency were to conduct the procurement as a multiple-award solicitation, Oracle would not stand a better chance of winning the contract. During the bid protest, the Defense Department uncovered serious conflicts of interest between several of its employees and a leading bidder. The Federal Circuit acknowledged that one or more conflicts may have violated 18 U.S.C. -
GOOGLE LLC V. ORACLE AMERICA, INC
(Slip Opinion) OCTOBER TERM, 2020 1 Syllabus NOTE: Where it is feasible, a syllabus (headnote) will be released, as is being done in connection with this case, at the time the opinion is issued. The syllabus constitutes no part of the opinion of the Court but has been prepared by the Reporter of Decisions for the convenience of the reader. See United States v. Detroit Timber & Lumber Co., 200 U. S. 321, 337. SUPREME COURT OF THE UNITED STATES Syllabus GOOGLE LLC v. ORACLE AMERICA, INC. CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE FEDERAL CIRCUIT No. 18–956. Argued October 7, 2020—Decided April 5, 2021 Oracle America, Inc., owns a copyright in Java SE, a computer platform that uses the popular Java computer programming language. In 2005, Google acquired Android and sought to build a new software platform for mobile devices. To allow the millions of programmers familiar with the Java programming language to work with its new Android plat- form, Google copied roughly 11,500 lines of code from the Java SE pro- gram. The copied lines are part of a tool called an Application Pro- gramming Interface (API). An API allows programmers to call upon prewritten computing tasks for use in their own programs. Over the course of protracted litigation, the lower courts have considered (1) whether Java SE’s owner could copyright the copied lines from the API, and (2) if so, whether Google’s copying constituted a permissible “fair use” of that material freeing Google from copyright liability. In the proceedings below, the Federal Circuit held that the copied lines are copyrightable. -
BMW ORACLE Racing to Ring the NASDAQ Stock Market Opening Bell
BMW ORACLE Racing to Ring The NASDAQ Stock Market Opening Bell ADVISORY, Jun 29, 2010 (GlobeNewswire via COMTEX News Network) -- What: Oracle Corporation (ORCL) and BMW ORACLE Racing will visit the NASDAQ MarketSite in New York City's Times Square. In honor of the occasion, James Spithill, the youngest-ever winning America's Cup Skipper, will ring the NASDAQ Opening Bell. Where: NASDAQ MarketSite -- 4 Times Square -- 43rd & Broadway -- Broadcast Studio When: Wednesday, June 30th, 2010 at 9:15 a.m. to 9:30 a.m. ET Contact: Karen Tillman (650) 245-7687 [email protected] NASDAQ MarketSite: Robert Madden (646) 441-5045 [email protected] Feed Information: The Opening Bell is available from 9:20 a.m. to 9:35 a.m. on Galaxy 19 C/15, downlink frequency 4000 vertical. The feed can also be found on Ascent fiber 1623. If you have any questions, please contact Robert Madden at (646) 441-5045. Radio Feed: An audio transmission of the Opening Bell is also available from 9:20 a.m. to 9:35 a.m. on uplink IA6 C band / transponder 24, downlink frequency 4180 horizontal. The feed can be found on Ascent fiber 1623 as well. Facebook and Twitter: For multimedia features such as exclusive content, photo postings, status updates and video of bell ceremonies please visit our Facebook page at: http://www.facebook.com/pages/NASDAQ-OMX/108167527653 For news tweets, please visit our Twitter page at: http://twitter.com/nasdaqomx Webcast: A live webcast of the NASDAQ Opening Bell will be available at: http://www.nasdaq.com/about/marketsitetowervideo.asx Photos: To obtain a hi-resolution photograph of the Market Open, please go to http://www.nasdaq.com/reference/marketsite_events.stm and click on the market open of your choice. -
Lookout! (V108)
Crossing the Digital Divide (v108) “Lookout!” by Joseph Feigon for the Observer Scott McNealy is an American businessman. He is most famous for co-founding the computer technology company Sun Microsystems in 1982 along with Vinod Khosla, Bill Joy and Andy Bechtolsheim. Oracle Corporation (Larry Ellison’s database client) purchased Sun Microsystems in 2010. Mr. McNealy was one of the relative success stories in the early days of the Internet. Sun Microsystems built exceptional servers, and was a market leader with their Unix operating system as well as their corporate support of the Open Source movement, including Linux. Sun ‘cuda been’ a contender. Lookout was McNealy's inverted name for Outlook, Microsoft's e-mail client. McNealy says you need to "look out" for trouble when using Outlook. McNealy frequently cites Outlook's well documented security problems. He says that to get the most functionality out of Outlook you'll also need Microsoft's Exchange Server. But the combination, and the Microsoft- only mail and calendaring protocol required to connect them (MAPI), is yet another example of how Microsoft locks businesses into proprietary technologies that eliminate choice and flexibility. Microsoft is still here, Sun Microsystems is not. Proprietary software continues to dominate the retail customer (Windows, anyone?), as well as many big companies. Those success stories in the Open Source space build applications on an Operating System (Linux, BSD, NetBSD, FreeBSD, etc.) that is open, meaning, free to you and me. Open, as in, anyone with the desire and/or ability can review each line of coding that makes things work. -
Apache Harmony Project Tim Ellison Geir Magnusson Jr
The Apache Harmony Project Tim Ellison Geir Magnusson Jr. Apache Harmony Project http://harmony.apache.org TS-7820 2007 JavaOneSM Conference | Session TS-7820 | Goal of This Talk In the next 45 minutes you will... Learn about the motivations, current status, and future plans of the Apache Harmony project 2007 JavaOneSM Conference | Session TS-7820 | 2 Agenda Project History Development Model Modularity VM Interface How Are We Doing? Relevance in the Age of OpenJDK Summary 2007 JavaOneSM Conference | Session TS-7820 | 3 Agenda Project History Development Model Modularity VM Interface How Are We Doing? Relevance in the Age of OpenJDK Summary 2007 JavaOneSM Conference | Session TS-7820 | 4 Apache Harmony In the Beginning May 2005—founded in the Apache Incubator Primary Goals 1. Compatible, independent implementation of Java™ Platform, Standard Edition (Java SE platform) under the Apache License 2. Community-developed, modular architecture allowing sharing and independent innovation 3. Protect IP rights of ecosystem 2007 JavaOneSM Conference | Session TS-7820 | 5 Apache Harmony Early history: 2005 Broad community discussion • Technical issues • Legal and IP issues • Project governance issues Goal: Consolidation and Consensus 2007 JavaOneSM Conference | Session TS-7820 | 6 Early History Early history: 2005/2006 Initial Code Contributions • Three Virtual machines ● JCHEVM, BootVM, DRLVM • Class Libraries ● Core classes, VM interface, test cases ● Security, beans, regex, Swing, AWT ● RMI and math 2007 JavaOneSM Conference | Session TS-7820 | -
Toyota Activities for OSS Compliance
Toyota Activities for OSS Compliance Masato Endo Assistant Manager Connected Vehicle Group Intellectual Property Div. Toyota Motor Corporation Nov. 16, 2017, Open Compliance Summit © 2017 Toyota Motor Corporation 1 1.1. Expansion of OSS in the Automotive Sector Automotive sector Toyota products In the automotive sector, the number of OSS projects is growing rapidly, and some are already available on the market. Nov. 16, 2017, Open Compliance Summit © 2017 Toyota Motor Corporation 2 1.2. What is Automotive Grade Linux (AGL) AGL is a Linux Foundation project to develop an operating system for infotainment platforms. Nov. 16, 2017, Open Compliance Summit © 2017 Toyota Motor Corporation 3 1.3. AGL Members Ten global OEMs have joined the project. Many automotive industry suppliers and IT companies also contribute to AGL. Nov. 16, 2017, Open Compliance Summit © 2017 Toyota Motor Corporation 4 1.4. Recent AGL Activities AGL All Member Meeting Automotive Linux Summit (Feb 8 to Feb 10) (May 31 to June2) AGL holds many events to foster community engagement. These events include not only discussions of technical issues, but also of legal issues. Nov. 16, 2017, Open Compliance Summit © 2017 Toyota Motor Corporation 5 1.5. Toyota and AGL (1/5) 2011 Toyota joined the Linux Foundation. 1st ALS: Automotive Linux Summit (Yokohama, Japan) Nov. 16, 2017, Open Compliance Summit © 2017 Toyota Motor Corporation 6 1.6. Toyota and AGL (2/5) 2011 2012 2013 2014 Automotive Linux Summit 2014 (Tokyo, Japan) AGL Steering Committee Meeting: • AGL projects started and funded. Nov. 16, 2017, Open Compliance Summit © 2017 Toyota Motor Corporation 7 1.7. -
Solution Brief JVM Performance Monitoring
Solution Brief Monitoring the Health & Performance of Java Virtual Machines (JVM) Total Performance Visibility JVM: The Cornerstone of Java Enterprise Applications The Java Virtual Machine (JVM) forms the core of the Java application architecture. It plays the crucial role of interpreting and translating Java byte code into operations on the host platform. Since Java middleware (application servers such as Tomcat, JBoss EAP, JBoss AS, WildFly, WebSphere, and WebLogic) runs on the JVM, a performance issue at the JVM level has a major impact on business services supported by it. Monitoring of the JVM must be an integral part of any Java application performance monitoring strategy. IT Ops and DevOps teams use JVM Key Benefits performance metrics to troubleshoot server-side bottlenecks. Developers and architects can also benefit from JVM monitoring by uncovering code- Proactively detect and resolve level issues. Java application problems to ensure high service uptime and business continuity Key JVM Performance Questions to Answer Troubleshoot faster: Real-time • Is there any runaway thread hogging the CPU? Which line of code is it alerts pinpoint the exact line executing, in which class, and which method? of code that is impacting Java • Is the JVM heap and non-heap memory sized correctly? applications • Are there any out-of-memory-exceptions or memory leaks? In-depth analytics enable architects to optimize Java • When does garbage collection happen, and how much memory is applications to scale and support freed up each time? additional users • Are there any thread deadlocks happening that are causing Single pane of glass to monitor application processing to be hung? everything Java—from application server, JVM and database, all the way down to server and storage End-to-End JVM Monitoring with eG Enterprise infrastructure eG Enterprise is a comprehensive performance monitoring, diagnosis and reporting solution for Java application infrastructures. -
A Study of Cache Performance in Java Virtual Machines, the University of Texas at Austin, 2002
Cache Performance in Java Virtual Machines: A Study of Constituent Phases Anand S. Rajan, Juan Rubio and Lizy K. John Laboratory for Computer Architecture Department of Electrical & Computer Engineering The University of Texas at Austin (arajan, jrubio,[email protected]) Abstract This paper studies the cache performance of Java programs in the interpreted and just-in- time (JIT) modes by analyzing memory reference traces of the SPECjvm98 applications with the Latte JVM. Specifically, we study the cache performance of the different components of the JVM (class loader, the execution engine and the garbage collector). Poor data cache performance in JITs is caused by code installation, and the data write miss rate can be as high as 70% in the execution engine. In addition, this code installation also causes deterioration in performance of the instruction cache during execution of translated code. We also believe that there is considerable interference between data accesses of the garbage collector and that of the compiler-translator execution engine of the JIT mode. We observe that the miss percentages in the garbage collection phase are of the order of 60% for the JIT mode; we believe that interference between data accesses of the garbage collector and the JIT execution engine lead to further deterioration of the data cache performance wherever the contribution of the garbage collector is significant. We observe that an increase in cache sizes does not substantially improve performance in the case of data cache writes, which is identified to be the principal performance bottleneck in JITs. 1 1. Introduction Java[1] is a widely used programming language due to the machine independent nature of bytecodes. -
CLE Materials
Software Freedom Law Center Fall Conference at Columbia Law School CLE materials October 30, 2015 License Compliance Dispute Resolution Software Freedom Law Center October 30, 2015 1) Software Freedom Law Center: Guide to GPL Compliance 2nd Edition 2) Free Software Foundation: Principles for Community-Oriented GPL Enforcement 3) Terry J. Ilardi: FOSS Compliance @ IBM 15 Years (and count- ing) Software Freedom Law Center Guide to GPL Compliance 2nd Edition Eben Moglen & Mishi Choudhary October 31, 2014 Contents TheWhat,WhyandHowofGNUGPL . 3 CopyrightandCopyleft . 4 Concepts and License Mechanics of Copyleft. 6 LicenseProvisionsAnalyzed. 10 GPLv2............................... 10 GPLv3............................... 18 GPLSpecialExceptionLicenses . 31 AGPL............................... 31 LGPL ............................... 34 Understanding Your Compliance Responsibilities . 41 WhoHasComplianceObligations? . 41 HowtoMeetComplianceObligations . 43 TheKeytoComplianceisGovernance . 45 PrinciplesofPreparedCompliance . 47 HandlingComplianceInquiries . 48 Appendix1: OfferofSourceCode . 52 References................................ 56 This document presents the legal analysis of the Software Freedom Law Center and the authors. This document does not express the views, intentions, policy, or legal analysis of any SFLC clients or client organizations. This document does not constitute legal advice or opinion regarding any specific factual situation or party. Specific legal advice should always be sought from qualified legal counsel on the application