Open Source Software Development: an Overview

Total Page:16

File Type:pdf, Size:1020Kb

Open Source Software Development: an Overview COMPUTING PRACTICES Open Source Software Development: An Overview Although some challenge the value of open source software development,its popularity cannot be disputed. This overview of open source licensing and development models describes some of the movement’s main principles. Ming-Wei Wu roprietary software vendors operate on a seeks to develop Unix-compatible software and return closed-source model: They develop their software to a state of freedom. Ying-Dar Lin own software and release that software to Stallman is both an open source evangelist and a National the public with the intention of gaining mar- major open source contributor as the principal author Chiao Tung University, ket penetration and earning a profit. The of the GNU C Compiler (GCC), GNU symbolic Taiwan Popen source movement, while still profitable in many debugger (GDB), GNU Emacs, and more. All these ways to profit-oriented companies, relies on a differ- packages provide essential tools for GNU/Linux. The ent set of practices. In the open source movement, Red Hat 7.1 distribution, which collects some 1,016 everyone capable of writing code is welcome to join packages altogether, contains 70 GNU packages. in, a strategy that—according to open source advo- The purpose of the Free Software Foundation is not cates—directly leads to more robust software and to ensure distributing software to the end user without more diverse business models. cost, but to ensure that the end user can use the soft- While some challenge the general assumptions ware freely. From the Free Software Foundation’s per- about the benefits of open source software develop- spective, the term “free software” has nothing to do ment,1 the evidence of popular buy-in cannot be dis- with price: A program is free software if you have the puted. People everywhere are adopting various open freedom to run the program, modify it to suit your source distributions or participating in the general needs, redistribute copies either gratis or for a fee, and movement by contributing their own modifications. distribute modified versions of the program so that the We offer an overview of open source licensing and community can benefit from your improvements. development and strive to clarify some of the main Because free refers to freedom, not to price, it is not principles underlying the resulting software. Because contradictory to say that software can be both for sale so much has already been written about open source, and free simultaneously. According to the Free we seek only to touch on some of its major themes and Software Foundation, the freedom to sell copies is cru- provide pointers to essential information about the cial: Selling collections of free software on CD-ROM movement and its general licensing structures. raises funds for free software development. Therefore, according to the open source definition of the term OPEN SOURCE BACKGROUND “free,” a program that people cannot freely include In 1984, Richard Stallman founded the Free on these collections does not qualify as free software. Software Foundation (http://www.fsf.org/fsf/fsf.html), The copyleft and General Public License are a tax-exempt charity that raises funds for work on the designed to guarantee this freedom. Copylefts are, in GNU Project (http://www.gnu.org/gnu/thegnuproject. essence, copyrights with GPL regulations. html). GNU is a recursive acronym for “GNU’s Not Open source software, essentially a superset of free Unix” and a homophone for “new.” The GNU Project software, exists in almost countless varieties today, 0018-9162/01/$10.00 © 2001 IEEE June 2001 33 A personal itch Look for any similar projects No Yes patches. This easy-to-use mechanism cannot track a Initiate a project Join that project project’s history automatically, however. Walter Tichy’s Revision Control System improves Use mailing list for announcement and bug tracking; use OpenPGP the capabilities of diff and patch by automatically keeping track of change history, but his method does CVS version control not address several important issues. For example, RCS uses the lock-modify-unlock development style that blocks other codevelopers from modifying the Write documents and manuals Do little document writing code simultaneously. Further, RCS does not support network development, which means codevelopers Decide a license model Vote for a license model must work on the same machine. In 1986, Dick Grune undertook an RCS overhaul Accept patches and modifications (vote or dictatorship) that eventually created the Concurrent Versions System,3 which makes RCS easier to use. Brian Berliner Release official version in the foreseeable future then rewrote CVS using C, and, finally, Jim Kingdon added network development support to the method. CVS uses the copy-modify-merge development style that allows several codevelopers to copy source code Figure 1. The general each with its own unique history.2 Linux, perhaps the from a CVS repository and modify their own versions open source system best-known open source software package, began simultaneously. CVS then intelligently merges all development cycle. modestly in 1991, seven years after the founding of changes together. For example, if version A and B have Allowing multiple the Free Software Foundation. Linus Torvalds, at the no conflicts, it’s an easy merge; if version A and B have participants to time a graduate student at Helsinki University in conflicts, the newer version’s author must solve these contribute to the soft- Finland, wrote a Unix-compatible operating system conflicts before merging new contributions into the ware development and posted it on the comp.os.minix newsgroup, repository. process requires a single-handedly starting the Linux revolution. Several Web-hosting companies offer free hosting massive coordination Torvalds handed on the kernel maintenance to Alan services to support the development of open source pro- effort. Cox in 1994 but continued monitoring each kernel jects. For example, SourceForge (http://sourceforge.net) version to determine what should be left in and left currently offers features such as bug tracking, project out. Since 1994, Torvalds has let others deal with user- management, forum services, mailing list distribution, space issues like libraries, compilers, and the many and more. Both Gnutella and Freenet—Napster-like utilities and applications that go into every Linux dis- file sharing systems—use SourceForge for development. tribution. By doing so, Torvalds gives users and ven- dors the freedom to customize his work. LICENSING MODELS Source license models fall into three general cate- OPEN SOURCE DEVELOPMENT gories: free—the program can be freely modified and The open source software development cycle, as redistributed; copyleft—the owner gives up intellectual the flow chart in Figure 1 shows, allows literally any- property and private licensing; and GPL-compatible— one to participate in the process, but having multi- licenses are legally linked to the GPL licensing structure. ple participants means a massive coordination effort. In addition to open source licensing models, devel- Developers can use several different models to coor- opers use hundreds of other licensing models for the dinate these large-scale efforts, from standardizing many kinds of software they market, ranging from software—see the “Standardizing Linux” sidebar— shareware to giftware to proprietary agreements, or to offering participants T-shirts or other benefits. anything in between. Each of these models contributes eXtropia uses the open source model to continually to the general confusion surrounding licensing arrange- acquire contributions from the hundreds of partici- ments and the terminology that describes them, because pants who have helped the company produce well- ordinary users seldom read software licenses in detail. documented, feature-rich Web applications. Some common open source license models include: Given that project codevelopers may be scattered across the globe, they must agree on a version con- • General Public License. This free software licens- trol system to avoid development chaos. Currently, ing uses the copyleft model, a self-perpetuating developers can choose from three major multiple- spiral model that strictly ensures distribution of developer models for version control. Larry Wall’s diff any derivative work under the same license model. and patch for Unix offers one of the oldest standard • Lesser GPL. Once known as library GPL, LGPL ways to submit contributions. The diff process dis- lets users extend the source with proprietary covers the differences between two files to generate modules. 34 Computer • Berkeley Software Distribution. The BSD model links to their complete information, visit http://www. offers free code distributions and allows cover- opensource.org/licenses/. ing derivative works under different terms as long Among open source licensing structures, although as the necessary credit is given. Examples of BSD the GPL license calls for the strictest regulation, com- licensees include Apache, BSD-related OSs, and plaints and public scorn currently provide the main free versions of Sendmail. methods for opposing GPL violations. Despite the • Mozilla Public License. MPL requires distribut- absence of harsher sanctions, most companies are will- ing derivative works under MPL, which means ing to correct licensing problems and release the mod- that derivative work loses patent rights but still ified version of their software to avoid a damaged can enjoy private licensing.
Recommended publications
  • How to Use the Database Server Babbage.Cs.Abo.Fi a Mysql Database Server for Those Attending This Year's Course Is Installed on the Server Babbage.Cs.Abo.Fi
    How to use the database server babbage.cs.abo.fi A MySQL database server for those attending this year's course is installed on the server babbage.cs.abo.fi. All the users are allowed to see all the databases there. A user has all priviledges to those databases that are called username_database. If your username is xxxx, you can create, change and drop (delete) databases calles xxxx_bank, xxxx_jobs, xxxx_courses etc. This is how you work with the system: You log on to babbage.cs.abo.fi using your normal userID and Unix-password (if you have not defined a separate password for unix, it is the same as your Windows password). You can use a communication program such as Putty och ssh Secure Shell, or just sit at one of the computers in the Linux-class (the penguin class) and use a terminal window. You get one by clicking the right mouse button and choosing Konsole. Or you can click the F-icon (lower left corner), the choose Applications, then Utilities, then Terminal. When you have this terminal window, you must use Linux-commands. You type the commands and push “enter”. Mouse-clicks do not work here. This is how you connect to babbage: ssh [email protected] Inside Åbo Akademi, using our network, it is enought to write ssh babbage From home or elsewhere, you must access babbage from tuxedo.abo.fi. First log onto tuxedo (normal userID, normal password), then write ssh [email protected] The computer now asks your password, and you give it the same Windows password.
    [Show full text]
  • Oracle® Tuxedo Installing the Oracle Tuxedo Application Runtimes 12C Release 2 (12.1.3)
    Oracle® Tuxedo Installing the Oracle Tuxedo Application Runtimes 12c Release 2 (12.1.3) April 2014 Installing the Oracle Tuxedo Application Runtimes, 12c Release 2 (12.1.3) Copyright © 1996, 2014, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Behavior Based Software Theft Detection, CCS 2009
    Behavior Based Software Theft Detection 1Xinran Wang, 1Yoon-Chan Jhi, 1,2Sencun Zhu, and 2Peng Liu 1Department of Computer Science and Engineering 2College of Information Sciences and Technology Pennsylvania State University, University Park, PA 16802 {xinrwang, szhu, jhi}@cse.psu.edu, [email protected] ABSTRACT (e.g., in SourceForge.net there were over 230,000 registered Along with the burst of open source projects, software open source projects as of Feb.2009), software theft has be- theft (or plagiarism) has become a very serious threat to the come a very serious concern to honest software companies healthiness of software industry. Software birthmark, which and open source communities. As one example, in 2005 it represents the unique characteristics of a program, can be was determined in a federal court trial that IBM should pay used for software theft detection. We propose a system call an independent software vendor Compuware $140 million dependence graph based software birthmark called SCDG to license its software and $260 million to purchase its ser- birthmark, and examine how well it reflects unique behav- vices [1] because it was discovered that certain IBM products ioral characteristics of a program. To our knowledge, our contained code from Compuware. detection system based on SCDG birthmark is the first one To protect software from theft, Collberg and Thoborson that is capable of detecting software component theft where [10] proposed software watermark techniques. Software wa- only partial code is stolen. We demonstrate the strength of termark is a unique identifier embedded in the protected our birthmark against various evasion techniques, including software, which is hard to remove but easy to verify.
    [Show full text]
  • \", 22 \', 22 \(, 31, 32 \), 31, 32 \-, 26 \., 22 \=, 22 \[, 32 \], 32 \ˆ, 21, 22 \`, 22
    i i i ‘beginlatex’ --- 2018/12/4 --- 23:30 --- page 289 --- #325 i Index Index See Table 2 on page xxx for the meanings of the typographic formatting used here and in the text. \", 22 \ae, 22 \', 22 \affiliation, 42 \(, 31, 32 afm2tfm, 234 \), 31, 32 textbf, 17 \-, 26 Apple Mac \., 22 editor, 189, 194 /p, 236 installation, 189 \=, 22 apt, 190 \@, 162, 164 apt-get, xxvi \[, 32 Aquamacs, 222 \], 32 \arabic, 170 \ˆ, 21, 22 ArcInfo, 96 \`, 22 textbf, 13 \ , 21, 22 array, 85 \arraybackslash, 85 10pt, 37 \arraystretch, 87 11pt, 37 article, 11, 35 12pt, 11, 37 \author, xxx, 42–44, 108, 162 AutoCAD, 95 a4paper, 36, 38 avant, 143 \AA, 22 \aa, 22 b, 100 AbiWord, 175, 177, 178 \b, 22 abstract, 44, 45 babel, 20, 30, 50, 120 \abstractname, 45 textbf, 9 abstracts, 44 textbf, 254 accents, 19 BaKoMa TEX, xxix Acrobat Reader, 185, 194, 222, 258 \baselinestretch, 133 acronym, 126 bbding, 73, 171 \addbibresource, 120 beer, 123 \addcontentsline, 52 lite, 123 \addtocontents, 53 American, 123 \AE, 22 Rogue £ Formatting Information ¢ 289 ¡ i i i i i i i ‘beginlatex’ --- 2018/12/4 --- 23:30 --- page 290 --- #326 i FORMATTING INFORMATION Chocolate Stout, 124 \centering, 29, 85, 87, 148 \begin, 20, 40, 41, 45, 74, 82, cep, 93 163, 180 chancery, 143 \bfseries, 12, 149 textbf, 247 biber, ix, 5, 19, 62, 112–114, 120– \chapter, 47, 48 122, 125 chapter, 170 biber, 247, 249 characters BIBINPUTS, 116 accented, 19 biblatex, 5, 112, 113 ASCII, 267 biblatex, ix, 5, 19, 112–114, 116– math, 31 121 special, 15, 31 biblatex-apa, 114 charmap, 21 biblatex-cheatsheet, 114 charter,
    [Show full text]
  • Rkward: a Comprehensive Graphical User Interface and Integrated Development Environment for Statistical Analysis with R
    JSS Journal of Statistical Software June 2012, Volume 49, Issue 9. http://www.jstatsoft.org/ RKWard: A Comprehensive Graphical User Interface and Integrated Development Environment for Statistical Analysis with R Stefan R¨odiger Thomas Friedrichsmeier Charit´e-Universit¨atsmedizin Berlin Ruhr-University Bochum Prasenjit Kapat Meik Michalke The Ohio State University Heinrich Heine University Dusseldorf¨ Abstract R is a free open-source implementation of the S statistical computing language and programming environment. The current status of R is a command line driven interface with no advanced cross-platform graphical user interface (GUI), but it includes tools for building such. Over the past years, proprietary and non-proprietary GUI solutions have emerged, based on internal or external tool kits, with different scopes and technological concepts. For example, Rgui.exe and Rgui.app have become the de facto GUI on the Microsoft Windows and Mac OS X platforms, respectively, for most users. In this paper we discuss RKWard which aims to be both a comprehensive GUI and an integrated devel- opment environment for R. RKWard is based on the KDE software libraries. Statistical procedures and plots are implemented using an extendable plugin architecture based on ECMAScript (JavaScript), R, and XML. RKWard provides an excellent tool to manage different types of data objects; even allowing for seamless editing of certain types. The objective of RKWard is to provide a portable and extensible R interface for both basic and advanced statistical and graphical analysis, while not compromising on flexibility and modularity of the R programming environment itself. Keywords: GUI, integrated development environment, plugin, R.
    [Show full text]
  • Oracle Databases on Vmware Best Practices Guide Provides Best Practice Guidelines for Deploying Oracle Databases on Vmware Vsphere®
    VMware Hybrid Cloud Best Practices Guide for Oracle Workloads Version 1.0 May 2016 © 2016 VMware, Inc. All rights reserved. Page 1 of 81 © 2016 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94304 www.vmware.com © 2016 VMware, Inc. All rights reserved. Page 2 of 81 VMware Hybrid Cloud Best Practices Guide for Oracle Workloads Contents 1. Introduction ...................................................................................... 9 2. vSphere ......................................................................................... 10 3. VMware Support for Oracle Databases on vSphere ....................... 11 3.1 VMware Oracle Support Policy .................................................................................... 11 3.2 VMware Oracle Support Process................................................................................. 12 4. Server Guidelines .......................................................................... 13 4.1 General Guidelines ...................................................................................................... 13 4.2 Hardware Assisted Virtualization ................................................................................
    [Show full text]
  • Peer Participation and Software
    Peer Participation and Software This report was made possible by the grants from the John D. and Cath- erine T. MacArthur Foundation in connection with its grant-making initiative on Digital Media and Learning. For more information on the initiative visit www.macfound.org. The John D. and Catherine T. MacArthur Foundation Reports on Digital Media and Learning Peer Participation and Software: What Mozilla Has to Teach Government by David R. Booth The Future of Learning Institutions in a Digital Age by Cathy N. Davidson and David Theo Goldberg with the assistance of Zoë Marie Jones The Future of Thinking: Learning Institutions in a Digital Age by Cathy N. Davidson and David Theo Goldberg with the assistance of Zoë Marie Jones New Digital Media and Learning as an Emerging Area and “Worked Examples” as One Way Forward by James Paul Gee Living and Learning with New Media: Summary of Findings from the Digital Youth Project by Mizuko Ito, Heather Horst, Matteo Bittanti, danah boyd, Becky Herr-Stephenson, Patricia G. Lange, C. J. Pascoe, and Laura Robinson with Sonja Baumer, Rachel Cody, Dilan Mahendran, Katynka Z. Martínez, Dan Perkel, Christo Sims, and Lisa Tripp Young People, Ethics, and the New Digital Media: A Synthesis from the GoodPlay Project by Carrie James with Katie Davis, Andrea Flores, John M. Francis, Lindsay Pettingill, Margaret Rundle, and Howard Gardner Confronting the Challenges of Participatory Culture: Media Education for the 21st Century by Henry Jenkins (P.I.) with Ravi Purushotma, Margaret Weigel, Katie Clinton, and Alice J. Robison The Civic Potential of Video Games by Joseph Kahne, Ellen Middaugh, and Chris Evans Peer Production and Software What Mozilla Has to Teach Government David R.
    [Show full text]
  • Jetnet/TUXEDO Installation This Software Manual Is Documentation for Panthert
    JetNet/TUXEDO Installation This software manual is documentation for Panthert. It is as accurate as possible at this time; however, both this manual and Panther itself are subject to revision. Prolifics and JAM are registered trademarks and JAM/TPi and Panther are trademarks of JYACC, Inc. BEA TUXEDO is a registered trademark and BEA WebLogic Enterprise is a trademark of BEA Systems, Inc. DynaText is a registered trademark of Inso Corporation. FLEXlm is a registered trademark of GLOBEtrotter Software, Inc. HP is a trademark of Hewlett-Packard Company. INFORMIX and C-ISAM are registered trademarks of Informix Software, Inc. IBM, DB2, and RISC System/6000 are registered trademarks and CICS is a trademark of International Business Machines Corporation. Microsoft, MS-DOS, Windows, Windows NT, SQL Server, ActiveX, and Visual C++ are registered trade- marks and Microsoft Windows 95, Authenticode, Microsoft Transaction Server, Microsoft Access, Micro- soft Internet Explorer, Microsoft Internet Information Server, Microsoft Management Console, and Micro- soft Open Database Connectivity are trademarks of Microsoft Corporation. Motif is a trademark of the Open Software Foundation, Inc. Oracle and SQL*Net are registered trademarks and Oracle7, Oracle8, PL/SQL, Pro*C, Rdb7, and Rdb8 are trademarks of Oracle Corporation. Netscape and Netscape Navigator, and Netscape Fast Track Server are registered trademarks of Netscape Communications Corporation. Sun, SunOS, Solaris, JavaScript, JDK, and Java are trademarks and Sun Workstation is a registered trade- mark of Sun Microsystems, Inc. SYBASE is a registered trademark and Client-Library and DB-Library are trademarks of Sybase, Inc. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company Limited.
    [Show full text]
  • John F. Kennedy School of Government Harvard University Faculty Research Working Papers Series
    John F. Kennedy School of Government Harvard University Faculty Research Working Papers Series Code as Governance, The Governance of Code Serena Syme and L. Jean Camp April 2001 RWP01-014 The views expressed in the KSG Faculty Research Working Paper Series are those of the author(s) and do not necessarily reflect those of the John F. Kennedy School of Government or Harvard University. All works posted here are owned and copyrighted by the author(s). Papers may be downloaded for personal use only. THE GOVERNANCE OF CODE: CODE AS GOVERNANCE Page: 1 THE GOVERNANCE OF CODE: CODE AS GOVERNANCE Serena Syme1 L. Jean Camp2 Masters of Public Policy Assistant Professor Kennedy School of Government Kennedy School of Government Harvard University Harvard University Cambridge, MA 02138 Cambridge, MA 02138 [email protected] [email protected] 617-596-4738 617-496-6331 www.ljean.net The governance of a network society is tightly bound to the nature of property rights created for information. The establishment of a market involves the development of a bundle of rights that both create property and define the rules under which property-based transactions might occur. The fundamental thesis of this work is that the creation of property through licensing offers different views of the governance of the network society. Thus this article offers distinct views of the network society drawn from examinations of the various forms of governance currently applied to code, namely: open code licensing, public domain code, proprietary licenses, and the Uniform Computer Information Transactions Act (UCITA). The open code licenses addressed here are the GNU Public License, the BSD license, the artistic license, and the Mozilla license.
    [Show full text]
  • Oracle® Tuxedo Programming an Oracle Tuxedo Application Using Java 12C Release 1 (12.1.1)
    Oracle® Tuxedo Programming an Oracle Tuxedo Application Using Java 12c Release 1 (12.1.1) June 2012 Oracle Tuxedo Programming an Oracle Tuxedo Application Using Java, 12c Release 1 (12.1.1) Copyright © 1996, 2012, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Coleman-Coding-Freedom.Pdf
    Coding Freedom !" Coding Freedom THE ETHICS AND AESTHETICS OF HACKING !" E. GABRIELLA COLEMAN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright © 2013 by Princeton University Press Creative Commons Attribution- NonCommercial- NoDerivs CC BY- NC- ND Requests for permission to modify material from this work should be sent to Permissions, Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TW press.princeton.edu All Rights Reserved At the time of writing of this book, the references to Internet Web sites (URLs) were accurate. Neither the author nor Princeton University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. Library of Congress Cataloging-in-Publication Data Coleman, E. Gabriella, 1973– Coding freedom : the ethics and aesthetics of hacking / E. Gabriella Coleman. p. cm. Includes bibliographical references and index. ISBN 978-0-691-14460-3 (hbk. : alk. paper)—ISBN 978-0-691-14461-0 (pbk. : alk. paper) 1. Computer hackers. 2. Computer programmers. 3. Computer programming—Moral and ethical aspects. 4. Computer programming—Social aspects. 5. Intellectual freedom. I. Title. HD8039.D37C65 2012 174’.90051--dc23 2012031422 British Library Cataloging- in- Publication Data is available This book has been composed in Sabon Printed on acid- free paper. ∞ Printed in the United States of America 1 3 5 7 9 10 8 6 4 2 This book is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE !" We must be free not because we claim freedom, but because we practice it.
    [Show full text]
  • Fifty Years of Open Source Movement: an Analysis Through the Prism of Copyright Law
    FIFTY YEARS OF OPEN SOURCE MOVEMENT: AN ANALYSIS THROUGH THE PRISM OF COPYRIGHT LAW V.K. Unni* I. INTRODUCTION The evolution of the software industry is a case study in itself. This evolution has multiple phases and one such important phase, termed open source, deals with the manner in which software technology is held, developed, and distributed.1 Over the years, open source software has played a leading role in promoting the Internet infrastructure and thus programs utilizing open source software, such as Linux, Apache, and BIND, are very often used as tools to run various Internet and business applications.2 The origins of open source software can be traced back to 1964–65 when Bell Labs joined hands with the Massachusetts Institute of Technology (MIT) and General Electric (GE) to work on the development of MULTICS for creating a dynamic, modular computer system capable of supporting hundreds of users.3 During the early stages of development, open source software had a very slow beginning primarily because of some preconceived notions surrounding it. Firstly, open source software was perceived as a product of academics and hobbyist programmers.4 Secondly, it was thought to be technically inferior to proprietary software.5 However, with the passage of time, the technical issues got relegated to the backside and issues pertaining to copyright, licensing, warranty, etc., began to be debated across the globe.6 * Professor—Public Policy and Management, Indian Institute of Management Calcutta; Thomas Edison Innovation Fellow (2016–17), Center for the Protection of Intellectual Property, George Mason University School of Law. 1.
    [Show full text]