Free Software, Free Society: Selected Essays of Richard M
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Easy As Abc: Categorizing Open Source Licenses
EASY AS ABC: CATEGORIZING OPEN SOURCE LICENSES Andrew T. Pham1, Matthew B. Weinstein2, Jamie L. Ryerson3 With more than 180,000 open source projects available and its more than 1400 unique licenses, the complexity of deciding how to manage open source usage within “closed-source” commercial enterprises have dramatically increased.4 Because of the complexity and risks associated with open source—where source code is made freely available for all to review, edit, and use—many closed-source commercial enterprises discourage or prohibit use of open source; a common and short-sighted practice. With a proper open source management framework, open source can be an invaluable resource, and its risks can be understood, managed and controlled. This article proposes a simple, consistent and effective open source categorization and management system to enable a peaceful coexistence between open source and closed-source codes. Free and open source software (“FOSS” or collectively “open source”) is a valuable tool, but one that must be understood to be used effectively. The litany of risks associated with use of open source include: having to release a derivative product incorporating open source under the same open source license; incorporating code that infringes a patent; violating an open source license’s attribution requirements; and a lack of warranties and indemnities. Given the extensive investment of time, money and resources that goes into product development, it comes as no This article is an edited version of the original, which dealt not only with categorizing open source licenses but also a wider array of issues associated with implementing an open source policy. -
Practice Tips for Open Source Licensing Adam Kubelka
Santa Clara High Technology Law Journal Volume 22 | Issue 4 Article 4 2006 No Free Beer - Practice Tips for Open Source Licensing Adam Kubelka Matthew aF wcett Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Law Commons Recommended Citation Adam Kubelka and Matthew Fawcett, No Free Beer - Practice Tips for Open Source Licensing, 22 Santa Clara High Tech. L.J. 797 (2005). Available at: http://digitalcommons.law.scu.edu/chtlj/vol22/iss4/4 This Article is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. ARTICLE NO FREE BEER - PRACTICE TIPS FOR OPEN SOURCE LICENSING Adam Kubelkat Matthew Fawcetttt I. INTRODUCTION Open source software is big business. According to research conducted by Optaros, Inc., and InformationWeek magazine, 87 percent of the 512 companies surveyed use open source software, with companies earning over $1 billion in annual revenue saving an average of $3.3 million by using open source software in 2004.1 Open source is not just staying in computer rooms either-it is increasingly grabbing intellectual property headlines and entering mainstream news on issues like the following: i. A $5 billion dollar legal dispute between SCO Group Inc. (SCO) and International Business Machines Corp. t Adam Kubelka is Corporate Counsel at JDS Uniphase Corporation, where he advises the company on matters related to the commercialization of its products. -
Circular 1 Copyright Basics
CIRCULAR 1 Copyright Basics Copyright is a form of protection Copyright is a form of protection provided by the laws of the provided by U.S. law to authors of United States to the authors of “original works of authorship” that are fixed in a tangible form of expression. An original “original works of authorship” from work of authorship is a work that is independently created by the time the works are created in a a human author and possesses at least some minimal degree of creativity. A work is “fixed” when it is captured (either fixed form. This circular provides an by or under the authority of an author) in a sufficiently overview of basic facts about copyright permanent medium such that the work can be perceived, and copyright registration with the reproduced, or communicated for more than a short time. Copyright protection in the United States exists automatically U.S. Copyright Office. It covers from the moment the original work of authorship is fixed.1 • Works eligible for protection • Rights of copyright owners What Works Are Protected? • Who can claim copyright • Duration of copyright Examples of copyrightable works include • Literary works • Musical works, including any accompanying words • Dramatic works, including any accompanying music • Pantomimes and choreographic works • Pictorial, graphic, and sculptural works • Motion pictures and other audiovisual works • Sound recordings, which are works that result from the fixation of a series of musical, spoken, or other sounds • Architectural works These categories should be viewed broadly for the purpose of registering your work. For example, computer programs and certain “compilations” can be registered as “literary works”; maps and technical drawings can be registered as “pictorial, graphic, and sculptural works.” w copyright.gov note: Before 1978, federal copyright was generally secured by publishing a work with an appro- priate copyright notice. -
Multiprocessor Initialization of INTEL SOC in Coreboot
Multiprocessor Initialization OF INTEL SOC in Coreboot Pratik Prajapati ([email protected]) Subrata Banik ([email protected]) 1 Agenda • Intel Multiple Processor (MP) Initialization • Coreboot + Intel FSP Boot Flow • Problem with existing model • Solution space • Design • Future Scope 2 Intel Multiple Processor (MP) Initialization • The IA-32 architecture (beginning with the P6 family processors) defines a multiple-processor (MP) initialization protocol called the Multiprocessor Specification Version 1.4. • The MP initialization protocol has the following important features: • It supports controlled booting of multiple processors without requiring dedicated system hardware. • It allows hardware to initiate the booting of a system without the need for a dedicated signal or a predefined boot processor. • It allows all IA-32 processors to be booted in the same manner, including those supporting Intel Hyper-Threading Technology. • The MP initialization protocol also applies to MP systems using Intel 64 processors. • Entire CPU multiprocessor initialization can be divided into two parts – BSP (Boot Strap Processor) Initialization – AP (Application Processor) Initialization Reference: Intel SDM Multiple Processor Init - section 8.4 3 Coreboot + Intel FSP (Firmware support package) Boot Flow Coreboot/BIOS FSP * Coreboot uses its own temp ram init code. 4 Problem Statement with existing model • Background: Coreboot is capable enough to handle multiprocessor initialization on IA platforms. So ideally, CPU features programming can be part of Coreboot MP Init sequence. • But, there might be some cases where certain feature programming can't be done with current flow of MP init sequence. Because, Intel FSP-S has to program certain registers to meet silicon init flow due to SAI (Security Attributes of Initiator) and has to lock other registers before exiting silicon init API. -
An Introduction to Software Licensing
An Introduction to Software Licensing James Willenbring Software Engineering and Research Department Center for Computing Research Sandia National Laboratories David Bernholdt Oak Ridge National Laboratory Please open the Q&A Google Doc so that I can ask you Michael Heroux some questions! Sandia National Laboratories http://bit.ly/IDEAS-licensing ATPESC 2019 Q Center, St. Charles, IL (USA) (And you’re welcome to ask See slide 2 for 8 August 2019 license details me questions too) exascaleproject.org Disclaimers, license, citation, and acknowledgements Disclaimers • This is not legal advice (TINLA). Consult with true experts before making any consequential decisions • Copyright laws differ by country. Some info may be US-centric License and Citation • This work is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0). • Requested citation: James Willenbring, David Bernholdt and Michael Heroux, An Introduction to Software Licensing, tutorial, in Argonne Training Program on Extreme-Scale Computing (ATPESC) 2019. • An earlier presentation is archived at https://ideas-productivity.org/events/hpc-best-practices-webinars/#webinar024 Acknowledgements • This work was supported by the U.S. Department of Energy Office of Science, Office of Advanced Scientific Computing Research (ASCR), and by the Exascale Computing Project (17-SC-20-SC), a collaborative effort of the U.S. Department of Energy Office of Science and the National Nuclear Security Administration. • This work was performed in part at the Oak Ridge National Laboratory, which is managed by UT-Battelle, LLC for the U.S. Department of Energy under Contract No. DE-AC05-00OR22725. • This work was performed in part at Sandia National Laboratories. -
Audiences, Gender and Community in Fan Vidding Katharina M
University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections 2011 "Veni, Vidi, Vids!" audiences, gender and community in Fan Vidding Katharina M. Freund University of Wollongong, [email protected] Recommended Citation Freund, Katharina M., "Veni, Vidi, Vids!" audiences, gender and community in Fan Vidding, Doctor of Philosophy thesis, School of Social Sciences, Media and Communications, Faculty of Arts, University of Wollongong, 2011. http://ro.uow.edu.au/theses/3447 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] “Veni, Vidi, Vids!”: Audiences, Gender and Community in Fan Vidding A thesis submitted in fulfilment of the requirements for the award of the degree Doctor of Philosophy From University of Wollongong by Katharina Freund (BA Hons) School of Social Sciences, Media and Communications 2011 CERTIFICATION I, Katharina Freund, declare that this thesis, submitted in fulfilment of the requirements for the award of Doctor of Philosophy, in the Arts Faculty, University of Wollongong, is wholly my own work unless otherwise referenced or acknowledged. The document has not been submitted for qualifications at any other academic institution. Katharina Freund 30 September, 2011 i ABSTRACT This thesis documents and analyses the contemporary community of (mostly) female fan video editors, known as vidders, through a triangulated, ethnographic study. It provides historical and contextual background for the development of the vidding community, and explores the role of agency among this specialised audience community. Utilising semiotic theory, it offers a theoretical language for understanding the structure and function of remix videos. -
The Walled Gardens of Ebook Surveillance: a Brief Set of Arguments Against DRM in Libraries
City University of New York (CUNY) CUNY Academic Works Publications and Research CUNY Graduate Center 2015 The Walled Gardens of Ebook Surveillance: A Brief Set of Arguments Against DRM in Libraries Alycia Sellie Graduate Center, CUNY How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/gc_pubs/162 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] The Walled Gardens of Ebook Surveillance: A Brief Set of Arguments Against DRM in Libraries There are three claims I will make in this article about including electronic books with DRM restrictions in library collections. These arguments center upon what the presence of restricted ebooks signifies to patrons about libraries. The first argument outlines how providing books with DRM encourages library users to adopt low expectations for how their personal information will be shared and collected. Second, when users encounter DRM within library collections, not only are they frustrated by the ways that these systems restrict their use of a text, but they become more broadly disappointed in their library. Finally, I will show how the current technological landscape that allows third party surveillance via DRM threatens the professional standing of librarians as protectors of patron information. What is DRM? To me, DRM stands for Digital Restrictions Management. But choosing to call it such is a political choice.1 Others refer to DRM as Digital Rights Management. In a nutshell, DRM controls access to digital content and restricts the functionality a devices, such as an ebook reader or computer. -
Copyright Online Education
Roadmap Copyright online education April 2018 Education and Student Affairs 1 | Roadmap for Copyright April 2018 Table of content Table of content ....................................................................................2 Introduction .........................................................................................3 Open Education and Licenses ...................................................................4 What you further have to know about Creative Commons .............................6 What is… .............................................................................................7 Flow chart for the use of footage in ..........................................................9 Searching for images, audio or video via CC Search ................................... 10 More websites with new CC footage ........................................................ 11 Attributing works ................................................................................. 12 Copyright and Brightspace .................................................................... 14 Contact .............................................................................................. 16 2 | Roadmap for Copyright April 2018 1. Introduction Education is based on a foundation of sharing. In our education we share knowledge with our students and our fellow teachers. Sharing educational resources openly and offering open and online courses gives others a chance to benefit from the knowledge we teach. In return others can contribute back -
Linux and Free Software: What and Why?
Linux and Free Software: What and Why? (Qué son Linux y el Software libre y cómo beneficia su uso a las empresas para lograr productividad económica y ventajas técnicas?) JugoJugo CreativoCreativo Michael Kerrisk UniversidadUniversidad dede SantanderSantander UDESUDES © 2012 Bucaramanga,Bucaramanga, ColombiaColombia [email protected] 77 JuneJune 20122012 http://man7.org/ man7.org 1 Who am I? ● Programmer, educator, and writer ● UNIX since 1987; Linux since late 1990s ● Linux man-pages maintainer since 2004 ● Author of a book on Linux programming man7.org 2 Overview ● What is Linux? ● How are Linux and Free Software created? ● History ● Where is Linux used today? ● What is Free Software? ● Source code; Software licensing ● Importance and advantages of Free Software and Software Freedom ● Concluding remarks man7.org 3 ● What is Linux? ● How are Linux and Free Software created? ● History ● Where is Linux used today? ● What is Free Software? ● Source code; Software licensing ● Importance and advantages of Free Software and Software Freedom ● Concluding remarks man7.org 4 What is Linux? ● An operating system (sistema operativo) ● (Operating System = OS) ● Examples of other operating systems: ● Windows ● Mac OS X Penguins are the Linux mascot man7.org 5 But, what's an operating system? ● Two definitions: ● Kernel ● Kernel + package of common programs man7.org 6 OS Definition 1: Kernel ● Computer scientists' definition: ● Operating System = Kernel (núcleo) ● Kernel = fundamental program on which all other programs depend man7.org 7 Programs can live -
Jaromil's Research 2009
Jaromil’s Research 2009 Jaromil’s Journal of Musings November 12, 2010 Almost every day I dedicate 2 good hours to research: nothing in particular, just looking around for inspirations, tools, publications and what not. Thanks go to the NIMk1 employing me in research and development. This diary is still in fieri: some links are scattered and still lacking comments, while it will grow complete over time, you might be also interested to read the research diary 20082. : Mon, 5 Jan 2009 John Maddog Hall: http://www.linux-magazine.com/online/blogs/paw_prints_writings_of_the_ maddog/campus_party_brazil_maddog_s_challenge_multimedia_and_free_software : Wed, 7 Jan 2009 uscito zeitgeist final ??? Not quite in the zone Fri, 9 Jan 2009 http://www.metamute.org/en/content/not_quite_in_the_zone Ben Watson http://www.militantesthetix. co.uk/ Politics in Israel Tue, 13 Jan 2009 Just before the elections in Israel and right after the massacre of civilians in Gaza, which also included bombing of UN headquarters and public incitations to murder peace activists3, it’s maybe time to have a look at how reasonable people are doing over there. One impressive campaign is December 18th4: at the motto of FREE THE SHMINISTIM“ young conscious objectors (among them also the daughter of a former deputy head of Mossad) stepped forward and refused to serve the omnipresent militarization of Israel, the country where they are born and that still forces them to serve IDF for 2 to 3 years. Since 20 years now (and finally) we had abolition of coercive military service for youth in Europe: this is definitely one of the most important political standpoints for Israel to work on, if it intends to get closer to Europe. -
A Successor to the X Window System
Y: A Successor to the X Window System Mark Thomas <[email protected]> Project Supervisor: D. R¨uckert <[email protected]> Second Marker: E. Lupu <[email protected]> June 18, 2003 ii Abstract UNIX desktop environments are a mess. The proliferation of incompatible and inconsistent user interface toolkits is now the primary factor in the failure of enterprises to adopt UNIX as a desktop solution. This report documents the creation of a comprehensive, elegant framework for a complete windowing system, including a standardised graphical user interface toolkit. ‘Y’ addresses many of the problems associated with current systems, whilst keeping and improving on their best features. An initial implementation, which supports simple applications like a terminal emulator, a clock and a calculator, is provided. iii iv Acknowledgements Thanks to Daniel R¨uckert for supervising the project and for his help and advice regarding it. Thanks to David McBride for his assistance with setting up my project machine and providing me with an ATI Radeon for it. Thanks to Philip Willoughby for his knowledge of the POSIX standard and help with the GNU Autotools and some of the more obscure libc functions. Thanks to Andrew Suffield for his help with the GNU Autotools and Arch. Thanks to Nick Maynard and Karl O’Keeffe for discussions on window system and GUI design. Thanks to Tim Southerwood for discussions about possible features of Y. Thanks to Duncan White for discussions about the virtues of X. All company and product names are trademarks and/or registered trademarks of their respective owners. -
Free Software Foundation, Inc
Comment Regarding a Proposed Exemption Under 17 U.S.C. 1201 Item 1. Commenter Information Donald Robertson, III Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor Boston, MA 02110-1335 [email protected] This comment is filed by the Free Software Foundation, a charitable corporation founded in 1985. The Foundation is the largest single contributor to the GNU operating system (used widely today in its GNU/Linux variant). The Foundation's GNU General Public License is the most widely used free software license, covering major components of the GNU operating system and tens of thousands of other computer programs used on hundreds of millions of computers around the world. Item 2. Proposed Class Addressed Class 7: 7(a) Motion Pictures—Text and Data Mining 7(b) Literary Works—Text and Data Mining Item 3. Statement Regarding Proposed Exemption The GNU/Linux operating system has become one of the most widely used operating systems on the planet. The GNU System and the kernel Linux are called free software because users are free to study, share, and improve the software. Those who promote free software believe that controlling one’s own computing should be a universal right. Digital restrictions interfere with the ability to enjoy these freedoms. Circumventing such restrictions for any use should not come with the threat of legal sanction. The process of continually applying for exemptions under 17 U.S.C. 1201 is onerous and instead any circumvention for a non-infringing purpose should be permitted. However, where exemptions are used to safeguard the public from these laws, it must be the case that exemptions should cover the sharing and distribution of software and instructions for circumventing access control technologies.