“Infectious” Open Source Software: Spreading Incentives Or Promoting Resistance?
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Licensing 101 December 3, 2020 Meet the Speakers
Licensing 101 December 3, 2020 Meet The Speakers Sushil Iyer Adam Kessel Principal Principal fr.com | 2 Roadmap • High level, introductory discussion on IP licensing • Topics – Types of IP – Monetization strategies – Key parts of a license agreement – Certain considerations • Licensing software, especially open source software • Licensing pharmaceutical patents • Trademarks • Trade secrets • Know-how fr.com | 3 Types of IP Patents Trademarks Copyrights Know-how (including trade secrets) fr.com | 4 Monetization Strategies • IP licensing – focus of this presentation – IP owner (licensor) retains ownership and grants certain rights to licensee – IP licensee obtains the legal rights to practice the IP – Bundle of rights can range from all the rights that the IP owner possesses to a subset of the same • Sale – IP owner (assignor) transfers ownership to the purchaser (assignee) • Litigation – Enforcement, by IP owner, of IP rights against an infringer who impermissibly practices the IP owner’s rights – Damages determined by a Court fr.com | 5 What is an IP License? • Contract between IP owner (Licensor) and Licensee – Licensor’s offer – grant of Licensor’s rights in IP • Patents – right to sell products that embody claimed inventions of Licensor’s US patents • Trademarks – right to use Licensor’s US marks on products or when selling products • Copyright – right to use and/or make derivative works of Licensor’s copyrighted work • Trade Secret – right to use and obligation to maintain Licensor’s trade secret – Licensee’s consideration – compensation -
IBM Websphere Studio Application Developer for Windows, Version 4.0 Helps Java Developers to Build, Test, and Deploy J2EE-Based E-Business Applications
Software Announcement November 6, 2001 IBM WebSphere Studio Application Developer for Windows, Version 4.0 Helps Java Developers To Build, Test, and Deploy J2EE-based e-business Applications Overview flexible source control management, pluggable At a Glance Introducing IBM′s premier Java repositories, as well as adapters development environment for for Concurrent Versioning System WebSphere Studio Application professional developers, the first (CVS) and for Rational ClearCase Developer for Windows, V4.0 product in the WebSphere Studio LT (CCLT) (Application Developer) provides product suite, WebSphere Studio • A comprehensive visual XML an advanced development Application Developer for development environment, environment for J2EE application Windows , V4.0 (Application including components for building development. Developer). DTDs, XML Schemas, XML files, and XSL style sheets Application Developer offers the Application Developer is built on the • Built-in WebSphere test following key functions: WebSphere Studio Workbench, an environment • integrated platform designed to A powerful Java development provide a common set of services Application Developer is next environment, that includes and frameworks unparalleled generation technology for support for JDK 1.3, a development tool integration and VisualAge for Java Enterprise configurable runtime, tool construction. Edition. It combines many popular incremental compilation, features of VisualAge for Java scrapbook, dynamic debugging, Application Developer includes the Enterprise Edition and WebSphere and a Java text editor • following functions: Studio Advanced Edition integrated Advanced Web, Java, and XML development environments • on top of WebSphere Studio An advanced development Workbench. designed to J2SE and J2EE environment for J2EE application specifications development that meets J2SE and Application Developer is focused on • A Relational Schema Center J2EE specifications and EJB optimizing J2EE application (RSC) focused on relational development and deployment and development. -
Android (Operating System) 1 Android (Operating System)
Android (operating system) 1 Android (operating system) Android Home screen displayed by Samsung Nexus S with Google running Android 2.3 "Gingerbread" Company / developer Google Inc., Open Handset Alliance [1] Programmed in C (core), C++ (some third-party libraries), Java (UI) Working state Current [2] Source model Free and open source software (3.0 is currently in closed development) Initial release 21 October 2008 Latest stable release Tablets: [3] 3.0.1 (Honeycomb) Phones: [3] 2.3.3 (Gingerbread) / 24 February 2011 [4] Supported platforms ARM, MIPS, Power, x86 Kernel type Monolithic, modified Linux kernel Default user interface Graphical [5] License Apache 2.0, Linux kernel patches are under GPL v2 Official website [www.android.com www.android.com] Android is a software stack for mobile devices that includes an operating system, middleware and key applications.[6] [7] Google Inc. purchased the initial developer of the software, Android Inc., in 2005.[8] Android's mobile operating system is based on a modified version of the Linux kernel. Google and other members of the Open Handset Alliance collaborated on Android's development and release.[9] [10] The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Android.[11] The Android operating system is the world's best-selling Smartphone platform.[12] [13] Android has a large community of developers writing applications ("apps") that extend the functionality of the devices. There are currently over 150,000 apps available for Android.[14] [15] Android Market is the online app store run by Google, though apps can also be downloaded from third-party sites. -
An Introduction to Software Licensing
An Introduction to Software Licensing James Willenbring Software Engineering and Research Department Center for Computing Research Sandia National Laboratories David Bernholdt Oak Ridge National Laboratory Please open the Q&A Google Doc so that I can ask you Michael Heroux some questions! Sandia National Laboratories http://bit.ly/IDEAS-licensing ATPESC 2019 Q Center, St. Charles, IL (USA) (And you’re welcome to ask See slide 2 for 8 August 2019 license details me questions too) exascaleproject.org Disclaimers, license, citation, and acknowledgements Disclaimers • This is not legal advice (TINLA). Consult with true experts before making any consequential decisions • Copyright laws differ by country. Some info may be US-centric License and Citation • This work is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0). • Requested citation: James Willenbring, David Bernholdt and Michael Heroux, An Introduction to Software Licensing, tutorial, in Argonne Training Program on Extreme-Scale Computing (ATPESC) 2019. • An earlier presentation is archived at https://ideas-productivity.org/events/hpc-best-practices-webinars/#webinar024 Acknowledgements • This work was supported by the U.S. Department of Energy Office of Science, Office of Advanced Scientific Computing Research (ASCR), and by the Exascale Computing Project (17-SC-20-SC), a collaborative effort of the U.S. Department of Energy Office of Science and the National Nuclear Security Administration. • This work was performed in part at the Oak Ridge National Laboratory, which is managed by UT-Battelle, LLC for the U.S. Department of Energy under Contract No. DE-AC05-00OR22725. • This work was performed in part at Sandia National Laboratories. -
Shared Source Licensing Program for the Windows Embedded Compact (Formerly Windows CE) Platform
9/6/2020 Shared Source Initiative | Licensing Program for the Windows Embedded Compact Platform Search Microsoft.com PRODUCTS STORE DOWNLOADS SUPPORT United States Shared Source Initiative > Windows Embedded Compact Source Licensing Program Shared Source Licensing Program for the Windows® Embedded Compact (formerly Windows CE) Platform Shared Source Licensing Programs Overview Microsoft offers a Shared Source licensing program for the Windows Embedded Compact (formerly Windows CE) platform. This program is applicable to the Windows Embedded Compact and Windows Embedded CE products. The Windows Embedded Shared Source program helps OEMs and developers speed development, reduce troubleshooting and code debugging time, receive assistance in remote device support and gain a deeper technical understanding of Windows Embedded Compact software. Public/Sample Source code is built at no additional cost into the purchased copies of the Windows Embedded Compact Platform Builder toolkit and provides access to nearly 4 million lines of code. Depending on a partner’s needs and qualifications, deeper levels of Shared Source code access (Private and Premium) are available. How to Participate Public/Sample Shared Source Public/Sample Shared Source code is available at no additional cost with each purchased copy of the Windows Embedded Compact 7 Platform Builder toolkit. Private Shared Source Private Shared Source Code is an optional component of the Windows Embedded Compact 7 Platform Builder toolkit that can be installed during the setup process. The toolkit user must electronically accept the terms and conditions of the Shared Source licensing agreement (EULA) before the Private source code can be installed. Premium Derivatives Program Microsoft also offers Premium access to advanced Windows Embedded Compact 7 source code through the Premium Derivatives licensing program. -
Real-Time Performance During CUDA™ a Demonstration and Analysis of Redhawk™ CUDA RT Optimizations
A Concurrent Real-Time White Paper 2881 Gateway Drive Pompano Beach, FL 33069 (954) 974-1700 real-time.ccur.com Real-Time Performance During CUDA™ A Demonstration and Analysis of RedHawk™ CUDA RT Optimizations By: Concurrent Real-Time Linux® Development Team November 2010 Overview There are many challenges to creating a real-time Linux distribution that provides guaranteed low process-dispatch latencies and minimal process run-time jitter. Concurrent Computer Corporation’s RedHawk Linux distribution meets and exceeds these challenges, providing a hard real-time environment on many qualified hardware configurations, even in the presence of a heavy system load. However, there are additional challenges faced when guaranteeing real-time performance of processes while CUDA applications are simultaneously running on the system. The proprietary CUDA driver supplied by NVIDIA® frequently makes demands upon kernel resources that can dramatically impact real-time performance. This paper discusses a demonstration application developed by Concurrent to illustrate that RedHawk Linux kernel optimizations allow hard real-time performance guarantees to be preserved even while demanding CUDA applications are running. The test results will show how RedHawk performance compares to CentOS performance running the same application. The design and implementation details of the demonstration application are also discussed in this paper. Demonstration This demonstration features two selectable real-time test modes: 1. Jitter Mode: measure and graph the run-time jitter of a real-time process 2. PDL Mode: measure and graph the process-dispatch latency of a real-time process While the demonstration is running, it is possible to switch between these different modes at any time. -
Creator's Guide to Commercializing Copyrighted Work
STANFORD UNIVERSITY OFFICE OF Creator’s Guide to TECHNOLOGY Commercializing LICENSING Copyrighted Work OURSES WEB C PHY BOOKS S SI E GRA OFT TE D TO WA S O HO R C P E V M S U ID Y M S H E I E O C O P P C A S H F R G O N R I I C G E D O T O R G I O E R O C A R E N P R H O Y S M H P C C P O O A D B E E C L I I I C L B S O E O U U R M A S M N E P O S I T W P E C I E F B S R S O I T E A E D I S V B W O T O F K O S S he Stanford University Office of Technology Licensing (OTL) promotes the transfer of Stanford technology for Tsociety’s use and benefit. This technology grows out of the CONTENTS boundless creativity found in the faculty, staff, and students at the University. When that creative expression is protected by copyright, OTL and our Stanford creators face a distinct set THE BASICS .......................................................................................2 of commercialization and distribution issues that they do not STanford’s copyrighT POLICY .......................................................5 encounter for other forms of intellectual property. SOFTWARE .........................................................................................8 OTL created this booklet to help Stanford creators successfully identify and CONTENT AND COURSES..................................................................15 navigate those issues. The booklet is focused on out-licensing or distributing OPEN SOURCE SOFTWARE LICENSING ..............................................18 creative works owned by Stanford. -
Mcafee Potentially Unwanted Programs (PUP) Policy March, 2018
POLICY McAfee Potentially Unwanted Programs (PUP) Policy March, 2018 McAfee recognizes that legitimate technologies such as commercial, shareware, freeware, or open source products may provide a value or benefit to a user. However, if these technologies also pose a risk to the user or their system, then users should consent to the behaviors exhibited by the software, understand the risks, and have adequate control over the technology. McAfee refers to technologies with these characteristics as “potentially unwanted program(s),” or “PUP(s).” The McAfee® PUP detection policy is based on the process includes assessing the risks to privacy, security, premise that users should understand what is being performance, and stability associated with the following: installed on their systems and be notified when a ■ Distribution: how users obtain the software including technology poses a risk to their system or privacy. advertisements, interstitials, landing-pages, linking, PUP detection and removal is intended to provide and bundling notification to our users when a software program or technology lacks sufficient notification or control over ■ Installation: whether the user can make an informed the software or fails to adequately gain user consent to decision about the software installation or add- the risks posed by the technology. McAfee Labs is the ons and can adequately back out of any undesired McAfee team responsible for researching and analyzing installations technologies for PUP characteristics. ■ Run-Time Behaviors: the behaviors exhibited by the technology including advertisements, deception, and McAfee Labs evaluates technologies to assess any impacts to privacy and security risks exhibited by the technology against the degree of user notification and control over the technology. -
Linux Low-Latency Tracing for Multicore Hard Real-Time Systems
Hindawi Publishing Corporation Advances in Computer Engineering Volume 2015, Article ID 261094, 8 pages http://dx.doi.org/10.1155/2015/261094 Research Article Linux Low-Latency Tracing for Multicore Hard Real-Time Systems Raphaël Beamonte and Michel R. Dagenais Computer and Software Engineering Department, Polytechnique Montreal, C.P. 6079, Station Downtown, Montreal,´ QC,CanadaH3C3A7 Correspondence should be addressed to Raphael¨ Beamonte; [email protected] Received 29 March 2015; Revised 21 July 2015; Accepted 29 July 2015 Academic Editor: Ying-Tung Hsiao Copyright © 2015 R. Beamonte and M. R. Dagenais. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Real-time systems have always been difficult to monitor and debug because of the timing constraints which rule out anytool significantly impacting the system latency and performance. Tracing is often the most reliable tool available for studying real-time systems. The real-time behavior of Linux systems has improved recently and it is possible to have latencies in the low microsecond range. Therefore, tracers must ensure that their overhead is within that range and predictable and scales well to multiple cores. The LTTng 2.0 tools have been optimized for multicore performance, scalability, and flexibility. We used and extended the real-time verification tool rteval to study the impact of LTTng on the maximum latency on hard real-time applications. We introduced a new real-time analysis tool to establish the baseline of real-time system performance and then to measure the impact added by tracing the kernel and userspace (UST) with LTTng. -
Third-Party License Acknowledgments
Symantec Privileged Access Manager Third-Party License Acknowledgments Version 3.4.3 Symantec Privileged Access Manager Third-Party License Acknowledgments Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. Copyright © 2021 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. 2 Symantec Privileged Access Manager Third-Party License Acknowledgments Contents Activation 1.1.1 ..................................................................................................................................... 7 Adal4j 1.1.2 ............................................................................................................................................ 7 AdoptOpenJDK 1.8.0_282-b08 ............................................................................................................ 7 Aespipe 2.4e aespipe ........................................................................................................................ -
Web Application for Generating a Standard Coordinated Documentation for CS Students’ Graduation Project in Gaza Universities Ibrahim M
International Journal of Engineering and Information Systems (IJEAIS) ISSN: 2000-000X Vol. 1 Issue 6, September – 2017, Pages: 155-167 Web Application for Generating a Standard Coordinated Documentation for CS Students’ Graduation Project in Gaza Universities Ibrahim M. Nasser, Samy S. Abu-Naser Faculty of Engineering and Information Technology, Al-Azhar University, Gaza, Palestine [email protected] Abstract: The computer science (CS) graduated students suffered from documenting their projects and specially from coordinating it. In addition, students’ supervisors faced difficulties with guiding their students to an efficient process of documenting. In this paper, we will offer a suggestion as a solution to the mentioned problems; that is an application to make the process of documenting computer science (CS) student graduation project easy and time-cost efficient. This solution will decrease the possibility of human mistakes and reduce the effort of documenting process. Keywords: web applications, cost efficient, time-cost efficient, documenting, software engineering, graduation projects. 1. INTRODUCTION Computer science (CS) is the study of the occurrences adjoining computers [1]. It's also defined as the study of computers and computational systems, computer scientists deal usually with software (unlike electrical and computer engineers), Primary parts of study inside Computer Science consist of computer systems, operating systems, networks, database systems, artificial intelligence, computer architecture, security, computer graphics, human computer interaction, systems analysis, software engineering, theory of computing and programming languages [11,17-28]. In computing, a web application is a client–server application that means, the client (like user interface) works in a web browser [2]. The general distinction between a web application and a dynamic web page is vague, web sites that we can name them as "web applications" are those have comparable functionality to a mobile application or to a desktop applications [3]. -
Titans and Trolls of the Open Source Arena
Titans and Trolls Enter the Open-Source Arena * by DEBRA BRUBAKER BURNS I. Introduction .................................................................................... 34 II. Legal Theories for Open Source Software License Enforcement ................................................................................... 38 A. OSS Licensing .......................................................................... 38 B. Legal Theories and Remedies for OSS Claims .................... 40 1. Legal Protections for OSS under Copyright and Contract Law ..................................................................... 40 Stronger Protections for OSS License under Copyright Law ................................................................... 40 2. Copyright-Ownership Challenges in OSS ....................... 42 3. Potential Legal Minefields for OSS under Patent Law ...................................................................................... 45 4. Added Legal Protection for OSS under Trademark Law ...................................................................................... 46 5. ITC 337 Action as Uncommon Legal Protection for OSS ..................................................................................... 49 III. Enforcement Within the OSS Community .................................. 49 A. Software Freedom Law Center Enforces OSS Licenses .... 50 B. Federal Circuit Finds OSS License Enforceable Under Copyright Law ......................................................................... 53 C. Commercial OSS