Language Selection

English French German Italian Portuguese Spanish

Licensing and FUD About Free Software

Filed under
OSS
Legal
  • Open Source License Compliance: Raising the Bar [Ed: Spreading FUD about "risk" of Free software licenses... in order to sell one's own proprietary software 'solution']

    Question is, can you have true security without being a company that focuses on license compliance? I think not.

    Some companies count on using open source software with no regard for the licenses associated with the code they use. Open source licenses give others permission to modify, use, and distribute software, but under specific conditions and terms. And, every component may very well have a different license. With the volume of open source being used, you can see how quickly this can get out of hand and lead to IP, reputation, and subsequent litigation down the road.

    Another statement I use quite a bit, “It’s a must, not a maybe.” Development teams need to respect the legalities associated with source code licensing by passing along a copyright statement or a copy of license text, or by providing the entire source code for the company’s product. Licenses range from fairly permissive (allowing the licensee to use code without responsibilities) to highly restrictive (extremely limiting, even requiring you to make your proprietary project subject to the same licensing terms of the OSS used).

  • Open source licence series - Altus: open source is big business, get used to it

    The idea that open source developers are college students, creating some really cool software that big organisations then exploit and don’t give anything back may have been valid 20 years ago, but not today, it’s not how things work.

    Open source is now big, with major players driving innovation, like the OpenBank Project, the Banking API platform and OpenLogic.

    For a working example, AT&T is (obviously) a household name and very large quoted business. The organisation provides the majority of engineering, design and architectural resource for the ONAP open source project.

  • Open source licence series - Rancher Labs: Why vendor 'strip-mining' is an opportunity, not a threat
  • Open source licence series – Delphix: Rent vs buy, which fits your licencing cost model?
  • Open source licence series – Puppet: consumption without collaboration equals consternation
  • Open source licence series – Tidelift: Ethical source-available licenses challenge open source
  • Open-Source Software in Federal Procurements: The Good, the Bad, and the Ugly, Part 2 – The Bad

    In the first post of this series, we discussed “the good” of open-source software and why federal buyers should find it attractive. However, when it comes to the federal government accepting open-source code with open arms, the reality is certainly more mixed. Faced with changing and technical regulations, government contractors need to know the major drawbacks of using open-source code in government contracts. In this second entry to our open-source series, we explore “the bad” impacts of open-source use in government contracting.

  • EDRM Announces Newest Affinity Partner Merlin Legal Open Source Foundation and New Processing Specifications Project

    Setting the global standards for e-discovery, the Electronic Discovery Reference Model (EDRM) is pleased to announce its newest affinity partner, the Merlin Legal Open Source Foundation, a nonprofit organization with a mission to improve access to justice and make legal and regulatory compliance more efficient through the use of open source software and secure cloud computing. The Merlin Foundation was established in 2019 by John Tredennick, its executive director and a longtime industry expert and former CEO and founder of Catalyst Repository Systems, a leading search and technology-assisted review e-discovery platform.

Ugly Law Firms About "Ugly" Free Software

  • Open-Source Software in Federal Procurements: The Good, the Bad, and the Ugly, Part 3 – The Ugly

    Concluding our blog series on open-source software in the government market, it is time to turn to the darker side of things. We already discussed the “good” of open-source software for government buyers, and we walked through the “bad,” explaining how some elements may conflict with federal laws or priorities. Now we will look at the “ugly” side of open-source software and how contractors can mitigate associated risks.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Security and FUD

  • Security updates for Thursday

    Security updates have been issued by Fedora (dovecot, dpdk, knot-resolver, and unbound), Mageia (ant, libexif, and php), SUSE (libmspack), and Ubuntu (php5, php7.0, php7.2, php7.3, php7.4 and unbound).

  • 5 Kernel Live Patching Tools That Will Help To Run Linux Servers Without Reboots

    Within IT organizations, there are processes and practices so routine that they are invisible. It doesn’t matter if such processes and practices are flawed, or if there exists a better way: if something has worked for a few years, people stop looking for alternatives. This perfectly describes current approaches to kernel patching. Right now, most organizations patch the servers by planning reboot cycles. Because rebooting the server fleet is a headache that causes downtime, people put it off for as long as they can. Which means patches aren’t applied as early as possible. This gap between patch issue and its application means risk, malpractice and may cause non-compliance. This standard approach to kernel patching exposes servers to malicious intent by threat actors on multiple attack vectors, putting IT organizations at risk of major security issues. Anyone tasked with keeping their organization safe from cyber attacks should be seeking a better way to run Linux servers without reboots (ideally, for years). In this article you will learn what is live patching, how it ensures the uptime, what 5 tools are available to help you run servers for years – without reboots and what are the advantages and drawbacks of each tool.

  • USB systems may have some serious security flaws - especially on Linux [Ed: ZDNet's FUD is going places; the tests were mostly done on Linux, so it's hardly shocking that the bugs found were in Linux. But it's presented as Linux being particularly bad.]

    Academics have developed a new tool that allowed them to discover 26 previously unidentified vulnerabilities in the USB driver stack used by many popular operating systems including Linux, macOS, Windows and FreeBSD.

  • New fuzzing tool picks up insecure USB driver code

    Matthias Payer at the federal polytechnic school in Lausanne, Switzerland, and Hui Peng at Purdue University, United States, said [pdf] that they leveraged open-source components such as QEMU processor emulator to design a tool that's low-cost and hardware independent, called USBFuzz.

  • New fuzzing tool for USB drivers uncovers bugs in Linux, macOS, Windows

    With a new fuzzing tool created specifically for testing the security of USB drivers, researchers have discovered more than two dozen vulnerabilities in a variety of operating systems. “USBFuzz discovered a total of 26 new bugs, including 16 memory bugs of high security impact in various Linux subsystems (USB core, USB sound, and network), one bug in FreeBSD, three in macOS (two resulting in an unplanned reboot and one freezing the system), and four in Windows 8 and Windows 10 (resulting in Blue Screens of Death), and one bug in the Linux USB host controller driver and another one in a USB camera driver,” Hui Peng and Mathias Payer explained.

  • NSA: Russian agents have been hacking major email program

    The U.S. National Security Agency says the same Russian military hacking group that interfered in the 2016 presidential election and unleashed a devastating malware attack the following year has been exploiting a major email server program since last August or earlier. The timing of the agency's advisory Thursday was unusual considering that the critical vulnerability in the Exim Mail Transfer Agent — which mostly runs on Unix-type operating systems — was identified 11 months ago, when a patch was issued. Exim is so widely used — though far less known than such commercial alternatives as Microsoft's proprietary Exchange — that some companies and government agencies that run it may still not have patched the vulnerability, said Jake Williams, president of Rendition Infosec and a former U.S. government hacker.

KDE: Akademy 2020 and GSoC 2020

  • Send your talks for Akademy 2020 *now*

    The Call for Participation is still open for two weeks more, but please make us a favour and send yours *now*. This way we don't have to panic thinking if we are going to need to go chasing people or not, or if we're going to have too few or too many proposals. Also if you ask the talks committee for review, we can review your talk early, give you feedback and improve it, so it's a win-win.

  • Status report: Community Bonding

    I’m checking in today to let you know what I did in my GSoC project these past weeks. This Community Bonding period was really wonderful; although I’ve been more or less involved with the project since 2016, I’ve acquainted myself with the efforts of each of the members, and so far it’s been a wonderful experience. During these past weeks, I’ve been preparing for the coding period by talking with Boudewijn and Wolthera about the particulars of Krita’s file format and build system. The objectives for the past two meetings were:

  • GSoC'20 with KDE

    About the Project The project involves improving KDE Web Infrastructure. KDE has a lot of websites and some of them like the main website could use an update. The first part of the project involves porting kde.org to use Hugo- A go based static site generator. kde.org is very old and thus contains a lot of pages. This project would involve porting most of the pages to markdown so as to make the website faster and easier to develop. The second part of the project involves updating Season of KDE website. The goal is to use more modern tooling and add some new features. This project is a part of the transition of KDE websites from LDAP to OAuth based authentication. OAuth is a much more modern approach to authentication and would solve some headaches with the current authentication system.

Screencasts/Audiocasts/Shows: Ubuntu MATE 20.04 LTS, BSD Now and More

  • Ubuntu MATE 20.04 LTS overview | For a retrospective future.

    In this video, I am going to show an overview of Ubuntu MATE 20.04 LTS and some of the applications pre-installed.

  • BSD Now 352: Introducing Randomness

    A brief introduction to randomness, logs grinding netatalk to a hault, NetBSD core team changes, Using qemu guest agent on OpenBSD kvm/qemu guests, WireGuard patchset for OpenBSD, FreeBSD 12.1 on a laptop, and more.

  • Bad Voltage 3×05: This Podcast Will Self Destruct

    Stuart Langridge, Jono Bacon, and Jeremy Garcia present Bad Voltage, in which we are rendered with one meelion triangles.

  • Bread and Butter Django - Building SaaS #58

    In this episode, I worked on a views and templates. There are a number of core pages that are required to flesh out the minimal interface for the app. We’re building them. I began by showing the page that we were going to work on. I outlined the changes I planned to make, then we started. The first thing we added was data about the school year, the main model on display in the page. I showed how to mock in the elements before adding real data.

Quarkus, a Kubernetes-native Java runtime, now fully supported by Red Hat

  • Quarkus, a Kubernetes-native Java runtime, now fully supported by Red Hat

    Java was introduced 25 years ago, and to this day, remains one of the most popular programming languages among developers. However, Java has developed a reputation for not being a good fit for cloud-native applications. Developers look for (and often choose) alternative frameworks such as Go and Node.js to support their cloud-native development requirements. Why learn another language when you can use your existing skills? Quarkus allows Java developers to leverage their expertise to develop cloud-native, event-driven, reactive, and serverless applications. Quarkus provides a cohesive Java platform that feels familiar but new at the same time. Not only does it leverage existing Java standards, but it also provides a number of features that optimize developer joy, including live coding, unified configuration, IDE plugins, and more.

  • Red Hat Tosses Its Weight Behind Quarkus

    Following recent announcements, Red Hat is now ready in fully supporting Quarkus to enhance its Kubernetes support. Quarkus is a Kubernetes-native Java stack to make the language more appealing in cloud-native use-cases. Quarkus optimizes the Java experience for containers and serverless environments.

  • Red Hat Delivers Quarkus As A Fully Supported Framework In Red Hat Runtimes

    By adding Quarkus as a supported runtime, Red Hat is helping to bring Java into the modern, cloud-native application development landscape and to approaches like microservices, containers and serverless, and enabling Java developers to continue working in the language they know and love.

  • Red Hat Runtimes adds Kubernetes-native Quarkus Java stack

    Red Hat’s Quarkus, a Kubernetes-native Java stack, is now supported on the Red Hat Runtimes platform for developing cloud-native applications. A build of Quarkus is now part of Red Hat Runtimes middleware and integrates with the Red Hat OpenShift Kubernetes container platform for managing cloud deployments, Red Hat said this week.