Language Selection

English French German Italian Portuguese Spanish

Lessons learned from Groklaw

Filed under

Like many, I was surprised-but-not-really when Pamela Jones announced that she would be retiring original content on the legal analysis site that grew to fame within and without the open source community as it rose to do battle with the incredibly audacious claims by The SCO Group that Linux was directly derived from UNIX.

For eight years, Groklaw was the center of the fight between Linux companies and interests and SCO's efforts to build a licensing business on the back of open source. While Novell was legally the victor in the year-long legal fight by raising its hand and reminding everyone--including SCO, it seemed--that it was they, not SCO, who actually owned the UNIX copyrights.

Yeah, that was awkward. (But pretty funny.)

The not-really-surprised part comes from the fact that Jones herself hinted on Christmas Day that she was contemplating a change for her status on Groklaw. At the time, Jones seemed disillusioned that after all of the hard work performed on Groklaw by her and the über-dedicated group of volunteers, "Novell taking money from Microsoft and contractually agreeing to show up at Open XML standards meetings and events."

rest here

Groklaw: An Appreciation If you’re a regular reader of The Standards Blog, there’s an excellent chance that you already know that Pamela Jones – "PJ" to one and all – announced on Saturday that she would post her last article at Groklaw on May 16. Certain aspects of the site will remain available indefinitely.

It’s difficult to know where to begin in saying “goodbye” to Groklaw. What PJ and her many cohorts accomplished there has been unique in my experience. In many ways, Groklaw exemplifies the transformational power that the Internet has brought to law, society, technology, and the advancement of all things open.

Consider just a few of the core attributes of Groklaw:

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

KTU exams to run on open source software

All examinations of the A.P.J. Abdul Kalam Technological University (KTU) — which run on an online platform — would switch to open source software from the second semester onwards. For the first semester examinations, the KTU would use a proprietary, Microsoft, software. In response to demands from student organisations, the KTU has pushed back its first semester examinations by two days. The first of the examinations would now begin on December 4 instead of December 2. The first of the results would be published on December 19. Read more Also: KTU goes ahead with exam outsourcing

CMS News

Security Leftovers

  • Friday's security updates
  • Researchers poke hole in custom crypto built for Amazon Web Services
    Underscoring just how hard it is to design secure cryptographic software, academic researchers recently uncovered a potentially serious weakness in an early version of the code library protecting Amazon Web Services. Ironically, s2n, as Amazon's transport layer security implementation is called, was intended to be a simpler, more secure way to encrypt and authenticate Web sessions. Where the OpenSSL library requires more than 70,000 lines of code to execute the highly complex TLS standard, s2n—short for signal to noise—has just 6,000 lines. Amazon hailed the brevity as a key security feature when unveiling s2n in June. What's more, Amazon said the new code had already passed three external security evaluations and penetration tests.
  • Social engineering: hacker tricks that make recipients click
    Social engineering is one of the most powerful tools in the hacker's arsenal and it generally plays a part in most of the major security breaches we hear about today. However, there is a common misconception around the role social engineering plays in attacks.
  • Judge Gives Preliminary Approval to $8 Million Settlement Over Sony Hack
    Sony agreed to reimburse employees up to $10,000 apiece for identity-theft losses
  • Cyber Monday: it's the most wonderful time of year for cyber-attackers
    Malicious attacks on shoppers increased 40% on Cyber Monday in 2013 and 2014, according to, an anti-malware and spyware company, compared to the average number of attacks on days during the month prior. Other cybersecurity software providers have identified the December holiday shopping season as the most dangerous time of year to make online purchases. “The attackers know that there are more people online, so there will be more attacks,” said Christopher Budd, Trend Micro’s global threat communications manager. “Cyber Monday is not a one-day thing, it’s the beginning of a sustained focus on attacks that go after people in the holiday shopping season.”

Openwashing (Fake FOSS)