Language Selection

English French German Italian Portuguese Spanish

Commercial Open Source?

Filed under
OSS

Here’s a wrinkle that many devotees of open source either don’t know about, or don’t talk about. As it turns out, open source projects can get acquired by commercial software companies. And to prove that point, one of the more popular open source projects on sourceforge.net was acquired last week. To what extent the acquisition of an open source project results in its being taken out off the open source shelves depends on many things. For example, how many people were contributing to it before the acquisition, who are they, and what are their plans now that their open source project has been acquired?

To acquire an open source project, the acquirer has to, with almost 100 percent certainty, be sure that they are acquiring the copyrights to all of the code being used in the project. Those copyrights ultimately belong to the individual contributors to the project who, up until the point of acquisition, would have been bequeathing certain rights to their code to others under whatever open source license is behind the project. To the extent that licensing that code under an OSI-approved license is what let the code out out of the box and into the open source wild, there’s nothing that the acquirer can do to put it back in the box. That code will always remain available under whatever open source license it was published. But, by acquiring the copyrights and any trademarks that are associated with that code, the acquirer also acquires the right to modify and distribute the original code without having to make those modifications available under an open source license. In other words, future versions of the open source software could become closed source. So, how could this play out?

With a project like Linux, there’s pretty much a zero probablility of the project ever being acquired because of how many contributors are involved. Not only would it be difficult to track them all down, establish with some degree that they are indeed the copyright holders, and reach some mutually beneficial financial arrangement to give an acquirer all the rights they need. There’s also the high likelihood that some passionate group of developers would take the core body of source code that was already available under an open source license (the GPL), and exercise their rights to continue the evolution of an open source version of Linux. The end result, even if someone successfully "acquired" Linux, would be a tangible forking of the code. One fork would be open source version that the passionate community carried forward. The other would be the commercial derivative that was some percentage open source (by virtue of the "grandfathered" code base), and some percentage closed source.

But what about a popular open source project that has far fewer developers with far fewer copyrights to track down? Sure, the developers could sell their copyrights to the acquirer, but nothing prevents them from continuing to evolve the already open-sourced code under an open source license. That is, unless, in the process of acquiring the copyrights to the source code, the acquirer also hires the most passionate developers — the driving forces — behind the open source project.

Full Story.

More in Tux Machines

Darling ('Wine' for OS X) and Games Leftovers

Linux 4.13.14, 4.9.63, 4.4.99, and 3.18.82

Security: Amazon, Microsoft, and John Draper

  • Amazon security camera could be remotely disabled by rogue couriers

    However, researchers from Rhino Security Labs found attacking the camera's Wi-Fi with a distributed denial of service attack, which sends thousands of information requests to the device, allowed them to freeze the camera. It would then continue to show the last frame broadcast, rather than going offline or alerting the user it had stopped working.

  • Pentagon contractor leaves social media spy archive wide open on Amazon
    A Pentagon contractor left a vast archive of social-media posts on a publicly accessible Amazon account in what appears to be a military-sponsored intelligence-gathering operation that targeted people in the US and other parts of the world. The three cloud-based storage buckets contained at least 1.8 billion scraped online posts spanning eight years, researchers from security firm UpGuard's Cyber Risk Team said in a blog post published Friday. The cache included many posts that appeared to be benign, and in many cases those involved from people in the US, a finding that raises privacy and civil-liberties questions. Facebook was one of the sites that originally hosted the scraped content. Other venues included soccer discussion groups and video game forums. Topics in the scraped content were extremely wide ranging and included Arabic language posts mocking ISIS and Pashto language comments made on the official Facebook page of Pakistani politician Imran Khan.
  • Pirated Microsoft Software Enabled NSA Hack says Kaspersky
    Earlier reports accused Kaspersky's antivirus software which was running on the NSA worker's home computer to be the reason behind the Russian spies to access the machine and steal important documents which belonged to NSA hacking unit, Equation Group.
  • Iconic hacker booted from conferences after sexual misconduct claims surface
    John Draper, a legendary figure in the world of pre-digital phone hacking known as "phreaking," has been publicly accused of inappropriate sexual behavior going back nearly two decades. According to a new Friday report by BuzzFeed News, Draper, who is also known as "Captain Crunch," acted inappropriately with six adult men and minors between 1999 and 2007 during so-called "energy" exercises, which sometimes resulted in private invitations to his hotel room. There, Draper allegedly made unwanted sexual advances. As a result of the new revelations, Draper, 74, is now no longer welcome at Defcon. Michael Farnum, the founder of HOU.SEC.CON, told Ars on Friday afternoon that Draper, who had been scheduled to speak in April 2018, was disinvited.

Debian Developers

  • Joey Hess: stupid long route
    Yesterday, I surpassed all that, and I did it in a way that hearkens right back to the original story. I had two computers, 20 feet apart, I wanted one to talk to the other, and the route between the two ended up traveling not around the Earth, but almost the distance to the Moon. I was rebuilding my home's access point, and ran into a annoying bug that prevented it from listening to wifi. I knew it was still connected over ethernet to the satellite receiver. I connected my laptop to the satellite receiver over wifi. But, I didn't know the IP address to reach the access point. Then I remembered I had set it up so incoming ssh to the satellite receiver was directed to the access point.
  • I am now a Debian Developer
    On the 6th of April 2017, I finally took the plunge and applied for Debian Developer status. On 1 August, during DebConf in Montréal, my application was approved. If you’re paying attention to the dates you might notice that that was nearly 4 months ago already. I was trying to write a story about how it came to be, but it ended up long. Really long (current draft is around 20 times longer than this entire post). So I decided I’d rather do a proper bio page one day and just do a super short version for now so that someone might end up actually reading it.
  • Freexian’s report about Debian Long Term Support, October 2017
    Like each month, here comes a report about the work of paid contributors to Debian LTS.