The document discusses open source software, open access, and open transfer. It begins with an introduction to open source software, noting that it involves freely available source code. It then covers topics like open access literature, which is digital content made freely available online, and how this is achieved through open access journals and repositories. It also discusses open transfer, which aims to allow continued access and use of patented technologies for nonprofit research through clauses included in licensing agreements. The presentation provides an overview of these different approaches to opening access to information and technologies.
There are hundreds of open source licenses. Most developers don't take the time to read or understand them, but can you continue to ignore them? We have seen a rise in litigation around open source license over the last 10 years. And, in the last 12 months we have seen the first examples of OSS copyright trolls that are taking developers to court in an attempt to monetize GPL violations.
This presentation covers: How OSS licenses are enforced;
What are the main types of OSS licenses; How to identify them;
and what steps you need to take to ensure you are complying.
We cover use case scenarios and do a "deep dive" on the most used licenses today and how to understand them
Electronic Transactions Law - Lecture 3: contractsCaroline B Ncube
油
This document discusses electronic contracts under South African law. It covers:
1) The essential requirements for a valid contract and how they apply to electronic contracts.
2) The reception theory which determines when electronic contracts are formed based on when messages are sent and received.
3) Different types of online agreements like shrinkwrap, clickwrap, and browsewrap contracts and when their terms can be considered binding.
4) Automated transactions under the Electronic Communications and Transactions Act and situations where agreements formed through electronic agents may not be enforceable.
The document discusses electronic contracts, including online contracts formed through click wrap and shrink wrap agreements. It defines electronic contracts as agreements formed through the internet using websites or email to establish offer and acceptance. While electronic contracts are similar to traditional contracts, the concepts of offer and acceptance must be adapted to the online context. It also discusses key issues like intention to contract, consideration, and remedies for breach. Specific types of electronic contracts like click wrap and shrink wrap agreements are examined in more detail.
The document discusses various factors that influence privacy such as cultural sensitivity, personal dignity, and safety concerns. It examines different types of privacy including physical, informational, and organizational privacy. Additionally, it explores related concepts like identity, reputation, and trust in the digital world and how information about individuals is exposed through electronic traces online.
Privacy Issues of Cloud Computing in the Federal SectorLew Oleinick
油
Presentation describing potential privacy issues of implementing cloud computing in the Federal market.
NOTE: Presentation does NOT reflect any official agency position. All views expressed are my own.
Electronic Transactions Law - Lecture 5 : advertising and marketingCaroline B Ncube
油
This document discusses regulations around unsolicited commercial communications (UCC), also known as spam, in South Africa. It outlines sections 45 and 89 of the Electronic Communications and Transactions Act (ECTA) and section 11 of the Consumer Protection Act (CPA) which require senders of UCC to provide opt-out options for recipients. It also discusses forms of UCC, issues with spam, industry self-regulation, and proposed reforms to adopt an opt-in approach under the Protection of Personal Information Bill.
Law of E-Commerce & Contractual Obligation in India
Definition of E-Commerce
E-Commerce v. E-Business
Definition of Commerce
Contracts & Business done Online
electronic transactions law lecture series: lecture 1 introductionCaroline B Ncube
油
This document provides an overview of electronic transactions law. It begins by discussing different terms used to describe this area of law such as cyberlaw, e-commerce law, and internet law. It then defines electronic transactions and the key concepts of electronic communications and data messages in the Electronic Communications and Transactions Act. The document outlines the main technologies used in electronic transactions and different types of transactions and the legal issues they raise. It also discusses the development of South Africa's e-commerce policy framework and relevant domestic and international laws governing electronic transactions.
This document discusses privacy issues with social networking. It begins by noting people's growing concerns about privacy online. It then outlines different types of social networks like social media sites for photos, videos, and audio; and location-based networks. The main privacy concerns addressed are identity theft from shared personal information, location tracking by services, and other issues like risks to children. The document concludes by providing some general tips for using social networks privately like using strong passwords and privacy settings.
This document discusses electronic contracts (e-contracts) under Indian law. It defines essential elements of valid contracts including offer, acceptance, consideration, and intention to create legal relations. Key provisions of the Information Technology Act relating to attribution of electronic records and time/place of communication are summarized. Different types of e-contracts like shrink wrap and click wrap agreements are described. Sample clauses from real e-contracts for email services, domain purchase, online share trading, and online shopping are provided to illustrate common purposes and sub-parts of e-contracts. Finally, the document outlines the legal framework for secure e-contracts covering different business and legal phases of the contracting process.
Privacy issues arise from the ability of information technology to collect, store, and retrieve personal data from individuals. The document discusses various ways private information can be revealed online, such as through internet service providers, email, discussion groups, internet browsers which can save browsing history and passwords, search engines which track search terms, and social networks. Potential threats to privacy include computer monitoring, matching of unauthorized personal files, cookies, web bugs, third party cookies, and cybercrimes like phishing, pharming, and spyware. The document provides solutions to protect online privacy such as using cookie controls, anti-virus software, firewalls, encryption tools, and the Platform for Privacy Preferences.
This document discusses security and privacy issues on social networking sites. It identifies different types of social networks and factors that influence users' selection of social networks like ease of use, friends using the network, and privacy and security. The document outlines threats to social networks like identity theft through profile cloning, spam attacks, malware spreading, and privacy and security issues related to shared user profile data, activity data, and third party application access. It provides statistics on common security threats to social networks and references publications on related research.
Privacy , Security and Ethics PresentationHajarul Cikyen
油
Hamimah bte Mohd Jamil
MUHAMMAD BIN MOHD SUKERI
(A13CS0068)
NURUL EMIRA BINTI ABDUL AZIZ
(A13CS0128)
WAN HAJARUL ASIKIN BINTI WAN
ZUNAIDI (A13CS0168)
This document discusses privacy issues related to computing technology and personal information collection. It covers primary privacy issues like accuracy, property and access of personal data. It also discusses large databases, information resellers, identity theft, mistaken identity and various laws protecting personal information. The document also covers computer crimes
Yesterday Pierluigi Paganini, CISO Bit4Id and founder Security Affairs, presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. The presentation highlights the security and privacy issues for the Internet of Things, a technology that is changing users perception of the technology.
This document discusses privacy concerns related to revealing personal information online. It outlines many ways personal data can be disclosed, such as through internet service providers, email, browsers, search engines, social media and marketing. The document also presents some technical and legal solutions to better protect online privacy, such as cookie controls, encryption, and the Platform for Privacy Preferences framework. However, it notes the difficulty in regulating privacy given priorities around free speech and data sharing. Overall, the document provides context around online privacy issues and risks of personal data being revealed without consent through various internet activities.
Commerce involves the exchange of goods and services between entities. E-commerce refers specifically to commerce conducted electronically over computer networks like the Internet. It allows buyers and sellers to connect directly, reducing costs. While traditional commerce involves manufacturers, distributors, wholesalers and retailers before reaching customers, e-commerce can connect businesses and consumers directly. The main types of e-commerce are business-to-business, business-to-consumer, business-to-employee, and consumer-to-consumer.
BBS has identified extensive use of open source over the last 5 years through field studies and project data collection. Open source is now a vital part of BBS's business applications and infrastructure. It is used across divisions in development, deployment, testing, and production. BBS utilizes a variety of open source utilities and platforms, including Linux, Solaris, Apache, NFS, and Postfix, benefiting from increased stability, security, and cost savings compared to proprietary alternatives.
This document discusses open source operating systems (OS). It begins with an introduction to open source OS like Linux, explaining that the source code is freely available and modifiable. It then covers various types of open source OS including Linux-based and non-Linux based systems. Next, it addresses security concerns for open source OS and how multiple developers reviewing code could improve security but flaws still exist sometimes. Finally, it outlines pros like free access and flexibility as well as cons such as difficulty of use and compatibility issues.
This document provides an introduction to free and open source software (FOSS). It defines FOSS as software that is free as in freedom rather than price. The document outlines the history of FOSS, including the founding of the Free Software Foundation and key projects like Linux. It distinguishes between the free software movement, which focuses on user freedoms, and open source software, which focuses on sharing code. The document lists several famous FOSS projects and reasons for using FOSS, including availability of source code and potential cost savings. It also covers common FOSS licenses like GPL, LGPL and BSD and discusses dual licensing. Finally, it notes ways FOSS is used in industry and common motivations for individuals to contribute to FOSS
This document provides an introduction to free and open source software (FOSS). It defines FOSS as software that is free as in freedom and open source. The document outlines the history of FOSS, including the founding of the Free Software Foundation and key open source projects. It distinguishes between the free software movement and open source movement. Examples are given of famous FOSS projects and reasons for using FOSS. The document also discusses FOSS licenses, the role of FOSS in industry, and common motivations for contributing to FOSS projects.
This document provides an overview of open source software including its definition, history, freedoms, development model, licenses, security considerations, and advantages/disadvantages. Open source software gives users the freedom to use, modify, and share the software. It originated in the 1980s with Richard Stallman's GNU project. There are various business models for open source including support/services. Popular licenses include the GPL, MPL, Apache, and BSD licenses which have different terms regarding modifications and redistribution. While open source is not inherently more secure, its transparency and community review can improve security.
This case study examines the San Francisco Performing Arts Library & Museum's (SFPALM) decision to migrate from Windows to open source software. SFPALM needed to license its unlicensed Windows server, outsource some services, and save money. It decided to use Red Hat Linux for its operating system, Samba for file/print sharing, Astaro Security Linux for firewall/VPN, qMail for email, Apache for web hosting, and maintain its legacy database on a Linux server. This saved $2,800 compared to purchasing Windows licenses and keeping outsourced services. The presentation discusses open source strengths like lower costs, security, and stability, as well as challenges like difficulty of deployment and lack
The document discusses open source software (OSS). It defines OSS as software distributed with source code that allows anyone to modify or distribute the software. It provides examples of popular OSS like Linux, Apache, and MySQL. It outlines benefits of OSS like cost savings, quality, and accessibility of the source code. Licensing models for OSS like GPL and BSD are also summarized.
Conversation on Open Source - CU Boulder - Feb 2017Jason Carolan
油
This document provides an overview of open source software and licensing. It defines intellectual property and discusses the importance of IP protection. A history of open source licensing is presented, covering key licenses like the GPL, BSD, MIT, Apache, and Mozilla licenses. The major license types are compared in terms of their permissiveness, restrictions on downstream use and distribution, and other constraints. Examples of open source software and licensing strategies are discussed. In conclusion, resources for choosing an appropriate license are presented.
The document discusses open source software, including what it is, why it is used, examples of popular open source projects, and the benefits and future of open source. It also provides information on installing open source operating systems like Fedora, Ubuntu and Kubuntu as well as basic commands for software installation. The presentation outlines the strengths of open source including freedom of use, cost effectiveness, flexibility, and security compared to proprietary software.
Electronic Transactions Law - Lecture 5 : advertising and marketingCaroline B Ncube
油
This document discusses regulations around unsolicited commercial communications (UCC), also known as spam, in South Africa. It outlines sections 45 and 89 of the Electronic Communications and Transactions Act (ECTA) and section 11 of the Consumer Protection Act (CPA) which require senders of UCC to provide opt-out options for recipients. It also discusses forms of UCC, issues with spam, industry self-regulation, and proposed reforms to adopt an opt-in approach under the Protection of Personal Information Bill.
Law of E-Commerce & Contractual Obligation in India
Definition of E-Commerce
E-Commerce v. E-Business
Definition of Commerce
Contracts & Business done Online
electronic transactions law lecture series: lecture 1 introductionCaroline B Ncube
油
This document provides an overview of electronic transactions law. It begins by discussing different terms used to describe this area of law such as cyberlaw, e-commerce law, and internet law. It then defines electronic transactions and the key concepts of electronic communications and data messages in the Electronic Communications and Transactions Act. The document outlines the main technologies used in electronic transactions and different types of transactions and the legal issues they raise. It also discusses the development of South Africa's e-commerce policy framework and relevant domestic and international laws governing electronic transactions.
This document discusses privacy issues with social networking. It begins by noting people's growing concerns about privacy online. It then outlines different types of social networks like social media sites for photos, videos, and audio; and location-based networks. The main privacy concerns addressed are identity theft from shared personal information, location tracking by services, and other issues like risks to children. The document concludes by providing some general tips for using social networks privately like using strong passwords and privacy settings.
This document discusses electronic contracts (e-contracts) under Indian law. It defines essential elements of valid contracts including offer, acceptance, consideration, and intention to create legal relations. Key provisions of the Information Technology Act relating to attribution of electronic records and time/place of communication are summarized. Different types of e-contracts like shrink wrap and click wrap agreements are described. Sample clauses from real e-contracts for email services, domain purchase, online share trading, and online shopping are provided to illustrate common purposes and sub-parts of e-contracts. Finally, the document outlines the legal framework for secure e-contracts covering different business and legal phases of the contracting process.
Privacy issues arise from the ability of information technology to collect, store, and retrieve personal data from individuals. The document discusses various ways private information can be revealed online, such as through internet service providers, email, discussion groups, internet browsers which can save browsing history and passwords, search engines which track search terms, and social networks. Potential threats to privacy include computer monitoring, matching of unauthorized personal files, cookies, web bugs, third party cookies, and cybercrimes like phishing, pharming, and spyware. The document provides solutions to protect online privacy such as using cookie controls, anti-virus software, firewalls, encryption tools, and the Platform for Privacy Preferences.
This document discusses security and privacy issues on social networking sites. It identifies different types of social networks and factors that influence users' selection of social networks like ease of use, friends using the network, and privacy and security. The document outlines threats to social networks like identity theft through profile cloning, spam attacks, malware spreading, and privacy and security issues related to shared user profile data, activity data, and third party application access. It provides statistics on common security threats to social networks and references publications on related research.
Privacy , Security and Ethics PresentationHajarul Cikyen
油
Hamimah bte Mohd Jamil
MUHAMMAD BIN MOHD SUKERI
(A13CS0068)
NURUL EMIRA BINTI ABDUL AZIZ
(A13CS0128)
WAN HAJARUL ASIKIN BINTI WAN
ZUNAIDI (A13CS0168)
This document discusses privacy issues related to computing technology and personal information collection. It covers primary privacy issues like accuracy, property and access of personal data. It also discusses large databases, information resellers, identity theft, mistaken identity and various laws protecting personal information. The document also covers computer crimes
Yesterday Pierluigi Paganini, CISO Bit4Id and founder Security Affairs, presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. The presentation highlights the security and privacy issues for the Internet of Things, a technology that is changing users perception of the technology.
This document discusses privacy concerns related to revealing personal information online. It outlines many ways personal data can be disclosed, such as through internet service providers, email, browsers, search engines, social media and marketing. The document also presents some technical and legal solutions to better protect online privacy, such as cookie controls, encryption, and the Platform for Privacy Preferences framework. However, it notes the difficulty in regulating privacy given priorities around free speech and data sharing. Overall, the document provides context around online privacy issues and risks of personal data being revealed without consent through various internet activities.
Commerce involves the exchange of goods and services between entities. E-commerce refers specifically to commerce conducted electronically over computer networks like the Internet. It allows buyers and sellers to connect directly, reducing costs. While traditional commerce involves manufacturers, distributors, wholesalers and retailers before reaching customers, e-commerce can connect businesses and consumers directly. The main types of e-commerce are business-to-business, business-to-consumer, business-to-employee, and consumer-to-consumer.
BBS has identified extensive use of open source over the last 5 years through field studies and project data collection. Open source is now a vital part of BBS's business applications and infrastructure. It is used across divisions in development, deployment, testing, and production. BBS utilizes a variety of open source utilities and platforms, including Linux, Solaris, Apache, NFS, and Postfix, benefiting from increased stability, security, and cost savings compared to proprietary alternatives.
This document discusses open source operating systems (OS). It begins with an introduction to open source OS like Linux, explaining that the source code is freely available and modifiable. It then covers various types of open source OS including Linux-based and non-Linux based systems. Next, it addresses security concerns for open source OS and how multiple developers reviewing code could improve security but flaws still exist sometimes. Finally, it outlines pros like free access and flexibility as well as cons such as difficulty of use and compatibility issues.
This document provides an introduction to free and open source software (FOSS). It defines FOSS as software that is free as in freedom rather than price. The document outlines the history of FOSS, including the founding of the Free Software Foundation and key projects like Linux. It distinguishes between the free software movement, which focuses on user freedoms, and open source software, which focuses on sharing code. The document lists several famous FOSS projects and reasons for using FOSS, including availability of source code and potential cost savings. It also covers common FOSS licenses like GPL, LGPL and BSD and discusses dual licensing. Finally, it notes ways FOSS is used in industry and common motivations for individuals to contribute to FOSS
This document provides an introduction to free and open source software (FOSS). It defines FOSS as software that is free as in freedom and open source. The document outlines the history of FOSS, including the founding of the Free Software Foundation and key open source projects. It distinguishes between the free software movement and open source movement. Examples are given of famous FOSS projects and reasons for using FOSS. The document also discusses FOSS licenses, the role of FOSS in industry, and common motivations for contributing to FOSS projects.
This document provides an overview of open source software including its definition, history, freedoms, development model, licenses, security considerations, and advantages/disadvantages. Open source software gives users the freedom to use, modify, and share the software. It originated in the 1980s with Richard Stallman's GNU project. There are various business models for open source including support/services. Popular licenses include the GPL, MPL, Apache, and BSD licenses which have different terms regarding modifications and redistribution. While open source is not inherently more secure, its transparency and community review can improve security.
This case study examines the San Francisco Performing Arts Library & Museum's (SFPALM) decision to migrate from Windows to open source software. SFPALM needed to license its unlicensed Windows server, outsource some services, and save money. It decided to use Red Hat Linux for its operating system, Samba for file/print sharing, Astaro Security Linux for firewall/VPN, qMail for email, Apache for web hosting, and maintain its legacy database on a Linux server. This saved $2,800 compared to purchasing Windows licenses and keeping outsourced services. The presentation discusses open source strengths like lower costs, security, and stability, as well as challenges like difficulty of deployment and lack
The document discusses open source software (OSS). It defines OSS as software distributed with source code that allows anyone to modify or distribute the software. It provides examples of popular OSS like Linux, Apache, and MySQL. It outlines benefits of OSS like cost savings, quality, and accessibility of the source code. Licensing models for OSS like GPL and BSD are also summarized.
Conversation on Open Source - CU Boulder - Feb 2017Jason Carolan
油
This document provides an overview of open source software and licensing. It defines intellectual property and discusses the importance of IP protection. A history of open source licensing is presented, covering key licenses like the GPL, BSD, MIT, Apache, and Mozilla licenses. The major license types are compared in terms of their permissiveness, restrictions on downstream use and distribution, and other constraints. Examples of open source software and licensing strategies are discussed. In conclusion, resources for choosing an appropriate license are presented.
The document discusses open source software, including what it is, why it is used, examples of popular open source projects, and the benefits and future of open source. It also provides information on installing open source operating systems like Fedora, Ubuntu and Kubuntu as well as basic commands for software installation. The presentation outlines the strengths of open source including freedom of use, cost effectiveness, flexibility, and security compared to proprietary software.
Intro to open source - 101 presentationJavier Perez
油
This document provides an overview of open-source software and how to get started with it. It discusses the history of open-source software dating back to 1955. It defines key open-source concepts like licenses, roles, and best practices for contributing. It also highlights the large open-source ecosystems existing today and the top companies contributing to open-source. The document aims to address common questions or concerns about open-source software.
Choisir le bon business model et la bonne licence pour la survie de son proje...Open Source Experience
油
Lorsque lon d辿marre une activit辿 et d辿cide de la mener en open source, il est essentiel de savoir pourquoi on le fait et quels sont les avantages que lon attend dune telle d辿marche. Cette session va vous aider d辿finir et g辿rer les aspects licence de votre projet ainsi qu d辿terminer un business model qui fonctionne avec lapproche open source.
OpenESB is an open source ESB that is easier to install, configure, use, manage and maintain than other ESBs. After Oracle acquired Sun, the community took over development and maintenance. The current version is 2.3, released on a new community site. LogiCoy is a major contributor providing developers and support. OpenESB remains attractive due to its ease of use and integration with Netbeans and Glassfish.
Introduction to Free and Open Source Software (FOSS) License by nexB.
You can see a list of most popular FOSS license in DejaCode, visit us at https://enterprise.dejacode.com/landing/
The Role of Open-Source Software in Modern DevelopmentAtliQ Technologies
油
Open-source software (OSS) has revolutionized modern development by fostering collaboration, transparency, and innovation. It enables developers worldwide to access, modify, and improve software, making it cost-effective and flexible. OSS powers everything from cloud computing to mobile apps, creating customized solutions and accelerating development. With a community-driven approach, it ensures cutting-edge advancements, security, and rapid problem-solving. OSS is more than a trend; its a transformative force shaping the future of technology.
The .NET ecosystem has radically transformed over the past 10 years; in the distant past, Microsoft actively discouraged and dismissed the possibility and viability of OSS categorically. Now, everything is open source and Microsoft is one of the single biggest contributors of open source globally. That same trend is strongly reflected in the .NET community - large companies include banks, insurers, airlines, manufacturers, and health care giants all feel increasingly comfortable using OSS products in the core of applications that generate billions of dollars a year in capital.
In this talk, we're going to cover the scope of the sustainability crisis, how it may affect you, and how to help prevent it both as an OSS user or as a contributor.
Selecting an Open Source License and Business Model for Your Project to Have ...All Things Open
油
This document discusses business strategies for open source software projects. It outlines various monetization tactics like delivering revenue-bearing services using open source, selling technical support, reducing costs by using open source components, dual licensing for commercial redistribution rights, and offering commercial upgrades. It also discusses choosing an appropriate open source license and the importance of defining goals, challenges, community engagement, and resources when developing an open source strategy.
Mininet is an open source networking emulator that allows users to model software-defined networks on a single machine in seconds. It creates realistic OpenFlow networks running real kernel, switch, and application code. Mininet has over 27k downloads and is used for rapid prototyping, testing, and demonstrating SDN capabilities. It provides a convenient way to test SDN designs without needing physical hardware.
open source software, open access and open transfer
1. Excluding
images, screenshots and
logos
SOURCE SOFTWARE
OPEN ACCESS
TRANSFER
Caroline B Ncube
University of Cape Town
http://kekovacs.blogspot.com/2011/05/opening-
doors.html
WSS4 CB Ncube 2012 1
2. Agenda
09.00 - 9.15 Group introductions
09.15 - 10.15 Open Source Software
10.15 - 10.30 tea break
10.30 11.30 Open Access
11.30 11.45 comfort break
11:45 12.30 Open Transfer
WSS4 CB Ncube 2012 2
4. Traditional IP protection of software
s 25(2) of Patents Act 57 of 1978 excludes patents for software as such
Protected by Copyright Act 98 of 1978
s 2(1)(i): Sui generis category of work
Owner has exclusive rights to reproduce, publish, adapt
License required to perform these restricted acts
Regulated by s 22 of Copyright Act
WSS4 CB Ncube 2012 4
Text: J Speres
5. End User License Agreements (EULAs)
Often very restrictive
Limit the number of computers for use
http://atom.smasher.org
User merely licenses no transfer of ownership
Incorporate and go further than copyright law
E.g. outlaw reverse engineering, prevent resale
No access to source code
Software so licensed termed closed source software (CSS)
Text: J Speres WSS4 CB Ncube 2012 5
6. What is OSS? http://www.gnu.org/graphi
cs/anfsflogo.html
http://opensource.org/logo-usage-guidelines
Source code = statements written in a programming language that allows the programmer
to communicate with the computer using a reserved number of instructions
open source software (OSS) = software made freely available for anyone to redistribute
and modify, including the source code
Free software & open source software
Free as in free speech, not as in free beer - Stallman
Text: J Speres WSS4 CB Ncube 2012 6
8. A program is free software if the program's users have the four essential freedoms:
The freedom to run the program, for any purpose (freedom 0).
The freedom to study how the program works, and change it so it does your computing
as you wish (freedom 1). Access to the source code is a precondition for this.
The freedom to redistribute copies so you can help your neighbor (freedom 2).
The freedom to distribute copies of your modified versions to others (freedom 3). By
doing this you can give the whole community a chance to benefit from your changes.
Access to the source code is a precondition for this.
WSS4 CB Ncube 2012 8
9. Benefits of OSS
Product reliability
Given enough eyeballs, all bugs are shallow Eric Raymond
More eyes, more ideas
Tweakable
No licensing costs means cheaper if not free software
NB for the developing world
E.g. Stellenbosch University Ubuntu project
Text: J Speres
WSS4 CB Ncube 2012 9
11. Benefits continued...
Can be designed to work on obsolete hardware
Also NB for developing world
Knowledge base expanded
More secure and far less vulnerable to viruses - threats detected and patched
quickly by many eyeballs
Text: J Speres WSS4 CB Ncube 2012 11
12. OSS success stories
Apache web server Over 50 % market share
Linux operating system challenges Microsoft in the network server market and has
rapidly growing share of the desktop market (See Ubuntu)
Many local corporates turning to Linux
Nandos and Lewis use it on servers and in store
Sendmail mail transfer agent - 75% of email routed
Google Chrome browser largest market share
Android
http://www.ubuntu.com/download
http://felix.apache.org/site/inde WSS4 CB Ncube 2012 12
Text: J Speres x.html
13. OSS licenses
User given right to freely copy, modify and redistribute the software subject to
specific license conditions
Source code must be open (made available)
All copyrights retained by licensor. OSS is not in the public domain.
GPL is the most widely used OSS license
http://www.gnu.org/graphics/3dbabygnutux.html
13
WSS4 CB Ncube 2012 Text: J Speres
14. OSS licenses continued...
Prevents the licensor and licensee from redistributing under CSS licenses
Terms vary: GPL, Apache, BSD, Mozilla etc
Copyleft (viral)
Derivatives
Raises compatibility issues e.g. see http://www.gnu.org/licenses/license-
list.html#GPLCompatibleLicenses
Approval of OSS licenses e.g. by Open Source Initiative (OSI) and the Free Software
Foundation (FSF)
WSS4 CB Ncube 2012 14
16. A brief comparison
criteria Apache GPL3.0
Copyleft No Yes
Copyfree No No
OSI Approved Yes Yes
Trademarks Yes No
Patent license Yes Yes
WSS4 CB Ncube 2012 16
19. OSS Commercialisation
Retain ownership of copyright
Can assign
Can license under different, CSS licence
Dual licensing (e.g. MySQL)
Copyleft licenses required
Strong market position
Dual product
add-ons, extension etc
Weaker market position require OSS penetration
Professional services
Support, customisation etc
Many users, not simple to use
See http://spacebug.com/how_to_make_money_from_open_source-html/
WSS4 CB Ncube 2012 19
Text: J Speres
21. Discussion
Bryce Pilz PubPol 688/SI 519 - Intellectual Property and Information Law Exercise Class 08:
Public License Problems
http://open.umich.edu/education/fordschool/pubpol688/fall2008/materials
WSS4 CB Ncube 2012 21
23. Open-access (OA) literature is digital, online, free of charge, and
free of most copyright and licensing restrictions. What makes it
possible is the internet and the consent of the author or
copyright-holder.
Peter Suber
WSS4 CB Ncube 2012 23
24. Why OA?
Openness
Provides access
Enables development
Enables participation
Enables innovation
Benefits the private sector
Increases researchers visibility
Is essential for education
Text Laura Czerniewicz WSS4 CB Ncube 2012 24
25. 息 Inter Press Service (IPS) Photos
http://ipsphotos.photoshelter.com/image/I0000dU7Pua6aqjM
WSS4 CB Ncube 2012 25
26. OA & publicly funded research
The government's decision means
that by 1 April 2013, all papers from
government-funded research must
be published in an open access
journal; if not, the journal must
make the paper open access after 6
months.
WSS4 CB Ncube 2012 26
29. How?
OA journals
http://www.etftrends.com/2012/01/gold-etfs-size-up-200-day-average-as-dollar-
weakens/#.ULX95oe86_w
and OA archives or repositories.
http://amazingcreativepics.blogspot.com/2010/08/blog-post.html
WSS4 CB Ncube 2012 29
30. OA Journals
peer reviewed and then make the approved contents freely available to the
world.
Their expenses consist of peer review, manuscript preparation, and server
space.
Various funding models: author pays, institutional support, professional body
support, advertising, priced add-ons, or auxiliary services etc
In certain cases fees waived
Text: P Suber WSS4 CB Ncube 2012 30
32. OA Archives or repositories
OA archives or repositories do not perform peer review, but simply make their contents
freely available to the world. They may contain unrefereed preprints, refereed postprints, or
both.
WSS4 CB Ncube 2012 32
Text: P Suber
34. Authors may archive their preprints without anyone elses permission, and a majority of
journals already permit authors to archive their postprints.
WSS4 CB Ncube 2012 34
35. RoMEO Colour Archiving policy
Can archive pre-print and post-print or
Green
publisher's version/PDF
Can archive post-print (ie final draft
Blue post-refereeing) or publisher's
version/PDF
Can archive pre-print (ie pre-
Yellow
refereeing)
White Archiving not formally supported
More on colours and restrictions
or View all publishers
WSS4 CB Ncube 2012 35
36. When archives comply with the metadata harvesting protocol of the Open Archives
Initiative, then they are interoperable and users can find their contents without
knowing which archives exist, where they are located, or what they contain.
There is now open-source software for building and maintaining OAI-compliant archives
and worldwide momentum for using it. The costs of an archive are negligible: some
server space and a fraction of the time of a technician.
http://voicesofglass.com/2012/02/25/square-peg-in-a-round-hole/
Text: P Suber WSS4 CB Ncube 2012 36
38. Copyright
Open-access (OA) literature is digital, online, free of charge, and free of most copyright and
licensing restrictions. What makes it possible is the internet and the consent of the author or
copyright-holder. Peter Suber
The consent of the author or copyright holder may be given through the use of creative
commons licenses
- Simplifies, speeds up and frees the process
See Journal self-archiving policies at
http://www.sherpa.ac.uk/romeo/index.php?fIDnum=|&mode=advanced&la=en
WSS4 CB Ncube 2012 38
42. This Article is brought to you for
free and open access by
Northwestern University School of
Law Scholarly Commons. It has
been accepted for inclusion in
Northwestern Journal of
Technology and Intellectual
Property by an authorized
administrator of Northwestern
University School of Law Scholarly
Commons.
WSS4 CB Ncube 2012 42
43. Open Transfer: the problem
Madey v. Duke 307 F.3d 1351 (Fed. Cir. 2002).
Prof Madey was a tenured research professor in the physics department at Duke University
sole owner of two patents in use at Dukes free electron laser lab.
M had a dispute with Duke U and lost post as director of the lab, and then resigned.
Text Feldman & Nelson WSS4 CB Ncube 2012 43
44. http://ipkitten.blogspot.com/2006/08/patents-and-experimental-use.html
The lab continued to use the lab equipment
Madey sued for infringement.
At court a quo Duke claimed that any activity in the lab was covered by the common law
experimental use exception.
On appeal to the Federal Circuit held that the experimental use exception does not apply
when an entity is engaged in commercial activity that furthers its legitimate business
objectives
Text Feldman & Nelson WSS4 CB Ncube 2012 44
45. For a university this includes educating and enlightening students and faculty, as well as
increasing the status of the university, luring lucrative research grants, and attracting faculty
and students.
Therefore exception not applicable (in the US)!
NB in many jurisdictions (e.g. South Africa) this exception probably does not exist in the first
place
Text Feldman & Nelson WSS4 CB Ncube 2012 45
46. So university researchers (in US and other jurisdictions) in theory would be forced
to navigate the maze of patent licensing or face infringement suits.
Solution : include Open Transfer clauses in technology transfer agreements
Text Feldman & Nelson
WSS4 CB Ncube 2012 46
47. Universities should consider reserving rights in all fields of use, even if the invention is
licensed exclusively to a commercial entity, for themselves and other non-profit and
governmental organizations: to practice inventions and to use associated information
and data for research and educational purposes, including research sponsored by
commercial entities; and to transfer tangible research materials (e.g., biological
materials and chemical compounds) and intangible materials (e.g., computer software,
databases and know-how) to others in the non-profit and governmental sectors
In the Public Interest: Nine Points to Consider in Licensing University Technology (White
Paper 2007) http://otl.stanford.edu/documents/whitepaper-10.pdf
WSS4 CB Ncube 2012 47
48. Example
Institution retains the right, on behalf of itself and all other non-profit
academic research institutions, to practice the Licensed Patent and use
Technology for any non-profit purpose, including sponsored research and
collaborations. Licensee agrees that, notwithstanding any other provision
of this Agreement, it has no right to enforce the Licensed Patent against
any such institution. Institution and any such other institution have the
right to publish any information included in the Technology or a Licensed
Patent.
In the Public Interest: Nine Points to Consider in Licensing University Technology (White
Paper 2007) http://otl.stanford.edu/documents/whitepaper-10.pdf
WSS4 CB Ncube 2012 48
49. Discussion
How is open transfer impacted by IP commercialisation legislation?
Consider s11 of South Africas Intellectual Property Rights from Publicly Financed Research
and Development Act of 2008
WSS4 CB Ncube 2012 49
51. Attribution
Jeremy Speres Open Source Software Licences (presentation)
Jeremy Speres Open Source Licensing Scheme
Peter Suber A Very Brief Introduction to Open Access
http://www.earlham.edu/~peters/fos/brief.htm
Laura Czerniewicz Demystifying Open Access (presentation) 22/10/2012
All screenshots, images and logos used purely for illustrative purposes
This work is licenced under the Creative Commons Attribution-Share Alike 2.5 South
Africa License. To view a copy of this licence, visit
http://creativecommons.org/licenses/by-sa/2.5/za/
WSS4 CB Ncube 2012 51
52. Caroline B Ncube
Excluding images, screenshots
University of Cape Town and logos
caroline.ncube@uct.ac.za
WSS4 CB Ncube 2012 52