Q&A: SCO's Chris Sontag on Linux, Unix and brewing legal fights
'There is inappropriate intellectual property in Linux,' he says
Computerworld - In two weeks, The SCO Group Inc. intends to begin showing analysts where the Unix code it owns has been illegally copied into the Linux kernel. The source code will be made available to parties who agree not to disclose the Unix source code, but they will be able to share publicly their assessments of SCO's claim. SCO has filed a $1 billion lawsuit against IBM alleging misappropriation of trade secrets and other claims and has warned some 1,500 businesses that they may be using Linux at their legal peril.
In an interview with Computerworld reporter Patrick Thibodeau, SCO's Chris Sontag, a senior vice president and general manager of SCOsource Division, the group within SCO in charge of enforcing the company's intellectual property, discussed the company's position.
Why should Linux users take your claim seriously? Think about if I was the CIO of a company and I'm going to be running my business on an operating system that has an intellectual property foundation that, by almost everyone's admission, is built on quicksand. There is no mechanism in Linux to ensure [the legality of] that intellectual property of the source code being contributed by various people. We fully believe there are many contributions made by good, hard-working individuals into Linux that are not of issue. But based on the research that we have done, we have identified specific Unix System V code for which we have ownership rights that have ended up in Linux against our wishes. There is inappropriate intellectual property in Linux. The development process has no one that is ensuring that inappropriate code is not getting into Linux. All that's there is an honor system, and obviously there are a few, at least, that have broken that honor.
Chris Sontag of The SCO Group Inc.
What do you see as a company's options in the face of your warning? I would suspend any new Linux-related activities until this is all sorted out. But first get that opinion of your legal counsel. If they say there is no problem and no issue, then you probably have nothing to worry about. But I doubt there is
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Linux and Unix White Papers | Webcasts