Q&A: SCO's Chris Sontag on Linux, Unix and brewing legal fights
'There is inappropriate intellectual property in Linux,' he says
Computerworld - In two weeks, The SCO Group Inc. intends to begin showing analysts where the Unix code it owns has been illegally copied into the Linux kernel. The source code will be made available to parties who agree not to disclose the Unix source code, but they will be able to share publicly their assessments of SCO's claim. SCO has filed a $1 billion lawsuit against IBM alleging misappropriation of trade secrets and other claims and has warned some 1,500 businesses that they may be using Linux at their legal peril.
In an interview with Computerworld reporter Patrick Thibodeau, SCO's Chris Sontag, a senior vice president and general manager of SCOsource Division, the group within SCO in charge of enforcing the company's intellectual property, discussed the company's position.
Why should Linux users take your claim seriously? Think about if I was the CIO of a company and I'm going to be running my business on an operating system that has an intellectual property foundation that, by almost everyone's admission, is built on quicksand. There is no mechanism in Linux to ensure [the legality of] that intellectual property of the source code being contributed by various people. We fully believe there are many contributions made by good, hard-working individuals into Linux that are not of issue. But based on the research that we have done, we have identified specific Unix System V code for which we have ownership rights that have ended up in Linux against our wishes. There is inappropriate intellectual property in Linux. The development process has no one that is ensuring that inappropriate code is not getting into Linux. All that's there is an honor system, and obviously there are a few, at least, that have broken that honor.
Chris Sontag of The SCO Group Inc.
What do you see as a company's options in the face of your warning? I would suspend any new Linux-related activities until this is all sorted out. But first get that opinion of your legal counsel. If they say there is no problem and no issue, then you probably have nothing to worry about. But I doubt there is
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Linux and Unix White Papers | Webcasts