SCO shows Linux code to analysts
Company hopes to back up its intellectual property case
IDG News Service - The SCO Group Inc. is taking its case against the Linux operating system and IBM on the road.
Last week, the company began showing to U.S. analysts code that, it claims, proves that the source code to the Linux operating system contains sections of code lifted directly from SCO's Unix code base.
SCO's presentation, which has been seen by analysts from Gartner Inc. and Aberdeen Group Inc., features pieces of software that IBM contributed to the Linux code base, SCO said. That code was derived from SCO's Unix code, itself derived from AT&T Corp.'s System V Unix code, and then distributed to the Linux community in violation of SCO's licensing agreement, according to SCO.
The Lindon, Utah-based company will spend this month showing its evidence to analysts and journalists interested in seeing it, said SCO's general manager of SCOsource, Chris Sontag.
"The one specific example that I'm showing right now is [Unix] code, line by line copied into Linux," said Sontag. He said that this code, which SCO considers to be a copyright violation, is identical in both the Linux and SCO code base.
Sontag wouldn't say which specific parts of Unix SCO believes were copied, but he did say that the work appeared to have been done by a company other than IBM.
SCO sued IBM for $1 billion this March, charging the company with misappropriation of trade secrets, tortious interference, unfair competition and breach of contract.
SCO's case against IBM doesn't involve copyright law, which, Sontag said, is harder to prove in court. Instead, it revolves around contract law claims. Specifically, SCO claims that IBM's 1985 Unix license, originally signed with AT&T, but subsequently transferred to SCO, prevents IBM from distributing software derived from the Unix code base.
IBM's contributions to Linux in the areas of nonuniform memory architecture, symmetric multiprocessing and a journaling file system all constitute breaches of that contract, Sontag said.
SCO plans to revoke IBM's Unix license on Friday, "as we have the contractual right to do, due to their breach of the contract that they have with us," said Sontag.
IBM has denied engaging in any wrongdoing in the case.
Open-source advocates now say that the burden of proof is on SCO to prove that the code was copied by Linux developers and not the other way around. "Something I strongly suspect is going to come up in the court case is, How do we know what the direction of transmission was?" said open-source advocate Eric Raymond.
The fact that SCO has been an active contributor to the Linux kernel means that SCO has a harder case to prove, he said. "The burden of proof is on [SCO] to demonstrate that the transmission went from System V to IBM to Linux, rather than from System V to SCO's own kernel developers to Linux," he said.
SCO was able to uncover the alleged violations by hiring three teams of experts, including a group from the MIT math department, to analyze the Linux and Unix source code for similarities. "All three found several instances where our Unix source code had been found in Linux," said a SCO spokesman.
"They're claiming that they can point to dozens of files and that the code lines vary from a few chunks to big blocks of code," said Gartner analyst George Weiss, who was briefed by SCO last week.
Open-source advocates say that it is no surprise that Linux and System V share similar code, since they both include components of the BSD code base. "It's clearly a fact that [Unix] contains a lot of BSD code, and Linux has some too, so there are bound to be ... lines of code in common," wrote Linux creator Linus Torvalds in an e-mail interview.
SCO has offered to show the code in question to Torvalds, but he hasn't yet accepted the offer, said Sontag.
- Maintain Less. Create More. Spend less on maintenance and spend more time creating with Red Hat Enterprise Linux. Read on to learn how Red Hat can help...
- Flying High on the Use of Red Hat Enterprise Linux Flybe was one of the 21 companies that were interviewed for quantitative results on their operations as part of an IDC ROI analysis....
- Mission Critical: Managing Mobile Applications & Content Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of...
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their... All Linux and Unix White Papers | Webcasts