Linux compliance program a response to surging open-source use
Linux Foundation's Open Compliance Program largely directed at open-source use in embedded devices, analysts say
Computerworld - The Open Compliance Program announced by the Linux Foundation on Tuesday is a response to the surging growth in the use of open-source technologies within enterprises, and by makers of consumer electronic and mobile devices, analysts say.
Much of the program appears to be directed at addressing what many analysts said is continuing confusion among makers of embedded devices about open-source licensing requirements. But enterprises can benefit from the program as well, they added.
The Linux Foundation, a nonprofit group that is focused on fostering Linux growth, announced a set of open-source tools, training materials and a self-assessment checklist designed to help companies comply with open-source license requirements.
The program is supported by several large vendors, including Google, Novell, IBM, Hewlett-Packard and Intel. Also supporting the effort are organizations such as the Software Freedom Law Center (SFLC), which provides free legal representation for developers of open-source software, and Gpl-violations.org, which is focused on raising awareness of open-source license violations.
The impetus for the initiative comes from the skyrocketing use of Linux as an embedded operating system in mobile, consumer electronic and numerous other products, said Jim Zemlin, executive director of the foundation.
The goal is to help companies fulfill their license obligations in as straightforward and low-cost a manner as possible, Zemlin said in a conversation with Computerworld today.
"Market adoption of open-source software has reached a scale that is unprecedented," he said. Companies ranging from embedded systems manufacturers to those with large supercomputer clusters are all using open-source software these days because of the cost and technology benefits, Zemlin said.
Many, though, appear not to understand or be fully informed about their obligations to share their source code with the broad community as they are required to, he noted.
"The Linux kernel alone has a $10 billion value, and that value comes from the fact that people are sharing it," Zemlin said. The compliance program will ensure that all of the technical and cost benefits that companies are deriving from open-source software "is matched by their ability to comply with the legal requirements of open-source licenses," he added.
Eben Moglen, founding director of the SFLC and a law professor at Columbia Law School, said the new effort is being driven largely by what's happening in the embedded world.
Most of the violations that the SFLC has observed and pursued have occurred among manufactures of embedded devices, Moglen said. In most cases, the violations stemmed from a lack of experience in open-source use. Enterprise use of open-source software for the most part appears to be more mature and in line with open-source license practices, he said.
- eBay uses 100% OpenSource WSO2 ESB to process more than 1Billion transactions a day Along with eBay's success comes a huge demand to ensure reliable, 24x7 availability of the services that enable these transactions. For eBay, that...
- Coding with JRebel: Java Forever Changed With JRebel, developers get to see their code changes immediately, fine-tune their code with incremental changes, debug, explore and deploy their code with...
- What Developers Want: The End of Application Redeploys Eliminate application restarts in Java with JRebel! JRebel is a JVM plugin that eliminates application redeploys from the Java development cycle, a process...
- How a German energy company saved 1 day per week of development time with JRebel Check out the following case study to see how Heliocentris, a global energy supply and efficiency company deployed a development solution that was...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Open Source White Papers | Webcasts