Академический Документы
Профессиональный Документы
Культура Документы
1
2 4 INTEROPERABILITY WITH SOFTWARE AND HARDWARE
is sometimes enforced through a technical measure, such Some governments fear that proprietary software may in-
as product activation, a product key or serial number, a clude defects or malicious features which would com-
hardware key, or copy protection. promise sensitive information. In 2003 Microsoft estab-
Vendors may also distribute versions that remove particu- lished a Government Security Program (GSP) to allow
lar features, or versions which allow only certain elds of governments to view source code and Microsoft secu-
endeavor, such as non-commercial, educational, or non- rity documentation, of which [24][25]
the Chinese government
prot use. was an early participant. The program is part of
Microsofts broader Shared Source Initiative which pro-
Use restrictions vary by license: vides source code access for some products. The Refer-
ence Source License (Ms-RSL) and Limited Public Li-
Windows Vista Starter is restricted to running a cense (Ms-LPL) are proprietary software licenses where
maximum of three concurrent applications. the source code is made available.
Governments have also been accused of adding such mal-
The retail edition of Microsoft Oce Home and ware to software themselves. According to documents
Student 2007 is limited to non-commercial use on released by Edward Snowden, the NSA has used covert
up to three devices in one household. partnerships with software companies to make commer-
cial encryption software exploitable to eavesdropping, or
Windows XP can be installed on one computer, and to insert backdoors.[26][27]
limits the number of network le sharing connec-
Software vendors sometimes use obfuscated code to im-
tions to 10.[19] The Home Edition disables features
pede users who would reverse engineer the software. This
present in Windows XP Professional.
is particularly common with certain programming lan-
guages. For example, the bytecode for programs writ-
Traditionally Adobe licenses are limited to one user,
ten in Java can be easily decompiled to somewhat us-
but allow the user to install a second copy on a home
able code, and the source code for programs written in
computer or laptop.[20] This is no longer true with
scripting languages such as PHP or JavaScript is available
the switching to Creative Cloud.
at run time.[28]
iWork '09, Apples productivity suite, is available in
a ve-user family pack, for use on up to ve com-
puters in a household.[21]
3.3 Redistribution
See also: Open source and Anti-features Proprietary software vendors can prohibit users from
sharing the software with others. Another unique license
Vendors typically distribute proprietary software in is required for another party to use the software.
compiled form, usually the machine language understood In the case of proprietary software with source code avail-
by the computers central processing unit. They typi- able, the vendor may also prohibit customers from dis-
cally retain the source code, or human-readable version tributing their modications to the source code.
of the software, written in a higher level programming
Shareware is closed-source software whose owner en-
language.[22] This scheme is often referred to as closed
[23] courages redistribution at no cost, but which the user
source.
sometimes must pay to use after a trial period. The fee
While most proprietary software is distributed without usually allows use by a single user or computer. In some
the source code, some vendors distribute the source code cases, software features are restricted during or after the
or otherwise make it available to customers. For exam- trial period, a practice sometimes called crippleware.
ple, users who have purchased a license for the Internet
forum software vBulletin can modify the source for his
or her own site but cannot redistribute it. This is true
for many web applications, which must be in source code
form when being run by a web server. The source code is 4 Interoperability with software
covered by a non-disclosure agreement or a license that and hardware
allows, for example, study and modication, but not re-
distribution. The text-based email client Pine and certain
implementations of Secure Shell are distributed with pro- Further information: Interoperability of software
prietary licenses that make the source code available.
3
4.1 Proprietary le formats and protocols both by licensing and various design decisions. This li-
censing model has been armed by the United States
Further information: Proprietary format and Proprietary Court of Appeals.[33]
protocol
Further information: Vendor lock-in Some formerly open-source software was made pro-
prietary later. Sometimes for commercialization rea-
sons, sometimes as security or anti-cheat measurement
A dependency on the future versions and upgrades for a (Security through obscurity). A famous example of such
proprietary software package can create vendor lock-in, is the Doom source port ZDaemon which was prone to
entrenching a monopoly position.[32] aimbot cheaters.[40]
Proprietary software may also have licensing terms that See also: Commercial software
limit the usage of that software to a specic set of hard-
ware. Apple has such a licensing model for Mac OS X, Proprietary software is not synonymous with commercial
an operating system which is limited to Apple hardware, software,[41][42] although the two terms are sometimes
4 10 REFERENCES
has aected their day-to-day DP operations, some users re- display and run one copy of the Software on a single
main angry about IBMs decision. Announced in February computer, such as a workstation, terminal or other de-
1983, IBMs object-code-only policy has been applied to a vice (Workstation Computer). The Software may not
growing list of Big Blue system software products be used by more than two (2) processors at any one time
on any single Workstation Computer. ... You may per-
[10] Impact of Apple vs. Franklin Decision mit a maximum of ten (10) computers or other electronic
devices (each a 'Device') to connect to the Workstation
[11] Landley, Rob (2009-05-23). 23-05-2009. landley.net.
Computer to utilize one or more of the following services
Retrieved 2015-12-02. So if open source used to be the
of the Software: File Services, Print Services, Internet In-
norm back in the 1960s and 70s, how did this _change_?
formation Services, Internet Connection Sharing and tele-
Where did proprietary software come from, and when, and
phony services.
how? How did Richard Stallmans little utopia at the MIT
AI lab crumble and force him out into the wilderness to [20] Adobe Systems, Adobe Software License Agreement
try to rebuild it? Two things changed in the early 80s: (PDF), retrieved 2010-06-09
the exponentially growing installed base of microcomputer
hardware reached critical mass around 1980, and a legal [21] iWork '09 Family Pack Specs (complete package) - Pre-
decision altered copyright law to cover binaries in 1983. sentation - CNET Reviews. Reviews.cnet.com. Retrieved
Increasing volume: The microprocessor creates millions of on 2013-06-16.
identical computers
[22] Hean, Ira V. (1997). Copyleft: Licensing Collabora-
[12] Liberman, Michael (1995). Overreaching Provisions in tive Works in the Digital Age (PDF). Stanford Law Re-
Software License Agreements. Richmond Journal of view. 49: 1490. Under the proprietary software model,
Law and Technology. 1: 4. Retrieved November 29, most software developers withhold their source code from
2011. users.
[13] Limitations and Exceptions to Copyright and Neighbour- [23] David A. Wheeler (2009-02-03). Free-Libre / Open
ing Rights in the Digital Environment: An International Source Software (FLOSS) is Commercial Software. Re-
Library Perspective (2004). IFLA (2013-01-22). Re- trieved 2009-06-03.
trieved on 2013-06-16.
[24] Shankland, Stephen. Governments to see Windows
[14] Daniel A. Tysver (2008-11-23). Why Protect Software code. CNET.
Through Patents. Bitlaw.com. Retrieved 2009-06-03.
In connection with software, an issued patent may pre- [25] Gao, Ken. China to view Windows code. CNET.
vent others from utilizing a certain algorithm (such as the [26] James Ball, Julian Borger and Glenn Greenwald (2013-
GIF image compression algorithm) without permission, or 09-06). US and UK spy agencies defeat privacy and se-
may prevent others from creating software programs that curity on the internet. The Guardian.
perform a function in a certain way. In connection with
computer software, copyright law can be used to prevent [27] Bruce Schneier (2013-09-06). How to remain secure
the total duplication of a software program, as well as the against NSA surveillance. The Guardian.
copying of a portion of software code.
[28] Tony Patton (2008-11-21). Protect your JavaScript with
[15] Donovan, S. (1994). Patent, copyright and trade secret obfuscation. Retrieved 2009-06-12. While the Web pro-
protection for software. Potentials, IEEE. 13 (3): 20. motes the sharing of such code, there are times when you
doi:10.1109/45.310923. Essentially there are only three or a client may not want to share their JavaScript code.
ways to protect computer software under the law: patent This may be due to the sensitive nature of data within the
it, register a copyright for it, or keep it as a trade secret. code, proprietary calculations, or any other scenario.
[16] Eben Moglen (2005-02-12). Why the FSF gets copyright [29] APIs: What they are, and what they're for - Feature -
assignments from contributors. Retrieved 2009-06-26. Techworld.com. Features.techworld.com. Retrieved on
Under US copyright law, which is the law under which 2013-06-16.
most free software programs have historically been rst
published, [...] only the copyright holder or someone hav- [30] Commission Decision of 24.03.2004 relating to a pro-
ing assignment of the copyright can enforce the license. ceeding under Article 82 of the EC Treaty (Case
COMP/C-3/37.792 Microsoft)" (PDF). European Com-
[17] White, Aoife (2012-07-03). Oracle Can't Stop Software mission. March 24, 2004. Archived from the original
License Resales, EU Court Says. Bloomberg. (PDF) on October 28, 2008. Retrieved June 17, 2009.
[18] Microsoft Corporation (2005-04-01). End-User License [31] Wilson, Ben (2008-10-01). Apple Drops NDA for Re-
Agreement for Microsoft Software: Microsoft Windows leased iPhone Software. CNET Reviews. Retrieved
XP Professional Edition Service Pack 2 (PDF). p. Page 2010-12-17.
3. Retrieved 2009-04-29.
[32] The Linux Information Project (2006-04-29). Vendor
[19] Microsoft Corporation (2005-04-01). End-User License Lock-in Denition. Retrieved 2009-06-11. Vendor
Agreement for Microsoft Software: Microsoft Windows lock-in, or just lock-in, is the situation in which customers
XP Professional Edition Service Pack 2 (PDF). p. Page are dependent on a single manufacturer or supplier for
1. Retrieved 2009-04-29. You may install, use, access, some product [...] This dependency is typically a result
6 10 REFERENCES
of standards that are controlled by the vendor [...] It can [42] Havoc Pennington (2008-03-02). Debian Tutorial. Re-
grant the vendor some extent of monopoly power [...] The trieved 2009-06-04. It is important to distinguish com-
best way for an organization to avoid becoming a victim mercial software from proprietary software. Proprietary
of vendor lock-in is to use products that conform to free, software is non-free software, while commercial software
industry-wide standards. Free standards are those that can is software sold for money.
be used by anyone and are not controlled by a single com-
pany. In the case of computers, this can usually be ac- [43] Russell McOrmond (2000-01-04). What is Commer-
complished by using free software rather than proprietary cial Software"?". Retrieved 2009-05-02.
software (i.e., commercial software).
[44] Michael K. Johnson (1996-09-01). Licenses and Copy-
[33] Apple wins key battle against Psystar over Mac clones right. Retrieved 2009-06-16. If you program for Linux,
(2011-09-29). Apple court victory over Pystar. Re- you do need to understand licensing, no matter if you are
trieved 2011-09-30. writing free software or commercial software.
[34] What happens when a proprietary software company [45] Eric S. Raymond (2003-12-29). "Proprietary, Jargon
dies?". NewsForge. October 2003. Retrieved 2007-03- File. Retrieved 2009-06-12. Proprietary software should
05. be distinguished from commercial software. It is possible
for software to be commercial [...] without being propri-
[35] Microsoft Turns Up The Heat On Windows 2000 Users. etary. The reverse is also possible, for example in binary-
InformationWeek. December 2006. Retrieved 2008-09- only freeware.
16.
[46] Free Software Foundation (2008-12-31). Selling Free
[36] Cassia, Fernando (March 28, 2007). Open Source, the Software. Retrieved 2009-06-03.
only weapon against 'planned obsolescence'". The In-
quirer. Retrieved August 2, 2012. [47] The Commercial Software Model. Microsoft. May
2001. Retrieved 2007-03-05.
[37] Bell, John (October 1, 2009). Opening the Source
of Art. Technology Innovation Management Review. [48] Open Source Versus Commercial Software: Why Pro-
Archived from the original on March 30, 2014. Retrieved prietary Software is Here to Stay. Sams Publishing. Oc-
December 30, 2012. [...]that no further patches to the ti- tober 2005. Retrieved 2007-03-05.
tle would be forthcoming. The community was predictably [49] Engelfriet, Arnoud (AugustSeptember 2006). The best
upset. Instead of giving up on the game, users decided that of both worlds. Intellectual Asset Management (IAM).
if Activision wasn't going to x the bugs, they would. They New Hibernia House, Winchester Walk, London Bridge,
wanted to save the game by getting Activision to open the London SE1 9AG, United Kingdom: Gavin Stewart (19).
source so it could be kept alive beyond the point where Retrieved 2008-05-19.
Activision lost interest. With some help from members of
the development team that were active on fan forums, they [50] Loftus, Jack (2007-02-19). LinuxWorld: Manag-
were eventually able to convince Activision to release Call ing mixed source software stacks. SearchEnter-
to Power IIs source code in October of 2003. priseLinux.com.
[38] Wen, Howard (June 10, 2004). Keeping the Myths [51] Tan, Aaron (2006-12-28). Novell: We're a 'mixed-
Alive. linuxdevcenter.com. Archived from the original source' company. CNET Networks, Inc.
on April 6, 2013. Retrieved December 22, 2012. [...]fans
of the Myth trilogy have taken this idea a step further: [52] Rosenberg, Donald (2000). Open Source: The Unautho-
they have ocial access to the source code for the Myth rized White Papers. Foster City: IDG. p. 109. ISBN 0-
games. Organized under the name MythDevelopers, this 7645-4660-0.
all-volunteer group of programmers, artists, and other tal-
[53] Categories of Free and Non-Free Software - Free Soft-
ented people devote their time to improving and supporting
ware Foundation.
further development of the Myth game series.
[54] Free Software Foundation (2009-05-05). Frequently
[39] Largent, Andy (October 8, 2003). Homeworld Source
Asked Questions about the GNU Licenses. Retrieved
Code Released. www.insidemacgames.com. Archived
2009-06-25.
from the original on October 12, 2013. Retrieved Novem-
ber 24, 2012. With the release of Homeworld 2 for the [55] Richard Stallman (2004-04-12). Free But Shackled -
PC, Relic Entertainment has decided to give back to their The Java Trap. Retrieved 2009-06-25.
impressive fan community by releasing the source code to
the original Homeworld. [56] Nelson, David (15 Mar 2013). Indian laptops that crash
if users try to remove pictures of minister. Telegraph.
[40] ZDaemon Starting with the 1.07 release in July 2005, the London.
ZDaemon project does not make the source code available
anymore and has remained closed source from that point
forward
11.2 Images
File:Commons-logo.svg Source: https://upload.wikimedia.org/wikipedia/en/4/4a/Commons-logo.svg License: PD Contributors: ? Origi-
nal artist: ?
File:Folder_Hexagonal_Icon.svg Source: https://upload.wikimedia.org/wikipedia/en/4/48/Folder_Hexagonal_Icon.svg License: Cc-by-
sa-3.0 Contributors: ? Original artist: ?
File:Portal-puzzle.svg Source: https://upload.wikimedia.org/wikipedia/en/f/fd/Portal-puzzle.svg License: Public domain Contributors: ?
Original artist: ?
File:Question_book-new.svg Source: https://upload.wikimedia.org/wikipedia/en/9/99/Question_book-new.svg License: Cc-by-sa-3.0
Contributors:
Created from scratch in Adobe Illustrator. Based on Image:Question book.png created by User:Equazcion Original artist:
Tkgd2007
File:Symbol_book_class2.svg Source: https://upload.wikimedia.org/wikipedia/commons/8/89/Symbol_book_class2.svg License: CC
BY-SA 2.5 Contributors: Mad by Lokal_Prol by combining: Original artist: Lokal_Prol
File:Wiktionary-logo-v2.svg Source: https://upload.wikimedia.org/wikipedia/commons/0/06/Wiktionary-logo-v2.svg License: CC BY-
SA 4.0 Contributors: Own work Original artist: Dan Polansky based on work currently attributed to Wikimedia Foundation but originally
created by Smurrayinchester