The Future of the Internet by The Future of the Internet
Author:The Future of the Internet
Language: eng
Format: mobi
ISBN: 9780141951812
Publisher: Penguin Books Ltd
Published: 2008-02-06T20:00:00+00:00
BALANCING GENERATIVE AND NON-GENERATIVE SYSTEMS
Code thickets
A number of scholars have written about the drawbacks to proprietary rights thickets: overlapping claims to intellectual property can make it difficult for those creating new but not completely original creative works to avoid infringing others’ rights. This is a particular problem for code developed with the tools of group generativity. For the past twenty years, the modern landscape of information technology has accommodated competing spheres of software production. These spheres can be grouped roughly around two poles warring for dominance in the field. On one side is proprietary software, which typically provides cash-and-carry functionality for the user. Its source code “recipe” is nearly always hidden from view as a technical matter, and as a legal matter it cannot be used by independent programmers to develop new software without the rarely given permission of its unitary rights holder. On the other side is free software, referring not to the price paid for a copy, but to the fact that the source code of the software is open to public view and modification.
It is not easy for the law to maintain neutrality in the conflict between the two spheres, evenhandedly encouraging development in both models. For example, the free software movement has produced some great works, but under prevailing copyright law even a slight bit of poison, in the form of code from a proprietary source, could amount to legal liability for anyone who copies or potentially even uses the software. (Running software entails making at least a temporary copy of it.)
The collaborative nature of free software development makes it harder to determine where various contributions are coming from and whether contributions belong to those who purport to donate them. Indeed, in the case of an employee of a software company charitably moonlighting for a free software project, the employee’s work may not even be the employee’s to give. A barely remembered but still enforceable employment agreement may commit all software written by the employee to the employer’s possession, which would set the stage for an infringement claim against those within the free software project for making use of the employee’s contributions.
Major free software projects try to avoid these problems by soliciting declarations from participants that they are only contributing code that they wrote or to which they have free license. The Free Software Foundation even suggests that employees obtain a disclaimer from their employers of all interest in employee contributions.63 But the danger of poisoned code remains, just as it is possible for someone to contribute copyrighted material to Wikipedia or a Geocities home page at any moment. The kind of law that shields Wikipedia and Geocities from liability for material contributed by outsiders, as long as the organization acts expeditiously to remove infringing material once it is notified, ought to be extended to the production of code itself.64 Code that incorporates infringing material is not given a free pass, but those who have promulgated it without knowledge of the infringement would have a chance to repair the code or cease copying it before becoming liable.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7414)
Grails in Action by Glen Smith Peter Ledbrook(7311)
Kotlin in Action by Dmitry Jemerov(4662)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4141)
The Age of Surveillance Capitalism by Shoshana Zuboff(3435)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3260)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3035)
Mastering Python for Networking and Security by José Manuel Ortega(2971)
Blockchain Basics by Daniel Drescher(2902)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(2734)
TCP IP by Todd Lammle(2649)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(2589)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2490)
Azure Containers Explained by Wesley Haakman & Richard Hooper(2476)
Hands-On Azure for Developers by Kamil Mrzyglod(2436)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2346)
The Social Psychology of Inequality by Unknown(2321)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2320)
The Art Of Deception by Kevin Mitnick(2308)