Language Selection

English French German Italian Portuguese Spanish

OSI Transparency Reports

Filed under
  • October 2019 License-Discuss Summary

    We would like to introduce (and thank!) Amol Meshram, who has joined us here at the OSI to provide monthly summaries of both the License-Discuss and License-Review mailing lists. We hope these reports provide you with a helpful snapshot of the monthly activities on the lists, keeping you up to date with the latest topics, while also providing a reference point for further discussion. Of course all suggestions are welcome as we continue to enhance our reporting. We will try our best to include the feedback from OSI community members to make the summaries as accurate as possible and the discussions lively and fruitful.

  • October 2019 License-Review Summary

    Carlo Piana is not in favour of The Vaccine License and feels it is a trolling exercise. Filli Liberandum suggested to Carlo Paina to read the mailing list code of conduct. In furtherance to it, Filli Liberandum explained why there is a necessity of acknowledging The Vaccine License by OSI board and its members.
    Anand Chowdhary based on his experience of adding privacy compliance under twente open source license pointed out that there are better ways to protect privacy of individuals like local/national/international regulation instead of protecting it through open source license. He is of the opinion that there are better ways to advocate for vaccination and open source license is not the better way to advocate for it.
    Filli Liberandum countered to Anand Chowdhary by citing example of Cryptography Autonomy License of Mr. Lindstrom which ask for some release of data as a condition and head of OSI has publicly accepted this condition. Pamela Chestek brought into notice of Filli Liberandum that OSI did not endorse the view of Simon Phipps (referred head of OSI by Filli) on Cryptography Autonomy License data condition clause. Simon Phipps is member of the board along with others. Simon Phipps views on CAL are personal.
    Filli Liberandum raised a concern with respect to archives as it is stuck in a plaintext mode.
    Simon Phipps suggested to Filli Liberandum to familiarize with License-review process and change the tone of message and requested to leave moderating to the moderators to which Filli agreed and responded that here onwards Filli will directly reach out to concerned members.
    Gil Yehuda responded to Fil that Licenses usually do ask for things in return and appreciated the efforts of Fil in writing The Vaccine License, while considering the OSD. Gil raised an important point of enforceability of The Vaccine License in the real life scenario. Gil is of the opinion that one can right a blog and promote the importance of the idea instead of restricting it with copyright license. To buttress claim, Gil cited article written by Selam G which convinced Gil to support Free Software Movement. The reason behind citing this article is to explore other platforms instead of publishing work under copyright license.

    Carlo Piana responded to Fil that The Vaccine License is discriminatory and non-enforceable in nature. Carlo thinks that vaccination can be achieved through local authorities instead of enforcing it through copyright license. Carlo believes one should provoke reactions rather than genuine attempt of having a license approved.
    Josh Berkus agrees with Carlo on provoking reactions from members on license instead of attempting for approving the license. Josh suggested to take this submission as a use case and put it on for future reference.
    Carlo Piana is of the same view that should take this submission as a use case for future submissions to avoid duplication of work.
    Bruce Perens is also of the opinion that a direct law on vaccination will be more effective than a license. Similarly, Bruce also wrote two blog posts on the issue of “ethical” licenses wherein Bruce referred the proposed The Vaccine License.
    Grahame Grieve replied to Bruce’s blog post and appreciated the efforts of writing blog post on ethical license and also the basic arguments put forwards by Bruce. But Grahame bothered by the lack of ethics in the Vaccine License, judging vaccine license solely based on enforceability clause. Similarly, Grahame wanted to know whether the lawyers, courts and violators laugh at license and is there any precedent on when someone gives something of value away, on the condition that it not used in a particular way? Bruce Perens replied to all the queries of Graham Grieve. Firstly, Bruce Perens claims blog post argument is based on law instead of license terms. Secondly, Bruce has experience in handling litigation for various reasons and Bruce wants other should not get into litigation for same cause of action. Lastly, Bruce said Lawyers, courts and violators laugh at license and this whole exercise will be term as a ‘‘copyright misuse’’.
    Kevin P. Fleming replied to Graham and pointed that The Vaccine License does not talk about goals instead it focusses on action to be performed which is not in sync with the use of the software. Similarly, Kevin is of the opinion that The Vaccine License violates the OSD 5. To this Grahame Grieve countered by saying if The Vaccine license is applied to health software then in such scenario would Kevin change his opinion.
    Van Lindberg appreciated various aspect of the Vaccine License and efforts put forward by Fil in creating the vaccine license. But Van feels the Vaccine License does not qualify for OSS because it imposes conditions which are logically separate from and wholly unrelated to scope intellectual property rights that are licensed. Similarly, Van attempted to answer the question on what scope of action can be required of a license? Van observed if restrictions are closely related to the exercise of the intellectual property rights granted under license then such restrictions make sense and compatible with OSD.
    Filli Liberandum replied to analysis of Van and requested to reverse engineer the rules from the approved licenses which Fil believe will lead us to conclusion that the Vaccine License attempt is not an accidental in nature.
    Josh Berkus feels that The Vaccine License is very good example for ‘’unrelated conditions’’ license which can be referred in future as a textbook example to differentiate between what kind of licenses OSS supports and what can’t be supported by OSS license.

More in Tux Machines

IBM/Red Hat Leftovers

  • Ken Hess (Red Hat): Cyber Week 2020: 13 ideas for what to buy the sysadmin in your life | Enable Sysadmin

    It's that special time of year when you can get great discounts on tech for your favorite sysadmin.

  • [IBM Emeritus] Irving Wladawsky-Berger: Are There Limits to the Predictability of Elections?

    The elegant mathematical models of classical mechanics depict a world in which objects exhibit deterministic behaviors. These models make perfect predictions within the accuracy of their human-scale measurements. But, once you start dealing with atoms, molecules and exotic subatomic particles, you find yourself in a very different world, one with somewhat counter-intuitive behaviors governed by the laws of quantum mechanics. The orderly, predictable models of classical physics have now given way to wave functions, uncertainty principles, quantum tunneling and wave-particle dualities. But, the world of the very small is not the only one with non-deterministic behaviors. So are highly complex systems, especially those systems whose components and interrelationships are themselves quite complex. This is the case with social systems, which are based on individuals, groups, and institutions. It’s quite a challenge to make accurate predictions in such systems due to the the dynamic nature of human behaviors. Terms, like emergence, long tails, and butterfly effects - every bit as fanciful as quarks, charm and strangeness, - are part of the social systems lexicon. Which brings us to the 2020 US election. “The polls were wrong again, and much of America wants to know why,” wrote NY Times journalist David Leonhardt in a recent article. “This is a disaster for the polling industry and for media outlets and analysts that package and interpret the polls for public consumption, such as FiveThirtyEight, The New York Times’ Upshot, and The Economist’s election unit,” said David Graham in The Atlantic.

  • [Red Hat] Why failure should be normalized and how to do it |

    All of your heroes have failures under their belts—from minor mistakes to major disasters. Nobody knows how to do everything automatically, and the process of learning is usually a messy one. So why is the perception that everyone but you knows what they’re doing so common? Why do we externalize our successes but internalize our failures? How does it make you feel when you struggle to learn something new, then see another person take their Jira card away and return at the end of the sprint with something fully fleshed out and working, gushing about it at the demo? Sure, you closed your card too, but it was really hard! There was a new algorithm, a new programming language, a new system all to be learned. How did she make it look so effortless? The truth is, she might have struggled with the same issues you did and wondered how you made it look so effortless! [...] It could be very easy to title this section "my mistakes" and then rattle off all the times I’ve made mistakes, but that doesn’t quite illustrate the point. I recognize these mistakes, but they’re also events that expanded the understanding of my craft. While I didn’t set out to intentionally do any of these things, I certainly learned from them. I have accidentally dropped (deleted) a customer’s database. It was lucky for everyone that it was a beta-phase database and no further harm was done. I learned a valuable lesson that day: be very watchful of what code is doing, and be careful about what environment you are working in. One day, while performing routine maintenance with an odd DNS setup, I accidentally broke the ability for customers to provide credit card information to the secure site. We had two "payments" DNS records that served to override a wildcard DNS record, and I assumed that the second "payments" record was still present. It wasn’t. And then the wildcard record took over, and the DNS started behaving like "payments" wasn’t special at all anymore. Of course, I had no idea this was happening at all—it wasn’t until my maintenance was over that I learned of the folly. Customers weren’t able to provide payment information for almost two hours! I learned my lesson, though: when there is something special about a particular configuration, be sure to make sure it stays special throughout its lifetime. When DNS gets involved, all kinds of things can break.

today's howtos

  • What option to use for ping constantly until you stop it? - Linux Shout

    The Ping program is a widely used tool to check the accessibility of a computer network. All operating systems available till now have the ability to run the Ping command with various options to even continuously check the network resource or connection availability. However, if a firewall suppresses ping packets on the way from your computer to the host, it can falsely appear to be unreachable. To do this, it sends echo request packets to the host via ICMP. Using the time difference between this and the response (echo reply), it calculates the runtime. Ping was defined in RFC 1574.

  • How to Cast Media from Ubuntu to Chromecast | FOSS Linux

    In this Ubuntu tutorial, we shall see ways to cast media from a Linux PC to a Chromecast device. We shall see command-line and GUI ways of casting the content.

  • How do I view Nginx logs? – Linux Hint

    Logs are very important in a system to monitor the activities of an application as they provide you with useful debugging information and enable you to analyze all aspects of a web server. Like the other software applications, Nginx also maintains events like your web site visitors, encountered problems, and more to log files. The useful recorded information is used to take preemptive measures in order to deal with major serious discrepancies in the log events. In this article, we will elaborate on how to configure and view Nginx Logs in Ubuntu 20.04 system to monitor the application activities. There are two types of logs where recorded events in Nginx one is the access log, and the other is the error log. If you have already enabled these logs in the Nginx core configuration file then, you can find both types of logs in /var/log/nginx in all Linux distributions.

  • How To Install PowerShell on CentOS 8 [Ed: Microsoft is just trying to turn GNU/Linux into its own thing, intended to serve Microsoft's bottom line and lock-in]
  • OSINT Tools and Techniques – Linux Hint

    OSINT, or Open Source Intelligence, is the act of gathering data from distributed and freely accessible sources. OSINT tools are used to gather and correspond data from the Web. Data is accessible in different structures, including text design, documents, images, etc. The analysis and collection of information from the Internet or other publicly available sources is known as OSINT or Open Source Intelligence. This is a technique used by intelligence and security companies to gather information. This article provides a look at some of the most useful OSINT tools and techniques.

  • How to Record Your Gnome Desktop in Ubuntu with built-in screen recorder – Linux Hint

    In the present era, the lives of the people have undergone a huge change from what it used to be a couple of years back. In the educational sector, books have fallen down the pecking order, and people now prefer watching videos explaining the concepts of their syllabus. A great example of this is YouTube, where videos on things like programming languages, economics, political science, and even geography are getting many viewers. The business sector has also gone through some innovation as now people can easily keep a record of important voice calls and conferences that might be needed for looking at the main highlights of the meeting. Even recording presentations and then sharing them with your clients or bosses have become the norm as this allows information to be passed from one to another in a much more efficient manner. All of these are just a few examples of why screen recorders are one of the most useful tools out there. Screen recorders can even be used for recording content that many people may find enjoyable, such as recording a game that might be on the rise in popularity or put up videos to explain any issues or problems that you might come across in your life, like checking to see how one can remove and adjust tires from a car. Hence, our discussion topic in this article is to look at how one can record their screens in Ubuntu using its default built-in screen recorder.

  • Blender Animation Nodes – Linux Hint

    Blender animation nodes is a visual scripting system made for motion graphics in Blender. Animation nodes are an addon that is available for macOS, Linux, and Windows. There are a lot of things which you just can imagine to animate by hand because it is a very difficult task. Animation Nodes allows us to make complex animation in a less complex and tedious way. Animation Nodes add-ons can save you a lot of time and has several advantages over traditional keyframing technique. For instance, you can avoid managing many keyframes, and each node tree can be used for any objects; you don’t have to keyframe them every time.

  • Blender Animation Loops – Linux Hint

    Blender is a powerful 3D creation tool. Blender holds all the attributes that a 3D artist needs. Sometimes a short movie tells a lot than an image. Making 3D scenes in Blender is great, but animating it is another level of mastering this program. So, it is essential to know about adding motion to 3D objects. Animation is an excellent way to connect and communicate with people; that’s why it is vital in the business world. Conveying a message through animation is considerably more appealing than images. Whether it is education or businesses, the film industry, or gaming, animation is being used everywhere.

Best Photo Editors for Linux

This article will cover a list of free and open-source image editors available for Linux. These applications feature basic tools for simple editing needs as well as advanced utilities for professional artists. GIMP If you are a regular Linux user, chances are that you must have heard about GIMP (GNU Image Manipulation Program) or used it to edit images. It is considered to be one of the most comprehensive, free, and open source image editing software available not only on Linux, but also on other operating systems like Windows and macOS. While some users may prefer proprietary tools like Photoshop over it, GIMP itself is packed with tons of features and can do almost everything that Photoshop is capable of. You can see all major features of GIMP available at here and here. GIMP can be extended using plugins, some of them come with the official installation while others can be downloaded from third party websites. [...] RawTherapee RawTherapee is an open source image editing software specially designed for processing and handling “raw” images. You can also import and edit image files having other formats. RawTherapee features various utilities for processing raw images including color enhancement tools, compositing and masking utilities, pixel correction tools and HDR utilities. Read more

5 Best Free and Open source NAS Software for Linux

In the 21st century, huge innovations have been made in various sectors, particularly the technological region, which has completely changed the world’s dimensions. The strides at which new technology has been developed and improved upon from its predecessors would surely be something that our ancestors would marvel at. Humans have gone in a very short time from making stone arrows and straw huts to developing smartphones and automated robots, and these advancements are continuously growing without slowing down. However, this huge transition has also brought forward some adverse effects as our machines are now subjected to more cyber-attacks and security issues. Data is one of the most important factors in the world today, and it is exactly that which is the most vulnerable. Therefore, it is necessary to implement procedures that would help in keeping your data secure. One excellent way is to use NAS software, which helps in keeping backups of your data. This shall also be the topic of our discussion in this article, where we will be looking at the top 5 free and open-source NAS software available on Linux. Read more