Final Draft of GPLv3 Allows Novell-Microsoft Deal

Final Draft of GPLv3 Allows Novell-Microsoft Deal – famicommie writes “All of Novell’s fingernail biting has been for naught. In a display of forgiveness and bridge building on behalf of the FSF, ZDNet reports that the final draft of the GPLv3 will close the infamous MS-Novell loophole while allowing deals made previously to continue. From the article: ‘The final, last-call GPLv3 draft bans only future deals for what it described as tactical reasons in a 32-page explanation of changes. That means Novell doesn’t have to worry about distributing software in SLES that’s governed by the GPLv3 … Drafting the new license has been a fractious process, but Eben Moglen, the Columbia University law school professor who has led much of the effort, believes consensus is forming. That agreement is particularly important in the open-source realm, where differing license requirements can erect barriers between different open-source projects.'” Read more of this story at Slashdot. [Slasdot]
Final Draft of GPLv3 Allows Novell-Microsoft Dealfamicommie writes “All of Novell’s fingernail biting has been for naught. In a display of forgiveness and bridge building on behalf of the FSF, ZDNet reports that the final draft of the GPLv3 will close the infamous MS-Novell loophole while allowing deals made previously to continue. From the article: ‘The final, last-call GPLv3 draft bans only future deals for what it described as tactical reasons in a 32-page explanation of changes. That means Novell doesn’t have to worry about distributing software in SLES that’s governed by the GPLv3 … Drafting the new license has been a fractious process, but Eben Moglen, the Columbia University law school professor who has led much of the effort, believes consensus is forming. That agreement is particularly important in the open-source realm, where differing license requirements can erect barriers between different open-source projects.'”

Read more of this story at Slashdot.

[Slasdot]


Did you like this article?


0 Shares:
You May Also Like

10 things that should be in Apple’s next Mac Pro

A lot of points they make do kinda conflict, asking for more for a lower price. However, there are a lot of good points. The points I agree on are ditching fireware for esata, and onboard raid controllers.
October 12, 2007 (Computerworld) -- The recent word from The Inquirer that Apple may be hoarding all of Intel's new 45nm Penryn processors -- and possibly paying for the privilege -- has prompted a lot of speculation about the future of Apple's Mac Pro desktop lineup. Apple's professional machines, which now use Intel Xeon Cloverton chips topping out at 3 GHz, are called workstations by Apple and offer quad- and eight-core configurations. They're fast, and they sport professional prices to match, with top-of-the-line eight-core units starting at $3,997. Read More
Read More

Layeredpanel 1.0.6 (Default branch)

Layeredpanel 1.0.6 (Default branch) - Screenshot Layeredpanel is a freehosting panel which allows Linux hosters and administrators to open a large-scale freehosting platform for their users. It includes an easy-to-use interface for administrators and users alike to create user profiles, databases, and complete sites. It features one-click installation of well-known applications like phpBB and Joomla.

[FreshMeat]
Read More

Comcast traffic blocking: even more apps, groupware clients affected

More information about the supposed filters that Comcast has implemented to curb Bittorrent traffic on its network. Only now it looks as though the appplication suit Lotus Notes is affected.
Last week, we reported on mounting evidence that Comcast is targeting and disrupting BitTorrent traffic on its network. Further digging by interested parties has turned up more indication that BitTorrent isn't the only popular P2P protocol being tampered with by the United States' largest ISP.
Read More

Auckland Security Consultant uses PS3 for Cryptography

As the title states, a Senior Security Consultant by the name of Nick Breese is using a PS3 to crack MD5 hashes. Aside from this article incorrectly stating that the security expert is stealing passwords, as of now he has only shown how fast the machines can process MD5 hashes. This is just a small glimpse of what the software and hardware can do, the article compares how many cycles can be completed using Vector Computing:
Read More