Feeds

Apache reignites Sun open source dispute

Opens fire with open letter

Combat fraud and increase customer satisfaction

The Apache Software Foundation (ASF) has publicly slammed Sun Microsystems for dragging its feet over licensing it claims is unfair and discriminatory to open source, five years after the pair resolved similar differences.

The ASF has published a strongly worded open letter blaming Sun for hindering its open source Java Standard Edition (Java SE) project, Harmony, by maintaining IP restrictions in the Java SE 5.0 Test Compatibility Kit (TCK).

The TCK is needed to certify Harmony as an official JCP-compatible implementation. Invariably, TCKs have, in the past, contained licensed IP that makes them incompatible with certain open source licenses and deployments.

ASF Java Community Process (JCP) lead Geir Magnusson claimed ASF has sought modification of the JSE TCK license since August 2005, adding Harmony has been delayed since May 2005 because the current TCK conditions are "totally unacceptable." Magnusson has given Sun 30 days to develop a compliant license.

Magnusson said the licensing limitations are contrary to the basic principles of open source, and potentially damaged both the JCP and the "long-standing positive relationship" between Sun, the ASF and community.

That relationship, of course, dates back to 2002 when Sun pledged to use licenses for Java specifications and TCKs that are compatible with open source, and revised its JCP legal agreement and Java Specification Participation Agreement (JSPA) as a result. That agreement, announced at JavaOne, diffused mounting tension between ASF and Sun, who'd owned licenses that prohibited use and testing of Java with open source. The 2002 settlement provided coverage for six named projects, here, but not - it seems - Harmony. The JCP was also updated so Java Specification Requests (JSRs) could be submitted from the open source community.

Magnusson's letter skims over exact details of the IP in question, but indicates a belief that Sun's position is contrary to parts of the 2002 settlement. Namely, Java specification leads cannot impose contractual conditions limiting or restricting use, and leads must make all IP available under a Royalty Free license.

Sun has so far kept mostly mum, but responded briefly by saying this had been a private discussion with ASF and that it's considering a more detailed response. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.