The politics of the command line
Free software has lead to communities of diverse individuals forming to fight for a common cause.
Some claims have been more absurd than others. Consider the suit filed against the Free Software Foundation in Indiana in May 2005 by Daniel Wallace which claimed that the GPL was "an illegal attempt to fix prices at zero". Or, look to the SCO Group's claim for $6 billion from IBM, for making Linux "ready for enterprise use" with technologies that had been "misappropriated" from Unix, to which SCO claimed the rights - wrongly so, as it later transpired.
SCO alleged "misappropriation of trade secrets, unfair competition, breach of contract and tortious interference with SCO's business." For the defence, IBM had its considerable battery of lawyers, a huge portfolio of patents, Novell, Red Hat - and the volunteer services of the Linux and free software communities that gathered around the Groklaw website.
I'm fat and it's your fault
Groklaw was begun as the personal blog of Pamela Jones, best known as PJ, in which she could express her views as a paralegal on the issues of the day. The site emerged just as SCO began its legal action against IBM in 2003, and rapidly became a focus for Linux users, programmers and legal professionals in their mission to expose, understand and demystify the issues surrounding the case.
Before SCO, Jones was "just trying to learn how to use blogging software. I was startled to learn anyone was reading what I wrote," she says. "The first articles were not about SCO at all. I started covering the McDonald's 'I'm fat and it's your fault' litigation and Martha Stewart and whatever was in the news, just to have something to write about as I learned how blogging worked."
PJ's first article on the SCO case appeared in May 2003 under the title: "SCO Falls Downstairs, Hitting its Head on Every Step." In the years since then PJ and Groklaw can be credited with unearthing and exposing many of the flaws in SCO's case - most notably, obtaining and publishing the 1994 settlement in the USL vs BSDi case, which had been hidden from public view and played a significant role in undermining SCO's claims to the ownership of Unix.
"Then, when readers showed up, and I saw the media in general was taking SCO seriously, I began to realise what could happen. That was the creative moment, when I put all the pieces together and realised that my readers knew the tech. I knew how to explain what was happening in the litigation, and they knew where to find evidence that what SCO was saying wasn't likely to prove true."
Big Blue looming
At the beginning the press was satisfied that SCO had a plausible case. SCO distributed a "Letter to Linux customers" which alleged that: "We have evidence that portions of UNIX System V software code have been copied into Linux and that additional other portions of UNIX System V software code have been modified and copied into Linux, seemingly for the purposes of obfuscating their original source." SCO's allegations had some adverse affect on the uptake of Linux in the enterprise.
Groklaw became a bridge between the techies, who understood the technology, and the lawyers, who were at one remove from the technical issues. As Jones puts it: "I was worried that the lawyers might not know the tech as well as we did, and my largest hope was that maybe somebody would notice what we were finding, and it might help.
"I had seen some court rulings that indicated to me that the judges didn't understand the tech, so they were getting things wrong. And I knew from working with lawyers that many of them are the last to grasp anything technical, so I realised that I could be a kind of bridge."
"I understood the tech enough to translate from the geek input for the lawyers; and I could translate the legal stuff to the tech guys, so everyone would understand what was happening. You can only get better case law if everyone understands the facts well, including the lawyers, who explain it all to the judge. My concept was that this could actually make the system work as intended, by speeding up the learning curve."
In This Article
Application security fallacies and realities
Web application attacks are the most common vulnerability, so what is the truth about application security?Download now
Your first step researching Managed File Transfer
Advice and expertise on researching the right MFT solution for your businessDownload now
The KPIs you should be measuring
How MSPs can measure performance and evaluate their relationships with clientsDownload now