Knowledge (XXG)

Proprietary software

Source 📝

251:. Service and all software available were usually supplied by manufacturers without separate charge until 1969. Computer vendors usually provided the source code for installed software to customers. Customers who developed software often made it available to the public without charge. Closed source means computer programs whose source code is not published except to licensees. It is available to be modified only by the organization that developed it and those licensed to use the software. 340: 986:. If the proprietor of a software package should cease to exist, or decide to cease or limit production or support for a proprietary software package, recipients and users of the package may have no recourse if problems are found with the software. Proprietors can fail to improve and support software because of business problems. Support for older or existing versions of a software package may be ended to force users to upgrade and pay for newer versions( 4106: 4096: 3040: 2621:
organization to avoid becoming a victim of vendor lock-in is to use products that conform to free, industry-wide standards. Free standards are those that can be used by anyone and are not controlled by a single company. In the case of computers, this can usually be accomplished by using free software rather than proprietary software (i.e., commercial software).
444:
to allow themselves or others to redistribute proprietary versions. Non-copyleft free software (i.e. software distributed under a permissive free software license or released to the public domain) allows anyone to make proprietary redistributions. Free software that depends on proprietary software is
2758:
that no further patches to the title would be forthcoming. The community was predictably upset. Instead of giving up on the game, users decided that if Activision wasn't going to fix the bugs, they would. They wanted to save the game by getting Activision to open the source so it could be kept alive
2153:
You may install, use, access, display and run one copy of the Software on a single computer, such as a workstation, terminal or another device ("Workstation Computer"). The Software may not be used by more than two (2) processors at any one time on any single Workstation Computer. ... You may permit
1596:
So if open source used to be the norm back in the 1960's and 70's, how did this _change_? Where did proprietary software come from, and when, and how? How did Richard Stallman's little utopia at the MIT AI lab crumble and force him out into the wilderness to try to rebuild it? Two things changed in
1544:
While IBM's policy of withholding source code for selected software products has already marked its second anniversary, users are only now beginning to cope with the impact of that decision. But whether or not the advent of object-code-only products has affected their day-to-day DP operations, some
2620:
Vendor lock-in, or just lock-in, is the situation in which customers are dependent on a single manufacturer or supplier for some product This dependency is typically a result of standards that are controlled by the vendor It can grant the vendor some extent of monopoly power The best way for an
1266:
In the 1960s, IBM and Xerox recognized that substantial sums could be made from the financing of their equipment. The leasing of computer and office equipment that occurred then was a significant contribution to leasings growth, since many companies were exposed to equipment leasing for the first
2789:
fans of the Myth trilogy have taken this idea a step further: they have official access to the source code for the Myth games. Organized under the name MythDevelopers, this all-volunteer group of programmers, artists, and other talented people devote their time to improving and supporting further
2154:
a maximum of ten (10) computers or other electronic devices (each a 'Device') to connect to the Workstation Computer to utilize one or more of the following services of the Software: File Services, Print Services, Internet Information Services, Internet Connection Sharing and telephony services.
1063:
can be distributed at no cost or for a fee. The difference is that whether proprietary software can be distributed, and what the fee would be, is at the proprietor's discretion. With free software, anyone who has a copy can decide whether, and how much, to charge for a copy or related services.
1999:
In connection with the software, an issued patent may prevent others from utilizing a certain algorithm (such as the GIF image compression algorithm) without permission, or may prevent others from creating software programs that perform a function in a certain way. In connection with computer
820:
is closed-source software whose owner encourages redistribution at no cost, but which the user sometimes must pay to use after a trial period. The fee usually allows use by a single user or computer. In some cases, software features are restricted during or after the trial period, a practice
385:
are also used. For customers, the advantages of temporary licenses include reduced upfront cost, increased flexibility, and lower overall cost compared to a perpetual license. In some cases, the steep one-time cost demanded by sellers of traditional software were out of the reach of
708:
are distributed with proprietary licenses that make the source code available.Some licenses for proprietary software allow distributing changes to the source code, but only to others licensed for the product, and some of those modifications are eventually picked up by the vendor.
321:
law decision, before which only source code was copyrightable. Additionally, the growing availability of millions of computers based on the same microprocessor architecture created for the first time an unfragmented and big enough market for binary distributed software.
1597:
the early 80's: the exponentially growing installed base of microcomputer hardware reached critical mass around 1980, and a legal decision altered copyright law to cover binaries in 1983. Increasing volume: The microprocessor creates millions of identical computers
2759:
beyond the point where Activision lost interest. With some help from members of the development team that were active on fan forums, they were eventually able to convince Activision to release Call to Power II's source code in October of 2003.
690:
While most proprietary software is distributed without the source code, some vendors distribute the source code or otherwise make it available to customers. For example, users who have purchased a license for the Internet forum software
2500:
While the Web promotes the sharing of such code, there are times when you or a client may not want to share their JavaScript code. This may be due to the sensitive nature of data within the code, proprietary calculations, or any other
1085:
Proprietary software generally creates greater commercial activity over free software, especially in regard to market revenues. Proprietary software is often sold with a license that gives the end user right to use the software.
913:
is so broad, so deep, and so functional that most ISVs would be crazy not to use it. And it is so deeply embedded in the source code of many Windows apps that there is a huge switching cost to using a different operating system
588:
Vendors typically limit the number of computers on which software can be used, and prohibit the user from installing the software on extra computers. Restricted use is sometimes enforced through a technical measure, such as
363:, a company can restrict the parties to which it sells but it cannot prevent a buyer from reselling the product. Software licensing agreements usually prohibit resale, enabling the company to maximize revenue. 2062:
Under US copyright law, which is the law under which most free software programs have historically been first published, only the copyright holder or someone having assignment of the copyright can enforce the
695:
can modify the source for their own site but cannot redistribute it. This is true for many web applications, which must be in source code form when being run by a web server. The source code is covered by a
2963:
Proprietary software should be distinguished from commercial software. It is possible for the software to be commercial without being proprietary. The reverse is also possible, for example in binary-only
720:
which would compromise sensitive information. In 2003 Microsoft established a Government Security Program (GSP) to allow governments to view source code and Microsoft security documentation, of which the
399:
Software distributions considered as proprietary may in fact incorporate a "mixed source" model including both free and non-free software in the same distribution. Most if not all so-called proprietary
3599: 359:. These licenses have continued in use after software copyright was recognized in the courts, and are considered to grant the company extra protection compared to copyright law. According to 1038: 729:
which provides source code access for some products. The Reference Source License (Ms-RSL) and Limited Public License (Ms-LPL) are proprietary software licenses where the source code is
3678: 2677: 1233:
Although IBM agreed to sell its machines as part of a Consent Decree effective January 1956, leasing continued to be its preferred way of doing business.then everyone started fighting
608:
Vendors may also distribute versions that remove particular features, or versions which allow only certain fields of endeavor, such as non-commercial, educational, or non-profit use.
1034: 2820:
With the release of Homeworld 2 for the PC, Relic Entertainment has decided to give back to their impressive fan community by releasing the source code to the original Homeworld.
3897: 3519: 1106: 961: 100: 1373:
the components and offered them for sale individually. Unbundling gave birth to the multibillion-dollar software and services industries, of which IBM is today a world leader.
3736: 2885:
It is important to distinguish commercial software from proprietary software. Proprietary software is non-free software, while commercial software is software sold for money.
886:
interface "specific to one device or, more likely to a number of devices within a particular manufacturer's product range." The motivation for using a proprietary API can be
550:, provisions in conflict with applicable law are not enforceable. Some software is specifically licensed and not sold, in order to avoid limitations of copyright such as the 526:. Software can be made available with fewer restrictions on licensing or source-code access; software that satisfies certain conditions of freedom and openness is known as " 381:
as of 2023—rarely offer perpetual licenses. SaaS licenses are usually temporary and charged on a pay-per-usage or subscription basis, although other revenue models such as
1545:
users remain angry about IBM's decision. Announced in February 1983, IBM's object-code-only policy has been applied to a growing list of Big Blue system software products
3668: 1818: 642:
licenses are limited to one user, but allow the user to install a second copy on a home computer or laptop. This is no longer true with the switching to Creative Cloud.
369:
that could not be understood or modified by the user, but could be downloaded and run. The user bought a perpetual license to use a particular version of the software.
355:
The tendency to license proprietary software, rather than sell it, dates from the time period before the existence, then the scope of software copyright protection was
2708: 811:
Proprietary software vendors can prohibit the users from sharing the software with others. Another unique license is required for another party to use the software.
3072: 2479: 1788: 722: 318: 289: 3688: 3574: 814:
In the case of proprietary software with source code available, the vendor may also prohibit customers from distributing their modifications to the source code.
3673: 3656: 1059:, although the two terms are sometimes used synonymously in articles about free software. Proprietary software can be distributed at no cost or for a fee, and 3626: 3524: 3802: 3636: 3609: 3589: 1973: 3614: 2542: 960:, an operating system which is limited to Apple hardware, both by licensing and various design decisions. This licensing model has been affirmed by the 2038:
Essentially there are only three ways to protect computer software under the law: patent it, register a copyright for it, or keep it as a trade secret.
3564: 3534: 2772: 1074:
Proponents of commercial proprietary software argue that requiring users to pay for software as a product increases funding or time available for the
3711: 445:
considered "trapped" by the Free Software Foundation. This includes software written only for Microsoft Windows, or software that could only run on
2990: 1306: 2000:
software, copyright law can be used to prevent the total duplication of a software program, as well as the copying of a portion of software code.
1947: 3683: 3641: 3584: 2852: 2451: 2076: 1773: 1754: 1735: 1716: 1697: 1678: 1652: 1633: 1614: 1566: 1469: 1153: 56:
to exclude the recipient from freely sharing the software or modifying it, and—in some cases, as is the case with some patent-encumbered and
2685: 4099: 4047: 3977: 3661: 926:. The agreement forbade independent developers from discussing the content of the interfaces. Apple discontinued the NDA in October 2008. 2803: 3621: 3514: 3065: 1348: 1974:
Limitations and Exceptions to Copyright and Neighbouring Rights in the Digital Environment: An International Library Perspective (2004)
744:
has used covert partnerships with software companies to make commercial encryption software exploitable to eavesdropping, or to insert
4002: 3854: 788: 387: 3917: 3827: 3822: 2579: 1866: 1226: 879: 176: 2898: 3646: 3554: 2935:
If you program for Linux, you do need to understand licensing, no matter if you are writing free software or commercial software.
2869: 1423: 116: 280:
interpreter, and asserted that their unauthorized use hindered his ability to produce quality software. But the legal status of
3912: 3744: 3651: 3124: 2543:"Commission Decision of 24.03.2004 relating to a proceeding under Article 82 of the EC Treaty (Case COMP/C-3/37.792 Microsoft)" 1245: 806: 684: 566:
over the software. The owner can restrict the use, inspection of source code, modification of source code, and redistribution.
2634: 3491: 3058: 3044: 1822: 897:, in its March 24, 2004, decision on Microsoft's business practices, quotes, in paragraph 463, Microsoft general manager for 1529: 2718: 4130: 4007: 3902: 3726: 3716: 3500: 3107: 995: 72: 1796: 518:, with coverage varying by jurisdiction. Vendors sometimes grant patent rights to the user in the license agreement. The 4073: 3927: 3721: 952:
Proprietary software may also have licensing terms that limit the usage of that software to a specific set of hardware.
2517: 2301:"Distribution of IBM Licensed Programs and Licensed Program Materials and Modified Agreement for IBM Licensed Programs" 2221: 4135: 4035: 3942: 3777: 3355: 2406: 768: 648:, Apple's productivity suite, is available in a five-user family pack, for use on up to five computers in a household. 446: 185: 736:
Governments have also been accused of adding such malware to software themselves. According to documents released by
3932: 3817: 3594: 3423: 3303: 2443: 2387: 700:
or a license that allows, for example, study and modification, but not redistribution. The text-based email client
495: 470: 310:-only" model for a growing list of their software and stopped shipping much of the source code, even to licensees. 2654: 4067: 3982: 3967: 3418: 3144: 2832: 2587: 2487: 2442:. Second International Workshop on Digital Rights Management. Lecture Notes in Computer Science. Vol. 2696. 515: 421: 360: 84: 53: 4062: 3859: 3812: 3797: 3749: 3559: 3328: 2439:
Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
1896: 1101: 1075: 923: 855: 697: 269: 2553: 2741: 2170: 2133:"End-User License Agreement for Microsoft Software: Microsoft Windows XP Professional Edition Service Pack 2" 2099:"End-User License Agreement for Microsoft Software: Microsoft Windows XP Professional Edition Service Pack 2" 994:
for the software, or the users can migrate to either competing systems with longer support life cycles or to
48:
that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern
3448: 2383: 676: 632: 132: 3997: 2338: 4109: 3844: 3807: 3706: 3267: 3139: 1386: 859: 507: 440:
and ssh. The original copyright holders for a work of free software, even copyleft free software, can use
273: 3972: 3767: 3759: 3698: 3631: 3287: 3129: 3081: 2429: 2128: 2094: 1002: 615: 527: 432:
Some free software packages are also simultaneously available under proprietary terms. Examples include
300: 181: 2998: 2776: 1424:"CONTU Revisited: The Case against Copyright Protection for Computer Programs in Machine-Readable Form" 631:
can be installed on one computer, and limits the number of network file sharing connections to 10. The
2361: 1882: 4057: 3987: 3549: 3378: 3262: 3252: 3117: 2267:
Under the proprietary software model, most software developers withhold their source code from users.
1558: 1111: 987: 849: 760: 745: 701: 658: 583: 378: 1837: 3937: 3539: 3383: 3368: 3165: 2549: 1056: 1050: 894: 551: 531: 503: 370: 138: 31: 4095: 2320:"Module 24: SLAC Enhancements to and Beautifications of the IBM H-Level Assembler for Version 2.8" 901:
development Aaron Contorer as stating in a February 21, 1997, internal Microsoft memo drafted for
60:-bound software—from making use of the software on their own, thereby restricting their freedoms. 3484: 3443: 3433: 3388: 3102: 2244: 2029: 1900: 1497: 1465: 1443: 1141: 940:
Any dependency on the future versions and upgrades for a proprietary software package can create
845: 776: 590: 476: 462: 281: 240: 121: 1218: 1208: 2844: 4017: 3864: 3544: 3458: 3398: 3373: 3197: 2848: 2807: 2447: 1862: 1858: 1852: 1222: 1149: 1096: 622: 339: 45: 35: 1356: 1177: 3782: 3272: 3089: 2464: 2236: 2021: 1435: 1315: 1006: 883: 834: 756: 730: 332: 978:
Proprietary software which is no longer marketed, supported or sold by its owner is called
4052: 3453: 3428: 3410: 3277: 3214: 3170: 3012: 2948: 2433: 1507: 1116: 991: 752: 602: 575: 563: 511: 484: 466: 413: 356: 2902: 1987: 3849: 3772: 2837: 2280: 1664: 1662: 1493: 983: 935: 887: 737: 441: 296: 259: 167: 2745: 2437: 2195: 4124: 4080: 4041: 3947: 3604: 3529: 3477: 3333: 3112: 2873: 2425: 2300: 2166: 1533: 1369:
Rather than offer hardware, services and software exclusively in packages, marketers
1060: 764: 726: 639: 314: 112: 2319: 2033: 1253: 17: 3922: 3879: 3792: 3257: 3219: 3207: 3182: 2713: 1451: 863: 713: 705: 672: 523: 488: 458: 374: 277: 159: 143: 2012:
Donovan, S. (1994). "Patent, copyright and trade secret protection for software".
1009:
software, often to prevent the software from becoming unsupported and unavailable
2132: 2098: 1584: 498:(EULA). The user may agree to this contract in writing, interactively on screen ( 79:
are not deemed proprietary, but are non-free. Proprietary software may either be
4012: 3839: 3834: 3469: 3438: 3363: 3313: 3177: 3014:
Open Source Versus Commercial Software: Why Proprietary Software is Here to Stay
1921: 1030: 1022: 1018: 1010: 979: 973: 910: 822: 680: 662: 594: 579: 519: 366: 307: 285: 163: 3345: 3318: 3282: 2976: 2051: 1942: 1479: 1279: 953: 902: 784: 772: 628: 404:
distributions are mixed source software, bundling open-source components like
348: 265: 3869: 3393: 3340: 3236: 3224: 2994: 2252: 2140: 2106: 1214: 1082:
says that per-copy fees maximize the profitability of software development.
1079: 1014: 854:
Proprietary software often stores some of its data in file formats that are
817: 800: 692: 543: 499: 344: 255: 222: 49: 2924: 3039: 2609: 3907: 3787: 3202: 3192: 3187: 3097: 1068: 1026: 1021:
are famous for the practice of releasing closed source software into the
668: 625:
is limited to non-commercial use on up to three devices in one household.
547: 480: 437: 409: 382: 217: 212: 126: 76: 3050: 862:
which are incompatible. Such formats and protocols may be restricted as
3323: 3308: 3229: 2248: 1447: 919: 717: 2025: 1319: 3160: 990:). Sometimes another vendor or a software's community themselves can 867: 775:
to somewhat usable code, and the source code for programs written in
725:
was an early participant. The program is part of Microsoft's broader
598: 64: 2388:"US and UK spy agencies defeat privacy and security on the internet" 2240: 1439: 890:
or because standard APIs do not support the device's functionality.
618:
is restricted to running a maximum of three concurrent applications.
491:, provides legal basis for its owner to establish exclusive rights. 243:, machines in specially air-conditioned computer rooms—were usually 1530:"IBM policy draws fire - Users say source code rules hamper change" 898: 3874: 2281:"Free-Libre / Open Source Software (FLOSS) is Commercial Software" 1335:
IBM's Unbundling Decision: Consequences for Users and the Industry
957: 645: 514:
grant exclusive rights to algorithms, software features, or other
433: 338: 299:
the legal characteristic of software changed also due to the U.S.
248: 244: 207: 683:, or human-readable version of the software, often written in a 417: 405: 401: 57: 3473: 3054: 1411:(Technical report). Cal Poly State University. CPSLO-CSC-04-02. 239:
Until the late 1960s, computers—especially large and expensive
1352: 780: 741: 522:
for a piece of proprietary software is routinely handled as a
365:
Traditionally, software was distributed in the form of binary
202: 172: 154: 2709:"Open Source, the only weapon against 'planned obsolescence'" 494:
A software vendor delineates the specific terms of use in an
2222:"Copyleft: Licensing Collaborative Works in the Digital Age" 712:
Some governments fear that proprietary software may include
390:, but pay-per-use SaaS models makes the software affordable. 30:"Non-free software" redirects here. Not to be confused with 2077:"Oracle Can't Stop Software License Resales, EU Court Says" 1033:). More examples of formerly closed-source software in the 2052:"Why the FSF gets copyright assignments from contributors" 1409:
Executable Code is Not the Proper Subject of Copyright Law
2744:. Technology Innovation Management Review. Archived from 1304:
Pugh, Emerson W. (2002). "Origins of Software Bundling".
1039:
List of commercial video games with available source code
2655:"What happens when a proprietary software company dies?" 1943:"Overreaching Provisions in Software License Agreements" 1001:
Some proprietary software is released by their owner at
2635:"Apple wins key battle against Psystar over Mac clones" 759:
the software. This is particularly common with certain
288:, was not clear until the 1983 appeals court ruling in 258:
lawsuits pending against it, led an industry change by
1067:
Proprietary software that comes for no cost is called
1035:
List of commercial software with available source code
687:. This scheme is often referred to as closed source. 667:
Vendors typically distribute proprietary software in
635:
disables features present in Windows XP Professional.
313:
In 1983, binary software became copyrightable in the
94: 3520:
Comparison of open-source and closed-source software
2430:"Attacking an Obfuscated Cipher by Injecting Faults" 1107:
Comparison of open-source and closed-source software
1025:. Some of those kinds are free-of-charge downloads ( 962:
United States Court of Appeals for the Ninth Circuit
858:
with other software, and may also communicate using
562:
The owner of proprietary software exercises certain
542:
Since license agreements do not override applicable
260:
starting to charge separately for mainframe software
27:
Software released under a license restricting rights
4026: 3960: 3888: 3758: 3735: 3697: 3573: 3507: 3409: 3354: 3296: 3245: 3153: 3088: 2678:"Microsoft Turns Up The Heat On Windows 2000 Users" 1901:"Frequently Asked Questions about the GNU Licenses" 948:
Software limited to certain hardware configurations
262:and services, by unbundling hardware and software. 2836: 2386:, Julian Borger and Glenn Greenwald (2013-09-06). 1772:sfn error: no target: CITEREFDempseyKelliher2018 ( 1753:sfn error: no target: CITEREFDempseyKelliher2018 ( 1734:sfn error: no target: CITEREFDempseyKelliher2018 ( 1715:sfn error: no target: CITEREFDempseyKelliher2018 ( 1677:sfn error: no target: CITEREFClohessy_et_al.2020 ( 502:), or by opening the box containing the software ( 1178:"Why Free Software's Long Run TCO must be lower" 333:Software license § Proprietary software licenses 2407:"How to remain secure against NSA surveillance" 1767: 1748: 1729: 1710: 1668: 2843:. Upper Saddle River: Prentice Hall. pp.  2580:"Apple Drops NDA for Released iPhone Software" 1578: 1576: 290:Apple Computer, Inc. v. Franklin Computer Corp 272:" in 1976 decried computer hobbyists' rampant 3485: 3066: 1976:. IFLA (2013-01-22). Retrieved on 2013-06-16. 420:, and others along with a purely proprietary 8: 3525:Comparison of source-code-hosting facilities 2608:The Linux Information Project (2006-04-29). 2511: 2509: 1787:Engelfriet, Arnoud (August–September 2006). 1055:Proprietary software is not synonymous with 1632:sfn error: no target: CITEREFTerasaki2013 ( 1613:sfn error: no target: CITEREFTerasaki2013 ( 829:Interoperability with software and hardware 3885: 3492: 3478: 3470: 3073: 3059: 3051: 2480:"Protect your JavaScript with obfuscation" 1883:"Categories of Free and Non-Free Software" 1854:Open Source: The Unauthorized White Papers 1029:), some are still commercially sold (e.g. 653:Inspection and modification of source code 306:Starting in February 1983 IBM adopted an " 2196:"Apple iWork '09 review: Apple iWork '09" 1148:. Saraswati House Pvt Ltd. p. 1.27. 1135: 1133: 1838:"Novell: We're a 'mixed-source' company" 1651:sfn error: no target: CITEREFBoyle2003 ( 1627: 1608: 1471:Cringely's interview with Brewster Kahle 2676:Livingston, Brian (December 15, 2006). 2337:Shankland, Stephen (January 30, 2003). 1819:"Managing mixed source software stacks" 1696:sfn error: no target: CITEREFWatt2023 ( 1559:"Impact of Apple vs. Franklin Decision" 1506:. Event occurs at 3:15. Archived from 1307:IEEE Annals of the History of Computing 1129: 190:proprietary software, no public license 1988:"Why Protect Software Through Patents" 1948:Richmond Journal of Law and Technology 1286:. Free Software Foundation. 2016-06-16 840:Proprietary file formats and protocols 623:Microsoft Office Home and Student 2007 276:of software, particularly Microsoft's 2516:Orenstein, David (January 10, 2000). 1646: 1349:"Chronological History of IBM: 1960s" 1267:time when they leased such equipment. 373:(SaaS) vendors—who have the majority 7: 4048:Microsoft Open Specification Promise 2790:development of the Myth game series. 2326:, Stanford Linear Accelerator Center 1691: 137: 3515:Alternative terms for free software 2707:Cassia, Fernando (March 28, 2007). 2518:"Application Programming Interface" 1922:"Free But Shackled - The Java Trap" 1795:(19). Gavin Stewart. Archived from 1793:Intellectual Asset Management (IAM) 1499:Corporate Open Source Anti-patterns 1407:Swann, Matthew (18 November 2004). 1337:. Programming Sciences Corporation. 944:, entrenching a monopoly position. 475:Most of the software is covered by 3855:Python Software Foundation License 2806:. Inside Mac Games. Archived from 2775:. Linux Dev Center. Archived from 2194:Parker, Jason (January 27, 2009). 1246:"The History of Equipment Leasing" 611:Use restrictions vary by license: 506:). License agreements are usually 449:, before it became free software. 75:; non-commercial licenses such as 25: 3918:Definition of Free Cultural Works 3535:Free software project directories 2923:Michael K. Johnson (1996-09-01). 2802:Largent, Andy (October 8, 2003). 2339:"Governments to see Windows code" 2307:. IBM. February 8, 1983. 283-016. 1569:from the original on Sep 8, 2023. 880:application programming interface 685:higher level programming language 4105: 4104: 4094: 3555:Open-source software development 3038: 2899:"What is "Commercial Software"?" 2804:"Homeworld Source Code Released" 2552:. March 24, 2004. Archived from 2172:Adobe Software License Agreement 1478:. 46 minutes in. Archived from 1385:Gates, Bill (February 3, 1976). 835:Interoperability § Software 331:This section is an excerpt from 71:, a term defined in contrast to 3913:Debian Free Software Guidelines 3745:Free Software Movement of India 3017:. Sams Publishing. October 2005 2991:"The Commercial Software Model" 2897:Russell McOrmond (2000-01-04). 2868:Havoc Pennington (2008-03-02). 2279:David A. Wheeler (2009-02-03). 1986:Daniel A. Tysver (2008-11-23). 1920:Richard Stallman (2004-04-12). 956:has such a licensing model for 807:Freely redistributable software 751:Software vendors sometimes use 704:and certain implementations of 2947:Eric S. Raymond (2003-12-29). 2740:Bell, John (October 1, 2009). 2360:Gao, Ken (February 28, 2003). 2318:Greg Mushial (July 20, 1983), 1188:(1). AUUG, Inc. 1. Definitions 1: 3903:Contributor License Agreement 3717:Open-source-software movement 3501:Free and open-source software 2771:Wen, Howard (June 10, 2004). 2424:Jacob, Matthias; Boneh, Dan; 2405:Bruce Schneier (2013-09-06). 1557:Hassett, Rob (Dec 18, 2012). 1422:Pamela Samuelson (Sep 1984), 1387:"An Open Letter to Hobbyists" 1210:A History of Modern Computing 675:understood by the computer's 73:free and open-source software 4074:The Cathedral and the Bazaar 3928:The Free Software Definition 2633:Don Reisinger (2011-09-29). 2362:"China to view Windows code" 1857:. Foster City: IDG. p.  1821:. LinuxWorld. Archived from 1528:Gallant, John (1985-03-18). 1333:Hamilton, Thomas W. (1969). 1280:"Overview of the GNU System" 1176:Brendan Scott (March 2003). 679:. They typically retain the 3978:Mozilla software rebranding 3943:Permissive software license 3356:Software release life cycle 2742:"Opening the Source of Art" 2610:"Vendor Lock-in Definition" 2075:White, Aoife (2012-07-03). 1817:Loftus, Jack (2007-02-19). 1768:Dempsey & Kelliher 2018 1749:Dempsey & Kelliher 2018 1730:Dempsey & Kelliher 2018 1711:Dempsey & Kelliher 2018 1583:Landley, Rob (2009-05-23). 347:software license issued by 193:private, internal software 4152: 3983:Proprietary device drivers 3933:The Open Source Definition 3424:Software protection dongle 3304:Unwanted software bundling 2997:. May 2001. Archived from 2578:Wilson, Ben (2008-10-01). 2478:Tony Patton (2008-11-21). 2444:Springer Berlin Heidelberg 2050:Eben Moglen (2005-02-12). 1941:Liberman, Michael (1995). 1851:Rosenberg, Donald (2000). 1078:of software. For example, 1048: 971: 968:Abandonment by proprietors 933: 843: 832: 804: 798: 755:to impede users who would 656: 573: 496:end-user license agreement 471:End-user license agreement 456: 330: 63:Proprietary software is a 29: 4090: 4068:Source-available software 3968:Digital rights management 3419:Digital rights management 2773:"Keeping the Myths Alive" 2657:. Linux. October 24, 2003 1836:Tan, Aaron (2006-12-28). 1789:"The best of both worlds" 1207:Ceruzzi, Paul E. (2003). 1146:COMPUTER SCIENCE WITH C++ 516:patentable subject matter 361:United States federal law 247:to customers rather than 197: 149: 104: 99: 85:source-available software 54:intellectual property law 4063:Shared Source Initiative 3860:Shared Source Initiative 3813:Free Software Foundation 3750:Free Software Foundation 3600:Configuration management 3297:Deceptive and/or illicit 2925:"Licenses and Copyright" 1897:Free Software Foundation 1102:Commercial off-the-shelf 1076:research and development 924:non-disclosure agreement 767:for programs written in 727:Shared Source Initiative 698:non-disclosure agreement 270:Open Letter to Hobbyists 254:In 1969, IBM, which had 3998:SCO/Linux controversies 3449:Software license server 2977:"Selling Free Software" 2220:Heffan, Ira V. (1997). 677:central processing unit 3898:Comparison of licenses 3707:Free software movement 3125:Freely redistributable 982:, the digital form of 918:Early versions of the 621:The retail edition of 424:and system utilities. 352: 274:copyright infringement 81:closed-source software 3973:License proliferation 3288:Software as a service 3082:Software distribution 2839:Open Source Licensing 2129:Microsoft Corporation 2095:Microsoft Corporation 1840:. CNET Networks, Inc. 1355:. n.d. Archived from 1045:Pricing and economics 934:Further information: 844:Further information: 833:Further information: 799:Further information: 761:programming languages 616:Windows Vista Starter 574:Further information: 504:shrink wrap licensing 457:Further information: 395:Mixed-source software 343:A brief, written-out 342: 301:Copyright Act of 1976 198:Other creative works 4131:Proprietary software 4058:Open-source hardware 3993:Proprietary software 3988:Proprietary firmware 3689:Formerly open-source 3684:Formerly proprietary 3550:Open-source software 3379:Software maintenance 3253:Digital distribution 3108:Free and open-source 3047:at Wikimedia Commons 3045:Proprietary software 2721:on November 22, 2012 2305:Announcement Letters 1284:GNU Operating System 1112:Proprietary hardware 988:planned obsolescence 850:Proprietary protocol 659:Open-source software 597:or serial number, a 584:Price discrimination 379:application software 129:(protective license) 42:Proprietary software 18:Proprietary Software 3938:Open-source license 3540:Gratis versus libre 3384:Software maintainer 3166:Commercial software 3154:Compensation models 2810:on October 12, 2013 2559:on October 28, 2008 2550:European Commission 2428:(30 October 2003). 2229:Stanford Law Review 1630:, pp. 469–470. 1140:Saraswati Experts. 1057:commercial software 1051:Commercial software 895:European Commission 777:scripting languages 763:. For example, the 570:Use of the software 552:first-sale doctrine 371:Software as service 241:mainframe computers 225:, no public license 139:Proprietary license 32:Commercial software 4136:Software licensing 3444:Software copyright 3434:Product activation 3389:Software publisher 3103:Floating licensing 1732:, pp. 48, 57. 1466:Robert X. Cringely 1005:as open-source or 922:were covered by a 846:Proprietary format 723:Chinese government 718:malicious features 671:form, usually the 591:product activation 479:which, along with 463:Software copyright 388:smaller businesses 353: 319:Apple vs. Franklin 282:software copyright 122:Permissive license 105:Non-free Licenses 101:Free/Open Licenses 4118: 4117: 4018:Trusted Computing 4008:Software security 3956: 3955: 3637:Operating systems 3545:Long-term support 3467: 3466: 3459:Torrent poisoning 3374:Long-term support 3198:Pay what you want 3043:Media related to 2870:"Debian Tutorial" 2854:978-0-13-148787-1 2748:on March 30, 2014 2490:on March 15, 2014 2453:978-3-540-44993-5 2026:10.1109/45.310923 1751:, pp. 61–63. 1675:, pp. 40–41. 1563:InternetLegal.com 1320:10.1109/85.988580 1256:on April 11, 2008 1213:. Cambridge, MA: 1155:978-93-5199-877-8 1097:Business software 821:sometimes called 284:, especially for 232: 231: 69:non-free software 36:Business software 16:(Redirected from 4143: 4108: 4107: 4098: 4003:Software patents 3886: 3798:Creative Commons 3657:Web applications 3494: 3487: 3480: 3471: 3273:Product bundling 3246:Delivery methods 3145:Source-available 3075: 3068: 3061: 3052: 3042: 3026: 3025: 3023: 3022: 3009: 3003: 3002: 2987: 2981: 2980: 2973: 2967: 2966: 2960: 2959: 2944: 2938: 2937: 2932: 2931: 2920: 2914: 2913: 2911: 2910: 2901:. Archived from 2894: 2888: 2887: 2882: 2881: 2872:. Archived from 2865: 2859: 2858: 2842: 2829: 2823: 2822: 2817: 2815: 2799: 2793: 2792: 2786: 2784: 2779:on April 6, 2013 2768: 2762: 2761: 2755: 2753: 2737: 2731: 2730: 2728: 2726: 2717:. Archived from 2704: 2698: 2697: 2695: 2693: 2684:. Archived from 2673: 2667: 2666: 2664: 2662: 2651: 2645: 2644: 2642: 2641: 2630: 2624: 2623: 2617: 2616: 2605: 2599: 2598: 2596: 2595: 2586:. Archived from 2575: 2569: 2568: 2566: 2564: 2558: 2547: 2539: 2533: 2532: 2530: 2528: 2513: 2504: 2503: 2497: 2495: 2486:. Archived from 2475: 2469: 2468: 2465:Internet Archive 2462: 2460: 2434:Feigenbaum, Joan 2421: 2415: 2414: 2402: 2396: 2395: 2380: 2374: 2373: 2371: 2369: 2357: 2351: 2350: 2348: 2346: 2334: 2328: 2327: 2324:SLAC VM NOTEBOOK 2315: 2309: 2308: 2297: 2291: 2290: 2288: 2287: 2276: 2270: 2269: 2264: 2263: 2257: 2251:. Archived from 2226: 2217: 2211: 2210: 2208: 2206: 2191: 2185: 2184: 2183: 2182: 2177: 2163: 2157: 2156: 2150: 2149: 2144:. p. Page 1 2137: 2125: 2119: 2118: 2116: 2115: 2110:. p. Page 3 2103: 2091: 2085: 2084: 2072: 2066: 2065: 2059: 2058: 2047: 2041: 2040: 2009: 2003: 2002: 1996: 1995: 1983: 1977: 1971: 1965: 1964: 1962: 1960: 1938: 1932: 1931: 1929: 1928: 1917: 1911: 1910: 1908: 1907: 1893: 1887: 1886: 1879: 1873: 1872: 1848: 1842: 1841: 1833: 1827: 1826: 1814: 1808: 1807: 1805: 1804: 1784: 1778: 1777: 1765: 1759: 1758: 1746: 1740: 1739: 1727: 1721: 1720: 1708: 1702: 1701: 1689: 1683: 1682: 1666: 1657: 1656: 1644: 1638: 1637: 1625: 1619: 1618: 1606: 1600: 1599: 1593: 1592: 1580: 1571: 1570: 1554: 1548: 1547: 1541: 1540: 1525: 1519: 1518: 1516: 1515: 1490: 1484: 1483: 1462: 1456: 1455: 1450:, archived from 1428:Duke Law Journal 1419: 1413: 1412: 1404: 1398: 1397: 1395: 1393: 1382: 1376: 1375: 1366: 1364: 1345: 1339: 1338: 1330: 1324: 1323: 1301: 1295: 1294: 1292: 1291: 1276: 1270: 1269: 1263: 1261: 1252:, archived from 1242: 1236: 1235: 1204: 1198: 1197: 1195: 1193: 1173: 1167: 1166: 1164: 1162: 1137: 1007:source available 998:-based systems. 884:software library 874:Proprietary APIs 787:is available at 757:reverse engineer 673:machine language 564:exclusive rights 558:Exclusive rights 512:Software patents 95: 21: 4151: 4150: 4146: 4145: 4144: 4142: 4141: 4140: 4121: 4120: 4119: 4114: 4086: 4053:Open-core model 4028: 4022: 3952: 3890: 3884: 3754: 3731: 3693: 3576: 3569: 3503: 3498: 3468: 3463: 3454:Software patent 3429:License manager 3411:Copy protection 3405: 3350: 3292: 3278:Retail software 3241: 3215:Open-core model 3171:Retail software 3149: 3084: 3079: 3035: 3030: 3029: 3020: 3018: 3011: 3010: 3006: 2989: 2988: 2984: 2975: 2974: 2970: 2957: 2955: 2946: 2945: 2941: 2929: 2927: 2922: 2921: 2917: 2908: 2906: 2896: 2895: 2891: 2879: 2877: 2867: 2866: 2862: 2855: 2833:Rosen, Lawrence 2831: 2830: 2826: 2813: 2811: 2801: 2800: 2796: 2782: 2780: 2770: 2769: 2765: 2751: 2749: 2739: 2738: 2734: 2724: 2722: 2706: 2705: 2701: 2691: 2689: 2675: 2674: 2670: 2660: 2658: 2653: 2652: 2648: 2639: 2637: 2632: 2631: 2627: 2614: 2612: 2607: 2606: 2602: 2593: 2591: 2577: 2576: 2572: 2562: 2560: 2556: 2545: 2541: 2540: 2536: 2526: 2524: 2515: 2514: 2507: 2493: 2491: 2477: 2476: 2472: 2458: 2456: 2454: 2423: 2422: 2418: 2404: 2403: 2399: 2382: 2381: 2377: 2367: 2365: 2359: 2358: 2354: 2344: 2342: 2336: 2335: 2331: 2317: 2316: 2312: 2299: 2298: 2294: 2285: 2283: 2278: 2277: 2273: 2261: 2259: 2255: 2241:10.2307/1229351 2224: 2219: 2218: 2214: 2204: 2202: 2193: 2192: 2188: 2180: 2178: 2175: 2165: 2164: 2160: 2147: 2145: 2135: 2127: 2126: 2122: 2113: 2111: 2101: 2093: 2092: 2088: 2074: 2073: 2069: 2056: 2054: 2049: 2048: 2044: 2014:IEEE Potentials 2011: 2010: 2006: 1993: 1991: 1985: 1984: 1980: 1972: 1968: 1958: 1956: 1940: 1939: 1935: 1926: 1924: 1919: 1918: 1914: 1905: 1903: 1895: 1894: 1890: 1881: 1880: 1876: 1869: 1850: 1849: 1845: 1835: 1834: 1830: 1816: 1815: 1811: 1802: 1800: 1786: 1785: 1781: 1771: 1766: 1762: 1752: 1747: 1743: 1733: 1728: 1724: 1714: 1709: 1705: 1695: 1690: 1686: 1676: 1667: 1660: 1650: 1645: 1641: 1631: 1626: 1622: 1612: 1607: 1603: 1590: 1588: 1582: 1581: 1574: 1556: 1555: 1551: 1538: 1536: 1527: 1526: 1522: 1513: 1511: 1494:Cantrill, Bryan 1492: 1491: 1487: 1464: 1463: 1459: 1440:10.2307/1372418 1421: 1420: 1416: 1406: 1405: 1401: 1391: 1389: 1384: 1383: 1379: 1362: 1360: 1359:on July 3, 2016 1347: 1346: 1342: 1332: 1331: 1327: 1303: 1302: 1298: 1289: 1287: 1278: 1277: 1273: 1259: 1257: 1244: 1243: 1239: 1229: 1206: 1205: 1201: 1191: 1189: 1175: 1174: 1170: 1160: 1158: 1156: 1139: 1138: 1131: 1126: 1121: 1117:Retail software 1092: 1053: 1047: 992:provide support 976: 970: 950: 938: 932: 876: 852: 842: 837: 831: 809: 803: 797: 753:obfuscated code 665: 655: 638:Traditionally, 603:copy protection 586: 576:Copy protection 572: 560: 540: 473: 467:Software patent 455: 430: 428:Multi-licensing 414:X Window System 397: 392: 391: 336: 328: 317:as well by the 237: 93: 39: 28: 23: 22: 15: 12: 11: 5: 4149: 4147: 4139: 4138: 4133: 4123: 4122: 4116: 4115: 4113: 4112: 4102: 4091: 4088: 4087: 4085: 4084: 4077: 4070: 4065: 4060: 4055: 4050: 4045: 4038: 4032: 4030: 4024: 4023: 4021: 4020: 4015: 4010: 4005: 4000: 3995: 3990: 3985: 3980: 3975: 3970: 3964: 3962: 3958: 3957: 3954: 3953: 3951: 3950: 3945: 3940: 3935: 3930: 3925: 3920: 3915: 3910: 3905: 3900: 3894: 3892: 3883: 3882: 3877: 3872: 3867: 3862: 3857: 3852: 3847: 3842: 3837: 3832: 3831: 3830: 3825: 3820: 3810: 3805: 3800: 3795: 3790: 3785: 3780: 3775: 3770: 3764: 3762: 3756: 3755: 3753: 3752: 3747: 3741: 3739: 3733: 3732: 3730: 3729: 3724: 3719: 3714: 3709: 3703: 3701: 3695: 3694: 3692: 3691: 3686: 3681: 3676: 3671: 3666: 3665: 3664: 3654: 3649: 3644: 3639: 3634: 3629: 3624: 3619: 3618: 3617: 3612: 3602: 3597: 3592: 3590:Bioinformatics 3587: 3581: 3579: 3571: 3570: 3568: 3567: 3562: 3557: 3552: 3547: 3542: 3537: 3532: 3527: 3522: 3517: 3511: 3509: 3505: 3504: 3499: 3497: 3496: 3489: 3482: 3474: 3465: 3464: 3462: 3461: 3456: 3451: 3446: 3441: 3436: 3431: 3426: 3421: 3415: 3413: 3407: 3406: 3404: 3403: 3402: 3401: 3391: 3386: 3381: 3376: 3371: 3366: 3360: 3358: 3352: 3351: 3349: 3348: 3343: 3338: 3337: 3336: 3331: 3326: 3321: 3316: 3306: 3300: 3298: 3294: 3293: 3291: 3290: 3285: 3280: 3275: 3270: 3265: 3260: 3255: 3249: 3247: 3243: 3242: 3240: 3239: 3234: 3233: 3232: 3222: 3217: 3212: 3211: 3210: 3205: 3195: 3190: 3185: 3180: 3175: 3174: 3173: 3163: 3157: 3155: 3151: 3150: 3148: 3147: 3142: 3137: 3132: 3127: 3122: 3121: 3120: 3115: 3105: 3100: 3094: 3092: 3086: 3085: 3080: 3078: 3077: 3070: 3063: 3055: 3049: 3048: 3034: 3033:External links 3031: 3028: 3027: 3004: 3001:on 2007-03-05. 2982: 2979:. GNU Project. 2968: 2953:, Jargon File" 2939: 2915: 2889: 2860: 2853: 2824: 2794: 2763: 2732: 2699: 2688:on May 3, 2022 2668: 2646: 2625: 2600: 2570: 2534: 2505: 2470: 2452: 2446:. p. 17. 2426:Felten, Edward 2416: 2397: 2375: 2352: 2329: 2310: 2292: 2271: 2212: 2186: 2158: 2131:(2005-04-01). 2120: 2097:(2005-04-01). 2086: 2067: 2042: 2004: 1978: 1966: 1933: 1912: 1899:(2009-05-05). 1888: 1885:. GNU Project. 1874: 1867: 1843: 1828: 1825:on 2010-06-03. 1809: 1779: 1760: 1741: 1722: 1703: 1684: 1658: 1639: 1620: 1611:, p. 469. 1601: 1585:"May 23, 2009" 1572: 1549: 1520: 1496:(2014-09-17). 1485: 1482:on 2019-01-18. 1457: 1454:on Aug 4, 2017 1434:(4): 663–769, 1414: 1399: 1377: 1340: 1325: 1296: 1271: 1237: 1227: 1199: 1168: 1154: 1128: 1127: 1125: 1122: 1120: 1119: 1114: 1109: 1104: 1099: 1093: 1091: 1088: 1046: 1043: 984:orphaned works 972:Main article: 969: 966: 949: 946: 942:vendor lock-in 936:Vendor lock-in 931: 930:Vendor lock-in 928: 916: 915: 888:vendor lock-in 878:A proprietary 875: 872: 866:or subject to 841: 838: 830: 827: 796: 795:Redistribution 793: 771:can be easily 738:Edward Snowden 731:made available 654: 651: 650: 649: 643: 636: 626: 619: 571: 568: 559: 556: 539: 536: 508:not negotiable 454: 451: 442:dual-licensing 429: 426: 396: 393: 337: 329: 327: 324: 297:Brewster Kahle 236: 233: 230: 229: 226: 220: 215: 210: 205: 199: 195: 194: 191: 188: 179: 170: 157: 151: 147: 146: 141: 136: 130: 124: 119: 110: 107: 106: 103: 98: 92: 89: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 4148: 4137: 4134: 4132: 4129: 4128: 4126: 4111: 4103: 4101: 4097: 4093: 4092: 4089: 4083: 4082: 4081:Revolution OS 4078: 4076: 4075: 4071: 4069: 4066: 4064: 4061: 4059: 4056: 4054: 4051: 4049: 4046: 4044: 4043: 4042:GNU Manifesto 4039: 4037: 4034: 4033: 4031: 4025: 4019: 4016: 4014: 4011: 4009: 4006: 4004: 4001: 3999: 3996: 3994: 3991: 3989: 3986: 3984: 3981: 3979: 3976: 3974: 3971: 3969: 3966: 3965: 3963: 3959: 3949: 3948:Public domain 3946: 3944: 3941: 3939: 3936: 3934: 3931: 3929: 3926: 3924: 3921: 3919: 3916: 3914: 3911: 3909: 3906: 3904: 3901: 3899: 3896: 3895: 3893: 3887: 3881: 3878: 3876: 3873: 3871: 3868: 3866: 3863: 3861: 3858: 3856: 3853: 3851: 3848: 3846: 3843: 3841: 3838: 3836: 3833: 3829: 3826: 3824: 3821: 3819: 3816: 3815: 3814: 3811: 3809: 3806: 3804: 3801: 3799: 3796: 3794: 3791: 3789: 3786: 3784: 3781: 3779: 3776: 3774: 3771: 3769: 3766: 3765: 3763: 3761: 3757: 3751: 3748: 3746: 3743: 3742: 3740: 3738: 3737:Organisations 3734: 3728: 3725: 3723: 3720: 3718: 3715: 3713: 3710: 3708: 3705: 3704: 3702: 3700: 3696: 3690: 3687: 3685: 3682: 3680: 3677: 3675: 3672: 3670: 3667: 3663: 3660: 3659: 3658: 3655: 3653: 3650: 3648: 3645: 3643: 3640: 3638: 3635: 3633: 3632:Office suites 3630: 3628: 3625: 3623: 3620: 3616: 3613: 3611: 3608: 3607: 3606: 3603: 3601: 3598: 3596: 3593: 3591: 3588: 3586: 3583: 3582: 3580: 3578: 3572: 3566: 3563: 3561: 3558: 3556: 3553: 3551: 3548: 3546: 3543: 3541: 3538: 3536: 3533: 3531: 3530:Free software 3528: 3526: 3523: 3521: 3518: 3516: 3513: 3512: 3510: 3506: 3502: 3495: 3490: 3488: 3483: 3481: 3476: 3475: 3472: 3460: 3457: 3455: 3452: 3450: 3447: 3445: 3442: 3440: 3437: 3435: 3432: 3430: 3427: 3425: 3422: 3420: 3417: 3416: 3414: 3412: 3408: 3400: 3397: 3396: 3395: 3392: 3390: 3387: 3385: 3382: 3380: 3377: 3375: 3372: 3370: 3367: 3365: 3362: 3361: 3359: 3357: 3353: 3347: 3344: 3342: 3339: 3335: 3332: 3330: 3327: 3325: 3322: 3320: 3317: 3315: 3312: 3311: 3310: 3307: 3305: 3302: 3301: 3299: 3295: 3289: 3286: 3284: 3281: 3279: 3276: 3274: 3271: 3269: 3268:Pre-installed 3266: 3264: 3261: 3259: 3256: 3254: 3251: 3250: 3248: 3244: 3238: 3235: 3231: 3228: 3227: 3226: 3223: 3221: 3218: 3216: 3213: 3209: 3206: 3204: 3201: 3200: 3199: 3196: 3194: 3191: 3189: 3186: 3184: 3181: 3179: 3176: 3172: 3169: 3168: 3167: 3164: 3162: 3159: 3158: 3156: 3152: 3146: 3143: 3141: 3140:Public domain 3138: 3136: 3133: 3131: 3128: 3126: 3123: 3119: 3116: 3114: 3111: 3110: 3109: 3106: 3104: 3101: 3099: 3096: 3095: 3093: 3091: 3087: 3083: 3076: 3071: 3069: 3064: 3062: 3057: 3056: 3053: 3046: 3041: 3037: 3036: 3032: 3016: 3015: 3008: 3005: 3000: 2996: 2992: 2986: 2983: 2978: 2972: 2969: 2965: 2954: 2952: 2943: 2940: 2936: 2926: 2919: 2916: 2905:on 2012-10-04 2904: 2900: 2893: 2890: 2886: 2876:on 2018-01-29 2875: 2871: 2864: 2861: 2856: 2850: 2846: 2841: 2840: 2834: 2828: 2825: 2821: 2809: 2805: 2798: 2795: 2791: 2778: 2774: 2767: 2764: 2760: 2747: 2743: 2736: 2733: 2720: 2716: 2715: 2710: 2703: 2700: 2687: 2683: 2679: 2672: 2669: 2656: 2650: 2647: 2636: 2629: 2626: 2622: 2611: 2604: 2601: 2590:on 2013-03-08 2589: 2585: 2581: 2574: 2571: 2555: 2551: 2544: 2538: 2535: 2523: 2522:Computerworld 2519: 2512: 2510: 2506: 2502: 2489: 2485: 2481: 2474: 2471: 2466: 2455: 2449: 2445: 2441: 2440: 2435: 2431: 2427: 2420: 2417: 2412: 2408: 2401: 2398: 2393: 2389: 2385: 2379: 2376: 2363: 2356: 2353: 2340: 2333: 2330: 2325: 2321: 2314: 2311: 2306: 2302: 2296: 2293: 2282: 2275: 2272: 2268: 2258:on 2013-05-14 2254: 2250: 2246: 2242: 2238: 2234: 2230: 2223: 2216: 2213: 2201: 2197: 2190: 2187: 2174: 2173: 2168: 2167:Adobe Systems 2162: 2159: 2155: 2143: 2142: 2134: 2130: 2124: 2121: 2109: 2108: 2100: 2096: 2090: 2087: 2082: 2078: 2071: 2068: 2064: 2053: 2046: 2043: 2039: 2035: 2031: 2027: 2023: 2019: 2015: 2008: 2005: 2001: 1989: 1982: 1979: 1975: 1970: 1967: 1954: 1950: 1949: 1944: 1937: 1934: 1923: 1916: 1913: 1902: 1898: 1892: 1889: 1884: 1878: 1875: 1870: 1868:0-7645-4660-0 1864: 1860: 1856: 1855: 1847: 1844: 1839: 1832: 1829: 1824: 1820: 1813: 1810: 1799:on 2013-09-14 1798: 1794: 1790: 1783: 1780: 1775: 1769: 1764: 1761: 1756: 1750: 1745: 1742: 1737: 1731: 1726: 1723: 1718: 1713:, p. 48. 1712: 1707: 1704: 1699: 1693: 1688: 1685: 1680: 1674: 1672: 1665: 1663: 1659: 1654: 1649:, p. 45. 1648: 1643: 1640: 1635: 1629: 1628:Terasaki 2013 1624: 1621: 1616: 1610: 1609:Terasaki 2013 1605: 1602: 1598: 1587:. landley.net 1586: 1579: 1577: 1573: 1568: 1564: 1560: 1553: 1550: 1546: 1535: 1534:Computerworld 1531: 1524: 1521: 1510:on 2021-10-27 1509: 1505: 1501: 1500: 1495: 1489: 1486: 1481: 1477: 1473: 1472: 1467: 1461: 1458: 1453: 1449: 1445: 1441: 1437: 1433: 1429: 1425: 1418: 1415: 1410: 1403: 1400: 1388: 1381: 1378: 1374: 1372: 1358: 1354: 1350: 1344: 1341: 1336: 1329: 1326: 1321: 1317: 1313: 1309: 1308: 1300: 1297: 1285: 1281: 1275: 1272: 1268: 1255: 1251: 1247: 1241: 1238: 1234: 1230: 1228:0-262-53203-4 1224: 1220: 1216: 1212: 1211: 1203: 1200: 1187: 1183: 1179: 1172: 1169: 1157: 1151: 1147: 1143: 1136: 1134: 1130: 1123: 1118: 1115: 1113: 1110: 1108: 1105: 1103: 1100: 1098: 1095: 1094: 1089: 1087: 1083: 1081: 1077: 1072: 1070: 1065: 1062: 1061:free software 1058: 1052: 1044: 1042: 1040: 1036: 1032: 1028: 1024: 1020: 1016: 1012: 1008: 1004: 999: 997: 993: 989: 985: 981: 975: 967: 965: 963: 959: 955: 947: 945: 943: 937: 929: 927: 925: 921: 912: 908: 907: 906: 904: 900: 896: 891: 889: 885: 881: 873: 871: 869: 865: 864:trade secrets 861: 857: 851: 847: 839: 836: 828: 826: 824: 819: 815: 812: 808: 802: 794: 792: 790: 786: 782: 778: 774: 770: 766: 762: 758: 754: 749: 747: 743: 739: 734: 732: 728: 724: 719: 715: 710: 707: 703: 699: 694: 688: 686: 682: 678: 674: 670: 664: 660: 652: 647: 644: 641: 637: 634: 630: 627: 624: 620: 617: 614: 613: 612: 609: 606: 604: 600: 596: 592: 585: 581: 577: 569: 567: 565: 557: 555: 553: 549: 545: 544:copyright law 537: 535: 533: 529: 525: 521: 517: 513: 509: 505: 501: 497: 492: 490: 489:trade secrets 486: 482: 478: 472: 468: 464: 460: 452: 450: 448: 443: 439: 435: 427: 425: 423: 419: 415: 411: 407: 403: 394: 389: 384: 380: 376: 372: 368: 364: 362: 358: 350: 346: 341: 334: 325: 323: 320: 316: 315:United States 311: 309: 304: 302: 298: 295:According to 293: 291: 287: 283: 279: 275: 271: 267: 263: 261: 257: 252: 250: 246: 242: 234: 227: 224: 221: 219: 216: 214: 211: 209: 206: 204: 200: 196: 192: 189: 187: 183: 180: 178: 174: 171: 169: 165: 161: 158: 156: 152: 148: 145: 142: 140: 134: 133:Noncommercial 131: 128: 125: 123: 120: 118: 114: 113:Public domain 111: 109: 108: 102: 97: 96: 90: 88: 86: 82: 78: 74: 70: 66: 61: 59: 55: 51: 47: 43: 37: 33: 19: 4079: 4072: 4040: 3992: 3923:Free license 3669:Android apps 3329:Trojan horse 3258:File sharing 3220:Postcardware 3208:Donationware 3183:Crowdfunding 3134: 3130:License-free 3019:. Retrieved 3013: 3007: 2999:the original 2985: 2971: 2962: 2956:. Retrieved 2950: 2942: 2934: 2928:. Retrieved 2918: 2907:. Retrieved 2903:the original 2892: 2884: 2878:. Retrieved 2874:the original 2863: 2847:, 255, 259. 2838: 2827: 2819: 2814:November 24, 2812:. Retrieved 2808:the original 2797: 2788: 2783:December 22, 2781:. Retrieved 2777:the original 2766: 2757: 2750:. Retrieved 2746:the original 2735: 2723:. Retrieved 2719:the original 2714:The Inquirer 2712: 2702: 2690:. Retrieved 2686:the original 2681: 2671: 2659:. Retrieved 2649: 2638:. Retrieved 2628: 2619: 2613:. Retrieved 2603: 2592:. Retrieved 2588:the original 2583: 2573: 2561:. Retrieved 2554:the original 2537: 2525:. Retrieved 2521: 2499: 2492:. Retrieved 2488:the original 2484:TechRepublic 2483: 2473: 2463:– via 2457:. Retrieved 2438: 2419: 2411:The Guardian 2410: 2400: 2392:The Guardian 2391: 2378: 2366:. Retrieved 2355: 2343:. Retrieved 2332: 2323: 2313: 2304: 2295: 2284:. Retrieved 2274: 2266: 2260:. Retrieved 2253:the original 2232: 2228: 2215: 2203:. Retrieved 2199: 2189: 2179:, retrieved 2171: 2161: 2152: 2146:. Retrieved 2139: 2123: 2112:. Retrieved 2105: 2089: 2080: 2070: 2061: 2055:. Retrieved 2045: 2037: 2017: 2013: 2007: 1998: 1992:. Retrieved 1981: 1969: 1959:November 29, 1957:. Retrieved 1952: 1946: 1936: 1925:. Retrieved 1915: 1904:. Retrieved 1891: 1877: 1853: 1846: 1831: 1823:the original 1812: 1801:. Retrieved 1797:the original 1792: 1782: 1770:, p. 2. 1763: 1744: 1725: 1706: 1694:, p. 4. 1687: 1670: 1642: 1623: 1604: 1595: 1589:. Retrieved 1562: 1552: 1543: 1537:. Retrieved 1523: 1512:. Retrieved 1508:the original 1503: 1498: 1488: 1480:the original 1475: 1470: 1460: 1452:the original 1431: 1427: 1417: 1408: 1402: 1390:. Retrieved 1380: 1371:'unbundled' 1370: 1368: 1361:. Retrieved 1357:the original 1343: 1334: 1328: 1314:(1): 57–58. 1311: 1305: 1299: 1288:. Retrieved 1283: 1274: 1265: 1260:November 12, 1258:, retrieved 1254:the original 1249: 1240: 1232: 1209: 1202: 1190:. Retrieved 1185: 1181: 1171: 1159:. Retrieved 1145: 1084: 1073: 1066: 1054: 1000: 977: 951: 941: 939: 917: 892: 877: 856:incompatible 853: 816: 813: 810: 750: 735: 711: 706:Secure Shell 689: 666: 633:Home Edition 610: 607: 599:hardware key 587: 561: 548:contract law 541: 524:trade secret 493: 481:contract law 474: 459:Software law 431: 398: 375:market share 354: 312: 305: 294: 278:Altair BASIC 264: 253: 238: 228:unpublished 144:Trade secret 80: 68: 62: 41: 40: 4013:Tivoization 3652:Video games 3627:Mathematics 3439:Product key 3369:End-of-life 3364:Abandonware 3314:Infostealer 3263:On-premises 3178:Crippleware 3135:Proprietary 3118:Open source 2951:Proprietary 2235:(6): 1490. 1250:Lease Genie 1031:Arx Fatalis 1023:open source 1019:id Software 1011:abandonware 1003:end-of-life 980:abandonware 974:Abandonware 911:Windows API 882:(API) is a 823:crippleware 681:source code 663:Crippleware 595:product key 580:Crippleware 538:Limitations 532:open-source 520:source code 453:Legal basis 367:object code 308:object-code 286:object code 117:equivalents 4125:Categories 3961:Challenges 3679:Commercial 3662:E-commerce 3647:Television 3346:Shovelware 3319:Ransomware 3283:Sneakernet 3021:2022-05-02 2958:2009-06-12 2930:2009-06-16 2909:2009-05-02 2880:2009-06-04 2640:2022-05-02 2615:2009-06-11 2594:2022-05-02 2459:12 January 2384:James Ball 2286:2009-06-03 2262:2009-07-27 2181:2010-06-09 2148:2009-04-29 2114:2009-04-29 2057:2017-05-01 1994:2009-06-03 1927:2017-05-01 1906:2017-05-01 1803:2008-05-19 1647:Boyle 2003 1591:2024-06-22 1539:2015-12-27 1514:2015-12-26 1290:2017-05-01 1217:. p.  1124:References 1049:See also: 920:iPhone SDK 903:Bill Gates 805:See also: 785:JavaScript 773:decompiled 657:See also: 629:Windows XP 349:Macromedia 266:Bill Gates 3891:standards 3889:Types and 3870:Unlicense 3865:Sleepycat 3699:Community 3394:Vaporware 3341:Scareware 3237:Trialware 3225:Shareware 2995:Microsoft 2964:freeware. 2725:August 2, 2501:scenario. 2141:Microsoft 2107:Microsoft 2081:Bloomberg 2020:(3): 20. 1692:Watt 2023 1669:Clohessy 1215:MIT Press 1080:Microsoft 1015:3D Realms 860:protocols 818:Shareware 801:Shareware 746:backdoors 693:vBulletin 646:iWork '09 500:clickwrap 477:copyright 345:beta test 256:antitrust 223:Copyright 150:Software 50:copyright 4110:Category 4027:Related 3908:Copyleft 3828:GNU LGPL 3823:GNU AGPL 3788:Beerware 3783:Artistic 3760:Licenses 3727:Advocacy 3674:iOS apps 3615:Wireless 3610:Graphics 3577:packages 3575:Software 3565:Timeline 3203:Careware 3193:Freeware 3188:Freemium 3098:Beerware 3090:Licenses 2835:(2004). 2563:June 17, 2063:license. 2034:19873766 1990:. Bitlaw 1567:Archived 1090:See also 1069:freeware 1027:freeware 914:instead. 789:run time 779:such as 765:bytecode 669:compiled 438:Sendmail 410:Sendmail 383:freemium 326:Licenses 218:CC BY-NC 213:CC BY-SA 127:Copyleft 77:CC BY-NC 46:software 4036:Forking 3818:GNU GPL 3712:History 3642:Routing 3605:Drivers 3560:Outline 3508:General 3324:Spyware 3309:Malware 3230:Nagware 2436:(ed.). 2249:1229351 1504:YouTube 1476:YouTube 1448:1372418 1392:May 28, 1363:May 28, 1192:29 June 1161:29 June 1142:"2.5.3" 868:patents 714:defects 485:patents 351:in 1995 135:license 4100:Portal 4029:topics 3850:Python 3773:Apache 3722:Events 3622:Health 3595:Codecs 3161:Adware 2851:  2752:May 2, 2692:May 2, 2661:May 2, 2527:May 2, 2494:May 2, 2450:  2368:May 2, 2364:. CNET 2345:May 2, 2341:. CNET 2247:  2205:May 2, 2032:  1865:  1671:et al. 1446:  1225:  1152:  740:, the 582:, and 530:" or " 487:, and 469:, and 422:kernel 245:leased 235:Origin 168:Apache 115:& 65:subset 3875:WTFPL 3585:Audio 2557:(PDF) 2546:(PDF) 2432:. In 2256:(PDF) 2245:JSTOR 2225:(PDF) 2176:(PDF) 2136:(PDF) 2102:(PDF) 2030:S2CID 1444:JSTOR 1182:AUUGN 958:macOS 954:Apple 640:Adobe 601:, or 434:MySQL 357:clear 208:CC BY 91:Types 3880:zlib 3803:CDDL 3778:APSL 3399:list 3334:Worm 3113:Free 2849:ISBN 2816:2012 2785:2012 2754:2022 2727:2012 2694:2022 2663:2022 2584:CNET 2565:2009 2529:2022 2496:2022 2461:2024 2448:ISBN 2370:2022 2347:2022 2207:2022 2200:CNET 1961:2011 1863:ISBN 1774:help 1755:help 1736:help 1717:help 1698:help 1679:help 1673:2020 1653:help 1634:help 1615:help 1432:1984 1394:2016 1365:2016 1262:2010 1223:ISBN 1194:2017 1163:2017 1150:ISBN 1037:and 1017:and 996:FOSS 909:The 893:The 848:and 769:Java 702:Pine 661:and 593:, a 528:free 447:Java 418:DHCP 406:BIND 402:UNIX 249:sold 201:PD, 186:AFPL 177:AGPL 153:PD, 58:EULA 52:and 3845:MPL 3840:MIT 3835:ISC 3808:EPL 3793:BSD 3768:AFL 2682:CRN 2237:doi 2022:doi 1955:: 4 1859:109 1436:doi 1353:IBM 1316:doi 1219:128 899:C++ 783:or 781:PHP 742:NSA 716:or 546:or 534:." 377:in 268:' " 203:CC0 182:JRL 173:GPL 164:MIT 160:BSD 155:CC0 83:or 67:of 44:is 34:or 4127:: 2993:. 2961:. 2933:. 2883:. 2845:52 2818:. 2787:. 2756:. 2711:. 2680:. 2618:. 2582:. 2548:. 2520:. 2508:^ 2498:. 2482:. 2409:. 2390:. 2322:, 2303:. 2265:. 2243:. 2233:49 2231:. 2227:. 2198:. 2169:, 2151:. 2138:. 2104:. 2079:. 2060:. 2036:. 2028:. 2018:13 2016:. 1997:. 1951:. 1945:. 1861:. 1791:. 1661:^ 1594:. 1575:^ 1565:. 1561:. 1542:. 1532:. 1502:. 1474:. 1468:. 1442:, 1430:, 1426:, 1367:. 1351:. 1312:24 1310:. 1282:. 1264:, 1248:, 1231:. 1221:. 1186:24 1184:. 1180:. 1144:. 1132:^ 1071:. 1041:. 1013:. 964:. 905:: 870:. 825:. 791:. 748:. 733:. 605:. 578:, 554:. 510:. 483:, 465:, 461:, 436:, 416:, 412:, 408:, 303:. 292:. 184:, 175:, 166:, 162:, 87:. 3493:e 3486:t 3479:v 3074:e 3067:t 3060:v 3024:. 2949:" 2912:. 2857:. 2729:. 2696:. 2665:. 2643:. 2597:. 2567:. 2531:. 2467:. 2413:. 2394:. 2372:. 2349:. 2289:. 2239:: 2209:. 2117:. 2083:. 2024:: 1963:. 1953:1 1930:. 1909:. 1871:. 1806:. 1776:) 1757:) 1738:) 1719:) 1700:) 1681:) 1655:) 1636:) 1617:) 1517:. 1438:: 1396:. 1322:. 1318:: 1293:. 1196:. 1165:. 335:. 38:. 20:)

Index

Proprietary Software
Commercial software
Business software
software
copyright
intellectual property law
EULA
subset
free and open-source software
CC BY-NC
source-available software
Free/Open Licenses
Public domain
equivalents
Permissive license
Copyleft
Noncommercial
Proprietary license
Trade secret
CC0
BSD
MIT
Apache
GPL
AGPL
JRL
AFPL
CC0
CC BY
CC BY-SA

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.