251:. Service and all software available were usually supplied by manufacturers without separate charge until 1969. Computer vendors usually provided the source code for installed software to customers. Customers who developed software often made it available to the public without charge. Closed source means computer programs whose source code is not published except to licensees. It is available to be modified only by the organization that developed it and those licensed to use the software.
340:
986:. If the proprietor of a software package should cease to exist, or decide to cease or limit production or support for a proprietary software package, recipients and users of the package may have no recourse if problems are found with the software. Proprietors can fail to improve and support software because of business problems. Support for older or existing versions of a software package may be ended to force users to upgrade and pay for newer versions(
4106:
4096:
3040:
2621:
organization to avoid becoming a victim of vendor lock-in is to use products that conform to free, industry-wide standards. Free standards are those that can be used by anyone and are not controlled by a single company. In the case of computers, this can usually be accomplished by using free software rather than proprietary software (i.e., commercial software).
444:
to allow themselves or others to redistribute proprietary versions. Non-copyleft free software (i.e. software distributed under a permissive free software license or released to the public domain) allows anyone to make proprietary redistributions. Free software that depends on proprietary software is
2758:
that no further patches to the title would be forthcoming. The community was predictably upset. Instead of giving up on the game, users decided that if
Activision wasn't going to fix the bugs, they would. They wanted to save the game by getting Activision to open the source so it could be kept alive
2153:
You may install, use, access, display and run one copy of the
Software on a single computer, such as a workstation, terminal or another device ("Workstation Computer"). The Software may not be used by more than two (2) processors at any one time on any single Workstation Computer. ... You may permit
1596:
So if open source used to be the norm back in the 1960's and 70's, how did this _change_? Where did proprietary software come from, and when, and how? How did
Richard Stallman's little utopia at the MIT AI lab crumble and force him out into the wilderness to try to rebuild it? Two things changed in
1544:
While IBM's policy of withholding source code for selected software products has already marked its second anniversary, users are only now beginning to cope with the impact of that decision. But whether or not the advent of object-code-only products has affected their day-to-day DP operations, some
2620:
Vendor lock-in, or just lock-in, is the situation in which customers are dependent on a single manufacturer or supplier for some product This dependency is typically a result of standards that are controlled by the vendor It can grant the vendor some extent of monopoly power The best way for an
1266:
In the 1960s, IBM and Xerox recognized that substantial sums could be made from the financing of their equipment. The leasing of computer and office equipment that occurred then was a significant contribution to leasings growth, since many companies were exposed to equipment leasing for the first
2789:
fans of the Myth trilogy have taken this idea a step further: they have official access to the source code for the Myth games. Organized under the name MythDevelopers, this all-volunteer group of programmers, artists, and other talented people devote their time to improving and supporting further
2154:
a maximum of ten (10) computers or other electronic devices (each a 'Device') to connect to the
Workstation Computer to utilize one or more of the following services of the Software: File Services, Print Services, Internet Information Services, Internet Connection Sharing and telephony services.
1063:
can be distributed at no cost or for a fee. The difference is that whether proprietary software can be distributed, and what the fee would be, is at the proprietor's discretion. With free software, anyone who has a copy can decide whether, and how much, to charge for a copy or related services.
1999:
In connection with the software, an issued patent may prevent others from utilizing a certain algorithm (such as the GIF image compression algorithm) without permission, or may prevent others from creating software programs that perform a function in a certain way. In connection with computer
820:
is closed-source software whose owner encourages redistribution at no cost, but which the user sometimes must pay to use after a trial period. The fee usually allows use by a single user or computer. In some cases, software features are restricted during or after the trial period, a practice
385:
are also used. For customers, the advantages of temporary licenses include reduced upfront cost, increased flexibility, and lower overall cost compared to a perpetual license. In some cases, the steep one-time cost demanded by sellers of traditional software were out of the reach of
708:
are distributed with proprietary licenses that make the source code available.Some licenses for proprietary software allow distributing changes to the source code, but only to others licensed for the product, and some of those modifications are eventually picked up by the vendor.
321:
law decision, before which only source code was copyrightable. Additionally, the growing availability of millions of computers based on the same microprocessor architecture created for the first time an unfragmented and big enough market for binary distributed software.
1597:
the early 80's: the exponentially growing installed base of microcomputer hardware reached critical mass around 1980, and a legal decision altered copyright law to cover binaries in 1983. Increasing volume: The microprocessor creates millions of identical computers
2759:
beyond the point where
Activision lost interest. With some help from members of the development team that were active on fan forums, they were eventually able to convince Activision to release Call to Power II's source code in October of 2003.
690:
While most proprietary software is distributed without the source code, some vendors distribute the source code or otherwise make it available to customers. For example, users who have purchased a license for the
Internet forum software
2500:
While the Web promotes the sharing of such code, there are times when you or a client may not want to share their JavaScript code. This may be due to the sensitive nature of data within the code, proprietary calculations, or any other
1085:
Proprietary software generally creates greater commercial activity over free software, especially in regard to market revenues. Proprietary software is often sold with a license that gives the end user right to use the software.
913:
is so broad, so deep, and so functional that most ISVs would be crazy not to use it. And it is so deeply embedded in the source code of many
Windows apps that there is a huge switching cost to using a different operating system
588:
Vendors typically limit the number of computers on which software can be used, and prohibit the user from installing the software on extra computers. Restricted use is sometimes enforced through a technical measure, such as
363:, a company can restrict the parties to which it sells but it cannot prevent a buyer from reselling the product. Software licensing agreements usually prohibit resale, enabling the company to maximize revenue.
2062:
Under US copyright law, which is the law under which most free software programs have historically been first published, only the copyright holder or someone having assignment of the copyright can enforce the
695:
can modify the source for their own site but cannot redistribute it. This is true for many web applications, which must be in source code form when being run by a web server. The source code is covered by a
2963:
Proprietary software should be distinguished from commercial software. It is possible for the software to be commercial without being proprietary. The reverse is also possible, for example in binary-only
720:
which would compromise sensitive information. In 2003 Microsoft established a
Government Security Program (GSP) to allow governments to view source code and Microsoft security documentation, of which the
399:
Software distributions considered as proprietary may in fact incorporate a "mixed source" model including both free and non-free software in the same distribution. Most if not all so-called proprietary
3599:
359:. These licenses have continued in use after software copyright was recognized in the courts, and are considered to grant the company extra protection compared to copyright law. According to
1038:
729:
which provides source code access for some products. The
Reference Source License (Ms-RSL) and Limited Public License (Ms-LPL) are proprietary software licenses where the source code is
3678:
2677:
1233:
Although IBM agreed to sell its machines as part of a
Consent Decree effective January 1956, leasing continued to be its preferred way of doing business.then everyone started fighting
608:
Vendors may also distribute versions that remove particular features, or versions which allow only certain fields of endeavor, such as non-commercial, educational, or non-profit use.
1034:
2820:
With the release of Homeworld 2 for the PC, Relic Entertainment has decided to give back to their impressive fan community by releasing the source code to the original Homeworld.
3897:
3519:
1106:
961:
100:
1373:
the components and offered them for sale individually. Unbundling gave birth to the multibillion-dollar software and services industries, of which IBM is today a world leader.
3736:
2885:
It is important to distinguish commercial software from proprietary software. Proprietary software is non-free software, while commercial software is software sold for money.
886:
interface "specific to one device or, more likely to a number of devices within a particular manufacturer's product range." The motivation for using a proprietary API can be
550:, provisions in conflict with applicable law are not enforceable. Some software is specifically licensed and not sold, in order to avoid limitations of copyright such as the
526:. Software can be made available with fewer restrictions on licensing or source-code access; software that satisfies certain conditions of freedom and openness is known as "
381:
as of 2023—rarely offer perpetual licenses. SaaS licenses are usually temporary and charged on a pay-per-usage or subscription basis, although other revenue models such as
1545:
users remain angry about IBM's decision. Announced in February 1983, IBM's object-code-only policy has been applied to a growing list of Big Blue system software products
3668:
1818:
642:
licenses are limited to one user, but allow the user to install a second copy on a home computer or laptop. This is no longer true with the switching to Creative Cloud.
369:
that could not be understood or modified by the user, but could be downloaded and run. The user bought a perpetual license to use a particular version of the software.
355:
The tendency to license proprietary software, rather than sell it, dates from the time period before the existence, then the scope of software copyright protection was
2708:
811:
Proprietary software vendors can prohibit the users from sharing the software with others. Another unique license is required for another party to use the software.
3072:
2479:
1788:
722:
318:
289:
3688:
3574:
814:
In the case of proprietary software with source code available, the vendor may also prohibit customers from distributing their modifications to the source code.
3673:
3656:
1059:, although the two terms are sometimes used synonymously in articles about free software. Proprietary software can be distributed at no cost or for a fee, and
3626:
3524:
3802:
3636:
3609:
3589:
1973:
3614:
2542:
960:, an operating system which is limited to Apple hardware, both by licensing and various design decisions. This licensing model has been affirmed by the
2038:
Essentially there are only three ways to protect computer software under the law: patent it, register a copyright for it, or keep it as a trade secret.
3564:
3534:
2772:
1074:
Proponents of commercial proprietary software argue that requiring users to pay for software as a product increases funding or time available for the
3711:
445:
considered "trapped" by the Free Software Foundation. This includes software written only for Microsoft Windows, or software that could only run on
2990:
1306:
2000:
software, copyright law can be used to prevent the total duplication of a software program, as well as the copying of a portion of software code.
1947:
3683:
3641:
3584:
2852:
2451:
2076:
1773:
1754:
1735:
1716:
1697:
1678:
1652:
1633:
1614:
1566:
1469:
1153:
56:
to exclude the recipient from freely sharing the software or modifying it, and—in some cases, as is the case with some patent-encumbered and
2685:
4099:
4047:
3977:
3661:
926:. The agreement forbade independent developers from discussing the content of the interfaces. Apple discontinued the NDA in October 2008.
2803:
3621:
3514:
3065:
1348:
1974:
Limitations and Exceptions to Copyright and Neighbouring Rights in the Digital Environment: An International Library Perspective (2004)
744:
has used covert partnerships with software companies to make commercial encryption software exploitable to eavesdropping, or to insert
4002:
3854:
788:
387:
3917:
3827:
3822:
2579:
1866:
1226:
879:
176:
2898:
3646:
3554:
2935:
If you program for Linux, you do need to understand licensing, no matter if you are writing free software or commercial software.
2869:
1423:
116:
280:
interpreter, and asserted that their unauthorized use hindered his ability to produce quality software. But the legal status of
3912:
3744:
3651:
3124:
2543:"Commission Decision of 24.03.2004 relating to a proceeding under Article 82 of the EC Treaty (Case COMP/C-3/37.792 Microsoft)"
1245:
806:
684:
566:
over the software. The owner can restrict the use, inspection of source code, modification of source code, and redistribution.
2634:
3491:
3058:
3044:
1822:
897:, in its March 24, 2004, decision on Microsoft's business practices, quotes, in paragraph 463, Microsoft general manager for
1529:
2718:
4130:
4007:
3902:
3726:
3716:
3500:
3107:
995:
72:
1796:
518:, with coverage varying by jurisdiction. Vendors sometimes grant patent rights to the user in the license agreement. The
4073:
3927:
3721:
952:
Proprietary software may also have licensing terms that limit the usage of that software to a specific set of hardware.
2517:
2301:"Distribution of IBM Licensed Programs and Licensed Program Materials and Modified Agreement for IBM Licensed Programs"
2221:
4135:
4035:
3942:
3777:
3355:
2406:
768:
648:, Apple's productivity suite, is available in a five-user family pack, for use on up to five computers in a household.
446:
185:
736:
Governments have also been accused of adding such malware to software themselves. According to documents released by
3932:
3817:
3594:
3423:
3303:
2443:
2387:
700:
or a license that allows, for example, study and modification, but not redistribution. The text-based email client
495:
470:
310:-only" model for a growing list of their software and stopped shipping much of the source code, even to licensees.
2654:
4067:
3982:
3967:
3418:
3144:
2832:
2587:
2487:
2442:. Second International Workshop on Digital Rights Management. Lecture Notes in Computer Science. Vol. 2696.
515:
421:
360:
84:
53:
4062:
3859:
3812:
3797:
3749:
3559:
3328:
2439:
Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
1896:
1101:
1075:
923:
855:
697:
269:
2553:
2741:
2170:
2133:"End-User License Agreement for Microsoft Software: Microsoft Windows XP Professional Edition Service Pack 2"
2099:"End-User License Agreement for Microsoft Software: Microsoft Windows XP Professional Edition Service Pack 2"
994:
for the software, or the users can migrate to either competing systems with longer support life cycles or to
48:
that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern
3448:
2383:
676:
632:
132:
3997:
2338:
4109:
3844:
3807:
3706:
3267:
3139:
1386:
859:
507:
440:
and ssh. The original copyright holders for a work of free software, even copyleft free software, can use
273:
3972:
3767:
3759:
3698:
3631:
3287:
3129:
3081:
2429:
2128:
2094:
1002:
615:
527:
432:
Some free software packages are also simultaneously available under proprietary terms. Examples include
300:
181:
2998:
2776:
1424:"CONTU Revisited: The Case against Copyright Protection for Computer Programs in Machine-Readable Form"
631:
can be installed on one computer, and limits the number of network file sharing connections to 10. The
2361:
1882:
4057:
3987:
3549:
3378:
3262:
3252:
3117:
2267:
Under the proprietary software model, most software developers withhold their source code from users.
1558:
1111:
987:
849:
760:
745:
701:
658:
583:
378:
1837:
3937:
3539:
3383:
3368:
3165:
2549:
1056:
1050:
894:
551:
531:
503:
370:
138:
31:
4095:
2320:"Module 24: SLAC Enhancements to and Beautifications of the IBM H-Level Assembler for Version 2.8"
901:
development Aaron Contorer as stating in a February 21, 1997, internal Microsoft memo drafted for
60:-bound software—from making use of the software on their own, thereby restricting their freedoms.
3484:
3443:
3433:
3388:
3102:
2244:
2029:
1900:
1497:
1465:
1443:
1141:
940:
Any dependency on the future versions and upgrades for a proprietary software package can create
845:
776:
590:
476:
462:
281:
240:
121:
1218:
1208:
2844:
4017:
3864:
3544:
3458:
3398:
3373:
3197:
2848:
2807:
2447:
1862:
1858:
1852:
1222:
1149:
1096:
622:
339:
45:
35:
1356:
1177:
3782:
3272:
3089:
2464:
2236:
2021:
1435:
1315:
1006:
883:
834:
756:
730:
332:
978:
Proprietary software which is no longer marketed, supported or sold by its owner is called
4052:
3453:
3428:
3410:
3277:
3214:
3170:
3012:
2948:
2433:
1507:
1116:
991:
752:
602:
575:
563:
511:
484:
466:
413:
356:
2902:
1987:
3849:
3772:
2837:
2280:
1664:
1662:
1493:
983:
935:
887:
737:
441:
296:
259:
167:
2745:
2437:
2195:
4124:
4080:
4041:
3947:
3604:
3529:
3477:
3333:
3112:
2873:
2425:
2300:
2166:
1533:
1369:
Rather than offer hardware, services and software exclusively in packages, marketers
1060:
764:
726:
639:
314:
112:
2319:
2033:
1253:
3922:
3879:
3792:
3257:
3219:
3207:
3182:
2713:
1451:
863:
713:
705:
672:
523:
488:
458:
374:
277:
159:
143:
2012:
Donovan, S. (1994). "Patent, copyright and trade secret protection for software".
1009:
software, often to prevent the software from becoming unsupported and unavailable
2132:
2098:
1584:
498:(EULA). The user may agree to this contract in writing, interactively on screen (
79:
are not deemed proprietary, but are non-free. Proprietary software may either be
4012:
3839:
3834:
3469:
3438:
3363:
3313:
3177:
3014:
Open Source Versus Commercial Software: Why Proprietary Software is Here to Stay
1921:
1030:
1022:
1018:
1010:
979:
973:
910:
822:
680:
662:
594:
579:
519:
366:
307:
285:
163:
17:
3345:
3318:
3282:
2976:
2051:
1942:
1479:
1279:
953:
902:
784:
772:
628:
404:
distributions are mixed source software, bundling open-source components like
348:
265:
3869:
3393:
3340:
3236:
3224:
2994:
2252:
2140:
2106:
1214:
1082:
says that per-copy fees maximize the profitability of software development.
1079:
1014:
854:
Proprietary software often stores some of its data in file formats that are
817:
800:
692:
543:
499:
344:
255:
222:
49:
2924:
3039:
2609:
3907:
3787:
3202:
3192:
3187:
3097:
1068:
1026:
1021:
are famous for the practice of releasing closed source software into the
668:
625:
is limited to non-commercial use on up to three devices in one household.
547:
480:
437:
409:
382:
217:
212:
126:
76:
3050:
862:
which are incompatible. Such formats and protocols may be restricted as
3323:
3308:
3229:
2248:
1447:
919:
717:
2025:
1319:
3160:
990:). Sometimes another vendor or a software's community themselves can
867:
775:
to somewhat usable code, and the source code for programs written in
725:
was an early participant. The program is part of Microsoft's broader
598:
64:
2388:"US and UK spy agencies defeat privacy and security on the internet"
2240:
1439:
890:
or because standard APIs do not support the device's functionality.
618:
is restricted to running a maximum of three concurrent applications.
491:, provides legal basis for its owner to establish exclusive rights.
243:, machines in specially air-conditioned computer rooms—were usually
1530:"IBM policy draws fire - Users say source code rules hamper change"
898:
3874:
2281:"Free-Libre / Open Source Software (FLOSS) is Commercial Software"
1335:
IBM's Unbundling Decision: Consequences for Users and the Industry
957:
645:
514:
grant exclusive rights to algorithms, software features, or other
433:
338:
299:
the legal characteristic of software changed also due to the U.S.
248:
244:
207:
683:, or human-readable version of the software, often written in a
417:
405:
401:
57:
3473:
3054:
1411:(Technical report). Cal Poly State University. CPSLO-CSC-04-02.
239:
Until the late 1960s, computers—especially large and expensive
1352:
780:
741:
522:
for a piece of proprietary software is routinely handled as a
365:
Traditionally, software was distributed in the form of binary
202:
172:
154:
2709:"Open Source, the only weapon against 'planned obsolescence'"
494:
A software vendor delineates the specific terms of use in an
2222:"Copyleft: Licensing Collaborative Works in the Digital Age"
712:
Some governments fear that proprietary software may include
390:, but pay-per-use SaaS models makes the software affordable.
30:"Non-free software" redirects here. Not to be confused with
2077:"Oracle Can't Stop Software License Resales, EU Court Says"
1033:). More examples of formerly closed-source software in the
2052:"Why the FSF gets copyright assignments from contributors"
1409:
Executable Code is Not the Proper Subject of Copyright Law
2744:. Technology Innovation Management Review. Archived from
1304:
Pugh, Emerson W. (2002). "Origins of Software Bundling".
1039:
List of commercial video games with available source code
2655:"What happens when a proprietary software company dies?"
1943:"Overreaching Provisions in Software License Agreements"
1001:
Some proprietary software is released by their owner at
2635:"Apple wins key battle against Psystar over Mac clones"
759:
the software. This is particularly common with certain
288:, was not clear until the 1983 appeals court ruling in
258:
lawsuits pending against it, led an industry change by
1067:
Proprietary software that comes for no cost is called
1035:
List of commercial software with available source code
687:. This scheme is often referred to as closed source.
667:
Vendors typically distribute proprietary software in
635:
disables features present in Windows XP Professional.
313:
In 1983, binary software became copyrightable in the
94:
3520:
Comparison of open-source and closed-source software
2430:"Attacking an Obfuscated Cipher by Injecting Faults"
1107:
Comparison of open-source and closed-source software
1025:. Some of those kinds are free-of-charge downloads (
962:
United States Court of Appeals for the Ninth Circuit
858:
with other software, and may also communicate using
562:
The owner of proprietary software exercises certain
542:
Since license agreements do not override applicable
260:
starting to charge separately for mainframe software
27:
Software released under a license restricting rights
4026:
3960:
3888:
3758:
3735:
3697:
3573:
3507:
3409:
3354:
3296:
3245:
3153:
3088:
2678:"Microsoft Turns Up The Heat On Windows 2000 Users"
1901:"Frequently Asked Questions about the GNU Licenses"
948:
Software limited to certain hardware configurations
262:and services, by unbundling hardware and software.
2836:
2386:, Julian Borger and Glenn Greenwald (2013-09-06).
1772:sfn error: no target: CITEREFDempseyKelliher2018 (
1753:sfn error: no target: CITEREFDempseyKelliher2018 (
1734:sfn error: no target: CITEREFDempseyKelliher2018 (
1715:sfn error: no target: CITEREFDempseyKelliher2018 (
1677:sfn error: no target: CITEREFClohessy_et_al.2020 (
502:), or by opening the box containing the software (
1178:"Why Free Software's Long Run TCO must be lower"
333:Software license § Proprietary software licenses
2407:"How to remain secure against NSA surveillance"
1767:
1748:
1729:
1710:
1668:
2843:. Upper Saddle River: Prentice Hall. pp.
2580:"Apple Drops NDA for Released iPhone Software"
1578:
1576:
290:Apple Computer, Inc. v. Franklin Computer Corp
272:" in 1976 decried computer hobbyists' rampant
3485:
3066:
1976:. IFLA (2013-01-22). Retrieved on 2013-06-16.
420:, and others along with a purely proprietary
8:
3525:Comparison of source-code-hosting facilities
2608:The Linux Information Project (2006-04-29).
2511:
2509:
1787:Engelfriet, Arnoud (August–September 2006).
1055:Proprietary software is not synonymous with
1632:sfn error: no target: CITEREFTerasaki2013 (
1613:sfn error: no target: CITEREFTerasaki2013 (
829:Interoperability with software and hardware
3885:
3492:
3478:
3470:
3073:
3059:
3051:
2480:"Protect your JavaScript with obfuscation"
1883:"Categories of Free and Non-Free Software"
1854:Open Source: The Unauthorized White Papers
1029:), some are still commercially sold (e.g.
653:Inspection and modification of source code
306:Starting in February 1983 IBM adopted an "
2196:"Apple iWork '09 review: Apple iWork '09"
1148:. Saraswati House Pvt Ltd. p. 1.27.
1135:
1133:
1838:"Novell: We're a 'mixed-source' company"
1651:sfn error: no target: CITEREFBoyle2003 (
1627:
1608:
1471:Cringely's interview with Brewster Kahle
2676:Livingston, Brian (December 15, 2006).
2337:Shankland, Stephen (January 30, 2003).
1819:"Managing mixed source software stacks"
1696:sfn error: no target: CITEREFWatt2023 (
1559:"Impact of Apple vs. Franklin Decision"
1506:. Event occurs at 3:15. Archived from
1307:IEEE Annals of the History of Computing
1129:
190:proprietary software, no public license
1988:"Why Protect Software Through Patents"
1948:Richmond Journal of Law and Technology
1286:. Free Software Foundation. 2016-06-16
840:Proprietary file formats and protocols
623:Microsoft Office Home and Student 2007
276:of software, particularly Microsoft's
2516:Orenstein, David (January 10, 2000).
1646:
1349:"Chronological History of IBM: 1960s"
1267:time when they leased such equipment.
373:(SaaS) vendors—who have the majority
7:
4048:Microsoft Open Specification Promise
2790:development of the Myth game series.
2326:, Stanford Linear Accelerator Center
1691:
137:
3515:Alternative terms for free software
2707:Cassia, Fernando (March 28, 2007).
2518:"Application Programming Interface"
1922:"Free But Shackled - The Java Trap"
1795:(19). Gavin Stewart. Archived from
1793:Intellectual Asset Management (IAM)
1499:Corporate Open Source Anti-patterns
1407:Swann, Matthew (18 November 2004).
1337:. Programming Sciences Corporation.
944:, entrenching a monopoly position.
475:Most of the software is covered by
3855:Python Software Foundation License
2806:. Inside Mac Games. Archived from
2775:. Linux Dev Center. Archived from
2194:Parker, Jason (January 27, 2009).
1246:"The History of Equipment Leasing"
611:Use restrictions vary by license:
506:). License agreements are usually
449:, before it became free software.
75:; non-commercial licenses such as
25:
3918:Definition of Free Cultural Works
3535:Free software project directories
2923:Michael K. Johnson (1996-09-01).
2802:Largent, Andy (October 8, 2003).
2339:"Governments to see Windows code"
2307:. IBM. February 8, 1983. 283-016.
1569:from the original on Sep 8, 2023.
880:application programming interface
685:higher level programming language
4105:
4104:
4094:
3555:Open-source software development
3038:
2899:"What is "Commercial Software"?"
2804:"Homeworld Source Code Released"
2552:. March 24, 2004. Archived from
2172:Adobe Software License Agreement
1478:. 46 minutes in. Archived from
1385:Gates, Bill (February 3, 1976).
835:Interoperability § Software
331:This section is an excerpt from
71:, a term defined in contrast to
3913:Debian Free Software Guidelines
3745:Free Software Movement of India
3017:. Sams Publishing. October 2005
2991:"The Commercial Software Model"
2897:Russell McOrmond (2000-01-04).
2868:Havoc Pennington (2008-03-02).
2279:David A. Wheeler (2009-02-03).
1986:Daniel A. Tysver (2008-11-23).
1920:Richard Stallman (2004-04-12).
956:has such a licensing model for
807:Freely redistributable software
751:Software vendors sometimes use
704:and certain implementations of
2947:Eric S. Raymond (2003-12-29).
2740:Bell, John (October 1, 2009).
2360:Gao, Ken (February 28, 2003).
2318:Greg Mushial (July 20, 1983),
1188:(1). AUUG, Inc. 1. Definitions
1:
3903:Contributor License Agreement
3717:Open-source-software movement
3501:Free and open-source software
2771:Wen, Howard (June 10, 2004).
2424:Jacob, Matthias; Boneh, Dan;
2405:Bruce Schneier (2013-09-06).
1557:Hassett, Rob (Dec 18, 2012).
1422:Pamela Samuelson (Sep 1984),
1387:"An Open Letter to Hobbyists"
1210:A History of Modern Computing
675:understood by the computer's
73:free and open-source software
4074:The Cathedral and the Bazaar
3928:The Free Software Definition
2633:Don Reisinger (2011-09-29).
2362:"China to view Windows code"
1857:. Foster City: IDG. p.
1821:. LinuxWorld. Archived from
1528:Gallant, John (1985-03-18).
1333:Hamilton, Thomas W. (1969).
1280:"Overview of the GNU System"
1176:Brendan Scott (March 2003).
679:. They typically retain the
3978:Mozilla software rebranding
3943:Permissive software license
3356:Software release life cycle
2742:"Opening the Source of Art"
2610:"Vendor Lock-in Definition"
2075:White, Aoife (2012-07-03).
1817:Loftus, Jack (2007-02-19).
1768:Dempsey & Kelliher 2018
1749:Dempsey & Kelliher 2018
1730:Dempsey & Kelliher 2018
1711:Dempsey & Kelliher 2018
1583:Landley, Rob (2009-05-23).
347:software license issued by
193:private, internal software
4152:
3983:Proprietary device drivers
3933:The Open Source Definition
3424:Software protection dongle
3304:Unwanted software bundling
2997:. May 2001. Archived from
2578:Wilson, Ben (2008-10-01).
2478:Tony Patton (2008-11-21).
2444:Springer Berlin Heidelberg
2050:Eben Moglen (2005-02-12).
1941:Liberman, Michael (1995).
1851:Rosenberg, Donald (2000).
1078:of software. For example,
1048:
971:
968:Abandonment by proprietors
933:
843:
832:
804:
798:
755:to impede users who would
656:
573:
496:end-user license agreement
471:End-user license agreement
456:
330:
63:Proprietary software is a
29:
4090:
4068:Source-available software
3968:Digital rights management
3419:Digital rights management
2773:"Keeping the Myths Alive"
2657:. Linux. October 24, 2003
1836:Tan, Aaron (2006-12-28).
1789:"The best of both worlds"
1207:Ceruzzi, Paul E. (2003).
1146:COMPUTER SCIENCE WITH C++
516:patentable subject matter
361:United States federal law
247:to customers rather than
197:
149:
104:
99:
85:source-available software
54:intellectual property law
4063:Shared Source Initiative
3860:Shared Source Initiative
3813:Free Software Foundation
3750:Free Software Foundation
3600:Configuration management
3297:Deceptive and/or illicit
2925:"Licenses and Copyright"
1897:Free Software Foundation
1102:Commercial off-the-shelf
1076:research and development
924:non-disclosure agreement
767:for programs written in
727:Shared Source Initiative
698:non-disclosure agreement
270:Open Letter to Hobbyists
254:In 1969, IBM, which had
3998:SCO/Linux controversies
3449:Software license server
2977:"Selling Free Software"
2220:Heffan, Ira V. (1997).
677:central processing unit
3898:Comparison of licenses
3707:Free software movement
3125:Freely redistributable
982:, the digital form of
918:Early versions of the
621:The retail edition of
424:and system utilities.
352:
274:copyright infringement
81:closed-source software
3973:License proliferation
3288:Software as a service
3082:Software distribution
2839:Open Source Licensing
2129:Microsoft Corporation
2095:Microsoft Corporation
1840:. CNET Networks, Inc.
1355:. n.d. Archived from
1045:Pricing and economics
934:Further information:
844:Further information:
833:Further information:
799:Further information:
761:programming languages
616:Windows Vista Starter
574:Further information:
504:shrink wrap licensing
457:Further information:
395:Mixed-source software
343:A brief, written-out
342:
301:Copyright Act of 1976
198:Other creative works
4131:Proprietary software
4058:Open-source hardware
3993:Proprietary software
3988:Proprietary firmware
3689:Formerly open-source
3684:Formerly proprietary
3550:Open-source software
3379:Software maintenance
3253:Digital distribution
3108:Free and open-source
3047:at Wikimedia Commons
3045:Proprietary software
2721:on November 22, 2012
2305:Announcement Letters
1284:GNU Operating System
1112:Proprietary hardware
988:planned obsolescence
850:Proprietary protocol
659:Open-source software
597:or serial number, a
584:Price discrimination
379:application software
129:(protective license)
42:Proprietary software
3938:Open-source license
3540:Gratis versus libre
3384:Software maintainer
3166:Commercial software
3154:Compensation models
2810:on October 12, 2013
2559:on October 28, 2008
2550:European Commission
2428:(30 October 2003).
2229:Stanford Law Review
1630:, pp. 469–470.
1140:Saraswati Experts.
1057:commercial software
1051:Commercial software
895:European Commission
777:scripting languages
763:. For example, the
570:Use of the software
552:first-sale doctrine
371:Software as service
241:mainframe computers
225:, no public license
139:Proprietary license
32:Commercial software
4136:Software licensing
3444:Software copyright
3434:Product activation
3389:Software publisher
3103:Floating licensing
1732:, pp. 48, 57.
1466:Robert X. Cringely
1005:as open-source or
922:were covered by a
846:Proprietary format
723:Chinese government
718:malicious features
671:form, usually the
591:product activation
479:which, along with
463:Software copyright
388:smaller businesses
353:
319:Apple vs. Franklin
282:software copyright
122:Permissive license
105:Non-free Licenses
101:Free/Open Licenses
4118:
4117:
4018:Trusted Computing
4008:Software security
3956:
3955:
3637:Operating systems
3545:Long-term support
3467:
3466:
3459:Torrent poisoning
3374:Long-term support
3198:Pay what you want
3043:Media related to
2870:"Debian Tutorial"
2854:978-0-13-148787-1
2748:on March 30, 2014
2490:on March 15, 2014
2453:978-3-540-44993-5
2026:10.1109/45.310923
1751:, pp. 61–63.
1675:, pp. 40–41.
1563:InternetLegal.com
1320:10.1109/85.988580
1256:on April 11, 2008
1213:. Cambridge, MA:
1155:978-93-5199-877-8
1097:Business software
821:sometimes called
284:, especially for
232:
231:
69:non-free software
36:Business software
16:(Redirected from
4143:
4108:
4107:
4098:
4003:Software patents
3886:
3798:Creative Commons
3657:Web applications
3494:
3487:
3480:
3471:
3273:Product bundling
3246:Delivery methods
3145:Source-available
3075:
3068:
3061:
3052:
3042:
3026:
3025:
3023:
3022:
3009:
3003:
3002:
2987:
2981:
2980:
2973:
2967:
2966:
2960:
2959:
2944:
2938:
2937:
2932:
2931:
2920:
2914:
2913:
2911:
2910:
2901:. Archived from
2894:
2888:
2887:
2882:
2881:
2872:. Archived from
2865:
2859:
2858:
2842:
2829:
2823:
2822:
2817:
2815:
2799:
2793:
2792:
2786:
2784:
2779:on April 6, 2013
2768:
2762:
2761:
2755:
2753:
2737:
2731:
2730:
2728:
2726:
2717:. Archived from
2704:
2698:
2697:
2695:
2693:
2684:. Archived from
2673:
2667:
2666:
2664:
2662:
2651:
2645:
2644:
2642:
2641:
2630:
2624:
2623:
2617:
2616:
2605:
2599:
2598:
2596:
2595:
2586:. Archived from
2575:
2569:
2568:
2566:
2564:
2558:
2547:
2539:
2533:
2532:
2530:
2528:
2513:
2504:
2503:
2497:
2495:
2486:. Archived from
2475:
2469:
2468:
2465:Internet Archive
2462:
2460:
2434:Feigenbaum, Joan
2421:
2415:
2414:
2402:
2396:
2395:
2380:
2374:
2373:
2371:
2369:
2357:
2351:
2350:
2348:
2346:
2334:
2328:
2327:
2324:SLAC VM NOTEBOOK
2315:
2309:
2308:
2297:
2291:
2290:
2288:
2287:
2276:
2270:
2269:
2264:
2263:
2257:
2251:. Archived from
2226:
2217:
2211:
2210:
2208:
2206:
2191:
2185:
2184:
2183:
2182:
2177:
2163:
2157:
2156:
2150:
2149:
2144:. p. Page 1
2137:
2125:
2119:
2118:
2116:
2115:
2110:. p. Page 3
2103:
2091:
2085:
2084:
2072:
2066:
2065:
2059:
2058:
2047:
2041:
2040:
2009:
2003:
2002:
1996:
1995:
1983:
1977:
1971:
1965:
1964:
1962:
1960:
1938:
1932:
1931:
1929:
1928:
1917:
1911:
1910:
1908:
1907:
1893:
1887:
1886:
1879:
1873:
1872:
1848:
1842:
1841:
1833:
1827:
1826:
1814:
1808:
1807:
1805:
1804:
1784:
1778:
1777:
1765:
1759:
1758:
1746:
1740:
1739:
1727:
1721:
1720:
1708:
1702:
1701:
1689:
1683:
1682:
1666:
1657:
1656:
1644:
1638:
1637:
1625:
1619:
1618:
1606:
1600:
1599:
1593:
1592:
1580:
1571:
1570:
1554:
1548:
1547:
1541:
1540:
1525:
1519:
1518:
1516:
1515:
1490:
1484:
1483:
1462:
1456:
1455:
1450:, archived from
1428:Duke Law Journal
1419:
1413:
1412:
1404:
1398:
1397:
1395:
1393:
1382:
1376:
1375:
1366:
1364:
1345:
1339:
1338:
1330:
1324:
1323:
1301:
1295:
1294:
1292:
1291:
1276:
1270:
1269:
1263:
1261:
1252:, archived from
1242:
1236:
1235:
1204:
1198:
1197:
1195:
1193:
1173:
1167:
1166:
1164:
1162:
1137:
1007:source available
998:-based systems.
884:software library
874:Proprietary APIs
787:is available at
757:reverse engineer
673:machine language
564:exclusive rights
558:Exclusive rights
512:Software patents
95:
21:
4151:
4150:
4146:
4145:
4144:
4142:
4141:
4140:
4121:
4120:
4119:
4114:
4086:
4053:Open-core model
4028:
4022:
3952:
3890:
3884:
3754:
3731:
3693:
3576:
3569:
3503:
3498:
3468:
3463:
3454:Software patent
3429:License manager
3411:Copy protection
3405:
3350:
3292:
3278:Retail software
3241:
3215:Open-core model
3171:Retail software
3149:
3084:
3079:
3035:
3030:
3029:
3020:
3018:
3011:
3010:
3006:
2989:
2988:
2984:
2975:
2974:
2970:
2957:
2955:
2946:
2945:
2941:
2929:
2927:
2922:
2921:
2917:
2908:
2906:
2896:
2895:
2891:
2879:
2877:
2867:
2866:
2862:
2855:
2833:Rosen, Lawrence
2831:
2830:
2826:
2813:
2811:
2801:
2800:
2796:
2782:
2780:
2770:
2769:
2765:
2751:
2749:
2739:
2738:
2734:
2724:
2722:
2706:
2705:
2701:
2691:
2689:
2675:
2674:
2670:
2660:
2658:
2653:
2652:
2648:
2639:
2637:
2632:
2631:
2627:
2614:
2612:
2607:
2606:
2602:
2593:
2591:
2577:
2576:
2572:
2562:
2560:
2556:
2545:
2541:
2540:
2536:
2526:
2524:
2515:
2514:
2507:
2493:
2491:
2477:
2476:
2472:
2458:
2456:
2454:
2423:
2422:
2418:
2404:
2403:
2399:
2382:
2381:
2377:
2367:
2365:
2359:
2358:
2354:
2344:
2342:
2336:
2335:
2331:
2317:
2316:
2312:
2299:
2298:
2294:
2285:
2283:
2278:
2277:
2273:
2261:
2259:
2255:
2241:10.2307/1229351
2224:
2219:
2218:
2214:
2204:
2202:
2193:
2192:
2188:
2180:
2178:
2175:
2165:
2164:
2160:
2147:
2145:
2135:
2127:
2126:
2122:
2113:
2111:
2101:
2093:
2092:
2088:
2074:
2073:
2069:
2056:
2054:
2049:
2048:
2044:
2014:IEEE Potentials
2011:
2010:
2006:
1993:
1991:
1985:
1984:
1980:
1972:
1968:
1958:
1956:
1940:
1939:
1935:
1926:
1924:
1919:
1918:
1914:
1905:
1903:
1895:
1894:
1890:
1881:
1880:
1876:
1869:
1850:
1849:
1845:
1835:
1834:
1830:
1816:
1815:
1811:
1802:
1800:
1786:
1785:
1781:
1771:
1766:
1762:
1752:
1747:
1743:
1733:
1728:
1724:
1714:
1709:
1705:
1695:
1690:
1686:
1676:
1667:
1660:
1650:
1645:
1641:
1631:
1626:
1622:
1612:
1607:
1603:
1590:
1588:
1582:
1581:
1574:
1556:
1555:
1551:
1538:
1536:
1527:
1526:
1522:
1513:
1511:
1494:Cantrill, Bryan
1492:
1491:
1487:
1464:
1463:
1459:
1440:10.2307/1372418
1421:
1420:
1416:
1406:
1405:
1401:
1391:
1389:
1384:
1383:
1379:
1362:
1360:
1359:on July 3, 2016
1347:
1346:
1342:
1332:
1331:
1327:
1303:
1302:
1298:
1289:
1287:
1278:
1277:
1273:
1259:
1257:
1244:
1243:
1239:
1229:
1206:
1205:
1201:
1191:
1189:
1175:
1174:
1170:
1160:
1158:
1156:
1139:
1138:
1131:
1126:
1121:
1117:Retail software
1092:
1053:
1047:
992:provide support
976:
970:
950:
938:
932:
876:
852:
842:
837:
831:
809:
803:
797:
753:obfuscated code
665:
655:
638:Traditionally,
603:copy protection
586:
576:Copy protection
572:
560:
540:
473:
467:Software patent
455:
430:
428:Multi-licensing
414:X Window System
397:
392:
391:
336:
328:
317:as well by the
237:
93:
39:
28:
23:
22:
18:Proprietization
15:
12:
11:
5:
4149:
4147:
4139:
4138:
4133:
4123:
4122:
4116:
4115:
4113:
4112:
4102:
4091:
4088:
4087:
4085:
4084:
4077:
4070:
4065:
4060:
4055:
4050:
4045:
4038:
4032:
4030:
4024:
4023:
4021:
4020:
4015:
4010:
4005:
4000:
3995:
3990:
3985:
3980:
3975:
3970:
3964:
3962:
3958:
3957:
3954:
3953:
3951:
3950:
3945:
3940:
3935:
3930:
3925:
3920:
3915:
3910:
3905:
3900:
3894:
3892:
3883:
3882:
3877:
3872:
3867:
3862:
3857:
3852:
3847:
3842:
3837:
3832:
3831:
3830:
3825:
3820:
3810:
3805:
3800:
3795:
3790:
3785:
3780:
3775:
3770:
3764:
3762:
3756:
3755:
3753:
3752:
3747:
3741:
3739:
3733:
3732:
3730:
3729:
3724:
3719:
3714:
3709:
3703:
3701:
3695:
3694:
3692:
3691:
3686:
3681:
3676:
3671:
3666:
3665:
3664:
3654:
3649:
3644:
3639:
3634:
3629:
3624:
3619:
3618:
3617:
3612:
3602:
3597:
3592:
3590:Bioinformatics
3587:
3581:
3579:
3571:
3570:
3568:
3567:
3562:
3557:
3552:
3547:
3542:
3537:
3532:
3527:
3522:
3517:
3511:
3509:
3505:
3504:
3499:
3497:
3496:
3489:
3482:
3474:
3465:
3464:
3462:
3461:
3456:
3451:
3446:
3441:
3436:
3431:
3426:
3421:
3415:
3413:
3407:
3406:
3404:
3403:
3402:
3401:
3391:
3386:
3381:
3376:
3371:
3366:
3360:
3358:
3352:
3351:
3349:
3348:
3343:
3338:
3337:
3336:
3331:
3326:
3321:
3316:
3306:
3300:
3298:
3294:
3293:
3291:
3290:
3285:
3280:
3275:
3270:
3265:
3260:
3255:
3249:
3247:
3243:
3242:
3240:
3239:
3234:
3233:
3232:
3222:
3217:
3212:
3211:
3210:
3205:
3195:
3190:
3185:
3180:
3175:
3174:
3173:
3163:
3157:
3155:
3151:
3150:
3148:
3147:
3142:
3137:
3132:
3127:
3122:
3121:
3120:
3115:
3105:
3100:
3094:
3092:
3086:
3085:
3080:
3078:
3077:
3070:
3063:
3055:
3049:
3048:
3034:
3033:External links
3031:
3028:
3027:
3004:
3001:on 2007-03-05.
2982:
2979:. GNU Project.
2968:
2953:, Jargon File"
2939:
2915:
2889:
2860:
2853:
2824:
2794:
2763:
2732:
2699:
2688:on May 3, 2022
2668:
2646:
2625:
2600:
2570:
2534:
2505:
2470:
2452:
2446:. p. 17.
2426:Felten, Edward
2416:
2397:
2375:
2352:
2329:
2310:
2292:
2271:
2212:
2186:
2158:
2131:(2005-04-01).
2120:
2097:(2005-04-01).
2086:
2067:
2042:
2004:
1978:
1966:
1933:
1912:
1899:(2009-05-05).
1888:
1885:. GNU Project.
1874:
1867:
1843:
1828:
1825:on 2010-06-03.
1809:
1779:
1760:
1741:
1722:
1703:
1684:
1658:
1639:
1620:
1611:, p. 469.
1601:
1585:"May 23, 2009"
1572:
1549:
1520:
1496:(2014-09-17).
1485:
1482:on 2019-01-18.
1457:
1454:on Aug 4, 2017
1434:(4): 663–769,
1414:
1399:
1377:
1340:
1325:
1296:
1271:
1237:
1227:
1199:
1168:
1154:
1128:
1127:
1125:
1122:
1120:
1119:
1114:
1109:
1104:
1099:
1093:
1091:
1088:
1046:
1043:
984:orphaned works
972:Main article:
969:
966:
949:
946:
942:vendor lock-in
936:Vendor lock-in
931:
930:Vendor lock-in
928:
916:
915:
888:vendor lock-in
878:A proprietary
875:
872:
866:or subject to
841:
838:
830:
827:
796:
795:Redistribution
793:
771:can be easily
738:Edward Snowden
731:made available
654:
651:
650:
649:
643:
636:
626:
619:
571:
568:
559:
556:
539:
536:
508:not negotiable
454:
451:
442:dual-licensing
429:
426:
396:
393:
337:
329:
327:
324:
297:Brewster Kahle
236:
233:
230:
229:
226:
220:
215:
210:
205:
199:
195:
194:
191:
188:
179:
170:
157:
151:
147:
146:
141:
136:
130:
124:
119:
110:
107:
106:
103:
98:
92:
89:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
4148:
4137:
4134:
4132:
4129:
4128:
4126:
4111:
4103:
4101:
4097:
4093:
4092:
4089:
4083:
4082:
4081:Revolution OS
4078:
4076:
4075:
4071:
4069:
4066:
4064:
4061:
4059:
4056:
4054:
4051:
4049:
4046:
4044:
4043:
4042:GNU Manifesto
4039:
4037:
4034:
4033:
4031:
4025:
4019:
4016:
4014:
4011:
4009:
4006:
4004:
4001:
3999:
3996:
3994:
3991:
3989:
3986:
3984:
3981:
3979:
3976:
3974:
3971:
3969:
3966:
3965:
3963:
3959:
3949:
3948:Public domain
3946:
3944:
3941:
3939:
3936:
3934:
3931:
3929:
3926:
3924:
3921:
3919:
3916:
3914:
3911:
3909:
3906:
3904:
3901:
3899:
3896:
3895:
3893:
3887:
3881:
3878:
3876:
3873:
3871:
3868:
3866:
3863:
3861:
3858:
3856:
3853:
3851:
3848:
3846:
3843:
3841:
3838:
3836:
3833:
3829:
3826:
3824:
3821:
3819:
3816:
3815:
3814:
3811:
3809:
3806:
3804:
3801:
3799:
3796:
3794:
3791:
3789:
3786:
3784:
3781:
3779:
3776:
3774:
3771:
3769:
3766:
3765:
3763:
3761:
3757:
3751:
3748:
3746:
3743:
3742:
3740:
3738:
3737:Organisations
3734:
3728:
3725:
3723:
3720:
3718:
3715:
3713:
3710:
3708:
3705:
3704:
3702:
3700:
3696:
3690:
3687:
3685:
3682:
3680:
3677:
3675:
3672:
3670:
3667:
3663:
3660:
3659:
3658:
3655:
3653:
3650:
3648:
3645:
3643:
3640:
3638:
3635:
3633:
3632:Office suites
3630:
3628:
3625:
3623:
3620:
3616:
3613:
3611:
3608:
3607:
3606:
3603:
3601:
3598:
3596:
3593:
3591:
3588:
3586:
3583:
3582:
3580:
3578:
3572:
3566:
3563:
3561:
3558:
3556:
3553:
3551:
3548:
3546:
3543:
3541:
3538:
3536:
3533:
3531:
3530:Free software
3528:
3526:
3523:
3521:
3518:
3516:
3513:
3512:
3510:
3506:
3502:
3495:
3490:
3488:
3483:
3481:
3476:
3475:
3472:
3460:
3457:
3455:
3452:
3450:
3447:
3445:
3442:
3440:
3437:
3435:
3432:
3430:
3427:
3425:
3422:
3420:
3417:
3416:
3414:
3412:
3408:
3400:
3397:
3396:
3395:
3392:
3390:
3387:
3385:
3382:
3380:
3377:
3375:
3372:
3370:
3367:
3365:
3362:
3361:
3359:
3357:
3353:
3347:
3344:
3342:
3339:
3335:
3332:
3330:
3327:
3325:
3322:
3320:
3317:
3315:
3312:
3311:
3310:
3307:
3305:
3302:
3301:
3299:
3295:
3289:
3286:
3284:
3281:
3279:
3276:
3274:
3271:
3269:
3268:Pre-installed
3266:
3264:
3261:
3259:
3256:
3254:
3251:
3250:
3248:
3244:
3238:
3235:
3231:
3228:
3227:
3226:
3223:
3221:
3218:
3216:
3213:
3209:
3206:
3204:
3201:
3200:
3199:
3196:
3194:
3191:
3189:
3186:
3184:
3181:
3179:
3176:
3172:
3169:
3168:
3167:
3164:
3162:
3159:
3158:
3156:
3152:
3146:
3143:
3141:
3140:Public domain
3138:
3136:
3133:
3131:
3128:
3126:
3123:
3119:
3116:
3114:
3111:
3110:
3109:
3106:
3104:
3101:
3099:
3096:
3095:
3093:
3091:
3087:
3083:
3076:
3071:
3069:
3064:
3062:
3057:
3056:
3053:
3046:
3041:
3037:
3036:
3032:
3016:
3015:
3008:
3005:
3000:
2996:
2992:
2986:
2983:
2978:
2972:
2969:
2965:
2954:
2952:
2943:
2940:
2936:
2926:
2919:
2916:
2905:on 2012-10-04
2904:
2900:
2893:
2890:
2886:
2876:on 2018-01-29
2875:
2871:
2864:
2861:
2856:
2850:
2846:
2841:
2840:
2834:
2828:
2825:
2821:
2809:
2805:
2798:
2795:
2791:
2778:
2774:
2767:
2764:
2760:
2747:
2743:
2736:
2733:
2720:
2716:
2715:
2710:
2703:
2700:
2687:
2683:
2679:
2672:
2669:
2656:
2650:
2647:
2636:
2629:
2626:
2622:
2611:
2604:
2601:
2590:on 2013-03-08
2589:
2585:
2581:
2574:
2571:
2555:
2551:
2544:
2538:
2535:
2523:
2522:Computerworld
2519:
2512:
2510:
2506:
2502:
2489:
2485:
2481:
2474:
2471:
2466:
2455:
2449:
2445:
2441:
2440:
2435:
2431:
2427:
2420:
2417:
2412:
2408:
2401:
2398:
2393:
2389:
2385:
2379:
2376:
2363:
2356:
2353:
2340:
2333:
2330:
2325:
2321:
2314:
2311:
2306:
2302:
2296:
2293:
2282:
2275:
2272:
2268:
2258:on 2013-05-14
2254:
2250:
2246:
2242:
2238:
2234:
2230:
2223:
2216:
2213:
2201:
2197:
2190:
2187:
2174:
2173:
2168:
2167:Adobe Systems
2162:
2159:
2155:
2143:
2142:
2134:
2130:
2124:
2121:
2109:
2108:
2100:
2096:
2090:
2087:
2082:
2078:
2071:
2068:
2064:
2053:
2046:
2043:
2039:
2035:
2031:
2027:
2023:
2019:
2015:
2008:
2005:
2001:
1989:
1982:
1979:
1975:
1970:
1967:
1954:
1950:
1949:
1944:
1937:
1934:
1923:
1916:
1913:
1902:
1898:
1892:
1889:
1884:
1878:
1875:
1870:
1868:0-7645-4660-0
1864:
1860:
1856:
1855:
1847:
1844:
1839:
1832:
1829:
1824:
1820:
1813:
1810:
1799:on 2013-09-14
1798:
1794:
1790:
1783:
1780:
1775:
1769:
1764:
1761:
1756:
1750:
1745:
1742:
1737:
1731:
1726:
1723:
1718:
1713:, p. 48.
1712:
1707:
1704:
1699:
1693:
1688:
1685:
1680:
1674:
1672:
1665:
1663:
1659:
1654:
1649:, p. 45.
1648:
1643:
1640:
1635:
1629:
1628:Terasaki 2013
1624:
1621:
1616:
1610:
1609:Terasaki 2013
1605:
1602:
1598:
1587:. landley.net
1586:
1579:
1577:
1573:
1568:
1564:
1560:
1553:
1550:
1546:
1535:
1534:Computerworld
1531:
1524:
1521:
1510:on 2021-10-27
1509:
1505:
1501:
1500:
1495:
1489:
1486:
1481:
1477:
1473:
1472:
1467:
1461:
1458:
1453:
1449:
1445:
1441:
1437:
1433:
1429:
1425:
1418:
1415:
1410:
1403:
1400:
1388:
1381:
1378:
1374:
1372:
1358:
1354:
1350:
1344:
1341:
1336:
1329:
1326:
1321:
1317:
1313:
1309:
1308:
1300:
1297:
1285:
1281:
1275:
1272:
1268:
1255:
1251:
1247:
1241:
1238:
1234:
1230:
1228:0-262-53203-4
1224:
1220:
1216:
1212:
1211:
1203:
1200:
1187:
1183:
1179:
1172:
1169:
1157:
1151:
1147:
1143:
1136:
1134:
1130:
1123:
1118:
1115:
1113:
1110:
1108:
1105:
1103:
1100:
1098:
1095:
1094:
1089:
1087:
1083:
1081:
1077:
1072:
1070:
1065:
1062:
1061:free software
1058:
1052:
1044:
1042:
1040:
1036:
1032:
1028:
1024:
1020:
1016:
1012:
1008:
1004:
999:
997:
993:
989:
985:
981:
975:
967:
965:
963:
959:
955:
947:
945:
943:
937:
929:
927:
925:
921:
912:
908:
907:
906:
904:
900:
896:
891:
889:
885:
881:
873:
871:
869:
865:
864:trade secrets
861:
857:
851:
847:
839:
836:
828:
826:
824:
819:
815:
812:
808:
802:
794:
792:
790:
786:
782:
778:
774:
770:
766:
762:
758:
754:
749:
747:
743:
739:
734:
732:
728:
724:
719:
715:
710:
707:
703:
699:
694:
688:
686:
682:
678:
674:
670:
664:
660:
652:
647:
644:
641:
637:
634:
630:
627:
624:
620:
617:
614:
613:
612:
609:
606:
604:
600:
596:
592:
585:
581:
577:
569:
567:
565:
557:
555:
553:
549:
545:
544:copyright law
537:
535:
533:
529:
525:
521:
517:
513:
509:
505:
501:
497:
492:
490:
489:trade secrets
486:
482:
478:
472:
468:
464:
460:
452:
450:
448:
443:
439:
435:
427:
425:
423:
419:
415:
411:
407:
403:
394:
389:
384:
380:
376:
372:
368:
364:
362:
358:
350:
346:
341:
334:
325:
323:
320:
316:
315:United States
311:
309:
304:
302:
298:
295:According to
293:
291:
287:
283:
279:
275:
271:
267:
263:
261:
257:
252:
250:
246:
242:
234:
227:
224:
221:
219:
216:
214:
211:
209:
206:
204:
200:
196:
192:
189:
187:
183:
180:
178:
174:
171:
169:
165:
161:
158:
156:
152:
148:
145:
142:
140:
134:
133:Noncommercial
131:
128:
125:
123:
120:
118:
114:
113:Public domain
111:
109:
108:
102:
97:
96:
90:
88:
86:
82:
78:
74:
70:
66:
61:
59:
55:
51:
47:
43:
37:
33:
19:
4079:
4072:
4040:
3992:
3923:Free license
3669:Android apps
3329:Trojan horse
3258:File sharing
3220:Postcardware
3208:Donationware
3183:Crowdfunding
3134:
3130:License-free
3019:. Retrieved
3013:
3007:
2999:the original
2985:
2971:
2962:
2956:. Retrieved
2950:
2942:
2934:
2928:. Retrieved
2918:
2907:. Retrieved
2903:the original
2892:
2884:
2878:. Retrieved
2874:the original
2863:
2847:, 255, 259.
2838:
2827:
2819:
2814:November 24,
2812:. Retrieved
2808:the original
2797:
2788:
2783:December 22,
2781:. Retrieved
2777:the original
2766:
2757:
2750:. Retrieved
2746:the original
2735:
2723:. Retrieved
2719:the original
2714:The Inquirer
2712:
2702:
2690:. Retrieved
2686:the original
2681:
2671:
2659:. Retrieved
2649:
2638:. Retrieved
2628:
2619:
2613:. Retrieved
2603:
2592:. Retrieved
2588:the original
2583:
2573:
2561:. Retrieved
2554:the original
2537:
2525:. Retrieved
2521:
2499:
2492:. Retrieved
2488:the original
2484:TechRepublic
2483:
2473:
2463:– via
2457:. Retrieved
2438:
2419:
2411:The Guardian
2410:
2400:
2392:The Guardian
2391:
2378:
2366:. Retrieved
2355:
2343:. Retrieved
2332:
2323:
2313:
2304:
2295:
2284:. Retrieved
2274:
2266:
2260:. Retrieved
2253:the original
2232:
2228:
2215:
2203:. Retrieved
2199:
2189:
2179:, retrieved
2171:
2161:
2152:
2146:. Retrieved
2139:
2123:
2112:. Retrieved
2105:
2089:
2080:
2070:
2061:
2055:. Retrieved
2045:
2037:
2017:
2013:
2007:
1998:
1992:. Retrieved
1981:
1969:
1959:November 29,
1957:. Retrieved
1952:
1946:
1936:
1925:. Retrieved
1915:
1904:. Retrieved
1891:
1877:
1853:
1846:
1831:
1823:the original
1812:
1801:. Retrieved
1797:the original
1792:
1782:
1770:, p. 2.
1763:
1744:
1725:
1706:
1694:, p. 4.
1687:
1670:
1642:
1623:
1604:
1595:
1589:. Retrieved
1562:
1552:
1543:
1537:. Retrieved
1523:
1512:. Retrieved
1508:the original
1503:
1498:
1488:
1480:the original
1475:
1470:
1460:
1452:the original
1431:
1427:
1417:
1408:
1402:
1390:. Retrieved
1380:
1371:'unbundled'
1370:
1368:
1361:. Retrieved
1357:the original
1343:
1334:
1328:
1314:(1): 57–58.
1311:
1305:
1299:
1288:. Retrieved
1283:
1274:
1265:
1260:November 12,
1258:, retrieved
1254:the original
1249:
1240:
1232:
1209:
1202:
1190:. Retrieved
1185:
1181:
1171:
1159:. Retrieved
1145:
1084:
1073:
1066:
1054:
1000:
977:
951:
941:
939:
917:
892:
877:
856:incompatible
853:
816:
813:
810:
750:
735:
711:
706:Secure Shell
689:
666:
633:Home Edition
610:
607:
599:hardware key
587:
561:
548:contract law
541:
524:trade secret
493:
481:contract law
474:
459:Software law
431:
398:
375:market share
354:
312:
305:
294:
278:Altair BASIC
264:
253:
238:
228:unpublished
144:Trade secret
80:
68:
62:
41:
40:
4013:Tivoization
3652:Video games
3627:Mathematics
3439:Product key
3369:End-of-life
3364:Abandonware
3314:Infostealer
3263:On-premises
3178:Crippleware
3135:Proprietary
3118:Open source
2951:Proprietary
2235:(6): 1490.
1250:Lease Genie
1031:Arx Fatalis
1023:open source
1019:id Software
1011:abandonware
1003:end-of-life
980:abandonware
974:Abandonware
911:Windows API
882:(API) is a
823:crippleware
681:source code
663:Crippleware
595:product key
580:Crippleware
538:Limitations
532:open-source
520:source code
453:Legal basis
367:object code
308:object-code
286:object code
117:equivalents
4125:Categories
3961:Challenges
3679:Commercial
3662:E-commerce
3647:Television
3346:Shovelware
3319:Ransomware
3283:Sneakernet
3021:2022-05-02
2958:2009-06-12
2930:2009-06-16
2909:2009-05-02
2880:2009-06-04
2640:2022-05-02
2615:2009-06-11
2594:2022-05-02
2459:12 January
2384:James Ball
2286:2009-06-03
2262:2009-07-27
2181:2010-06-09
2148:2009-04-29
2114:2009-04-29
2057:2017-05-01
1994:2009-06-03
1927:2017-05-01
1906:2017-05-01
1803:2008-05-19
1647:Boyle 2003
1591:2024-06-22
1539:2015-12-27
1514:2015-12-26
1290:2017-05-01
1217:. p.
1124:References
1049:See also:
920:iPhone SDK
903:Bill Gates
805:See also:
785:JavaScript
773:decompiled
657:See also:
629:Windows XP
349:Macromedia
266:Bill Gates
3891:standards
3889:Types and
3870:Unlicense
3865:Sleepycat
3699:Community
3394:Vaporware
3341:Scareware
3237:Trialware
3225:Shareware
2995:Microsoft
2964:freeware.
2725:August 2,
2501:scenario.
2141:Microsoft
2107:Microsoft
2081:Bloomberg
2020:(3): 20.
1692:Watt 2023
1669:Clohessy
1215:MIT Press
1080:Microsoft
1015:3D Realms
860:protocols
818:Shareware
801:Shareware
746:backdoors
693:vBulletin
646:iWork '09
500:clickwrap
477:copyright
345:beta test
256:antitrust
223:Copyright
150:Software
50:copyright
4110:Category
4027:Related
3908:Copyleft
3828:GNU LGPL
3823:GNU AGPL
3788:Beerware
3783:Artistic
3760:Licenses
3727:Advocacy
3674:iOS apps
3615:Wireless
3610:Graphics
3577:packages
3575:Software
3565:Timeline
3203:Careware
3193:Freeware
3188:Freemium
3098:Beerware
3090:Licenses
2835:(2004).
2563:June 17,
2063:license.
2034:19873766
1990:. Bitlaw
1567:Archived
1090:See also
1069:freeware
1027:freeware
914:instead.
789:run time
779:such as
765:bytecode
669:compiled
438:Sendmail
410:Sendmail
383:freemium
326:Licenses
218:CC BY-NC
213:CC BY-SA
127:Copyleft
77:CC BY-NC
46:software
4036:Forking
3818:GNU GPL
3712:History
3642:Routing
3605:Drivers
3560:Outline
3508:General
3324:Spyware
3309:Malware
3230:Nagware
2436:(ed.).
2249:1229351
1504:YouTube
1476:YouTube
1448:1372418
1392:May 28,
1363:May 28,
1192:29 June
1161:29 June
1142:"2.5.3"
868:patents
714:defects
485:patents
351:in 1995
135:license
4100:Portal
4029:topics
3850:Python
3773:Apache
3722:Events
3622:Health
3595:Codecs
3161:Adware
2851:
2752:May 2,
2692:May 2,
2661:May 2,
2527:May 2,
2494:May 2,
2450:
2368:May 2,
2364:. CNET
2345:May 2,
2341:. CNET
2247:
2205:May 2,
2032:
1865:
1671:et al.
1446:
1225:
1152:
740:, the
582:, and
530:" or "
487:, and
469:, and
422:kernel
245:leased
235:Origin
168:Apache
115:&
65:subset
3875:WTFPL
3585:Audio
2557:(PDF)
2546:(PDF)
2432:. In
2256:(PDF)
2245:JSTOR
2225:(PDF)
2176:(PDF)
2136:(PDF)
2102:(PDF)
2030:S2CID
1444:JSTOR
1182:AUUGN
958:macOS
954:Apple
640:Adobe
601:, or
434:MySQL
357:clear
208:CC BY
91:Types
3880:zlib
3803:CDDL
3778:APSL
3399:list
3334:Worm
3113:Free
2849:ISBN
2816:2012
2785:2012
2754:2022
2727:2012
2694:2022
2663:2022
2584:CNET
2565:2009
2529:2022
2496:2022
2461:2024
2448:ISBN
2370:2022
2347:2022
2207:2022
2200:CNET
1961:2011
1863:ISBN
1774:help
1755:help
1736:help
1717:help
1698:help
1679:help
1673:2020
1653:help
1634:help
1615:help
1432:1984
1394:2016
1365:2016
1262:2010
1223:ISBN
1194:2017
1163:2017
1150:ISBN
1037:and
1017:and
996:FOSS
909:The
893:The
848:and
769:Java
702:Pine
661:and
593:, a
528:free
447:Java
418:DHCP
406:BIND
402:UNIX
249:sold
201:PD,
186:AFPL
177:AGPL
153:PD,
58:EULA
52:and
3845:MPL
3840:MIT
3835:ISC
3808:EPL
3793:BSD
3768:AFL
2682:CRN
2237:doi
2022:doi
1955:: 4
1859:109
1436:doi
1353:IBM
1316:doi
1219:128
899:C++
783:or
781:PHP
742:NSA
716:or
546:or
534:."
377:in
268:' "
203:CC0
182:JRL
173:GPL
164:MIT
160:BSD
155:CC0
83:or
67:of
44:is
34:or
4127::
2993:.
2961:.
2933:.
2883:.
2845:52
2818:.
2787:.
2756:.
2711:.
2680:.
2618:.
2582:.
2548:.
2520:.
2508:^
2498:.
2482:.
2409:.
2390:.
2322:,
2303:.
2265:.
2243:.
2233:49
2231:.
2227:.
2198:.
2169:,
2151:.
2138:.
2104:.
2079:.
2060:.
2036:.
2028:.
2018:13
2016:.
1997:.
1951:.
1945:.
1861:.
1791:.
1661:^
1594:.
1575:^
1565:.
1561:.
1542:.
1532:.
1502:.
1474:.
1468:.
1442:,
1430:,
1426:,
1367:.
1351:.
1312:24
1310:.
1282:.
1264:,
1248:,
1231:.
1221:.
1186:24
1184:.
1180:.
1144:.
1132:^
1071:.
1041:.
1013:.
964:.
905::
870:.
825:.
791:.
748:.
733:.
605:.
578:,
554:.
510:.
483:,
465:,
461:,
436:,
416:,
412:,
408:,
303:.
292:.
184:,
175:,
166:,
162:,
87:.
3493:e
3486:t
3479:v
3074:e
3067:t
3060:v
3024:.
2949:"
2912:.
2857:.
2729:.
2696:.
2665:.
2643:.
2597:.
2567:.
2531:.
2467:.
2413:.
2394:.
2372:.
2349:.
2289:.
2239::
2209:.
2117:.
2083:.
2024::
1963:.
1953:1
1930:.
1909:.
1871:.
1806:.
1776:)
1757:)
1738:)
1719:)
1700:)
1681:)
1655:)
1636:)
1617:)
1517:.
1438::
1396:.
1322:.
1318::
1293:.
1196:.
1165:.
335:.
38:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.