Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The market is expected to balance out the total costs cost of ownership for equivalent software products. However, vendors of proprietary software often argue that although initial costs for OSS software may be lower, prolonged usage of proprietary software is simpler and maintenance fees are lower compared to the costs of using and ensuring support for OSS. Some organisations are hesitant to invest in the expertise and associated costs they often associate with using and maintaining OSS, even if the effort required is minimal. They often prefer to have an external organisation that they can hold accountable for software risks and problems. Generally, it is challenging to hold a vendor of commercial software liable unless software has been tailor-made for a single customer and very strict contractual commitments were have been made. However, proprietary software is usually accompanied by multiple levels of support without incurring additional charges.

...

  • Availability and lower costs – In cases of highly advanced or specialised needs, such as those related to research, new technologies and high loads, the market may lack a suitable commercial product that is available and sustainable. The immediate and cost-free availability of open source software is often accompanied by the need to develop internal expertise, which aligns but it should also align with the preferences of organisations and individuals. Alternatively, they can choose to hire external support and maintenance. Many users, particularly advanced ones, desire the ability to customise and adapt software, and they are often willing to debug and maintain it. In research and education, the cost of commercial licences, overheads related to their procurement and renewal and related commitments pose barriers for students, early researchers and small research groups. Access to the source code can also reduce the learning curve and enhance developers' effectiveness with the technology. Moreover, highly specialised or tailor-made software is often cost-prohibitive, even for large organisations, especially when a working solution can be achieved by combining and customising freely available building blocks. These factors have led to the widespread adoption of open source in advanced and specialised communities, the emergence of new usage scenarios, the commodification and componentisation of computing resources and execution platforms and the introduction of large toolsets or architectures with multiple components, such as those based on microservices.
  • Innovation and flexibility – Easy access to the source code empowers developers to add the features they need and incorporate novel ideas, algorithms and usage scenarios. They are not constrained by organisational, commercial or strategic limitations imposed by vendors of proprietary software, who may delay or decline to provide the required features. The more useful a new feature or solution is, the more developers and companies are likely to join and contribute. Increased contributions lead to better, more useful and more valuable results. This collaborative approach has proven effective even when contributors are not required to share their derivative works. Furthermore, individuals with a genuine need for specific improvements are often more motivated to provide creative and innovative solutions than those who are just paid to produce something.
  • Security and reliability through transparency When the source code is available, many people can scrutinise or debug it. This facilitates the detection of functional issues, security vulnerabilities and suboptimal solutions and enables their prompt resolution. Contributors are aware that their code will be reviewed by other experts, which encourages them to adhere to higher standards of quality. Each reviewer can learn from previous attempts and identify past mistakes. The non-obligatory nature of commitment to the project allows contributors to be incentivised to find better solutions , compared to those than developers bound by strict deadlines, commercial or other contextual limitations. Additionally, individuals with the necessary skills, prior knowledge, experience or familiarity with similar problems are often better equipped to detect and address issues or bugs than the original author. Many open source projects have dedicated reviewers who evaluate modifications before including them in the main codebase. These experts care about the code 's quality and can work at their own pace. These factors significantly enhance the security and reliability of open source software. In the event of a vulnerability being identified in an active open source project, the interested community members usually collaborate to promptly patch it. However, only those who keep up with the latest recommended versions, including the libraries they rely on, can benefit from this dynamic activity.
  • Longevity – Commercially licensed software can be retired by its vendor, who no longer supports it. The vendor may go out of business without selling its software to another company. In such situations, there is no way to update abandoned software, fix bugs, or adapt it to new uses or platforms. Support, patches and other related services are no longer available. Therefore, its usability can deteriorate quite rapidly and the user must decide when to invest in new software and migrate to it instead of living with the growing problems. In contrast, open source software is free to evolve continuously as anyone can access the source code and contribute to it. Even after it has been abandoned for some time, anyone can revive, adapt, fix or repurpose it. Many useful and widely used OSS have wide, active and stable user communities, including individuals, research groups and large and small companies.

The best example of all the aforementioned qualities is Linux, which is the operating system of the Cloudcloud, with a market share of over 90 per cent of servers on the Internet. Linux is free and supports innovation and flexibility by constantly updating its core and functions practically on any kind of hardware. It inherits a multiuser and scalable design nature from UNIX and it is very reliable, running for multiple months and even years without the need to restart the system.

...

Open source licences are licences that allow software to be freely used, modified and shared [https://opensource.org/licenses]. Although there are many "free software" and "open source software" licences recognised by the Free Software Foundation (FSF) and approved by the Open Source Initiative (OSI), only about a dozen of licences are used by the most popular software with strong communities. However, a single software project may include several components, which transitively include other components, resulting in the presence of many software licences. To be approved as open by OSI, software licences must meet certain criteria [https://opensource.org/osd]. But even open licences differ in terms of the rights and limitations they include, often regarding derivative works, such as modification of the original code or its use in new code. About half of the licences require disclosure of both the existing and new code to external users or when distributing the software, but they do not require this for private use. It should be noted that a few of them also consider access over the network as to be a use that implies the right to receive the source code. They also specify whether modifications or the code using the licensed code must be released under the same licence or a similar licence may be used. The scope of this may be limited to modifications of existing files, additions or any uses of a software library.

...

Pieces of software may modify or extend fragments of already existing software, which is similar to the creation of “derivatives” in CC licences. To preserve the integrity and ensure maintenance of the original work, open source licences often require derivative works to be distributed on the same terms under which the licensee was permitted access to the original work, such as the source code that was used (incorporated, copied or potentially modified) and the use of the resulting components, such as software libraries. While CC ND licences condition sharing and reuse as long as the content is left unchanged, a piece of software may use other software in many ways that do not require any modification or even the actual inclusion of the used software. A piece of software may depend on other software by relying on its definitions, contained specifications and interfaces or by invoking it , interfaces invoked through dynamic or static linking , or network communication and different types of interfaces and , or connectors. Therefore, software licences differ from those used for other types of work. They focus on different ways software may be used, and, when a specific type of use occurs, how it affects the licensing of other software that is using it and the scope of that impact. These terms include all conditions and obligations defined by the licence of used software. Open source licences guarantee the freedom to use, modify, and redistribute software. The main difference between permissive and copyleft licences lies in derivative work. Copyleft licences require the licensing of produced code under the same licence, while permissive ones do not have that kind of restriction. If the scope is narrow, it does not extend to all extensions of the used work or the entire software that uses the licensed material. Instead, it is limited to requiring the availability of modifications of the original work or the changed changes to existing files. The term used in this case is '"weak copyleft'". If the scope is broad, the licence of the used component and related conditions must be applied to all software that uses it. This is called '"strong copyleft'".

  • Public domain licences offer the most permissive model. Anyone can modify and use software without any restrictions. While a public domain licence offers the fullest degree of freedom to build upon and reuse software licensed in this manner, it is not always possible to waive all rights under some countries’ countries' laws and regulations. For In such cases, the CC0 licence can replace the public domain for all practical purposes. But even if a component is free and comes without any legal strings attached, one should always make sure it is secure before adding it to the codebase.
  • Permissive licences impose minimal requirements on how software may be modified or redistributed. Users do not have to republish the changes they make and usually only have to preserve the licence text and attribution to the original authors. They may provide a disclaimer and, with some licences, need to describe changes. This type of licence is used by almost two-thirds of open source software in circulation [https://www.synopsys.com/blogs/software-security/top-open-source-licenses/]. Permissive licences are popular due to the flexibility they offer to those who use such licensed software and the low IPR risk. These licences include the MIT (the most popular one, short and simple), Apache 2.0 (requires notice of changes, grants a license to patents unless litigating and mentions preservation of trademark rights), BSD (some versions require including the disclaimer), and ISC (along with its OpenBSD variant, which is a further simplification of MIT and BSD). The Artistic License (used for Perl and available in several variants of versions 1.0 and 2.0) is permissive, but it also includes compensation for damage. These licences are used by almost two-thirds of the OSS in circulation and account for the vast majority of external dependencies used in GÉANT projects.

  • Copyleft licences (also known as reciprocal licences or restrictive, protective and viral licences) allow the modification of the code and the distribution of new works based on it provided the requirements for redistribution under the same conditions are met. The intent is to ensure that rights that the user or modifier has benefited from are preserved in derivative works by disallowing the contributors to appropriate their changes and come in an asymmetric position to upstream contributors. This means that the newly produced code must be under the same or a compatible licence , and, therefore, available to users to modify or use for other purposes. Copyleft licences are often considered to be riskier in commercial settings, as they can limit potential business value or jeopardise the secrecy of intellectual property. All copyleft licences are used by more than one-third of open source software. They are less present in GÉANT projects, but even a single usage may have serious consequences impact on licensing options available to a software project.
    • Weak copyleft licences have a library or file scope. Examples are the LGPL (Lesser GNU General Public License; version 2.1 cleans text of 2.0 and allows dynamic linking without enforcing copyleft; version 3.0 grants the use of patents, it is not compatible with LGPL 2.0 but is with Apache 2.0 and the end-user must be able to install a modified version – it prohibits closed devices, DRM or hardware encryption or patents retaliation), EPL (Eclipse Public License 1.0 and 2.0), MPL (Mozilla Public License 1.0, 1.1 and 2.0 – it is simple, allows static linking and has licence variants with additional terms), Ms-PL (Microsoft Public License), Ms-RL (Microsoft Reciprocal License), and CDDL (Common Development and Distribution License 1.0 and 1.1) require releasing the modified code only, thus allowing the use of open source libraries in proprietary software. MPL, Ms-RL and CDDL require this only for the modifications of to existing files. Libraries under LGPL, EPL and Ms-RL allow proprietary licences for the code that is using them, but the original licence also extends to new files in a modified library.
    • On the other hand, strong copyleft licences often require releasing the entire project or product under the a licence that is the same or similar to the one that of the used work. Among the copyleft software, the use of strong copyleft licences significantly prevails. These licences intend to keep everyone on the same page and disallow a "free ride" which is still possible with permissive and weak copyleft licences. By introducing these restrictions, the creators of strong copyleft licences wanted to expand the presence of open source software, ensure the sustainability of the open source software ecosystem and strengthen the open source software movement. The most common and widely used licence is the GPL (GNU General Public License; version 2.0 is more often used; version 3.0 grants the use of patents, ; it is compatible with Apache 2.0 and ; the end-user must be able to install modified software).
    • AGPL (Affero General Public License 3.0) is similar to the GPL, but it is also network protective. Use over a network is considered a distribution, thus requiring modified code to be available to external users. It is becoming increasingly popular , as it closes the "ASP/SaaS loophole" of the GPL, which allows software under the GPL to be exploited without disclosure, as SaaS software by its nature is not distributed to users. The AGPL is, as stated in its preamble, “specifically designed to ensure cooperation with the community in the case of network server software.”

Highlight: It is important to fulfil the requirements of the chosen OSS licence and ensure that there is also licence compatibility. If you do not fulfil the licence requirements, you are breaching licensing conditions, which might lead to significant financial loss.

Source-available and

...

'fauxpen' licences

There are also non-OSS restrictive licences that are often presented or perceived as being similar to OSS but introduce limitations that prevent them from being open source according to the Open Source Initiative (OSI) and free according to the Free Software Foundation. Source available licences (or shared source licences) are proprietary licences that allow for source code to be viewed and, in some cases, modified and redistributed. They make the code available for viewing to facilitate scenarios such as inspection, understanding of functioning, debugging, integration or testing of external components. Examples of such restrictive licences are the Business Source License (BSL), Microsoft Limited Public License (Ms-LPL), Microsoft Limited Reciprocal License (Ms-LRL), and Microsoft Reference Source License (Ms-RSL). Some of these licences only grant rights to developers of Microsoft Windows-based software, while Ms-RSL allows viewing the source code for reference and debugging.

The user has no rights to use, share, modify or even compile the code. Having just access to the source code is not the essence of OSS, but ; it is having the full freedom to use it, including for commercial or disreputable purposes, as long as the same freedom is preserved for those who use or even possibly pay for the code in question.

‘Fauxpen’ 'Fauxpen' licences are similar to source-available licences. They are presented as open, but under closer scrutiny, it becomes clear that licensed software or product is effectively under the strict control of its vendor. These hybrid licences are intentionally deceptive and confusing. The Server Side Public License (SSPL) is a strong copyleft source available licence. It claims similarity with AGPL v3.0, except for article 13. While this article in AGPL requires the modified source code of programs used from network computers remotely to be made available to users, SSPL requires the public release of the source code of service management layers when providing a service. This restricts cloud providers from offering SSPL-licensed software to third parties as a service since it requires them to release under the SSPL the entirety of their source code, APIs and other software required for a user to run an instance of their service. SSPL also makes it impossible to use the Linux kernel, which is under the incompatible GPLv2-only licence. SSPL is therefore discriminatory toward towards a specific field of use. The Elastic License version 2 (ELv2) is a non-copyleft licence that prohibits providing the products to others as a managed service, circumventing the licence key functionality or removing or disabling features protected by licence keys.

The OSI's Open Source Definition rule 6 (“no discrimination against fields of endeavour”) and FSF’s the FSF's freedom zero (“the freedom to run the program as you wish, for any purpose”) clearly indicate that 'fauxpen' and source-available licences are not OSS. Providers of software who switch to such licences effectively transition projects that started as open source into proprietary licences and admit that their business models are inconsistent with open source. They claim to want to protect their work from unfair exploitation by cloud providers and other free riders who would use their software without backing its creation and maintenance. At the same time, they appropriate the contributions of external developers who have donated their time and energy by adding to projects while they were still open source. Additionally, these companies often utilise use code from other open source projects to power their businesses.

...

Products subjected to this bait-and-switch move became popular because they had been marketed as OSS, as developers prefer to be able to control whatever runs in their programs , and fix it or have other people fix it, even if they are not affiliated with the original maker of the tool or component. Such platforms gain traction as they typically provide free and comprehensive solutions, where expensive licences for commercial alternatives tend to add up and open source substitutes are less integrated. Even developers in large enterprises prefer using OSS over going through slow, bureaucratic and multi-layered approval and procurement procedures.

...

Highlight: The emergence of 'fauxpen' source licensing implies that access to updates of software under permissive licences and those with the ' sublicense ' option may be volatile in the long run if software is controlled by a single entity, as demonstrated in the cases of Elasticsearch and MongoDB. This is why it is crucial to carefully choose software that is guaranteed or, at least, most likely to remain OSS.

...

Copyright is a form of intellectual property that allows the legal creator of an original work to license that work to the extent governed by copyright law. Declaring copyright on a work does not require any registration or official notice but ; it simply requires clearly and visibly stating the copyright and defining its subject. The copyright can also be easily transferred to another party, typically through a contract or statement. Since open source licences already open up the work to anyone under clear conditions, copyrights as such are not a problem, but the exact details of these conditions are. The licensing concern related to copyright is whether the licence states it and how the text of the licence and copyright notice (with the original copyright and attribution marks) should be included with the licensed material and presented. For example, the inclusion of the copyright may be required only for the source code or may also include binaries.

...

  • Under copyright law, only the expression of ideas – not the ideas themselves – can be protected. Written works, software and art are protected by copyright. Patents protect specific inventions, that is, technical solutions providing exact instructions for solving a problem.
  • Since software is protected by copyright law, the wide variety of OSS licences with different requirements allows software developers to grant specific rights to other users as stated in the chosen licence , while still retaining their copyright-protected rights. Therefore, it is crucial for developers to clearly state the copyright along with the licence.

Patents are a much more complex form of intellectual property. An organisation or individual who invents something substantial, novel and useful proves this in through a regulated, expensive and time-consuming patent registration procedure. If this process is successful, a patent owner is granted the right to exclude others from making, using, selling, offering or making available the patented invention for a predefined period, such as 20 years, during which the patent may be subject to maintenance fees. A patent may provide the holder with associated royalties in terms of monetary compensation for its use, while its infringements are internationally enforceable and punishable in courts. Patent owners try to extend the boundaries of their patent and, at the same time, scan for infringements to maximise royalties and penalties, thus recovering the costs of patent registration or purchase, as well as maintenance, scanning and litigation. Therefore, there is always a risk of possible and even unknowing infringement of a patent by the licensor of software and, subsequently, their licensees.

Some licences describe the handling of potentially applicable patents and royalties, which removes at least some of the patent-related uncertainty. A licence may state that it does not grant any rights to the contributors’ contributors' patents or explicitly grant contributors’ the contributors' patent rights. Both models eliminate some uncertainties, but they do not resolve the patenting issue. The latter approach is an attempt to prevent the appropriation of innovation and software through patents. However, no software licence would protect a licensee against a claim of infringement brought by a third-party patent holder since licensors can only license works that belong to them. Since software patents are often vague, abstract and or ambiguous, they can be easily weaponised and may even protect concepts or methods of interacting with a system. Neither the licensor nor the licensee may be aware of such a patent, so a patent troll or a competitor with an applicable patent may appear at almost any moment.

Even if a patent holder has licensed that patent for use in open source software or the applied OSS licence waives any patent-related obligations, that patent may later be narrowed or cancelled through litigation by a holder of a rival patent. If this happens, even the licensee who has fully complied with the terms of the original licence and the licensor’s licensor's patent may become liable for infringement of a competing patent if they continue to use the affected software. Since the patent narrowing or cancellation would affect not only the holder of the original patent but also its licensees, licensees may want to participate in protecting the licensor’s licensor's patent. This can become expensive, and licensees may embark on such an endeavour only if their business would be seriously affected by the requirements of the competing patent holder.

...

  • Describe the circumstances in which the source code must be made available.
  • State whether the changes must be documented.
  • Describe the allowance or prohibition of using contributors' names, trademarks or logos.
  • Declare whether they include a limitation of liability. Some clearly state that there is no warranty and that the software creator cannot be held liable for damages. They explicitly assert that they do not offer any warranties or guarantees for using the code, so the author cannot be held liable if the code does not work well in some usageinstances.
  • Are peculiar in what they consider software usage or even constrain types of use (e.g., by prohibiting commercial, over-the-network or military usage), which disqualifies them from being considered real OSS licences.

...

Software relicensing is done for commercial reasons or to improve licence compatibility. In the first case, the change is typically towards a proprietary licence that is often blurred as a ’fauxpen’ 'fauxpen' or source-available licence. The result of such relicensing is the elimination of some previous uses or users.

...

Adding an alternative licence is not relicensing, as the old licence remains fully valid for those who decide to stick to it. Multi-licensing is, therefore, a better way to improve licence compatibility than relicensing. Furthermore, all contributors do not need to have previously signed a permissive licence or contributor agreement. Licences with an '"or later' " option are a concise form of multi-licensing in which all subsequent versions of the said licence are accepted in advance, including those that do not currently exist.

...

  • When using OSS solely for internal use, there is generally no immediate concern about licences since the code is not being shared with others. In this scenario, any OSS can be utilised without worrying about the licences of the components. As long as the code remains within the organisation and is not distributed to external parties, all OSS licences permit such internal usage.
  • However, it 's is important to recognise the limited nature of internal use. The use of software may evolve over time, potentially involving sharing or commercial arrangements with other parties. Therefore, it is important to consider licences early on if there is a possibility of offering software to others in the future. In such cases, it is necessary to gain an understanding of the licences associated with the components used and determine which licences align with the project's requirements. It is also wise to anticipate potential changes in software usage and consider the appropriate licence for such scenarios in advance.
  • If the creators ultimately decide to offer software to others, they may encounter components with incompatible licences, making it challenging to select a suitable licence for the product or project. Hence, it is of utmost importance to:
    • Initiate the consideration of licences and establish an overall approach towards OSS licences early in the development process.
    • Acquire knowledge about the licences of the utilised components and determine which licences are acceptable within the project's scope.
    • Determine a potential future licence in case the way software is used is changedchanges.

Sharing software with others

...

  • AGPL requires component/software developers to share their source code with the users when it is accessed via a network connection, including the cloud.
  • ‘Fauxpen’ 'Fauxpen' licences, like SSPL or ELv2, require service providers to make Service Source Code available in its entirety. This includes "management software, user interfaces, application program interfaces, automation software, monitoring software, backup software, storage software, and hosting software.”

...

  • Larger projects are more likely to address licensing issues and specify a licence. The portion of projects without a specified licence decreases with the number of monthly committers. It is at around 50% for a single committer, decreases to 40% for five committers, and stabilises at around 20% for projects with many contributors.
  • Permissively licensed projects are evenly distributed regardless of their size. They start at 20% for up to 10 monthly contributors, peak at about 25% for 20-30 contributors, and then return to the baseline.
  • The use of copyleft licences increases with the size of the active community. It starts at about 20%, increases grows to about 35% after 10 contributors, and reaches about 40% for projects with many contributors.

...

The utility of software is maximised when a wide range of users can benefit from it. However, OSS, like many other parts of the digital infrastructure, faces a free rider problem: “Resources are offered for free, and everybody (whether an individual developer or a large software company) uses them, so nobody is incentivised to contribute back, figuring that somebody else will step in.” [https://www.fordfoundation.org/work/learning/research-reports/roads-and-bridges-the-unseen-labor-behind-our-digital-infrastructure/]. Free riders have a competitive advantage since they did not invest in the original development, and can focus on developing additional benefits and services instead. While free riders do not exclude others from using the code, which is a non-exclusive common resource, they may deplete the original creator’s creator's access to users. Users turn into customers, who become an exhaustible common resource as they tend to stick to one provider. Customers contribute to the provider's income through various means defined by their business model. Although free riding is often seen as unfair, it is still preferable to have someone using use the creator’s creator's software rather than someone else’selse's. The presence of free riders makes it more likely that others will use software and some of them will contribute back. Therefore, software free riders, including competitors who capitalise on others’ others' work, may have a positive overall effect as they act as mediators towards other contributors and customers. A large user community attracts contributors, paying customers and even sponsors who may not have shown up otherwise. However, it is important to prevent competing free riders from suffocating the primary contributors. This can be achieved by making the original contributor's offering somewhat exclusive to incentivise users and customers to collaborate with them. Merely providing baseline software may not be sufficient; additional value and benefits should be offered. Therefore, the original contributors should go beyond simply providing the software itself. They can offer enhanced features, premium services, customization customisation options, specialized specialised support, or other unique advantages that differentiate their offering from competitors. By providing added value, they create a stronger incentive for users and customers to choose their solution over alternative options.

There is a growing number of companies whose business models are based on open source software. This model is known as commercial open source software. These companies typically offer additional proprietary or closed-source IP as part of their commercial offerings, which may include premium features and hosted services that provide performance, scalability, availability, productivity and security assurances. This approach is referred to as the "open core business model." Some companies also offer professional services, including maintenance and support assurances.

...

  • Permissively licensed software may start small, remain that way, or increase in terms of activity, but seem its growth seems to be somewhat limited by the optionality of returning modifications to the community.
  • Weak copyleft licences are suitable for libraries and other components whose popularity and utility would be significantly affected by the expansive licensing rules of strong copyleft licences. The use of weak copyleft licences for such products may therefore provide a fine balance between the wide broad applicability and the obligation to return to the community.
  • Strong copyleft licences are suitable for large or stand-alone products such as operating systems and specialised or productivity tools.

...

If a sufficiently influential member of the community has enough influence on a platform, they may decide to fork it under a ‘fauxpen’ 'fauxpen' proprietary licence that significantly constrains its use, at the same redirecting most current users to the fork and taking full control over new developments in it. The inadequacy of the original business model or the emergence of competing offers may drive some open source products product makers, who were seen as custodians by the corresponding communities, to make this move. This is possible with permissive licences that typically allow appropriation through relicensing. The appropriator does not even have to be the primary contributor to software but rather the one to whom most users refer for support or popular add-ons. A similar outcome may be caused by the extensive use of software as a part of another company's cloud offering, where the cloud provider effectively distributes and monetises open source software without meaningfully contributing back to it or by providing proprietary add-ons, which are typically limited to facilitating access to the platform within its cloud offering. The original "open core business model" provider may then shift to a network protective or ‘fauxpen’ 'fauxpen' licence. However, some projects with permissive licences, such as the Apache web server, have an extremely long lifespan and a huge community.

It is not possible to empirically determine whether copyleft or permissive licences contribute more to software longevity, as it depends on other circumstances. The choice of a licence that supports sustainability and longevity primarily depends on the attitude of the developers and the community, as well as the primary usage scenarios. Of course, sometimes this choice may not be available due to requirements imposed by the organisation, funder or dependencies. Interestingly, when the choice is available, it may depend more on intrinsic motivations and views about fairness rather than on extrinsic motivations like reputation or economic gain [https://opensource.com/law/13/8/motivation-free-software-licensing]. On the other hand, investing in interoperability and open standards can greatly aid project adoption, regardless of the licence.

...

The user base should not be overlooked, as it greatly contributes to the sustainability of permissive OSS. Users drive functionality, identify bugs and shape the project's direction to meet their needs. This can result in polished products that "just work"' with minimal configuration and customisation (since everyone is sharing the same expectations and conventions), as long as the target audience is large enough and there are other supporting factors contributing to the product ecosystem. However, assessing the size and engagement of the user community is often challenging. What is often easier to evaluate when choosing software, but difficult to foster when developing it, is the wider ecosystem around a project. This ecosystem can only be established through the engagement of other providers who offer support, consultancyconsulting, customisation, hosting or bundling of software with their products or services.

Besides the frequently emphasised doubts about OSS business models, some authors [Lanier, "You are not a gadget"] dispute open source and open content expropriation of intellectual production as a form of "Digital Maoism" that stifles small-scale entrepreneurship and destroyed destroys opportunities for the middle class to finance profit from content creation, resulting in the concentration of wealth in a few corporations and individuals who position themselves as content and service concentrators. However, this criticism should be directed more towards the centralisation of distribution and advertising platforms and the model of “free services” paid for by selling personal data and user profiles or using them for targeted marketing. Large concentrators depend on OSS like anyone else, but their core components are always proprietary. On the other hand, big tech companies frequently create or appropriate OSS platforms and tools for consumers and developers to lock customers into their ecosystems and technologies. Examples include some very popular application development tools, runtime environments, non-SQL data storage and processing platforms and AI platforms that are conveniently tied to companies’ companies' cloud offerings. Therefore, when a big tech company offers a habit-inducing OSS component or free platform, developers should consider whether they want to become ‘products’ 'products' again and be absorbed into the company’s company's ecosystem.

Scaling and sustaining open source projects remain challenging despite the general success and ubiquity of OSS.

...

Gather information (can be done with Mend)

  • Note the licence of the software project, product, the product (entire bundle of created components) or software project (one program or stand-alone component)individual components, if set.
  • Create an open source inventory of used components.
  • Detect security vulnerable open source components (to remove or replace).
  • Identify outdated open source libraries (to replace?).
  • Identify licences of used components (in-licences).
  • Clarify licensing ambiguities or doubts, such as those on the use or modification of libraries.
  • A tool may not be able to properly identify a licence ; in Mend, some are suspect or ambiguous.
  • Information about the applied a component's (or even your project's) licence may be false, unclear or contradictory.
  • Some licences may be recognised under several names.
  • Some (permissive) licences (BSD, Artistic, etc.) have unnumbered variants or are sometimes edited by authors.
  • The applicability of ‘or later’ licences "or later" licensing option may be unclear or even directly edited in the original licence text.

Document

  • Document gathered information - Mend does the above through reports, UI, and data exports.

    • Can be done with Mend or another suitable SCA tool, some details must be manually refined.

  • Document your decisions – some may be refined during remediation.

Remediate

  • Choose a product /or project licence (out-licence) compatible with key dependencies.
  • Make initial improvements.
  • Remedy vulnerable open source components.
  • Update outdated open source libraries (where possible).
  • Ask component authors to clarify their licence or to relicense.
  • Pay for the required proprietary licensed software.
  • Choose among dual licences of the available licences for dual- and multi-licensed components.
  • Identify the remaining incompatible licences:
    • Decide what to do with components that use these licences.
    • Remove (a component and or corresponding functionality ) if not necessary.
    • Replace a component with an existing equivalent.
    • Move a component or functionality to the server - side (central service).
    • Write your replacement.
  • Enforce open source licence compliance (e.g., provide all required compliance artefacts).
  • Accept some risks.

...

This best practice provides a simple outline of the actions that software teams need to take. These include scanning their projects for dependencies, licences and vulnerabilities using Software Composition Analysis (SCA) tools, analysing the results, remediating any detected issues, setting a LICENSE file in projects, declaring the licence in their source code and repositories and tracking and maintaining licence conformance through internal checks and appropriate tools. All these actions should align with the declared licence, the GÉANT IPR Policy and with the support of the WP9 Task 2 Open Source Licensing Support and the GÉANT IPR Coordinator.

...

  1. Familiarise yourself with the licences of the libraries and other software included in your product.
    1. Ensure the team has a basic understanding and awareness of intellectual property rights (IPR) and the GÉANT IPR Policy. Use the available materials mentioned in this document and seek support from the GÉANT IPR Coordinator (iprcoordinator@geant.org).
    2. Identify, analyse and document the libraries used by applying a dedicated tool.
  2. Verify that the licences comply with the restrictions imposed by GÉANT and the licence compatibility requirements.
    1. Determine the general IPR orientation, such as permissive or copyleft licences and then select a specific tentative licence for the project/product (e.g., MIT or GPL3+).
    2. Review and document the current licences using a Software Composition Analysis (SCA) tool or by visiting the licensors' websites. Correct or refine the information in the tool or document and check their requirements and compatibility.
    3. Ensure compliance with the requirements stated in the applicable licences and the rules and recommendations of the GÉANT IPR Policy. Document the licence, include a copyright notice and publish code changes in the source code repository and on the software project website.
  3. Establish a system to track existing licences, adjustments and compliance.
    1. Promptly re-evaluate licence compliance if there are changes in the used libraries, licences or rules (as defined in policy or knowledge base).
    2. Detect, document and effectively communicate any changes.

...

...

The SQAaaS tool (Software Quality Assurance as a Service) [https://sqaaas.eosc-synergy.eu/] checks for the presence of a LICENSE file with an OSI-approved licence (although just compliance with the OSI Open Source Definition is required). Moreover, it checks, among others, the existence of:

...