Inside the Briefcase

2016 APM Reference Guide: Application Performance Monitoring

2016 APM Reference Guide: Application Performance Monitoring

IT Briefcase Analyst Report
This product guide allows you to...

IT Briefcase Exclusive Interview: Top IoT Trends and Predictions for Organizations in 2016

IT Briefcase Exclusive Interview: Top IoT Trends and Predictions for Organizations in 2016

with Mike Martin, nfrastructure
In this interview, Mike Martin,...

Unleash the Power of Global Content

Unleash the Power of Global Content

globeYour business depends on pushing accurate and dynamic content...

Clicking Away Your Right to Privacy

Clicking Away Your Right to Privacy

Before using any standard Internet service provider for e-mail...

Top Questions to Ask Before Implementing VoIP

Top Questions to Ask Before Implementing VoIP

Thinking about a move away from traditional phone lines...

Ho Do Android Tablets Score On GPL Compliance?

January 10, 2011 No Comments

There seems to be no stopping the current avalanche of Android tablets — just look through the CES announcements for a not-so-small sampling — and that’s undoubtedly a good thing for Linux.

A shadow was recently cast upon that otherwise sunny landscape, however, in the form of a report examining said tablets’ GPL compliance.

“The GPL requires that vendors either provide the source code to the GPL components with the device, or alternatively to provide a written offer to provide the source code upon request,” explained Red Hat (NYSE: RHT) employee and Linux kernel developer icon inline shop Ho Do Android Tablets Score On GPL Compliance? Matthew Garrett in an introduction to his analysis of today’s Android tablets. “Distributing devices without adhering to the copyright license of the associated software is copyright infringement, and doing so commercially is a criminal act in many countries.”

 Read more of Katherine Noyes’s blog post

Blogs

Leave a Reply

(required)

(required)


ADVERTISEMENT

AnDevCon


American Customer Festival 2016 New York

ITBriefcase Comparison Report

Cyber Security Exchange