[Fwd: Re: [CLUE-Talk] Copyright of SCO source code] (Forward from another list)

Kevin Cullis kevincu at orci.com
Thu Jul 24 20:28:39 MDT 2003


This has some interesting thoughts.

Fwd: [discuss] SCO suit and Palladium to delay growth of OOo]

-----Forwarded Message-----

> From: Christian Einfeldt <einfeldt at earthlink.net>
> To: discuss at openoffice.org, dev at marketing.openoffice.org
> Subject: [discuss] SCO suit and Palladium to delay growth of OOo
> Date: 24 Jul 2003 17:26:47 -0700
> 
> I'm a lawyer, and so I asked myself what I thought that SCO would hope 
> to achieve by filing its suit against IBM.  I'm sure that SCO would 
> say that they want to get paid for the "rights" which they supposedly 
> purchased, whatever those "rights" might be.
> 
> Of course, most people immediately think of a forced buy-out by IBM as 
> a way for SCO to increase its stock value, or a lucrative settlement 
> by IBM, which would allow SCO to then go bully SuSE, Red Hat, etc.
> 
> Those might be effective reasons for SCO to sue IBM.  But as I 
> considered the case from a legal procedural perspective, it occurred 
> to me that if I was the attorney for IBM, I would try to end the suit 
> quickly by filing a "motion for summary judgment" (or MSJ  for short).  
> This MSJ motion is like a mini-trial on the documents.  It is a way of 
> getting a case over quickly.  If IBM can prove to a judge that the 
> case stinks and doesn't deserve to go to a full trial, then a judge 
> might grant their MSJ, and stop the case right there.  
> 
> But in a big case like this case, there will be lots of depositions 
> (depos for short), lots of paper discovery, etc.  I am sure that the 
> paper file in this case would have to reach several filing cabinets 
> worth before IBM's attorneys would have enough documents to move 
> successfully for an MSJ, because that MSJ motion is very document 
> intensive.  You need lots of proof to win and get the case kicked out.
> 
> Lots of documents means lots of time.  How much time?  Oh, 18 to 24 
> months, easily.  Then I asked myself, what other significant event in 
> the computer world is going to happen in 18 to 24 months?  Answer:  
> Palladium-enabled Longhorn Windows is going to come out some time in 
> the spring or summer of 2005, which is just about 18 to 24 months from 
> now.  
> 
> Ooops, I thought,  this is not good.  Remember, MS is going to have to 
> persuade a whole lot of people to stop using non-Palladium computers, 
> because Palladium will only work on Palladium enabled computers.  
> Think of all the operating systems which won't run Palladium:  Win 95, 
> 98, 2000, XP, Unix, Linux, Solaris, Tron, and Mac OS X and lower.  In 
> order for those operating systems to view any Palladium "protected" 
> (read locked) file, those operating systems will, themselves, need to 
> run Palladium.  
> 
> Well, okay, so what if MS doesn't make Palladium able to run on those 
> operating systems?  Answer:  IT WILL BE A WAR OF NUMBERS.   Whoever 
> has the widest shipments and /or install base wins.  If Linux reaches, 
> say, 50% of the desktop install base by 2005 (not realistic) then MS 
> will not be able to ignore that much of the desktop market.  
> 
> However, say that Linux only reaches 7% of the desktop market, which, 
> according to Bart Decrem's scholarly July 10 2003 article, is still 
> perhaps not realistic.  MS won't hestitate to lock out 7% of the 
> desktop market.  They can afford ignore that much of the market.
> 
> And yet.  Won't MS also have to win over all the users of Win 95, 98, 
> 2000, etc, etc?  Sure.  That's a huge percentage of the market.  But 
> MS is already making noises about stopping support for old MS 
> software, and refusing to guarantee backwards compatibility for its 
> old MS software.  MS is planning ahead, preparing the market to get 
> ready for the Brave New World.  After all, in 2005, Win 95 will be 10 
> years old!  
> 
> In 2005, MS will be better poised to say to Harry Homeowner, "come on 
> guy, get with the program!  Win 95 is OLD OLD OLD!  Don't hang on to 
> that old software?  And Win 98 ain't much better!  Time to update!"
> 
> We can count on MS making a major push to celebrate 10 years since Win 
> 95.  Remember the huge MS media blitz for Win 95?  They bought the 
> rights to use "Start Me up" by the Rolling Stones, and the Stones 
> ain't a cheap date.  Count on the media blitz for Longhorn Windows to 
> dwarf the Win 95 rollout.
> 
> How much money will MS spend to blitz Longhorn?  Plenty.  Even the 
> conservatives over at Barron's Weekly aren't laughing any more at the 
> huge pile of cash which MS has hoarded.  Barron's June 30 edition took 
> MS to task for not issuing a signficant dividend.  MS says that they 
> can't issue a huge dividend yet because they have too many lawsuits 
> against them, and the European Community is still considering its 
> anti-trust actions.  Barron's was non exactly buying MS's excuse for 
> not paying dividends, and not-so-subletly suggested that MS needs to 
> act like a more "mature" stock market giant and issue dividends, ala 
> General Electric, etc. 
> 
> So just why _is_ MS hoarding all that cash?  I don't buy the lawsuit 
> excuse either.  I think that, as Barron's said, in the worst case 
> scenario MS could buy its way out of all its combined lawsuits with $5 
> billion easily, and the Wall Street Journal just this week said that 
> MS has nearly $50 billion socked away as of June 30, 2003.  If that's 
> true, MS could pay all its outstanding lawsuits with only one-tenth 
> its cash reserves.  So just what _is_ MS waiting for? 
> 
> Well, the Superbowl is now held in February.  How about a Superbowl 
> blowout for Windows Longhorn in February 2005?  How much did MS spend 
> on the Win 95 rollout?  According to this article linked below, it was 
> HALF of what they spent on Win XP, and that was only hundreds of 
> millions of dollars.  In other words, less than $1 billion, by far.  
> So even if MS _doubled_ the amount that they spent on launching Win 
> XP, it will still only reach about $1 billion, or a mere one-fiftieth 
> of what they have in the bank right now.  (See following link).
> 
> http://www.thestandard.com/article/0,1902,24334,00.html
> 
> MS plans to spend $5.2 billion in 2003 on "R & D" on issues including 
> Longhorn.  See link below.  If they're willing to spend that much on 
> so-called "R&D", how much would they be willing to spend to move the 
> market to accept Longhorn?  Plenty.  
> 
> MS to spend $5.2 billion on "R&D" including Longhorn:
> 
> http://www.epasaule.lv/article/articleview/555/1/61/
> 
> So we know that the SCO suit will last easily 18 to 24 months, AT 
> LEAST.  We know that MS has been a substantial financial backer of the 
> SCO suit.  We know that Palladium-enabled Longhorn is coming out about 
> 18 to 24 months from now.  It looks to me as if the SCO suit and 
> Palladium are turning out to be MS's one-two punch to try to keep 
> Linux off the desktop and to then take market share away from all 
> servers not Palladium-enabled.  
> 
> The hope is that Harry Homeowner will somehow be able to understand 
> Palladium, and that he will not be tickled by the power Palladium 
> gives to MS.  The excerped NY Times article below might at least get 
> Harry's mind off of baseball long enough to then read Ross Anderson's 
> famous faq, linked below above the NY Times article.
> 
> http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
> 
> Here are portions of the NY Times article on Palladium:
> 
> Microsoft pushes `trusted computing'. It says new system needed to
> protect security and privacy. But criticsquestion whether consumers
> should trust Microsoft. JOHN MARKOFF. NEWYORK TIMES NEWS SERVICE.
> SANFRANCISCO. Your next personal computer may well come with its own
> digital chaperone.
> 
> As PC makers prepare a new generation of desktop computers with 
> built-in
> hardware controls to protect data and digital entertainment from 
> illegal
> copying, the industry is also promising to keep information safe from
> tampering and help users avoid troublemakers in cyberspace.  Led by
> Microsoft and Intel calls the concept ``trusted computing."
> 
> The companies, joined by IBM, Hewlett-Packard, Advanced Micro Devices
> and others, argue that the new systems are necessary to protect
> entertainment content as well as safeguard corporate data and personal
> privacy against identity theft. Without such built-in controls, they
> say, Hollywood and the music business will refuse to make their 
> products
> available online.
> 
> But by entwining PC software and data in an impenetrable layer of
> encryption, critics argue, the companies may bedestroying the very
> openness that has been at the heartof computing in the three decades
> since the PC was introduced. There are simpler, less intrusive ways to
> prevent illicit file swapping over the Internet, they say, than girding
> software in so much armour that new types of programs from upstart
> companies may have trouble working with it. "This will kill 
> innovation,"
> said Ross Anderson, a computer security expert atCambridge University,
> who is organizing opposition to the industry plans. "They're doing this
> to increase customer lock-in. It will mean that fewer software
> businesses succeed and those who do succeed will be large companies.''
> 
> Critics complain that the mainstream computer hardware andsoftware
> designers, under pressure from Hollywood, are turning the PC into
> something that would resemble video game players, cable TV and
> cellphones, with manufacturers or service providers in control of which
> applications run on their systems. In the new encrypted computing 
> world,
> even the most mundane word-processing document or e-mail message would
> be accompanied by a software security guard controlling who can view 
> it,
> where it can be sent and even when it will be erased. Also, the secure
> PC is specifically intended to protect digital movies and music from
> online piracy.
> 
> But while beneficial to the entertainment industry and corporate
> operations, the new systems willnot necessarily be immune to computer
> viruses or unwanted spam messages, the two most severe irritants to PC
> users."Microsoft's use of the term `trusted computing' is a great piece
> of doublespeak," said Dan Sokol, a computer engineer based in San Jose,
> Calif., who was one of the original members of the Homebrew Computing
> Club, the pioneering PC group. "What they're really saying is, `We 
> don't
> trust you, the user of this computer'.''
> 
> The advocates of trusted computing argue that the new technology is
> absolutely necessary to protect the privacy of users and to prevent the
> theft of valuable intellectual property, a reaction to the fact that
> making an identical digital copy is almost as easy as clicking a mouse
> button. "It's like having a little safe inside your computer," said Bob
> Meinschein, an Intel security architect. "On the corporate side the
> value is much clearer," he added, "but over time the consumer value of
> this technology will become clear as well" as more people shop and do
> other business transactions online.
> 
> Industry leaders also contend that none of this will stifle innovation.
> Instead, they say, it will help preserve and expand general-purpose
> computing in the Internet age. "We think this is a huge innovation
> story," said Mario Juarez, Microsoft's group product manager for the
> company's security business unit. "This is just an extension of the way
> the current version of Windows has provided innovation for players up
> and down the broad landscape of computing.''
> 
> The initiative is based on a new specification for personal computer
> hardware, first introduced in 2000 and backed by a group of companies
> called the Trusted Computing Group. It also revolves around a separate
> Microsoft plan, now called the Next Generation Secure Computing Base,
> that specifies a tamper-proof portion of the Windows operating system.
> 
> The hardwaresystem is contained in a set of separate electronics that
> are linked to the personal computer's microprocessor chip, known as the
> Trusted Platform Module, or TPM. The device includes secret digital 
> keys
> large binary numbers that cannot easily be altered.
> 
> The Trusted Computing Group is attempting to persuade other industries,
> like the mobile phone industry and the makers of personal digital
> assistants, to standardize on the technology as well. The plans reflect
> a shift by key elements of the personal computer industry, which in the
> past had resisted going along with the entertainment industry and what
> some said they feared would be draconian controls that would greatly
> curtail the power of digital consumer products.
> 
> Industry executives now argue that by embedding the digital keys
> directly in the hardware of thePC, tampering will be much more
> difficult. But they acknowledge that no security system is perfect. The
> hardware standard is actually the second effort by Intel to build
> security directly into the circuitry of the PC. The first effort ended
> in a public relations disaster for Intel in 1999 when consumers and
> civil liberties groups revolted against the idea. The groups coined the
> slogan "Big Brother Inside," and charged that the technology could be
> used to violate user privacy. "We don't like to make the connection,"
> said Meinschein. "But we did learn from it.''  He said the new TPM
> design requires the computer owner to switch on the newtechnology
> voluntarily and that it contains elaborate safeguards forprotecting
> individual identity.
> 
> The first computers based on thehardware design have just begun to
> appear from IBM and Hewlett-Packard for corporatecustomers.
> Consumer-oriented computer makers like Dell Computer and Gateway are
> being urged to go along but have not yet endorsed the new approach.
> 
> How consumers will react to the new technology is a thorny question for
> PCmakers because the new industry design stands in striking contrast to
> the approach being taken by AppleComputer. Apple has developed the
> popular iTunesdigital music store relying exclusively on software to
> restrict the sharing of digital songs over the Internet.
> 
> Apple's system, which has drawn the support of the recording industry,
> permits consumers to share songs freely among up to three Macintoshes
> and an iPod portable music player. Apple only has a tiny share of the
> personal computer market. But it continues to tweak the industry 
> leaders
> with its innovations.
> 
> Just last month, Apple's chief executive, Steve Jobs, demonstrated a
> feature of the company's newest version of its OS X operating system
> called FileVault, designed to protect a user's documents without the
> need for modifying computer hardware. Jobs argued that elaborate
> hardware-software schemeslike the one being pursued by the Trusted
> Computing Group will not achieve their purpose. "It's a falsehood," he
> said."You can prove to yourself that that hardware doesn't make it more
> secure.''
> 
> That is not Microsoft's view. The company has begun showing a
> test copy of a variation of its Windows operating system that was
> originally named Palladium. The name was changed last year after a
> trademark dispute. In an effort to retain the original open PC
> environment, the Microsoft plan offers the computer user two separate
> computing partitions in a future version of Windows.
> 
> Beyond changing the appearance and control of Windows, the system will
> also require a newgeneration of computer hardware, not only replacing
> the computer logic board but also peripherals like mice, keyboards and
> video cards. Executives at Microsoftsay they tentatively plan to 
> include
> the technology in the next version of Windows code-named Longhorn now
> due in 2005.
> 
> The company is dealing with both technical and marketing challenges
> presented by the new software security system. Forexample, Juarez, the
> Microsoft executive, said that if the company created a more secure 
> side
> to its operating system software, customers might draw the conclusion
> that its current software is not as safe to use.}\par Software
> developers and computer security experts,however, said they were not
> confident that Microsoft would retain its commitment to the open half 
> of
> what is planned to be a two-sided operating system.
> 
> "My hackles went up when I read Microsoft describing the trusted part 
> of
> the operating system as an option," said Mitch Kapor, the founder of
> Lotus Development Corp., and a longtime Microsoft competitor. "I don't
> think that's a trustworthy statement.'' One possibility, Kapor argued,
> is thatMicrosoft could release versions of applications like its Office
> suite of programs that would only run on the secure part of the
> operating system, forcing users to do their work in the more restricted
> environment.
> 
> Microsoft denies that it is hatching an elaborate scheme to deploy an
> ultra-secret hardware system simply to protect its software and
> Hollywood's digital content. The company also says the new system can
> help counter global cybercrime without creating the repressive "Big
> Brother" society imagined by George Orwell in ``1984.'' Microsoft is
> committed to "working withthe government and the entire industry to
> build a more secure computing infrastructure here and around the 
> world,"
> 
> Bill Gates, Microsoft's chairman, told a technology conference in
> Washington last week. "This technology can make our country more secure
> and prevent the nightmare vision of George Orwell at the same time.''
> 
> The critics are worried, however, that the rush to create more secure
> PCs may have unintended consequences.  Paradoxically, they say, the
> effortsto lock up data safely against piracy could serve to make it
> easier for pirates to operate covertly.
> 
> Indeed, the effectiveness of the effort to protect intellectual 
> property
> like music and movies has been challenged in two independent research
> papers. One was distributed last year by a group of Microsoft computer
> security researchers; a second paper was released last month by Harvard
> researchers. The research papers state that computer users who share
> files might use the new hardware-based security systems to create a
> ``Darknet," a secure, but illegal network for sharing digital movies 
> and
> music or other illicit information that could be exceptionally hard for
> security experts to crack.
> 
> "This is a Pandora's box and I don't think there has been much thought
> about what can go wrong," said Stuart Schechter, a Harvard researcher
> who is an author of one of the papers. "This is one of those rare times
> we can prevent something that will do more harm than good.''
> 
> `Microsoft's use of the term `trusted computing'is a great piece
> ofdoublespeak ... What they're really saying is, `We don't trust you,
> theuser of this computer' Dan Sokol, San Jose computer engineer.
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: discuss-unsubscribe at openoffice.org
> For additional commands, e-mail: discuss-help at openoffice.org
> 



More information about the clue-talk mailing list