Revision as of 12:06, 14 February 2008 editGronky (talk | contribs)12,157 editsm rm some duplicate and triplicate interwikis (in the case of triplicate, each was wrongly added since they were for a different topic "semi-free" - which may actually be a non-topic)← Previous edit | Latest revision as of 18:38, 9 January 2025 edit undoJacktheBrown (talk | contribs)Extended confirmed users, Pending changes reviewers, Rollbackers77,130 editsm Reverted edit by Patty09!jsy (talk) to last version by RsjaffeTags: Rollback Mobile edit Mobile web edit Advanced mobile edit | ||
Line 1: | Line 1: | ||
{{short description|Software released under a license restricting rights}} | |||
{{Refimprove|date=November 2007}} | |||
{{Redirect-confused|Non-free software|Commercial software|Business software}} | |||
{{POV|date=December 2007}} | |||
'''Proprietary software''' is ] that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern ] and ] to exclude the recipient from freely sharing the software or modifying it, and—in some cases, as is the case with some patent-encumbered and ]-bound software—from making use of the software on their own, thereby restricting their freedoms.<ref name="Experts">{{cite book|author=Saraswati Experts|title=COMPUTER SCIENCE WITH C++|chapter-url=https://books.google.com/books?id=OtlBDAAAQBAJ&pg=SA1-PA31|access-date=29 June 2017|publisher=Saraswati House Pvt Ltd|isbn=978-93-5199-877-8|pages=1.27|chapter=2.5.3}}</ref> | |||
Proprietary software is a ] of '''non-free software''', a term defined in contrast to ]; non-commercial licenses such as ] are not deemed proprietary, but are non-free. Proprietary software may either be '''closed-source software''' or ].<ref name="Experts" /><ref name="Felix AguilarInc.2003">{{cite journal |author=Brendan Scott |journal=AUUGN |volume=24 |issue=1 |date=March 2003 |publisher=AUUG, Inc. |title=Why Free Software's Long Run TCO must be lower |at=1. Definitions |access-date=29 June 2017 |url=https://books.google.com/books?id=C55YaWmDBiAC&pg=PA51}}</ref> | |||
'''Proprietary software''' is ] with restrictions on copying and modifying placed on it by the ]. These restrictions are enforced by either legal or technical means, and sometimes by both. The most common form of technical enforcement is by releasing only ] programs to users and withholding the human-readable ]. Means of legal enforcement can involve ], ] protection, and ] protection. | |||
== Types == | |||
'''Closed source''' is a term for software whose ] does not meet the definition of ]. Generally, it means only the ] of a ] are distributed and the license provides no access to the program's ], rendering modifications to the software technically impossible for practical purposes. The ''source code'' of such programs is usually regarded as a ] of the company. Access to source code by third parties commonly requires the party to sign a ]. | |||
{| class="wikitable" align=left style="width: 30%; height: 14em; margin-right: 1em " | |||
! | |||
! colspan="3" |] | |||
! colspan="3" |Non-free Licenses | |||
|- | |||
! !!] & ]!! ] !! ] (protective license) !! ] license !! {{no|}} ] !! ] | |||
|- | |||
! scope=row | Software | |||
| PD, ] || ], ], ] || ], ] || ], ] || {{no|}} proprietary software, no public license || private, internal software | |||
|- | |||
! scope=row | Other creative works | |||
| PD, ] || ] || ] || ] || {{no|}} ], no public license || unpublished | |||
|} | |||
{{clear}} | |||
==Details== | |||
Exclusive legal rights to software by a proprietor are not required for software to be proprietary, since ] and software under a ] can become proprietary software by distributing ] versions of the program without making the source code available. Proprietary software's restrictions make it an antonym of ]. For free software, the same laws used by proprietary software are used to preserve the freedoms to use, copy and modify the software. Proprietary software includes ] and ]. It can be ], but public domain and all other free software can also be sold for a price and be used for commercial purposes. | |||
== Origin == | |||
According to the ] (FSF), proprietary software is any software that does not meet its definitions of free software. The term's literal legal meaning covers software that has an owner who exercises control over what users can do with it. FSF's ] asserts that the restrictions of free software offer computer users freedom while the restrictions of other software benefit only the owner and are unethical.<ref>{{cite web|url=http://www.gnu.org/gnu/thegnuproject.html|title=The GNU Project|month=May|year=2005|publisher=]|accessdate=2006-06-09}}</ref> | |||
Until the late 1960s, computers—especially large and expensive ]s, machines in specially air-conditioned computer rooms—were usually ]d to customers rather than ].<ref name="Ceruzzi 2003"> | |||
{{Cite book | |||
Proponents of proprietary software, like ], argue that innovation is driven more quickly when it is lucrative. They claim that the best way to ensure this motivation is to tie revenue to innovation.<ref>{{cite web|url=http://www.microsoft.com/presspass/exec/craig/05-03sharedsource.mspx|title=The Commercial Software Model|month=May|year=2001|publisher=]|accessdate=2007-03-05}}</ref> The proprietor uses a temporary ] with copyright and sometimes ]s that makes the software more expensive.<ref>{{cite web|url=http://news.zdnet.com/2100-3513_22-5125160.html|title=In defense of proprietary software|month=December|year=2003|publisher=ZDNet|accessdate=2007-03-05}}</ref> A dependency on future versions and upgrades can make the monopoly permanent without the emergence of a competing software package, a situation termed "]". Proprietary software is said to create greater commercial activity over free software, especially in regard to market revenues.<ref>{{cite web|url=http://www.samspublishing.com/articles/article.asp?p=420290&seqNum=3&rl=1|title=Open Source Versus Commercial Software: Why Proprietary Software is Here to Stay|month=October|year=2005|publisher=Sams Publishing|accessdate=2007-03-05}}</ref> | |||
|first=Paul E. | |||
|last=Ceruzzi | |||
|title=A History of Modern Computing | |||
|year=2003 | |||
|publisher=] | |||
|location=Cambridge, MA | |||
|isbn=0-262-53203-4 | |||
|page= | |||
|quote=Although IBM agreed to sell its machines as part of a Consent Decree effective January 1956, leasing continued to be its preferred way of doing business.then everyone started fighting | |||
|url=https://archive.org/details/historyofmodernc00ceru_0/page/128 | |||
}}</ref><ref>{{citation | |||
|url=http://www.leasegenie.com/History_of_Leasing.html | |||
|title=The History of Equipment Leasing | |||
|work=Lease Genie |archive-url=https://web.archive.org/web/20080411024345/http://www.leasegenie.com/History_of_Leasing.html |archive-date=April 11, 2008 |url-status=dead | |||
|quote=In the 1960s, IBM and Xerox recognized that substantial sums could be made from the financing of their equipment. The leasing of computer and office equipment that occurred then was a significant contribution to leasings growth, since many companies were exposed to equipment leasing for the first time when they leased such equipment. | |||
|access-date=November 12, 2010}}</ref> Service and all software available were usually supplied by manufacturers without separate charge until 1969. Computer vendors usually provided the source code for installed software to customers.{{Citation needed|date=March 2017}} Customers who developed software often made it available to the public without charge.<ref>{{cite web|url=https://www.gnu.org/gnu/gnu-history.en.html |title=Overview of the GNU System |website=GNU Operating System |publisher=Free Software Foundation |date=2016-06-16 |access-date=2017-05-01}}</ref> Closed source means computer programs whose source code is not published except to licensees. It is available to be modified only by the organization that developed it and those licensed to use the software. | |||
In 1969, IBM, which had ] lawsuits pending against it, led an industry change by ]<ref name="Pugh2002">{{cite journal | |||
A variety of activation or licence management systems are emerging in proprietary software that prevent copyright infringement and determine how the software is used. If the proprietor ceases to exist or for any other reason does not provide keys for activation or to unlock discontinued products, legitimate users can be unable to re-activate existing software or use other hardware. | |||
|last=Pugh |first=Emerson W. | |||
|title=Origins of Software Bundling | |||
|journal=] | |||
|volume=24 |number=1 |date=2002|pages=57–58|doi=10.1109/85.988580}}</ref><ref name="Hamilton 1969">{{cite book | |||
|last=Hamilton |first=Thomas W. | |||
|title=IBM's Unbundling Decision: Consequences for Users and the Industry | |||
|publisher=Programming Sciences Corporation | |||
|date=1969 }}</ref> and services, by unbundling hardware and software.<ref>{{cite web | |||
|url=http://www-03.ibm.com/ibm/history/history/decade_1960.html | |||
|title=Chronological History of IBM: 1960s | |||
|publisher=] |date=n.d. | |||
|quote=Rather than offer hardware, services and software exclusively in packages, marketers ''' 'unbundled' ''' the components and offered them for sale individually. Unbundling gave birth to the multibillion-dollar software and services industries, of which IBM is today a world leader. | |||
|access-date=May 28, 2016 | |||
|archive-url=https://web.archive.org/web/20160703062451/http://www-03.ibm.com/ibm/history/history/decade_1960.html | |||
|archive-date=July 3, 2016 | |||
|url-status=dead | |||
}}</ref> | |||
]' "]" in 1976 decried computer hobbyists' rampant ] of software, particularly Microsoft's ] interpreter, and asserted that their unauthorized use hindered his ability to produce quality software. But the legal status of ], especially for ], was not clear until the 1983 appeals court ruling in ].<ref name="Gates 1976 open letter">{{cite web | |||
If the proprietor of a software package should cease to exist, or decide to cease or limit production or support for a proprietary software package, recipients and users of the package can be left at a disadvantage and have no recourse if problems are found with the software. Proprietors can fail to improve and support software because of business problems.<ref>{{cite web|url=http://www.newsforge.com/article.pl?sid=03/10/18/1814211&mode=nested&tid=132&tid=82&tid=89|title=What happens when a proprietary software company dies?|month=October|year=2003|publisher=NewsForge|accessdate=2007-03-05}}</ref> Companies also end their support for a product for business and organizational planning purposes. The consequence is also tied to enticing more to upgrade and pay for newer versions.<ref>{{cite web|url=http://informationweek.com/news/showArticle.jhtml;jsessionid=GL4O5EZFOXYJGQSNDLPSKH0CJUNN2JVN?articleID=196700071|title=Microsoft Turns Up The Heat On Windows 2000 Users|month=December|year=2006|publisher=InformationWeek|accessdate=2007-03-05}}</ref> | |||
|first=Bill |last=Gates | |||
|title=An Open Letter to Hobbyists | |||
|date=February 3, 1976 | |||
|url=https://upload.wikimedia.org/wikipedia/commons/1/14/Bill_Gates_Letter_to_Hobbyists.jpg | |||
|access-date=May 28, 2016}}</ref><ref>{{cite tech report|first=Matthew|last=Swann|title=Executable Code is Not the Proper Subject of Copyright Law|number=CPSLO-CSC-04-02|institution=Cal Poly State University|date=18 November 2004}}</ref><ref>{{citation|author=Pamela Samuelson|title=CONTU Revisited: The Case against Copyright Protection for Computer Programs in Machine-Readable Form|date=Sep 1984|journal=Duke Law Journal|volume=1984|number=4|pages=663–769|doi=10.2307/1372418|jstor=1372418|url=https://scholarship.law.berkeley.edu/facpubs/333 |url-status=dead |archive-url=https://web.archive.org/web/20170804014725/http://scholarship.law.berkeley.edu:80/facpubs/333/ |archive-date= Aug 4, 2017 }}</ref> | |||
According to ] the legal characteristic of software changed also due to the U.S. ].<ref name="Cringely">{{cite AV media |author=Robert X. Cringely |author-link=Robert X. Cringely |url=https://www.youtube.com/watch?v=-1jUr0JrYEk |title=Cringely's interview with Brewster Kahle |minutes=46 |website=YouTube |archive-url=https://web.archive.org/web/20190118221148/https://www.youtube.com/watch?v=-1jUr0JrYEk&gl=US&hl=en |archive-date=2019-01-18 |url-status=dead}}</ref> | |||
The practice is legal in most countries unless restricted by copyright or license. Some proponents of free software consider the practice immoral, and it was the impetus for the creation of "]" licenses. | |||
Starting in February 1983 IBM adopted an "]-only" model for a growing list of their software and stopped shipping much of the source code,<ref>{{cite AV media|url=https://www.youtube.com/watch?v=Pm8P4oCIY3g&t=3m15s | archive-url=https://ghostarchive.org/varchive/youtube/20211027/Pm8P4oCIY3g| archive-date=2021-10-27|title=Corporate Open Source Anti-patterns |first=Bryan |last=Cantrill |author-link=Bryan Cantrill |date=2014-09-17 |access-date=2015-12-26 |time=3:15 |website=YouTube}}{{cbignore}}</ref><ref>{{cite web|url=https://books.google.com/books?id=4Wgmey4obagC&q=1983object-only+model+IBM&pg=PA8 |publisher=] |first=John |last=Gallant |date=1985-03-18| access-date=2015-12-27 |title=IBM policy draws fire - Users say source code rules hamper change |quote=While IBM's policy of withholding source code for selected software products has already marked its second anniversary, users are only now beginning to cope with the impact of that decision. But whether or not the advent of object-code-only products has affected their day-to-day DP operations, some users remain angry about IBM's decision. Announced in February 1983, IBM's object-code-only policy has been applied to a growing list of Big Blue system software products}}</ref> even to licensees. | |||
== Nomenclature == | |||
In 1983, binary software became copyrightable in the ] as well by the ] law decision,<ref>{{Cite web |last=Hassett |first=Rob |date=Dec 18, 2012 |title=Impact of Apple vs. Franklin Decision |url=http://www.internetlegal.com/impact-of-apple-vs-franklin-decision/ |url-status=live |archive-url=https://web.archive.org/web/20230908092517/https://internetlegal.com/impact-of-apple-vs-franklin-decision/ |archive-date=Sep 8, 2023 |website=InternetLegal.com}}</ref> before which only source code was copyrightable.<ref name="landley2009">{{cite web|url=https://landley.net/notes-2009.html#23-05-2009 |first=Rob |last=Landley |publisher=landley.net |access-date=2024-06-22 |date=2009-05-23 |quote=So if open source used to be the norm back in the 1960's and 70's, how did this _change_? Where did proprietary software come from, and when, and how? How did Richard Stallman's little utopia at the MIT AI lab crumble and force him out into the wilderness to try to rebuild it? Two things changed in the early 80's: the exponentially growing installed base of microcomputer hardware reached critical mass around 1980, and a legal decision altered copyright law to cover binaries in 1983. Increasing volume: The microprocessor creates millions of identical computers |title=May 23, 2009}}</ref> Additionally, the growing availability of millions of computers based on the same microprocessor architecture created for the first time an unfragmented and big enough market for binary distributed software.<ref name="landley2009"/> | |||
The phrase "closed source" is ambiguous because it implies licensing where the source code to a program is unavailable. However, if taken as being an antonym to ], it refers to software that does not meet the ], which is a subtly different meaning. | |||
== Licenses == | |||
Microsoft's ] is an example of licensing where the source code is made available but not under an ]. If ''Closed source'' is interpreted as referring to software that does not meet the Open Source Definition, then ''Shared source'' is an example of ''Closed source'' licensing. However, if it is interpreted as simply referring to programs where the source code is not available, this isn't the case. | |||
=== Mixed-source software === | |||
Software distributions considered as proprietary may in fact incorporate a "mixed source" model including both free and non-free software in the same distribution.<ref>{{cite journal | |||
The term non-free software is used interchangeably, roughly as often by the ]. FSF founder ] sometimes uses the term "user subjugating software", while ] sometimes talks of "unfree software". The term "non-free" is often used by ] developers to describe any software whose license does not comply with ], and use "proprietary software" specifically for non-free software that provide no source code. The ] prefers the term "closed source software". Proprietary software vendors usually refer to their own software as ]. | |||
| last = Engelfriet | |||
| first = Arnoud | |||
| title = The best of both worlds | |||
| journal = Intellectual Asset Management (IAM) | |||
| issue = 19 | |||
| publisher = Gavin Stewart | |||
| date = August–September 2006 | |||
| url = http://www.iam-magazine.com/issues/article.ashx?g=64d0a423-1249-4de3-929c-91b57c15f702 | |||
| access-date = 2008-05-19 | |||
| archive-url = https://web.archive.org/web/20130914013626/http://www.iam-magazine.com/issues/Article.ashx?g=64d0a423-1249-4de3-929c-91b57c15f702 | |||
| archive-date = 2013-09-14 | |||
| url-status = dead | |||
}}</ref> Most if not all so-called proprietary ] distributions are mixed source software, bundling open-source components like ], ], ], ], and others along with a purely proprietary ] and system utilities.<ref>{{cite web | |||
| last = Loftus | |||
| first = Jack | |||
| title = Managing mixed source software stacks | |||
| publisher = LinuxWorld | |||
| date = 2007-02-19 | |||
| url = http://searchenterpriselinux.techtarget.com/news/article/0,289142,sid39_gci1244277,00.html | |||
| archive-url = https://web.archive.org/web/20100603162347/http://searchenterpriselinux.techtarget.com/news/article/0,289142,sid39_gci1244277,00.html | |||
| archive-date = 2010-06-03 | |||
| url-status = dead | |||
}}</ref><ref>{{cite web | |||
| last = Tan | |||
| first = Aaron | |||
| title = Novell: We're a 'mixed-source' company | |||
| publisher = CNET Networks, Inc | |||
| date = 2006-12-28 | |||
| url = http://www.zdnetasia.com/news/software/0,39044164,61977995,00.htm | |||
}}</ref> | |||
=== Multi-licensing === | |||
"Software hoarding" is a pejorative term for the act of keeping software proprietary coined by Richard Stallman in 1984 as a derisive critique of ], a company he actively opposed. While employed at ], Stallman had worked on a ] ] as part of the university's ] project. An agreement between MIT and Symbolics allowed Symbolics to use the code, and required the company to let the university review changes to it, but did not give the university rights to the changes themselves. | |||
Some free software packages are also simultaneously available under proprietary terms. Examples include ], ] and ssh. The original copyright holders for a work of free software, even copyleft free software, can use ] to allow themselves or others to redistribute proprietary versions. Non-copyleft free software (i.e. software distributed under a permissive free software license or released to the public domain) allows anyone to make proprietary redistributions.<ref name="rosenberg2000p109">{{cite book | |||
==Encumbered code==<!-- This section is linked from ] --> | |||
| last = Rosenberg | |||
| first = Donald | |||
| title = Open Source: The Unauthorized White Papers | |||
| publisher = IDG | |||
| year = 2000 | |||
| location = Foster City | |||
| page = | |||
| url = https://archive.org/details/opensourceunauth00rose/page/109 | |||
| isbn = 0-7645-4660-0 | |||
}}</ref><ref name="fsfandpublicdomain">{{cite web|url=https://www.gnu.org/philosophy/categories.html#PublicDomainSoftware |title=Categories of Free and Non-Free Software |publisher=GNU Project}}</ref> Free software that depends on proprietary software is considered "trapped" by the Free Software Foundation. This includes software written only for Microsoft Windows,<ref>{{cite web|url=https://www.gnu.org/licenses/gpl-faq.html#WindowsRuntimeAndGPL |title=Frequently Asked Questions about the GNU Licenses |author=Free Software Foundation |date=2009-05-05 |access-date=2017-05-01|author-link=Free Software Foundation }}</ref> or software that could only run on ], before it became free software.<ref>{{cite web|url=https://www.gnu.org/philosophy/java-trap.html |title=Free But Shackled - The Java Trap |author=Richard Stallman |date=2004-04-12 |access-date=2017-05-01}}</ref> | |||
== Legal basis == | |||
When a part of source or binary code used in an ] software is closed-source or ]ed (it is often the case for ]s, for example), it is referred as ''encumbered code''. Examples of such code are: | |||
{{Further|Software law|Software copyright|Software patent|End-user license agreement}} | |||
* Some ]s used in open-sourced ]s. | |||
Most of the software is covered by ] which, along with ], ], and ]s, provides legal basis for its owner to establish exclusive rights.<ref name="liberman">{{cite journal | |||
* Parts that were bought by the primary author from the third parties under non-free conditions at the time, when this author was not expecting to release the project as free software. This happened with ]. | |||
|last=Liberman | |||
|first=Michael | |||
|title=Overreaching Provisions in Software License Agreements | |||
|journal=] | |||
|volume=1 | |||
|year=1995 | |||
|page=4 | |||
|url=http://jolt.richmond.edu/v1i1/liberman.html | |||
|access-date=November 29, 2011 | |||
}}</ref> | |||
A software vendor delineates the specific terms of use in an ] (EULA). The user may agree to this contract in writing, interactively on screen (]), or by opening the box containing the software (]). License agreements are usually ].<ref>. IFLA (2013-01-22). Retrieved on 2013-06-16.</ref> ]s grant exclusive rights to algorithms, software features, or other ], with coverage varying by jurisdiction. Vendors sometimes grant patent rights to the user in the license agreement.<ref name="tysver">{{cite web | |||
== Semi-free software == | |||
| author = Daniel A. Tysver | |||
| publisher = Bitlaw | |||
| title = Why Protect Software Through Patents | |||
| date = 2008-11-23 | |||
| url = http://www.bitlaw.com/software-patent/why-patent.html | |||
| access-date = 2009-06-03 | |||
| quote = In connection with the software, an issued patent may prevent others from utilizing a certain algorithm (such as the GIF image compression algorithm) without permission, or may prevent others from creating software programs that perform a function in a certain way. In connection with computer software, copyright law can be used to prevent the total duplication of a software program, as well as the copying of a portion of software code.}}</ref> The ] for a piece of proprietary software is routinely handled as a ].<ref>{{Cite journal | |||
| first = S. | |||
| last = Donovan | |||
| title = Patent, copyright and trade secret protection for software | |||
| journal = IEEE Potentials | |||
| volume = 13 | |||
| issue = 3 | |||
| year = 1994 | |||
| page = 20 | |||
| quote = Essentially there are only three ways to protect computer software under the law: patent it, register a copyright for it, or keep it as a trade secret. | |||
| doi = 10.1109/45.310923 | |||
| s2cid = 19873766 | |||
}}</ref> Software can be made available with fewer restrictions on licensing or source-code access; software that satisfies certain conditions of freedom and openness is known as "]" or "]."<ref>{{cite web|url=http://www.gnu.org/licenses/why-assign.html |title=Why the FSF gets copyright assignments from contributors |author=Eben Moglen |date=2005-02-12 |access-date=2017-05-01 |quote= Under US copyright law, which is the law under which most free software programs have historically been first published, only the copyright holder or someone having assignment of the copyright can enforce the license.}}</ref> | |||
=== Limitations === | |||
''Semi-free software'', as defined by the ], is software that is not ], but comes with permission for individuals to use, copy, distribute, and modify (including distribution of modified versions) only for non-profit purposes.<ref>, definition by the Free Software Foundation</ref> (Such software is also not ] according to the definition of the ].) | |||
Since license agreements do not override applicable ] or ], provisions in conflict with applicable law are not enforceable.<ref>{{cite news| url=https://www.bloomberg.com/news/2012-07-03/oracle-can-t-stop-software-license-resales-eu-court-says-1-.html | work=Bloomberg | first=Aoife | last=White | title=Oracle Can't Stop Software License Resales, EU Court Says | date=2012-07-03}}</ref> Some software is specifically licensed and not sold, in order to avoid limitations of copyright such as the ].<ref>{{cite web | |||
| author = Microsoft Corporation | |||
| title = End-User License Agreement for Microsoft Software: Microsoft Windows XP Professional Edition Service Pack 2 | |||
| website = ] | |||
| page = Page 3 | |||
| date = 2005-04-01 | |||
| url = http://www.microsoft.com/about/legal/useterms/ | |||
| format = PDF | |||
| access-date = 2009-04-29 | |||
| author-link = Microsoft Corporation | |||
}}</ref> | |||
== Exclusive rights == | |||
], ], and ] are examples of semi-free programs. The Free Software Foundation classifies semi-free software as non-free software, but draws a distinction between semi-free software and proprietary software. | |||
The owner of proprietary software exercises certain ]s over the software. The owner can restrict the use, inspection of source code, modification of source code, and redistribution. | |||
=== Use of the software === | |||
== Examples == | |||
{{Further|Copy protection|Crippleware|Price discrimination}} | |||
Well known examples of proprietary software include ], ], ], ], ] (although the underlying ] system is free software), ] and some versions of ]. | |||
Vendors typically limit the number of computers on which software can be used, and prohibit the user from installing the software on extra computers.{{Citation needed|date=March 2012}} Restricted use is sometimes enforced through a technical measure, such as ], a ] or serial number, a ], or ]. | |||
Vendors may also distribute versions that remove particular features, or versions which allow only certain fields of endeavor, such as non-commercial, educational, or non-profit use. | |||
Some free software packages are also simultaneously available under proprietary terms. Examples include ], ] and ]. The original copyright holders for a work of free software, even copyleft free software, can use ] to allow themselves or others to redistribute proprietary versions. Non-copyleft free software, or software distributed under a permissive free software licence, allows anyone to make proprietary redistributions. | |||
Use restrictions vary by license: | |||
Some proprietary software comes with source code or provides offers to the source code. Users are free to use and even study and modify the software in these cases, but are restricted by either licenses or ]s from redistributing modifications or sharing the software. Examples include ], the ] ] license program, certain proprietary implementations of ssh and ]. | |||
* ] is restricted to running a maximum of three concurrent applications. | |||
Shareware, like freeware, is proprietary software available at zero price, but differs in that it is free only for a trial period, after which some restriction is imposed or it is completely disabled. | |||
* The retail edition of ] is limited to non-commercial use on up to three devices in one household. | |||
* ] can be installed on one computer, and limits the number of network file sharing connections to 10.<ref>{{cite web | |||
| author = Microsoft Corporation | |||
| title = End-User License Agreement for Microsoft Software: Microsoft Windows XP Professional Edition Service Pack 2 | |||
| website = ] | |||
| page = Page 1 | |||
| date = 2005-04-01 | |||
| url = http://www.microsoft.com/about/legal/useterms/ | |||
| format = PDF | |||
| access-date = 2009-04-29 | |||
| quote = You may install, use, access, display and run one copy of the Software on a single computer, such as a workstation, terminal or another device (“Workstation Computer”). The Software may not be used by more than two (2) processors at any one time on any single Workstation Computer. ... You may permit a maximum of ten (10) computers or other electronic devices (each a 'Device') to connect to the Workstation Computer to utilize one or more of the following services of the Software: File Services, Print Services, Internet Information Services, Internet Connection Sharing and telephony services.| author-link = Microsoft Corporation | |||
}}</ref> The ] disables features present in Windows XP Professional. | |||
* Traditionally, ] licenses are limited to one user, but allow the user to install a second copy on a home computer or laptop.<ref>{{citation | |||
|title = Adobe Software License Agreement | |||
|author = Adobe Systems | |||
|author-link = Adobe Systems | |||
|url = https://www.adobe.com/products/eulas/pdfs/gen_wwcombined_20091001_1604.pdf | |||
|access-date = 2010-06-09}}</ref> This is no longer true with the switching to Creative Cloud. | |||
* ], Apple's productivity suite, is available in a five-user family pack, for use on up to five computers in a household.<ref>{{cite web |last1=Parker |first1=Jason |title=Apple iWork '09 review: Apple iWork '09 |url=https://www.cnet.com/reviews/apple-iwork-09-review/ |website=CNET |access-date=May 2, 2022 |date=January 27, 2009}}</ref> | |||
=== Inspection and modification of source code === | |||
Proprietary software which is no longer marketed by its owner and is used without permission by users is called ] and may include source code. Some abandonware has its source code placed in the public domain either by its author or copyright holder and is therefore free software, not proprietary software. | |||
{{see also|Open-source software|Crippleware}} | |||
Vendors typically distribute proprietary software in ] form, usually the ] understood by the computer's ]. They typically retain the ], or human-readable version of the software, often written in a ].<ref>{{Cite journal | |||
| first = Ira V. | |||
| last = Heffan | |||
| title = Copyleft: Licensing Collaborative Works in the Digital Age | |||
| journal = Stanford Law Review | |||
| volume = 49 | |||
| issue = 6 | |||
| year = 1997 | |||
| page = 1490 | |||
| url = http://www.open-bar.org/docs/copyleft.pdf | |||
| quote = Under the proprietary software model, most software developers withhold their source code from users. | |||
| doi = 10.2307/1229351 | |||
| jstor = 1229351 | |||
| access-date = 2009-07-27 | |||
| archive-date = 2013-05-14 | |||
| archive-url = https://web.archive.org/web/20130514171754/http://www.open-bar.org/docs/copyleft.pdf | |||
| url-status = dead | |||
}}</ref> This scheme is often referred to as closed source.<ref name="dwheeler">{{cite web | |||
| author = David A. Wheeler | |||
| title = Free-Libre / Open Source Software (FLOSS) is Commercial Software | |||
| date = 2009-02-03 | |||
| url = http://www.dwheeler.com/essays/commercial-floss.html | |||
| access-date = 2009-06-03}}</ref> | |||
While most proprietary software is distributed without the source code, some vendors distribute the source code or otherwise make it available to customers. For example, users who have purchased a license for the Internet forum software ] can modify the source for their own site but cannot redistribute it. This is true for many web applications, which must be in source code form when being run by a web server. The source code is covered by a ] or a license that allows, for example, study and modification, but not redistribution.<ref>{{cite web | |||
==See also== | |||
<!-- What is the right cite for an announcement letter? --> |date=February 8, 1983 |title=Distribution of IBM Licensed Programs and Licensed Program Materials and Modified Agreement for IBM Licensed Programs |url=http://www.landley.net/history/mirror/ibm/oco.html |work=Announcement Letters |publisher=IBM |id=283-016}} | |||
</ref> The text-based email client ] and certain implementations of ] are distributed with proprietary licenses that make the source code available.{{Citation needed|date=March 2012}}Some licenses for proprietary software allow distributing changes to the source code, but only to others licensed for the product, and some<ref>{{citation | |||
| title = Module 24: SLAC Enhancements to and Beautifications of the IBM H-Level Assembler for Version 2.8 | |||
| author = Greg Mushial | |||
| date = July 20, 1983 | |||
| work = SLAC VM NOTEBOOK | |||
| publisher = Stanford Linear Accelerator Center | |||
| url = https://www.gsf-soft.com/Documents/SLAC-MODS.html | |||
}} | |||
</ref> of those modifications are eventually picked up by the vendor. | |||
Some governments fear that proprietary software may include ] or ] which would compromise sensitive information. In 2003 Microsoft established a Government Security Program (GSP) to allow governments to view source code and Microsoft security documentation, of which the ] was an early participant.<ref>{{cite web|last=Shankland|first=Stephen|title=Governments to see Windows code|url=https://www.cnet.com/tech/tech-industry/governments-to-see-windows-code/|publisher=CNET|date=January 30, 2003|access-date=May 2, 2022}}</ref><ref name=china>{{cite web|last=Gao|first=Ken|title=China to view Windows code|url=https://www.cnet.com/tech/tech-industry/china-to-view-windows-code/|date=February 28, 2003|publisher=CNET|access-date=May 2, 2022}}</ref> The program is part of Microsoft's broader ] which provides source code access for some products. The Reference Source License (Ms-RSL) and Limited Public License (Ms-LPL) are proprietary software licenses where the source code is ]. | |||
* ] | |||
* ] | |||
Governments have also been accused of adding such malware to software themselves. According to documents released by ], the ] has used covert partnerships with software companies to make commercial encryption software exploitable to eavesdropping, or to insert ].<ref>{{cite news | title=US and UK spy agencies defeat privacy and security on the internet | author=], Julian Borger and Glenn Greenwald | date=2013-09-06 | work=The Guardian | url=https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security}}</ref><ref>{{cite news | title=How to remain secure against NSA surveillance | author=Bruce Schneier | date=2013-09-06 | url=https://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance | work=The Guardian}}</ref> | |||
Software vendors sometimes use ] to impede users who would ] the software.<ref>{{cite conference |first1=Matthias |last1=Jacob |first2=Dan |last2=Boneh |first3=Edward |last3=Felten |author3-link=Edward Felten |editor-last=Feigenbaum |editor-first=Joan |editor-link=Joan Feigenbaum |chapter=Attacking an Obfuscated Cipher by Injecting Faults |title=Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers |conference=Second International Workshop on Digital Rights Management |date=30 October 2003 |series=Lecture Notes in Computer Science |volume=2696 |publisher=] |isbn=978-3-540-44993-5 |page=17 |chapter-url=https://archive.org/details/springer_10.1007-b11725/page/n26/mode/1up |url=https://archive.org/details/springer_10.1007-b11725 |language=en |via=] |access-date=12 January 2024}}</ref> This is particularly common with certain ]s.{{Citation needed|date=March 2012}} For example, the ] for programs written in ] can be easily ] to somewhat usable code,{{citation needed|date=November 2010}} and the source code for programs written in ]s such as ] or ] is available at ].<ref>{{cite web | |||
| author = Tony Patton | |||
| title = Protect your JavaScript with obfuscation | |||
| date = 2008-11-21 | |||
| url = https://www.techrepublic.com/article/protect-your-javascript-with-obfuscation/ | |||
|website=TechRepublic | |||
| archive-url = https://archive.today/20140315082054/http://www.techrepublic.com/blog/software-engineer/protect-your-javascript-with-obfuscation/ | |||
| archive-date = March 15, 2014 | |||
| access-date = May 2, 2022 | |||
| quote = While the Web promotes the sharing of such code, there are times when you or a client may not want to share their JavaScript code. This may be due to the sensitive nature of data within the code, proprietary calculations, or any other scenario. | |||
| url-status = dead | |||
}}</ref> | |||
=== Redistribution === | |||
{{Further|Shareware}} | |||
{{See also|Freely redistributable software}} | |||
Proprietary software vendors can prohibit the users from sharing the software with others. Another unique license is required for another party to use the software. | |||
In the case of proprietary software with source code available, the vendor may also prohibit customers from distributing their modifications to the source code. | |||
<!-- Keep consistent with definition at ]. --> | |||
] is closed-source software whose owner encourages redistribution at no cost, but which the user sometimes must pay to use after a trial period. The fee usually allows use by a single user or computer. In some cases, software features are restricted during or after the trial period, a practice sometimes called ]. | |||
== Interoperability with software and hardware == | |||
{{further|Interoperability#Software}} | |||
=== Proprietary file formats and protocols === | |||
{{Further|Proprietary format|Proprietary protocol}} | |||
Proprietary software often{{Citation needed|date=March 2012}} stores some of its data in file formats that are ] with other software, and may also communicate using ] which are incompatible. Such formats and protocols may be restricted as ]s or subject to ]s.{{Citation needed|date=March 2012}} | |||
=== Proprietary APIs === | |||
A proprietary ] (API) is a ] interface "specific to one device or, more likely to a number of devices within a particular manufacturer's product range."<ref name="techworld">{{cite web |last1=Orenstein |first1=David |title=Application Programming Interface |url=https://www.computerworld.com/article/2593623/application-programming-interface.html |website=Computerworld |access-date=May 2, 2022 |date=January 10, 2000}}</ref> The motivation for using a proprietary API can be ] or because standard APIs do not support the device's functionality.<ref name="techworld"/> | |||
The ], in its March 24, 2004, decision on Microsoft's business practices,<ref>{{cite web|url=http://ec.europa.eu/comm/competition/antitrust/cases/decisions/37792/en.pdf |title=Commission Decision of 24.03.2004 relating to a proceeding under Article 82 of the EC Treaty (Case COMP/C-3/37.792 Microsoft) |date=March 24, 2004 |publisher=] |access-date=June 17, 2009 |url-status=dead |archive-url=https://web.archive.org/web/20081028213407/http://ec.europa.eu/comm/competition/antitrust/cases/decisions/37792/en.pdf |archive-date=October 28, 2008 }}</ref> quotes, in paragraph 463, Microsoft general manager for ] development Aaron Contorer as stating in a February 21, 1997, internal Microsoft memo drafted for ]: | |||
:The ] is so broad, so deep, and so functional that most ISVs would be crazy not to use it. And it is so deeply embedded in the source code of many Windows apps that there is a huge switching cost to using a different operating system instead. | |||
Early versions of the ] were covered by a ]. The agreement forbade independent developers from discussing the content of the interfaces. Apple discontinued the NDA in October 2008.<ref name="nda">{{cite web | |||
|last=Wilson | |||
|first=Ben | |||
|title=Apple Drops NDA for Released iPhone Software | |||
|website=CNET | |||
|url=https://www.cnet.com/tech/mobile/apple-drops-nda-for-released-iphone-software/ | |||
|date=2008-10-01 | |||
|access-date=2022-05-02 | |||
|archive-url=https://web.archive.org/web/20130308181607/http://reviews.cnet.com/8301-19512_7-10115774-233.html | |||
|archive-date=2013-03-08 | |||
}}</ref> | |||
=== Vendor lock-in === | |||
{{Further|Vendor lock-in}} | |||
Any dependency on the future versions and upgrades for a proprietary software package can create ''vendor lock-in'', entrenching a monopoly position.<ref>{{cite web | |||
| author = The Linux Information Project | |||
| title = Vendor Lock-in Definition | |||
| date = 2006-04-29 | |||
| url = http://www.linfo.org/vendor_lockin.html | |||
| access-date = 2009-06-11 | |||
| quote = Vendor lock-in, or just lock-in, is the situation in which customers are dependent on a single manufacturer or supplier for some product This dependency is typically a result of standards that are controlled by the vendor It can grant the vendor some extent of monopoly power The best way for an organization to avoid becoming a victim of vendor lock-in is to use products that conform to free, industry-wide standards. Free standards are those that can be used by anyone and are not controlled by a single company. In the case of computers, this can usually be accomplished by using free software rather than proprietary software (i.e., commercial software).}}</ref> | |||
=== Software limited to certain hardware configurations === | |||
Proprietary software may also have licensing terms that limit the usage of that software to a specific set of hardware. ] has such a licensing model for ], an operating system which is limited to Apple hardware, both by licensing and various design decisions. This licensing model has been affirmed by the ].<ref>{{cite web | |||
| author = Don Reisinger | |||
| title = Apple wins key battle against Psystar over Mac clones | |||
| date = 2011-09-29 | |||
| url = https://www.cnet.com/home/smart-home/apple-wins-key-battle-against-psystar-over-mac-clones/ | |||
| access-date = 2022-05-02}}</ref> | |||
== Abandonment by proprietors == | |||
{{Main|Abandonware}} | |||
Proprietary software which is no longer marketed, supported or sold by its owner is called ], the digital form of ]. If the proprietor of a software package should cease to exist, or decide to cease or limit production or support for a proprietary software package, recipients and users of the package may have no recourse if problems are found with the software. Proprietors can fail to improve and support software because of business problems.<ref>{{cite web|url=https://www.linux.com/news/what-happens-when-proprietary-software-company-dies/|title=What happens when a proprietary software company dies?|date=October 24, 2003|publisher=Linux|access-date=May 2, 2022}}</ref> Support for older or existing versions of a software package may be ended to force users to upgrade and pay for newer versions<ref>{{cite web |last1=Livingston |first1=Brian |title=Microsoft Turns Up The Heat On Windows 2000 Users |url=https://www.crn.com/news/channel-programs/196700124/microsoft-turns-up-the-heat-on-windows-2000-users.htm |website=CRN |access-date=May 2, 2022 |date=December 15, 2006 |archive-url=https://web.archive.org/web/20220503022710/https://www.crn.com/news/channel-programs/196700124/microsoft-turns-up-the-heat-on-windows-2000-users.htm |archive-date=May 3, 2022 |url-status=dead}}</ref>(]). Sometimes another vendor or a software's community themselves can ] for the software, or the users can migrate to either competing systems with longer support life cycles or to ]-based systems.<ref>{{cite web |last=Cassia |first=Fernando |title=Open Source, the only weapon against 'planned obsolescence' |date=March 28, 2007 |website=] |url=http://www.theinquirer.net/inquirer/news/1001739/open-source-weapon-planned-obsolescence |access-date=August 2, 2012 |archive-url=https://web.archive.org/web/20121122142811/http://www.theinquirer.net/inquirer/news/1001739/open-source-weapon-planned-obsolescence |archive-date=November 22, 2012 |url-status=dead}}</ref> | |||
Some proprietary software is released by their owner at ] as open-source or ] software, often to prevent the software from becoming unsupported and unavailable ].<ref name="timcalltopower2">{{cite web|url=http://www.johnpbell.com/opening-the-source-of-art/ |title=Opening the Source of Art |date=October 1, 2009 |first=John |last=Bell |quote= that no further patches to the title would be forthcoming. The community was predictably upset. Instead of giving up on the game, users decided that if Activision wasn't going to fix the bugs, they would. They wanted to save the game by getting Activision to open the source so it could be kept alive beyond the point where Activision lost interest. With some help from members of the development team that were active on fan forums, they were eventually able to convince Activision to release Call to Power II's source code in October of 2003. |publisher=Technology Innovation Management Review |access-date=May 2, 2022 |archive-url=https://web.archive.org/web/20140330084636/http://timreview.ca/article/294 |archive-date=March 30, 2014 }}</ref><ref name="mythalive2004">{{cite web |url=http://linuxdevcenter.com/pub/a/linux/2004/06/10/mythdevelopers.html |title=Keeping the Myths Alive |first=Howard |last=Wen |date=June 10, 2004 |access-date=December 22, 2012 |publisher=Linux Dev Center |quote= fans of the Myth trilogy have taken this idea a step further: they have official access to the source code for the Myth games. Organized under the name MythDevelopers, this all-volunteer group of programmers, artists, and other talented people devote their time to improving and supporting further development of the Myth game series. |archive-url=https://web.archive.org/web/20130406161344/http://www.linuxdevcenter.com/pub/a/linux/2004/06/10/mythdevelopers.html |archive-date=April 6, 2013 }}</ref><ref name="home source">{{cite web|url=http://www.insidemacgames.com/news/story.php?ArticleID=8516 |title=Homeworld Source Code Released |date=October 8, 2003 |first=Andy |last=Largent |publisher=Inside Mac Games|access-date=November 24, 2012 |quote=With the release of Homeworld 2 for the PC, Relic Entertainment has decided to give back to their impressive fan community by releasing the source code to the original Homeworld. |archive-url=https://web.archive.org/web/20131012012745/http://www.insidemacgames.com/news/story.php?ArticleID=8516 |archive-date=October 12, 2013 |url-status=dead}}</ref> ] and ] are famous for the practice of releasing closed source software into the ].{{Explain|date=January 2018|reason=What does it mean to release into the open-source?}} Some of those kinds are free-of-charge downloads (]), some are still commercially sold (e.g. ]).{{Explain|date=January 2018|reason=Not clear where *Some of those kinds* refers to.}} More examples of formerly closed-source software in the ] and ]. | |||
== Pricing and economics == | |||
{{See also|Commercial software}} | |||
Proprietary software is not synonymous with ],<ref name="rosen2004">{{cite book | |||
| last = Rosen | |||
| first = Lawrence | |||
| author-link = Lawrence Rosen (attorney) | |||
| title = Open Source Licensing | |||
| publisher = Prentice Hall | |||
| year = 2004 | |||
| location = Upper Saddle River | |||
| pages = , 255, 259 | |||
| url = https://archive.org/details/opensourcelicens00rose_0 | |||
| url-access = registration | |||
| isbn = 978-0-13-148787-1 | |||
}}</ref><ref name="pennington2008">{{cite web | |||
| author = Havoc Pennington | |||
| title = Debian Tutorial | |||
| date = 2008-03-02 | |||
| url = http://www.debian.org/doc/manuals/debian-tutorial/ | |||
| access-date = 2009-06-04 | |||
| quote = It is important to distinguish commercial software from proprietary software. Proprietary software is non-free software, while commercial software is software sold for money. | |||
| archive-date = 2018-01-29 | |||
| archive-url = https://web.archive.org/web/20180129072039/https://www.debian.org/doc/manuals/debian-tutorial/ | |||
| url-status = dead | |||
}}</ref> although the two terms are sometimes used synonymously in articles about free software.<ref>{{cite web|author=Russell McOrmond |title=What is "Commercial Software"? |date=2000-01-04 |url=http://www.linuxtoday.com/developer/2000010400505NWSM |access-date=2009-05-02 |archive-url=https://web.archive.org/web/20121004013215/http://www.linuxtoday.com/developer/2000010400505NWSM |archive-date=2012-10-04 |url-status=dead}} {{cbignore | date=April 2014}}</ref><ref>{{cite web | |||
| author = Michael K. Johnson | |||
| title = Licenses and Copyright | |||
| date = 1996-09-01 | |||
| url = http://www.linuxjournal.com/article/1297 | |||
| access-date = 2009-06-16 | |||
| quote = If you program for Linux, you do need to understand licensing, no matter if you are writing free software or commercial software.}}</ref> Proprietary software can be distributed at no cost or for a fee, and ] can be distributed at no cost or for a fee.<ref name="jargon2003proprietary">{{cite web | |||
| author = Eric S. Raymond | |||
| title = ''Proprietary'', Jargon File | |||
| date = 2003-12-29 | |||
| url = http://www.catb.org/~esr/jargon/html/P/proprietary.html | |||
| access-date = 2009-06-12 | |||
| quote = Proprietary software should be distinguished from commercial software. It is possible for the software to be commercial without being proprietary. The reverse is also possible, for example in binary-only freeware.}}</ref> The difference is that whether proprietary software can be distributed, and what the fee would be, is at the proprietor's discretion. With free software, anyone who has a copy can decide whether, and how much, to charge for a copy or related services.<ref>{{cite web|url=https://www.gnu.org/philosophy/selling.html |title=Selling Free Software |publisher=GNU Project}}</ref> | |||
Proprietary software that comes for no cost is called ].<!-- Keep consistent with definition at ]. --> | |||
Proponents of commercial proprietary software argue that requiring users to pay for software as a product increases funding or time available for the ] of software. For example, ] says that per-copy fees maximize the profitability of software development.<ref>{{cite web|url=http://www.microsoft.com/presspass/exec/craig/05-03sharedsource.mspx|title=The Commercial Software Model|date=May 2001|publisher=]|archive-url=https://web.archive.org/web/20070305010226/http://www.microsoft.com/presspass/exec/craig/05-03sharedsource.mspx|archive-date=2007-03-05}}</ref> | |||
Proprietary software generally creates greater commercial activity over free software, especially in regard to market revenues.<ref>{{cite book | |||
|url=https://www.informit.com/articles/article.aspx?p=420290 | |||
|title=Open Source Versus Commercial Software: Why Proprietary Software is Here to Stay | |||
|date=October 2005 | |||
|publisher=Sams Publishing | |||
|access-date=2022-05-02}}</ref> Proprietary software is often sold with a license that gives the end user right to use the software. | |||
== See also == | |||
{{columns-list|colwidth=30em| | |||
* ] | |||
* ] | |||
* ] | |||
* ] | * ] | ||
* ] | * ] | ||
* ] | |||
* ] | |||
}} | |||
* ] | |||
* ] | |||
== |
==References== | ||
{{Reflist}} | |||
==External links== | |||
{{reflist}} | |||
*{{Commons category-inline}} | |||
{{ |
{{Software distribution}} | ||
{{FOSS}} | |||
{{DEFAULTSORT:Proprietary Software}} | |||
] | ] | ||
] | ] | ||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] | |||
] |
Latest revision as of 18:38, 9 January 2025
Software released under a license restricting rights "Non-free software" redirects here. Not to be confused with Commercial software or Business software.Proprietary software is software that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern copyright and intellectual property law to exclude the recipient from freely sharing the software or modifying it, and—in some cases, as is the case with some patent-encumbered and EULA-bound software—from making use of the software on their own, thereby restricting their freedoms.
Proprietary software is a subset of non-free software, a term defined in contrast to free and open-source software; non-commercial licenses such as CC BY-NC are not deemed proprietary, but are non-free. Proprietary software may either be closed-source software or source-available software.
Types
Free/Open Licenses | Non-free Licenses | |||||
---|---|---|---|---|---|---|
Public domain & equivalents | Permissive license | Copyleft (protective license) | Noncommercial license | Proprietary license | Trade secret | |
Software | PD, CC0 | BSD, MIT, Apache | GPL, AGPL | JRL, AFPL | proprietary software, no public license | private, internal software |
Other creative works | PD, CC0 | CC BY | CC BY-SA | CC BY-NC | Copyright, no public license | unpublished |
Origin
Until the late 1960s, computers—especially large and expensive mainframe computers, machines in specially air-conditioned computer rooms—were usually leased to customers rather than sold. Service and all software available were usually supplied by manufacturers without separate charge until 1969. Computer vendors usually provided the source code for installed software to customers. Customers who developed software often made it available to the public without charge. Closed source means computer programs whose source code is not published except to licensees. It is available to be modified only by the organization that developed it and those licensed to use the software.
In 1969, IBM, which had antitrust lawsuits pending against it, led an industry change by starting to charge separately for mainframe software and services, by unbundling hardware and software.
Bill Gates' "Open Letter to Hobbyists" in 1976 decried computer hobbyists' rampant copyright infringement of software, particularly Microsoft's Altair BASIC interpreter, and asserted that their unauthorized use hindered his ability to produce quality software. But the legal status of software copyright, especially for object code, was not clear until the 1983 appeals court ruling in Apple Computer, Inc. v. Franklin Computer Corp.
According to Brewster Kahle the legal characteristic of software changed also due to the U.S. Copyright Act of 1976.
Starting in February 1983 IBM adopted an "object-code-only" model for a growing list of their software and stopped shipping much of the source code, even to licensees.
In 1983, binary software became copyrightable in the United States as well by the Apple vs. Franklin law decision, before which only source code was copyrightable. Additionally, the growing availability of millions of computers based on the same microprocessor architecture created for the first time an unfragmented and big enough market for binary distributed software.
Licenses
Mixed-source software
Software distributions considered as proprietary may in fact incorporate a "mixed source" model including both free and non-free software in the same distribution. Most if not all so-called proprietary UNIX distributions are mixed source software, bundling open-source components like BIND, Sendmail, X Window System, DHCP, and others along with a purely proprietary kernel and system utilities.
Multi-licensing
Some free software packages are also simultaneously available under proprietary terms. Examples include MySQL, Sendmail and ssh. The original copyright holders for a work of free software, even copyleft free software, can use dual-licensing to allow themselves or others to redistribute proprietary versions. Non-copyleft free software (i.e. software distributed under a permissive free software license or released to the public domain) allows anyone to make proprietary redistributions. Free software that depends on proprietary software is considered "trapped" by the Free Software Foundation. This includes software written only for Microsoft Windows, or software that could only run on Java, before it became free software.
Legal basis
Further information: Software law, Software copyright, Software patent, and End-user license agreementMost of the software is covered by copyright which, along with contract law, patents, and trade secrets, provides legal basis for its owner to establish exclusive rights.
A software vendor delineates the specific terms of use in an end-user license agreement (EULA). The user may agree to this contract in writing, interactively on screen (clickwrap), or by opening the box containing the software (shrink wrap licensing). License agreements are usually not negotiable. Software patents grant exclusive rights to algorithms, software features, or other patentable subject matter, with coverage varying by jurisdiction. Vendors sometimes grant patent rights to the user in the license agreement. The source code for a piece of proprietary software is routinely handled as a trade secret. Software can be made available with fewer restrictions on licensing or source-code access; software that satisfies certain conditions of freedom and openness is known as "free" or "open-source."
Limitations
Since license agreements do not override applicable copyright law or contract law, provisions in conflict with applicable law are not enforceable. Some software is specifically licensed and not sold, in order to avoid limitations of copyright such as the first-sale doctrine.
Exclusive rights
The owner of proprietary software exercises certain exclusive rights over the software. The owner can restrict the use, inspection of source code, modification of source code, and redistribution.
Use of the software
Further information: Copy protection, Crippleware, and Price discriminationVendors typically limit the number of computers on which software can be used, and prohibit the user from installing the software on extra computers. Restricted use is sometimes enforced through a technical measure, such as product activation, a product key or serial number, a hardware key, or copy protection.
Vendors may also distribute versions that remove particular features, or versions which allow only certain fields of endeavor, such as non-commercial, educational, or non-profit use.
Use restrictions vary by license:
- Windows Vista Starter is restricted to running a maximum of three concurrent applications.
- The retail edition of Microsoft Office Home and Student 2007 is limited to non-commercial use on up to three devices in one household.
- Windows XP can be installed on one computer, and limits the number of network file sharing connections to 10. The Home Edition disables features present in Windows XP Professional.
- Traditionally, Adobe licenses are limited to one user, but allow the user to install a second copy on a home computer or laptop. This is no longer true with the switching to Creative Cloud.
- iWork '09, Apple's productivity suite, is available in a five-user family pack, for use on up to five computers in a household.
Inspection and modification of source code
See also: Open-source software and CripplewareVendors typically distribute proprietary software in compiled form, usually the machine language understood by the computer's central processing unit. They typically retain the source code, or human-readable version of the software, often written in a higher level programming language. This scheme is often referred to as closed source.
While most proprietary software is distributed without the source code, some vendors distribute the source code or otherwise make it available to customers. For example, users who have purchased a license for the Internet forum software vBulletin can modify the source for their own site but cannot redistribute it. This is true for many web applications, which must be in source code form when being run by a web server. The source code is covered by a non-disclosure agreement or a license that allows, for example, study and modification, but not redistribution. The text-based email client Pine and certain implementations of Secure Shell are distributed with proprietary licenses that make the source code available.Some licenses for proprietary software allow distributing changes to the source code, but only to others licensed for the product, and some of those modifications are eventually picked up by the vendor.
Some governments fear that proprietary software may include defects or malicious features which would compromise sensitive information. In 2003 Microsoft established a Government Security Program (GSP) to allow governments to view source code and Microsoft security documentation, of which the Chinese government was an early participant. The program is part of Microsoft's broader Shared Source Initiative which provides source code access for some products. The Reference Source License (Ms-RSL) and Limited Public License (Ms-LPL) are proprietary software licenses where the source code is made available.
Governments have also been accused of adding such malware to software themselves. According to documents released by Edward Snowden, the NSA has used covert partnerships with software companies to make commercial encryption software exploitable to eavesdropping, or to insert backdoors.
Software vendors sometimes use obfuscated code to impede users who would reverse engineer the software. This is particularly common with certain programming languages. For example, the bytecode for programs written in Java can be easily decompiled to somewhat usable code, and the source code for programs written in scripting languages such as PHP or JavaScript is available at run time.
Redistribution
Further information: Shareware See also: Freely redistributable softwareProprietary software vendors can prohibit the users from sharing the software with others. Another unique license is required for another party to use the software.
In the case of proprietary software with source code available, the vendor may also prohibit customers from distributing their modifications to the source code.
Shareware is closed-source software whose owner encourages redistribution at no cost, but which the user sometimes must pay to use after a trial period. The fee usually allows use by a single user or computer. In some cases, software features are restricted during or after the trial period, a practice sometimes called crippleware.
Interoperability with software and hardware
Further information: Interoperability § SoftwareProprietary file formats and protocols
Further information: Proprietary format and Proprietary protocolProprietary software often stores some of its data in file formats that are incompatible with other software, and may also communicate using protocols which are incompatible. Such formats and protocols may be restricted as trade secrets or subject to patents.
Proprietary APIs
A proprietary application programming interface (API) is a software library interface "specific to one device or, more likely to a number of devices within a particular manufacturer's product range." The motivation for using a proprietary API can be vendor lock-in or because standard APIs do not support the device's functionality.
The European Commission, in its March 24, 2004, decision on Microsoft's business practices, quotes, in paragraph 463, Microsoft general manager for C++ development Aaron Contorer as stating in a February 21, 1997, internal Microsoft memo drafted for Bill Gates:
- The Windows API is so broad, so deep, and so functional that most ISVs would be crazy not to use it. And it is so deeply embedded in the source code of many Windows apps that there is a huge switching cost to using a different operating system instead.
Early versions of the iPhone SDK were covered by a non-disclosure agreement. The agreement forbade independent developers from discussing the content of the interfaces. Apple discontinued the NDA in October 2008.
Vendor lock-in
Further information: Vendor lock-inAny dependency on the future versions and upgrades for a proprietary software package can create vendor lock-in, entrenching a monopoly position.
Software limited to certain hardware configurations
Proprietary software may also have licensing terms that limit the usage of that software to a specific set of hardware. Apple has such a licensing model for macOS, an operating system which is limited to Apple hardware, both by licensing and various design decisions. This licensing model has been affirmed by the United States Court of Appeals for the Ninth Circuit.
Abandonment by proprietors
Main article: AbandonwareProprietary software which is no longer marketed, supported or sold by its owner is called abandonware, the digital form of orphaned works. If the proprietor of a software package should cease to exist, or decide to cease or limit production or support for a proprietary software package, recipients and users of the package may have no recourse if problems are found with the software. Proprietors can fail to improve and support software because of business problems. Support for older or existing versions of a software package may be ended to force users to upgrade and pay for newer versions(planned obsolescence). Sometimes another vendor or a software's community themselves can provide support for the software, or the users can migrate to either competing systems with longer support life cycles or to FOSS-based systems.
Some proprietary software is released by their owner at end-of-life as open-source or source available software, often to prevent the software from becoming unsupported and unavailable abandonware. 3D Realms and id Software are famous for the practice of releasing closed source software into the open source. Some of those kinds are free-of-charge downloads (freeware), some are still commercially sold (e.g. Arx Fatalis). More examples of formerly closed-source software in the List of commercial software with available source code and List of commercial video games with available source code.
Pricing and economics
See also: Commercial softwareProprietary software is not synonymous with commercial software, although the two terms are sometimes used synonymously in articles about free software. Proprietary software can be distributed at no cost or for a fee, and free software can be distributed at no cost or for a fee. The difference is that whether proprietary software can be distributed, and what the fee would be, is at the proprietor's discretion. With free software, anyone who has a copy can decide whether, and how much, to charge for a copy or related services.
Proprietary software that comes for no cost is called freeware.
Proponents of commercial proprietary software argue that requiring users to pay for software as a product increases funding or time available for the research and development of software. For example, Microsoft says that per-copy fees maximize the profitability of software development.
Proprietary software generally creates greater commercial activity over free software, especially in regard to market revenues. Proprietary software is often sold with a license that gives the end user right to use the software.
See also
- Business software
- Commercial off-the-shelf
- Comparison of open-source and closed-source software
- Proprietary hardware
- Retail software
- Enshittification
References
- ^ Saraswati Experts. "2.5.3". COMPUTER SCIENCE WITH C++. Saraswati House Pvt Ltd. p. 1.27. ISBN 978-93-5199-877-8. Retrieved 29 June 2017.
- Brendan Scott (March 2003). "Why Free Software's Long Run TCO must be lower". AUUGN. 24 (1). AUUG, Inc. 1. Definitions. Retrieved 29 June 2017.
-
Ceruzzi, Paul E. (2003). A History of Modern Computing. Cambridge, MA: MIT Press. p. 128. ISBN 0-262-53203-4.
Although IBM agreed to sell its machines as part of a Consent Decree effective January 1956, leasing continued to be its preferred way of doing business.then everyone started fighting
- "The History of Equipment Leasing", Lease Genie, archived from the original on April 11, 2008, retrieved November 12, 2010,
In the 1960s, IBM and Xerox recognized that substantial sums could be made from the financing of their equipment. The leasing of computer and office equipment that occurred then was a significant contribution to leasings growth, since many companies were exposed to equipment leasing for the first time when they leased such equipment.
- "Overview of the GNU System". GNU Operating System. Free Software Foundation. 2016-06-16. Retrieved 2017-05-01.
- Pugh, Emerson W. (2002). "Origins of Software Bundling". IEEE Annals of the History of Computing. 24 (1): 57–58. doi:10.1109/85.988580.
- Hamilton, Thomas W. (1969). IBM's Unbundling Decision: Consequences for Users and the Industry. Programming Sciences Corporation.
- "Chronological History of IBM: 1960s". IBM. n.d. Archived from the original on July 3, 2016. Retrieved May 28, 2016.
Rather than offer hardware, services and software exclusively in packages, marketers 'unbundled' the components and offered them for sale individually. Unbundling gave birth to the multibillion-dollar software and services industries, of which IBM is today a world leader.
- Gates, Bill (February 3, 1976). "An Open Letter to Hobbyists". Retrieved May 28, 2016.
- Swann, Matthew (18 November 2004). Executable Code is Not the Proper Subject of Copyright Law (Technical report). Cal Poly State University. CPSLO-CSC-04-02.
- Pamela Samuelson (Sep 1984), "CONTU Revisited: The Case against Copyright Protection for Computer Programs in Machine-Readable Form", Duke Law Journal, 1984 (4): 663–769, doi:10.2307/1372418, JSTOR 1372418, archived from the original on Aug 4, 2017
- Robert X. Cringely. Cringely's interview with Brewster Kahle. YouTube. 46 minutes in. Archived from the original on 2019-01-18.
- Cantrill, Bryan (2014-09-17). Corporate Open Source Anti-patterns. YouTube. Event occurs at 3:15. Archived from the original on 2021-10-27. Retrieved 2015-12-26.
- Gallant, John (1985-03-18). "IBM policy draws fire - Users say source code rules hamper change". Computerworld. Retrieved 2015-12-27.
While IBM's policy of withholding source code for selected software products has already marked its second anniversary, users are only now beginning to cope with the impact of that decision. But whether or not the advent of object-code-only products has affected their day-to-day DP operations, some users remain angry about IBM's decision. Announced in February 1983, IBM's object-code-only policy has been applied to a growing list of Big Blue system software products
- Hassett, Rob (Dec 18, 2012). "Impact of Apple vs. Franklin Decision". InternetLegal.com. Archived from the original on Sep 8, 2023.
- ^ Landley, Rob (2009-05-23). "May 23, 2009". landley.net. Retrieved 2024-06-22.
So if open source used to be the norm back in the 1960's and 70's, how did this _change_? Where did proprietary software come from, and when, and how? How did Richard Stallman's little utopia at the MIT AI lab crumble and force him out into the wilderness to try to rebuild it? Two things changed in the early 80's: the exponentially growing installed base of microcomputer hardware reached critical mass around 1980, and a legal decision altered copyright law to cover binaries in 1983. Increasing volume: The microprocessor creates millions of identical computers
- Engelfriet, Arnoud (August–September 2006). "The best of both worlds". Intellectual Asset Management (IAM) (19). Gavin Stewart. Archived from the original on 2013-09-14. Retrieved 2008-05-19.
- Loftus, Jack (2007-02-19). "Managing mixed source software stacks". LinuxWorld. Archived from the original on 2010-06-03.
- Tan, Aaron (2006-12-28). "Novell: We're a 'mixed-source' company". CNET Networks, Inc.
- Rosenberg, Donald (2000). Open Source: The Unauthorized White Papers. Foster City: IDG. p. 109. ISBN 0-7645-4660-0.
- "Categories of Free and Non-Free Software". GNU Project.
- Free Software Foundation (2009-05-05). "Frequently Asked Questions about the GNU Licenses". Retrieved 2017-05-01.
- Richard Stallman (2004-04-12). "Free But Shackled - The Java Trap". Retrieved 2017-05-01.
- Liberman, Michael (1995). "Overreaching Provisions in Software License Agreements". Richmond Journal of Law and Technology. 1: 4. Retrieved November 29, 2011.
- Limitations and Exceptions to Copyright and Neighbouring Rights in the Digital Environment: An International Library Perspective (2004). IFLA (2013-01-22). Retrieved on 2013-06-16.
- Daniel A. Tysver (2008-11-23). "Why Protect Software Through Patents". Bitlaw. Retrieved 2009-06-03.
In connection with the software, an issued patent may prevent others from utilizing a certain algorithm (such as the GIF image compression algorithm) without permission, or may prevent others from creating software programs that perform a function in a certain way. In connection with computer software, copyright law can be used to prevent the total duplication of a software program, as well as the copying of a portion of software code.
- Donovan, S. (1994). "Patent, copyright and trade secret protection for software". IEEE Potentials. 13 (3): 20. doi:10.1109/45.310923. S2CID 19873766.
Essentially there are only three ways to protect computer software under the law: patent it, register a copyright for it, or keep it as a trade secret.
- Eben Moglen (2005-02-12). "Why the FSF gets copyright assignments from contributors". Retrieved 2017-05-01.
Under US copyright law, which is the law under which most free software programs have historically been first published, only the copyright holder or someone having assignment of the copyright can enforce the license.
- White, Aoife (2012-07-03). "Oracle Can't Stop Software License Resales, EU Court Says". Bloomberg.
- Microsoft Corporation (2005-04-01). "End-User License Agreement for Microsoft Software: Microsoft Windows XP Professional Edition Service Pack 2" (PDF). Microsoft. p. Page 3. Retrieved 2009-04-29.
- Microsoft Corporation (2005-04-01). "End-User License Agreement for Microsoft Software: Microsoft Windows XP Professional Edition Service Pack 2" (PDF). Microsoft. p. Page 1. Retrieved 2009-04-29.
You may install, use, access, display and run one copy of the Software on a single computer, such as a workstation, terminal or another device ("Workstation Computer"). The Software may not be used by more than two (2) processors at any one time on any single Workstation Computer. ... You may permit a maximum of ten (10) computers or other electronic devices (each a 'Device') to connect to the Workstation Computer to utilize one or more of the following services of the Software: File Services, Print Services, Internet Information Services, Internet Connection Sharing and telephony services.
- Adobe Systems, Adobe Software License Agreement (PDF), retrieved 2010-06-09
- Parker, Jason (January 27, 2009). "Apple iWork '09 review: Apple iWork '09". CNET. Retrieved May 2, 2022.
- Heffan, Ira V. (1997). "Copyleft: Licensing Collaborative Works in the Digital Age" (PDF). Stanford Law Review. 49 (6): 1490. doi:10.2307/1229351. JSTOR 1229351. Archived from the original (PDF) on 2013-05-14. Retrieved 2009-07-27.
Under the proprietary software model, most software developers withhold their source code from users.
- David A. Wheeler (2009-02-03). "Free-Libre / Open Source Software (FLOSS) is Commercial Software". Retrieved 2009-06-03.
- "Distribution of IBM Licensed Programs and Licensed Program Materials and Modified Agreement for IBM Licensed Programs". Announcement Letters. IBM. February 8, 1983. 283-016.
- Greg Mushial (July 20, 1983), "Module 24: SLAC Enhancements to and Beautifications of the IBM H-Level Assembler for Version 2.8", SLAC VM NOTEBOOK, Stanford Linear Accelerator Center
- Shankland, Stephen (January 30, 2003). "Governments to see Windows code". CNET. Retrieved May 2, 2022.
- Gao, Ken (February 28, 2003). "China to view Windows code". CNET. Retrieved May 2, 2022.
- James Ball, Julian Borger and Glenn Greenwald (2013-09-06). "US and UK spy agencies defeat privacy and security on the internet". The Guardian.
- Bruce Schneier (2013-09-06). "How to remain secure against NSA surveillance". The Guardian.
- Jacob, Matthias; Boneh, Dan; Felten, Edward (30 October 2003). "Attacking an Obfuscated Cipher by Injecting Faults". In Feigenbaum, Joan (ed.). Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers. Second International Workshop on Digital Rights Management. Lecture Notes in Computer Science. Vol. 2696. Springer Berlin Heidelberg. p. 17. ISBN 978-3-540-44993-5. Retrieved 12 January 2024 – via Internet Archive.
- Tony Patton (2008-11-21). "Protect your JavaScript with obfuscation". TechRepublic. Archived from the original on March 15, 2014. Retrieved May 2, 2022.
While the Web promotes the sharing of such code, there are times when you or a client may not want to share their JavaScript code. This may be due to the sensitive nature of data within the code, proprietary calculations, or any other scenario.
- ^ Orenstein, David (January 10, 2000). "Application Programming Interface". Computerworld. Retrieved May 2, 2022.
- "Commission Decision of 24.03.2004 relating to a proceeding under Article 82 of the EC Treaty (Case COMP/C-3/37.792 Microsoft)" (PDF). European Commission. March 24, 2004. Archived from the original (PDF) on October 28, 2008. Retrieved June 17, 2009.
- Wilson, Ben (2008-10-01). "Apple Drops NDA for Released iPhone Software". CNET. Archived from the original on 2013-03-08. Retrieved 2022-05-02.
- The Linux Information Project (2006-04-29). "Vendor Lock-in Definition". Retrieved 2009-06-11.
Vendor lock-in, or just lock-in, is the situation in which customers are dependent on a single manufacturer or supplier for some product This dependency is typically a result of standards that are controlled by the vendor It can grant the vendor some extent of monopoly power The best way for an organization to avoid becoming a victim of vendor lock-in is to use products that conform to free, industry-wide standards. Free standards are those that can be used by anyone and are not controlled by a single company. In the case of computers, this can usually be accomplished by using free software rather than proprietary software (i.e., commercial software).
- Don Reisinger (2011-09-29). "Apple wins key battle against Psystar over Mac clones". Retrieved 2022-05-02.
- "What happens when a proprietary software company dies?". Linux. October 24, 2003. Retrieved May 2, 2022.
- Livingston, Brian (December 15, 2006). "Microsoft Turns Up The Heat On Windows 2000 Users". CRN. Archived from the original on May 3, 2022. Retrieved May 2, 2022.
- Cassia, Fernando (March 28, 2007). "Open Source, the only weapon against 'planned obsolescence'". The Inquirer. Archived from the original on November 22, 2012. Retrieved August 2, 2012.
- Bell, John (October 1, 2009). "Opening the Source of Art". Technology Innovation Management Review. Archived from the original on March 30, 2014. Retrieved May 2, 2022.
that no further patches to the title would be forthcoming. The community was predictably upset. Instead of giving up on the game, users decided that if Activision wasn't going to fix the bugs, they would. They wanted to save the game by getting Activision to open the source so it could be kept alive beyond the point where Activision lost interest. With some help from members of the development team that were active on fan forums, they were eventually able to convince Activision to release Call to Power II's source code in October of 2003.
- Wen, Howard (June 10, 2004). "Keeping the Myths Alive". Linux Dev Center. Archived from the original on April 6, 2013. Retrieved December 22, 2012.
fans of the Myth trilogy have taken this idea a step further: they have official access to the source code for the Myth games. Organized under the name MythDevelopers, this all-volunteer group of programmers, artists, and other talented people devote their time to improving and supporting further development of the Myth game series.
- Largent, Andy (October 8, 2003). "Homeworld Source Code Released". Inside Mac Games. Archived from the original on October 12, 2013. Retrieved November 24, 2012.
With the release of Homeworld 2 for the PC, Relic Entertainment has decided to give back to their impressive fan community by releasing the source code to the original Homeworld.
- Rosen, Lawrence (2004). Open Source Licensing. Upper Saddle River: Prentice Hall. pp. 52, 255, 259. ISBN 978-0-13-148787-1.
- Havoc Pennington (2008-03-02). "Debian Tutorial". Archived from the original on 2018-01-29. Retrieved 2009-06-04.
It is important to distinguish commercial software from proprietary software. Proprietary software is non-free software, while commercial software is software sold for money.
- Russell McOrmond (2000-01-04). "What is "Commercial Software"?". Archived from the original on 2012-10-04. Retrieved 2009-05-02.
- Michael K. Johnson (1996-09-01). "Licenses and Copyright". Retrieved 2009-06-16.
If you program for Linux, you do need to understand licensing, no matter if you are writing free software or commercial software.
- Eric S. Raymond (2003-12-29). "Proprietary, Jargon File". Retrieved 2009-06-12.
Proprietary software should be distinguished from commercial software. It is possible for the software to be commercial without being proprietary. The reverse is also possible, for example in binary-only freeware.
- "Selling Free Software". GNU Project.
- "The Commercial Software Model". Microsoft. May 2001. Archived from the original on 2007-03-05.
- Open Source Versus Commercial Software: Why Proprietary Software is Here to Stay. Sams Publishing. October 2005. Retrieved 2022-05-02.
External links
- Media related to Proprietary software at Wikimedia Commons
Software distribution | |
---|---|
Licenses | |
Compensation models | |
Delivery methods | |
Deceptive and/or illicit | |
Software release life cycle | |
Copy protection |
Free and open-source software | |||
---|---|---|---|
General | |||
Software packages | |||
Community | |||
Organisations | |||
Licenses |
| ||
Challenges | |||
Related topics | |||