Letters to the Editor
I have been a fan of Linux for some time, and lately also of LJ, which I consider an excellent source of information. I have, however, been reluctant to address Linux as a target platform, because of the restrictions imposed by the GNU General Public License.
If I understand correctly, I may not compile a program with gcc under Linux and then expect to market it without accompanying source code. Also, I may not deny my licensee the right to re-distribute the program, or even sell it. This is because my application would constitute a “work based on gcc”, as defined in paragraph 1 of the GPL, and also because it would contain library code covered by the GPL.
But then, browsing through your magazine I found out that, for example, Caldera imposes much more restrictive terms on its products. Also, I have seen an ad about Mathematica for Linux, and I doubt that Wolfram Research is willing to qualify its product as a “work based on gcc”.
Clearly I am missing something. The question is, how can you market a commercial product under Linux and make sure that your customer is not re-selling it, or maybe installing it on 600 machines? Do you have to use a compiler other than gcc (is there any)?
I appreciate any advice you may give on the subject. Keep up the excellent work.
—Luca Cotta Ramusino email@example.com
First of all, compiling with gcc does not make your application a “work based on gcc”. Second, the C library is not covered by the GPL, but by the LGPL, the GNU Library General Public License, which allows you to distribute applications linked to shared libraries without inheriting copyright restrictions. Third, there are at least two other C compilers available for Linux; Linux FT comes with a different compiler as the default system compiler, and lcc is also available.
So you can safely target Linux with your current GNU toolset.
Greetings. I read the January and February issues of LJ with great interest, especially the security section. In the February issue, you have the site for swatch as being sierra.stanford.edu:/pub/sources. It has moved to ftp.stanford.edu:/general/security-tools/swatch. I thought that this might be useful to anybody else who is looking for it...
—Duncan Hill firstname.lastname@example.org
[The url he mentions has been corrected for this archive CD —Ed]
- The Tiny Internet Project, Part I
- Machine Learning with Python
- SUSECON 2016: Where Technology Reigns Supreme
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- Free Today: September Issue of Linux Journal (Retail value: $5.99)
- Bitcoin on Amazon! Sort of...
- Android Browser Security--What You Haven't Been Told
- Securing the Programmer
- The Many Paths to a Solution
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide