25
Wed, Dec
0 New Articles

Bowling for Linux

Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times
Two weeks ago (March 6, 2003), SCO Group filed a $1B suit against IBM for "stealing" its important intellectual property and releasing that property into the open-source operating system called Linux. When SCO made the announcement, the Linux community of developers--many of whom had been busily laboring away in collaboration with the partners of UnitedLinux consortium--suddenly paused and gulped.

What does this mean? What will this lawsuit bring? Will it short-circuit IBM's commitment to a grand Linux strategy? What will be the future of the UnitedLinux consortium?

To understand how such a lawsuit might impact the momentum behind Linux, you must understand the history of how AIX (IBM's version of UNIX) evolved over the last 18 years. This is the basis for SCO Group's claim. It's a tortuous path, with many twists and turns in the road.

Variations on a Theme

The history of UNIX extends back to the late 1960s, when ATT Bell Labs developed an operating system based upon an earlier OS called Multiplexed Information and Computing System (or MULTICS). The new operating system, designed specifically for the PDP-7 minicomputer, was called Uniplexed Information and Computing System, or UNIC. It was later renamed to UNIX.

In 1973, a couple of Bell Labs programmers named Dennis Ritchie and Ron Thompson rewrote the UNIX kernel in the C programming language, making it one of the first operating systems not written in Assembly language. This code, written in C, became the intellectual property that SCO Group now claims to own.

In 1975, ATT Bell Labs began licensing tapes of this C programming code to various academic institutions. The University of California at Berkeley subsequently compiled and released its own version of this operating system code, known as UNIX BSD (Berkeley Software Distribution). In turn, Sun Microsystems chose UNIX BSD as the basis for its SunOS. Later still, UNIX BSD was used as a model from which Sun Solaris was created.

IBM too established a licensing agreement with Bell Labs and modified the code so that it would run on the first RISC chips it was using for the RS/6000 platform.

By the end of the 1980s, there were so many commercial and academic versions of UNIX being promulgated (SunOS, HP-UX, UNIX System V, UNIX BSC, AIX, etc.) that a program compiled upon one variant of UNIX might not be compatible on a different version of UNIX. This ultimately led to the development of standards around which UNIX operating system versions could be measured. This standard was called the POSIX standard. Today, all versions of UNIX are measured to the POSIX standard for compatibility.

Who Owns UNIX?

So, how can SCO Group claim ownership to UNIX? Clearly, there are so many variants of UNIX that no one in their right mind could claim that it held the rights to this hydra of operating systems. Well, unfortunately, the trail is well established.

In 1993, ATT Bell Labs sold its interests in UNIX to Novell. Later, in 1995, Novell in turn sold those same interests to a company called Santa Cruz Operations. In 2001, Caldera Systems, Inc. acquired the assets of Santa Cruz Operations, forming a new company, called Caldera International, Inc. Those assets included the licensing rights to UNIX. Finally, in 2002, Caldera changed its name to the SCO Group. All this corporate maneuvering and consolidation had just one purpose: To maintain the grip on the intellectual property rights of the original UNIX code that was derived from the Bell Labs tapes.

HP, Sun, and Silicon Graphics eventually bought out the UNIX rights from SCO Group, but IBM did not. Instead IBM has continued to license UNIX from SCO Group: Every sale IBM makes of AIX for the pSeries platform nets SCO Group a royalty.

So what is SCO Group's beef?

SCO's Complaint

Last January, SCO Group announced it was creating a new division called SCOSource to enforce its intellectual property rights--particularly those rights that are associated with its ownership of UNIX. This $1B lawsuit against IBM is its first attempt at reinforcing those historic property rights.

According to SCO Group, IBM has taken code--and possibly libraries of code written in C as a part of the AIX operating system--and incorporated that code into the source versions of Linux that IBM is using for its Enterprise zSeries hardware platform.

Initially, this suit would then only impact IBM's zSeries of computers, but the claim may be extended to include the pSeries, iSeries (AS/400), and xSeries platforms.

In addition, SCO Group claims that IBM is making a concerted effort to "steal" the code, pointing to public statements made by a number of IBM executives, stating that IBM would bring the power of AIX into the Linux operating system. According to SCO Group, by doing so, IBM is in violation of its original licensing agreement with ATT Bell Labs.

Bottom Line? SCO Group says it can and will rescind IBM's license to AIX within 100 days, making it impossible for IBM to support its AIX operating system on the pSeries. And, since the iSeries hardware platform is currently based upon the pSeries hardware platform, the fate of one is closely linked to the other.

What's at Stake: The UnitedLinux Strategy

Okay, so why is SCO Group doing this? After all, wasn't it only last May that SCO Group (then still called Caldera) joined with Conectiva, SuSE, and Turbolinux to form UnitedLinux--backed by IBM, HP, and AMD. Wasn't it SCO's goal to help in the creation of a uniform version of Linux for business? Isn't it natural that SCO offer up some of its inherited "trade secrets" in this mutual effort? Won't SCO's lawsuit alienate one of its most important partners in this initiative?

Some analysts believe that SCO Group is trying to establish a direct link between the rise of Linux and the historic UNIX. IBM--as the player with the deepest pockets in the Linux arena--is seen as the first victim headed for the legal gears of an intellectual property battle of incredible proportions.

If SCO can beat IBM by claiming that it has "stolen" its property and released it into the public domain, every player in the UnitedLinux project--and potentially every distributor of less-powerful versions of the Linux operating system--can be held hostage. The SCO Group will collect billions, and the promise of a standards-based, open-source operating system will be severely threatened.

IBM's Linux Strategy in the Offing

Meanwhile, IBM's own strategies for putting Linux on every one of its hardware platforms might also be severely compromised. Linux is a great mechanism for touting IBM's new policy of standards-based business computing platforms. If it sees a major legal battle in the offing, some analysts believe that it will begin to reposition itself toward other operating system vehicles to protect its interests and pursue its strategic goals.

Where might IBM reposition itself if Linux becomes a battlefield? It's much too soon to speculate. Linux means too much to IBM's current server strategy, and IBM is certain to put up a significant legal defense. It can't afford to let its customers feel any sense of insecurity--especially now, as these customers are evaluating the potential of Linux in their business environments on the iSeries, pSeries, xSeries, and zSeries servers.

The Setup

Nonetheless, regardless of IBM's culpability in "stealing" from UNIX, this conflict between IBM and SCO Group has the makings of a struggle on the scale of the Microsoft vs. DOJ antitrust lawsuit. Too much is at stake, and the trail of intellectual property rights is so complex that a massive legal battle is certain to ensue.

Meanwhile, many analysts feel that IBM has been set up by SCO, and as the legal ball rolls down the alleyway toward bowling pins, what will be at stake is not only a billion dollars in damages, but the future of UnitedLinux operating system in the business computing environment.

Thomas M. Stockwell is the Editor in Chief of MC Press, LLC. He has written extensively about program development, project management, IT management, and IT consulting and has been a frequent contributor to many midrange periodicals. He has authored numerous white papers for iSeries solutions providers. His most recent consulting assignments have been as a Senior Industry Analyst working with IBM on the iSeries, on the mid-market, and specifically on WebSphere brand positioning. He welcomes your comments about this or other articles and can be reached at This email address is being protected from spambots. You need JavaScript enabled to view it..

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: