3
3
Proprietary software may also have licensing terms that limit the usage of that
software to a specific set of hardware. Apple has such a licensing model for macOS,
an operating system which is limited to Apple hardware, both by licensing and
various design decisions. This licensing model has been affirmed by the United
States Court of Appeals for the Ninth Circuit.[48]
Abandonment by proprietors
Main article: Abandonware
Proprietary software which is no longer marketed, supported or sold by its owner is
called abandonware, the digital form of orphaned works. If the proprietor of a
software package should cease to exist, or decide to cease or limit production or
support for a proprietary software package, recipients and users of the package may
have no recourse if problems are found with the software. Proprietors can fail to
improve and support software because of business problems.[49] Support for older or
existing versions of a software package may be ended to force users to upgrade and
pay for newer versions[50](planned obsolescence). Sometimes another vendor or a
software's community themselves can provide support for the software, or the users
can migrate to either competing systems with longer support life cycles or to FOSS-
based systems.[51]
Proponents of commercial proprietary software argue that requiring users to pay for
software as a product increases funding or time available for the research and
development of software. For example, Microsoft says that per-copy fees maximize
the profitability of software development.[61]
See also
Business software
Commercial off-the-shelf
Comparison of open-source and closed-source software
Proprietary hardware
Retail software
Enshittification
References
Saraswati Experts. "2.5.3". COMPUTER SCIENCE WITH C++. Saraswati House Pvt Ltd. p.
1.27. ISBN 978-93-5199-877-8. Retrieved 29 June 2017.
Brendan Scott (March 2003). "Why Free Software's Long Run TCO must be lower".
AUUGN. 24 (1). AUUG, Inc. 1. Definitions. Retrieved 29 June 2017.
Ceruzzi, Paul E. (2003). A History of Modern Computing. Cambridge, MA: MIT Press.
p. 128. ISBN 0-262-53203-4. Although IBM agreed to sell its machines as part of a
Consent Decree effective January 1956, leasing continued to be its preferred way of
doing business.then everyone started fighting
"The History of Equipment Leasing", Lease Genie, archived from the original on
April 11, 2008, retrieved November 12, 2010, In the 1960s, IBM and Xerox recognized
that substantial sums could be made from the financing of their equipment. The
leasing of computer and office equipment that occurred then was a significant
contribution to leasings [sic] growth, since many companies were exposed to
equipment leasing for the first time when they leased such equipment.
"Overview of the GNU System". GNU Operating System. Free Software Foundation.
2016-06-16. Retrieved 2017-05-01.
Pugh, Emerson W. (2002). "Origins of Software Bundling". IEEE Annals of the
History of Computing. 24 (1): 57�58. doi:10.1109/85.988580.
Hamilton, Thomas W. (1969). IBM's Unbundling Decision: Consequences for Users and
the Industry. Programming Sciences Corporation.
"Chronological History of IBM: 1960s". IBM. n.d. Archived from the original on
July 3, 2016. Retrieved May 28, 2016. Rather than offer hardware, services and
software exclusively in packages, marketers 'unbundled' the components and offered
them for sale individually. Unbundling gave birth to the multibillion-dollar
software and services industries, of which IBM is today a world leader.
Gates, Bill (February 3, 1976). "An Open Letter to Hobbyists". Retrieved May 28,
2016.
Swann, Matthew (18 November 2004). Executable Code is Not the Proper Subject of
Copyright Law (Technical report). Cal Poly State University. CPSLO-CSC-04-02.
Pamela Samuelson (Sep 1984), "CONTU Revisited: The Case against Copyright
Protection for Computer Programs in Machine-Readable Form", Duke Law Journal, 1984
(4): 663�769, doi:10.2307/1372418, JSTOR 1372418, archived from the original on Aug
4, 2017
Robert X. Cringely. Cringely's interview with Brewster Kahle. YouTube. 46 minutes
in. Archived from the original on 2019-01-18.
Cantrill, Bryan (2014-09-17). Corporate Open Source Anti-patterns. YouTube. Event
occurs at 3:15. Archived from the original on 2021-10-27. Retrieved 2015-12-26.
Gallant, John (1985-03-18). "IBM policy draws fire - Users say source code rules
hamper change". Computerworld. Retrieved 2015-12-27. While IBM's policy of
withholding source code for selected software products has already marked its
second anniversary, users are only now beginning to cope with the impact of that
decision. But whether or not the advent of object-code-only products has affected
their day-to-day DP operations, some users remain angry about IBM's decision.
Announced in February 1983, IBM's object-code-only policy has been applied to a
growing list of Big Blue system software products
Hassett, Rob (Dec 18, 2012). "Impact of Apple vs. Franklin Decision".
InternetLegal.com. Archived from the original on Sep 8, 2023.
Landley, Rob (2009-05-23). "May 23, 2009". landley.net. Retrieved 2024-06-22. So
if open source used to be the norm back in the 1960's and 70's, how did this
_change_? Where did proprietary software come from, and when, and how? How did
Richard Stallman's little utopia at the MIT AI lab crumble and force him out into
the wilderness to try to rebuild it? Two things changed in the early 80's: the
exponentially growing installed base of microcomputer hardware reached critical
mass around 1980, and a legal decision altered copyright law to cover binaries in
1983. Increasing volume: The microprocessor creates millions of identical computers
Engelfriet, Arnoud (August�September 2006). "The best of both worlds".
Intellectual Asset Management (IAM) (19). Gavin Stewart. Archived from the original
on 2013-09-14. Retrieved 2008-05-19.
Loftus, Jack (2007-02-19). "Managing mixed source software stacks". LinuxWorld.
Archived from the original on 2010-06-03.
Tan, Aaron (2006-12-28). "Novell: We're a 'mixed-source' company". CNET Networks,
Inc.
Rosenberg, Donald (2000). Open Source: The Unauthorized White Papers. Foster City:
IDG. p. 109. ISBN 0-7645-4660-0.
"Categories of Free and Non-Free Software". GNU Project.
Free Software Foundation (2009-05-05). "Frequently Asked Questions about the GNU
Licenses". Retrieved 2017-05-01.
Richard Stallman (2004-04-12). "Free But Shackled - The Java Trap". Retrieved
2017-05-01.
Liberman, Michael (1995). "Overreaching Provisions in Software License
Agreements". Richmond Journal of Law and Technology. 1: 4. Retrieved November 29,
2011.
Limitations and Exceptions to Copyright and Neighbouring Rights in the Digital
Environment: An International Library Perspective (2004). IFLA (2013-01-22).
Retrieved on 2013-06-16.
Daniel A. Tysver (2008-11-23). "Why Protect Software Through Patents". Bitlaw.
Retrieved 2009-06-03. In connection with the software, an issued patent may prevent
others from utilizing a certain algorithm (such as the GIF image compression
algorithm) without permission, or may prevent others from creating software
programs that perform a function in a certain way. In connection with computer
software, copyright law can be used to prevent the total duplication of a software
program, as well as the copying of a portion of software code.
Donovan, S. (1994). "Patent, copyright and trade secret protection for software".
IEEE Potentials. 13 (3): 20. doi:10.1109/45.310923. S2CID 19873766. Essentially
there are only three ways to protect computer software under the law: patent it,
register a copyright for it, or keep it as a trade secret.
Eben Moglen (2005-02-12). "Why the FSF gets copyright assignments from
contributors". Retrieved 2017-05-01. Under US copyright law, which is the law under
which most free software programs have historically been first published, [...]
only the copyright holder or someone having assignment of the copyright can enforce
the license.