Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Adding proprietary technology to Linux

Posted on 2000-02-14
3
192 Views
Last Modified: 2010-04-20
How does Linux allow for the addition of patented or proprietary technology? Suppose, e.g., someone had network technology that doubled Linux bandwidth. Would it be possible to offer the technology for a fee without publishing the source code back to Linux.

Thanks for any thoughts.

steva
0
Comment
Question by:steva
  • 2
3 Comments
 
LVL 5

Accepted Solution

by:
laeuchli earned 100 total points
ID: 2520900
Not if you edited the kernal. If you made a application that did it, it would be fine, but if you changed the kernal, you can't make money off it. FreeBSD allows you to do this, but not linux.
0
 

Author Comment

by:steva
ID: 2520957
Hmmmm... So does that mean that if you write a linux driver for your special Gigabit Ethernet card, you can't charge for it?

steva

0
 
LVL 5

Expert Comment

by:laeuchli
ID: 2520964
No, I think drivers are ok, not being part of the kernal.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you use Debian 6 Squeeze and you are tired of looking at the childish graphical GDM login screen that is used by default, here's an easy way to change it. If you've already tried to change it you've probably discovered that none of the old met…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question