decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
Declaration of Randall Davis of MIT: SCO Is Wrong, Wrong, Wrong - Updated
Saturday, August 28 2004 @ 02:12 AM EDT

We don't have to reverse engineer the legal documents, so to speak, any more to try to figure out what Randall Davis's Declaration says. We have it, thanks to the indefatigable Frank Sorenson. Being a paper exhibit, it was scanned in, which means it's a large file and a little hard to read. But it's readable, and a very enjoyable read it is.

He is a Professor of Computer Science at MIT, as most of you know, and that's not telling one-tenth of the story. More on his credentials, which are amazing, in the attached Exhibits and the first few paragraphs of the Declaration. You will notice how IBM establishes him as an expert ("From 1995-1998 I served on the Scientific Advisory Board of the U.S. Air Force... I have served as a member of the Advisory Board to the US Congressional Office of Technology Assessment study on software and intellectual property . . . From 1998-2000 I served as the chairman of the National Academy of Sciences study on intellectual property rights and the emerging information infrastructure...I have been retained as an expert in over thirty cases dealing with alleged misappropriation of intellectual property, such as the allegations raised in this case, and have done numerous comparisons of code. . . . In 1990 I served as expert to the Court . . . in Computer Associates v. Altai, a software copyright infringement case that articulated the abstraction, filtration, comparison test for software. . . .", etc.), and now contrast how SCO introduced Sandeep Gutpa and Christopher Sontag (more or less= "I am an employee of SCO.").

Some highlights:

"11. In summary, I find fundamental errors in Mr. Sontag's conclusions. He grossly exaggerates what is required to determine whether there is substantial similarity between Linux and SCO's allegedly copyrighted works. In fact, the materials necessary to determine substantial similarity have been available to SCO for years (at least since it acquired access to the allegedly copyrighted works in 2001). Tools capable of efficiently evaluating that material have also been publicly available to SCO for years. The task Mr. Sontag says could take 25,000 man years to complete should take capable programmers no more than several months. . . .

"18. As stated, SCO has had, since before the initiation of this case, all the raw material it needs to find any alleged substantial similarity between Linux and Unix. It of course has all relevant versions of Unix; it can get any version of the Linux kernel from publicly available web sites. As one example, www.linuxhq.com contains every version of the Linux kernel since the original 1.0.0 and a complete history of every change made to every kernel file over its entire development history. . . .

"19. There are a number of tools that are publicly available (in both executable and source code form) to compare large, complex programs for the purpose of determining substantial similarity. . . . SCO acknowledges using such tools, but misrepresents their utility. They are in my opinion quite effective.

"20. In an attempt to show that SCO could not possibly compare the works at issue without more time and information, Mr. Sontag states that existing tools may not detect minor changes in the code... are subject to false positives...and will require years to implement unless SCO is afforded more information. ...

"21. First, the existing tools are entirely adequate, even accepting the observation . . . that minor changes can prevent an absolutely literal matching process from being effective. There are several reasons why the existing tools will do the job. Despite SCO's implication, one cannot casually change punctuation, rename variables, change spelling, alter the text (whatever that means), or insert, delete, or reorder lines of code.... Code is extremely brittle and thus is in some respects quite similar to a complex and intricately designed mechanical device, like a finely made wristwatch. One can no more casually change punctuation, insert, delete, or reorder lines of code than one could casually insert, delete, or reorder the parts in the watch and still expect it to work.

"22. Software development is difficult in large part exactly because the code has to be just right. In the C language (in which both Unix and Linux are written), for example, a semicolon means something very different from a comma; substituting one for the other changes the modified code completely (and very likely breaks it). Similarly, a single equal sign '=' means one thing, but two of them in a row '= =' mean something entirely different. Hence even a minor typo can go unnoticed (because it can produce a syntactically valid program), yet wreak havoc on program behavior. Programmers routinely have the experience of serious and obscure malfunctions arising out of the simplest typographical mistake, or out of the well-intentioned act of making a small change to code. Code is sensitive to even slight alterations; changes are not easy to make.

"23. This is one reason why, while it is in principle possible to copy code and then purposely obscure its origin, that practice is generally carried out on programs at the scale of freshman homework assignments (where it is more easily detectable than freshmen think), not sections of multi-million line operating systems. Especially where large, complex programs are concerned, changes are that much more difficult to make, and purposeful obfuscation on a large scale is nearly impossible. . . .

"27. Mr. Sontag poses the problem as if no results will be known until the entire comparison task is complete. Even if the entire task were daunting (which it is not), if 'much' of SCO's 3.5 million lines of code were copied..., this would imply that there must be thousands of examples waiting to be found, and hundreds able to be found after a modest amount of effort. Mr. Sontag's own declaration acknowledges that SCO has used one or more of the existing tools to do the requisite comparisons . . . but SCO has yet to present any credible examples of substantial similarity. . . .

"29. . . . Mr. Sontag states that the only way for SCO to determine substantial similarity is to get a vast amount of additional materials from IBM and a number of other individuals or entities. In fact, none of this additional material identified by Mr. Sontag is necessary to the substantial similarity task. . . .

"32. Having access to all of the materials concerning AIX and Dynix to which Mr. Sontag refers in his declaration (which appears to be a huge amount of information) would not, in my opinion, be of any assistance in determining whether Linux is substantially similar to Unix. Those materials are not useful for the task at hand. . . .

"34. To suggest otherwise leads to the absurd notion that one work can be considered similar to another even if the two are currently completely different, if only one can show a (perhaps very long) sequence of small changes that lead from one to the other. This would be like playing the game of 'telephone,' in which a sentence is successively whispered from one person to the next in a long line, and claiming that, even though the sentence that emerged was totally different from the one that started the process, they were 'substantially similar' because the last was the result of many small changes to the first. Similarity means just that -- similarity. And the determination of similarity is made on the code as it is, independent of how it got that way. . . .

"39. It is estimated that the additional AIX and Dynix source code that SCO seeks exceeds 2 billion lines of code. Based upon the estimates Mr. Sontag used to arrive at his 25,000 man-years calculation, it would take SCO more than 14 million man-years to review just the additional AIX and Dynix code that SCO says it needs, putting aside how many more man-years it would require SCO to review the other materials it says it needs. . . .

"42. Second, Mr. Sontag provides vanishingly little rationale for this voluminous request, which is not surprising, as the requested information is irrelevant to the task at hand. Once again, the task at hand is finding substantial similarity between Unix and Linux as it is now. Gathering information regarding the entire development history of Linux, including from potentially hundreds or even thousands of individuals, would not merely require a considerable amount of time, it would be of little or no meaningful assistance. The notion, for example, that 'Mr. Torvalds can answer specific questions as to what each contributor intended, and where and how the contributor acquired or developed the derived code,' suggests a wholly unrealistic picture of any mortal and of the code development process. The task would be done far faster, and the time better spent, if SCO were simply to put even part of the effort imagined by Mr. Sontag to the task of comparing the Unix and Linux source code SCO already has. . . .

"SUMMARY

"44. Mr. Sontag grossly exaggerates what is required to determine whether there is substantial similarity between Linux and SCO's allegedly copyrighted works. The materials necessary to the task have been available to SCO for years and tools capable of evaluating that material in a matter of months have also been available to SCO for years."

Translation: Your Honor, they are pulling your leg. They don't need more time for discovery and they don't need any more code. Period. By the way, he testified as an expert in the Gates Rubber, Inc., v. Bando American, Inc. case too.

So, having read that and considered the man's credentials, does it sound to you like IBM has been refusing to cooperate with SCO's legitimate discovery requests? Or does it sound to you like SCO has been gaming the system so as to achieve delay after delay by making inappropriate and even downright silly requests? SCO said it had three groups deep dive into the code, implying they already used the tools Davis says are useful for finding not only copied code but obfuscated code, and they have found nothing credible. And if they can't find anything, does it now sound to you like there is a problem with the provenance of the Linux kernel? That SCO has a leg to stand on? You be the judge. But can you not sense Davis's curled lip?

And some say Groklaw has a point of view.

Update: Here is Randall Davis Declaration, in all its glory, as text, thanks to David Truog, for doing the transcribing, and to constant, who proofread it all.

************************

SNELL & WILMER LLP
Alan L. Sullivan (3152)
Todd M. Shaughnessy (6651)
[address, phone, fax]

CRAVATH, SWAINE & MOORE LLP
Evan R. Chesler (admitted pro hac vice)
David R. Marriot (7572)
[address, phone, fax]

Attorneys for Defendant/Counterclaim-Plaintiff
International Business Machines Corporation

IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF UTAH

THE SCO GROUP, INC.,

Plaintiff/Counterclaim-
Defendant,


-against-

INTERNATIONAL BUSINESS
MACHINES CORPORATION,

Defendant/Counterclaim-
Plaintiff.
DECLARATION OF
RANDALL DAVIS


Civil No. 2:03CV0294 DAK

Honorable Dale A. Kimball

Magistrate Judge Brooke C. Wells

I. INTRODUCTION

1. I am a professor of Computer Science at the Massachusetts Institute of Technology in Cambridge, Massachusetts. Exhibit I provides more details of my technical background and experience, a list of publications, and a list of cases in which I have testified or been deposed. I received my undergraduate degree in Physics from Dartmouth College in 1970 and a Ph.D. in Computer Science from Stanford in 1976.

2. I have published some 50 articles on issues related to artificial intelligence and have served on several boards, including Artificial Intelligence, AI in Engineering, and the MIT Press series in AI. I am co-author of Knowledge-Based Systems in AI.

3. In recognition of my research in artificial intelligence, I was selected in 1984 as one of America's top 100 scientists under the age of 40 by Science Digest. In 1986 I received the AI Award from the Boston Computer Society for contributions to the field. In 1990 I was named a Founding Fellow of the American Association for AI and in 1995 was elected to a two-year term as President of the Association. From 1995-1998 I served on the Scientific Advisory Board of the U.S. Air Force.

4. In addition to my work with artificial intelligence, I have also been active in the area of intellectual property and software. Among other things, I have served as a member of the Advisory Board to the US Congressional Office of Technology Assessment study on software and intellectual property, published in 1992 as Finding a Balance: Computer Software, Intellectual Property, and the Challenge of Technological Change. I have published a number of articles on the topic, including co-authoring an article in the Columbia Law Review in 1994 entitled "A Manifesto Concerning Legal Protection of Computer Programs" and an article in the Software Law Journal in 1992 entitled "The Nature of Software and its Consequences for Establishing and Evaluating Similarity."

5. From 1998-2000 I served as the chairman of the National Academy of Sciences study on intellectual property rights and the emerging information infrastructure entitled The Digital Dilemma: Intellectual Property in the Information Age, published by the National Academy Press in February, 2000.

6. I have been retained as an expert in over thirty cases dealing with alleged misappropriation of intellectual property, such as the allegations raised in this case, and have done numerous comparisons of code. I have been retained by plaintiffs who have asked me to investigate violations of intellectual property, by defendants who have asked me to investigate allegations made against them and by both sides to serve as the sole arbiter of a binding arbitration.

7. In 1990 I served as expert to the Court (Eastern District of NY) in Computer Associates v. Altai, a software copyright infringement case that articulated the abstraction, filtration, comparison test for software. I have also been retained by the Department of Justice on its investigation of the INSLAW matter. In 1992 (and later in 1995) my task in that engagement was to investigate alleged copyright theft and subsequent cover-up by the Federal Bureau of Investigation, the National Security Agency, the Drug Enforcement Agency, the United States Customs Service, and the Defense Intelligence Agency.

8. I have been retained by counsel for IBM in this lawsuit and am being compensated at a rate of $550 per hour.

II. SUMMARY OF FINDINGS

9. I have been asked by counsel for IBM to evaluate the opinions set out in the declaration of Chris Sontag submitted in opposition to IBM's motion for partial summary judgement of non-infringement of copyright with respect to its Linux activities. Specifically, I have been asked to address Mr. Sontag's conclusions concerning what information is required in order to determine whether there is substantial similarity between Linux and SCO's allegedly copyrighted works.

10. My analysis and conclusions are based upon the principles described in Gates Rubber v. Bando, 9 F.3d 823 (10th Cir. 1993), which I understand to describe the appropriate methodology for determining substantial similarity and therefore to suggest what information is required to determine substantial similarity. My analysis and conclusions are also based upon my experience and expertise in the field of computer science.

11. In summary, I find fundamental errors in Mr. Sontag's conclusions. He grossly exaggerates what is required to determine whether there is substantial similarity between Linux and SCO's allegedly copyrighted works. In fact, the materials necessary to determine substantial similarity have been available to SCO for years (at least since it acquired access to the allegedly copyrighted works in 2001). Tools capable of efficiently evaluating that material have also been publicly available to SCO for years. The task Mr. Sontag says could take 25,000 man-years to complete should take capable programmers no more than several months.

12. The first section of this report describes my background and qualifications to address the issues addressed herein, while the second analyzes Mr. Sontag's declaration and demonstrates the errors in his conclusions concerning the magnitude of the effort required to determine substantial similarity.

III. ANALYSIS OF THE SONTAG DECLARATION

13. Mr. Sontag correctly concludes that determining substantial similarity requires a comparison of the Unix and Linux kernels. (¶¶6-8.) He is incorrect, however, in concluding that the comparison requires a Herculean effort and that the only way SCO can feasibly conduct the comparison is if it is provided large quantities of additional information from IBM and from third parties.

14. As Mr. Sontag states in paragraph 8 of his Declaration: "to show that Linux code is substantially similar to Unix code requires a comparison of that code...." Common sense supports that statement. Moreover, the Gates Rubber case is clear that determining substantial similarity requires a comparison of the works under consideration. 9 F3.d at 838-99.

15. Mr. Sontag acknowledges that SCO has access to both Linux and the allegedly copyrighted works. (¶¶19-13). This is of course no surprise, as Linux is publicly available to everyone, and at least until recently SCO was itself a distributor of Linux. As the alleged copyright holder, SCO must have copies of the allegedly copyrighted works.

16. Mr. Sontag goes on, however to characterize as essentially impossible the task of comparing Linux to the allegedly copyrighted works, at one point suggesting that comparing just one version of the Linux kernel to one version of the Unix kernel "could take on the order of 25,000 man-years" (¶14). He then proposes a "shortcut" (¶15): "comparing similar directory structures of the Unix and Linux operating systems," and immediately indicates that this "shortcut" would still take "about 35 man-years," and then only if the file names and the organization of all the Linux kernel code were identical to the file names and organization of the Unix kernel code.

17. As I explain below, (1) the task of comparing Unix to Linux (for purposes of determining substantial similarity) is a manageable undertaking that could be accomplished by capable programmers, with the materials that have been available to SCO for years, in no more than several months; and (2) the additional materials that Mr. Sontag says are required so that the comparison will not endure for 25,000 more years are in fact absolutely unnecessary. The reasons offered by Mr. Sontag to explain why SCO has not been able to complete the task of determining substantial similarity are untenable.

III.1 Feasibility of the Task

18. As stated, SCO has had, since before the initiation of this case, all the raw material it needs to find any alleged substantial similarity between Linux and Unix. It of course has all relevant versions of Unix; it can get any version of the Linux kernel from publicly available web sites. As one example, www.linuxhq.com contains every version of the Linux kernel since the original 1.0.0 and a complete history of every change made to every kernel file over its entire development history. Exhibit II contains a simple listing from that site, showing the entire development history for the file /fs/inode.c through 1081 kernel versions.1

19. There are a number of tools that are publicly available (in both executable and source code form) to compare large, complex programs for the purpose of determining substantial similarity. Three common varieties of tools used successfully in a number of cases like this one include:

  • Comparing an exhaustive list of identifiers from both programs. It is a simple matter technically to assemble a complete list of every "word" in a body of source code (i.e., every variable name, function name, data structure name, field name, etc.), even one as large as those in use here. A list is created for each program and then compared (by the computer) to find words that show up in both lists. That list of terms in common can then be scanned to find "unusual" words (i.e., words not routinely found in code, or in the application in question), and the places where those unusual words are found in the text then become places to look for possibly copied code. As this process typically includes the (English) text contained in comments in the code, it at times even finds places where code has been changed, but comments left unchanged. As a result, it uncovers instances of copying that infringers may have thought they had obscured.
  • Using tools that do literal or near-literal comparisons (e.g. COMPARATOR[1]). There are a variety of tools available to do this; they can be "tuned" to, for instance, ignore differences in spacing and layout (an issue raised by Mr. Sontag (11), ignore comments in the code, etc. SCO acknowledges using such tools, but misrepresents their utility. They are in my opinion quite effective.
  • Using tools that do syntactic comparisons (e.g. SIM [2]). By syntax I mean the structure of the code, analogous to notions of noun, verb, adjective, etc., in English. Such tools find code with the same structure, ignoring entirely the actual names that have been used, and hence can be very effective even where code has been modified.

20. In an attempt to show that SCO could not possibly compare the works at issue without more time and information, Mr. Sontag states that existing tools may not detect minor changes in the code (11), are subject to false positives (13) and will require years to implement unless SCO is afforded more information (14-15).

21. First, the existing tools are entirely adequate, even accepting the observation (11) that minor changes can prevent an absolutely literal matching process from being effective. There are several reasons why the existing tools will do the job. Despite SCO's implication, one cannot casually change punctuation, rename variables, change spelling, alter the text (whatever that means), or insert, delete, or reorder lines of code (11). Code is extremely brittle and thus is in some respects quite similar to a complex and intricately designed mechanical device, like a finely made wristwatch. One can no more casually change punctuation, insert, deleted, or reorder lines of code than one could casually insert, delete, or reorder the parts in the watch and still expect it to work.

22. Software development is difficult in large part exactly because the code has to be just right. In the C language (in which both Unix and Linux are written), for example, a semicolon means something very different from a comma: substituting one for the other changes the modified code completely (and very likely breaks it). Similarly, a single equal sign '=' means one thing, but two of them in a row '==' mean something entirely different. Hence even a minor typo can go unnoticed (because it can produce a syntactically valid program), yet wreak havoc on program behavior. Programmers routine have the experience of serious and obscure malfunctions arising out of the simplest typographical mistake, or out of the well-intentioned act of making a small change to code. Code is sensitive to even slight alterations; changes are not easy to make.

23. This is one reason why, while it is in principle possible to copy code and then purposely obscure its origin, that practice is generally carried out on programs at the scale of freshman homework assignments (where it is more easily detectable than freshmen think), not sections of multi-million line operating systems. Especially where large, complex programs are concerned, changes are that much more difficult to make, and purposeful obfuscation on a large scale is nearly impossible.

24. Second, while all of these tools are subject to the problem of false positives, i.e., suggesting copying where none exists, with appropriate tuning and use the percentage of false positive can be kept well within reasonable bounds. Despite SCO's claims, checking those false positives need not be labor intensive: programs are easily created to present the alleged matches in a side-by-side fashion on the screen, allowing an experienced programmer to determine with little more than a glance whether each match is worth further study. An experienced programmer can quickly scroll through a substantial amount of information to find any plausible matches.

25. Third, the existing tools could have been employed here in a reasonably short time period without any additional information. In fact, based on my experience, I estimate that the task would take experienced programmers a matter of months.

26. Fourth, the existing tools have been designed by experienced programmers who are aware of the kinds of modifications that can be made to code that may make its origin less obvious. The tools are capable of dealing with the sorts of things that concern Mr. Sontag (11), such as differences in spacing and layout, variations in uppercase vs. lowercase, and comments in the code. The tools thus do both literal and non-literal matching, and are not misled by a variety of changes. There are also tools like SIM, noted above, that match based on syntax and hence are not misled by such things as renaming a variable, changing spelling, etc. (11). The existing tools are thus fully capable of doing the job. Given the claimed volume of the alleged copying, finding any copying that exists should not be a difficult task. 2

27. Mr. Sontag poses the problem as if no results will be known until the entire comparison task is complete. Even if the entire task were daunting (which it is not), if "much" of SCO's 3.5 million lines of code were copied (47), this would imply that there must be thousands of examples waiting to be found, and hundreds able to be found after a modest amount of effort. Mr. Sontag's own declaration acknowledges that SCO has used one or more of the existing tools to do the requisite comparisons (18, 21-23) but SCO has yet to present any credible examples of substantial similarity.

28. It would appear, in fact, that SCO completed many months ago some of the very comparisons that Mr. Sontag says might take 25,000 man years. For example on June 10, 2003, a SCO representative stated that it "was able to uncover the alleged violations by hiring three teams of experts, including a group from the MIT math department to analyze the Linux and Unix source code for similarities" and that "[a]ll three found several instances where our Unix source code had been found in Linux". (Robert McMillan (quoting SCO), "SCO shows Linux code to analysts," IDG News Service, June 10, 2003.)

III.2 No Additional Information Required

29. Having concluded (incorrectly, I believe) that it is impossible as a practical matter to determine whether there is substantial similarity in the Unix and Linux kernels, Mr. Sontag states that the only way for SCO to determine substantial similarity is to get a vast amount of additional materials from IBM and a number of other individuals or entities. In fact, none of this additional material identified by Mr. Sontag is necessary to the substantial similarity task.

II.2.1 No Additional Information from IBM Is Needed

30. Mr. Sontag states (43, 50) that SCO requires the following additional materials from IBM:

  • all version control system and bug tracking information (including documents, data, logs, files and so forth) for AIX, Dynix/ptx, ptx and Dynix from 1984 to the present,
  • source code and log information for all interim and released versions of AIX, Dynix, ptx and Dynix/ptx from 1984 to present,
  • depositions as appropriate for programmers identified from the forgoing,
  • all design documents, white papers, and programming notes, created from 1984 to the present.

31. This information is irrelevant to SCO's task in the current context, which is showing that IBM's Linux activities infringe SCO's alleged copyrights in Unix software. The similarity to be demonstrated is between the claimed Unix software and Linux; the history of AIX and Dynix development plays no part in this judgement.

32. Having access to all of the materials concerning AIX and Dynix to which Mr. Sontag refers in his declaration (which appears to be a huge amount of information) would not, in my opinion, be of any assistance in determining whether Linux is substantially similar to Unix. Those materials are not useful for the task at hand.

33. As I understand the concept, and as is only logical, substantial similarity must be a determination about two bodies of code as they are, not a question of their heritage. Any given segment of Linux code either is or is not substantially similar to a given body of Unix code; it is irrelevant to the determination of similarity how the Linux code came to look the way it does. So even if it is true that some code that came to be included in Linux originated in AIX or Dynix, that is simply not important to the analysis of whether that Linux code is in fact similar to any Unix code.

34. To suggest otherwise leads to the absurd notion that one work can be considered similar to another even if the two are currently completely different, if only one can show a (perhaps very long) sequence of small changes that lead from one to the other. This would be like playing the game of "telephone," in which a sentence is successively whispered from one person to the next in a long line, and claiming that, even though the sentence that emerged was totally different from the one that started the process, they were "substantially similar" because the last was the result of many small changes to the first. Similarity means just that - similarity. And the determination of similarity is made on the code as it is, independent of how it got that way.

35. Yet this is not what Mr. Sontag apparently has in mind, as he claims that "By viewing each version of the Dynix/AIX code, SCO will be better able to determine if the structure, sequence and organization of the corresponding Linux code matches that of Unix." (35.) The structure, sequence and organization of some Linux code either does or does not match that of some part of Unix code; that judgment is surely not dependent on the derivation history of the code. Again, information relating to AIX and Dynix, let alone extremely detailed information about AIX and Dynix, is not useful to the analysis of whether portions of Linux are substantially similar to portions of Unix.

36. Consider also Mr. Sontag's indication (30) that "Because of changes made to source code over time, the current code version may 'look' different than the initial code version." He slides too quickly here past the possibility that, because of changes to source code over time, the current code version may in fact be different, i.e., no longer substantially similar. The changes made to correct bugs, improve features, add new features, or as a consequence of re-thinking the design of a section of the code, may over time simply produce code that is completely different from the original.

37. Note also that the claim of the utility of intermediate versions and change logs skips blithely past a central point: in order to find any places where Unix code might have been copied into AIX or Dynix, SCO will have to compare all of its Unix code against all of the AIX or Dynix code. How else will it find the similarities? But it is worse than that: SCO will have to compare all of its Unix code against every version of the AIX and Dynix code; after all, Mr. Sontag has noted (48) that "IBM could have copied System V code into any number of the multiple versions of AIX and Dynix."

38. Here the basic contradiction in SCO's request becomes particularly clear. Mr. Sontag spends substantial space in his declaration suggesting that the task of comparing one version of Linux against one version of Unix is impossibly large. Given the IBM materials I understand SCO already has in hand - notably the many versions of Dynix and AIX that I understand IBM has produced - the task SCO proposes is many, many times larger than the one it claims is far too difficult. An yet SCO requests, among other things, "source code and log information for all interim and released versions of AIX, Dynix, ptx and Dynix/ptx from 1984 to the present," and "[a]ll design documents, white papers, and programming notes, created from 1984 to the present." (50). If the original task of finding substantial similarity in one version is pragmatically impossible, what are we to make of a task many times larger, and one that is perhaps many, many times larger again than that? SCO seems in one breath to claim the task is too large and with the next claim that the task would become feasible if only it had a volume of information perhaps many, many times larger than what it already possesses.

39. It is estimated that the additional AIX and Dynix source code that SCO seeks exceeds 2 billion lines of code. Based upon the estimates Mr. Sontag used to arrive at his 25,000 man-years calculation, it would take SCO more than 14 million man-years to review just the additional AIX and Dynix code that SCO says it needs, putting aside how many more man-years it would require SCO to review the other materials it says it needs. 3

III.2.2 No Additional Information From Others Is Needed

40. As voluminous as the list of materials SCO seeks from IBM is, it is dwarfed by the request for additional information from other parties (57):

  • "Determine what third parties IBM has partnered with to develop Linux and what work those groups have done...particularly as to the details of the partnering, such as which party makes what contribution, the motivation for the contribution, and the starting and ending code versions that resulted from the partnership...."
  • "Take discovery on Linux Torvalds, the purported creator of Linux, about the contributors and contributions to Linux since its inception, and the maintenance of any records about the development history of Linux. Mr. Torvalds is expected to have detailed records of these contributors and their contributions, material that is not publicly available. Further, Mr. Torvalds can answer specific questions as to what each contributor intended, and where and how the contributor acquired or developed the derived code."
  • "Take discovery on the maintainers of the kernels..."
  • "There are many contributors to the kernels, some of who [sic] have significant contributions to Linux code over the years. Some of these individuals, whose names are publicly available, should be deposed to find out their sources for their contributed code."
  • "Many corporations have made contributions to Linux, and SCO needs to take their discovery on certain of these companies to determine the sources of their contributions. Also, SCO needs to depose the programmers who work for these companies and made the contributions to determine the sources of those programmers' code contributions..."
  • "SCO has identified some, but not all, independent authors of various portions of the Linux code. ... Those authors should know the sources of their code and should be able to provide information as to whether the code they contributed to Linux was obtained from SCO copyrighted code."
  • "Several private groups also made major contributions to Linux, so SCO should also be permitted adequate time to identify and take discovery from these entities."
  • "Many organizations exist whose purpose is to track and report changes to Linux... SCO needs access to the more detailed information these organizations maintain...."
  • "Licensees and former licensees of Unix source code to see if these entities, their employees, or former employees are contributing Unix code to Linux."

41. This list, too, is striking, for a number of reasons. First, while the information requested from IBM would make SCO's task many times larger than it is, the request for this third-party information would surely magnify SCO's task still more. Consider, for example, just the last item, requesting materials from "licensees and former licensees of Unix source code to see if these entities, their employees, or former employees are contributing Unix code to Linux." (57.)

42. Second, Mr. Sontag provides vanishingly little rationale for this voluminous request, which is not surprising, as the requested information is irrelevant to the task at hand. Once again, the task at hand is finding substantial similarity between Unix and Linux as it is now. Gathering information regarding the entire development history of Linux, including from potentially hundreds or even thousands of individuals, would not merely require a considerable amount of time, it would be of little or no meaningful assistance. The notion, for example, that "Mr. Torvalds can answer specific questions as to what each contributor intended, and where and how the contributor acquired or developed the derived code," suggests a wholly unrealistic picture of any mortal and of the code development process. The task would be done far faster, and the time better spent, if SCO were simply to put even part of the effort imagined by Mr. Sontag to the task of comparing the Unix and Linux source code SCO already has.

43. Finally, the vast bulk of the information Mr. Sontag lists - and far more information than is necessary to determine substantial similarity - has long been accessible to SCO. Table 1 below lists a collection of web sites with archives of Linux code, mailing lists maintained by kernel authors (indexed by contributor), etc., that covers much of what has been requested and certainly would more than SCO could possible [sic] need.

Table 1: List of Readily Available Source of Information on Linux

V. SUMMARY

44. Mr. Sontag grossly exaggerates what is required to determine whether there is substantial similarity between Linux and SCO's allegedly copyrighted works. The materials necessary to the task have been available to SCO for years and tools capable of evaluating that material in a matter of months have also been available to SCO for years.

45. I declare under penalty of perjury that the foregoing is true and correct.

__[signature]____
Randall Davis

Date: 23 August 2004

Place: Weston, Massachusetts

VI. REFERENCES AND MATERIALS CONSIDERED

References

[1] Eric S. Raymond, Resource page for COMPARATOR 2.0.
http://www.catb.org/~esr/ comparator/

[2] Dick Grune, The software and text similarity tester SIM.
http://www.cs.vu.nl/~dick/ sim.html

Materials Considered

Computer Associates v. Altai, 982 F.2d 693 (2d Cir. 1992)

Gates Rubber, Inc, v. Bando American, Inc., 9 F.3d 823 (10th Cir. 1993)

Mitel Inc, v. Iqtel, Inc. F.3D 1366 (10th Cir. 1997)

References listed above

Websites listed in table 1 above

Declaration of Chris Sontag in Support of SCO's Opposition to IBM's motion for Partial Summary Judgment, undated




1 In the on-line listing, each version number is a link to a file showing exactly what changes were made to go from one version to the next.

2 For example, Mr. Sontag claims that "SCO believes that much of its copyrighted code was copied form AIX and Dynix into Linux." (47.)

3Mr. Sontag (14) states that comparing the 4 million lines of code in the Linux 2.4 kernel with the 3.4 million lines of code in SCO's Unix System V 4.2 MP kernel would require the comparison of 66,000x58,000 pages (assuming about 60 lines of code per page), and that a "initial" review of the code, assuming that each page comparison takes one minute, could take 25,000 man-years to complete. (66,000x58,000 equals 3,838,000,000 minutes or 63,800,00 hours - SCO's calculation of 25,000 man-years thus implies a man-year of approximately 2,552 hours.) The approximately 2 billion lines of additional AIX and Dynix code would result in approximately 33,333,333 (again, SCO's assumption of 60 lines of code per page) pages of code. SCO's suggested method of comparing code would thus require 66,000x33,333,333 = 2,199,999,978,000 minutes, or 36,666,666,300 hours or 14,367,815 man-years to complete.


  


Declaration of Randall Davis of MIT: SCO Is Wrong, Wrong, Wrong - Updated | 517 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
Corrections go here
Authored by: Harry Clayton on Saturday, August 28 2004 @ 02:12 AM EDT
Thank you.

---
Linux: There is no infringing code or Manuals.

[ Reply to This | # ]

OT and other links here.
Authored by: rand on Saturday, August 28 2004 @ 02:17 AM EDT
Gotta love anyone named 'Randall'...

---
carpe ductum -- "Grab the tape" (IANAL and so forth and so on)

[ Reply to This | # ]

Declaration of Randall Davis of MIT: SCO Is Wrong, Wrong, Wrong
Authored by: blacklight on Saturday, August 28 2004 @ 02:30 AM EDT
Dr. Randall Davis's declaration opens an interesting angle: let's see SCOG try
to strike his declaration the way IBM is striking Chris Sontag's. I'd say at
this point that the technical "expertise" and experience of Chris
Sontag and Sandeep Gupta are little more than fraud perpetrated by wannabee UNIX
experts compared to real ones like Randall Davis and Dennis Ritchie. And I
seriously doubt that SCOG has anyone on its staff who is more expert as
interpreting the AT&T contracts than David Frasure. SCOG's legal position is
so precarious that SCOG can safely be called a bunch of walking dead men at this
point - Maybe they know it or may be they don't, but it does not matter anymore.
They can postpone the chainsaw massacre only so many times and only for so much
time before it actually takes place.

[ Reply to This | # ]

$550 per hour
Authored by: AG on Saturday, August 28 2004 @ 02:41 AM EDT
He is making a fortune on this (and he deserves it). And the best part: SCO is
going to pay for it at some point (at least on paper, if they are in chapter 11

by that time).

[ Reply to This | # ]

  • $550 per hour - Authored by: Anonymous on Saturday, August 28 2004 @ 04:24 AM EDT
  • $550 per hour - Authored by: Anonymous on Saturday, August 28 2004 @ 05:01 AM EDT
  • $550 per hour - Authored by: overshoot on Saturday, August 28 2004 @ 08:53 AM EDT
    • $550 per hour - Authored by: Anonymous on Saturday, August 28 2004 @ 10:01 AM EDT
      • $550 per hour - Authored by: Anonymous on Saturday, August 28 2004 @ 12:58 PM EDT
Current Tools and Obfuscated Code
Authored by: mobrien_12 on Saturday, August 28 2004 @ 03:00 AM EDT
Remember when Darl presented the BSDi packet filter code that had been word for
word copied into their UNIX code base and the corresponding similar code in
Linux?

After people said "hey... you copied that stuff from BSD" (which they
were allowed to do), SCO's position was that it was an example of their tools
ability to detect obfuscated code.

Now they are saying that they cannot detect obfuscated code with current tools?


Which is it, SCO?

[ Reply to This | # ]

Declaration of Randall Davis of MIT: SCO Is Wrong, Wrong, Wrong
Authored by: danamania on Saturday, August 28 2004 @ 03:01 AM EDT
> So, having read that and considered the man's credentials,
> does it sound to you like IBM has been refusing to cooperate
> with SCO's legitimate discovery requests?

Looking at the following statement from Mr. Davis:

> As stated, SCO has had, since before the initiation of this
> case, all the raw material it needs to find any alleged
> substantial similarity between Linux and Unix. It of course
> has all relevant versions of Unix; it can get any version of
> the Linux kernel from publicly available web sites.

Not only do SCO have all the material they need to do a comparison between UNIX and Linux that they need, but they are perhaps one of the few groups who do have all the material they need. SCO crying out that they don't have enough information to do a comparison is like Bill Gates or Warren Buffet complaining they don't have enough money.

---
--

[ Reply to This | # ]

Linux Hitmen and other pro IBM Astroturfers post here please.
Authored by: Harry Clayton on Saturday, August 28 2004 @ 03:15 AM EDT
Thank you again.

---
Linux: There is no infringing code or Manuals.

[ Reply to This | # ]

Declaration of Randall Davis of MIT: SCO Is Wrong, Wrong, Wrong
Authored by: Anonymous on Saturday, August 28 2004 @ 03:20 AM EDT
"34. To suggest otherwise leads to the absurd notion that one work can be considered similar to another even if the two are currently completely different, if only one can show a (perhaps very long) sequence of small changes that lead from one to the other. This would be like playing the game of 'telephone,' in which a sentence is successively whispered from one person to the next in a long line, and claiming that, even though the sentence that emerged was totally different from the one that started the process, they were 'substantially similar' because the last was the result of many small changes to the first. Similarity means just that -- similarity. And the determination of similarity is made on the code as it is, independent of how it got that way. . . .

Expect SCO to hammer on this point, as it flies in the face of their derivative works theory.

[ Reply to This | # ]

This so-called expert testimony is easy to rebut.
Authored by: Brian S. on Saturday, August 28 2004 @ 03:29 AM EDT
SCOG could call in Laura Didio. She's seen evidence with her own eyes that shows
parts of Linux were copied from SysV.
I'm sure SCOG would relax their NDA if she would agree to testify on their
behalf and put this so-called expert in his place.

Brian S.

[ Reply to This | # ]

Is everyone trying to be obtuse?
Authored by: Lord Bitman on Saturday, August 28 2004 @ 04:02 AM EDT
While SCO certainly has access to every bit of information it would need to form
a legitimate case if one actually existed, SCO does _NOT_ currently have access
to many of the materials which would be required for THIS case.

SCO's stance is that IBM contributed things derived from Unix. Not line-for-line
copying, but things along the line of: 15 versions ago before this entire
section was re-written, it belonged to SCO. Then it was re-written again for
Linux, and so SCO considers it a derived work.

Now sure, SCO doesnt actually have any of the evidence I would consider
appropriate to make these kinds of accusations and do this whole
"discovery" thing where IBM needs to show every bit of code and SCO
gets to look it over and say "Okay, this part we own transitions into this
part which was added into Linux over a series of several hundred versions. There
is the evidence."

Now sure, SCO is full of crap for trying to base a court case on evidence it
hopes to find (currently having absolutely zero), but could IBM shut them up by
getting them to sign a bunch of NDAs and have them study the code, find out that
no linkages between the code exists? Why does IBM not let them see the code?

The above says anyone can run a complete check to see if any evidence exists in
the material SCO currently has in a matter of months. We all know SCO has no
evidence, SCO admits to having no evidence. SCO has spent this entire case
pleading to force IBM to hand over things which might contain evidence.
(Shouldnt the case have been thrown out about then? "You need discovery so
you can find evidence you believe to be in IBM's code?" "Yes"
"Okay, based on what evidence do you have this belief?" "Uhm,
[theological/philisophical argument about belief and evidence being mutually
exclusive]" "You get to go away now." the end.)

But since the case /wasn't/ instantly dismissed, why doesnt IBM just show off
its code and how independent and unrelated to anything SCO owns? SCO can run
itself further into the ground wasting money studying the code, SCO will finally
be forced to shut up about IBM holding back, and we wont hear anything at all
from SCO for ~1,000 years (if they have 25 people searching), ~100 years (if
they have 250 people searching), or ~25 years (if they have 1000 people
searching) according to them. Isnt that best for everybody? :)


for simplicity, I just said "SCO owns" as opposed to.. SCO claims to
own this or that part but Novelle owns one thing and the Open Group owns
something else and Hitler placed such and such in the public domain in 1796 or
whatever.

---
-- 'The' Lord and Master Bitman On High, Master Of All

[ Reply to This | # ]

I'm sure everyone will correct me if I'm Wrong, Wrong, Wrong
Authored by: Anonymous on Saturday, August 28 2004 @ 04:18 AM EDT
This statement addresses only part of the reason SCO wants to fish through all
of AIX. The other part is the third party confidentiality violation theory
(code beloning to neither IBM nor SCO, but still part of the derrivative, AIX).
IBM addresses it directly in the motion for PDJ, bless their hearts. But I don't
recall the court ruling on that point yet (unless you count the 11th rung
exchange about an eon ago).

So wouldn't it be more accurate to say that SCO is only Wrong, Wrong? At least
until the court rules they are Wrong?

[ Reply to This | # ]

Darl the Snarl, the GPL and the BSD license
Authored by: blacklight on Saturday, August 28 2004 @ 04:23 AM EDT
Darl the Snarl has repeatedly stated how much he hates the GPL, and how badly he
wants it replaced by the GPL. The remark is strange coming from someone who is
anal about defending his alleged IP, since a BSD license would allow anyone to
incorporate his IP into his or her commercial technology using line by line
copying if he or she wishes to. I made the point at the last staff meeting that
since our company is an Open Source technologies consultant, it is incumbent on
ALL of the senior staff to be intimately aware of the details of the top three
or four top Open Source licenses available - We just can't be credible with our
curent or prospective clients if we don't have this instituted.

Apparently, Darl the Snarl has made so many false representations about the GPL
that I am convinced that he would have been fired in any other corporate
environment but SCOG's. When you are a UNIX company selling a proprietary UNIX
and you are directly competing against Open Source and your company is
distributing Open Source tools, it is incumbent upon you and vital that you know
the details of the GPL and the BSD licenses inside and out as well as the
details of your own UNIX's EULA. Darl the Snarl has clearly failed that standard
in front of the whole world, and he is a fool for that. If we add in that SCOG
failed to read the AT&T contracts, the Novell-Old SCO APA and the terms of
its own UNIX license right as evidenced by the outcome of the DCC lawsuit, why
should anyone do business with people who so obviously can't read? And if so,
what is the point for SCOG of SXCOG introducing new products and
"concentrating on UNIX" rather than litigation, except as an exercise
in futility?

[ Reply to This | # ]

OT - The meaning of "license"
Authored by: blacklight on Saturday, August 28 2004 @ 04:40 AM EDT
A licence is a permission that is given by the rightful owner to use his or her property in specified ways: for example, I have the right to give the neighbor's kids license to play in my backyard but I strongly doubt that I have the right to give the little peskies license to pay in yours.

The GPL is a permission that is given by the copyrights holder - holding the copyrights is the required proof ownership, to modify and distribute the copyrights holder's source code under certain conditions. If these conditions are not met, then permission is not granted. Period. It is clear that, by improperly trying to extract a fee even as we speak, SCOG has signally failed those conditions it needs to meet in order to have any permission to distribute Linux. And any of the copyrights holders who contributed code to Linux - not just IBM, has the right to call SCOG on that in a court of law.

[ Reply to This | # ]

OT : UN drive to boost free software
Authored by: Anonymous on Saturday, August 28 2004 @ 05:13 AM EDT
http://news.bbc.co.uk/1/hi/technology/3601710.stm

well thats that then!

[ Reply to This | # ]

The teachings of Experience
Authored by: stevem on Saturday, August 28 2004 @ 06:04 AM EDT
If there's one thing I have managed to learn in 16 years in the field of
Computer Science: is that there is _always_ someone who knows topic X better
than I/you do.

Grin. I suspect SCOG is just now finding out about this "Law of Computer
Science".


Purely delightful.


- SteveM

[ Reply to This | # ]

Groklaws Point of View
Authored by: LordKaT on Saturday, August 28 2004 @ 07:01 AM EDT
"And some say Groklaw has a point of view."

Actually, PJ, it does. Ever since you've taken the "journalist with a paralegal background" stance, the editorials you've provided have been laced with little bits of side comments and personal feelings; for example, in the recent editorial Leon Brooks Powerfully Answers SCO's O'Shaughnessy - aside from the hype of the test article (which is, no doubt, made in order to get a person to read said article) - you add the following comment: "I feel I should just mention that what isn't possible as an individual is sometimes very doable as a class." As an editorial, this is fine behaviour, but it does exhibit a certain point of view (yours); however, you follow up wth this line: "Not that I'd encourage anybody getting in the way of IBM's steamroller at the moment in the US," which, when combined with the previous statement, indicates to certain parties in other countries - most noteably Australia - that they have a very good chance at winning a class-action lawsuit against SCO.

I didn't intend to spend a lot of time on the actual headlines of these editorials; however, considering that I'm short on time, and don't feel like doing more research to point out the little quips and jabs you take at SCO, I would like to point out that when SCO does file some document with the courts, the actual topics are often ridiculing SCO; for example, "SCO Bleats Back - Please Make IBM's 10th CC Go Away, Your Honor," and "Want to Laugh? . . . 'Linux Doesn't Exist'" are the two most recent examples. These are not healines a journalist would write (as, for example, an AP reporter would write). These are headlines commonly found in the editorial section of your newspaper.

If Groklaw were not an editorial, and just a place where actual news stories were posted, comments - such as those at the end of this very editorial - would be nowhere to be found. Instead, it would only report the facts of the case.

So, yes, PJ Groklaw does have a point of view: your point of view; but, that's OK. It's why I come here. If it were just a place where legal documents from Pacer were placed, Groklaw would serve almost no purpose.

However, I wish you would stop trying to persuade people that Groklaw does not present a specific point of view, because that is an outright lie.

[ Reply to This | # ]

OT: More woes for M$.
Authored by: Anonymous on Saturday, August 28 2004 @ 08:46 AM EDT
Link

[ Reply to This | # ]

Declaration of Randall Davis of MIT: SCO Is Wrong, Wrong, Wrong
Authored by: Anonymous on Saturday, August 28 2004 @ 09:12 AM EDT
Randall's declaration is he-lar-e-ous! I suspect that the judge will privately
laugh himself right off of his chair. Although this is a declaration in defense
of IBM, it does read more closely to that of an arbitration specialist. His
credentials alone are kinda spooky... Even if SCO manages to strike some of the
declaration editorial, the remaining facts will evoke some very interesting
responses from the SCOG.

Analogy - Bugs Bunny, Barber of Seville... Bugs as IBM and Fudd as SCO.

[ Reply to This | # ]

Legal Procedure Type Question
Authored by: NastyGuns on Saturday, August 28 2004 @ 10:04 AM EDT

Ok, question for those lawyers or knowledgeable others on Groklaw here. Let's see if I can ask/phrase this properly to ask what I'm after.

What if any procedural rules are judges required to follow when making their rulings? IOW, IBM has submitted Randall Davis's declaration, in support of thier Motion to Strike Materials in Opposition to IBM's Cross-Motion for PSJ so what limits are there on a judge to use this declaration in making a decision on another motion that the declaration was not filed in support of?

I'm not sure if I'm clearly representing my question, but as an example, as I said, this declaration is in support of IBM's Motion to Strike Materials, is the judge bound by any procedural rules, ethics, or whatever else, that would not also allow them to use this filing in the decision of say IBM's Motion to Strike the Declaration of Chris Sontag, even though IBM has also filed a Declaration by a Ms Thomas in support of said motion?

So far, we (as in Groklawians(?)) have not yet seen Ms Thomas' declaration (at least not to my knowledge) and therefore do not have a clear and concise idea of what she's stated. Because of this, I'm of the opinion that Mr. Davis's declaration would convince me (as a judge) to strike Chris Sontag's declaration (and not that Ms Thomas' declaration doesn't do it but I haven't seen her statements), or at the very least, those portions that are directly refuted by Randall Davis.

IANAL or anything close and therefore not familiar with any possible procedural rules.

---
NastyGuns,
"If I'm not here, I've gone out to find myself. If I return before I get back, please keep me here." Unknown.

[ Reply to This | # ]

small changes and derivative works
Authored by: phrostie on Saturday, August 28 2004 @ 10:04 AM EDT
just had a thought.
maybe we should encourage the court to accept this theory after all. then all
technoligy will be a derivative work of either the wheel(methods of utilizing a
tool ) or fire(methods of utilizing the transfer of energy). these could be
extended to cover all computing hardware and software with SCOXs small changes
theory. now, i'm not sure who SCOX is claiming to be this week, but i don't
recall Darl claiming to be the neanderthall that discovered either of these.
even if he does, i think these "methods and techniques" have entered
public domain long ago.

---
=====
phrostie
Oh I have slipped the surly bonds of DOS
and danced the skies on Linux silvered wings.
http://www.freelists.org/webpage/snafuu

[ Reply to This | # ]

All journalism has a point of view.
Authored by: Anonymous on Saturday, August 28 2004 @ 10:47 AM EDT
All journalism has a point of view, coloured by the background, upbringing
and opinions of the author and often the stance of the organ they are writing
for. Let's not promote the fiction that there can ever be completely neutral
reporting.
I think PJ's comment "And some say Groklaw has a point of view." was
somewhat tongue-in-cheek.
Personally I love PJ's little quips, and they are backed by solid evidence.

[ Reply to This | # ]

SCO totally loosing....
Authored by: kberrien on Saturday, August 28 2004 @ 10:53 AM EDT
Its amazing how poorly SCO is proceeding in this case. Why isn't there a
CREDIBLE expert for the prosecution. SCO appears to have made no attempt (and
sure, they could get someone to see things their way - money talks) to garner
their own expert - to refute IBM's.

Putting your own execs up as experts is just pathetic. It's almost as if there
is one small clique, those who have something to loose, that are persuing the
case because they have too.

Either SCO never had much faith, will, or smarts at the beginning of the process
- or they've completely lost what they have. I'm beginning to believe the whole
idea was to get IBM to buy SCO out, or a proxy war.

Its as if, even if SCO HAD some valid evidence, I think they'd still loose.

[ Reply to This | # ]

SCO's three reasons for every iteration of AIX -- **new claim by SCO**
Authored by: Anonymous on Saturday, August 28 2004 @ 11:02 AM EDT
SCO have so far given three reasons why they need every iteration AIX/Dynix

Reason #1:
---------------
To compare Linux and UNIX with regard to IBM CC 10 (for Linux copyright
infringements)

Two problems with this theory

(a) Derivation in copyright, doesn't work by history. See Davis' telephone game
story.

(b) There is no explanation of why SCO need the history of code that IBM did
*not* contribute to Linux. Even if you were to ignore point (a), why would SCO
need the history of code that IBM did *not* contribute to Linux - surely SCO
would only need the history of only that code (a much smaller and
non-conterminous subset) that IBM did contribute to Linux


Reason #2
--------------
For SCO's contract theory that IBM is not allowed to contribute IBM's home grown
code because it was once part of AIX.

Ignoring the merits of SCO's theory (which IBM have addressed in their motion
for PSJ on SCO's contract claims)...

I'm still not clear why they need the history of every version of AIX/Dynix.

Surely SCO already have what they want for this theory:

(a) SCO has (and IBM acknowledges) that there is some System V code in
AIX/Dynix

(b) SCO has (and IBM seems to acknowledge) that IBM have contributed some
*other* IBM homegrown code from AIX/Dynix to Linux

If SCO really believed their theory were correct, then surely SCO should move
for summary judgement on their contract claims.

And most importantly...

As with reason #1

(c) There is no explanation of why SCO need the history of code that IBM did
*not* contribute to Linux. Even if you were to ignore point (a), why would SCO
need the history of code that IBM did *not* contribute to Linux - surely SCO
would only need the history of only that code (a much smaller and
non-conterminous subset) that IBM did contribute to Linux



Reason #3 **NEW SCO ARGUMENT**
--------------

SCO raised this in their reply motion in support of their "renewed"
motion to compel

They now seek the entire history of AIX in connection with IBM's 9th
Counterclaim (that IBM's AIX activities do not infringe SCO's copyrights).

SCO recently told the court their own copyright claim is primarily for IBM's
continued distribution of AIX after termination. However SCO's complaint
claims two sorts of copyright infringement (by IBM's breach of contract *and* by
IBM's post-termination conduct).... The question is - which is it SCO?




Quatermass
IANAL IMHO etc

[ Reply to This | # ]

More thoughts on TSG derivative theory
Authored by: Anonymous on Saturday, August 28 2004 @ 11:32 AM EDT
If I was a musician and one evening while sitting at home and playing a popular
song I had an idea. I changed a few chords, then a few notes, then a few more
chords, and after a while I was playing a completly different melody. I added
my own words and released my song. According to TSG's theory the owner of the
original song could claim copyright on my song because I started by playing his
song.

WOW!

[ Reply to This | # ]

Its all about discovery, dummy
Authored by: QTlurker on Saturday, August 28 2004 @ 11:39 AM EDT

It is not about the code!!! It never was. It is all about discovery, about getting deep into the underwear drawers and rummaging around until gold is found. SCO doesn't want to see the code, they are basically claiming that code comparisons are useless. SCO's team is lead by lawyers, not geeks. They are looking for interesting and incriminating sound bites in the comments, notes, and supporting documents.

SCO's attempt to get broad discovery is a common thread in IBM, AZ, and DC. There was no other rationale for DC other than to find out what DC engineers might have said about their Linux contributions.

People who have past success with a strategy, tend to repeat it ad nauseum. Ryan E. Tibbitts, is SCO Vice President and General Counsel. He was part of the very successful team that took MS to the cleaners in the DRDOS case. Caldera managed to get deep discovery from MS and got sufficient quotes to make their case. Unsealed Caldera documents expose MS' DR-DOS moves
They are looking for stuff that persuades a jury and the public. Quotes such as this one , from wirednews.com, that was devastating to MS even though it meant nothing legally.

In 1989, for example, Caldera quoted Microsoft Chairman Bill Gates telling President Steve Ballmer, "Our DOS gold mine is shrinking and our costs are soaring -- primarily due to low prices, IBM share, and DR-DOS.

Then again, there is Tibbitts own victory speech, an article in the Utah Bar Journal.

As one of Caldera's lawyers, I learned (or relearned) some valuable lessons from my participation in the case. ...

10. Take Some Risks. ... We knew that Microsoft is one of the wealthiest companies in the world, is aggressive in its litigation and would undoubtedly hire top firms and lawyers to defend this case. ...

7. "Victory is in the Documents." At about the time we began discovery in the case, an issue of Litigation3 arrived. That issue, which is dedicated to discovery, contains several interesting articles, including one entitled "Victory is in the Documents."4 The introductory page to the Discovery section contained the following statement:

The dream, of course, is to be called two weeks before trial to try the case. . . . Reality, however, is different. Most cases settle, and victory is not in the scathing cross, but in the tedious review of documents. . . . For it is Discovery which we do. The motions, the papers, the depositions. This is the numbing, dig ditching work that determines the winner. ..."

We circulated a copy of this statement to our team...

There is too much intesting stuff here. Read the article. Of course, today's SCO ignores some of Tibbitts's own advice. Possibly because Boies brings his own successful anti-MS experience.

We see many differences between the DRDOS case and the present case, but I am not sure that SCO does. We are geeks, we want to see the code and the comparisons.

[ Reply to This | # ]

Declaration of Randall Davis of MIT: SCO Is Wrong, Wrong, Wrong
Authored by: Anonymous on Saturday, August 28 2004 @ 12:11 PM EDT
"I like the rule of Hanson's Razor: "Never ascribe to malice that
which can be adequately explained by stupidity.""

I believe in this case we are dealing with a fatal combination of malice and
stupidity.

[ Reply to This | # ]

Comparator software = ESR and Prof from same U as Tanenbaum
Authored by: caliboss on Saturday, August 28 2004 @ 01:10 PM EDT
Anybody else notice the not-so-subtle dig that Davis refers to two specific software programs to perform the Unix-Linux comparison and they are...

  1. Eric Raymond's Comparator which he created waaaay back when this whole mess got started, and,
  2. SIM from a professor at the SAME UNIVERSITY where Professor Andrew Tanenbaum (of Minix fame) teaches.

I find this deliciously ironic!

---
Grok the Law / Rock the World

[ Reply to This | # ]

ANNOUNCING: BCTP
Authored by: Anonymous on Saturday, August 28 2004 @ 01:51 PM EDT
Announcing the Big Code Theft Project

This project is an extension of current reformatting and code-obscufication technology.

Not only will it do the usual things like:

  • local variable-name replacement
  • unrolling loops
  • adding/replacing copyright notices incomments
  • changing whitespace/pretty-printing

    But it will use new technology to:

  • divine the author's intent
  • fix bugs
  • write an entire new program with the same functionality but without the bugs

    Project team size: 2
    Expected completion date: 4Q A.D. 14500

    Major funding for this project is provided by The SCO Group (SCOX).

    [ Reply to This | # ]

  • Declaration of Randall Davis of MIT: SCO Is Wrong, Wrong, Wrong
    Authored by: jim Reiter on Saturday, August 28 2004 @ 01:59 PM EDT
    Why not old fashion blackmail. TSG is threatening IBM with exposure of huge
    amounts of IBM code, "if IBM does not settle with TSG" or alternately,
    if someone else buys TSG out they may see the IBM "goodies".

    The TSG object is to keep pressure on IBM. More discovery, more discovery, more
    discovery.

    In the mean time IBM is building a substantial record against TSG.

    TSG on the other hand will shortly be coming face to face with 4.16 (b). The
    argument with be, "even if TSG is right about everything, they have waived
    their (TSG's) right to sue (per Novell).

    [ Reply to This | # ]

    IF TSG's INHOUSE EXPERTS WERE SAYING HALF AS MUCH AS THIS...
    Authored by: Anonymous on Saturday, August 28 2004 @ 02:23 PM EDT
    TSG would have been knowingly lying in public, in their court filings, and
    in their court statements since January (when they once and for all came
    up empty handed after their best try to respond to the judge's order that
    they were first up to respond to IBM's discovery requests).

    TSG has even gone so far as to tell different Federal judges logically
    contradictory stories. Is that perjury?

    TSG executives have their own teams of experts telling them the same
    fundamental truths. There is no infringement. It is plainly obvious there
    is no infringement.

    I fear for the IBM executives, employees, and consultants that TSG are
    obviously targeting. TSG is hunting and it ain't for real evidence.

    [ Reply to This | # ]

    Derivative Argument
    Authored by: JamesKatt on Saturday, August 28 2004 @ 02:24 PM EDT
    If SCO is allowed to use it's derivative theory about copyright code, then Unix

    System V should be then in the public domain.

    The argument is as follows:
    1. Unix System 3 was placed in the public domain by AT&T.
    2. Unix System V is a derivative of Unix System 3 arrived at by small gradual
    changes to Unix System 3.
    3. Therefore, Unix System V is in the public domain.
    4. Therefore, SCO has no copyright to Unix System V.

    ---
    I ANAL

    [ Reply to This | # ]

    Declaration of Randall Davis of MIT: SCO Is Wrong, Wrong, Wrong
    Authored by: jim Reiter on Saturday, August 28 2004 @ 02:28 PM EDT
    Another fence to jump.

    TSG is SOL on GPL.

    More from the IBM Counterclaim. These issues are included in the 8th
    counterclaim. IBM can raise all of them on 9/9/04.

    F. SCO's Open-Source Activities

    37. Until it undertook the scheme described herein, SCO supported the
    open-source community. According to SCO, it fully embraced the open-source
    model.

    38. SCO Linux products encompass a range of software that uses a number of
    different licensing schemes, including open-source licenses and, in particular,
    the GPL. Components of SCO's Linux products (such as OpenLinux), including the
    Linux kernel, have been developed and made available for licensing under the GPL
    and similar licenses, which generally allow any person or organization to copy,
    modify and distribute the software, without royalty, in any form, including
    source code.

    39. Due to the open-source nature of many of SCO's software products and the
    licenses under which it has developed and distributed them, SCO's collection of
    trademarks constitutes its most important intellectual property.

    40. At least until it undertook the scheme described herein, SCO contributed
    tools and technology to the open-source community. For instance, SCO
    incorporated open- source components in its product offerings to the betterment
    of its products, and gave away CD-ROMs containing its Linux operating system at
    trade shows and allowed it to be freely downloaded over the internet to
    encourage interest.

    41. In addition, SCO fostered, and regularly contributed to, multiple
    open-source development projects in order to enhance the capability of SCO's
    products and services. In fact, SCO's business model depended upon incorporating
    contributions from the open-source community into products that it open
    sourced.

    42. SCO also fostered and supported the development of additional open-source
    and Linux enhancements through the Open Source Development Lab and through
    participation as a key member of many industry standard and open-source
    initiatives.

    Summary:

    1. TSG wrong on facts

    2. TSG in violation of GPL

    3. TSG waived the right to sue IBM (4.16 (b))

    4. TSG has no damages since TSG release Linux in 2000 under GPL

    [ Reply to This | # ]

    Declaration of Randall Davis of MIT: SCO Is Wrong, Wrong, Wrong
    Authored by: techgrrl on Saturday, August 28 2004 @ 04:55 PM EDT
    "34. To suggest otherwise leads to the absurd notion that one work can be considered similar to another even if the two are currently completely different, if only one can show a (perhaps very long) sequence of small changes that lead from one to the other. This would be like playing the game of 'telephone,' in which a sentence is successively whispered from one person to the next in a long line, and claiming that, even though the sentence that emerged was totally different from the one that started the process, they were 'substantially similar' because the last was the result of many small changes to the first. Similarity means just that -- similarity. And the determination of similarity is made on the code as it is, independent of how it got that way. . . .


    I like this analogy better: SCO is claiming that the word "BOND" is a violation of their copyright on the word "GAGE" because GAGE can be transformed into BOND by changing one letter 9 times. (Try it for yourself.)

    ---
    Reality is for those who can't handle science fiction

    [ Reply to This | # ]

    Declaration of Randall Davis of MIT: SCO Is Wrong, Wrong, Wrong
    Authored by: waltish on Saturday, August 28 2004 @ 05:00 PM EDT
    We have every right to reject what he says , that is what dissagreement is all
    about , he say something that we think is a crock and we tell him so.

    Thats what I dont get about the astrotuff push to get us to shut up and not
    express our opinions , It dosent matter how softly spoken the push is we will
    see through it, so it basicly a waste of their time.

    If you want to go around telling peeps it impolite to speak their mind go visit
    Dido and Enderle eic and tell them so.
    I bet you dont , me wonders why.

    w

    ---
    To speak the truth plainly and without fear,Is powerfull.

    PS: Beware the Gestank of SCO.
    PPS: SCO's argument does not withstand analysis.

    [ Reply to This | # ]

    Due process
    Authored by: Anonymous on Saturday, August 28 2004 @ 06:10 PM EDT
    The courts have only allowed SCO due process - they must ensure that SCO has
    every chance to prove it's case, and that they follow proper judicial rules.
    Otherwise they would be subject to overturn on appeal.

    Judges often give litigants enough rope to hang themselves, and there is no
    exception in this case.

    The judges have not let SCO go hog wild, and have slapped them on the hands a
    couple of times for their poor litigation and process. (think motions to
    compel)

    When all is said and done, assuming they are right because the judges haven't
    laughed them out of court is simply a fallacy;
    i.e. not yet declared wrong = right. Remember, IBM (and the FOSS community in
    turn)is innocent until *proven* guilty.

    Conjecture, hearsay, allegations, blustering, booming, wishing, insisting, and
    deceit are no substitute for real evidence, which they should have had in hand
    prior to opening this can of worms.

    [ Reply to This | # ]

    • ooops - Authored by: Anonymous on Saturday, August 28 2004 @ 06:16 PM EDT
    LinuxWorld attack
    Authored by: Anonymous on Saturday, August 28 2004 @ 06:52 PM EDT
    The troll Daniel Wallace aka gumout is attacking
    Groklaw's cybervegan over at LinuxWorld.
    http://www.linuxworld.com/story/46131_f.htm
    Doesn't this kook ever sleep?

    GPL DEFENDER

    [ Reply to This | # ]

    Have SCOG done the Abstraction/Filtration Test?
    Authored by: WayneStPaul on Saturday, August 28 2004 @ 08:58 PM EDT
    I remember a while back when SCO was repeatedly publishing copied code samples.
    Almost immediately they were challenged as 1) not being SOCG property, 2) being
    public domain (or under the BSD license) or 3) being independently developed
    code.

    The process of identifying these code fragments was abstraction and comparison.

    The process of the community debunking was filtration.

    It seems to me that SCOG said that they had other examples that we have never
    heard or seen. I assume that they looked a little closer at these fragments
    and performed the filtration process upon them until there were no fragments
    left. If they had a single fragment that would pass the abstraction filtration
    test (and at one time they seem to have thought that they did) I assume that
    they would have shown it by now.

    SO maybe they have done the test and discovered that there is no code and are
    trying to survive on bluster.

    [ Reply to This | # ]

    SCO was hired to delay
    Authored by: dracoverdi on Saturday, August 28 2004 @ 09:20 PM EDT
    I think SCO's charter from Microsoft was, and is: delay.

    delay acceptance of Linux
    delay development of linux
    delay the crumbling of Microsoft's monopoly
    delay the future, lest lightness fall

    I wonder what percentage of SCO legal actions and motions could be summarily
    characterized as delays.

    The court should say: "25,000 man years? Well, you better hire 650,000
    people because you only have two weeks"


    ---
    The problem with ignorance is that the afflicted are unaware of their ailment

    [ Reply to This | # ]

    Davis Himself Wrong in Para 33 &34
    Authored by: HighOrbit on Saturday, August 28 2004 @ 11:06 PM EDT
    While I agree with Davis overall, I have to nitpick about these two paragraphs.
    33. As I understand the concept, and as is only logical, substantial similarity must be a determination about two bodies of code as they are, not a question of their heritage.
    and
    34. To suggest otherwise leads to the absurd notion that one work can be considered similar to another even if the two are currently completely different, if only one can show a (perhaps very long) sequence of small changes that lead from one to the other.
    What is wrong about these two paragraphs is that (while strictly true) they play down the importance of derivation in this case. Part of SCO's claim is about derivative works and not strictly relative similarity. Even if the current state of the LINUX code is wildly different from UNIX Sys V, the code would still be a derivative work had it started out as UNIX Sys V and evolved through any number of steps to its current state. In the case of a derivative, the starting point and "heritage" really does matter even if few superficial similarities remain at the end. My understanding is that copyright protections extend, not only to verbatim copies, but also to derivative works.

    That being said, so far nobody has presented any evidence that LINUX is derivative from UNIX other than either indirect heritage from unencumbered BSD and the fact that it was inspired by UNIX.

    [ Reply to This | # ]

    The Real Game....
    Authored by: cozzi on Sunday, August 29 2004 @ 05:12 AM EDT
    I usually just read Groklaw and stay silent. Unless of course I *really* have
    something to say.

    I guess I do.

    The scary thing about the whole of the TSG action over the last year, is
    punctuated by the declaration of Randall Davis.

    Why on God green earth would you have to pull the "First Cousin of the
    Father of Computing" out of MIT for a declaration, on a legal copyright
    issue that for anyone who understands computers and code can see as the garbage
    it is from a mile away.

    Well the fact of the matter is that the court system is ill equipped to deal
    with a technology issue. If there was not months and years of
    "discovery" over "mystical code" which the court itself
    doesn't understand, were this simply a copyright case, it would have been over
    in a month.

    But because of the form of the disputed material, the low level of expertise the
    court system has in dealing with these issues, and the fact that TSG *knows*
    this- we are treated to a PR campaign that is slow roasted in the juices of a
    court system that is ill equipped to deal with these issues.

    Randall Davis makes a valid point about the "brittleness" of code. It
    is very brittle. The materials that copyright was intended to protect were not
    "brittle".

    When someone copies the Mona Lisa by brush stroke, using their own brush
    strokes, there is no copyright infringment. Art students do this all the time.

    My point in all this is that computer code cannot and should not be allowed to
    be measured by copyright law. There must be new legislation. Period. I'm a
    radical where this is concerned.

    The reason is that I can buy a book. I can read that book. The book is
    copywritten. The topic of the book is perhaps "Sewing". I may not copy
    and resell that book without the copyright. But I *can* use the information in
    that book to create works of my own. I can stipulate the source of the
    information in my own book on sewing.

    The upshot is that computer code should be treated *exactly* like a work of this
    kind. Because after all, software is simply a "how to" book for
    processors. And if the truth be known, when writing in C, you are simply piecing
    together pieces of another book called "Assembler".

    Which leads me to intellectual property... What a joke! I am not protected as a
    person against someone else using what I know. I am protected by patent office
    from infringment on design.

    If written works are equal under the law, why don't I have access to all the raw
    code created by any software company- for "fair use" purposes?

    When Microsoft says that their operating system is secure, I am prevented from
    reviewing their code for "fair use" in a work where I might refute
    their claims.

    For instance- I could hire an electrician, but would never be allowed to learn
    what they know the way that software code is managed by proprietary companies.

    It's old world "Trade Guild" mentality. Keep the knowledge within the
    clan, within the lodge, within the religious order.

    I would prefer that everyone had the knowledge. Or better the choice to have it.
    Source should be viewable by anyone. How that source is used- can be controlled
    by copyright.

    I am a Systems Engineer. And a damned good one. I'm not much of a programmer but
    I have my moments. I would be working at McDonalds right now if it were not for
    Linux. Mostly because the markets I worked in had been in substance taken over
    by Microsoft.

    So I do have my bias.

    But someone needs to walk up to that judge, look him in the eye, and explain:

    "Your honor, Linux is what you get when a monopolist has so controlled the
    marketplace, that programmers have decided to work for free, in order to get an
    operating system at the level of quality that they find acceptable, and avoid
    making financial commitments to Microsoft or other propriatary software
    companies. If the government fails in it's antitrust regulation badly enough,
    the market will always correct itself. That correction is Linux, Samba, Mozilla,
    Opera, Etc. Have a nice day".

    What if ALL the people had access to Microsoft's source code? And they had
    access to everyone elses? Microsoft might still make money as well...

    Oh I dream of a perfect world.

    However, it would be my belief, that the leaders of TSG should get long jail
    terms for taking advantage of a court like this. They know the courts are ill
    equipped to deal with these issues- they are counting on it. They still will not
    win- not by a long shot.

    And one very last thing:

    I just ate one of those Oncore Salisbury Steak dinners, with some nice fluffy
    rice. My wife is in the other room sleeping on a new mattress. I have an
    unopened paycheck just to my left on my desk.

    I try to remember, that the unopened paycheck just to my left, the salisbury
    steak, and the new mattress, are all provided by dollars paid to me for
    maintaining linux systems, auditing network security with my linux systems, or
    hosting people on my linux systems. I charge significantly less than a Windows
    consultant. I'm living a lot more simply since the tech crash.

    It was also the Linux *community* that helped me retool. First I downloaded a
    distro, then I looked at the code, then I asked questions (many times of the
    people who actually had written the software)- I got answers. I was received
    respectfully. I was retooled for free, in a community spirit, without having to
    pay for it, by many people who only know me by e-mail.

    But you know what. The people who I am paid by now are involved in selling
    things, building things, and helping other people (charities). They need someone
    like me. I don't sell, build, or solicit.

    That as I see it is how it ought to be. At least I know who my friends are.

    [ Reply to This | # ]

    Groklaw © Copyright 2003-2013 Pamela Jones.
    All trademarks and copyrights on this page are owned by their respective owners.
    Comments are owned by the individual posters.

    PJ's articles are licensed under a Creative Commons License. ( Details )