{"id":2526,"date":"2003-10-29T05:53:20","date_gmt":"2003-10-29T04:53:20","guid":{"rendered":"https:\/\/destinationcyber.com\/?p=2526"},"modified":"2003-10-29T05:53:20","modified_gmt":"2003-10-29T04:53:20","slug":"affaire-linux-la-reponse-tant-attendue-de-sco-a-ibm","status":"publish","type":"post","link":"https:\/\/destinationcyber.com\/?p=2526","title":{"rendered":"Affaire Linux : la r\u00e9ponse tant attendue de SCO \u00e0 IBM"},"content":{"rendered":"<p class=\"post_excerpt\">Dans un document de 21 pages, SCO r\u00e9pond \u00e0 la contre-attaque d&rsquo;IBM, et maintient ses affirmations concernant Linux <\/p>\n<p>Apr\u00e8s une premi\u00e8re attaque en mars de SCO contre IBM, le premier affirmant que le second avait enfreint ses droits sur Unix en int\u00e9grant du code prot\u00e9g\u00e9 dans Linux, IBM a r\u00e9pliqu\u00e9 \u00e0 l&rsquo;image de Red Hat en contre-attaquant devant la justice f\u00e9d\u00e9rale am\u00e9ricaine.<\/p>\n<p>SCO vient de publier un document de 21 pages en r\u00e9ponse \u00e0 la proc\u00e9dure lanc\u00e9e par IBM, document t\u00e9l\u00e9chargeable au format pdf. <\/p>\n<p>S&rsquo;il reconna\u00eet la validit\u00e9 de certaines objections d&rsquo;IBM, l&rsquo;\u00e9diteur ne manque pas de r\u00e9affirmer ses droits sur Linux.<\/p>\n<p>Selon SCO, Linux est une \u00ab\u00a0version non autoris\u00e9e d&rsquo;Unix, dont la structure, l&rsquo;assemblage et l&rsquo;organisation ne peuvent pas \u00eatre techniquement distingu\u00e9es\u00a0\u00bb. La seule distinction provient de la gratuit\u00e9 de Linux, destin\u00e9e \u00e0 \u00ab\u00a0d\u00e9truire\u00a0\u00bb les syst\u00e8mes d&rsquo;exploitation propri\u00e9taires.<\/p>\n<p>En clair, chacun campe sur ses positions !<\/p>\n<p>[source &#8211; Silicon.fr]&nbsp;Yves Grandmontagne  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans un document de 21 pages, SCO r\u00e9pond \u00e0 la contre-attaque d&rsquo;IBM, et maintient ses affirmations concernant Linux <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_citadela_custom_class":"","footnotes":""},"categories":[19],"tags":[],"class_list":["post-2526","post","type-post","status-publish","format-standard","hentry","category-e-droit"],"_links":{"self":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/2526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2526"}],"version-history":[{"count":0,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/2526\/revisions"}],"wp:attachment":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}