In the red corner, Big Red, and in the blue corner... the rest of the tech industry

Innovation freedom may not be so free if US Supreme Court rules Google ripped off Oracle's Java APIs


Column Later this spring, the US Supreme Court will hear Google v Oracle. This is the final appeal of a decade-long case in which Oracle claims Google stole the Java application program interface (API) structure that defines how programs interact with Java's own libraries. That Google reproduced the API in Android is not in doubt; until Oracle kicked up a stink, it was also not in doubt that APIs could not be copyrighted.

But anything can happen in court. Having lost multiple other cases, Oracle thought it might as well have a pop at stopping what it says is theft but everyone else sees as a defining feature of software innovation. Oracle claims that if Google is allowed to replicate the API, then invention will be stifled and honest, hard-working companies devoted to the greater good will be cruelly denied their just rewards. Yes, that Oracle.

At the time of writing, Oracle stands alone in this opinion, well almost alone. Google on the other hand has amassed a formidable set of allies prepared to testify in its favour - Microsoft, IBM, industry associations and hundreds of academics.

Add me to that list. For I once put bread on my table and beer in my belly by replicating an API.

Arise, Frankendog

In 1987, I was the first employee at a London start-up called Alfa Systems. The two co-founders, David Karlin and Mike Leadbetter, were like me part of the great diaspora of Sinclair Research staff cast into the outer darkness when Amstrad bought the company's corpse. Karlin had been chief designer of the QL and Leadbetter had to sell the result. Reasoning that if they could survive that they could survive anything, they set up shop to peddle new electronic ideas of their own.

The first big thing from Alfa was going to be a PC networking system, and I was hired to write the software bits. Although the IBM PC standard was established by then there wasn't anything approaching a standard network: Ethernet was too expensive and TCP/IP barely three years old, both being things you maybe read about in obscure technical journals.

IBM itself had developed a PC network, a monstrosity that used cable TV distribution technologies. It did at least work with PC/MS-DOS and had a documented interface, so we decided to build our own system to be compatible with that.

Since these were the days when Windows was just a DOS application; we had to write the software to work with DOS. No applications had any concept of networking, so our software had to insinuate itself at the DOS API level, intercepting all of the disk commands and making the network look like a giant floppy. While a lot of the DOS API was documented, some of the really important bits were kept secret by Microsoft, presumably to stop people like us doing things that Bill Gates wanted to keep to himself. But we had a disassembler and we knew how to use it: there are ultimately no secrets in computing. Reader, we pulled that puppy apart and built a Frankendog.

A large part of my time, therefore, was writing code that sat above and below the API, and thus replicating very closely how that API worked. We ended up with one of the first affordable networking systems on the market, well before Microsoft got that act in gear. We'd heard that a new Utah company called Novell was in the same business, but we'd see them off, right?

Dirty tricks and secrets

OK, so that last bit didn't materialise. But if Oracle's take on API copyright had been in force, neither of us would have been able to even try. Microsoft desperately wanted to control the MS-DOS market well beyond the legal tools available to it back then, both by trying to keep essential technical details secret and through a range of dirty tricks.

Had it had legal control over usage of the API, the PC market would have gone the same way as all previous proprietary computing environments and turned into an exercise in milking maximum money out of customers by any means short of actually innovating. By the same reasoning, IBM PC clones would also have been shut down through copyright of the BIOS API, giving IBM the same power over personal computing as it had enjoyed, with much litigation, in mainframes. You can see why Oracle likes this idea.

The irony, of course, is that open computing has produced the most fevered upsurge in new technology since the Industrial Revolution. The richest companies in the world are the tech giants - Apple, Google, Microsoft itself - all borne aloft ultimately on open hardware, open software and most critically, open networking. The common language that defines the Internet is its APIs. They are how everything plugs together.

Take a good look around. If the Supremes find for Oracle, nothing much will change thereafter. Technology will belong to the companies who can afford to buy the most APIs and set up their toll booths accordingly.

You thought the past five years were bad? Oh boy. ®

Similar topics


Other stories you might like

  • Warehouse belonging to Chinese payment terminal manufacturer raided by FBI

    PAX Technology devices allegedly infected with malware

    US feds were spotted raiding a warehouse belonging to Chinese payment terminal manufacturer PAX Technology in Jacksonville, Florida, on Tuesday, with speculation abounding that the machines contained preinstalled malware.

    PAX Technology is headquartered in Shenzhen, China, and is one of the largest electronic payment providers in the world. It operates around 60 million point-of-sale (PoS) payment terminals in more than 120 countries.

    Local Jacksonville news anchor Courtney Cole tweeted photos of the scene.

    Continue reading
  • Everything you wanted to know about modern network congestion control but were perhaps too afraid to ask

    In which a little unfairness can be quite beneficial

    Systems Approach It’s hard not to be amazed by the amount of active research on congestion control over the past 30-plus years. From theory to practice, and with more than its fair share of flame wars, the question of how to manage congestion in the network is a technical challenge that resists an optimal solution while offering countless options for incremental improvement.

    This seems like a good time to take stock of where we are, and ask ourselves what might happen next.

    Congestion control is fundamentally an issue of resource allocation — trying to meet the competing demands that applications have for resources (in a network, these are primarily link bandwidth and router buffers), which ultimately reduces to deciding when to say no and to whom. The best framing of the problem I know traces back to a paper [PDF] by Frank Kelly in 1997, when he characterized congestion control as “a distributed algorithm to share network resources among competing sources, where the goal is to choose source rate so as to maximize aggregate source utility subject to capacity constraints.”

    Continue reading
  • How business makes streaming faster and cheaper with CDN and HESP support

    Ensure a high video streaming transmission rate

    Paid Post Here is everything about how the HESP integration helps CDN and the streaming platform by G-Core Labs ensure a high video streaming transmission rate for e-sports and gaming, efficient scalability for e-learning and telemedicine and high quality and minimum latencies for online streams, media and TV broadcasters.

    HESP (High Efficiency Stream Protocol) is a brand new adaptive video streaming protocol. It allows delivery of content with latencies of up to 2 seconds without compromising video quality and broadcasting stability. Unlike comparable solutions, this protocol requires less bandwidth for streaming, which allows businesses to save a lot of money on delivery of content to a large audience.

    Since HESP is based on HTTP, it is suitable for video transmission over CDNs. G-Core Labs was among the world’s first companies to have embedded this protocol in its CDN. With 120 points of presence across 5 continents and over 6,000 peer-to-peer partners, this allows a service provider to deliver videos to millions of viewers, to any devices, anywhere in the world without compromising even 8K video quality. And all this comes at a minimum streaming cost.

    Continue reading
  • Cisco deprecates Microsoft management integrations for UCS servers

    Working on Azure integration – but not there yet

    Cisco has deprecated support for some third-party management integrations for its UCS servers, and emerged unable to play nice with Microsoft's most recent offerings.

    Late last week the server contender slipped out an end-of-life notice [PDF] for integrations with Microsoft System Center's Configuration Manager, Operations Manager, and Virtual Machine Manager. Support for plugins to VMware vCenter Orchestrator and vRealize Orchestrator have also been taken out behind an empty rack with a shotgun.

    The Register inquired about the deprecations, and has good news and bad news.

    Continue reading
  • Protonmail celebrates Swiss court victory exempting it from telco data retention laws

    Doesn't stop local courts' surveillance orders, though

    Encrypted email provider Protonmail has hailed a recent Swiss legal ruling as a "victory for privacy," after winning a lawsuit that sees it exempted from data retention laws in the mountainous realm.

    Referring to a previous ruling that exempted instant messaging services from data capture and storage laws, the Protonmail team said this week: "Together, these two rulings are a victory for privacy in Switzerland as many Swiss companies are now exempted from handing over certain user information in response to Swiss legal orders."

    Switzerland's Federal Administrative Court ruled on October 22 that email providers in Switzerland are not considered telecommunications providers under Swiss law, thereby removing them from the scope of data retention requirements imposed on telcos.

    Continue reading
  • Japan picks AWS and Google for first gov cloud push

    Local players passed over for Digital Agency’s first project

    Japan's Digital Agency has picked Amazon Web Services and Google Cloud for its first big reform push.

    The Agency started operations in September 2021, years after efforts like the UK's Government Digital Service (GDS) or Australia's Digital Transformation Agency (DTA). The body was a signature reform initiated by Prime Minister Yoshihide Suga, who spent his year-long stint in the top job trying to curb Japan's reliance on paper documents, manual processes, and faxes. Japan's many government agencies also operated their websites independently of each other, most with their own design and interface.

    The new Agency therefore has a remit to "cut across all ministries" and "provide services that are driven not toward ministries, agency, laws, or systems, but toward users and to improve user-experience".

    Continue reading
  • Singaporean minister touts internet 'kill switch' that finds kids reading net nasties and cuts 'em off ASAP

    Fancies a real-time crowdsourced content rating scheme too

    A Minister in the Singapore government has suggested the creation of an internet kill switch that would prevent minors from reading questionable material online – perhaps using ratings of content created in real time by crowdsourced contributors.

    "The post-COVID world will bring new challenges globally, including to us in the security arena," said Minister for Defence Dr Ng Eng Hen at a Tuesday ceremony to award the city-state's 2021 Defense Technology Prize.

    "For operations, the SAF (Singapore Armed Force) has to expand its capabilities in the digital domain. Whether for administrative or operational purposes, I think that we will need to leverage technology to the maximum," he declared.

    Continue reading
  • China Telecom booted out of USA as Feds worry it could disrupt or spy on local networks

    FCC urges more action against Huawei and DJI, too

    The US Federal Communications Commission (FCC) has terminated China Telecom's authority to provide communications services in the USA.

    In its announcement of the termination, the government agency explained the decision is necessary because the national security environment has changed in the years since 2002. That was when China Telecom was first allowed to operate in the USA.

    The FCC now believes – partly based on classified advice from national security agencies – that China Telecom can "access, store, disrupt, and/or misroute US communications, which in turn allow them to engage in espionage and other harmful activities against the United States." And because China Telecom is state-controlled, China's government can compel the carrier to act as it sees fit, without judicial review or oversight.

    Continue reading

Biting the hand that feeds IT © 1998–2021