Bruce Perens, an acknowledged expert in Linux and free software, has written a damning article regarding the now infamous August 18th presentation.
The article, which you can read on Bruces website here basically details that the examples used in the presentation originate not from Unix, but from other traceable sources.
In the first example, Perens has identified that the code originates from BPF, the Berkely Packet Filter. This code originated in 1993 under the BSD License (although it has roots in earlier goverment funded work).
This code did not find it’s way into Unix until 1996 when SCO used the code (Legally under the BSD license).
Interesting point: SCO must have removed the attribution from their code else they would have realised that this code was not owned by SCO.
Next, there are 4 slides showing Linux memeory allocation routines. These are not ‘proper’ source code as they’ve been hacked around.
Hilariously, the code here (dating back to 1973, I jest not), was released in 2002 by Caldera (SCO) as part of making the old Unix system 3 open source. The Algorithms themselves date back to research work in 1968.
All in all, Perens’ summary is that id these are typical examples, SCO are likely to crash and burn. Good Stuff!
TurboTas comments: Does the ‘official’ copyrighted work registration earlier in the year affect this: Surely SCO have in effect put a stake in the ground saying that ‘We own this and everything in it’? For the case to collapse it will be necessary to challenge this copyright statement?
Source: Article by TurboTas