Home Sponsored Announcements Versant expands db4o Open Source Licensing

In order to further increase adoption of db4o in the open source ecosystem the db4o Opensource Compatibility License (dOCL) is now being expanded to include the Microsoft Public License (Ms-PL), Microsoft Reciprocal License (Ms-RL) and Code Project Open 1.02 License, broadening the scope to now cover the top most popular FLOSS licenses.

REDWOOD CITY, Calif., Apr. 8, 2010 - Versant Corporation (Nasdaq: VSNT) announced today that it will expand the open source licensing options for its db4o embedded database technology to include the top most popular FLOSS licenses as listed by the Open Source Initiative.

In 2007 db4o introduced its third licensing option dubbed dOCL (db4o Opensource Compatibility License) for free/open source projects that want to embed db4o but do not want to (or are not able to) license their derivative work under the GPL in its entirety. This opened the doors for db4o to be used in major open source projects like Novell's Mono, Redhat's Fedora-Linux, Eclipse (Apogee), Spring, JPOX, Apache-Lucene (Gdata), RSSOwl newsreader, Arum DataEye and Funambol (SyncML). In order to further increase adoption of db4o in the open source ecosystem the original list of licenses is now being expanded to include the Microsoft Public License (Ms-PL), Microsoft Reciprocal License (Ms-RL) and Code Project Open 1.02 License, broadening the scope of the dOCL to now cover the top most popular FLOSS licenses.

"We really want to tear down any walls preventing open source projects from incorporating our cutting-edge object database technology. All developers should experience first-hand, how much time and code they can save by using a native object persistence solution rather than tedious object-relational mapping" says German Viscuso who manages db4o's growing community of 75,000 registered developers. "Even though we rely on a dual licensing scheme (where db4o is also commercially licensed in proprietary software) we believe we've found an excellent balance to broaden adoption and serve the best of both worlds. We recently moved to GPLv3 and now with the addition of the Ms-PL and CPOL to our dOCL we estimate db4o could potentially be used in 94% of existing Java and .NET open source projects".

In order to receive the benefits from this licensing option, you simply need to register your open source project in the db4o Projects section and blog by mailing community@db4o.com with your acceptance of the licensing terms of the new dOCL agreement.

 

About Versant

 

For more information:

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect