Resources

Essential frameworks for the modern decision-maker. Deep dives on licensing, deployment standards, and security to secure your digital stack.

⚖️

License Intelligence

MIT License

The MIT License is the most permissive and popular open-source license. It allows you to use, copy, modify, merge, publish, distribute, sublicense, and sell the software. The only requirement is that you include the original copyright notice in your copy.

📖 Resource · 1 min

Apache License 2.0

The Apache 2.0 is a modern permissive license favored by large enterprises (Google, Android, Kubernetes). Like MIT, it allows full commercial use. Crucially, it includes an explicit patent grant, protecting you from patent lawsuits from the contributors.

📖 Resource · 1 min

BSD 3-Clause License

The BSD 3-Clause License (also known as "New BSD" or "Modified BSD") is a permissive free software license. It is very similar to the MIT License, allowing you to use, modify, and distribute the software for any purpose. The key difference is an added clause that prohibits using the nam...

📖 Resource · 1 min

Eclipse Public License 2.0 (EPL-2.0)

The EPL-2.0 is a business-friendly, weak copyleft license. It allows for proprietary integration while ensuring that modifications to the original files remain open source.

📖 Resource · 1 min

GNU LGPL v3

The LGPL (Lesser General Public License) is a compromise between the permissive Apache/MIT and the strict GPL. It allows you to link your proprietary software to an LGPL library (dynamically) without forcing your proprietary code to become open source. However, if you modify the LGPL li...

📖 Resource · 1 min

Open Software License 3.0 (OSL-3.0)

The Open Software License 3.0 (OSL-3.0) is a strong copyleft license, often compared to the AGPL but with distinct legal mechanisms.

📖 Resource · 1 min

GNU GPL v2

The GPL v2 is the classic "Copyleft" license (Linux Kernel). It ensures that if you distribute the software, you must provide the source code. Unlike v3, it does not explicitly address "Tivoization" (locking hardware) or patent grants as aggressively.

📖 Resource · 1 min

GNU GPL v3

The GPL v3 is a "Copyleft" license. It guarantees freedom for the end-user, not the developer. If you distribute software that links to GPL code, your entire application must also be released as open source under GPL.

📖 Resource · 1 min

GNU AGPL v3

The Affero GPL (AGPL) is designed to close the "SaaS Loophole." Unlike standard GPL, if you run AGPL software on a server and users interact with it over a network (e.g., a website), you MUST share your source code with them if you modified the software.

📖 Resource · 1 min

SSPL (Server Side Public License)

The Server Side Public License (SSPL) is not an official Open Source license. Created by MongoDB, it allows you to use the software freely, but forbids you from offering it as a "Managed Service" (e.g., you cannot launch "MyHostedMongoDB" and charge for it).

📖 Resource · 1 min

Functional Source License (FSL)

The Functional Source License (FSL) is a modern "Source Available" license pioneered by Sentry. It grants developers the right to copy, modify, and redistribute the code for any purpose except providing a competing commercial service. It is NOT an Open Source license (OSI definition) du...

📖 Resource · 1 min

Business Source License 1.1 (BSL)

The Business Source License (BSL or BUSL) is a "Source Available" license, NOT an Open Source license (according to OSI definitions). It allows users to copy, modify, and redistribute the code for non-production or limited production use, but typically restricts "competing" commercial u...

📖 Resource · 1 min

Elastic License 2.0 (ELv2)

The Elastic License 2.0 (ELv2) is a non-copyleft "Source Available" license created by Elastic (the company behind Elasticsearch). It is NOT an Open Source license by the OSI definition. It was designed to protect software creators from "SaaS-jacking" by large cloud providers while keep...

📖 Resource · 1 min

Sustainable Use License (Fair Code)

The Sustainable Use License (often associated with the "Fair Code" movement) is a "Source Available" license, not a strictly Open Source license (OSI definition). It grants you broad rights to view, modify, and use the software for free—with one critical restriction.

📖 Resource · 1 min

Custom License

Strategic intelligence entry regarding Custom License. Part of the OpenTechHub Strategic Playbook.

📖 Resource · 1 min
🏗️

Deployment Models

Browser-Based / Local-First

Browser-Based (Local-First) solutions run entirely inside your web browser. There is no server installation, no login, and often no backend database. The application code is downloaded once, but all data creation and processing happen locally on your device.

📖 Resource · 1 min

Managed SaaS

Managed SaaS means the Open Source creator hosts the software for you. You pay a monthly subscription fee instead of managing servers. This is the "Easy Button" for enterprises who have budget but no time.

📖 Resource · 1 min

Extension / Plugin

Extensions (or Plugins) are small software modules that live inside another host application, most commonly a Web Browser (Chrome/Firefox/Edge) or an IDE (VS Code).

📖 Resource · 1 min

Mobile Application

Mobile Applications are native software installed on smartphones (iOS/Android). In Open Source, these are distributed via standard App Stores or privacy-focused repositories like F-Droid.

📖 Resource · 1 min

Desktop Application

Strategic intelligence entry regarding Desktop Application. Part of the OpenTechHub Strategic Playbook.

📖 Resource · 1 min

Language Runtime (Pip/NPM)

Runtime Deployment means installing the application as a library or package using a language-specific manager (like Pip for Python, NPM for Node.js, or Composer for PHP).

📖 Resource · 1 min

Native System (Binary/Linux)

Native Deployment involves running the software directly on the Operating System, either as a Single Binary (common in Go/Rust) or via a system package manager (DEB/RPM). This is the "Bare Metal" approach.

📖 Resource · 1 min

Docker Container

Docker Deployment is the industry standard for self-hosting software. The application comes pre-packaged in a "Container" with all its dependencies included. It runs reliably on any standard server (Linux/Windows) without conflicts.

📖 Resource · 1 min

LAMP Stack (Linux, Apache, MySQL, PHP)

The LAMP Stack is the grandfather of the modern web. It stands for Linux (OS), Apache (Web Server), MySQL (Database), and PHP (Language). It powered the Web 2.0 revolution (WordPress, Drupal, PrestaShop) and remains the most common hosting environment globally.

📖 Resource · 1 min

Kubernetes (K8s)

Kubernetes is an orchestration system designed for high availability and massive scale. It manages multiple containers that talk to each other. It is designed to ensure the software never crashes, even if a server fails.

📖 Resource · 1 min
🛡️

Security Standards

Single Sign-On (SSO) & SAML

Single Sign-On (SSO) allows your employees to log in using their existing company credentials (Google Workspace, Microsoft Entra ID/Azure, Okta) instead of creating a new username and password. It ties access to your central employee directory.

📖 Resource · 1 min

Data Residency (GDPR/CCPA)

Data Residency refers to the physical geographic location where your data is stored. Laws like GDPR (Europe) and CCPA (California) often mandate that citizen data must strictly be stored/processed within their borders or in countries with adequate protection.

📖 Resource · 1 min

Backup Strategy (3-2-1 Rule)

A Backup Strategy is the protocol for copying and archiving data so it can be restored in case of data loss (hack, corruption, or accidental deletion). The "3-2-1 Rule" is the industry standard: 3 copies of data, on 2 different media, with 1 offsite.

📖 Resource · 1 min
🤝

Support Tiers

Community Support

Community Support means there is no help desk to call. Support is provided by volunteers or other users on platforms like GitHub Issues, Discord, or StackOverflow. Responses are voluntary, not guaranteed.

📖 Resource · 1 min

Enterprise Support (SLA)

Enterprise Support is a paid contract (SLA - Service Level Agreement) that guarantees a response time. It ensures you have a direct line to the engineers who wrote the code, often including "Priority Bug Fixes" where your issues jump to the front of the line.

📖 Resource · 1 min
🏛️

Project Governance

Total Cost of Ownership (TCO)

Total Cost of Ownership (TCO) is the calculation of the real cost of software, not just the license fee. For Open Source, it is the sum of: License (usually $0) + Infrastructure (Hosting) + Maintenance (Engineering Hours) + Security Ops.

📖 Resource · 1 min

The "Bus Factor" (Project Health)

The "Bus Factor" is a risk metric that asks: "If the lead maintainer gets hit by a bus (or gets hired by a competitor) tomorrow, will this project survive?" It measures how dependent a project is on a single individual versus a diverse group of contributors.

📖 Resource · 1 min

Data Portability (Exit Strategy)

Data Portability refers to the ability to easily export your data from a system in a standard, usable format (CSV, JSON, SQL Dump) and import it into another tool. It is your "Emergency Exit" strategy.

📖 Resource · 1 min

Open Core Model

"Open Core" is a business model where the core functionality of the software is free (Open Source), but critical "Enterprise" features (SSO, Audit Logs, High Availability) are proprietary and locked behind a paid license.

📖 Resource · 1 min

Foundation-Backed (CNCF / Apache)

This software is owned by a neutral non-profit organization (like The Linux Foundation, CNCF, or Apache), not a single for-profit company. The Intellectual Property (IP) is held in trust for the public.

📖 Resource · 1 min

Vendor-Backed (Single Vendor)

The project is open source, but the copyright and roadmap are controlled 100% by a single for-profit company (e.g., Vercel, MongoDB Inc., Hashicorp). They effectively dictate the future of the software.

📖 Resource · 1 min
📋

Compliance Intelligence

GDPR: Data Privacy & Sovereignty

The General Data Protection Regulation (GDPR) is the EU's strict privacy framework, mandating data-sharing-by-design and real-time user data portability.

📖 Resource · 1 min

FIPS 140-3: Cryptographic Module Validation

FIPS 140-3 is the NIST standard validating cryptographic modules for US federal use. Software handling sensitive government data must use FIPS-validated cryptography — not just claim encryption.

📖 Resource · 1 min

WCAG 2.1 AA: Web Accessibility Standard

WCAG 2.1 AA is the internationally recognized web accessibility standard, mandated by US ADA Section 508, EU EN 301 549, and government procurement rules globally.

📖 Resource · 1 min