{"version":"1.0","categories":["web","Copyright"],"published":"2005-01-25 00:00:01","width":"100%","author_name":"d-araya","provider_url":"https://hatena.blog","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fd-araya.hatenadiary.org%2Fentry%2F20050125%2Fp2\" title=\" GPL version3.0 \u3078 - \u30a4\u30de\u30fc\u30b8\u30e5\u8336\u8a71\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","height":"190","title":" GPL version3.0 \u3078","blog_url":"https://d-araya.hatenadiary.org/","image_url":null,"type":"rich","provider_name":"Hatena Blog","author_url":"https://blog.hatena.ne.jp/d-araya/","description":"\u898b\u76f4\u3057\u304c\u3059\u3059\u3080GPL GPL\u306e\u898f\u5b9a\u304c\uff11\uff13\u5e74\u3076\u308a\u306b\u6539\u8a02\u3055\u308c\u3088\u3046\u3068\u3057\u3066\u3044\u308b\u3089\u3057\u3044\u3002\u73fe\u884c\u306e\u7279\u8a31\u30fb\u8457\u4f5c\u6a29\u306e\u67a0\u7d44\u307f\u3092\u9075\u5b88\u3057\u306a\u304c\u3089\u3088\u308a\u6709\u52b9\u306b\u6d3b\u7528\u3055\u308c\u308b\u9053\u3092\u9078\u3076\u304b\u3001\u305d\u308c\u3068\u3082\u653f\u6cbb\u7684\u306a\u52e2\u529b\u3068\u3057\u3066\u8457\u4f5c\u6a29\u6cd5\u306b\u6539\u6b63\u3092\u8feb\u308b\u3082\u306e\u3068\u306a\u308b\u304b\u3002\u5404\u6d3e\u306e\u99c6\u3051\u5f15\u304d\u304c\u7d9a\u3044\u3066\u3044\u308b\u3089\u3057\u3044\u3002\u4eca\u5f8c\u306e\u79c1\u7684\u6240\u6709\u306e\u3042\u308a\u65b9\u3092\u8003\u3048\u308b\u4e0a\u3067\u3082\u91cd\u8981\u306a\u554f\u984c\u3060\u3002\u500b\u4eba\u7684\u306b\u306f\u3001Trusted Computing \u3068\u306e\u95a2\u308f\u308a\u304c\u6c17\u306b\u306a\u308b\u3002","blog_title":"\u30a4\u30de\u30fc\u30b8\u30e5\u8336\u8a71","url":"https://d-araya.hatenadiary.org/entry/20050125/p2"}