Red Hat exec says hackers still matter
Tiemann: Open-source movement isn't entirely corporate yet
IDG News Service - Volunteer hackers still play an important role in open-source software development despite the many companies that pay developers to work on open-source products, according to Michael Tiemann, Red Hat Inc.'s vice president of open-source affairs.
Tiemann, who is also president and a member of the board at the Open Source Initiative, a nonprofit organization that promotes open-source software, was in India last week to address a symposium on the impact of intellectual property laws on innovation and progress. In a telephone interview from Delhi, Tiemann talked to IDG News Service on a wide range of issues relating to the open source movement. Below is an edited transcript of the interview.
There is a perception that the hacker culture is disappearing from open-source development, as a result of corporate participation and corporate priorities in open-source development. The hacker community has always been doing its work from the margins. That does not mean that it wasn't important in the past, and it does not mean it won't be important in the future. But it remains non-mainstream. At the same time, the commercial community has benefited tremendously from rebellious hackers. When a hacker points out that a particular protocol has great security weaknesses, the commercial community who pays attention to that is better for it. The commercial community who attempts to cover it up, or deny it, ultimately puts more people at risk.
Is there something that the OSI can do to make hackers feel more comfortable in the changed open-source environment, where large companies like IBM have deployed employees paid to do open-source development? The fact that IBM has a large team doing open-source development is great, and many of the people doing that work for IBM are hackers. They are renegades that just happen to get their paychecks from IBM. Of course, there are some very conventional people who are also getting pay checks, and I don't think it makes it any worse.
I think the reason why open-source has not been corrupted by capital is because capital is almost irrelevant to open-source. If you look at an industry like the railroad, before a single unit of value can be delivered, you need immense capital to build the railroad bed, and to build the trains and the stations. In the case of software, value can be delivered on a highly incremental basis. So the most important thing in software is not financial capital but intellectual capital.
When you look at open-source development from the perspective of intellectual capital, there is no company on earth whose financial capital can be remotely relevant to the intellectual capital potential of the world. The investment by IBM and other companies [in intellectual capital] is such a small drop in the bucket. That is why it has not corrupted, and cannot corrupt, open-source.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts