Has open source lost its halo?
Predatory tactics and opportunists lurk everywhere, critics charge
Computerworld - Is open source still a grass-roots social movement made up of idealistic underdogs trying to revolutionize an amoral industry? Or has it become a cloak used by IT vendors large and small to disguise ruthless and self-serving behavior?
Some observers argue it’s the latter. Despite occasional protests from old-timers -- the heated backlash against the Microsoft-Novell détente, for example -- open source has become so co-opted by mainstream IT, so transformed by "accidental open-sourcers" simply looking for a better business model, that it’s lost its cherished moral edge.
"Open source has become a free pass for all sorts of competitive actions that would once have been -- at a minimum -- roundly criticized," wrote Gordon Haff, an analyst at Nashua, N.H.-based Illuminata Inc. in an online piece last month.
Haff cites IBM’s release of its VisualAge software development tools to the open-source Eclipse Foundation in 2001, a move he argues has dealt near-fatal blows to commercial Java Integrated Development Environments (IDEs) such as Borland’s Jbuilder and Symantec’s Café.
IBM also released its lightweight Cloudscape database in 2004 to the open-source Apache Foundation, where it is now known as Derby. Like Eclipse, Derby helps draw companies to Java, where IBM makes a tidy sum -- even more than Sun Microsystems Inc. -- hawking middleware and related tools, Haff said.
But open-sourcing Cloudscape also hurt sales at companies such as Sybase Inc., which made mobile databases the centerpiece of its "unwired enterprise" strategy, as well as open-source vendors like SleepyCat Software (now owned by Oracle Corp.) and MySQL AB, Haff said.
"Some collateral damage to competitors in the process is not something that IBM likely regrets," Haff wrote.
Sybase’s chief marketing officer, Raj Nathan, insists the company is doing fine and that its offering remains "superior to any of our competitor's offerings, including Cloudscape."
But saddled with disappointing growth in its mobile and embedded database business, Sybase is turning its attention to other areas, such as data integration, to boost revenue growth.
Do no wrong, do no right
Another example? Take Hewlett-Packard’s backing of the open-source Lustre shared file system. Lustre helps HP in the high-performance computing arena, while hurting storage competitors like Panasas Inc. as well as current HP partners such as PolyServe Inc., says Haff.
Yet few have taken notice of what might be seen as ruthless or even treacherous action because of the positive reputation HP enjoys as a champion -- second only to IBM -- of open source.
"There’s a lot of self-delusion," Haff said in an interview. "People need to believe that there are ‘good’ companies and ‘bad’ companies. And they get shocked when a ‘good’ company does something that is in its ... self-interest."
- 5 Customers Deliver Virtual Desktops and Apps to Empower a Modern Workforce Learn how Citrix solutions helped 5 companies realize the full value of desktop virtualization through a project-by-project approach based on key business priorities.
- Mitigate Risk and Accelerate Time to Value Download this white paper to learn how your IT organization can accelerate business, introduce new services, and reach new markets, all while staying...
- Allay Risks in Application Rationalization and Modernization IT has to do it all: react quickly to market needs, introduce new services, capitalize on mobile, and comply with regulatory requirements, all...
- Delivering Application Data On-Demand Packaged app dev teams frequently operate with limited testing environments due to various constraints. By virtualizing the entire application stack, Delphix-powered teams can...
- Transform Your IT Service Management Watch this webinar, to learn how EasyVista can increase IT productivity & efficiency and deliver streamlined & integrated IT Service & Asset Mgmt.
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Applications White Papers | Webcasts