Computerworld - If you divided today’s software sector into a detailed Venn diagram, you would end up with a very complex pattern of overlapping shapes and colors. To my mind—and I think to that of most IT managers—these overlaps are welcome news. Where two or more technologies or camps intersect, it means that they are communicating, working together and interoperating. And it means that technology users have choice, that we can combine disparate solutions to meet performance, security and cost requirements.
This was not always the case. Three decades ago, the circles in a software-sector Venn diagram wouldn’t have overlapped at all; technology silos offered no interoperability. Your company’s IT department went with IBM or Digital or NCR, and any improvements were tied to the limitations of your chosen vendor.
Today, technology companies work together and achieve interoperability in a number of ways—through implementation of standards, cross-licensing agreements, technical collaborations and so on.
The combination of best practices emerging from proprietary and open-source software developers offers one of the most promising avenues toward innovation, improved systems management and greater cost control. The most visible example of just such a combination is the alliance between Novell and Microsoft. Novell has increased its value to customers because, as in our Venn diagram, the company now solidly intersects with Linux, OpenOffice, Windows, DB2, Active Directory, Oracle and so on. No other Linux distributor offers this set of benefits.
However, there is a movement afoot, led by the Free Software Foundation, that may prevent such collaborative efforts in the future. The FSF has just released the latest draft of the General Public License, Version 3 (GPLv3). The current GPL (v2) is the most widely used open-source software license. The Linux Kernel, MySQL and Samba file-server software are all licensed under the GPL.
The FSF claims a moral high ground—that it is providing freedom to software developers and users—but the organization is in fact placing very tight strictures on software licensed under GPLv3. These strictures are designed to limit collaboration between free and proprietary software developers and threaten to further fray the open-source community by limiting open-source opportunities for innovation and business development.
Strangely enough, I think that the FSF, notably its vocal, passionate and passionately inflexible founder, Richard Stallman, would agree that GPLv3 creates a new bright line between proprietary and free software. Stallman himself distinguishes open source from free software, and he has been highly critical of the commercialization of free software. But in the name of freedom, GPLv3 restricts how end users utilize software. For instance, changes to the GPL in v3 would mean that TiVo and other consumer electronics manufacturers would be prevented from interoperating with certain media players or file formats..
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- System and Data Protection, Recovery and Availability This white paper describes how ARCserve works and the benefits it can provide IT environments of all sizes.
- Simplifying Data Protection, Reducing Risk of Data Loss and System Downtime This white paper outlines what IT organizations should look for in a data protection solution, including simplicity and ease of deployment, comprehensive protection,...
- Boosting Storage Performance for I/O Intensive Enterprise Applications Implementing enterprise applications can be a complex undertaking for IT organizations. Successful deployments depend on high-performance storage systems that are easy to manage...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- Four Myths of High-Productivity App Dev Debunked Debunk the main myths surrounding high-productivity application development and how both platforms have overcome them.
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Applications White Papers | Webcasts