Feeds

TMing Linux – Red Hat CEO attacks ‘cheap knock-offs’

Young explains policy - but there's a slippery slope in there...

  • alert
  • submit to reddit

High performance access to file storage

Red Hat CEO Bob Young has dumped a bucket of cold water on yesterday's claims that the company us doing a Microsoft by taking Red Hat Linux proprietary. According to Young, the spat was triggered by Amazon, rather than by any move on Red Hat's part. Last week, he says, Amazon contacted Red Hat saying that it had been getting complaints from customers who'd bought Linux through its action site under the impression it was Linux from Red Hat. "Thesee products turned out to be CD-ROMs that consisted of free FTP downloads of Red Hat Linux, produced by independent vendors." Amazon's email saying that that only Red Hat Linux from Red Hat could be described as such was therefore written after "we explained our trademark policies to Amazon staff." But as Young puts it, the intention was to ensure users weren't being misled, rather than to do a Microsoft on Red Hat Linux. That said, the matter remains something of a philosophical puzzle. Says Young: "We request that independent vendors call their product something other than Red Hat, and not use our trademarks or logos. They may describe their product as containing Red Hat Linux, but the product itself must have another name." The reputable vendors already do this, but the current problem has arisen "because of the large number of new, sometimes less than reputable suppliers who are using retail outlets... to trick customers into believing they were getting Official Red Hat Linux from Red Hat Inc. at a bargain price when in fact they were getting a cheap knock-off product." So although it's feasible for a vendor to supply something identical to Official Red Hat Linux, it's not possible to call it this, unless it's supplied by Red Hat. Tricky? Well, Red Hat's defence here is that its trademark covers a specific software package (products containing Red Hat Linux might also contain stuff Red Hat has no quality control over), and also contains support. That said, there's still scope for trouble in this area. As Young says, "in effect, we do not own any proprietary software, but we do own our trademarks." What this means is that Red Hat (or indeed any other open source outfit) cannot restrict the availability of the software per se, but can use branding to build market momentum, and will - has to - use its trademarks to stop other companies benefiting from that momentum. There's clearly a slippery slope in here and its steepness depends on how much you see this kind of commercial approach as being in contradiction with the open source philosophy. ®

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Ex–Apple CEO John Sculley: Ousting Steve Jobs 'was a mistake'
Twenty-nine years later, post-Pepsi exec has flat-forehead moment
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.