Feeds

Novell drops its Hula challenger to Microsoft

Open source has its limits

High performance access to file storage

Novell has abandoned an open source project hyped as challenging Microsoft Outlook and Exchange by becoming the "Apache" of email and collaboration software.

The company has pulled full-time engineers off project Hula following lacklustre demand. Engineers are "moving to other roles", according to the Hula mailing list.

Novell announced Hula amid a fanfare at LinuxWorld, Boston, in February 2005 by donating 200,000 lines of code from its NetMail collaboration server to the community. Novell's then chief executive Jack Messman predicted Hula would "become for collaboration what Apache is to servers". Apache is the internet's number one web server.

Hula drew strong support from the Mozilla Foundation, Open Source Applications Foundation, Open Source Development Labs, and O'Reilly Media's father of Web 2.0 Tim O'Reilly. Branding Hula as a "project to watch", O'Reilly called Hula "a great opportunity for open source to leapfrog commercial software applications rather than just playing catch up".

The market disagreed. Novell's Peter Teichman wrote: "As a team we have spent a lot of time looking at where the Hula project is and the opportunities in the market and in the end we had to conclude that we couldn't justify investing at the same level in Hula."

The Hula server featured SMTP, IMAP, and support for the CalDAV calendar access protocol. According to Teichman though, that amounts to just another mail server. "Every organisation we've talked to already has mail infrastructure. Bringing Hula in for the web mail means duplicating their SMTP, IMAP, and POP set up."

Hula will go down as yet another failed effort by Novell to challenge Microsoft on the desktop and in collaboration at a time when Google is re-inventing the medium with hosted services like Gmail and Apps for your Domain.

Hula will also be remembered as an example of IT vendors interpreting open source and community to mean dumping code into open source for street cred, and how such efforts will fail unless a clearly identifiable market has been identified. ®

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.