Feeds

Microsoft vs. Google – the open source shame

Does anyone care when hippies get cancer?

SANS - Survey on application security programs

Comment Somebody toss me a Che Guevara T-shirt. Google and Microsoft have gone to war over open source software.

On Aug. 10, Redmond submitted the Microsoft Permissive License to the Open Source Initiative (OSI). Should the license be approved, Microsoft would receive the "open source" seal of approval that only the OSI – by self-proclamation – can okay.

Many open source watchers have applauded Microsoft's OSI approach. You'll remember that Microsoft has dubbed some open source software the work of cancer-ridden communists. So, seeking "open source" approval shows the software maker has come a long way.

Of course, one could argue that Microsoft – once blessed with the open source label – will only abuse its status. The company could claim to be a huge open source supporter, derailing critics' arguments by displaying nothing more than the OSI logo when needed.

Chris DiBona, Google's open source manager, seems to fall into this cynical camp.

I'll quote DiBona's Aug. 16 posting to an OSI discussion list in full as proof.

I would like to ask what might be perceived as a diversion and maybe even a mean spirited one. Does this submission to the OSI mean that Microsoft will:

a) Stop using the market confusing term Shared Source b) Not place these licenses and the other, clearly non-free , non-osd licenses in the same place thus muddying the market further. c) Continue its path of spreading misinformation about the nature of open source software, especially that licensed under the GPL? d) Stop threatening with patents and oem pricing manipulation schemes to deter the use of open source software?

If not, why should the OSI approve of your efforts? That of a company who has called those who use the licenses that OSI purports to defend a communist or a cancer? Why should we see this seeking of approval as anything but yet another attack in the guise of friendliness?

Finally, why should yet another set of minority, vanity licenses be approved by an OSI that has been attempting to deter copycat licenses and reduce license proliferation? I'm asked this for all recent license-submitters and you are no different :-)

The smiley face didn't go as far as DiBona hoped toward diluting the force of his questions.

Bill Hilf, Microsoft's, er, open source chief, shot back at DiBona.

I'm unclear how some of your questions are related to our license submissions, which is what I believe this list and the submission process are designed to facilitate. You're questioning things such as Microsoft's marketing terms, press quotes, where we put licenses on our web site, and how we work with OEMs - none of which I could find at http://opensource.org/docs/osd.

If you'd like to discuss this, I'd be happy to - and I have a number of questions for you about Google's use of and intentions with open source software as well. But this is unrelated to the OSD compliance of a license, so I will do this off-list and preferably face to face or over the phone.

Come on, guys. Don't discuss the issues behind closed doors. We all want to watch the show.

Hilf Me

I think it would be near impossible for an outside observer not to take Microsoft's side here.

For one, Microsoft has done all the OSI asks by submitting its license in the proper fashion for review. If the license meets the OSI's open source definition, does it really matter who submitted it? Is this Russia? This isn't Russia, Danny.

Beyond that, Google hardly stands as a model open source company – a point noted by Hilf. Google has become the poster child for the software as a service (SaaS) abuse of open source software. The ad broker uses copious amounts of open code but gets around returning changes to "the community" by claiming it does not redistribute the code. Instead, Google simply places the software on servers and ships a service to consumers.

The Free Software Foundation avoided closing the SaaS hole – a problem caused by an archaic notion of distribution as being tied to a diskette or CD – with GPL v3. Google couldn't care less about that though, since it will avoid any problematic license

"We have enough engineering resources that, if the license has obligations we are not interested in, we can just not use it," DiBona said, at the recent OSCON conference.

Google's secretive nature leaves us in the dark as to how much code it has turned back to "the community." The best statement I've seen thus far has a Google official claiming to have put back 1 million lines of code.

Does such generosity move you? Or do you find Yahoo!'s forceful backing of Hadoop more impressive? I'll go with the latter.

3 Big data security analytics techniques

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
Leaker claims big release due this fall as Microsoft herds us into the CLOUD
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.