Feeds

Microsoft vs. Google – the open source shame

Does anyone care when hippies get cancer?

Top three mobile application threats

Google has those darling colored balls, and DiBona seems like a really nice guy. But I keep thinking the search giant has just as serious open source questions to answer as Microsoft.

Google consumes vast amounts of open source code. The company funds DiBona as an active, outspoken member of the open source "community." Google also pays for various open source-related events. And it's a fun-loving paradise where evil goes to die over a bed of Bibb lettuce topped with cumin-crusted lamb, lime juice and cilantro.

Microsoft describes Linux as a cancer. It also makes unsubstantiated claims about open source software potentially violating its patents. And, well, it talks about knifing the baby instead of tossing around colored balls.

But which company is open source's biggest threat in 2007? The one clinging to an operating system and productivity suite monopoly? Or the one that controls your search queries, e-mails, instant messages, photos, documents and soon phone calls without ever discussing an open standard that will let you manipulate all that data or let you move it to a new service provider?

If we're talking about ideals, then I think Google is the bigger threat these days.

The erosion of Microsoft's monopolies is inevitable. All we need is time.

I fail, however, to hear Google telling us much of anything about how it will open its data piles, how it will open its code or how it will do any of these things without pumping an ad down our throats every chance it gets.

In short, Google's motives deserve as much attention as Microsoft's in the "open" wars.

Where Microsoft has turned to the OSI for approval, Google has vowed to engineer around it. So, I fail to see how Google has much of a right to beat on Microsoft's past.

Let's all put on our Che Guevara T-Shirts and celebrate the inauthentic until some real open source vendor is ready to take on this discussion. ®

Seven Steps to Software Security

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.