Feeds

Open sourciness

Red Hat's JBoss conundrum

The essential guide to IT transformation

Although both began and still conduct business as open source product companies, arguably, Red Hat was around commercializing a support model for external innovation around Linux, whereas JBoss' open-source model is more about what we have called in the past the captive model, in that it was largely about its own project - or projects such as Hibernate where it hired the leaders and brought them in house.

Chief technology officer, and the contemporary of former JBoss chief executive Marc Fleury, Sacha Labourey apologized for "a complete shutdown of communications" that exacerbated the problem with JBoss faithful, admitting that JBoss management was too preoccupied with integration into Red Hat. When it came to communications, JBoss swung from one extreme to another. He conceded that when JBoss spilt off the enterprise product from the core open source project on JBoss.org, that many of its best customers were not even aware of the split. Admittedly, the turning down of the volume reflected a move to make the company more enterprise-friendly, where customers with large deals value product stability over nightly innovation.

And, with the splitting of JBoss.org, the goal was to align JBoss' open source business with that of Red Hat, which has two separate streams: one that stabilizes code for enterprise licenses, and the other the purer open-source model where source code is updated nightly. Labourey took pains to point out to us that, although JBoss was trying to align itself more closely to the Red Hat business model, that JBoss would retain its uniqueness. Admittedly, the differences were a bit subtle to our ears: while Red Hat Enterprise Linux is only publicly available in binary, for JBoss, you can get access to the source code if you go to the JBoss.org site, where it's frozen in an image.

To paraphrase Stephen Colbert, some open source technologies have more open sourciness than others.

This article originally appeared in onStrategies.

Copyright (c) 2007, onStrategies.com

Tony Baer is the principal with analyst onStrategies. With 15 years in enterprise systems and manufacturing, Tony specialises in application development, data warehousing and business applications, and is the author of several books on Java and .NET.

The essential guide to IT transformation

More from The Register

next story
BBC: We're going to slip CODING into kids' TV
Pureed-carrot-in-ice cream C++ surprise
China: You, Microsoft. Office-Windows 'compatibility'. You have 20 days to explain
Told to cough up more details as antitrust probe goes deeper
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.