Feeds

BSA slams EC's 'narrow-minded' interoperability vision

EIF 2.0 draft ruffles some proprietary software feathers

Providing a secure and efficient Helpdesk

An open standards row is brewing between the EC and a lobbying group for software multinationals over a proposed European framework on interoperability – a draft of which is due to be published on 15 July.

The Interoperable Delivery of European e-government Services to Public Administrations, Businesses and Citizens (IDABC) arm of the European Commission presented an outline of version two of the European Interoperability Framework (EIF) at a meeting in Brussels last week.

The main crux of the new framework according to the presentation, which can be viewed here (pdf), is that European governments, firms and users should “be prepared and volunteer to share and reuse,” and “adopt open standards and specifications”.

However, the Business Software Alliance (BSA) has slammed the EC for continuing to tout what it sees as “narrowly defined open standards” in its fight to achieve interoperability among government IT departments.

Interestingly, the BSA and other industry players, including the Association for Competitive Technology, have lit the fuse ahead of a copy of the EIF 2.0 draft being made available.

BSA’s European software policy director Benoit Müller told The Register that despite years of lobbying from the group, which represents the likes of proprietary software pushers Microsoft et al, the Commission has missed a trick with its reworking of the EIF.

The letting go

“Our concern is that they [IDABC] will still insist on standards that have no intellectual property [IP] rights and they will not revise the definition of an open standard as contained in EIF version one,” he said.

“They define open standards inconsistent with the common understanding of the term in what we believe is a dogmatic approach. It fails to recognise that almost all standards that help interoperability and that governments should indeed use to promote the very objectives of the EIF do have intellectual property.”

Müller argued that such a “narrow-minded” view would stymie Europe’s competitiveness because it overlooks what he described as the “beneficial roles of IP within standardisation.”

We put those concerns about the draft interoperability framework to Karel De Vriendt at the IDABC, who told us that the BSA's interpretation of the forthcoming draft EIF was “factually incorrect”.

He said in an email: “We stressed the need for the evaluation of standards along many dimensions... one of them being openness and the possibility to implement the standard in open source software (which is of course only important if you value open source software)."

Internet Security Threat Report 2014

Next page: Master and everyone

More from The Register

next story
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
Business is back, baby! Hasta la VISTA, Win 8... Oh, yeah, Windows 9
Forget touchscreen millennials, Microsoft goes for mouse crowd
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.