Feeds

Adobe cites bad blood for closed Flash

Wary of corporate agendas

5 things you didn’t know about cloud backup

Everyone loves open source - well, everyone apart from Microsoft, that is. The only problem with open source is deciding how much code control you're willing to relinquish, especially when open source puts your precious bits and bytes - and ultimately your own product plans - into the hands of your competitors.

Adobe Systems' Flash has long dominated PCs and the web, but the company has been under slowly mounting pressure to open source the player's source code.

This came to a head recently when Dion Almaer, co-founder of Ajaxian.com and Google's open web advocate, delivered a talk on the state of AJAX at Google Developer Day in London. I asked Almaer why Google makes little use of Adobe Systems' Flash, YouTube aside, and he gave a forthright answer.

Flash is not "open enough," he said, explaining that the Flash player is not open source and its development is not driven by the community. Google likes the technology, he added, and its closed-source status is a matter of ongoing discussion.

I put this to Dave McAllister, Adobe's director of standards and open source. "Dion and I have exchanged opinions about this," he said, adding that "there are constant discussions with Google," though he could not confirm any on this specific matter.

McAllister noted the SWF format for compiled Flash content is an open specification and that the Flex Software Development Kit (SDK) for building Flash content is open source, but said there is little prospect of open sourcing the player itself.

Media friendly

"Sixty-five per cent of the code is not owned by Adobe," he claimed. "We spend an incredible amount of money to license audio and video codecs that we then give away for free. If we open sourced the code of the Flash player, we would immediately fragment the video runtime market, because we can't give away those codecs."

McAllister rejected Almaer's point about the community, saying there is "peer participation, a visible roadmap, open bug bases, and open discussion between engineers and developers...the only open source principle that doesn't get communicated is the actual source code." Ah.

Haven't we been here with Sun Microsystems, before it eventually open sourced Java?

McAllister was dismissive of the comparison.

"The lesson learned from the Java exercise is that a marketplace that is losing speed can attempt to regain some of it from open source. We can certainly learn from [Sun] that it's very easy for competitors to sabotage your own efforts," he said.

Secure remote control for conventional and virtual desktops

Next page: Browser comparison

More from The Register

next story
Why has the web gone to hell? Market chaos and HUMAN NATURE
Tim Berners-Lee isn't happy, but we should be
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
(Not so) Instagram now: Time-shifting Hyperlapse iPhone tool unleashed
Photos app now able to shoot fast-moving videos
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.