Feeds

Adobe peels off Flash layers for open source

Money move

Beginner's guide to SSL certificates

Adobe Systems has open-sourced two pieces of Flash technology to build community buy-in around its media player.

Today, the company announced the release of the Open Source Media Framework (OSMF) and Text Layout Framework (TLF) under version 1.1 of the Mozilla Public License.

TLF is an ActionScript library that's been built on Flash Player 10's text engine and Adobe AIR 1.5, providing typographic and text layout for the web. It's been used in the NYTimes.com Reader 2.0 and Boston GlobeReader.

OSMF is part of Strobe, announced by Adobe in April to simplify the addition of the kinds of components and features to Flash-based players that can help developers make money from media.

Strobe's goal is to establish what Adobe called an "open industry standard" for software components that plug into Flash players, in areas such as ads, user measurement, tracking, and social networking.

Adobe said Tuesday that OSMF will initially focus on transport controls for the implementation of ad servers and features for quality of service, plus there will be support for features in Adobe Flash Media Server 3.5 such as Dynamic Streaming and DVR functionality.

"The community will be able to develop plug-ins for OSMF to support additional custom functionality," according to an Adobe FAQ.

Adobe was at pains to stress that OMF complements - rather than treading on the toes of - the Open Video Player Initiative (OVP) spearheaded by Adobe and Akamai. OVP claims its goal is to create best practices and reference implementations and to encourage the adoption of "open standards" around the development of video players.

OVP is also supported by Microsoft, which is challenging Flash with Silverlight. OVP was created through the donation of Akami's media framework that utilized broad industry technologies such as Media RSS.

"The next version of OVP for Flash will incorporate the full framework and player of the OSMF code," Adobe said. ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
HTML5 vs native: Harry Coder and the mudblood mobile app princes
Developers just want their ideas to generate money
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.