Feeds

Big business bullies EU into open source U-turn

Definition replaced with dubious vagueness

3 Big data security analytics techniques

The European Union has long promoted open source software, but it seems that years of expensive lobbying by big software companies has finally worn down the bureaucrats' resistance.

The latest version of the European Interoperability Framework - which aims to offer governments and businesses guidance on using open source software - has substantially weakened its definition of what open source is. This follows years of lobbying by the BSA, representing multinational, and substantially closed-source, companies.

The original EIF gave a pretty stern definition of open source: "The standard is adopted and will be maintained by a not-for-profit organisation, and its ongoing development occurs on the basis of an open decision-making procedure available to all interested parties."

But version 2 provides a waffly, vague definition. It says: "Within the context of the EIF, openness is the willingness of persons, organisations or other members of a community of interest to share knowledge and to stimulate debate within that community of interest, having as ultimate goal the advancement of knowledge and the use thereof to solve relevant problems."

There is more gumble about openness being part of a spectrum. Then this: "While there is a correlation between openness and interoperability, it is also true that interoperability can be obtained without openness, for example via homogeneity of the ICT systems, which implies that all partners use, or agree to use, the same solution to implement a European Public Service."

So instead of an explicit promotion of open source, with a tough definition of exactly what that means, we now have a hopelessly vague description of open source followed by an even more useless definition of interoperability.

Hat tip to Computerworld for spotting the leaks.

There has long been quite active promotion of open source software in Europe. Back in 2008 Neelie Kroes said: “I know a smart business decision when I see one – choosing open standards is a very smart business decision indeed. No citizen or company should be forced or encouraged to choose a closed technology over an open one.”

The European Commission also provided seed funding for an open source quality checker to help companies and businesses choose open source software. It has been seen as a way to encourage the "ecosystem" of European developers and integrators. ®

Top three mobile application threats

More from The Register

next story
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.