Feeds

Apache confirms new OpenOffice build by 2012

Warns developers that it’s still the daddy

Boost IT visibility and business value

The Apache Software Foundation has confirmed that a new build of the OpenOffice suite will be out next year, and has warned rogue developers that it - and only it - can use the trademark for the software.

According to the group, version 3.4 of the software will be out in the first quarter of next year, and will be a developer-focused release that is designed to ensure the entire code base fits with Apache’s licensing terms. There is some third-party code to remove from the OpenOffice base that is incompatible with the Apache licence, although in some cases the original coders have been happy to relicense their source under different terms in order to help the project.

“We’re focused on developers with this build, making sure it’s IP clean with no licensing incompatibilities,” Ross Gardler, mentor on the project for Apache, told The Register. “That said there have been user improvements too, such as better graphics handling.”

Once the licensing issues have been resolved, a series of user improvements will be made to the OpenOffice code, he explained, and an updated build with more end user features would follow on as soon as possible.

Apache, which was handed the OpenOffice project in June, used the v3.4 announcement to warn others that it was running the show. Gardler said that this was because there had been a number of cases of groups using the situation to trick money out of contributors under the guise of developing the code, and even some cases of unauthorised builds containing malware.

However, these problems were nothing to do with The Document Foundation he stressed. Cooperation between the LibreOffice folk and OpenOffice was extensive and very encouraging he said, with cross use of code and both groups helping each other on bug fixes and development.

“I don’t think we’ll ever get back together – we’ve different visions and a different license perspective,” he said. “But there’s plenty of space for way for more than two iterations – the more the merrier in fact.” ®

Boost IT visibility and business value

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
KDE releases ice-cream coloured Plasma 5 just in time for summer
Melty but refreshing - popular rival to Mint's Cinnamon's still a work in progress
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Mozilla keeps its Beard, hopes anti-gay marriage troubles are now over
Plenty on new CEO's todo list – starting with Firefox's slipping grasp
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.