Feeds

Red Hat launches community contest to rename JBoss

Sounds too much like it's a Java thing

Boost IT visibility and business value

Red Hat says its JBoss Enterprise Application Platform has evolved to embrace far more than just Java, and to reflect this, it has launched a contest to rename the JBoss Application Server (JBossAS) to something more in line with its current vision of multi-language programming.

In a blog post on Monday, Red Hat Senior Director of Middleware Engineering Mark Little explained that JBossAS is a very different project than what it was when it launched as an open source Java EE application server.

"The uses cases it has to satisfy are orders of magnitude more complex and diverse than they were," he wrote. "Put simply, although Java EE is central to what it does and we do as a community, it is no longer the only driving force behind it."

Because the Java Virtual Machine (JVM) has also evolved, today the JBoss platform supports a number of other languages in addition to Java, such as Clojure, Ruby, Scala, and Red Hat's own Ceylon. According to a press release issued on Monday, Red Hat believes JBoss to allow customers to choose any of these languages they want, in what it calls a "polyglot" approach.

What's more, JBoss also supports a number of popular frameworks that are often deployed as alternatives to traditional Java EE, such as the Spring Framework – making the "J" in JBoss seem increasingly outdated.

"We've had lots of discussions here and we believe that the time has come to change the name of our project to better reflect the changes we've seen in its reason for existence so far, but also for what's to come in the future," Little wrote.

Because JBossAS is a community-based open source project, however, naturally the community will be involved in the name change. Red Hat says it will be accepting nominations on its website through October 14, at which point a panel of Red Hat employees will pick the best ones. Those entries will then be presented to the community for voting, with the winner to be announced at the Devoxx conference in Antwerp, Belgium on November 12.

And what does the submitter of the winning name receive? No material compensation has been announced, but the satisfaction of having your entry mentioned in endless future Reg articles, such as this one, must be worth something. ®

The essential guide to IT transformation

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Intel's Raspberry Pi rival Galileo can now run Windows
Behold the Internet of Things. Wintel Things
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
Time to move away from Windows 7 ... whoa, whoa, who said anything about Windows 8?
Start migrating now to avoid another XPocalypse – Gartner
You'll find Yoda at the back of every IT conference
The piss always taking is he. Bastard the.
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.