Feeds

Amazon's 'schizophrenic' open source selfishness scares off potential talent, say insiders

Moles blame Bezos for paltry code sharing

The Power of One Brief: Top reasons to choose HP BladeSystem

Exclusive Amazon is one of the most technically influential companies operating today – but you wouldn't know it, thanks to a dearth of published research papers and negligible code contributions to the open-source projects it relies on.

This, according to multiple insiders, is becoming a problem. The corporation is described as a "black hole" because improvements and fixes for the open-source software it uses rarely see the light of day. And, we're told, that policy of secrecy comes right from the top – and it's driving talent into the arms of its rivals.

Over the past three months, The Register has interviewed numerous Amazon insiders* about the tech giant's attitude toward open-source software, and how the cash-flush business interacts with the tech community.

The impression built up is of a company that harvests code from vast fields of open-source software while obscuring its code donations and distancing itself from the wider world of computing.

"Amazon cannot exist without open source," said one former Amazonian.

"All of the standard web technologies were in there," said another ex-employee. "We had everything from Perl to Java to C++. In a number of cases where performance [was] really important, we looked at the [Linux] kernel ... We really ran the gamut of usage."

But you wouldn't know this from Amazon's public contributions to open-source efforts: as far as El Reg can tell, the internet titan has submitted patches and other improvements to very few projects. When it does contribute, it does so typically via a third party, usually an employee's personal account that is not explicitly linked to Amazon.

These code contributions include additions to Apache Hadoop, jQuery, the Linux kernel and Ruby, we understand.

"Within Amazon it was well known that [CEO] Jeff Bezos didn't think that Amazon would gain from participating in open source except in very limited ways at the fringes of its tech," said one ex-Amazonian. "Amazon really kept its code closed."

Of course, the web giant is under no obligation to share its enhancements for open-source-licensed software if it's not distributing the code beyond its walls (or if the license doesn't require it to in any case).

This secretiveness may give Amazon a competitive edge in the short term, but – crucially – there's evidence that it could be damaging the company in the long term because few of today's most talented technologists want to work at a company that shuts them off from the wider technical community.

Many companies choose not to donate code and instead involve themselves in the community in other ways, such as attending or organizing conferences and publishing academic papers, but here Amazon is withdrawn as well.

"When I arrived [at Amazon], one of the things that was very striking was very few people went to conferences except quiet observers," explained another. "We lost a number of key technical prospects in terms of hiring people."

Where employees from Google, Microsoft, Facebook, Oracle, IBM, and others regularly speak at conferences and meet-ups around the world, Amazon's employees are instead trained to fade into the background at conferences, revealing little about themselves or their employer.

Your El Reg correspondent saw this himself when he attended Symposium on Operating Systems Principles (SOSP), the influential computer-science confab, last year. That was a week spent walking the halls of the cavernous Nemacolin Woodlands Resort in Pennsylvania, brushing shoulders with luminaries from Google, Microsoft, Cambridge University, Carnegie Mellon, and others.

Though there were a large number of Amazon.com and Amazon Web Services developers there, none of them spoke up in group sessions or made explicit reference to their company. The only Amazon-related presentation your Reg writer saw was given by Peter Vosshall, a senior engineer at Amazon.com, and this was more about the culture and management of a technical organization than a disclosure of precise techniques.

This secretiveness, "comes from Jeff," claimed another source. "It's passed down in HR training and policy. It's all very clear."

Though a select few are permitted to give public talks, when they do, they disclose far less information about their company's technology than their peers. El Reg has been to numerous obscure presentations by Amazonians where the audience is left dissatisfied by the paucity of the knowledge shared.

"Amazon behaves a lot like a classified military agency," explained another ex-Amazonian.

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Whoah! How many Google Play apps want to read your texts?
Google's app permissions far too lax – security firm survey
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
OpenWRT gets native IPv6 slurping in major refresh
Also faster init and a new packages system
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.