Language Selection

English French German Italian Portuguese Spanish

Making money with open source

Filed under

Kim Polese believes that the remaining obstacles to making money with open source are dwindling away. And she ought to know. In April, Polese presented a session on the topic at the LinuxWorld OSBC conference. Her numerous accolades include being named one of Time magazine's Top 25 Most Influential People in America. Some sources credit her with naming "Java" during her long stint at Sun Microsystems, and she was one of the co-founders of Marimba. As CEO of Bay Area open source services provider SpikeSource, Polese guides the company's vision of "making open source safe for the enterprise." In this interview, she talks about how companies are leveraging the open source model to enhance their bottom lines.

Open source software is creating new market opportunities and new companies are springing up to take advantage of these opportunities. An example is SugarCRM. They sell open source CRM [customer relationship management] applications and have been in business since August of 2004. They provide a lower- cost alternative to CRM leaders like Siebel and Black Duck Software and Palamida are defining another new category -- providing compliance and license management services around open source software.

A completely different example is Digium, a hardware PBX [private branch exchange] device maker. They figured out that VoIP [voice over Internet protocol] was the future and created Asterisk, a VoIP PBX software application, and open-sourced it -- and they've now established themselves as a leader in the VoIP PBX device market, because Asterisk is helping drive greater hardware sales. And then there are new consulting companies like Optaros. And, of course, systems companies like IBM and HP are driving more hardware and services revenue through their use of Linux. IBM was able to generate significant new revenue from installing Linux on mainframes, breathing new life into the mainframe market. All of these companies have found creative ways to leverage open source to solve business problems.

Of course, RedHat is the best example of a pure-play open source company that is making money with open source via the support model they pioneered.

Full Article.

More in Tux Machines

KTU exams to run on open source software

All examinations of the A.P.J. Abdul Kalam Technological University (KTU) — which run on an online platform — would switch to open source software from the second semester onwards. For the first semester examinations, the KTU would use a proprietary, Microsoft, software. In response to demands from student organisations, the KTU has pushed back its first semester examinations by two days. The first of the examinations would now begin on December 4 instead of December 2. The first of the results would be published on December 19. Read more Also: KTU goes ahead with exam outsourcing

CMS News

Security Leftovers

  • Friday's security updates
  • Researchers poke hole in custom crypto built for Amazon Web Services
    Underscoring just how hard it is to design secure cryptographic software, academic researchers recently uncovered a potentially serious weakness in an early version of the code library protecting Amazon Web Services. Ironically, s2n, as Amazon's transport layer security implementation is called, was intended to be a simpler, more secure way to encrypt and authenticate Web sessions. Where the OpenSSL library requires more than 70,000 lines of code to execute the highly complex TLS standard, s2n—short for signal to noise—has just 6,000 lines. Amazon hailed the brevity as a key security feature when unveiling s2n in June. What's more, Amazon said the new code had already passed three external security evaluations and penetration tests.
  • Social engineering: hacker tricks that make recipients click
    Social engineering is one of the most powerful tools in the hacker's arsenal and it generally plays a part in most of the major security breaches we hear about today. However, there is a common misconception around the role social engineering plays in attacks.
  • Judge Gives Preliminary Approval to $8 Million Settlement Over Sony Hack
    Sony agreed to reimburse employees up to $10,000 apiece for identity-theft losses
  • Cyber Monday: it's the most wonderful time of year for cyber-attackers
    Malicious attacks on shoppers increased 40% on Cyber Monday in 2013 and 2014, according to, an anti-malware and spyware company, compared to the average number of attacks on days during the month prior. Other cybersecurity software providers have identified the December holiday shopping season as the most dangerous time of year to make online purchases. “The attackers know that there are more people online, so there will be more attacks,” said Christopher Budd, Trend Micro’s global threat communications manager. “Cyber Monday is not a one-day thing, it’s the beginning of a sustained focus on attacks that go after people in the holiday shopping season.”

Openwashing (Fake FOSS)