Language Selection

English French German Italian Portuguese Spanish

Could Oracle fracture open source community?

Filed under
OSS

An Oracle was a person or agency considered to be a source of wise counsel or prophetic opinion. How can that particular definition be applied to Oracle the company? It can’t. In fact I would claim that Oracle, the company, is quite the opposite of “wise” or “prophetic”.

Why am I saying this? Unless you’ve had your head in the sand, you probably know that Oracle is suing Google over its use of Java in the Android operating system. Why are they doing this? If you puff away all the smoke and mirrors, the answer is simple: To get as much cash from Sun as they can. The problem that Oracle is facing is that Sun made Java open source in 2006. That was because then CEO, Johnathan Schwartz, was a big champion of open source and wanted to increase the exposure of Java. It was a smart move. Sun was also hoping to make a push for it’s Solaris operating system for data centers…so they released an open source version of that as well.

Sun and Google spent much time in talks about the Java (and other issues). It was decided that no law suit would be necessary, but they never could come to a complete agreement as to what to do about the Java issue.

Then Oracle comes along, buys Sun, and now seams hell-bent on destroying that relationship between Sun and Google.

rest here




re: Oracle

So I thought one of the main reasons Open Source was soooooo great was that it was "open".

Now this guy is playing chicken little saying the sky is falling on Java, Open Office, and MySQL because Oracle bought Sun.

So where's all that "it's open - no worries - freedom" bullshit that Open Source is famous for?

If Open Source can be bought out and removed from the public - remind me again how open source is oh soooo much better then propriatary software?

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

MongoDB IPO

Graphics: Mesa 17.2.3, Libinput 1.9 and More

  • mesa 17.2.3
    Mesa 17.2.3 is now available. In this release we have: The Vulkan drivers ANV and RADV have multiple small fixes. The EGL code has improved handling of the new wl_dmabuf codepath. SWR no longer crashes when checking environment variables. Other gallium drivers have also seen updates - freedreno, nouveau and radeonsi. The gallivm module, used by llvmpipe et al. has gained little endian PPC64 fixes.
  • Mesa 17.2.3 Offers Vulkan Fixes, Gallium3D Updates
    Mesa 17.2.3 is now available as the latest bi-weekly update for this current stable driver series.
  • [ANNOUNCE] libinput 1.9.0
    libinput 1.9 is now available. As expected, not a lot of changes since the rc2: a few test fixes, a fix to stop excessive logging and an extra assert so we fail early in case of a bug.
  • Libinput 1.9 Released With Input Improvements, Requires Meson
    Peter Hutterer has today released libinput 1.9.0 as the latest version of this library used by both Wayland and X11 systems for unified input handling.
  • DRM Leasing Support To Land For Linux 4.15
  • Intel OpenGL Shader Cache Revised Once More
    The long ongoing work to implement an OpenGL/GLSL shader cache for the Intel Mesa driver has been revised once more with 32 new patches hitting the mailing list today.

Linux 4.13.8, 4.9.57, 4.4.93, 3.18.76 and Ubuntu Kernel Team Summary

Security: FUD, Adobe, Cybersecurity Improvement Act, Updates and More

  • Focusing on Healthcare Open Source Security Awareness [Ed: More Flexera marketing in the form of scare-mongering]
  • Adobe patches zero-day vulnerability used to plant gov't spying software
    Adobe has patched a zero-day vulnerability used by the BlackOasis APT to plant surveillance software developed by Gamma International. On Monday, researchers from Kaspersky Lab revealed the new, previously unknown vulnerability, which has been actively used in the wild by advanced persistent threat (APT) group BlackOasis.
  • IoT Cybersecurity: What's Plan B?
    In August, four US Senators introduced a bill designed to improve Internet of Things (IoT) security. The IoT Cybersecurity Improvement Act of 2017 is a modest piece of legislation. It doesn't regulate the IoT market. It doesn't single out any industries for particular attention, or force any companies to do anything. It doesn't even modify the liability laws for embedded software. Companies can continue to sell IoT devices with whatever lousy security they want.
  • Security updates for Wednesday
  • Security updates for Thursday
  • Abuse of RESTEasy Default Providers in JBoss EAP
    Red Hat JBoss Enterprise Application Platform (EAP) is a commonly used host for Restful webservices. A powerful but potentially dangerous feature of Restful webservices on JBoss EAP is the ability to accept any media type. If not configured to accept only a specific media type, JBoss EAP will dynamically process the request with the default provider matching the Content-Type HTTP Header which the client specifies. Some of the default providers where found to have vulnerabilities which have now been removed from JBoss EAP and it's upstream Restful webservice project, RESTEasy.
  • “Security concerns” lead to LTE service shutdown on Chinese Apple Watches