Language Selection

English French German Italian Portuguese Spanish

Why Oracle Wants LibreOffice to Succeed

Filed under
LibO
OOo

Oracle is trying to keep OpenOffice.org going, but only in a certain direction. No one if quite sure what that direction is right now, but I think it's fair to assume there is a definite plan.

LibreOffice, for whatever reason, does not fit in that plan. Or Oracle is worried that LibreOffice is in sync now, but won't be later.

The solution? Invite LibreOffice contributors with OpenOffice.org leadership roles to choose between the two projects, which is exactly what happened last month. This accomplishes two things: those who leave can be replaced by more Oracle-friendly developers. Those who stay will have re-committed themselves to the success of OpenOffice.org, just by staying.

Ah, but there's another benefit here left unsaid: the people who leave--as well as any protesting developers who follow them--will very likely go work on LibreOffice. They will build LibreOffice to be a better, stronger office suite, using better, stronger code.

Code that OpenOffice.org will be more than able to cherry pick right back into their project.

Full Story




More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News