What's The Rule For Embedding Open Source Software? - InformationWeek
IoT
IoT
IT Leadership // CIO Insights & Innovation
Commentary
8/27/2007
05:33 PM
John Soat
John Soat
Commentary
50%
50%

What's The Rule For Embedding Open Source Software?

I just talked with two CIOs who have different takes on embedding open source software in their companies' products. One sees it as standard practice, the other approaches it like a snake in a bag.

I just talked with two CIOs who have different takes on embedding open source software in their companies' products. One sees it as standard practice, the other approaches it like a snake in a bag.One gentleman is the CIO of an engine manufacturing company. He says the engineers in his firm regularly embed open source software in the company's products. From what he was saying, it sounded like this was a standard practice in his industry, and that he didn't have much to do with it. Otherwise, his company didn't use much open source software in its IT environment.

The other gentleman is the CIO of a company that provides computing services to financial firms. He says his company is careful to prevent any open source software from creeping into the products and services it sells.

"We try to manage where we use open source software, to manage the IP risk in open source," he says.

Many vendors today have built their software strategies around open source software, like IBM with Linux. And while IBM seems to have beaten down the liability issues around Linux represented by the SCO Group, still there are reasons to be concerned. That's why he says he's careful to keep track of where and how open source software is used within his organization. Also, "anybody can download anything over the Internet," he says.

There's technology that checks software code against known open source projects, like that from Black Duck Software, which CIOs should make it a point to use, he says.

So, what's the rule on embedding open source software in products? Is that a good thing or a bad thing? Or does it vary by industry -- some where it's standard practice and some where it should be approached with caution?

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll