Open Source's First Six Months
Yes, we're winning. We're on a roll. The Linux user base is doubling every year. The big software vendors are being forced to take notice by their customers. Datapro even says Linux gets the best overall satisfaction ratings from managers and directors of information systems in large organizations. I guess that means not all of them are pointy-haired bosses.
The explosive growth of the Internet and the staggering complexity of modern software development have clearly revealed the fatal weaknesses of the closed source model. The people who get paid big bucks to worry about these things for Fortune 500 companies have understood for awhile that something is deeply wrong with the conventional development process. They've seen the problem become acute as the complexity of software requirements has escalated, but they've been unable to imagine any alternative.
We are offering an alternative. I believe this is why the Open Source campaign has been able to make such remarkable progress in changing the terms of debate over the last few months. It's because we're moving into a conceptual vacuum with a simple but powerful demonstration—that hierarchy, closure and secrecy are weak, losing strategies in a complex and rapidly changing environment. The rising complexity of software requirements has reached a level such that only open source and peer review have any hope of being effective tactics in the future.
The article in The Economist was titled “Revenge of the Hackers”, and that's appropriate—because we are now remaking the software industry in the image of the hacker culture. We are proving every day that we are the people with the drive and vision to lead the software industry into the next century.
Eric S. Raymond can be reached at email@example.com.
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems
Join editor Bill Childers and Bit9's Paul Riegle on April 27 at 12pm Central to learn how to keep your Linux systems secure.
Free to Linux Journal readers.Register Now!
|Security Hardening with Ansible||Aug 18, 2014|
|Monitoring Android Traffic with Wireshark||Aug 14, 2014|
|IndieBox: for Gamers Who Miss Boxes!||Aug 13, 2014|
|Non-Linux FOSS: a Virtualized Cisco Infrastructure?||Aug 11, 2014|
|Linux Security Threats on the Rise||Aug 08, 2014|
|Android Candy: Oyster—Netflix for Books!||Aug 07, 2014|
- Security Hardening with Ansible
- NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance
- Monitoring Android Traffic with Wireshark
- Tech Tip: Really Simple HTTP Server with Python
- Readers' Choice Awards 2013
- RSS Feeds
- Returning Values from Bash Functions
- IndieBox: for Gamers Who Miss Boxes!
- [<Megashare>] Watch Mrs Brown's Boys Movie Online Full Movie HD 2014
- Linux Security Threats on the Rise