Language Selection

English French German Italian Portuguese Spanish

How to Overcome Hidden Barriers to Open Source Adoption

Filed under

Even when procurement policies don't rule out open source solutions explicitly in this way, they often still have an unintentional bias towards proprietary software, according to Mark Johnson, development manager at OSS Watch, a body that provides advice on open source software.

"It may be that the way solutions are investigated by organizations actually favors companies that get license fees and are therefore able to offer presales support. Because the business models work differently, you may have to pay a company to come in and do a demonstration of an open source solution," Johnson says.

"What that means is that companies may need to be aware that they have to be more hands on (with open source software)," he adds. "They can't just expect to sit down and watch a PowerPoint presentation."

Read more

More in Tux Machines

Enlightenment, KDE, and GNOME

Enlightenment KDE GNOME
  • MATE-Desktop 1.11 Released, Working Towards MATE 1.12
    The GNOME2-forked MATE-Desktop has tagged version 1.11.0 as their newest milestone. MATE developers are currently working towards MATE 1.12. MATE 1.12 is expected to have full support for GTK3, initial support for Wayland, support for GNOME Account Servers, full support for systemd's logind, xf86-input-libinput driver support, and various other changes. The work-in-progress items can be found via the MATE-Desktop Roadmap.
  • Watch Twitch Without Flash On Your Desktop With GNOME Twitch
    GNOME Twitch is a GNOME 3 application for watching (a popular live streaming video platform that primarily focuses on video gaming) on your desktop, without Flash or a web browser.

Phoronix on Graphics

Leftovers: Ubuntu

  • Ubuntu Touch OTA-7 Update Is Being Tested, on Track for October Launch
    The Ubuntu Touch OS is getting a new OTA very soon and the developers are putting the final touches on it. The update is still on track for an October 19 launch and it will remain that way if nothing goes wrong.
  • False Rumors About Microsoft Buying Canonical Are Ridiculous
    The rumor that Microsoft is interested in buying Canonical doesn't seem to go away, despite the fact that there is no real basis to it. We’ve already explained why that is unlikely to happen, but people still don't listen, so here are some more reasons why the rumor is perfect for April 1.
  • Is Microsoft Wooing Canonical & Important Departures…
    A while back I was fitted for a tinfoil hat by some because I had the audacity — the audacity! — to suggest that it would be a shrewd business move by the now-Linux-loving Microsoft to buy Canonical because a.) Canonical had technology that Microsoft would want and need to advance in mobile (like the Ubuntu Phone technology, which blows Microsoft’s out of the water currently), and b.) by this time, Mark Shuttleworth is beyond tired of flushing millions after millions down the toilet (though, as a half-billionaire, he still has several decades of current spending before his bank account resembles, well, mine), and who can blame him? You laughed. Well, sports fans, allow me to hand back your tinfoil hat and ask, who’s laughing now? Linux Journal’s James Darvell outlines this scenario in great detail, quoting a blog item reporting the business deal, and makes an observation worth keeping an eye on: “Microsoft could convert Canonical into a very profitable acquisition by eliminating the unprofitable parts of the company,” he writes. “In fact, it could become the dominant player in the cloud space, and secure the company’s future.”
  • Spice Vulnerabilities Closed in Ubuntu 14.04 LTS and Ubuntu 15.04
    A Spice vulnerability has been found and repaired in the Ubuntu 15.04 and Ubuntu 14.04 LTS operating systems. The SPICE protocol client and server library has been patched in the past few months a couple of times, and this is just the latest fix. It's not a major component, but users should really close any kind of exploit and vulnerability and upgrade their systems frequently.

Security Leftovers