Forgot your password?
typodupeerror

Comment Re:GPL offered protection from competitors (Score 1) 370

Instantiating a fully open core, on which to deliver proprietary add-ons, is a harder model: it requires the implementation domain to actually have such a division, and it requires a lot of investment in that core ... probably more than any one company is prepared to spend, merely to release it utterly to anyone's use. There are a few cases where this has worked, notably of course the Apache projects (and most notably, httpd): many companies collaborated to create the core, so they could build value on top (mostly in the form of web sites/applications, rather than httpd add-ons per se, but the economics are the same). But such opportunities are rare.

Comment Re:Security theatre (Score 1) 379

Careful requirements are certainly important, but so also is competence. No requirements document was ever complete. There will always be decisions to be made beyond the document, and they have to be made with proper respect for the fundamental objectives. The BP is correct: "To have a company intimately involved with *security* not apparently able to manage their own security in a manner that protects the country and their customers is a joke." If not something worse.

Slashdot Top Deals

"You're a creature of the night, Michael. Wait'll Mom hears about this." -- from the movie "The Lost Boys"

Working...