Challenges, trends and predictions for open-source

Issue 6 2022 Infrastructure


Sarthak Rohal.

In life, the only constant is change. Open-source projects are no exception, having undergone massive transformation in recent years. Some changes have benefited users at large, while others have hindered innovation. Nonetheless, open-source persists in popularity and is still meeting its original objectives of being fully open, accessible and ‘free’.

It still has the potential and promise to be a game-changer for industries the world over. The adoption of open-source is expected to continue with the same level of enthusiasm and, for business applications, open-source software (OSS) is often the first choice. Although early advocates focused on lowering costs, a deepening ecosystem of integration and developer skillsets focused on open-source solutions has cemented the importance of open-source in the enterprise.

According to a Red Hat survey on The State of Enterprise Open-source, 69% of IT professionals indicated that OSS is either highly important or very significant. Let’s take a look at what the future holds for businesses and OSS.

OSS:choosing the future

Open-source has become recognised as the top choice for software development for companies concerned with remaining future-fit, as it permits IT departments to get their ideas to market faster. Open-source plays an important role in high-tech industries in particular, as it eliminates the need for expensive licences, enabling software to be installed with no fees and no limit on the number of software installations. The move from proprietary software toward OSS is accelerating rapidly and is expected to play a larger role in emerging technologies over the next two years.

Enterprise open-source continues to gain at the expense of proprietary software and this shift has not been subtle, particularly considering that enterprise software deployments are not generally known for rapid change. Some mature enterprise-grade OSS faces a lower risk of becoming obsolete because of the developing community’s involvement. Conversely, companies relying on proprietary software run the risk of software getting discontinued or paying more over time since digital technology is rapidly evolving.

Driving forces behind OSS adoption

Open-source enables cost and time savings for businesses while improving efficiency and contributing to increased developer satisfaction and flexibility. Critically, eliminating vendor lock-in is becoming more important for organisations, which is enabled by the reusability of open-source developed features as adoption increases. Today, 83% of organisations continue to contribute to open-source, and nearly half have a policy in place that governs their contributions.

Enabler of business strategy

The biggest strategic consideration is the fact that open-source is free. This allows the company to spend time and money only on developing the tools or functionality it requires, without having to start from scratch. The less money spent on a product, the lower its end price, which makes it more attractive to potential subscribers. Accordingly, open-source is the gateway to the future, with web, mobile and cloud solutions increasingly being built on open-source infrastructure. Some data and analytics solutions are only available in open-source and future architectures are highly likely to be based on open-source. The same goes for web solutions, where almost all (with the exception of Microsoft’s cloud) are based on open-source solutions.

The move to an OSS must be planned carefully, which requires a thorough evaluation to be conducted. The right support will be necessary in order to ensure that organisations maintain high availability, reliability and scalability. This can be done by:

● Setting up an open-source programme office in the commission.

● Enhancing the software repository.

● Revising software distribution practices.

● Enabling and creating innovation with open-source labs.

● Developing skills and recruiting expertise.

● Increasing outreach to communities.

● Integrating open-source in internal IT governance.

● Ensuring OSS security.

● Engaging a trusted partner to facilitate the journey.

OSS will soon be the foundation for all architectures, making it a safe bet moving forward. However, with every step into new territory, it is important for companies to be prepared and informed along their journey. Thus, when implementing OSS into the business strategy, it is necessary to keep the following principles in mind: think open, transform, share, contribute, secure, and stay in control.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.