Vatican library uses open source

Who knew the Vatican library uses open source?

We read this article with interest today:

Vatican library: open source for long-term preservation

It looks at the way the Vatican library uses open source and open standards for long-term preservation of electronic documents. Head of IT at the Vatican Library, Luciano Ammenti, identified another key benefit: avoiding vendor lock-in. Both of these points are interesting and we’ll take a closer look, but the line from the article that really leapt out was this:

The Vatican library does not have a policy prescribing open source and open standards, says Ammenti. “The reality is that in our data centre we use a lot of open source software, sharing our experiences with other scientific communities. It is a privilege to use their open source solutions.”

The best solutions are open source

In other words, the set up at the Biblioteca Apostolica Vaticana (to give it its proper name) hasn’t been prescribed or imposed by a higher authority, rather it simply provides the best solution and day-to-day it helps the Library achieve its aims. The Vatican library uses open source just because nothing else performs as well, not out of adherence to higher principles. That’s a very powerful endorsement of open source, and further reading of the article reveals that the IT department at the Vatican library uses open source for wider operations.

Well-maintained open source software

Discussing digital file format in particular, Mr Ammenti referred to the features of the actively-maintained system the library uses and contrasted it with the only proprietary alternative, which was last updated in 1998. The freedom to identify and migrate to well-maintained open source systems such as that one is a key element of the appeal of open source and the heightened productivity it can unlock. Making operational decisions in the knowledge that open standards underpin the choices you make is a breath of fresh air for IT professionals used to working within the limits of proprietary systems.

If you have any queries about adopting open source alternatives to any of the proprietarysolutions you use, please email



An open source program to suit you

What would you like an open source program to do?

Imagine you’re already a very happy open source convert, full of the joys of freedom of choice, and you’ve chosen Original Sync (imaginary software for our imaginary scenario) to keep track of your contacts, appointments and emails. You love it 95% of the time but there’s this little niggle – you’d like it to be able to do something additional to save you a job or help you work more efficiently. Wouldn’t it be great if it could talk directly to your note taking app or come with different coloured backgrounds for different days of the week or fill in a time sheet or in some other way do something totally incredible that it doesn’t do atm?  An open source program and approach allows you get those changes made – here’s how it works:

Adding the features you want

You approach your hosting provider (that’s us) and pose us the problem. We talk to the programmers that we know and trust and ask them if that mod is possible. Chances are it is, so the programmers obtain the source code (because that code is ‘open’, ie available to see and use) and develop it to include the features you want. Bingo – you have software that does just what you need it to do, an open source program with your name on it (not literally). The modified source code and new program is available for anyone to use, because why not? The world is a happier place because Monday is pink and Tuesday is a delicate shade of sea green.

Choice and freedom

Using open source to run your business expands your horizons as it gives you the choice and freedom to use the software that’s right for you, not the software that a developer wants you to use or that you have to use if you want other related packages to keep working. This is called ‘lock-in’ and is one of the most unattractive aspects of proprietary software. Switch to open source and lock-in becomes something that holds back your competitors, not you.


Ownership – content, domains, accounts, do you really hold the rights to everything you do online?

Here we take a quick look at a couple of areas, and include a quick update on something we were talking about a fortnight ago – linking accounts.

Who owns your content?

It’s not unreasonable to assume that you have total ownership and full rights over all your original content that you post on the internet, but you might want to double check the Ts&Cs. Some sites such as LinkedIn explicitly reassure you that your content is yours and you have full rights to it, but there’s a sting in the tail:

…you own the content and information that you submit or post to the Services and you are only granting LinkedIn the following non-exclusive license: A worldwide, transferable and sublicensable right to use, copy, modify, distribute, publish, and process, information and content that you provide through our Services, without any further consent, notice and/or compensation to you or others.

– our bold, because that’s quite an important little clause. Some sites go further and expect to be able to use others’ original creative content royalty-free. This from WattPad, a creative writing platform:

C. For clarity, you retain all of your ownership rights in your User Submissions. However, by submitting User Submissions to, you hereby grant a worldwide, non-exclusive, royalty-free, transferable license to use, reproduce, distribute, display, and perform the User Submissions in connection with the Website.

This is all there in black and white, but how many people actually read it, inform themselves and consider the ramifications, especially the teen/young adult audience that particular site is aimed at?

If you’re posting original content make sure you understand what can be done with that content, and that you’re happy with the agreement (which, of couse, you’ll read in detail before signing up).

Registering a domain name

Easy peasy. Find one of the few remaining available domain names, hand over your £9.99, fill in a few fields and you’re away – or get someone else to do it and trust them to get it right. It isn’t that simple though and making common mistakes can jeopardise your whole business set-up.

To focus on just a couple, do you know who’s named as the owner of the domain your business relies on? Do you know who’s named as the administrative contact? These should be respectively the owner of the business and the person who is authorised and competent to act for you on domain matters – an in-house IT person or a trusted technical provider. Do you know if the contact email on your domain registration arrives at a live and monitored inbox with an established path to contact you,eg to deliver notice that your domain name is nearing expiry? This all sounds extremely simple and it is, but a good half of the owners of small businesses that we speak to not only don’t know the answers to these questions, but wouldn’t know how to go about finding the answers.

Consider this from Nominet:

We have always required domain name holders to provide accurate and up-to-date information in the form of a correct registrant name and postal address. Failure to do this means a registrant risks losing their domain name.


And that’s before a company registering a .uk is wrongly described as a charity and other mistakes that can legally permit your domain to be removed from you.

Help is at hand – in this as with so much else, OpenSure can see the process through for you accurately and quickly. We can run a check on an existing domain (this is standard for domains transferred to our servers) and advise on any domain queries you might have, such as false invoicing scams.

Using a third-party app to log-in

Two weeks ago we looked at why linking accounts on different platforms wasn’t such a good idea, and now this from Computerworld:

A new tool allows hackers to enerate URLs that can hijack accounts on sites that use Facebook Login, potentially enabling powerful phishing attacks.

All sorts of sites allow you to use other sites’ logins to log in to them, eg Goodreads. This is yet another example of stretching security rather thin, completey unnecessarily. Just come up with a unique login for your Goodreads account and snip another thread between your online identities.