Skip to content

TeleDynamics Think Tank

Open source vs. open access: which one to choose?

Posted by Daniel Noworatzky on Oct 5, 2016 3:40:00 PM

 

Designed by Alvaro_Cabrera - Freepik.com
Image designed by Alvaro_Cabrera - Freepik.com

Open source with open access vs. open source:
Make sure you know which one suits you and your customer. 

Open source telecommunications systems are not all created equal. All are open source in the sense that they are built using publicly and freely available code like Asterisk. However, not all of them allow access to the root programming level, which allows you to modify or customize aspects of the code to suit specific requirements or preferences. If a system restricts root-level access, certain features may be customizable, but don’t count on having much leeway. Be sure you know which one best suits your customer.

Manufacturers have different rationales for denying root access, also known as locking down their software. It may be because they blended some of their own proprietary code in with the open-source code and want to protect it. Or, sometimes they do it to facilitate troubleshooting, since it is more difficult to support an open root system whose critical files have been changed. Denying access to these critical files may enable the manufacturer to better support their system. Similarly, they may want to minimize the risk of technical malfunction from human error by keeping the coding intact. Or, they may have optimized their system to work with certain brands of hardware and locked it down to discourage integration with untested third-party devices.

Whatever the reason, the end result is that there is little, if any, room for customization once a system is locked down. This can create interoperability issues and limit the options available to your customers. For example, say your customer wants to point their IP PBX to an off-site server for backup recovery file destinations. Normally, a locked-down device only stores backup files on the unit itself, but with root access, you can point backup files to another server to be stored offsite. Same goes for voicemails and call recordings.

Or again, let’s say the system is not interoperable with a certain device. With root access, you can add your own code to create a work-around and integrate the hardware, but with a locked-down system, you would have to get the manufacturer involved, which could incur additional fees.

On the other hand, not all customers need the additional flexibility of root access, and even if they had it, they might not have the skill set on staff to be able to leverage it. Knowing how to access the root level programming and make modifications requires a more advanced skillset than managing a locked-down system. And, as mentioned above, a system with open access may be more difficult and costly to troubleshoot.

TeleDynamics sells open-access IP PBXs like Xorcom and the Yeastar MyPBX Standard model and U5 series, as well as locked-down open-source IP PBXs including Grandstream, Sangoma, and the Yeastar MyPBX S series.

Of course, there is also the option of choosing a proprietary (non-open source) system. Check out our previous blog post for a comparison between proprietary and open source systems.

CONCLUSION

In general, the average customer will be fine with a locked-down system. But if there is a need for customization or for making the IP PBX function differently than a typical installation, root access is a huge plus. Understanding the specific requirements of your customer will help ensure the system you choose will best suit their needs. When in doubt, ask your TeleDynamics rep.

 


New Call-to-action

 

Topics: Customer Service, IP PBX, Business Telephone System, VoIP, SIP, Total Voice Solution

Comments

Welcome to our Think Tank

In this blog you'll read our thoughts on business telephone systems. While a lot has changed in telecom since TeleDynamics was founded in 1981, we remain as committed as ever to delivering the best customer service in the industry.

If you would like elaboration on a specific topic, please let us know in the comments section.

Happy reading and thanks for stopping by!

Receive New Articles by Email

BiBA-2017-silver-midres
Easy template for creating a network security policy
New call-to-action
New call-to-action