SlideShare ist ein Scribd-Unternehmen logo
1 von 44
OSS has taken over the
enterprise: The top five
OSS trends of 2015
Richard Sherrard
director of product management
Richard Sherrard
director of product management
Presenters
Rogue Wave Software
2© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Top five open source
trends of 2015
Open source trends we’ve seen in 2015
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
• Open source has taken over the enterprise
• Open source discovery challenges
• Open source risk management
• Open source governance
• Multi-tiered approach to open source management
4
#1
Open source has taken
over the enterprise
Growth of open source
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 6
Use of open source continues to grow
at a fast pace!
90% of companies use
OSS components in
commercial software
(Gartner)
>80% of a typical Java
application is open-
source components and
frameworks
(TechCrunch)
11 million developers
worldwide make 13
billion open source
requests each year
Innovation drives open source adoption
7
 Open source components provide critical functionality
 Improves developer productivity
No license fees
 “More eyes” improves quality & security
Leveraged development effort
 Apache, Tomcat, Wildfly, Jakarta Commons, jQuery
 Communities continuously improve features
Mature, commoditized applications and libraries
Community peer review
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Open source in the enterprise
8
“By 2016, open source software will be in mission-critical software
portfolios within 99% of all Global 1,000 enterprises.”
Innovate
• Opens up code options
• Deploy applications with any
combination of code source
• Optimize developer effort and
time
• Quicker time to market
Identify and mitigate risk
• Technical risk
• Business risk
• Security risk
• Legal and compliance risk
Balance risk and reward
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
How open source enters your codebase
9
“90% of code in modern applications is open source” and
“31% of companies have had or suspect a breach in an open source component“
Open source
community
Legacy code
Internally
developed code
Reused code
Third party code
Supply chain
code
Outsource code
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Delivered
code
Mixed source risks
10© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Loss of
intellectual
property
Defects and quality
issues
License restrictions
and obligations
Support costs
Security
vulnerabilities
Injunctions
What organizations are looking to answer?
11
Dev VP
& Mgr
OSS Compliance Mgr
CTO/ CIO/CISO
Security Mgr
Legal
What open source am I using
Where are we using open source
across the organization
How can I increase the security
of the open source
What are my legal obligations
Are we able to participate in the
open source communities
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Embrace OSS and automate the governance process
12
Create an automated organization-wide OSS policy and leverage the
benefits
• Increase developer productivity
• Educate and develop OSS policies for the developers to follow
• Marshal the resources of the OSS community
• Accelerate software development
Understand, manage, and govern OSS comprehensively
Inventory Support Govern
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
#2
Open source discovery
Large codebases: Open source is everywhere
14
• Companies today have extremely large codebases made up of 1000’s of
developed applications.
• Lots of different technologies in play – web, mobile, embedded
• Larger number of 3rd party software suppliers being used today
Over 100 million
lines of code goes
into a average high
end car today!
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Into the “unknown”
15
• Once DISCOVERY of the open source is known you can then better understand
it
– What license(s) is it distributed under – GPL, Apache, BSD…
– What version(s) are being used; are they outdated!
– Are there known security risks
– Do I have quality issues with it
– Is their a strong community behind it!
• A plan of action can then be worked on to resolve identified risks and issues
– There will be many!
Biggest open source
challenge organizations
face today is the “Not
knowing” what they have
and “Where they have it”
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
How are they doing discovery today?
16
• Companies find it extremely hard if not impossible to uncover where open
source is being used across the organization
• It is a very ad hoc process across the organization
• Manual code reviews can take multiple man years to complete.
• Surveying or interviewing the development teams is slow and inaccurate as
developers leave and move on
• Larger number of 3rd party software suppliers being used today
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Automate the discovery of open source
17
Automated OSS
Scanning
SDLC
Integrations
OSS
Approvals
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Automate discovery of your open source
18
• Discovery by scanning your code
• Conduct scan in-place – access code where it is
• Run baseline and delta scans on your code
• Identify the “right” project
• Multiple matching techniques to find projects, files, snippets, modified code
• Patented noise reduction techniques to avoid false positives, pinpoint the
“right” project
• Search for the “right” OSS for your needs
• Large knowledgebase of OSS
• Rich information about the package
• Automated approval policy for OSS usage
• Integrate into the SDLC
• Continuous Integration builds enable on-going automation of your code
scanning
Get a comprehensive view
of OSS across projects &
teams
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
#3
Open source risk
Assessing risk in open source
20
For all its benefits, risks exist
Legal risk
Using the wrong
license can
compromise IP
Security risk
The OSS
component can
include
vulnerabilities
Support risk
Who do you call
for help?
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Cisco’s loss of IP
21
•Used GPL code to
customize
Broadcom's Linux
distribution
CyberTan
• Embedded the
code in chipset
Broadcom
• Adopted this into
its WRT54G
router
Linksys
•Bought Linksys for
$500m
•FSF Accused Cisco of
license violation
•Source code made
available
CISCO
Developers modified
firmware turning a low-
end ($60) device into a
high functioning router
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Unknown OSS and security issues
22© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Code vulnerabilities
23© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Lack of open source support
24
• Open source software does not come with commercial support; you are
dependent upon the OSS communities to provide you help and fixes
• Who do you call when your “Mission Critical” open source application has
an issue?...“No throat to choke”!
• Developers have to negotiate wasted cycles and downtime while waiting for
fixes from the community
• Developers do not have anyone to help with risks and development pitfalls
• No formal training provided on the OSS package
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Managing OSS risk
25
20%
of organizations lack meaningful controls
over OSS selection and use
of developers need not prove security of
OSS they are using
of the organizations claim to track
vulnerabilities in OSS over time
76%
80%
Increased use + few controls = unmanaged risk
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Open source support
26
• With the ubiquity of open source, enterprises need commercial-grade
support.
• We are the only vendor offering 24x7 support across hundreds of
OSS packages.
• Our “Tier 4” support gives you one call access to enterprise
architects, tackling a range of challenging and critical issues.
• We are thought leaders in the industry, and can provide enormous
value to any business that utilizes open source software.
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Value of open source support
27
Support offerings range across hundreds of open source products. We
help customers:
 Avoid downtime and wasted cycles
 Navigate complex OSS packages requiring broad and deep expertise
 Mitigate risks and development pitfalls
 Receive formal, instructor-led training across several OSS packages
 Gain the peace of mind that comes with 24X7 support coverage
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
We support the best of open source
28© 2015 Rogue Wave Software, Inc. All Rights Reserved.
#4
Open source governance
OSS best practices
30
Acquisition
& Approval
Support &
Maintenance
Tracking
Audit &
Governance
Training
Legal
Compliance
Community
Interaction
Acquisition
& Approval
Support &
Maintenance
Tracking
Audit &
Governance
Training
Legal
Compliance
Community
Interaction
Consulting
Certified library
request &
approval process
SLA support
OpenUpdate
Project tracking
Auditing services
License obligation audit
Certification services
Technical and
OSS training
OSS Policy
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Manual OSS process
31
Web search Ask around
Check the
spreadsheet
Answer
questions
Security
review
Update
spreadsheet
Contact legal
Fill out form Advocate
Monitor
security alerts
Where Used?
Code Review Rewrite
Wait Wait
Arch. review
Other approval
boards
Monitor
updates to
components
Select
Approve
Monitor
Discover
Inventory
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
OSS management process
32
Select
Discover
ApproveInventory
Monitor
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Approve your OSS
33
Requirement: Workflows reflect policies
Request and approval workflow
– Fully customizable, flexible workflow engine
• Create workflows that match the way teams work
• Forms that ask the questions you need to approve requests
• Support complex workflows with serial or parallel reviewers
• Track OSS by use, what, where, when, how and who
Flexible OSS policy management
– Effectively communicate policies to all employees
• Easily create policies based on combination of OSS package, version
and license
• Auto approve or deny requests based on usage model
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Inventory and monitor your OSS
34
Requirement: Understand what you have, learn about it and where you
have it
See OSS inventory by project
– Policy violations
– Combined lists of both approved, known OSS, and newly discovered
OSS via scanning
– Comprehensive OSS Bill of Materials
Continuously monitor OSS for security vulnerabilities and updates
– Automatic: Daily updates via link to National Vulnerability Database
(NVD) to list all know CVEs by OSS package
– Manual: Daily updates on new security vulnerabilities from OSS experts
after reviewing of hundreds of packages
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
#5
Multi tiered approach to
open source management
Multiple approaches to managing open source
36
• Finding issues late and maybe in production
are very expensive to resolve
• Not able to dig deeper into your code to find
potential problems
• Not able to fix issues on open source in use
• Continuous architecture and package reviews
to stay on top of the latest technology
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Static code analysis
37
Significantly reduces the cost of reliable, secure software
• Complements existing testing approaches
• Automated and repeatable analysis
Enforces key industry standards
• DISA STIG, CWE, MISRA
• CERT, SAMATE
• OWASP, DO-178B, FDA validation
• ...and more
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Dynamic code analysis
38
• Interactive debugging
• Interactive memory debugging
• Reverse debugging
• Unattended debugging
• Serial and parallel applications
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
To wrap up
Open source is everywhere!
40
Open source can no longer be avoided in your application
development
Learn to embrace the usage of open source
Need to understand what you have and where you have it
Open source is not “FREE” and comes with it own risks and
rewards
With out checks & balances in place, open source chaos will arise
Take a multi pronged approach to managing open source
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Rogue Wave capabilities
41© 2015 Rogue Wave Software, Inc. All Rights Reserved.
What we do
42
Rogue Wave helps organizations simplify
complex software development, improve
code quality, and shorten cycle times
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
See us in action:
www.roguewave.com
Richard Sherrard
richard.sherrard@roguewave.com
OSS has taken over the enterprise: The top five OSS trends of 2015

Weitere ähnliche Inhalte

Was ist angesagt?

Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020Lyra Infosystems Pvt. Ltd
 
How enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceHow enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceRogue Wave Software
 
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationSecurity Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationDenim Group
 
Application Asset Management with ThreadFix
 Application Asset Management with ThreadFix Application Asset Management with ThreadFix
Application Asset Management with ThreadFixDenim Group
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodeDevOps.com
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsTim Mackey
 
Open source software support for the enterprise
Open source software support for the enterpriseOpen source software support for the enterprise
Open source software support for the enterpriseRogue Wave Software
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on GivingBlack Duck by Synopsys
 
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Denim Group
 
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudShift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudBlack Duck by Synopsys
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Black Duck by Synopsys
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineDevOps.com
 
Monitoring Attack Surface to Secure DevOps Pipelines
Monitoring Attack Surface to Secure DevOps PipelinesMonitoring Attack Surface to Secure DevOps Pipelines
Monitoring Attack Surface to Secure DevOps PipelinesDenim Group
 
Making the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationMaking the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationBlack Duck by Synopsys
 
Secure DevOps with ThreadFix 2.3
Secure DevOps with ThreadFix 2.3Secure DevOps with ThreadFix 2.3
Secure DevOps with ThreadFix 2.3Denim Group
 
Programming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldProgramming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldRogue Wave Software
 
September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source: September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source: Black Duck by Synopsys
 
Black duck Software's pitch
Black duck Software's pitchBlack duck Software's pitch
Black duck Software's pitchi7
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsSynopsys Software Integrity Group
 

Was ist angesagt? (20)

Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020
 
How enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceHow enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open source
 
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationSecurity Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your Organization
 
Application Asset Management with ThreadFix
 Application Asset Management with ThreadFix Application Asset Management with ThreadFix
Application Asset Management with ThreadFix
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from Code
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
Open source software support for the enterprise
Open source software support for the enterpriseOpen source software support for the enterprise
Open source software support for the enterprise
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on Giving
 
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
 
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudShift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
Monitoring Attack Surface to Secure DevOps Pipelines
Monitoring Attack Surface to Secure DevOps PipelinesMonitoring Attack Surface to Secure DevOps Pipelines
Monitoring Attack Surface to Secure DevOps Pipelines
 
Making the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationMaking the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network Communication
 
Secure DevOps with ThreadFix 2.3
Secure DevOps with ThreadFix 2.3Secure DevOps with ThreadFix 2.3
Secure DevOps with ThreadFix 2.3
 
Programming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldProgramming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT world
 
September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source: September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source:
 
Black duck Software's pitch
Black duck Software's pitchBlack duck Software's pitch
Black duck Software's pitch
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
 

Ähnlich wie OSS has taken over the enterprise: The top five OSS trends of 2015

Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Rogue Wave Software
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security Rogue Wave Software
 
RVAsec Bill Weinberg Open Source Hygiene Presentation
RVAsec Bill Weinberg Open Source Hygiene PresentationRVAsec Bill Weinberg Open Source Hygiene Presentation
RVAsec Bill Weinberg Open Source Hygiene PresentationBlack Duck by Synopsys
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...FINOS
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleRogue Wave Software
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...Paris Open Source Summit
 
Identifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developersIdentifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developersRogue Wave Software
 
Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Black Duck by Synopsys
 
Breaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullBreaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullGreat Wide Open
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemRogue Wave Software
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The ThingsAll Things Open
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurityRogue Wave Software
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareRogue Wave Software
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOpsBlack Duck by Synopsys
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for DevopsJerika Phelps
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseMarcel de Vries
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingAll Things Open
 
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeOpen DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeEmerasoft, solutions to collaborate
 
Create code confidence for better application security
Create code confidence for better application securityCreate code confidence for better application security
Create code confidence for better application securityRogue Wave Software
 

Ähnlich wie OSS has taken over the enterprise: The top five OSS trends of 2015 (20)

Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 
RVAsec Bill Weinberg Open Source Hygiene Presentation
RVAsec Bill Weinberg Open Source Hygiene PresentationRVAsec Bill Weinberg Open Source Hygiene Presentation
RVAsec Bill Weinberg Open Source Hygiene Presentation
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
 
Open Source Support
Open Source SupportOpen Source Support
Open Source Support
 
Identifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developersIdentifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developers
 
Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016
 
Breaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullBreaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational Pull
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The Things
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurity
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle software
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for Devops
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
 
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeOpen DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
 
Create code confidence for better application security
Create code confidence for better application securityCreate code confidence for better application security
Create code confidence for better application security
 

Mehr von Rogue Wave Software

The Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveThe Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveRogue Wave Software
 
No liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureNo liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureRogue Wave Software
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationRogue Wave Software
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...Rogue Wave Software
 
Adding layers of security to an API in real-time
Adding layers of security to an API in real-timeAdding layers of security to an API in real-time
Adding layers of security to an API in real-timeRogue Wave Software
 
Getting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyGetting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyRogue Wave Software
 
Advanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsAdvanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsRogue Wave Software
 
The forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youThe forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youRogue Wave Software
 
Are open source and embedded software development on a collision course?
Are open source and embedded software development on a  collision course?Are open source and embedded software development on a  collision course?
Are open source and embedded software development on a collision course?Rogue Wave Software
 
Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Rogue Wave Software
 
5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure successRogue Wave Software
 
PSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliancePSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and complianceRogue Wave Software
 
Java 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureJava 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureRogue Wave Software
 
How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)Rogue Wave Software
 
Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Rogue Wave Software
 
How to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxHow to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxRogue Wave Software
 
Approaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsApproaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsRogue Wave Software
 
Enterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSEnterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSRogue Wave Software
 
Walk through an enterprise Linux migration
Walk through an enterprise Linux migrationWalk through an enterprise Linux migration
Walk through an enterprise Linux migrationRogue Wave Software
 
How to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmHow to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmRogue Wave Software
 

Mehr von Rogue Wave Software (20)

The Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveThe Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data Perspective
 
No liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureNo liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failure
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformation
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...
 
Adding layers of security to an API in real-time
Adding layers of security to an API in real-timeAdding layers of security to an API in real-time
Adding layers of security to an API in real-time
 
Getting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyGetting the most from your API management platform: A case study
Getting the most from your API management platform: A case study
 
Advanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsAdvanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applications
 
The forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youThe forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for you
 
Are open source and embedded software development on a collision course?
Are open source and embedded software development on a  collision course?Are open source and embedded software development on a  collision course?
Are open source and embedded software development on a collision course?
 
Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices
 
5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success
 
PSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliancePSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliance
 
Java 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureJava 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the future
 
How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)
 
Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)
 
How to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxHow to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to Linux
 
Approaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsApproaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC apps
 
Enterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSEnterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOS
 
Walk through an enterprise Linux migration
Walk through an enterprise Linux migrationWalk through an enterprise Linux migration
Walk through an enterprise Linux migration
 
How to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmHow to keep developers happy and lawyers calm
How to keep developers happy and lawyers calm
 

Kürzlich hochgeladen

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 

Kürzlich hochgeladen (20)

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 

OSS has taken over the enterprise: The top five OSS trends of 2015

  • 1. OSS has taken over the enterprise: The top five OSS trends of 2015 Richard Sherrard director of product management
  • 2. Richard Sherrard director of product management Presenters Rogue Wave Software 2© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 3. Top five open source trends of 2015
  • 4. Open source trends we’ve seen in 2015 © 2015 Rogue Wave Software, Inc. All Rights Reserved. • Open source has taken over the enterprise • Open source discovery challenges • Open source risk management • Open source governance • Multi-tiered approach to open source management 4
  • 5. #1 Open source has taken over the enterprise
  • 6. Growth of open source © 2015 Rogue Wave Software, Inc. All Rights Reserved. 6 Use of open source continues to grow at a fast pace! 90% of companies use OSS components in commercial software (Gartner) >80% of a typical Java application is open- source components and frameworks (TechCrunch) 11 million developers worldwide make 13 billion open source requests each year
  • 7. Innovation drives open source adoption 7  Open source components provide critical functionality  Improves developer productivity No license fees  “More eyes” improves quality & security Leveraged development effort  Apache, Tomcat, Wildfly, Jakarta Commons, jQuery  Communities continuously improve features Mature, commoditized applications and libraries Community peer review © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 8. Open source in the enterprise 8 “By 2016, open source software will be in mission-critical software portfolios within 99% of all Global 1,000 enterprises.” Innovate • Opens up code options • Deploy applications with any combination of code source • Optimize developer effort and time • Quicker time to market Identify and mitigate risk • Technical risk • Business risk • Security risk • Legal and compliance risk Balance risk and reward © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 9. How open source enters your codebase 9 “90% of code in modern applications is open source” and “31% of companies have had or suspect a breach in an open source component“ Open source community Legacy code Internally developed code Reused code Third party code Supply chain code Outsource code © 2015 Rogue Wave Software, Inc. All Rights Reserved. Delivered code
  • 10. Mixed source risks 10© 2015 Rogue Wave Software, Inc. All Rights Reserved. Loss of intellectual property Defects and quality issues License restrictions and obligations Support costs Security vulnerabilities Injunctions
  • 11. What organizations are looking to answer? 11 Dev VP & Mgr OSS Compliance Mgr CTO/ CIO/CISO Security Mgr Legal What open source am I using Where are we using open source across the organization How can I increase the security of the open source What are my legal obligations Are we able to participate in the open source communities © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 12. Embrace OSS and automate the governance process 12 Create an automated organization-wide OSS policy and leverage the benefits • Increase developer productivity • Educate and develop OSS policies for the developers to follow • Marshal the resources of the OSS community • Accelerate software development Understand, manage, and govern OSS comprehensively Inventory Support Govern © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 14. Large codebases: Open source is everywhere 14 • Companies today have extremely large codebases made up of 1000’s of developed applications. • Lots of different technologies in play – web, mobile, embedded • Larger number of 3rd party software suppliers being used today Over 100 million lines of code goes into a average high end car today! © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 15. Into the “unknown” 15 • Once DISCOVERY of the open source is known you can then better understand it – What license(s) is it distributed under – GPL, Apache, BSD… – What version(s) are being used; are they outdated! – Are there known security risks – Do I have quality issues with it – Is their a strong community behind it! • A plan of action can then be worked on to resolve identified risks and issues – There will be many! Biggest open source challenge organizations face today is the “Not knowing” what they have and “Where they have it” © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 16. How are they doing discovery today? 16 • Companies find it extremely hard if not impossible to uncover where open source is being used across the organization • It is a very ad hoc process across the organization • Manual code reviews can take multiple man years to complete. • Surveying or interviewing the development teams is slow and inaccurate as developers leave and move on • Larger number of 3rd party software suppliers being used today © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 17. Automate the discovery of open source 17 Automated OSS Scanning SDLC Integrations OSS Approvals © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 18. Automate discovery of your open source 18 • Discovery by scanning your code • Conduct scan in-place – access code where it is • Run baseline and delta scans on your code • Identify the “right” project • Multiple matching techniques to find projects, files, snippets, modified code • Patented noise reduction techniques to avoid false positives, pinpoint the “right” project • Search for the “right” OSS for your needs • Large knowledgebase of OSS • Rich information about the package • Automated approval policy for OSS usage • Integrate into the SDLC • Continuous Integration builds enable on-going automation of your code scanning Get a comprehensive view of OSS across projects & teams © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 20. Assessing risk in open source 20 For all its benefits, risks exist Legal risk Using the wrong license can compromise IP Security risk The OSS component can include vulnerabilities Support risk Who do you call for help? © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 21. Cisco’s loss of IP 21 •Used GPL code to customize Broadcom's Linux distribution CyberTan • Embedded the code in chipset Broadcom • Adopted this into its WRT54G router Linksys •Bought Linksys for $500m •FSF Accused Cisco of license violation •Source code made available CISCO Developers modified firmware turning a low- end ($60) device into a high functioning router © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 22. Unknown OSS and security issues 22© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 23. Code vulnerabilities 23© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 24. Lack of open source support 24 • Open source software does not come with commercial support; you are dependent upon the OSS communities to provide you help and fixes • Who do you call when your “Mission Critical” open source application has an issue?...“No throat to choke”! • Developers have to negotiate wasted cycles and downtime while waiting for fixes from the community • Developers do not have anyone to help with risks and development pitfalls • No formal training provided on the OSS package © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 25. Managing OSS risk 25 20% of organizations lack meaningful controls over OSS selection and use of developers need not prove security of OSS they are using of the organizations claim to track vulnerabilities in OSS over time 76% 80% Increased use + few controls = unmanaged risk © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 26. Open source support 26 • With the ubiquity of open source, enterprises need commercial-grade support. • We are the only vendor offering 24x7 support across hundreds of OSS packages. • Our “Tier 4” support gives you one call access to enterprise architects, tackling a range of challenging and critical issues. • We are thought leaders in the industry, and can provide enormous value to any business that utilizes open source software. © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 27. Value of open source support 27 Support offerings range across hundreds of open source products. We help customers:  Avoid downtime and wasted cycles  Navigate complex OSS packages requiring broad and deep expertise  Mitigate risks and development pitfalls  Receive formal, instructor-led training across several OSS packages  Gain the peace of mind that comes with 24X7 support coverage © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 28. We support the best of open source 28© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 30. OSS best practices 30 Acquisition & Approval Support & Maintenance Tracking Audit & Governance Training Legal Compliance Community Interaction Acquisition & Approval Support & Maintenance Tracking Audit & Governance Training Legal Compliance Community Interaction Consulting Certified library request & approval process SLA support OpenUpdate Project tracking Auditing services License obligation audit Certification services Technical and OSS training OSS Policy © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 31. Manual OSS process 31 Web search Ask around Check the spreadsheet Answer questions Security review Update spreadsheet Contact legal Fill out form Advocate Monitor security alerts Where Used? Code Review Rewrite Wait Wait Arch. review Other approval boards Monitor updates to components Select Approve Monitor Discover Inventory © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 32. OSS management process 32 Select Discover ApproveInventory Monitor © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 33. Approve your OSS 33 Requirement: Workflows reflect policies Request and approval workflow – Fully customizable, flexible workflow engine • Create workflows that match the way teams work • Forms that ask the questions you need to approve requests • Support complex workflows with serial or parallel reviewers • Track OSS by use, what, where, when, how and who Flexible OSS policy management – Effectively communicate policies to all employees • Easily create policies based on combination of OSS package, version and license • Auto approve or deny requests based on usage model © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 34. Inventory and monitor your OSS 34 Requirement: Understand what you have, learn about it and where you have it See OSS inventory by project – Policy violations – Combined lists of both approved, known OSS, and newly discovered OSS via scanning – Comprehensive OSS Bill of Materials Continuously monitor OSS for security vulnerabilities and updates – Automatic: Daily updates via link to National Vulnerability Database (NVD) to list all know CVEs by OSS package – Manual: Daily updates on new security vulnerabilities from OSS experts after reviewing of hundreds of packages © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 35. #5 Multi tiered approach to open source management
  • 36. Multiple approaches to managing open source 36 • Finding issues late and maybe in production are very expensive to resolve • Not able to dig deeper into your code to find potential problems • Not able to fix issues on open source in use • Continuous architecture and package reviews to stay on top of the latest technology © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 37. Static code analysis 37 Significantly reduces the cost of reliable, secure software • Complements existing testing approaches • Automated and repeatable analysis Enforces key industry standards • DISA STIG, CWE, MISRA • CERT, SAMATE • OWASP, DO-178B, FDA validation • ...and more © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 38. Dynamic code analysis 38 • Interactive debugging • Interactive memory debugging • Reverse debugging • Unattended debugging • Serial and parallel applications © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 40. Open source is everywhere! 40 Open source can no longer be avoided in your application development Learn to embrace the usage of open source Need to understand what you have and where you have it Open source is not “FREE” and comes with it own risks and rewards With out checks & balances in place, open source chaos will arise Take a multi pronged approach to managing open source © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 41. Rogue Wave capabilities 41© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 42. What we do 42 Rogue Wave helps organizations simplify complex software development, improve code quality, and shorten cycle times © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 43. See us in action: www.roguewave.com Richard Sherrard richard.sherrard@roguewave.com