SlideShare ist ein Scribd-Unternehmen logo
1 von 48
Making the Strategic Shift to Open Source
@Fujitsu Network Communication
Presented By: Karan Marjara
Open Source Process Lead
Fujitsu Network Communications
Fujitsu Limited
About Us
Note: All yen figures have been converted to U.S.dollars for convenience only at a uniform rate of
US$1=108yen,the approximate closing rate on March 31,2017.
 Headquarters:
Tokyo, Japan
 Established:
1935
 President:
Tatsuya Tanaka
 Principal Business Areas:
Technology Solutions
Ubiquitous Solutions
Device Solutions
 Employees:
155,000 worldwide
 Revenue:
4,509.6 billion yen
(US$41.7 billion)
 Operating profit:
128.8 billion yen
(US$1,192 million)
 R&D Expenses:
173.9 billion yen
(Approx. 3.9% of Revenue)
 Stock Exchange Listings:
Tokyo (Code:6702), Nagoya
FNC at a Glance
Headquartered in Richardson, Texas
Fujitsu Network Communications Inc. (FNC) is an
innovator in Connection-Oriented Ethernet and
optical transport technologies, and is a market-
leading provider of SONET, WDM, and packet
optical networking solutions. We also support
network operators and enterprise customers of all
types and sizes with our vendor-neutral, custom
professional service solutions.
Fujitsu Network Communications
About Us
Fujitsu Network Communications
Comprehensive Portfolio
Open Source Usage
UniqueOSSComponents
Why Change ?
Open Source Technology (Smarter)
Faster Time to Market
Cheaper
Transparency
Royalty Free
Freedom to Choose
Top Licenses
OSS Usage Challenges
Copyright 2017 FUJITSU LIMITED
Manually
searching
OSS in the
Source
Code
Maintenance
and
Monitoring of
OSS
Operational
Challenges
(Keeping the
old version
of OSS)
Security
Vulnerability
Overcome Challenges
Started Using
BlackDuck Suite
ProductsContinuous
Training of
Developers
Auditing the Source
Code
Regular follow-up
with Engineering,
Legal and Security
OSS Component
Approvals
FNC’s Open Source Usage
Procedure & Policy
The procedures/policy designed to facilitate the identification, tracking, and
review of OSS used in FNC products in order to insure the terms of the
associated OSS license are being met and track OSS packages with well
known security vulnerabilities and include procedures to address these
vulnerabilities.
Circle of Open Source
Scan
Identify
AuditApprove
Modify
http://partners.fnc.fujitsu.com/opensource/fncsoftware
Open Source Center Website
Open Standards
Open ROADM
Open ROADM Multi-Source Agreement (MSA), which defines interoperability
specifications for Reconfigurable Optical Add/Drop Multiplexers (ROADMs),
including the ROADM switches, transponders and pluggable optics. The goal of
the MSA is to move away from a traditionally closed ROADM optical transport
network and toward a disaggregated open transport network, while allowing for
centralized software control
Open ROADM - members
OPEN SOURCE
Warrior Framework
Warrior is a generic automation framework that
automates software tasks and processes, in
addition to functional, performance and solutions
testing.
Under Apache License 2.0
Why Open Source?
Enhance
Warrior
Technology
Collaborative
Development
with our
customers
Align with FNC
Open Strategy
• Permissive
• Very well written
• Popular Open Source License
• Apache v2.0 license provides developers the freedom to use the software for all
purpose—to not only distribute it, but also to modify and then distribute the
modified versions without concern for royalties.”
Why Apache License 2.0
Our EVOLUTION
Tomorrows Network is not
one thing-
It is everything
It is not one Vendor-
It is many Vendors
It MUST be OPEN
Warrior Framework – Open Source App Based Automation Platform
26
27
 Warrior Framework is an open source automation framework designed to
enable anyone to automate their testing, processes, and repetitive tasks by
simplifying the complex process of building an automation infrastructure.
 As a keyword and data driven framework, Warrior’s infrastructure is built to maximize
on reusability of built in keywords.
 Warrior’s app based platform provides the users with native apps to easily implement
their automation needs, while providing the user with the ability to customize their own
workflow apps.
Warrior Framework – Open Source App Based Automation Platform
28
Warrior Framework – How it all started
29
FNC’s Automation Challenges
 Automation to support multiple devices using multiple protocols with the
need to add new protocols as new technologies emerge.
 Automation must be extensible to support the unknown requirements of
future equipment.
30
FNC’s Automation Challenges
 Automation to be run on multiple devices at the same time and in sequence on other
devices, while taking output results as input to another automation case.
Automation
31
FNC’s Automation Challenges
 Users of the automation are not programmers but rather users with technical
skills using the equipment and protocols manually.
32
The Solution : Warrior Framework
33
 Keyword Driven : Warrior keywords are
python functions that are designed to
achieve a single purpose and be re-usable
when possible.
 Built In Keywords: Warrior includes
hundreds of reusable generic built in
keywords. Keywords are grouped together
to form steps in a Warrior automation case.
 Data Driven : Warrior is built on separating
data from the automation logic. This allows
users to change their data without any need
to change the automation logic.
The Solution: Warrior Framework
Keyword
Keyword
Keyword
Keyword
Keyword
Step
Step
Step
Step
Step
Case
34
 Warrior Flow
Control:
 Data Repository to allow for data
sharing among steps, case, suites
and projects
 Execution Type: Sequential and
Parallel
 Data Type: Iterative, Custom and
Hybrid
 Conditional Execution
 Error Handling: Next, Abort, Goto
 Run Mode : RMT, RUP, RUF
 Impact : No or Yes
 Looping : Goto
 Context : Positive , Negative
The Solution: Warrior Framework
Projects
Suites
Cases
Steps
System 1
System 2
System 3
System 4
System 5
Data File
35
The Solution: Warrior Framework
Uses Fujitsu Organically Developed and Proven Warrior Framework
Keyword &
Data Driven
Automation
Flow
Solution
Device 1
Result File
Log Files
Solution
Device 2
Solution
Device 3
Solution
Device 7
Solution
Device 6
Warrior
Framework
Solution
Device 5
Example of Solution-Centric Automation
Protocol A
Protocol B
Protocol C
Protocol E
Protocol D
Protocol F
• Python based automation framework
• Device independent supporting any
automatable device.
• Currently supports automation of the following
protocols: REST, NETCONF, TL1, CLI, SNMP,
web based UI. Extensible to support others.
• Allows for execution of automation flows in
sequence, in parallel and as a combination of
both
• Allows to use output from one automation step
or flow to be used as input to another or in the
decision making of what to do next.
• Provides an app based platform that allows
users to use apps to create automation without
coding knowledge.
36
 App Based: Warrior’s UI is an app based platform that provides users with 10 native apps that provide the users a
simple way to create their automation cases and organize them into suites, and projects.
 Users can execute their automation from within the native apps.
 Warrior’s Infrastructure supports creation of user’s own custom apps.
The Solution: Warrior Framework
37
 Developers will be able to publish their apps
and share them on the Wapp store. Users can
download apps developed by 3rd party
developer to fit their automation needs.
Coming Soon: Wapp Store
38
Warrior Integration
39
Easily Integrates With Support Systems
It’s All Automated
3rd
Party SW
Jenkins
Selenium
Jira
Testlink
Cloudshell
Scheduler automatically triggers
automation execution at a scheduled
time or occurrence of an event
Automatically creates a Jira
entry (defect) when an
unexpected result is
detected
If Warrior is being executed
as a Jira issue, it can also
auto update the status of
the Jira issue accordingly
Automation of WebUI
applications
Auto update execution
results in TestLink’s Test
Case Management
Automates lab equipment
and topology management
via Cloudshell integration
Warrior automation results
in text, XML, HTML and
Junit easily integrates with
3rd party tools
WARRIOR
40
Warrior Optional Support Tools
That Can Be Used as Needed
App Base UI
Web-based App based UI for
all automation development
and execution
WARHORN
Warrior Installation & Setup
IRONCLAW
XML Validation Tool
WARMOCK
CLI & Rest Simulation &
Validation Tool
JENKINS PLUGIN
Schedule and Execute
Warrior Automation from
Jenkins
SPHINX
Python Documentation
41
Warrior Automation Services
43
Back up Slides
44
Why Use Warrior
• Infrastructure for
common functions for
test-automation
• Error handling, looping
and conditional
execution.
• Unified test cases and
report for all integrated
frameworks
• Keyword driven – allows
users to automate without
scripting
• Parallel automation flow and
keyword development
• Supports Agile by allowing
developers and testers to
provide quick turnaround
testing
• Data-driven configuration
to avoid duplication of
scripts and maximize
reuse
• Suite and project support
without copying and
duplication
• Component tests
developed individually,
reused later in solution
test without script
changes
• End-to-end synchronized
automation of diverse set of
components
• Easily integrate into any
framework that a component
already uses
• Flexibility to support future
solutions quickly – allow for
easy introduction of
tools/test libraries/processes
SOLUTIONS
EFFICIENC
Y
FRAMEWO
RK
AGIL
E
45
Warrior Framework
For the End-to-End Automation of Processes
MULTIPLE PROTOCOLS
DEVICE INDEPENDENT
 Supports common protocols,
such as REST, NETCONF, TL1,
CLI, SNMP, etc.
 Can be extended to support
 Support any devices that use
protocols supported by the
framework
 Embedded systems, web
applications, GUIs, CLI
applications, test sets, etc.
 Key words define automation
building blocks
 Key words combinations
define automation flow
 Flow control to support
conditions, looping and
negative scenarios
 Results from one step
determine actions in next
 Drives one or more
SCALABLE MULTI-THREADED
AUTOMATED EXECUTION
DATA DRIVEN
 Accepts input from data
files, previous Warrior
results or from user
 Standard XML, TXT
formats
Result File (in TXT, XML, HTML and Junit formats)
Log Files
Data
WARRIOR FLEXIBLE FRAMEWORK
46
Warrior Framework
MULTIPLE PROTOCOLS
DEVICE INDEPENDENT
 Supports common protocols, such as
REST, NETCONF, TL1, CLI, SNMP, etc.
 Can be extended to support others
 Support any devices that use protocols
supported by the framework
 Embedded systems, web applications,
GUIs, CLI applications, test sets, etc.
 Keywords are the automation building
blocks
 Keywords combinations define
automation flow
 Flow control to support conditions,
looping and negative scenarios
 Results from one step determine actions
in next
 Drives one or more automation units in
sequence and/or in parallel
SCALABLE MULTI-THREADED
AUTOMATED EXECUTION
App Based
 Warrior is an app based platform
 Includes Native apps to simplify use
 Allows for creating user specific workflow
apps
Result Files
Log Files
Data
WARRIOR FRAMEWORK
DATA DRIVEN
 Accepts input from data files,
previous Warrior results or from
user
 Standard xml, json, and txt
formats
Automation
Flow
47
Automation Configuration Example
For Typical Solution-Centric Testing
Keyword and
Data Driven
Automation
Flow
1Finity
Network
Element
Result
File
Log Files
Virtuora
NC
Spirent Test
Set
GUI
Virtuora
NFV
Verify
Flows
Verify GUI
Behavior
Monitor Traffic
1
Warrior
Framework
WireShark
Traffic
Monitor
Initial
Provisionin
g
Start Controller
Start Traffic
2
4
5
3
6
7
Multiple Components Tested Together with Separate Tests and Test Data, but Unified Log Files
Network Equipment
 Fujitsu network elements (1FINITY,
VIRTUORA, FLASHWAVE, FLM)
 Cisco switches and routers
 Juniper switches and routers
 Spirent
 Ixia
 Wireshark
 Any identified in future…
Support Systems
 Jenkins
 JIRA
 Selenium
 Testlink
 CloudShell
Easy Integration
48
Warrior Continuous Improvement
Initially by Fujitsu Internal User Group
Now by the Larger User Community
Time
Improvements
Warrior
Inceptio
n
Fujitsu Continuous
Improvement
Continuous
Improvement by Larger
User Community
Warrior
Open
Sourced
 Warrior Framework developed by Fujitsu
 Approximately 2000 Keywords developed
to date and growing
 Warrior Framework is an open sourced
project
 All users can add enhancements
 Over 30 work items developed and
integrated into Warrior by Fujitsu engineers
Warrior Continuous
Improvements

Weitere ähnliche Inhalte

Was ist angesagt?

Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleBlack Duck by Synopsys
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...Black Duck by Synopsys
 
September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source: September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source: Black Duck by Synopsys
 
Customer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceCustomer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceBlack Duck by Synopsys
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security Rogue Wave Software
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Denim Group
 
Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Black Duck by Synopsys
 
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Denim Group
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...Black Duck by Synopsys
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentBlack Duck by Synopsys
 
The Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and CybersecurityThe Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and CybersecurityBlack Duck by Synopsys
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on GivingBlack Duck by Synopsys
 
Programming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldProgramming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldRogue Wave Software
 
The 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk ManagementThe 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk ManagementBlack Duck by Synopsys
 
Application Asset Management with ThreadFix
 Application Asset Management with ThreadFix Application Asset Management with ThreadFix
Application Asset Management with ThreadFixDenim Group
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCSuman Sourav
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Black Duck by Synopsys
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck by Synopsys
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementTim Mackey
 

Was ist angesagt? (20)

Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
 
September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source: September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source:
 
Customer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceCustomer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to Compliance
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
 
Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security
 
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps Environment
 
The Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and CybersecurityThe Intersection Between Open Source and Cybersecurity
The Intersection Between Open Source and Cybersecurity
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on Giving
 
Programming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldProgramming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT world
 
The 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk ManagementThe 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk Management
 
Application Asset Management with ThreadFix
 Application Asset Management with ThreadFix Application Asset Management with ThreadFix
Application Asset Management with ThreadFix
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLC
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open Source
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
 

Ähnlich wie Making the Strategic Shift to Open Source @ Fujitsu Network Communication

2022.06 Community Update.pdf
2022.06 Community Update.pdf2022.06 Community Update.pdf
2022.06 Community Update.pdfDiana Gray, MBA
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverableSarmad Ibrahim
 
Overcoming software development challenges by using an integrated software fr...
Overcoming software development challenges by using an integrated software fr...Overcoming software development challenges by using an integrated software fr...
Overcoming software development challenges by using an integrated software fr...Design World
 
Coded Automation and Autopilot.pptx
Coded Automation and Autopilot.pptxCoded Automation and Autopilot.pptx
Coded Automation and Autopilot.pptxZellAlfeche
 
IRJET- IoT based Vending Machine with Cashless Payment
IRJET- IoT based Vending Machine with Cashless PaymentIRJET- IoT based Vending Machine with Cashless Payment
IRJET- IoT based Vending Machine with Cashless PaymentIRJET Journal
 
Intro to GitOps with Weave GitOps, Flagger and Linkerd
Intro to GitOps with Weave GitOps, Flagger and LinkerdIntro to GitOps with Weave GitOps, Flagger and Linkerd
Intro to GitOps with Weave GitOps, Flagger and LinkerdWeaveworks
 
Eurotech M2M Building Blocks and Multi-Service Gateway Approach
Eurotech M2M Building Blocks and Multi-Service Gateway ApproachEurotech M2M Building Blocks and Multi-Service Gateway Approach
Eurotech M2M Building Blocks and Multi-Service Gateway ApproachEurotech
 
What’s new in Rational collaborative lifecycle management 2011?
What’s new in Rational collaborative lifecycle management 2011?What’s new in Rational collaborative lifecycle management 2011?
What’s new in Rational collaborative lifecycle management 2011?IBM Danmark
 
MIPI DevCon 2016: Effective Verification of Stacked and Layered Protocols
MIPI DevCon 2016: Effective Verification of Stacked and Layered ProtocolsMIPI DevCon 2016: Effective Verification of Stacked and Layered Protocols
MIPI DevCon 2016: Effective Verification of Stacked and Layered ProtocolsMIPI Alliance
 
Designing a Motion-Control System…Software in 2015 Makes It Easy
Designing a Motion-Control System…Software in 2015 Makes It EasyDesigning a Motion-Control System…Software in 2015 Makes It Easy
Designing a Motion-Control System…Software in 2015 Makes It EasyDesign World
 
What's New in IBM Streams V4.2
What's New in IBM Streams V4.2What's New in IBM Streams V4.2
What's New in IBM Streams V4.2lisanl
 
Generative AI Application Development using LangChain and LangFlow
Generative AI Application Development using LangChain and LangFlowGenerative AI Application Development using LangChain and LangFlow
Generative AI Application Development using LangChain and LangFlowGene Leybzon
 
OCF/IoTivity for Healthcare/Fitness/Wearable
OCF/IoTivity for Healthcare/Fitness/WearableOCF/IoTivity for Healthcare/Fitness/Wearable
OCF/IoTivity for Healthcare/Fitness/WearableJonathan Jeon
 
Web Service Test Automation Framework (WSTAF).
Web Service Test Automation Framework (WSTAF).Web Service Test Automation Framework (WSTAF).
Web Service Test Automation Framework (WSTAF).Mindtree Ltd.
 
Panther Sniffer for DQMH®.pptx
Panther Sniffer for DQMH®.pptxPanther Sniffer for DQMH®.pptx
Panther Sniffer for DQMH®.pptxEnriqueNo2
 
Yokogawa VigilantPlant Solutions Partner
Yokogawa VigilantPlant Solutions PartnerYokogawa VigilantPlant Solutions Partner
Yokogawa VigilantPlant Solutions PartnerClassic Controls, Inc.
 
Utilisation de la plateforme virtuelle QEMU/SystemC pour l'IoT
Utilisation de la plateforme virtuelle QEMU/SystemC pour l'IoTUtilisation de la plateforme virtuelle QEMU/SystemC pour l'IoT
Utilisation de la plateforme virtuelle QEMU/SystemC pour l'IoTPôle Systematic Paris-Region
 

Ähnlich wie Making the Strategic Shift to Open Source @ Fujitsu Network Communication (20)

2022.06 Community Update.pdf
2022.06 Community Update.pdf2022.06 Community Update.pdf
2022.06 Community Update.pdf
 
2022.06 Community Update.pdf
2022.06 Community Update.pdf2022.06 Community Update.pdf
2022.06 Community Update.pdf
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverable
 
Overcoming software development challenges by using an integrated software fr...
Overcoming software development challenges by using an integrated software fr...Overcoming software development challenges by using an integrated software fr...
Overcoming software development challenges by using an integrated software fr...
 
Coded Automation and Autopilot.pptx
Coded Automation and Autopilot.pptxCoded Automation and Autopilot.pptx
Coded Automation and Autopilot.pptx
 
IRJET- IoT based Vending Machine with Cashless Payment
IRJET- IoT based Vending Machine with Cashless PaymentIRJET- IoT based Vending Machine with Cashless Payment
IRJET- IoT based Vending Machine with Cashless Payment
 
Intro to GitOps with Weave GitOps, Flagger and Linkerd
Intro to GitOps with Weave GitOps, Flagger and LinkerdIntro to GitOps with Weave GitOps, Flagger and Linkerd
Intro to GitOps with Weave GitOps, Flagger and Linkerd
 
Eurotech M2M Building Blocks and Multi-Service Gateway Approach
Eurotech M2M Building Blocks and Multi-Service Gateway ApproachEurotech M2M Building Blocks and Multi-Service Gateway Approach
Eurotech M2M Building Blocks and Multi-Service Gateway Approach
 
What’s new in Rational collaborative lifecycle management 2011?
What’s new in Rational collaborative lifecycle management 2011?What’s new in Rational collaborative lifecycle management 2011?
What’s new in Rational collaborative lifecycle management 2011?
 
MIPI DevCon 2016: Effective Verification of Stacked and Layered Protocols
MIPI DevCon 2016: Effective Verification of Stacked and Layered ProtocolsMIPI DevCon 2016: Effective Verification of Stacked and Layered Protocols
MIPI DevCon 2016: Effective Verification of Stacked and Layered Protocols
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
Designing a Motion-Control System…Software in 2015 Makes It Easy
Designing a Motion-Control System…Software in 2015 Makes It EasyDesigning a Motion-Control System…Software in 2015 Makes It Easy
Designing a Motion-Control System…Software in 2015 Makes It Easy
 
What's New in IBM Streams V4.2
What's New in IBM Streams V4.2What's New in IBM Streams V4.2
What's New in IBM Streams V4.2
 
TANGO Project in a Nutshell Presentation
TANGO Project in a Nutshell PresentationTANGO Project in a Nutshell Presentation
TANGO Project in a Nutshell Presentation
 
Generative AI Application Development using LangChain and LangFlow
Generative AI Application Development using LangChain and LangFlowGenerative AI Application Development using LangChain and LangFlow
Generative AI Application Development using LangChain and LangFlow
 
OCF/IoTivity for Healthcare/Fitness/Wearable
OCF/IoTivity for Healthcare/Fitness/WearableOCF/IoTivity for Healthcare/Fitness/Wearable
OCF/IoTivity for Healthcare/Fitness/Wearable
 
Web Service Test Automation Framework (WSTAF).
Web Service Test Automation Framework (WSTAF).Web Service Test Automation Framework (WSTAF).
Web Service Test Automation Framework (WSTAF).
 
Panther Sniffer for DQMH®.pptx
Panther Sniffer for DQMH®.pptxPanther Sniffer for DQMH®.pptx
Panther Sniffer for DQMH®.pptx
 
Yokogawa VigilantPlant Solutions Partner
Yokogawa VigilantPlant Solutions PartnerYokogawa VigilantPlant Solutions Partner
Yokogawa VigilantPlant Solutions Partner
 
Utilisation de la plateforme virtuelle QEMU/SystemC pour l'IoT
Utilisation de la plateforme virtuelle QEMU/SystemC pour l'IoTUtilisation de la plateforme virtuelle QEMU/SystemC pour l'IoT
Utilisation de la plateforme virtuelle QEMU/SystemC pour l'IoT
 

Mehr von Black Duck by Synopsys

FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubBlack Duck by Synopsys
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...Black Duck by Synopsys
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub Black Duck by Synopsys
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Black Duck by Synopsys
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Black Duck by Synopsys
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Black Duck by Synopsys
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Black Duck by Synopsys
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Black Duck by Synopsys
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Black Duck by Synopsys
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsBlack Duck by Synopsys
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...Black Duck by Synopsys
 

Mehr von Black Duck by Synopsys (20)

FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
 

Kürzlich hochgeladen

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Kürzlich hochgeladen (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Making the Strategic Shift to Open Source @ Fujitsu Network Communication

  • 1. Making the Strategic Shift to Open Source @Fujitsu Network Communication Presented By: Karan Marjara Open Source Process Lead Fujitsu Network Communications
  • 2. Fujitsu Limited About Us Note: All yen figures have been converted to U.S.dollars for convenience only at a uniform rate of US$1=108yen,the approximate closing rate on March 31,2017.  Headquarters: Tokyo, Japan  Established: 1935  President: Tatsuya Tanaka  Principal Business Areas: Technology Solutions Ubiquitous Solutions Device Solutions  Employees: 155,000 worldwide  Revenue: 4,509.6 billion yen (US$41.7 billion)  Operating profit: 128.8 billion yen (US$1,192 million)  R&D Expenses: 173.9 billion yen (Approx. 3.9% of Revenue)  Stock Exchange Listings: Tokyo (Code:6702), Nagoya
  • 3. FNC at a Glance Headquartered in Richardson, Texas Fujitsu Network Communications Inc. (FNC) is an innovator in Connection-Oriented Ethernet and optical transport technologies, and is a market- leading provider of SONET, WDM, and packet optical networking solutions. We also support network operators and enterprise customers of all types and sizes with our vendor-neutral, custom professional service solutions.
  • 7. Why Change ? Open Source Technology (Smarter) Faster Time to Market Cheaper Transparency Royalty Free Freedom to Choose
  • 9.
  • 10. OSS Usage Challenges Copyright 2017 FUJITSU LIMITED Manually searching OSS in the Source Code Maintenance and Monitoring of OSS Operational Challenges (Keeping the old version of OSS) Security Vulnerability
  • 11. Overcome Challenges Started Using BlackDuck Suite ProductsContinuous Training of Developers Auditing the Source Code Regular follow-up with Engineering, Legal and Security OSS Component Approvals
  • 12. FNC’s Open Source Usage Procedure & Policy The procedures/policy designed to facilitate the identification, tracking, and review of OSS used in FNC products in order to insure the terms of the associated OSS license are being met and track OSS packages with well known security vulnerabilities and include procedures to address these vulnerabilities.
  • 13. Circle of Open Source Scan Identify AuditApprove Modify
  • 14.
  • 16.
  • 18. Open ROADM Open ROADM Multi-Source Agreement (MSA), which defines interoperability specifications for Reconfigurable Optical Add/Drop Multiplexers (ROADMs), including the ROADM switches, transponders and pluggable optics. The goal of the MSA is to move away from a traditionally closed ROADM optical transport network and toward a disaggregated open transport network, while allowing for centralized software control
  • 19. Open ROADM - members
  • 21. Warrior Framework Warrior is a generic automation framework that automates software tasks and processes, in addition to functional, performance and solutions testing. Under Apache License 2.0
  • 23. • Permissive • Very well written • Popular Open Source License • Apache v2.0 license provides developers the freedom to use the software for all purpose—to not only distribute it, but also to modify and then distribute the modified versions without concern for royalties.” Why Apache License 2.0
  • 24. Our EVOLUTION Tomorrows Network is not one thing- It is everything It is not one Vendor- It is many Vendors It MUST be OPEN
  • 25.
  • 26. Warrior Framework – Open Source App Based Automation Platform 26
  • 27. 27  Warrior Framework is an open source automation framework designed to enable anyone to automate their testing, processes, and repetitive tasks by simplifying the complex process of building an automation infrastructure.  As a keyword and data driven framework, Warrior’s infrastructure is built to maximize on reusability of built in keywords.  Warrior’s app based platform provides the users with native apps to easily implement their automation needs, while providing the user with the ability to customize their own workflow apps. Warrior Framework – Open Source App Based Automation Platform
  • 28. 28 Warrior Framework – How it all started
  • 29. 29 FNC’s Automation Challenges  Automation to support multiple devices using multiple protocols with the need to add new protocols as new technologies emerge.  Automation must be extensible to support the unknown requirements of future equipment.
  • 30. 30 FNC’s Automation Challenges  Automation to be run on multiple devices at the same time and in sequence on other devices, while taking output results as input to another automation case. Automation
  • 31. 31 FNC’s Automation Challenges  Users of the automation are not programmers but rather users with technical skills using the equipment and protocols manually.
  • 32. 32 The Solution : Warrior Framework
  • 33. 33  Keyword Driven : Warrior keywords are python functions that are designed to achieve a single purpose and be re-usable when possible.  Built In Keywords: Warrior includes hundreds of reusable generic built in keywords. Keywords are grouped together to form steps in a Warrior automation case.  Data Driven : Warrior is built on separating data from the automation logic. This allows users to change their data without any need to change the automation logic. The Solution: Warrior Framework Keyword Keyword Keyword Keyword Keyword Step Step Step Step Step Case
  • 34. 34  Warrior Flow Control:  Data Repository to allow for data sharing among steps, case, suites and projects  Execution Type: Sequential and Parallel  Data Type: Iterative, Custom and Hybrid  Conditional Execution  Error Handling: Next, Abort, Goto  Run Mode : RMT, RUP, RUF  Impact : No or Yes  Looping : Goto  Context : Positive , Negative The Solution: Warrior Framework Projects Suites Cases Steps System 1 System 2 System 3 System 4 System 5 Data File
  • 35. 35 The Solution: Warrior Framework Uses Fujitsu Organically Developed and Proven Warrior Framework Keyword & Data Driven Automation Flow Solution Device 1 Result File Log Files Solution Device 2 Solution Device 3 Solution Device 7 Solution Device 6 Warrior Framework Solution Device 5 Example of Solution-Centric Automation Protocol A Protocol B Protocol C Protocol E Protocol D Protocol F • Python based automation framework • Device independent supporting any automatable device. • Currently supports automation of the following protocols: REST, NETCONF, TL1, CLI, SNMP, web based UI. Extensible to support others. • Allows for execution of automation flows in sequence, in parallel and as a combination of both • Allows to use output from one automation step or flow to be used as input to another or in the decision making of what to do next. • Provides an app based platform that allows users to use apps to create automation without coding knowledge.
  • 36. 36  App Based: Warrior’s UI is an app based platform that provides users with 10 native apps that provide the users a simple way to create their automation cases and organize them into suites, and projects.  Users can execute their automation from within the native apps.  Warrior’s Infrastructure supports creation of user’s own custom apps. The Solution: Warrior Framework
  • 37. 37  Developers will be able to publish their apps and share them on the Wapp store. Users can download apps developed by 3rd party developer to fit their automation needs. Coming Soon: Wapp Store
  • 39. 39 Easily Integrates With Support Systems It’s All Automated 3rd Party SW Jenkins Selenium Jira Testlink Cloudshell Scheduler automatically triggers automation execution at a scheduled time or occurrence of an event Automatically creates a Jira entry (defect) when an unexpected result is detected If Warrior is being executed as a Jira issue, it can also auto update the status of the Jira issue accordingly Automation of WebUI applications Auto update execution results in TestLink’s Test Case Management Automates lab equipment and topology management via Cloudshell integration Warrior automation results in text, XML, HTML and Junit easily integrates with 3rd party tools WARRIOR
  • 40. 40 Warrior Optional Support Tools That Can Be Used as Needed App Base UI Web-based App based UI for all automation development and execution WARHORN Warrior Installation & Setup IRONCLAW XML Validation Tool WARMOCK CLI & Rest Simulation & Validation Tool JENKINS PLUGIN Schedule and Execute Warrior Automation from Jenkins SPHINX Python Documentation
  • 42.
  • 44. 44 Why Use Warrior • Infrastructure for common functions for test-automation • Error handling, looping and conditional execution. • Unified test cases and report for all integrated frameworks • Keyword driven – allows users to automate without scripting • Parallel automation flow and keyword development • Supports Agile by allowing developers and testers to provide quick turnaround testing • Data-driven configuration to avoid duplication of scripts and maximize reuse • Suite and project support without copying and duplication • Component tests developed individually, reused later in solution test without script changes • End-to-end synchronized automation of diverse set of components • Easily integrate into any framework that a component already uses • Flexibility to support future solutions quickly – allow for easy introduction of tools/test libraries/processes SOLUTIONS EFFICIENC Y FRAMEWO RK AGIL E
  • 45. 45 Warrior Framework For the End-to-End Automation of Processes MULTIPLE PROTOCOLS DEVICE INDEPENDENT  Supports common protocols, such as REST, NETCONF, TL1, CLI, SNMP, etc.  Can be extended to support  Support any devices that use protocols supported by the framework  Embedded systems, web applications, GUIs, CLI applications, test sets, etc.  Key words define automation building blocks  Key words combinations define automation flow  Flow control to support conditions, looping and negative scenarios  Results from one step determine actions in next  Drives one or more SCALABLE MULTI-THREADED AUTOMATED EXECUTION DATA DRIVEN  Accepts input from data files, previous Warrior results or from user  Standard XML, TXT formats Result File (in TXT, XML, HTML and Junit formats) Log Files Data WARRIOR FLEXIBLE FRAMEWORK
  • 46. 46 Warrior Framework MULTIPLE PROTOCOLS DEVICE INDEPENDENT  Supports common protocols, such as REST, NETCONF, TL1, CLI, SNMP, etc.  Can be extended to support others  Support any devices that use protocols supported by the framework  Embedded systems, web applications, GUIs, CLI applications, test sets, etc.  Keywords are the automation building blocks  Keywords combinations define automation flow  Flow control to support conditions, looping and negative scenarios  Results from one step determine actions in next  Drives one or more automation units in sequence and/or in parallel SCALABLE MULTI-THREADED AUTOMATED EXECUTION App Based  Warrior is an app based platform  Includes Native apps to simplify use  Allows for creating user specific workflow apps Result Files Log Files Data WARRIOR FRAMEWORK DATA DRIVEN  Accepts input from data files, previous Warrior results or from user  Standard xml, json, and txt formats Automation Flow
  • 47. 47 Automation Configuration Example For Typical Solution-Centric Testing Keyword and Data Driven Automation Flow 1Finity Network Element Result File Log Files Virtuora NC Spirent Test Set GUI Virtuora NFV Verify Flows Verify GUI Behavior Monitor Traffic 1 Warrior Framework WireShark Traffic Monitor Initial Provisionin g Start Controller Start Traffic 2 4 5 3 6 7 Multiple Components Tested Together with Separate Tests and Test Data, but Unified Log Files Network Equipment  Fujitsu network elements (1FINITY, VIRTUORA, FLASHWAVE, FLM)  Cisco switches and routers  Juniper switches and routers  Spirent  Ixia  Wireshark  Any identified in future… Support Systems  Jenkins  JIRA  Selenium  Testlink  CloudShell Easy Integration
  • 48. 48 Warrior Continuous Improvement Initially by Fujitsu Internal User Group Now by the Larger User Community Time Improvements Warrior Inceptio n Fujitsu Continuous Improvement Continuous Improvement by Larger User Community Warrior Open Sourced  Warrior Framework developed by Fujitsu  Approximately 2000 Keywords developed to date and growing  Warrior Framework is an open sourced project  All users can add enhancements  Over 30 work items developed and integrated into Warrior by Fujitsu engineers Warrior Continuous Improvements

Hinweis der Redaktion

  1. More info about Fujitsu: Financial Information http://www.fujitsu.com/global/about/ir/data/ Financial Results Announcements http://www.fujitsu.com/global/about/ir/data/results/
  2. We used to build discrete, purpose built networks A Customer would get us to build the network and it would run for 15 or 20 years. This is no longer the case in our cultural revolution, it is revolutionary what we are doing with our 1FINITY portfolio It can be called revolutionary, more accurately is can be described as Evolutionary. Gone is the 20 year network, that is okay by me, what we have now is the continually changing, adapting and evolving network. The old network can’t keep up with what we are experiencing in technology changes.
  3. Fujitsu improvements Created Python Library for Spirent Test center Converted Test Result file into XML format Created Python library to generate Suite result file using Junit XML format Added support for Category in test cases Supported the impact selection in test suites Added data file support for Test Suites Allowed steps to be inserted in Katana Added Network Driver to Warrior Added Support for SNMP Added Support for NETCONF - 373 1finity Keywords CLI Command Printer SSH login without password prompt Trap stdout to logfiles Added ssh util using Paramiko module Enhanced connect keywords to save pre and post login messages Enabled Ironclaw to handle logsdir, resultsdir, testsuite datafile Created Core Keywords for ssh using paramiko library Supported Nested Keywords in XML results file Made enhancement for the SSH utils to support connections via another host Enhanced data utils to handle variable substitution Disconnected pexpect session and support variable substitution Created libraries for parsing variale config file Added test data response support Added an option to remove ssh host key Added the sftp ,ftp, ping ,traceroute core keywords Added set session_timeout & verify session_timedout core keywords Added DCN OPS core Keywords Modified connect_telnet to accommodate for connection via serial port Created Library and keywords for Ixia test set Training and support of offshore teams