SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
1 © 2016 Black Duck Software, Inc. All Rights Reserved.
Open Source Outlook:
Expected Developments for
2016
2 © 2016 Black Duck Software, Inc. All Rights Reserved.
SPEAKERS
Phil Odence
Vice President & General
Manager
Karen Copenhaver
Partner at Choate Hall & Stewart
Counsel for the Linux Foundation
Mark Radcliffe
Partner at DLA Piper
General Counsel for the Open Source
Initiative (OSI)
3 © 2016 Black Duck Software, Inc. All Rights Reserved.
OPEN SOURCE TRENDS- ALL UP AND TO THE RIGHT
2015
• 95% in mission critical apps
• in every industry
• >30%+ of a typical code base
• >1.5M projects
• Productivity
• Innovation
4 © 2016 Black Duck Software, Inc. All Rights Reserved.
AGENDA
• Emphasis on Compliance
• Enforcement efforts have motivated community-centered compliance
as reflected in:
• SPDX
• OpenChain
• Training
• Principles of Community-Oriented GPL Enforcement
• Open source and application security
• Explosion of company involvement in collaborative projects
• New topics on the horizon
5 © 2016 Black Duck Software, Inc. All Rights Reserved.
INCREASED IMPORTANCE OF COMPLIANCE
• What is so hard?
• Complex License
• Changing technical realities
• Complex products
• Complex supply chains
• Rapid release cycles
• Multi-jurisdictional
• Coordination of software licenses
• Multiple documents
• Presented at different times in the sales cycle to different people with different
authority
• Additional open source licenses
• Conflicting terms
• Complex nature of modern IT and involvement of third parties
means supply chain needs to be managed
6 © 2016 Black Duck Software, Inc. All Rights Reserved.
PROGRESS!
• SPDX adoption continues and use cases expand.
• Open Chain has released a proposed specification and is moving
forward with a fully established project governance.
• The Linux Foundation, the nonprofit organization enabling mass
innovation through open source, today announced the availability
of Open Source Compliance Basics for Developers, a free course
designed to provide software developers with knowledge about
legal and licensing issues for building and using open source
software.
• Principles of Community-Oriented GPL Enforcement released by
SFC.
7 © 2016 Black Duck Software, Inc. All Rights Reserved.
LITIGATION
• Concerns about Copyright Trolls
• Patent Troll – non-practicing entity with the sole focus of using leverage to
extract money from alleged infringers
• Copyright Troll – developer acting outside of community norms to extract
money based on compliance failures
• Open Source “monetizers”
• VMware litigation
8 © 2016 Black Duck Software, Inc. All Rights Reserved.
ORACLE VS GOOGLE: COPYRIGHT IN JAVA API
• Litigation over use of Java API by Google in Android
• CAFC reverses district court decision in favor of Google
District court: 872 F. Supp.2d 974 (N.D. Cal. 2012);
CAFC: 750 F.3d 1339 (Fed. Cir. 2014), cert. denied, 83
U.S.L.W. 3929 (U.S. June 29, 2015)
• Remanded to district court
• CEOs met on April 15, 2016 and were not able to settle it
• Key issue: Scope of copyright protection for API (note: similar
issue in Hellwig v. VMware litigation)
9 © 2016 Black Duck Software, Inc. All Rights Reserved.
HELLWIG V. VMWARE (WELTE BLOG OVERVIEW
1)
• VMware is alleged to be using arts of the Linux kernel in their
proprietary ESXi product, including the entire SCSI mid-layer,
USB support, radix tree and many, many device drivers.
• Linux is licensed under GNU GPLv2 with a “modification” by
Linus Torvalds
• VMware has modified all the code they took from the Linux kernel
and integrated it into something they call vmklinux.
• VMware has modified their proprietary virtualization OS kernel
vmkernel with specific API/symbol to interact with vmklinux
• vmklinux and vmkernel interaction is uncertain
10 © 2016 Black Duck Software, Inc. All Rights Reserved.
HELLWIG V. VMWARE (WELTE BLOG OVERVIEW
2)
• The judges acknowledged that this case is important and one of
first impression in Germany
• The judges understands that Linux is a collaborative, community-
developed operating system, and that the development process
is incremental and involves many authors.
• The judges understands and acknowledges that much discussion
has occurred about interfaces between different programs or
parts of a program, and that there are a variety of different
definitions and many interpretations of what interfaces are
11 © 2016 Black Duck Software, Inc. All Rights Reserved.
HELLWIG V. VMWARE (WELTE BLOG OVERVIEW
3)
• Judges focused on amount of “copyright” material owned by
Hellwig which is claimed to be incorporated into the VMware
program
• VMware defense is, in part, that it could find very few functions
that could be attributed to Hellwig (less than 1% of the Linux code
used by VMware)
• Are vmkernel and vmklinux one of the following from a copyright
point of view:
• Separate programs / works
• One program / work
12 © 2016 Black Duck Software, Inc. All Rights Reserved.
LEGACY OF VERSATA
• Focus on hybrid product licensing: getting licensing correct and
avoiding the Versata problem
• Will terminated licensees regularly raise the defense of “integration” with
GPLv2 licensed code?
• Will warranty claims against licensors arise from poorly drafted licenses
become common?
13 © 2016 Black Duck Software, Inc. All Rights Reserved.
LF COLLABORATIVE PROJECTS LAUNCHED IN 2015
14 © 2016 Black Duck Software, Inc. All Rights Reserved.
TORT LIABILITY FOR SOFTWARE
• “Broadly speaking, a tort is a civil wrong, other than a breach of
contract, for which the court will provide a remedy in the form of
an action for damages.”
• Theories
• Negligence
• Strict liability
• Manufacturing defect
• Design defect
• Inadequate warning
• Limits: Economic loss doctrine, limited to personal damages and
property damages (no lost profits)
15 © 2016 Black Duck Software, Inc. All Rights Reserved.
NEGLIGENCE THEORY
• § 282. Negligence Defined
• In the Restatement of this Subject, negligence is conduct which falls below
the standard established by law for the protection of others against
unreasonable risk of harm. It does not include conduct recklessly
disregardful of an interest of others.
• § 285. How Standard of Conduct is Determined.
• The standard of conduct of a reasonable man may be established by a
legislative enactment or administrative regulation which so provides, or
adopted by the court from a legislative enactment or an administrative
regulation which does not so provide, or established by judicial decision, or
applied to the facts of the case by the trial judge or the jury, if there is no such
enactment, regulation, or decision.
16 © 2016 Black Duck Software, Inc. All Rights Reserved.
STRICT LIABILITY IN TORT
• § 402A. Special Liability of a Seller of Product for Physical
Harm to User or Consumer.
• A product is defective when, at the time of sale or distribution, it contains a
manufacturing defect, is defective in design, or is defective because of
inadequate instructions or warnings. A Product:
• contains a manufacturing defect when the product departs from its intended
design even though all possible care was exercised in the preparation and
marketing of the product;
• is defective in design when the foreseeable risks of harm posed by the product
could have been reduced or avoided by the adoption of a reasonable alternative
design by the seller or other distributor, or a predecessor in the commercial chain
of distribution, and the omission of the alternative design renders the product not
reasonably safe;
• is defective because of inadequate instructions or warnings when the foreseeable
risks of harm posed by the product could have been reduced or avoided by the
provision of reasonable instructions or warnings by the seller or other distributor,
or a predecessor in the commercial chain of distribution, and the omission of the
instructions or warnings renders the product not reasonably safe.
17 © 2016 Black Duck Software, Inc. All Rights Reserved.
CHALLENGES TO APPLICATION OF TORT TO SOFTWARE
• Negligence
• Lack of reasonable man
• Proof of causation
• Substantial factor
• Strict Liability
• Limited to certain types of products
• Policy decision by courts
• ALM: Court’s reluctance to impose liability on products that cannot be
manufactured “perfectly”
18 © 2016 Black Duck Software, Inc. All Rights Reserved.
DECISIONS
• Little coherence
• Winter v. Putnam (1991)
• Dicta, not decision: Computer software should be subject to strict liability in
tort
• Toyota MDL Litigation for Unintended Acceleration
• Complex causation issues
• Software development procedures
• Hou-tex v. Landmark Graphics
• Defective software due to failure to update but no liability because it mistaken
well was “economic loss”
19 © 2016 Black Duck Software, Inc. All Rights Reserved.
SECURITY FUNDAMENTALS
• Know what code you are using
• In your operations
• Know what code you are delivering to your customers
• Use quality code
• It is not the license
• It is the community
• Core Infrastructure Initiative
• Apply all available security patches immediately
• Upstream your modifications
• Consume tested code
20 © 2016 Black Duck Software, Inc. All Rights Reserved.
INCREASING NUMBER OF OSS VULNERABILITIES
Reference: Black Duck Software knowledgebase, NVD, VulnDB
0
500
1000
1500
2000
2500
3000
3500
2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015
Open Source Vulnerabilities Reported Per Year
21 © 2016 Black Duck Software, Inc. All Rights Reserved.
COMPUTER AUTHORSHIP OF SOFTWARE
22 © 2016 Black Duck Software, Inc. All Rights Reserved.
WHO IS AN AUTHOR?
• Facts: Monkey uses camera to take selfies: Naruto (PETA) vs
David John Slater (January 26, 2016, N.D. Cal.)
• Rely on the statute and case law
• Statute does not determine
• Case law refers to “humans beings” and persons”
• Compendium of U.S. Copyright Office Practices (2014)
• [t]o qualify as a work of `authorship' a work must be created by a human
being. Works that do not satisfy this requirement are not copyrightable
• Similarly, the Office will not register works produced by a machine or mere
mechanical process that operates randomly or automatically without any
creative input or intervention from a human author.
23 © 2016 Black Duck Software, Inc. All Rights Reserved.
HISTORY OF COMPUTERS AS AUTHORS
• Raised by Register of Copyright in 1965
• CONTU Report (review of certain issues in 1976 Act):
• "On the basis of its investigations and society's experience with the
computer, the Commission believes that there is no reasonable basis for
considering that a computer in any way contributes authorship to a work
produced through its use”
• Rationale (Professor Samuelson)
• The system has allocated rights only to humans for a very good reason: it
simply does not make any sense to allocate intellectual property rights to
machines because they do not need to be given incentives to generate
output.
24 © 2016 Black Duck Software, Inc. All Rights Reserved.
ANDROID & EU
• 2015 Announcement of Investigation
• 2016 (April 20, 2016) Announcement of charges by Margrethe Vestager
• http://europa.eu/rapid/press-release_MEMO-16-1484_en.htm
• Pre-installed apps: The Commission's investigation showed that Google obliges
manufacturers, who wish to pre-install Google's app store for Android, Play Store, on
their devices, to also pre-install Google Search, and set it as the default search
provider on those devices. In addition, manufacturers who wish to pre-install Google's
Play Store or Search, also have to pre-install Google's Chrome browser. Thereby,
Google has ensured that Google Search and Google Chrome are pre-installed on
the significant majority of devices sold in the EEA.
• Anti-fragmentation :if a manufacturer wishes to pre-install Google proprietary apps,
including Google Play Store and Google Search, on any of its devices, Google requires
it to enter into an "Anti-Fragmentation Agreement" that commits it not to sell devices
running on Android forks.
• Exclusivity: Google has granted significant financial incentives to some of the
largest smartphone and tablet manufacturers as well as mobile network
operators on condition that they exclusively pre-install Google Search on
their devices
25 © 2016 Black Duck Software, Inc. All Rights Reserved.
STRATEGY FOR FOSS ENGAGEMENT
• Tighten compliance
• Work on simple issues such as notices, license text, written offer and source
code offer
• Work on compliance by supply chain vendors
• Become better FOSS community members (and be seen to be
better members):
• contribute code to projects
• be visible and approachable
• participate in events and conferences
• share knowledge
• most importantly: help shape and reinforce community norms and
expectations on compliance
26 © 2016 Black Duck Software, Inc. All Rights Reserved.
SUMMARY FOR SOFTWARE DISTRIBUTORS
• Understand what FOSS is included in your products.
• Develop a FOSS use (and management) policy to ensure that
you understand your obligations and can comply with them (for
an overview of FOSS and FOSS governance see
https://www.blackducksoftware.com/resources/webinar/introducti
on-open-source-software-and-licensing).
• Review your distribution agreements to ensure that they take into
account any terms imposed by FOSS in your product and modify
those terms as appropriate.
27 © 2016 Black Duck Software, Inc. All Rights Reserved.
QUESTIONS?
Follow us!

Weitere ähnliche Inhalte

Was ist angesagt?

5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...
5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...
5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...Black Duck by Synopsys
 
Open Source as an Element of Corporate Strategy
Open Source as an Element of Corporate StrategyOpen Source as an Element of Corporate Strategy
Open Source as an Element of Corporate StrategyBlack Duck by Synopsys
 
Application Security in the Age of Open Source
Application Security in the Age of Open SourceApplication Security in the Age of Open Source
Application Security in the Age of Open SourceBlack Duck by Synopsys
 
2014 Future of Open Source Survey Results
2014 Future of Open Source Survey Results2014 Future of Open Source Survey Results
2014 Future of Open Source Survey ResultsBlack Duck by Synopsys
 
A question of trust - understanding Open Source risks
A question of trust - understanding Open Source risksA question of trust - understanding Open Source risks
A question of trust - understanding Open Source risksTim Mackey
 
A "Firewall" for Bad Binaries
A "Firewall" for Bad BinariesA "Firewall" for Bad Binaries
A "Firewall" for Bad BinariesSonatype
 
Supply Chain Solutions for Modern Software Development
Supply Chain Solutions for Modern Software DevelopmentSupply Chain Solutions for Modern Software Development
Supply Chain Solutions for Modern Software DevelopmentSonatype
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleRogue Wave Software
 
Accelerating Innovation with Software Supply Chain Management
Accelerating Innovation with Software Supply Chain ManagementAccelerating Innovation with Software Supply Chain Management
Accelerating Innovation with Software Supply Chain ManagementSonatype
 
How enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceHow enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceRogue Wave Software
 
Empowering Financial Institutions to Use Open Source With Confidence
Empowering Financial Institutions to Use Open Source With ConfidenceEmpowering Financial Institutions to Use Open Source With Confidence
Empowering Financial Institutions to Use Open Source With ConfidenceWhiteSource
 
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...Black Duck by Synopsys
 
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour... The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...WhiteSource
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOpsBlack Duck by Synopsys
 
The State of Open Source Vulnerabilities - A WhiteSource Webinar
The State of Open Source Vulnerabilities - A WhiteSource WebinarThe State of Open Source Vulnerabilities - A WhiteSource Webinar
The State of Open Source Vulnerabilities - A WhiteSource WebinarWhiteSource
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Synopsys Software Integrity Group
 
The State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities ManagementThe State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities ManagementWhiteSource
 

Was ist angesagt? (20)

5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...
5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...
5 Steps to Ensuring Compliance in the Software Supply Chain: The Harman Case ...
 
Open Source as an Element of Corporate Strategy
Open Source as an Element of Corporate StrategyOpen Source as an Element of Corporate Strategy
Open Source as an Element of Corporate Strategy
 
Application Security in the Age of Open Source
Application Security in the Age of Open SourceApplication Security in the Age of Open Source
Application Security in the Age of Open Source
 
2014 Future of Open Source Survey Results
2014 Future of Open Source Survey Results2014 Future of Open Source Survey Results
2014 Future of Open Source Survey Results
 
A question of trust - understanding Open Source risks
A question of trust - understanding Open Source risksA question of trust - understanding Open Source risks
A question of trust - understanding Open Source risks
 
A "Firewall" for Bad Binaries
A "Firewall" for Bad BinariesA "Firewall" for Bad Binaries
A "Firewall" for Bad Binaries
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 
Supply Chain Solutions for Modern Software Development
Supply Chain Solutions for Modern Software DevelopmentSupply Chain Solutions for Modern Software Development
Supply Chain Solutions for Modern Software Development
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
 
Webinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilitiesWebinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilities
 
Accelerating Innovation with Software Supply Chain Management
Accelerating Innovation with Software Supply Chain ManagementAccelerating Innovation with Software Supply Chain Management
Accelerating Innovation with Software Supply Chain Management
 
How enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceHow enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open source
 
Empowering Financial Institutions to Use Open Source With Confidence
Empowering Financial Institutions to Use Open Source With ConfidenceEmpowering Financial Institutions to Use Open Source With Confidence
Empowering Financial Institutions to Use Open Source With Confidence
 
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...
The New Development Organization: Embracing “Open” and “Sharing” to Deliver S...
 
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour... The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
The State of Open Source Vulnerabilities - A WhiteSource Webinar
The State of Open Source Vulnerabilities - A WhiteSource WebinarThe State of Open Source Vulnerabilities - A WhiteSource Webinar
The State of Open Source Vulnerabilities - A WhiteSource Webinar
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What?
 
The State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities ManagementThe State of Open Source Vulnerabilities Management
The State of Open Source Vulnerabilities Management
 

Andere mochten auch

Open Source Software Licenses
Open Source Software LicensesOpen Source Software Licenses
Open Source Software LicensesBananaIP Counsels
 
Open source software and open innovation
Open source software and open innovationOpen source software and open innovation
Open source software and open innovationHiro Yoshioka
 
Understanding Open Source
Understanding Open SourceUnderstanding Open Source
Understanding Open SourceJody Garnett
 
Results Evaluation Mocktails 2015
Results Evaluation Mocktails 2015Results Evaluation Mocktails 2015
Results Evaluation Mocktails 2015Dianova
 
SPLINFANTCOLLECTIONPPT
SPLINFANTCOLLECTIONPPTSPLINFANTCOLLECTIONPPT
SPLINFANTCOLLECTIONPPTEmesure Mark
 
Executive-Assistant-Jobs
Executive-Assistant-JobsExecutive-Assistant-Jobs
Executive-Assistant-JobsRalph290Roman
 
Индивидуальное занятие по РРС и ФПСР
Индивидуальное   занятие по  РРС и ФПСРИндивидуальное   занятие по  РРС и ФПСР
Индивидуальное занятие по РРС и ФПСРpreemstvennost
 
Empresa Inserção Floricultura Dianova ISUP A3S 2016
Empresa Inserção Floricultura Dianova ISUP A3S 2016Empresa Inserção Floricultura Dianova ISUP A3S 2016
Empresa Inserção Floricultura Dianova ISUP A3S 2016Dianova
 
Dianova Results Evaluation Mocktails 2016
Dianova Results Evaluation Mocktails 2016Dianova Results Evaluation Mocktails 2016
Dianova Results Evaluation Mocktails 2016Dianova
 
Práctica de Creación de Máquina Virtual con LAMP en Amazon Web Services
Práctica de Creación de Máquina Virtual con LAMP en Amazon Web ServicesPráctica de Creación de Máquina Virtual con LAMP en Amazon Web Services
Práctica de Creación de Máquina Virtual con LAMP en Amazon Web ServicesHéctor Garduño Real
 
(5)perubahan struktur ekonomi
(5)perubahan struktur ekonomi(5)perubahan struktur ekonomi
(5)perubahan struktur ekonomiElisabeth Marina
 
What is beauty? Final Project Dee-Dee-Slideshare
What is beauty? Final Project Dee-Dee-SlideshareWhat is beauty? Final Project Dee-Dee-Slideshare
What is beauty? Final Project Dee-Dee-SlideshareDEEDEENLU
 
Cocktail and mocktail
Cocktail and mocktailCocktail and mocktail
Cocktail and mocktailVarun Rathore
 
Opensource Powerpoint Review.Ppt
Opensource Powerpoint Review.PptOpensource Powerpoint Review.Ppt
Opensource Powerpoint Review.PptViet NguyenHoang
 

Andere mochten auch (18)

Open Source Software Licenses
Open Source Software LicensesOpen Source Software Licenses
Open Source Software Licenses
 
Open source software and open innovation
Open source software and open innovationOpen source software and open innovation
Open source software and open innovation
 
Understanding Open Source
Understanding Open SourceUnderstanding Open Source
Understanding Open Source
 
Problemas de estadistica con spss
Problemas de estadistica con spssProblemas de estadistica con spss
Problemas de estadistica con spss
 
Results Evaluation Mocktails 2015
Results Evaluation Mocktails 2015Results Evaluation Mocktails 2015
Results Evaluation Mocktails 2015
 
SPLINFANTCOLLECTIONPPT
SPLINFANTCOLLECTIONPPTSPLINFANTCOLLECTIONPPT
SPLINFANTCOLLECTIONPPT
 
clustering of user
clustering of userclustering of user
clustering of user
 
Executive-Assistant-Jobs
Executive-Assistant-JobsExecutive-Assistant-Jobs
Executive-Assistant-Jobs
 
Индивидуальное занятие по РРС и ФПСР
Индивидуальное   занятие по  РРС и ФПСРИндивидуальное   занятие по  РРС и ФПСР
Индивидуальное занятие по РРС и ФПСР
 
Empresa Inserção Floricultura Dianova ISUP A3S 2016
Empresa Inserção Floricultura Dianova ISUP A3S 2016Empresa Inserção Floricultura Dianova ISUP A3S 2016
Empresa Inserção Floricultura Dianova ISUP A3S 2016
 
Dianova Results Evaluation Mocktails 2016
Dianova Results Evaluation Mocktails 2016Dianova Results Evaluation Mocktails 2016
Dianova Results Evaluation Mocktails 2016
 
Práctica de Creación de Máquina Virtual con LAMP en Amazon Web Services
Práctica de Creación de Máquina Virtual con LAMP en Amazon Web ServicesPráctica de Creación de Máquina Virtual con LAMP en Amazon Web Services
Práctica de Creación de Máquina Virtual con LAMP en Amazon Web Services
 
(5)perubahan struktur ekonomi
(5)perubahan struktur ekonomi(5)perubahan struktur ekonomi
(5)perubahan struktur ekonomi
 
Presentation3- JC Premiere Compensation Plan
Presentation3- JC Premiere Compensation PlanPresentation3- JC Premiere Compensation Plan
Presentation3- JC Premiere Compensation Plan
 
What is beauty? Final Project Dee-Dee-Slideshare
What is beauty? Final Project Dee-Dee-SlideshareWhat is beauty? Final Project Dee-Dee-Slideshare
What is beauty? Final Project Dee-Dee-Slideshare
 
Análisis del Whitepaper DB4O
Análisis del Whitepaper DB4OAnálisis del Whitepaper DB4O
Análisis del Whitepaper DB4O
 
Cocktail and mocktail
Cocktail and mocktailCocktail and mocktail
Cocktail and mocktail
 
Opensource Powerpoint Review.Ppt
Opensource Powerpoint Review.PptOpensource Powerpoint Review.Ppt
Opensource Powerpoint Review.Ppt
 

Ähnlich wie Open Source Outlook: Expected Developments for 2016

OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015Rogue Wave Software
 
IP and WTP for digital products
IP and WTP for digital productsIP and WTP for digital products
IP and WTP for digital productsMIPLM
 
Identifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developersIdentifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developersRogue Wave Software
 
Understanding Open Source
Understanding Open SourceUnderstanding Open Source
Understanding Open SourceJody Garnett
 
Linux and the Open Source- D Sarkar
Linux and the Open Source- D SarkarLinux and the Open Source- D Sarkar
Linux and the Open Source- D SarkarDipayan Sarkar
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...Paris Open Source Summit
 
The Open-Source Cost Savings Myth
The Open-Source Cost Savings MythThe Open-Source Cost Savings Myth
The Open-Source Cost Savings Myth5 Minute Webinars
 
(Isc)² secure johannesburg
(Isc)² secure johannesburg (Isc)² secure johannesburg
(Isc)² secure johannesburg Tunde Ogunkoya
 
Selecting an Open Source License and Business Model for Your Project to Have ...
Selecting an Open Source License and Business Model for Your Project to Have ...Selecting an Open Source License and Business Model for Your Project to Have ...
Selecting an Open Source License and Business Model for Your Project to Have ...All Things Open
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security Rogue Wave Software
 
Advantages & Disadvantages (Open-Source vs. Proprietary Software)
Advantages & Disadvantages (Open-Source vs. Proprietary Software)Advantages & Disadvantages (Open-Source vs. Proprietary Software)
Advantages & Disadvantages (Open-Source vs. Proprietary Software)Fleurati
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemDenim Group
 
Open Source Software[1]
Open Source Software[1]Open Source Software[1]
Open Source Software[1]amckay1578
 
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Evernym
 
Create a Unified View of Your Application Security Program – Black Duck Hub a...
Create a Unified View of Your Application Security Program – Black Duck Hub a...Create a Unified View of Your Application Security Program – Black Duck Hub a...
Create a Unified View of Your Application Security Program – Black Duck Hub a...Denim Group
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBlack Duck by Synopsys
 
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Executive Leaders Network
 
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care CompanyJourney to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care CompanyAll Things Open
 

Ähnlich wie Open Source Outlook: Expected Developments for 2016 (20)

OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
 
IP and WTP for digital products
IP and WTP for digital productsIP and WTP for digital products
IP and WTP for digital products
 
Identifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developersIdentifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developers
 
Understanding Open Source
Understanding Open SourceUnderstanding Open Source
Understanding Open Source
 
Linux and the Open Source- D Sarkar
Linux and the Open Source- D SarkarLinux and the Open Source- D Sarkar
Linux and the Open Source- D Sarkar
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
 
The Open-Source Cost Savings Myth
The Open-Source Cost Savings MythThe Open-Source Cost Savings Myth
The Open-Source Cost Savings Myth
 
(Isc)² secure johannesburg
(Isc)² secure johannesburg (Isc)² secure johannesburg
(Isc)² secure johannesburg
 
Selecting an Open Source License and Business Model for Your Project to Have ...
Selecting an Open Source License and Business Model for Your Project to Have ...Selecting an Open Source License and Business Model for Your Project to Have ...
Selecting an Open Source License and Business Model for Your Project to Have ...
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 
Advantages & Disadvantages (Open-Source vs. Proprietary Software)
Advantages & Disadvantages (Open-Source vs. Proprietary Software)Advantages & Disadvantages (Open-Source vs. Proprietary Software)
Advantages & Disadvantages (Open-Source vs. Proprietary Software)
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix Ecosystem
 
Open Source Software[1]
Open Source Software[1]Open Source Software[1]
Open Source Software[1]
 
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a Startup
 
Open Source File
Open Source FileOpen Source File
Open Source File
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)
 
Create a Unified View of Your Application Security Program – Black Duck Hub a...
Create a Unified View of Your Application Security Program – Black Duck Hub a...Create a Unified View of Your Application Security Program – Black Duck Hub a...
Create a Unified View of Your Application Security Program – Black Duck Hub a...
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech Contracts
 
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
 
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care CompanyJourney to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
 

Mehr von Black Duck by Synopsys

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubBlack Duck by Synopsys
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...Black Duck by Synopsys
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub Black Duck by Synopsys
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Black Duck by Synopsys
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Black Duck by Synopsys
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Black Duck by Synopsys
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Black Duck by Synopsys
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Black Duck by Synopsys
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Black Duck by Synopsys
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsBlack Duck by Synopsys
 

Mehr von Black Duck by Synopsys (20)

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 

Kürzlich hochgeladen

Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 

Kürzlich hochgeladen (20)

Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 

Open Source Outlook: Expected Developments for 2016

  • 1. 1 © 2016 Black Duck Software, Inc. All Rights Reserved. Open Source Outlook: Expected Developments for 2016
  • 2. 2 © 2016 Black Duck Software, Inc. All Rights Reserved. SPEAKERS Phil Odence Vice President & General Manager Karen Copenhaver Partner at Choate Hall & Stewart Counsel for the Linux Foundation Mark Radcliffe Partner at DLA Piper General Counsel for the Open Source Initiative (OSI)
  • 3. 3 © 2016 Black Duck Software, Inc. All Rights Reserved. OPEN SOURCE TRENDS- ALL UP AND TO THE RIGHT 2015 • 95% in mission critical apps • in every industry • >30%+ of a typical code base • >1.5M projects • Productivity • Innovation
  • 4. 4 © 2016 Black Duck Software, Inc. All Rights Reserved. AGENDA • Emphasis on Compliance • Enforcement efforts have motivated community-centered compliance as reflected in: • SPDX • OpenChain • Training • Principles of Community-Oriented GPL Enforcement • Open source and application security • Explosion of company involvement in collaborative projects • New topics on the horizon
  • 5. 5 © 2016 Black Duck Software, Inc. All Rights Reserved. INCREASED IMPORTANCE OF COMPLIANCE • What is so hard? • Complex License • Changing technical realities • Complex products • Complex supply chains • Rapid release cycles • Multi-jurisdictional • Coordination of software licenses • Multiple documents • Presented at different times in the sales cycle to different people with different authority • Additional open source licenses • Conflicting terms • Complex nature of modern IT and involvement of third parties means supply chain needs to be managed
  • 6. 6 © 2016 Black Duck Software, Inc. All Rights Reserved. PROGRESS! • SPDX adoption continues and use cases expand. • Open Chain has released a proposed specification and is moving forward with a fully established project governance. • The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced the availability of Open Source Compliance Basics for Developers, a free course designed to provide software developers with knowledge about legal and licensing issues for building and using open source software. • Principles of Community-Oriented GPL Enforcement released by SFC.
  • 7. 7 © 2016 Black Duck Software, Inc. All Rights Reserved. LITIGATION • Concerns about Copyright Trolls • Patent Troll – non-practicing entity with the sole focus of using leverage to extract money from alleged infringers • Copyright Troll – developer acting outside of community norms to extract money based on compliance failures • Open Source “monetizers” • VMware litigation
  • 8. 8 © 2016 Black Duck Software, Inc. All Rights Reserved. ORACLE VS GOOGLE: COPYRIGHT IN JAVA API • Litigation over use of Java API by Google in Android • CAFC reverses district court decision in favor of Google District court: 872 F. Supp.2d 974 (N.D. Cal. 2012); CAFC: 750 F.3d 1339 (Fed. Cir. 2014), cert. denied, 83 U.S.L.W. 3929 (U.S. June 29, 2015) • Remanded to district court • CEOs met on April 15, 2016 and were not able to settle it • Key issue: Scope of copyright protection for API (note: similar issue in Hellwig v. VMware litigation)
  • 9. 9 © 2016 Black Duck Software, Inc. All Rights Reserved. HELLWIG V. VMWARE (WELTE BLOG OVERVIEW 1) • VMware is alleged to be using arts of the Linux kernel in their proprietary ESXi product, including the entire SCSI mid-layer, USB support, radix tree and many, many device drivers. • Linux is licensed under GNU GPLv2 with a “modification” by Linus Torvalds • VMware has modified all the code they took from the Linux kernel and integrated it into something they call vmklinux. • VMware has modified their proprietary virtualization OS kernel vmkernel with specific API/symbol to interact with vmklinux • vmklinux and vmkernel interaction is uncertain
  • 10. 10 © 2016 Black Duck Software, Inc. All Rights Reserved. HELLWIG V. VMWARE (WELTE BLOG OVERVIEW 2) • The judges acknowledged that this case is important and one of first impression in Germany • The judges understands that Linux is a collaborative, community- developed operating system, and that the development process is incremental and involves many authors. • The judges understands and acknowledges that much discussion has occurred about interfaces between different programs or parts of a program, and that there are a variety of different definitions and many interpretations of what interfaces are
  • 11. 11 © 2016 Black Duck Software, Inc. All Rights Reserved. HELLWIG V. VMWARE (WELTE BLOG OVERVIEW 3) • Judges focused on amount of “copyright” material owned by Hellwig which is claimed to be incorporated into the VMware program • VMware defense is, in part, that it could find very few functions that could be attributed to Hellwig (less than 1% of the Linux code used by VMware) • Are vmkernel and vmklinux one of the following from a copyright point of view: • Separate programs / works • One program / work
  • 12. 12 © 2016 Black Duck Software, Inc. All Rights Reserved. LEGACY OF VERSATA • Focus on hybrid product licensing: getting licensing correct and avoiding the Versata problem • Will terminated licensees regularly raise the defense of “integration” with GPLv2 licensed code? • Will warranty claims against licensors arise from poorly drafted licenses become common?
  • 13. 13 © 2016 Black Duck Software, Inc. All Rights Reserved. LF COLLABORATIVE PROJECTS LAUNCHED IN 2015
  • 14. 14 © 2016 Black Duck Software, Inc. All Rights Reserved. TORT LIABILITY FOR SOFTWARE • “Broadly speaking, a tort is a civil wrong, other than a breach of contract, for which the court will provide a remedy in the form of an action for damages.” • Theories • Negligence • Strict liability • Manufacturing defect • Design defect • Inadequate warning • Limits: Economic loss doctrine, limited to personal damages and property damages (no lost profits)
  • 15. 15 © 2016 Black Duck Software, Inc. All Rights Reserved. NEGLIGENCE THEORY • § 282. Negligence Defined • In the Restatement of this Subject, negligence is conduct which falls below the standard established by law for the protection of others against unreasonable risk of harm. It does not include conduct recklessly disregardful of an interest of others. • § 285. How Standard of Conduct is Determined. • The standard of conduct of a reasonable man may be established by a legislative enactment or administrative regulation which so provides, or adopted by the court from a legislative enactment or an administrative regulation which does not so provide, or established by judicial decision, or applied to the facts of the case by the trial judge or the jury, if there is no such enactment, regulation, or decision.
  • 16. 16 © 2016 Black Duck Software, Inc. All Rights Reserved. STRICT LIABILITY IN TORT • § 402A. Special Liability of a Seller of Product for Physical Harm to User or Consumer. • A product is defective when, at the time of sale or distribution, it contains a manufacturing defect, is defective in design, or is defective because of inadequate instructions or warnings. A Product: • contains a manufacturing defect when the product departs from its intended design even though all possible care was exercised in the preparation and marketing of the product; • is defective in design when the foreseeable risks of harm posed by the product could have been reduced or avoided by the adoption of a reasonable alternative design by the seller or other distributor, or a predecessor in the commercial chain of distribution, and the omission of the alternative design renders the product not reasonably safe; • is defective because of inadequate instructions or warnings when the foreseeable risks of harm posed by the product could have been reduced or avoided by the provision of reasonable instructions or warnings by the seller or other distributor, or a predecessor in the commercial chain of distribution, and the omission of the instructions or warnings renders the product not reasonably safe.
  • 17. 17 © 2016 Black Duck Software, Inc. All Rights Reserved. CHALLENGES TO APPLICATION OF TORT TO SOFTWARE • Negligence • Lack of reasonable man • Proof of causation • Substantial factor • Strict Liability • Limited to certain types of products • Policy decision by courts • ALM: Court’s reluctance to impose liability on products that cannot be manufactured “perfectly”
  • 18. 18 © 2016 Black Duck Software, Inc. All Rights Reserved. DECISIONS • Little coherence • Winter v. Putnam (1991) • Dicta, not decision: Computer software should be subject to strict liability in tort • Toyota MDL Litigation for Unintended Acceleration • Complex causation issues • Software development procedures • Hou-tex v. Landmark Graphics • Defective software due to failure to update but no liability because it mistaken well was “economic loss”
  • 19. 19 © 2016 Black Duck Software, Inc. All Rights Reserved. SECURITY FUNDAMENTALS • Know what code you are using • In your operations • Know what code you are delivering to your customers • Use quality code • It is not the license • It is the community • Core Infrastructure Initiative • Apply all available security patches immediately • Upstream your modifications • Consume tested code
  • 20. 20 © 2016 Black Duck Software, Inc. All Rights Reserved. INCREASING NUMBER OF OSS VULNERABILITIES Reference: Black Duck Software knowledgebase, NVD, VulnDB 0 500 1000 1500 2000 2500 3000 3500 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 Open Source Vulnerabilities Reported Per Year
  • 21. 21 © 2016 Black Duck Software, Inc. All Rights Reserved. COMPUTER AUTHORSHIP OF SOFTWARE
  • 22. 22 © 2016 Black Duck Software, Inc. All Rights Reserved. WHO IS AN AUTHOR? • Facts: Monkey uses camera to take selfies: Naruto (PETA) vs David John Slater (January 26, 2016, N.D. Cal.) • Rely on the statute and case law • Statute does not determine • Case law refers to “humans beings” and persons” • Compendium of U.S. Copyright Office Practices (2014) • [t]o qualify as a work of `authorship' a work must be created by a human being. Works that do not satisfy this requirement are not copyrightable • Similarly, the Office will not register works produced by a machine or mere mechanical process that operates randomly or automatically without any creative input or intervention from a human author.
  • 23. 23 © 2016 Black Duck Software, Inc. All Rights Reserved. HISTORY OF COMPUTERS AS AUTHORS • Raised by Register of Copyright in 1965 • CONTU Report (review of certain issues in 1976 Act): • "On the basis of its investigations and society's experience with the computer, the Commission believes that there is no reasonable basis for considering that a computer in any way contributes authorship to a work produced through its use” • Rationale (Professor Samuelson) • The system has allocated rights only to humans for a very good reason: it simply does not make any sense to allocate intellectual property rights to machines because they do not need to be given incentives to generate output.
  • 24. 24 © 2016 Black Duck Software, Inc. All Rights Reserved. ANDROID & EU • 2015 Announcement of Investigation • 2016 (April 20, 2016) Announcement of charges by Margrethe Vestager • http://europa.eu/rapid/press-release_MEMO-16-1484_en.htm • Pre-installed apps: The Commission's investigation showed that Google obliges manufacturers, who wish to pre-install Google's app store for Android, Play Store, on their devices, to also pre-install Google Search, and set it as the default search provider on those devices. In addition, manufacturers who wish to pre-install Google's Play Store or Search, also have to pre-install Google's Chrome browser. Thereby, Google has ensured that Google Search and Google Chrome are pre-installed on the significant majority of devices sold in the EEA. • Anti-fragmentation :if a manufacturer wishes to pre-install Google proprietary apps, including Google Play Store and Google Search, on any of its devices, Google requires it to enter into an "Anti-Fragmentation Agreement" that commits it not to sell devices running on Android forks. • Exclusivity: Google has granted significant financial incentives to some of the largest smartphone and tablet manufacturers as well as mobile network operators on condition that they exclusively pre-install Google Search on their devices
  • 25. 25 © 2016 Black Duck Software, Inc. All Rights Reserved. STRATEGY FOR FOSS ENGAGEMENT • Tighten compliance • Work on simple issues such as notices, license text, written offer and source code offer • Work on compliance by supply chain vendors • Become better FOSS community members (and be seen to be better members): • contribute code to projects • be visible and approachable • participate in events and conferences • share knowledge • most importantly: help shape and reinforce community norms and expectations on compliance
  • 26. 26 © 2016 Black Duck Software, Inc. All Rights Reserved. SUMMARY FOR SOFTWARE DISTRIBUTORS • Understand what FOSS is included in your products. • Develop a FOSS use (and management) policy to ensure that you understand your obligations and can comply with them (for an overview of FOSS and FOSS governance see https://www.blackducksoftware.com/resources/webinar/introducti on-open-source-software-and-licensing). • Review your distribution agreements to ensure that they take into account any terms imposed by FOSS in your product and modify those terms as appropriate.
  • 27. 27 © 2016 Black Duck Software, Inc. All Rights Reserved. QUESTIONS? Follow us!