SlideShare a Scribd company logo
1 of 35
1© 2016 Rogue Wave Software, Inc. All Rights Reserved. 1
Top open source lessons
for every enterprise
Episode 2:
When is free not free: The true costs of
open source
2© 2016 Rogue Wave Software, Inc. All Rights Reserved. 2
Richard Sherrard
Director of product management
Presenter
Rogue Wave Software
3© 2016 Rogue Wave Software, Inc. All Rights Reserved. 3
Poll #1
What percentage of your mission critical software is open source?
A: 0 to 25%
B: 26 to 50%
C: 51 to 75%
D: 75%
4© 2016 Rogue Wave Software, Inc. All Rights Reserved. 4
Agenda
1. An explosion of open source
2. Real cost of open source
3. Managing the risk
4. Summary
5. Q&A
5© 2016 Rogue Wave Software, Inc. All Rights Reserved. 5
An explosion of
open source
6© 2016 Rogue Wave Software, Inc. All Rights Reserved. 6
Open source evolution
OSS in the enterprise
1980’s
Freeware/
shareware
BBS
GPL
Unaware
1990’s
“Open source”
Apache,
Tomcat,
JBoss
PHP, Python,
Ruby
Linux
Early tests
2000’s
FUD
OSS company
explosion
Insurance
plays
Git
Android
Keep out!
2010’s
Package
explosion
GitHub
ascension
Full speed
OSS adoption
Docker
Swift
Adoption
2016
“OSS first”
policies
CentOS in
enterprise
Cloud OSS
Cognitive
computing
Ubiquitous
7© 2016 Rogue Wave Software, Inc. All Rights Reserved. 7
Innovation drives open source adoption
 Open source components provide critical functionality
 Improves developer productivity
No license fees
 “More eyes” can improve quality & security as long as static
and dynamic analysis are also used
Leveraged development effort
 Apache, Tomcat, Wildfly, Jakarta Commons, jQuery
 Communities continuously improve features
Mature, commoditized applications and libraries
Community peer review
8© 2016 Rogue Wave Software, Inc. All Rights Reserved. 8
Poll #2
What do you see as the biggest benefit you
get from using open source?
A: Innovation
B: Cost
C: No Vendor Lock-in
D: Quality
E: Security
F: Other
9© 2016 Rogue Wave Software, Inc. All Rights Reserved. 9
Leverage the benefits of OSS
“Open source is the way of the future. Yes,
there will always be software companies
that make money from software; however,
open source is an excellent way to get a
quality product.”
– Andrew Carr, enterprise architect,
in Stack Overflow
"While CIO’s may be wary of OSS, they
realize that using it and contributing to the
open source community attracts bright
young minds, and may lead to kudos for
the organization."
- CIO Magazine
Innovation
Quality
Cost
Security
No vendor
lock-in
10© 2016 Rogue Wave Software, Inc. All Rights Reserved. 10
Growth of open source
Use of open source continues to grow
at an extreme pace
90% of companies use
OSS components in
commercial software
(Gartner)
>80% of a typical Java
application is open-
source components and
frameworks
(TechCrunch)
11 million developers
worldwide make 13
billion open source
requests each year
11© 2016 Rogue Wave Software, Inc. All Rights Reserved. 11
Open source crossed the chasm
99%
of Global 2000 companies are using open
source in mission critical applications
12© 2016 Rogue Wave Software, Inc. All Rights Reserved. 12
Real cost of open source
13© 2016 Rogue Wave Software, Inc. All Rights Reserved. 13
Real cost of open source
Acquisition Implementation Production
Package
choice
Package
configuration
and set up
Production
downtime
Documentation
is sparse or
inaccurate
Unknown
license
obligation or
conflict
Slow
response
from
community
Version
maintenance
Developer
training
14© 2016 Rogue Wave Software, Inc. All Rights Reserved. 14
Acquiring open source
Package selection
Developer skill sets & training
Architecture design
15© 2016 Rogue Wave Software, Inc. All Rights Reserved. 15
Implementing open source
"Unchecked tactical adoption of OSS creates
unmanaged risk and unrealized returns,
and application development professionals should
not tolerate it."
Configuration & setup
License compliance
Documentation
Development issues
16© 2016 Rogue Wave Software, Inc. All Rights Reserved. 16
Open source in production
"The way to think about it is that support is
unbundled (from the software) but widely
available."
Production downtime
Community responsiveness
Version maintenance
17© 2016 Rogue Wave Software, Inc. All Rights Reserved. 17
Poll #3
How do you support your open source today in your organization?
A: Every developer supports themselves
B: Reach out to community for help
C: Internal OSS support team
D: Contracts with commercial support vendor
E: Not sure
18© 2016 Rogue Wave Software, Inc. All Rights Reserved. 18
Risk of OSS
19© 2016 Rogue Wave Software, Inc. All Rights Reserved. 19
Risk of open source
Open source software is “Free as in free speech, not free as in free lunch”
How do you manage OSS risk?
Poor
documentation
Incorrectly
advertised
features
Major security
vulnerabilities
Difficulty attaining
internal
knowledge
When OSS misbehaves in your critical infrastructure, the damage could end up
costing more than commercial solutions
No commercial
support
20© 2016 Rogue Wave Software, Inc. All Rights Reserved. 20
Risk: How open source is different
Navigate complex OSS packages
requiring broad and deep expertise
Who do you call when your “mission-
critical” open source application has an
issue?
Developers have to negotiate wasted
cycles and downtime while waiting for
fixes from the community
No formal training provided on the OSS
package
Developers do not have anyone to help
with risks and development pitfalls
You are dependent upon the OSS
communities to provide you help and
fixes
21© 2016 Rogue Wave Software, Inc. All Rights Reserved. 21
Managing the risk
22© 2016 Rogue Wave Software, Inc. All Rights Reserved. 22
Managing the risk
OSS Maturity state
Past
Didn’t understand OSS
“Don’t worry, it’s free”
Low grade noise on
licensing
Unaware
Present
Security is making
headlines
Licensing lawsuits
Reactive
Intermittent attention
(Un)known unknowns
Experimentation
Near future
More diligence in
supporting production
Visibility into OSS use
Open source
experience is a hiring
attribute
Intentional
23© 2016 Rogue Wave Software, Inc. All Rights Reserved. 23
Do you know
what OSS
you're
using?
Can you
trust what
OSS is in
your
code?
Do you monitor
for security
flaws in your
OSS on an
ongoing basis?
How do you
determine what
legal,
compliance, or
copyright issues
are in your OSS?
Are you
possibly at risk
for unknown
security flaws in
your OSS?
How do you
track your OSS
inventory?
Do you know
where & and how
OSS is being
used throughout
your
organization?
Measuring open source risk
24© 2016 Rogue Wave Software, Inc. All Rights Reserved. 24
Example audit report
Open source Bill of
Material (BOM) License
information Compliance
information
25© 2016 Rogue Wave Software, Inc. All Rights Reserved. 25
Time
Difficulty
Expertise
Integration
Support
Inconsistency Team cost
Slows
response time
Many
tools
Deployment
Traceability
The sources of open source risk
26© 2016 Rogue Wave Software, Inc. All Rights Reserved. 26
Technical risk
Expertise
Support
Team cost
Slows
response time
27© 2016 Rogue Wave Software, Inc. All Rights Reserved. 27
Value of open source support
Support offerings range across the top open source packages.
 Access to enterprise architects ready to support you
 Avoid downtime and wasted cycles
 Navigate complex OSS packages requiring broad and deep expertise
 Mitigate risks and development pitfalls
 Architecture review & performance tuning
 Receive formal, instructor-led training across several OSS packages
 Gain the peace of mind that comes with 24X7 support coverage
28© 2016 Rogue Wave Software, Inc. All Rights Reserved. 28
Poll #4
What do you see as the biggest technical risk of open source?
A: Support
B: Slow response from community
C: Expertise
D: Inconsistence
D: Other?
29© 2016 Rogue Wave Software, Inc. All Rights Reserved. 29
What now?
30© 2016 Rogue Wave Software, Inc. All Rights Reserved. 30
Supporting OSS
Five best practices for supporting OSS:
 Be proactive
 Get smart
 Stay informed
 Keep watch
 Maintain vigilance
Action plan:
 Do an OSS audit so you now exactly where, how, and why OSS is used
 Identify where support is needed and get the expertise
 Pay attention to security updates, patches, and latest versions
31© 2016 Rogue Wave Software, Inc. All Rights Reserved. 31
Q & A
32© 2016 Rogue Wave Software, Inc. All Rights Reserved. 32
Watch on demand
• Watch this webinar on demand
• Read the recap blog to see the results of the
polls and Q&A session
33© 2016 Rogue Wave Software, Inc. All Rights Reserved. 33
Follow up
Free newsletter: vulnerabilities, industry news, and enterprise support stories
openlogic.com/products-services/openlogic-exchange/openupdate
For OpenLogic support customers:
OSS Radio
Get a free OSS support ticket to experience our expertise
roguewave.com/freeticket
34© 2016 Rogue Wave Software, Inc. All Rights Reserved. 34
Stay tuned
Top open source lessons for every enterprise
July 13: Open source applied: Real-world uses
Examine actual field issues, from architecture to production, to better select and use the right
packages.
July 27: Top issues in the top enterprise packages
Dive into specific packages with two architects to discover what goes right and what goes wrong.
35© 2016 Rogue Wave Software, Inc. All Rights Reserved. 35

More Related Content

What's hot

Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Black Duck by Synopsys
 
Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...
Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...
Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...Black Duck by Synopsys
 
Are open source and embedded software development on a collision course?
Are open source and embedded software development on a  collision course?Are open source and embedded software development on a  collision course?
Are open source and embedded software development on a collision course?Rogue Wave Software
 
Running a High-Efficiency, High-Visibility Application Security Program with...
Running a High-Efficiency, High-Visibility Application Security Program with...Running a High-Efficiency, High-Visibility Application Security Program with...
Running a High-Efficiency, High-Visibility Application Security Program with...Denim Group
 
Metasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionMetasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionPaulo R
 
Matteo Meucci Isaca Venice - 2017
Matteo Meucci  Isaca Venice - 2017Matteo Meucci  Isaca Venice - 2017
Matteo Meucci Isaca Venice - 2017Minded Security
 
Shifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and securityShifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and securityNowSecure
 
How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsNowSecure
 
OWASP Overview of Projects You Can Use Today - DefCamp 2012
OWASP Overview of Projects You Can Use Today - DefCamp 2012OWASP Overview of Projects You Can Use Today - DefCamp 2012
OWASP Overview of Projects You Can Use Today - DefCamp 2012DefCamp
 
Software Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity ModelsSoftware Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity ModelsMarco Morana
 
A "Firewall" for Bad Binaries
A "Firewall" for Bad BinariesA "Firewall" for Bad Binaries
A "Firewall" for Bad BinariesSonatype
 
DevSecOps: A New Hope for Security in CI/CD
DevSecOps: A New Hope for Security in CI/CDDevSecOps: A New Hope for Security in CI/CD
DevSecOps: A New Hope for Security in CI/CDFranklin Mosley
 
Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!DevOps.com
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityNowSecure
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareRogue Wave Software
 
Hacker-powered Software Development
Hacker-powered Software Development Hacker-powered Software Development
Hacker-powered Software Development Assembla
 
QA Fest 2019. Ирина Бондарук. Breaking into information security
QA Fest 2019. Ирина Бондарук. Breaking into information securityQA Fest 2019. Ирина Бондарук. Breaking into information security
QA Fest 2019. Ирина Бондарук. Breaking into information securityQAFest
 

What's hot (19)

Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
 
Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...
Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...
Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...
 
Are open source and embedded software development on a collision course?
Are open source and embedded software development on a  collision course?Are open source and embedded software development on a  collision course?
Are open source and embedded software development on a collision course?
 
Running a High-Efficiency, High-Visibility Application Security Program with...
Running a High-Efficiency, High-Visibility Application Security Program with...Running a High-Efficiency, High-Visibility Application Security Program with...
Running a High-Efficiency, High-Visibility Application Security Program with...
 
Metasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd editionMetasploit 5.0 for beginners 2nd edition
Metasploit 5.0 for beginners 2nd edition
 
Matteo Meucci Isaca Venice - 2017
Matteo Meucci  Isaca Venice - 2017Matteo Meucci  Isaca Venice - 2017
Matteo Meucci Isaca Venice - 2017
 
Shifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and securityShifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and security
 
How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’ts
 
Owasp Serbia overview
Owasp Serbia overviewOwasp Serbia overview
Owasp Serbia overview
 
OWASP Overview of Projects You Can Use Today - DefCamp 2012
OWASP Overview of Projects You Can Use Today - DefCamp 2012OWASP Overview of Projects You Can Use Today - DefCamp 2012
OWASP Overview of Projects You Can Use Today - DefCamp 2012
 
Software Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity ModelsSoftware Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity Models
 
A "Firewall" for Bad Binaries
A "Firewall" for Bad BinariesA "Firewall" for Bad Binaries
A "Firewall" for Bad Binaries
 
2014 09-04-pj
2014 09-04-pj2014 09-04-pj
2014 09-04-pj
 
DevSecOps: A New Hope for Security in CI/CD
DevSecOps: A New Hope for Security in CI/CDDevSecOps: A New Hope for Security in CI/CD
DevSecOps: A New Hope for Security in CI/CD
 
Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle software
 
Hacker-powered Software Development
Hacker-powered Software Development Hacker-powered Software Development
Hacker-powered Software Development
 
QA Fest 2019. Ирина Бондарук. Breaking into information security
QA Fest 2019. Ирина Бондарук. Breaking into information securityQA Fest 2019. Ирина Бондарук. Breaking into information security
QA Fest 2019. Ирина Бондарук. Breaking into information security
 

Similar to True Costs of Free Open Source Software

How enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceHow enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceRogue Wave Software
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015Rogue Wave Software
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleRogue Wave Software
 
Identifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developersIdentifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developersRogue Wave Software
 
Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Rogue Wave Software
 
(In)security in Open Source
(In)security in Open Source(In)security in Open Source
(In)security in Open SourceShane Coughlan
 
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour... The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...WhiteSource
 
Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...
Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...
Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...Black Duck by Synopsys
 
Open Source SW Business
Open Source SW Business Open Source SW Business
Open Source SW Business SANGHEE SHIN
 
Adopting Open Source Software Policy: What Advantages and Challenges there ar...
Adopting Open Source Software Policy: What Advantages and Challenges there ar...Adopting Open Source Software Policy: What Advantages and Challenges there ar...
Adopting Open Source Software Policy: What Advantages and Challenges there ar...Sovello Hildebrand
 
Gimme shelter: Tips on protecting proprietary and open source code
Gimme shelter: Tips on protecting proprietary and open source codeGimme shelter: Tips on protecting proprietary and open source code
Gimme shelter: Tips on protecting proprietary and open source codeRogue Wave Software
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOpsBlack Duck by Synopsys
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for DevopsJerika Phelps
 
Economics of Open Source Software
Economics of Open Source SoftwareEconomics of Open Source Software
Economics of Open Source SoftwareRay Toal
 
Rapid software testing and conformance with static code analysis
Rapid software testing and conformance with static code analysisRapid software testing and conformance with static code analysis
Rapid software testing and conformance with static code analysisRogue Wave Software
 
POSS2016Nov16-The Open Source Software Value Chain
POSS2016Nov16-The Open Source Software Value ChainPOSS2016Nov16-The Open Source Software Value Chain
POSS2016Nov16-The Open Source Software Value ChainOW2
 

Similar to True Costs of Free Open Source Software (20)

How enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceHow enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open source
 
Open Source Support
Open Source SupportOpen Source Support
Open Source Support
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
 
Identifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developersIdentifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developers
 
Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization
 
Open Source vs Proprietary
Open Source vs ProprietaryOpen Source vs Proprietary
Open Source vs Proprietary
 
(In)security in Open Source
(In)security in Open Source(In)security in Open Source
(In)security in Open Source
 
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour... The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 
Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...
Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...
Open Source Insight: Global Response to COSRI 2017 Open Source Security and R...
 
Open Source SW Business
Open Source SW Business Open Source SW Business
Open Source SW Business
 
Adopting Open Source Software Policy: What Advantages and Challenges there ar...
Adopting Open Source Software Policy: What Advantages and Challenges there ar...Adopting Open Source Software Policy: What Advantages and Challenges there ar...
Adopting Open Source Software Policy: What Advantages and Challenges there ar...
 
Introduction To Open Source
Introduction To Open SourceIntroduction To Open Source
Introduction To Open Source
 
Gimme shelter: Tips on protecting proprietary and open source code
Gimme shelter: Tips on protecting proprietary and open source codeGimme shelter: Tips on protecting proprietary and open source code
Gimme shelter: Tips on protecting proprietary and open source code
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for Devops
 
Economics of Open Source Software
Economics of Open Source SoftwareEconomics of Open Source Software
Economics of Open Source Software
 
Rapid software testing and conformance with static code analysis
Rapid software testing and conformance with static code analysisRapid software testing and conformance with static code analysis
Rapid software testing and conformance with static code analysis
 
POSS2016Nov16-The Open Source Software Value Chain
POSS2016Nov16-The Open Source Software Value ChainPOSS2016Nov16-The Open Source Software Value Chain
POSS2016Nov16-The Open Source Software Value Chain
 
Pak kiet presentation-24_mar_2005_7
Pak kiet presentation-24_mar_2005_7Pak kiet presentation-24_mar_2005_7
Pak kiet presentation-24_mar_2005_7
 

More from Rogue Wave Software

The Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveThe Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveRogue Wave Software
 
No liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureNo liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureRogue Wave Software
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationRogue Wave Software
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...Rogue Wave Software
 
Adding layers of security to an API in real-time
Adding layers of security to an API in real-timeAdding layers of security to an API in real-time
Adding layers of security to an API in real-timeRogue Wave Software
 
Getting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyGetting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyRogue Wave Software
 
Advanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsAdvanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsRogue Wave Software
 
The forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youThe forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youRogue Wave Software
 
Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Rogue Wave Software
 
5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure successRogue Wave Software
 
PSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliancePSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and complianceRogue Wave Software
 
Java 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureJava 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureRogue Wave Software
 
How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)Rogue Wave Software
 
Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Rogue Wave Software
 
How to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxHow to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxRogue Wave Software
 
Approaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsApproaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsRogue Wave Software
 
Enterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSEnterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSRogue Wave Software
 
Walk through an enterprise Linux migration
Walk through an enterprise Linux migrationWalk through an enterprise Linux migration
Walk through an enterprise Linux migrationRogue Wave Software
 
How to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmHow to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmRogue Wave Software
 
Open source and embedded software development
Open source and embedded software developmentOpen source and embedded software development
Open source and embedded software developmentRogue Wave Software
 

More from Rogue Wave Software (20)

The Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveThe Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data Perspective
 
No liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureNo liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failure
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformation
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...
 
Adding layers of security to an API in real-time
Adding layers of security to an API in real-timeAdding layers of security to an API in real-time
Adding layers of security to an API in real-time
 
Getting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyGetting the most from your API management platform: A case study
Getting the most from your API management platform: A case study
 
Advanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsAdvanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applications
 
The forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youThe forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for you
 
Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices
 
5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success
 
PSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliancePSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliance
 
Java 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureJava 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the future
 
How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)
 
Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)
 
How to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxHow to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to Linux
 
Approaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsApproaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC apps
 
Enterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSEnterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOS
 
Walk through an enterprise Linux migration
Walk through an enterprise Linux migrationWalk through an enterprise Linux migration
Walk through an enterprise Linux migration
 
How to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmHow to keep developers happy and lawyers calm
How to keep developers happy and lawyers calm
 
Open source and embedded software development
Open source and embedded software developmentOpen source and embedded software development
Open source and embedded software development
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

True Costs of Free Open Source Software

  • 1. 1© 2016 Rogue Wave Software, Inc. All Rights Reserved. 1 Top open source lessons for every enterprise Episode 2: When is free not free: The true costs of open source
  • 2. 2© 2016 Rogue Wave Software, Inc. All Rights Reserved. 2 Richard Sherrard Director of product management Presenter Rogue Wave Software
  • 3. 3© 2016 Rogue Wave Software, Inc. All Rights Reserved. 3 Poll #1 What percentage of your mission critical software is open source? A: 0 to 25% B: 26 to 50% C: 51 to 75% D: 75%
  • 4. 4© 2016 Rogue Wave Software, Inc. All Rights Reserved. 4 Agenda 1. An explosion of open source 2. Real cost of open source 3. Managing the risk 4. Summary 5. Q&A
  • 5. 5© 2016 Rogue Wave Software, Inc. All Rights Reserved. 5 An explosion of open source
  • 6. 6© 2016 Rogue Wave Software, Inc. All Rights Reserved. 6 Open source evolution OSS in the enterprise 1980’s Freeware/ shareware BBS GPL Unaware 1990’s “Open source” Apache, Tomcat, JBoss PHP, Python, Ruby Linux Early tests 2000’s FUD OSS company explosion Insurance plays Git Android Keep out! 2010’s Package explosion GitHub ascension Full speed OSS adoption Docker Swift Adoption 2016 “OSS first” policies CentOS in enterprise Cloud OSS Cognitive computing Ubiquitous
  • 7. 7© 2016 Rogue Wave Software, Inc. All Rights Reserved. 7 Innovation drives open source adoption  Open source components provide critical functionality  Improves developer productivity No license fees  “More eyes” can improve quality & security as long as static and dynamic analysis are also used Leveraged development effort  Apache, Tomcat, Wildfly, Jakarta Commons, jQuery  Communities continuously improve features Mature, commoditized applications and libraries Community peer review
  • 8. 8© 2016 Rogue Wave Software, Inc. All Rights Reserved. 8 Poll #2 What do you see as the biggest benefit you get from using open source? A: Innovation B: Cost C: No Vendor Lock-in D: Quality E: Security F: Other
  • 9. 9© 2016 Rogue Wave Software, Inc. All Rights Reserved. 9 Leverage the benefits of OSS “Open source is the way of the future. Yes, there will always be software companies that make money from software; however, open source is an excellent way to get a quality product.” – Andrew Carr, enterprise architect, in Stack Overflow "While CIO’s may be wary of OSS, they realize that using it and contributing to the open source community attracts bright young minds, and may lead to kudos for the organization." - CIO Magazine Innovation Quality Cost Security No vendor lock-in
  • 10. 10© 2016 Rogue Wave Software, Inc. All Rights Reserved. 10 Growth of open source Use of open source continues to grow at an extreme pace 90% of companies use OSS components in commercial software (Gartner) >80% of a typical Java application is open- source components and frameworks (TechCrunch) 11 million developers worldwide make 13 billion open source requests each year
  • 11. 11© 2016 Rogue Wave Software, Inc. All Rights Reserved. 11 Open source crossed the chasm 99% of Global 2000 companies are using open source in mission critical applications
  • 12. 12© 2016 Rogue Wave Software, Inc. All Rights Reserved. 12 Real cost of open source
  • 13. 13© 2016 Rogue Wave Software, Inc. All Rights Reserved. 13 Real cost of open source Acquisition Implementation Production Package choice Package configuration and set up Production downtime Documentation is sparse or inaccurate Unknown license obligation or conflict Slow response from community Version maintenance Developer training
  • 14. 14© 2016 Rogue Wave Software, Inc. All Rights Reserved. 14 Acquiring open source Package selection Developer skill sets & training Architecture design
  • 15. 15© 2016 Rogue Wave Software, Inc. All Rights Reserved. 15 Implementing open source "Unchecked tactical adoption of OSS creates unmanaged risk and unrealized returns, and application development professionals should not tolerate it." Configuration & setup License compliance Documentation Development issues
  • 16. 16© 2016 Rogue Wave Software, Inc. All Rights Reserved. 16 Open source in production "The way to think about it is that support is unbundled (from the software) but widely available." Production downtime Community responsiveness Version maintenance
  • 17. 17© 2016 Rogue Wave Software, Inc. All Rights Reserved. 17 Poll #3 How do you support your open source today in your organization? A: Every developer supports themselves B: Reach out to community for help C: Internal OSS support team D: Contracts with commercial support vendor E: Not sure
  • 18. 18© 2016 Rogue Wave Software, Inc. All Rights Reserved. 18 Risk of OSS
  • 19. 19© 2016 Rogue Wave Software, Inc. All Rights Reserved. 19 Risk of open source Open source software is “Free as in free speech, not free as in free lunch” How do you manage OSS risk? Poor documentation Incorrectly advertised features Major security vulnerabilities Difficulty attaining internal knowledge When OSS misbehaves in your critical infrastructure, the damage could end up costing more than commercial solutions No commercial support
  • 20. 20© 2016 Rogue Wave Software, Inc. All Rights Reserved. 20 Risk: How open source is different Navigate complex OSS packages requiring broad and deep expertise Who do you call when your “mission- critical” open source application has an issue? Developers have to negotiate wasted cycles and downtime while waiting for fixes from the community No formal training provided on the OSS package Developers do not have anyone to help with risks and development pitfalls You are dependent upon the OSS communities to provide you help and fixes
  • 21. 21© 2016 Rogue Wave Software, Inc. All Rights Reserved. 21 Managing the risk
  • 22. 22© 2016 Rogue Wave Software, Inc. All Rights Reserved. 22 Managing the risk OSS Maturity state Past Didn’t understand OSS “Don’t worry, it’s free” Low grade noise on licensing Unaware Present Security is making headlines Licensing lawsuits Reactive Intermittent attention (Un)known unknowns Experimentation Near future More diligence in supporting production Visibility into OSS use Open source experience is a hiring attribute Intentional
  • 23. 23© 2016 Rogue Wave Software, Inc. All Rights Reserved. 23 Do you know what OSS you're using? Can you trust what OSS is in your code? Do you monitor for security flaws in your OSS on an ongoing basis? How do you determine what legal, compliance, or copyright issues are in your OSS? Are you possibly at risk for unknown security flaws in your OSS? How do you track your OSS inventory? Do you know where & and how OSS is being used throughout your organization? Measuring open source risk
  • 24. 24© 2016 Rogue Wave Software, Inc. All Rights Reserved. 24 Example audit report Open source Bill of Material (BOM) License information Compliance information
  • 25. 25© 2016 Rogue Wave Software, Inc. All Rights Reserved. 25 Time Difficulty Expertise Integration Support Inconsistency Team cost Slows response time Many tools Deployment Traceability The sources of open source risk
  • 26. 26© 2016 Rogue Wave Software, Inc. All Rights Reserved. 26 Technical risk Expertise Support Team cost Slows response time
  • 27. 27© 2016 Rogue Wave Software, Inc. All Rights Reserved. 27 Value of open source support Support offerings range across the top open source packages.  Access to enterprise architects ready to support you  Avoid downtime and wasted cycles  Navigate complex OSS packages requiring broad and deep expertise  Mitigate risks and development pitfalls  Architecture review & performance tuning  Receive formal, instructor-led training across several OSS packages  Gain the peace of mind that comes with 24X7 support coverage
  • 28. 28© 2016 Rogue Wave Software, Inc. All Rights Reserved. 28 Poll #4 What do you see as the biggest technical risk of open source? A: Support B: Slow response from community C: Expertise D: Inconsistence D: Other?
  • 29. 29© 2016 Rogue Wave Software, Inc. All Rights Reserved. 29 What now?
  • 30. 30© 2016 Rogue Wave Software, Inc. All Rights Reserved. 30 Supporting OSS Five best practices for supporting OSS:  Be proactive  Get smart  Stay informed  Keep watch  Maintain vigilance Action plan:  Do an OSS audit so you now exactly where, how, and why OSS is used  Identify where support is needed and get the expertise  Pay attention to security updates, patches, and latest versions
  • 31. 31© 2016 Rogue Wave Software, Inc. All Rights Reserved. 31 Q & A
  • 32. 32© 2016 Rogue Wave Software, Inc. All Rights Reserved. 32 Watch on demand • Watch this webinar on demand • Read the recap blog to see the results of the polls and Q&A session
  • 33. 33© 2016 Rogue Wave Software, Inc. All Rights Reserved. 33 Follow up Free newsletter: vulnerabilities, industry news, and enterprise support stories openlogic.com/products-services/openlogic-exchange/openupdate For OpenLogic support customers: OSS Radio Get a free OSS support ticket to experience our expertise roguewave.com/freeticket
  • 34. 34© 2016 Rogue Wave Software, Inc. All Rights Reserved. 34 Stay tuned Top open source lessons for every enterprise July 13: Open source applied: Real-world uses Examine actual field issues, from architecture to production, to better select and use the right packages. July 27: Top issues in the top enterprise packages Dive into specific packages with two architects to discover what goes right and what goes wrong.
  • 35. 35© 2016 Rogue Wave Software, Inc. All Rights Reserved. 35