SlideShare a Scribd company logo
1 of 16
Executive Briefing:
        Four Steps to Creating an Effective
                       Open Source Policy

Greg Olson
Senior Director, OSS Management
Olliance Group
Speaker




                               Greg Olson
               Senior Director, Open Source Management

    Over 30 years of software industry experience
    Managed delivery of over 150 engagements at Olliance Group
    Founder and chairman of Sendmail, one of the first commercial
     open source companies
    VP of Strategy and Business Development, Sybase
    CTO, Britton Lee, Inc.



                            Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.   2
Olliance Group, a Black Duck Company


                                    Leading global FOSS strategy
                                     development, planning, and
                                     implementation firm
                                            –        Business
                                            –        Technology
                                            –        Governance
                                            –        Community

 Ten years, 500+ engagements
 Founder and host of the Open Source Think Tank
  – See thinktank.olliancegroup.com
 Acquired by Black Duck Software – December 2010


                        Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.   3
Agenda

 Why Use Open Source Software?
 How is the use of Open Source best managed?
 The Policy Development Process
 Implementation
 Summary and Conclusions




                      Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.   4
Why Use Open Source Software?

 Best-in-class software in some areas is OSS
 Your product must interoperate with other OSS, e.g. Linux
 Your customers favor or even require OSS
 OSS came with a corporate acquisition
 It is a lower cost alternative to traditional commercial packages
 You will need to customize externally sourced software
 Faster time to market by avoiding development and testing of new code
 Lower development costs by using free, already de-bugged code
 Lower code maintenance costs by taking advantage of community
  maintenance
 Your code-base already contains significant OSS

Sixty-two percent of organizations surveyed indicated that their usage of open source
software in deployed software portfolios would exceed 25 percent in the next 18
months. And a full 17 percent of organizations expect their portfolios to be 50 to 74
percent made up of open source software. in their deployed software portfolios.
                                                                                  Laurie Wurster, Gartner Group, March 2011




                                    Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.                           5
The Open Source Revolution
                                                                 OSS                 OSS             OSS         OSS     OSS    OSS
  Commercial          Commercial
   Software            Software
   Package             Package                                       OSS                    OSS            OSS         OSS     OSS


                            Negotiated                            OSS                 OSS            OSS         OSS     OSS    OSS
                            Procurement


                                                              Download
            Mostly
            Custom
          Development                                                                                  Mostly
                                                                                                     Integration



  This new approach creates new challenges
    –   Higher volume of code acquisition decisions
    –   Maintaining code and version consistency across an organization
    –   Managing support for many external elements
    –   Managing participation in public communities
    –   Insuring license compliance for many elements at distribution time


                                   Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.
Open Source Management

Goal: Manage the complexity and risk inherent in the use of
 open source software without reducing its productivity
 advantages
 What it takes to achieve this goal
   –   Strategy and a clear understanding of objectives at the business level
   –   A Policy
   –   A Governance Process
   –   Ongoing audit and tuning

 Open Source Management works best when it is a natural
  part of the software development process

"Companies must have a policy for procuring OSS, deciding which applications will be supported by
OSS, and identifying the intellectual property risk or supportability risk associated with using OSS.
Once a policy is in place, then there must be a governance process to enforce it."
                                                                        Laurie Wurster, research director at Gartner Group




                                          Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.                    7
What is an OSS Policy?

 A set of rules and guidelines for using and managing
  OSS in your organization

                        An effective OSS policy must
                                – Cover all the essential aspects of
                                  managing OSS
                                – Be succinct and easily understood
                                – Reflect the way software is
                                  developed and delivered in your
                                  company




                       Image CC Fotolia_14119067_M

                       Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.   8
Developing and Open Source Policy

 Step 1: Identify key stakeholders and get their
  commitment
 Step 2: Prepare for discussions
 Step 3: Draft the policy
 Step 4: Review and update the policy




       Identify     Prepare                                  Draft                         Review




                         Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.            9
Step 1: Get Commitment of the Stakeholders

 In most organizations the important stakeholders
  represent the following functions:
  –   Software Architecture
  –   Software Development
  –   QA and/or Release Management
  –   Legal
  –   Product or Line of Business Management

 Organizations with sensitive data may also have a
  Security stakeholder, responsible for the security
  of software
 Getting stakeholder commitment to developing an
  OSS policy is a critical success factor


                           Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.   10
Step 2: Prepare for Discussions

 Establish a shared base of understanding

  – Collect and disseminate information about your
    organization's use and plans for OSS, documents such
    as:
      Existing policies or processes related to OSS
      Inventories of OSS currently used within the organization
      Existing license compliance requirements and or procedures

  – Prepare a clearly articulated strategy for using OSS
      What benefits does the company most want?
      How will the company insure they are realized?




                          Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.   11
Step 3: Draft the Policy

 An OSS Policy is typically developed in a series of interactive
  meetings with the stakeholders
 Many companies have found that using a facilitator with
  experience in OSS policy and its operational implications can
  speed the results
 An OSS policy should address the following elements:
   1.   Program administration and management
   2.   Discovery, acquisition and evaluation
   3.   Review and approval
   4.   Software procurement
   5.   Code and documentation management
   6.   Support and maintenance
   7.   License compliance
   8.   Community participation



                           Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.   12
Step 4: Review and Update the Policy

 Produce a draft policy document
 Circulate for review of the stakeholders
   – Two or three iterations are typical
 Obtain approval of stakeholders and other
  required executives
 Plan to review and update policy at regular
  intervals, typically
   – On completion of initial implementation
   – Annually thereafter




                      Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.   13
Implementation

 Implement the policy through a set of processes
 Good processes facilitate both efficient software
  development and effective OSS management
  – Making it easy to "do the right thing."
 These process must also contain adequate checks to
  make sure that the OSS policy is consistently followed
 Training is a key success factor for OSS Management
  implementations
  – For all participants in the policy and processes
  – Even the best-intentioned individuals cannot follow rules
    and processes they don't know and understand




                         Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.   14
Summary and Conclusions

 There are many compelling reasons to use open source
  software, but this use entails new risks that must be
  managed
 An OSS policy is your primary specification for managing your
  OSS use
 There are four proven steps to developing an OSS Policy
  –   Step   1:   Identify key stakeholders and get their commitment
  –   Step   2:   Prepare for discussions
  –   Step   3:   Draft the policy
  –   Step   4:   Review, update and approve the policy
 The dimensions of an effective OSS Policy are well understood
  and proven best practices exist
 An experienced facilitator can increase the speed and improve
  the quality of this development process


                                Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.   15
Next Steps

1. Contact us:
   Greg Olson
   Sr. Director, OSS Management
   Olliance Group – a Black Duck company
   golson@olliancegroup.com
   650.493.3800 x207


2. Free Whitepaper:
   –   Four Steps to Creating an Effective Open Source Policy




                           Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.   16

More Related Content

What's hot

Running on Amazon EKS – How Greenlight Gets Security Right
Running on Amazon EKS – How Greenlight Gets Security RightRunning on Amazon EKS – How Greenlight Gets Security Right
Running on Amazon EKS – How Greenlight Gets Security RightDevOps.com
 
Creating the architecture vision with cisco v2.2
Creating the architecture vision with cisco v2.2Creating the architecture vision with cisco v2.2
Creating the architecture vision with cisco v2.2Akademy Konsalt
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareDevOps.com
 
The Need For Open Software Security Standards In A Mobile And Cloudy World
The Need For Open Software Security Standards In A Mobile And Cloudy WorldThe Need For Open Software Security Standards In A Mobile And Cloudy World
The Need For Open Software Security Standards In A Mobile And Cloudy WorldDenim Group
 
IT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit CenterIT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit CenterGary Pennington
 
T CompliIT Compliance: Shifting from Cost Center to Profit Center
T CompliIT Compliance: Shifting from Cost Center to Profit CenterT CompliIT Compliance: Shifting from Cost Center to Profit Center
T CompliIT Compliance: Shifting from Cost Center to Profit CenterGary Pennington
 
DevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous ComplianceDevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous ComplianceSource Code Control Limited
 
The Permanent Campaign
The Permanent CampaignThe Permanent Campaign
The Permanent CampaignDenim Group
 
Stopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityStopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityLumension
 

What's hot (9)

Running on Amazon EKS – How Greenlight Gets Security Right
Running on Amazon EKS – How Greenlight Gets Security RightRunning on Amazon EKS – How Greenlight Gets Security Right
Running on Amazon EKS – How Greenlight Gets Security Right
 
Creating the architecture vision with cisco v2.2
Creating the architecture vision with cisco v2.2Creating the architecture vision with cisco v2.2
Creating the architecture vision with cisco v2.2
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
The Need For Open Software Security Standards In A Mobile And Cloudy World
The Need For Open Software Security Standards In A Mobile And Cloudy WorldThe Need For Open Software Security Standards In A Mobile And Cloudy World
The Need For Open Software Security Standards In A Mobile And Cloudy World
 
IT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit CenterIT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit Center
 
T CompliIT Compliance: Shifting from Cost Center to Profit Center
T CompliIT Compliance: Shifting from Cost Center to Profit CenterT CompliIT Compliance: Shifting from Cost Center to Profit Center
T CompliIT Compliance: Shifting from Cost Center to Profit Center
 
DevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous ComplianceDevOps and Open Source Software Continuous Compliance
DevOps and Open Source Software Continuous Compliance
 
The Permanent Campaign
The Permanent CampaignThe Permanent Campaign
The Permanent Campaign
 
Stopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityStopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater Insanity
 

Viewers also liked

Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...Frederik Questier
 
Freedom And Openness For Higher Education - Management workshop for Universit...
Freedom And Openness For Higher Education - Management workshop for Universit...Freedom And Openness For Higher Education - Management workshop for Universit...
Freedom And Openness For Higher Education - Management workshop for Universit...Frederik Questier
 
JTELSS13 Why is free software important in education
JTELSS13 Why is free software important in educationJTELSS13 Why is free software important in education
JTELSS13 Why is free software important in educationEdmund Laugasson
 
OLPC Oceania -- Vanuatu -- brief to MOE -- 16 aug2011
OLPC Oceania -- Vanuatu --  brief to MOE -- 16 aug2011OLPC Oceania -- Vanuatu --  brief to MOE -- 16 aug2011
OLPC Oceania -- Vanuatu -- brief to MOE -- 16 aug2011One Laptop per Pacific Child
 
What can we learn from One Laptop Per Child Projects?
What can we learn from One Laptop Per Child Projects?What can we learn from One Laptop Per Child Projects?
What can we learn from One Laptop Per Child Projects?Frederik Questier
 
OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011
OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011
OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011One Laptop per Pacific Child
 
Technologies For Higher Education
Technologies For Higher EducationTechnologies For Higher Education
Technologies For Higher EducationFrederik Questier
 
New learning paradigms and educational technologies
New learning paradigms and educational technologiesNew learning paradigms and educational technologies
New learning paradigms and educational technologiesFrederik Questier
 
Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...Frederik Questier
 
Use of songs, raps, poems
Use of songs, raps, poemsUse of songs, raps, poems
Use of songs, raps, poemsmworth
 
What Technology Lies Behind VPN
What Technology Lies Behind VPNWhat Technology Lies Behind VPN
What Technology Lies Behind VPNSovello Hildebrand
 
FLOSS - Business Aspects of Software Industry
FLOSS - Business Aspects of Software IndustryFLOSS - Business Aspects of Software Industry
FLOSS - Business Aspects of Software IndustryFrederik Questier
 
Adopting Open Source Software Policy: What Advantages and Challenges there ar...
Adopting Open Source Software Policy: What Advantages and Challenges there ar...Adopting Open Source Software Policy: What Advantages and Challenges there ar...
Adopting Open Source Software Policy: What Advantages and Challenges there ar...Sovello Hildebrand
 
Students' Experiential Knowledge Production in the Teaching-Learning Process ...
Students' Experiential Knowledge Production in the Teaching-Learning Process ...Students' Experiential Knowledge Production in the Teaching-Learning Process ...
Students' Experiential Knowledge Production in the Teaching-Learning Process ...Frederik Questier
 
New learning paradigms and technologies
New learning paradigms and technologiesNew learning paradigms and technologies
New learning paradigms and technologiesFrederik Questier
 
ERP Software Why its good
ERP Software Why its goodERP Software Why its good
ERP Software Why its goodcrmowbray
 
Include it all. Filter it afterward.
Include it all. Filter it afterward.Include it all. Filter it afterward.
Include it all. Filter it afterward.Mark Baker
 
Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...
Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...
Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...Frederik Questier
 

Viewers also liked (20)

Templanza
TemplanzaTemplanza
Templanza
 
Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...
 
Freedom And Openness For Higher Education - Management workshop for Universit...
Freedom And Openness For Higher Education - Management workshop for Universit...Freedom And Openness For Higher Education - Management workshop for Universit...
Freedom And Openness For Higher Education - Management workshop for Universit...
 
JTELSS13 Why is free software important in education
JTELSS13 Why is free software important in educationJTELSS13 Why is free software important in education
JTELSS13 Why is free software important in education
 
OLPC Oceania -- Vanuatu -- brief to MOE -- 16 aug2011
OLPC Oceania -- Vanuatu --  brief to MOE -- 16 aug2011OLPC Oceania -- Vanuatu --  brief to MOE -- 16 aug2011
OLPC Oceania -- Vanuatu -- brief to MOE -- 16 aug2011
 
What can we learn from One Laptop Per Child Projects?
What can we learn from One Laptop Per Child Projects?What can we learn from One Laptop Per Child Projects?
What can we learn from One Laptop Per Child Projects?
 
FLOSS & OER
FLOSS & OERFLOSS & OER
FLOSS & OER
 
OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011
OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011
OLPC Oceania - ITU UNESCAP Regional Forum Bangkok -- 19 May 2011
 
Technologies For Higher Education
Technologies For Higher EducationTechnologies For Higher Education
Technologies For Higher Education
 
New learning paradigms and educational technologies
New learning paradigms and educational technologiesNew learning paradigms and educational technologies
New learning paradigms and educational technologies
 
Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...Strategies and Policies for the implementation of Free & and Open Source Soft...
Strategies and Policies for the implementation of Free & and Open Source Soft...
 
Use of songs, raps, poems
Use of songs, raps, poemsUse of songs, raps, poems
Use of songs, raps, poems
 
What Technology Lies Behind VPN
What Technology Lies Behind VPNWhat Technology Lies Behind VPN
What Technology Lies Behind VPN
 
FLOSS - Business Aspects of Software Industry
FLOSS - Business Aspects of Software IndustryFLOSS - Business Aspects of Software Industry
FLOSS - Business Aspects of Software Industry
 
Adopting Open Source Software Policy: What Advantages and Challenges there ar...
Adopting Open Source Software Policy: What Advantages and Challenges there ar...Adopting Open Source Software Policy: What Advantages and Challenges there ar...
Adopting Open Source Software Policy: What Advantages and Challenges there ar...
 
Students' Experiential Knowledge Production in the Teaching-Learning Process ...
Students' Experiential Knowledge Production in the Teaching-Learning Process ...Students' Experiential Knowledge Production in the Teaching-Learning Process ...
Students' Experiential Knowledge Production in the Teaching-Learning Process ...
 
New learning paradigms and technologies
New learning paradigms and technologiesNew learning paradigms and technologies
New learning paradigms and technologies
 
ERP Software Why its good
ERP Software Why its goodERP Software Why its good
ERP Software Why its good
 
Include it all. Filter it afterward.
Include it all. Filter it afterward.Include it all. Filter it afterward.
Include it all. Filter it afterward.
 
Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...
Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...
Free Libre And Open Source Software Acceptance in The Cuban Higher Educationa...
 

Similar to Four Steps to Creating an Effective Open Source Policy

Four Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source PolicyFour Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source Policyiasaglobal
 
The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
The Permanent Campaign: Driving a Secure Software Initiative in the EnterpriseThe Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
The Permanent Campaign: Driving a Secure Software Initiative in the EnterpriseDenim Group
 
Open Source BI (OSBI)
Open Source BI (OSBI)Open Source BI (OSBI)
Open Source BI (OSBI)Fru Louis
 
Inner-Source: The Lesson of Linux for Enterprises
Inner-Source: The Lesson of Linux for EnterprisesInner-Source: The Lesson of Linux for Enterprises
Inner-Source: The Lesson of Linux for EnterprisesSamsung Open Source Group
 
The Permanent Campaign
The Permanent CampaignThe Permanent Campaign
The Permanent CampaignDenim Group
 
Open source software: Diligence, compliance, and future trends
Open source software: Diligence, compliance, and future trendsOpen source software: Diligence, compliance, and future trends
Open source software: Diligence, compliance, and future trendsRogue Wave Software
 
Ten Elements of Open Source Governance
Ten Elements of Open Source GovernanceTen Elements of Open Source Governance
Ten Elements of Open Source GovernanceRogue Wave Software
 
Open Source Governance v2.5
Open Source Governance v2.5Open Source Governance v2.5
Open Source Governance v2.5Inria
 
The Internet of Things & Open Data: New forms of business?
The Internet of Things & Open Data: New forms of business?The Internet of Things & Open Data: New forms of business?
The Internet of Things & Open Data: New forms of business?Paris Open Source Summit
 
Success Factors of FOSS Adoption
Success Factors of FOSS AdoptionSuccess Factors of FOSS Adoption
Success Factors of FOSS AdoptionAlexei Fedotov
 
Why is Open Source Important to Samsung and What Are We Doing About It?
Why is Open Source Important to Samsung and What Are We Doing About It?Why is Open Source Important to Samsung and What Are We Doing About It?
Why is Open Source Important to Samsung and What Are We Doing About It?Samsung Open Source Group
 
Release Management Description
Release Management DescriptionRelease Management Description
Release Management DescriptionDavid Stuart
 
Open Source Governance at HP
Open Source Governance at HPOpen Source Governance at HP
Open Source Governance at HPBruno Cornec
 
IIA4: Open Source and the Enterprise ( Predix Transform 2016)
IIA4: Open Source and the Enterprise ( Predix Transform 2016)IIA4: Open Source and the Enterprise ( Predix Transform 2016)
IIA4: Open Source and the Enterprise ( Predix Transform 2016)Predix
 
Tim willoughby open source-in-local-government
Tim willoughby open source-in-local-governmentTim willoughby open source-in-local-government
Tim willoughby open source-in-local-governmentOpenSourceLGMA
 
Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020Lyra Infosystems Pvt. Ltd
 
Benefits of using open source software (oss)
Benefits of using open source software (oss)Benefits of using open source software (oss)
Benefits of using open source software (oss)MarkupBox
 

Similar to Four Steps to Creating an Effective Open Source Policy (20)

Four Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source PolicyFour Steps to Creating an Effective Open Source Policy
Four Steps to Creating an Effective Open Source Policy
 
The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
The Permanent Campaign: Driving a Secure Software Initiative in the EnterpriseThe Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
 
Open Source BI (OSBI)
Open Source BI (OSBI)Open Source BI (OSBI)
Open Source BI (OSBI)
 
Inner-Source: The Lesson of Linux for Enterprises
Inner-Source: The Lesson of Linux for EnterprisesInner-Source: The Lesson of Linux for Enterprises
Inner-Source: The Lesson of Linux for Enterprises
 
The Permanent Campaign
The Permanent CampaignThe Permanent Campaign
The Permanent Campaign
 
Open source software: Diligence, compliance, and future trends
Open source software: Diligence, compliance, and future trendsOpen source software: Diligence, compliance, and future trends
Open source software: Diligence, compliance, and future trends
 
Ten Elements of Open Source Governance
Ten Elements of Open Source GovernanceTen Elements of Open Source Governance
Ten Elements of Open Source Governance
 
Open Source in Government / Graham Taylor
Open Source in Government / Graham TaylorOpen Source in Government / Graham Taylor
Open Source in Government / Graham Taylor
 
Open Source Governance v2.5
Open Source Governance v2.5Open Source Governance v2.5
Open Source Governance v2.5
 
Methods about Open Source Governance v2.5
Methods about Open Source Governance v2.5Methods about Open Source Governance v2.5
Methods about Open Source Governance v2.5
 
The Internet of Things & Open Data: New forms of business?
The Internet of Things & Open Data: New forms of business?The Internet of Things & Open Data: New forms of business?
The Internet of Things & Open Data: New forms of business?
 
Success Factors of FOSS Adoption
Success Factors of FOSS AdoptionSuccess Factors of FOSS Adoption
Success Factors of FOSS Adoption
 
Why is Open Source Important to Samsung and What Are We Doing About It?
Why is Open Source Important to Samsung and What Are We Doing About It?Why is Open Source Important to Samsung and What Are We Doing About It?
Why is Open Source Important to Samsung and What Are We Doing About It?
 
Release Management Description
Release Management DescriptionRelease Management Description
Release Management Description
 
Open Source Governance at HP
Open Source Governance at HPOpen Source Governance at HP
Open Source Governance at HP
 
Enabling interoperability wp
Enabling interoperability wpEnabling interoperability wp
Enabling interoperability wp
 
IIA4: Open Source and the Enterprise ( Predix Transform 2016)
IIA4: Open Source and the Enterprise ( Predix Transform 2016)IIA4: Open Source and the Enterprise ( Predix Transform 2016)
IIA4: Open Source and the Enterprise ( Predix Transform 2016)
 
Tim willoughby open source-in-local-government
Tim willoughby open source-in-local-governmentTim willoughby open source-in-local-government
Tim willoughby open source-in-local-government
 
Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020
 
Benefits of using open source software (oss)
Benefits of using open source software (oss)Benefits of using open source software (oss)
Benefits of using open source software (oss)
 

More from Black Duck by Synopsys

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubBlack Duck by Synopsys
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...Black Duck by Synopsys
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealBlack Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub Black Duck by Synopsys
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Black Duck by Synopsys
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Black Duck by Synopsys
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Black Duck by Synopsys
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Black Duck by Synopsys
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Black Duck by Synopsys
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Black Duck by Synopsys
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsBlack Duck by Synopsys
 

More from Black Duck by Synopsys (20)

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Four Steps to Creating an Effective Open Source Policy

  • 1. Executive Briefing: Four Steps to Creating an Effective Open Source Policy Greg Olson Senior Director, OSS Management Olliance Group
  • 2. Speaker Greg Olson Senior Director, Open Source Management  Over 30 years of software industry experience  Managed delivery of over 150 engagements at Olliance Group  Founder and chairman of Sendmail, one of the first commercial open source companies  VP of Strategy and Business Development, Sybase  CTO, Britton Lee, Inc. Copyright © 2011 Black Duck Software, Inc. All Rights Reserved. 2
  • 3. Olliance Group, a Black Duck Company  Leading global FOSS strategy development, planning, and implementation firm – Business – Technology – Governance – Community  Ten years, 500+ engagements  Founder and host of the Open Source Think Tank – See thinktank.olliancegroup.com  Acquired by Black Duck Software – December 2010 Copyright © 2011 Black Duck Software, Inc. All Rights Reserved. 3
  • 4. Agenda  Why Use Open Source Software?  How is the use of Open Source best managed?  The Policy Development Process  Implementation  Summary and Conclusions Copyright © 2011 Black Duck Software, Inc. All Rights Reserved. 4
  • 5. Why Use Open Source Software?  Best-in-class software in some areas is OSS  Your product must interoperate with other OSS, e.g. Linux  Your customers favor or even require OSS  OSS came with a corporate acquisition  It is a lower cost alternative to traditional commercial packages  You will need to customize externally sourced software  Faster time to market by avoiding development and testing of new code  Lower development costs by using free, already de-bugged code  Lower code maintenance costs by taking advantage of community maintenance  Your code-base already contains significant OSS Sixty-two percent of organizations surveyed indicated that their usage of open source software in deployed software portfolios would exceed 25 percent in the next 18 months. And a full 17 percent of organizations expect their portfolios to be 50 to 74 percent made up of open source software. in their deployed software portfolios. Laurie Wurster, Gartner Group, March 2011 Copyright © 2011 Black Duck Software, Inc. All Rights Reserved. 5
  • 6. The Open Source Revolution OSS OSS OSS OSS OSS OSS Commercial Commercial Software Software Package Package OSS OSS OSS OSS OSS Negotiated OSS OSS OSS OSS OSS OSS Procurement Download Mostly Custom Development Mostly Integration  This new approach creates new challenges – Higher volume of code acquisition decisions – Maintaining code and version consistency across an organization – Managing support for many external elements – Managing participation in public communities – Insuring license compliance for many elements at distribution time Copyright © 2011 Black Duck Software, Inc. All Rights Reserved.
  • 7. Open Source Management Goal: Manage the complexity and risk inherent in the use of open source software without reducing its productivity advantages  What it takes to achieve this goal – Strategy and a clear understanding of objectives at the business level – A Policy – A Governance Process – Ongoing audit and tuning  Open Source Management works best when it is a natural part of the software development process "Companies must have a policy for procuring OSS, deciding which applications will be supported by OSS, and identifying the intellectual property risk or supportability risk associated with using OSS. Once a policy is in place, then there must be a governance process to enforce it." Laurie Wurster, research director at Gartner Group Copyright © 2011 Black Duck Software, Inc. All Rights Reserved. 7
  • 8. What is an OSS Policy?  A set of rules and guidelines for using and managing OSS in your organization  An effective OSS policy must – Cover all the essential aspects of managing OSS – Be succinct and easily understood – Reflect the way software is developed and delivered in your company Image CC Fotolia_14119067_M Copyright © 2011 Black Duck Software, Inc. All Rights Reserved. 8
  • 9. Developing and Open Source Policy  Step 1: Identify key stakeholders and get their commitment  Step 2: Prepare for discussions  Step 3: Draft the policy  Step 4: Review and update the policy Identify Prepare Draft Review Copyright © 2011 Black Duck Software, Inc. All Rights Reserved. 9
  • 10. Step 1: Get Commitment of the Stakeholders  In most organizations the important stakeholders represent the following functions: – Software Architecture – Software Development – QA and/or Release Management – Legal – Product or Line of Business Management  Organizations with sensitive data may also have a Security stakeholder, responsible for the security of software  Getting stakeholder commitment to developing an OSS policy is a critical success factor Copyright © 2011 Black Duck Software, Inc. All Rights Reserved. 10
  • 11. Step 2: Prepare for Discussions  Establish a shared base of understanding – Collect and disseminate information about your organization's use and plans for OSS, documents such as:  Existing policies or processes related to OSS  Inventories of OSS currently used within the organization  Existing license compliance requirements and or procedures – Prepare a clearly articulated strategy for using OSS  What benefits does the company most want?  How will the company insure they are realized? Copyright © 2011 Black Duck Software, Inc. All Rights Reserved. 11
  • 12. Step 3: Draft the Policy  An OSS Policy is typically developed in a series of interactive meetings with the stakeholders  Many companies have found that using a facilitator with experience in OSS policy and its operational implications can speed the results  An OSS policy should address the following elements: 1. Program administration and management 2. Discovery, acquisition and evaluation 3. Review and approval 4. Software procurement 5. Code and documentation management 6. Support and maintenance 7. License compliance 8. Community participation Copyright © 2011 Black Duck Software, Inc. All Rights Reserved. 12
  • 13. Step 4: Review and Update the Policy  Produce a draft policy document  Circulate for review of the stakeholders – Two or three iterations are typical  Obtain approval of stakeholders and other required executives  Plan to review and update policy at regular intervals, typically – On completion of initial implementation – Annually thereafter Copyright © 2011 Black Duck Software, Inc. All Rights Reserved. 13
  • 14. Implementation  Implement the policy through a set of processes  Good processes facilitate both efficient software development and effective OSS management – Making it easy to "do the right thing."  These process must also contain adequate checks to make sure that the OSS policy is consistently followed  Training is a key success factor for OSS Management implementations – For all participants in the policy and processes – Even the best-intentioned individuals cannot follow rules and processes they don't know and understand Copyright © 2011 Black Duck Software, Inc. All Rights Reserved. 14
  • 15. Summary and Conclusions  There are many compelling reasons to use open source software, but this use entails new risks that must be managed  An OSS policy is your primary specification for managing your OSS use  There are four proven steps to developing an OSS Policy – Step 1: Identify key stakeholders and get their commitment – Step 2: Prepare for discussions – Step 3: Draft the policy – Step 4: Review, update and approve the policy  The dimensions of an effective OSS Policy are well understood and proven best practices exist  An experienced facilitator can increase the speed and improve the quality of this development process Copyright © 2011 Black Duck Software, Inc. All Rights Reserved. 15
  • 16. Next Steps 1. Contact us: Greg Olson Sr. Director, OSS Management Olliance Group – a Black Duck company golson@olliancegroup.com 650.493.3800 x207 2. Free Whitepaper: – Four Steps to Creating an Effective Open Source Policy Copyright © 2011 Black Duck Software, Inc. All Rights Reserved. 16

Editor's Notes

  1. FOSS Strategy ConsultingCorporate StrategyBusiness ModelsMarket StrategyCorporate StrategyBusiness ModelsMarket StrategyMonetization StrategyChannels StrategyPartnering StrategyFOSS GovernancePolicy DevelopmentProcess DevelopmentLicense ComplianceRemediation PlanningCommunity EngagementRelease Policy and ProcessContribution StrategyCommunity Relations PlanCommunity AlliancesBusiness DevelopmentChannel AssessmentTargeting and Value Proposition DevelopmentProgram Planning