SlideShare a Scribd company logo
Building an Open Source
Center of Excellence
John Vrankovich
Principal Architect, JDA Software
• Leading Supply Chain Solution Provider ($1 Billion+ Annual Revenue)
• Optimization and Execution of the End-to-End Supply Chain
JDA Software Group
Some of Our Customers
John Vrankovich, Principal Architect, Office of the CTO
• Working at JDA since 1998
• Director and Architect, JDA Platform (1998-2015)
• Technology Review Committee Lead
• Technology due diligence for Partnerships, Mergers and Acquisitions
• Current Focus
• Architecture Strategy and Standards Across our Portfolio
• Technology Strategy (SaaS, API Strategy, IAM, ALM)
• Security Processes and Application Security Architecture
• Open Source Compliance
• john.vrankovich@jda.com / john.vrankovich@gmail.com
About me…
JDA Acquisitions
Development Metrics
100+
Applications
6+
Major
Acquisitions
10M+
LOC
50+
Repositories
100s
Releases/Year
100+
Microservices/
Repositories
30
Years in
Business
2,000
+
Open Source
Components
*
Open Source Process Timeline
2000 2005 2010 2015 20182017
FOSS Education
Honor System
JDA acquires
Manugistics
(1st
M&A experience)
I2
Acquisition
RedPrairie
Merger
Black Duck
Code Center,
Protex
Black Duck
HUB
Technology Review
Committee
(Architecture, Commercials,
OS Licenses)
Full
Migration to
HUB
Very Little, “Versionless”, Spreadsheets, Honor System
Tracking
Black Duck Tools
• Tracking
• Spreadsheets, Honor System, Architecture tool review and approvals
• Education
• Basic guidance on permissive vs viral licenses
• Challenges
• Tracking ”System” / Spreadsheets highly inaccurate, not validated or
updated
• Many teams were not staying up-to-date
• No awareness of security issues in open source software
• Lack of awareness of open source license complexities
• Not as well prepared for M&A activity
Open Source Process before Black Duck
• Frequently asked for or of:
• BOM of all Commercial and Open Source components
• Results of a Code Scan
• Independent Code Scan and Analysis
• Acquiring company typically will use open source compliance
to drive down the acquisition price
• Very beneficial to be prepared
Mergers and Acquisition Experiences
Center of
Mediocracy
(CoM)
Center of
Excellence
(CoE)
Enter
Black Duck
2015
Black Duck Code Center Adoption
• Automate our TRC Review Process
• Architectural Review
• Security Review
• Commercial Review
• Executive Review
• Across all JDA Products
• Products primed in system
• Delegate entry to teams
• Globally approved components
• Release Gateways
• BOM Validation, Security,
License
• POC on core JDA Platform codebase
• Tactical scanning majority of codebases
• Major concern was code snippets and modified open source
• Found very few
• Prior investment in education of development staff paid off!
• Good build process standards insured 3rd party components
always isolated from our source code
• Remediation plans developed and tracked
• Found Protex too labor intensive to implement / automate
A Brief Foray Into Black Duck Protex (2015)
• Wrote a broad Open Source Compliance Strategy
• Identified all requirements and their priorities
• Identify our Open Source Goals
• Ensure no major Open Source license or security issues are
released
• Ensure all issues needing remediation are tracked
• Be prepared for M&A activities
• Know what we use, their licenses and remediate open issues
• Ensure all license obligations are met
• Only allow approved tools to be used in our products
Now That We Are Better Education (by using BD
Tools)
• Convincing Leadership – Fear Mongering (oops, I meant education)!
• Examples of M&A experiences work well with Executive Leadership
• Cautionary tales help
• Cisco/Linksys/Broadcom – open source license compliance
• Heartbleed security vulnerability - OpenSSL
• Equifax Breach – Apache Struts
• Examples in our past and their potential ramifications
• Modified viral licensed open source, modified open source without code distributed
• Use of copyrighted or licensed book source and snippets
• Use of source code that requires a commercial license
• Metrics
• #components, % components with issues, active remediations, what we know and don’t
know..
• Present a plan with resource requirements
The Need for More Investment in Compliance – building a
CoE
Identify Roles and Activities (justifying needs)
Compliance Lead
•Policy Development
•Process Designer
•BlackDuck Tools
•Legal complexities of using open
source
•Ability to make and manage
remediation decisions
•Attribution requirements
•Obligations tracking and processes
•Manage integration of open source
compliance into JDA Tools
•Monitoring of overall process
•Continuous process improvements
•Liaison to JDA Legal
Other Tasks
•Standards development and Education
•Architecture Review
•Security review, remediation recommendations
•License Review
•Process Implementer (Rules, Workflow)
•Scanner, for tactical scans
•Build/CI Pipeline Integrator
•Obligations Compliance
•Metrics and Report development
•Remediation decision making, tracking,
publishing/dashboards
•Implement workflow strategy for overall JDA
Open Source processes
• Compliance Leadership
• John Vrankovich – Policy and TRC Lead
• Meghan Caudill – Commercial and Open Source Process Management /
Oversight
• Legal (3)
• Release Management (3)
• Security (2)
• Development Operations (3 - not enough!)
• BlackDuck Implementation and Maintenance
• Integration and Process Implementation
• Commercial and OS Metrics Development
Growing a Team: Cross Functional Team – most part time
• Education and Awareness
• Simple, concise process documentation
• License Categorization (Permissive, Viral, etc.), Top license of each kind.
• Explain risks with examples (fear mongering again)
• Licensing, Security, External and Internal Examples (current issues)
• License obligations and conflicts
• Processes
• Open Source Compliance Policy and Process Documentation
• Attribution Documentation Standards
• Technology Review Process
• Release Management Process (Gateways)
• Fostering Communication
• Enterprise Social Collaboration (avoiding email)
Product Development Education
Enter
Black Duck HUB
2017
• A New World
• SaaS Delivery
• PaaS Usage / Google Cloud Platform
• Microservices (50+), Separate Repositories, Duplication of components
• Continuous Delivery
• Polyglot Programming
• Containerization
• Challenges
• Need to also publish attribution and meet license obligations in ‘real-time’
• Volume of open source components (Javascript, Node, hundreds/repository)
• Partitioning distributed (Javascript, etc.) code from ‘behind the Cloud’ artifacts
JDA Next Open Source Challenges
• Timing of the release of Black Duck HUB could not
have been more perfect
• Protex too labor intensive to implement / automate
• Perfect tool for our JDA Next – Next Generation SaaS
Solution challenges
• Exception based issue management!
• Any other way would have been impossible
Black Duck HUB
Compliance Process with Black Duck HUB
Architecture and
Commercial
Approvals
Artifactory
Integration
Consolidating our
Processes
2017
Consolidation of Compliance Tracking, Metrics and Remediation
Combining OS License and Overall Security Compliance
HUB
Code Center
Static Source
Scanning
Dynamic Scanning
PEN Tests Results
(internal,
customers)
Customer Issues
Self Reporting
• Metrics
• Remediation Workflows
• Code Center  HUB Migration (2018)
• All ‘Classic’ products migrated to HUB. No Code Center use after 2018
• Gaps
• Workflow: Implementing some Code Center Processes
• Architectural and Commercial Review and Approval Process
• Cross Product Metrics
• Black Duck HUB 4.0 Hosting (IT and Legal Challenges)
• Continue On-premises?, Google Cloud Platform – Google Cloud Launcher
(POC)?
• Improved education and yearly certification of development staff
• Attribution Standardization
• Artfactory Integration, Whitelist/Globally Approved Components
What’s Next
• Don’t enable Bad Data (Code Center)
• Once it’s in the system it takes a LONG time to clean-up (7,000+
components)
• Review and Validate Critical Fields -- License and Usage Fields
• Manage by Exception
• BD Code Center – only require approvals for exception cases.
• BD HUB – designed in from the start!
• Narrow down what needs Architecture Review
• How much global oversight should there be?
• How much and what can be delegated to lead architects
• Don’t let Security Compliance be Overlooked
Lessons Learned
1. Educate your teams as soon as possible
2. Understand the current status of all your open source usage
• License Compliance, Security Risk
• Develop Metrics for corporate education and future tracking
1. Develop an open source policy and goals
• Working with Legal team to get their guidance and approval
1. Use data to get leadership buy-in and investment
2. Automate everything
3. Use release gateway checks to validate compliance
4. Implement a common tracking and remediation process
Summary / Guidance
Q&A

More Related Content

What's hot

Owasp Summit - Wednesday evening briefing master
Owasp Summit - Wednesday evening briefing masterOwasp Summit - Wednesday evening briefing master
Owasp Summit - Wednesday evening briefing master
Dinis Cruz
 
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
Cyber Security Alliance
 
What is DevOps?
What is DevOps?What is DevOps?
What is DevOps?
jeckels
 
Designing for the internet - Page Objects for the Real World
Designing for the internet - Page Objects for the Real WorldDesigning for the internet - Page Objects for the Real World
Designing for the internet - Page Objects for the Real World
Qualitest
 
Derek Roos (Mendix CEO) Keynote
Derek Roos (Mendix CEO) KeynoteDerek Roos (Mendix CEO) Keynote
Derek Roos (Mendix CEO) Keynote
mendixrolf
 
DevopsBusinessCaseTemplate
DevopsBusinessCaseTemplateDevopsBusinessCaseTemplate
DevopsBusinessCaseTemplatePeter Lamar
 
AppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on Data
AppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on DataAppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on Data
AppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on Data
Denim Group
 
Sea spin5 2013
Sea spin5 2013Sea spin5 2013
Sea spin5 2013Jeff Smith
 
Webinar: “Continuous Delivery: il tuo primo passo verso il DevOps”
Webinar: “Continuous Delivery: il tuo primo passo verso il DevOps”Webinar: “Continuous Delivery: il tuo primo passo verso il DevOps”
Webinar: “Continuous Delivery: il tuo primo passo verso il DevOps”
Emerasoft, solutions to collaborate
 
Four ways dev ops benefits your enterprise in 2022 min
Four ways dev ops benefits your enterprise in 2022 minFour ways dev ops benefits your enterprise in 2022 min
Four ways dev ops benefits your enterprise in 2022 min
Solution Analysts
 
An evening with... DevOps
An evening with... DevOpsAn evening with... DevOps
An evening with... DevOps
Arkhotech
 
Open, De Jure, De Facto and Proprietary: Standards and Microsoft
Open, De Jure, De Facto and Proprietary: Standards and MicrosoftOpen, De Jure, De Facto and Proprietary: Standards and Microsoft
Open, De Jure, De Facto and Proprietary: Standards and Microsoft
goodfriday
 
Transforming CI/CD at ABN AMRO to Accelerate Software Delivery and Improve Se...
Transforming CI/CD at ABN AMRO to Accelerate Software Delivery and Improve Se...Transforming CI/CD at ABN AMRO to Accelerate Software Delivery and Improve Se...
Transforming CI/CD at ABN AMRO to Accelerate Software Delivery and Improve Se...
DevOps.com
 
Get Mapped: Using Value Stream Mapping to Create a DevOps Adoption Roadmap
Get Mapped: Using Value Stream Mapping to Create a DevOps Adoption RoadmapGet Mapped: Using Value Stream Mapping to Create a DevOps Adoption Roadmap
Get Mapped: Using Value Stream Mapping to Create a DevOps Adoption Roadmap
IBM UrbanCode Products
 
What is DevOps?
What is DevOps?What is DevOps?
What is DevOps?
Mukta Aphale
 
From zero to one - How we evolved our test automation processes and mindset i...
From zero to one - How we evolved our test automation processes and mindset i...From zero to one - How we evolved our test automation processes and mindset i...
From zero to one - How we evolved our test automation processes and mindset i...
Jen-Chieh Ko
 
DevOps 101 - IBM Impact 2014
DevOps 101 - IBM Impact 2014 DevOps 101 - IBM Impact 2014
DevOps 101 - IBM Impact 2014
Sanjeev Sharma
 
XebiaLabs Overview Slides
XebiaLabs Overview SlidesXebiaLabs Overview Slides
XebiaLabs Overview Slides
XebiaLabs
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
Shannon Lietz
 
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Denim Group
 

What's hot (20)

Owasp Summit - Wednesday evening briefing master
Owasp Summit - Wednesday evening briefing masterOwasp Summit - Wednesday evening briefing master
Owasp Summit - Wednesday evening briefing master
 
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
 
What is DevOps?
What is DevOps?What is DevOps?
What is DevOps?
 
Designing for the internet - Page Objects for the Real World
Designing for the internet - Page Objects for the Real WorldDesigning for the internet - Page Objects for the Real World
Designing for the internet - Page Objects for the Real World
 
Derek Roos (Mendix CEO) Keynote
Derek Roos (Mendix CEO) KeynoteDerek Roos (Mendix CEO) Keynote
Derek Roos (Mendix CEO) Keynote
 
DevopsBusinessCaseTemplate
DevopsBusinessCaseTemplateDevopsBusinessCaseTemplate
DevopsBusinessCaseTemplate
 
AppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on Data
AppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on DataAppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on Data
AppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on Data
 
Sea spin5 2013
Sea spin5 2013Sea spin5 2013
Sea spin5 2013
 
Webinar: “Continuous Delivery: il tuo primo passo verso il DevOps”
Webinar: “Continuous Delivery: il tuo primo passo verso il DevOps”Webinar: “Continuous Delivery: il tuo primo passo verso il DevOps”
Webinar: “Continuous Delivery: il tuo primo passo verso il DevOps”
 
Four ways dev ops benefits your enterprise in 2022 min
Four ways dev ops benefits your enterprise in 2022 minFour ways dev ops benefits your enterprise in 2022 min
Four ways dev ops benefits your enterprise in 2022 min
 
An evening with... DevOps
An evening with... DevOpsAn evening with... DevOps
An evening with... DevOps
 
Open, De Jure, De Facto and Proprietary: Standards and Microsoft
Open, De Jure, De Facto and Proprietary: Standards and MicrosoftOpen, De Jure, De Facto and Proprietary: Standards and Microsoft
Open, De Jure, De Facto and Proprietary: Standards and Microsoft
 
Transforming CI/CD at ABN AMRO to Accelerate Software Delivery and Improve Se...
Transforming CI/CD at ABN AMRO to Accelerate Software Delivery and Improve Se...Transforming CI/CD at ABN AMRO to Accelerate Software Delivery and Improve Se...
Transforming CI/CD at ABN AMRO to Accelerate Software Delivery and Improve Se...
 
Get Mapped: Using Value Stream Mapping to Create a DevOps Adoption Roadmap
Get Mapped: Using Value Stream Mapping to Create a DevOps Adoption RoadmapGet Mapped: Using Value Stream Mapping to Create a DevOps Adoption Roadmap
Get Mapped: Using Value Stream Mapping to Create a DevOps Adoption Roadmap
 
What is DevOps?
What is DevOps?What is DevOps?
What is DevOps?
 
From zero to one - How we evolved our test automation processes and mindset i...
From zero to one - How we evolved our test automation processes and mindset i...From zero to one - How we evolved our test automation processes and mindset i...
From zero to one - How we evolved our test automation processes and mindset i...
 
DevOps 101 - IBM Impact 2014
DevOps 101 - IBM Impact 2014 DevOps 101 - IBM Impact 2014
DevOps 101 - IBM Impact 2014
 
XebiaLabs Overview Slides
XebiaLabs Overview SlidesXebiaLabs Overview Slides
XebiaLabs Overview Slides
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
 

Similar to JDA: Building an Open Source Center of Excellence

Software Standards
Software StandardsSoftware Standards
Software Standards
Parakum Pathirana
 
Mage Titans USA 2016 - Mathew Beane - Edit Fully Stacked: Less OOPS, More OPS...
Mage Titans USA 2016 - Mathew Beane - Edit Fully Stacked: Less OOPS, More OPS...Mage Titans USA 2016 - Mathew Beane - Edit Fully Stacked: Less OOPS, More OPS...
Mage Titans USA 2016 - Mathew Beane - Edit Fully Stacked: Less OOPS, More OPS...
Stacey Whitney
 
Best practices for fusion hcm cloud implementation
Best practices for fusion hcm cloud implementationBest practices for fusion hcm cloud implementation
Best practices for fusion hcm cloud implementation
Feras Ahmad
 
20 best practices for fusion hcm cloud implementation
20   best practices for fusion hcm cloud implementation20   best practices for fusion hcm cloud implementation
20 best practices for fusion hcm cloud implementation
mohamed refaei
 
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Vimal Suba
 
Open Source & Identity Management
Open Source & Identity ManagementOpen Source & Identity Management
Open Source & Identity Management
JISC Netskills
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Challenges Scaling DevOps
Challenges Scaling DevOpsChallenges Scaling DevOps
Challenges Scaling DevOps
Rachel Maxwell
 
What You Need to Know Before Upgrading to SharePoint 2013
What You Need to Know Before Upgrading to SharePoint 2013What You Need to Know Before Upgrading to SharePoint 2013
What You Need to Know Before Upgrading to SharePoint 2013
Perficient, Inc.
 
Enterprise-Grade DevOps Solutions for a Start Up Budget
Enterprise-Grade DevOps Solutions for a Start Up BudgetEnterprise-Grade DevOps Solutions for a Start Up Budget
Enterprise-Grade DevOps Solutions for a Start Up Budget
DevOps.com
 
Supply Chain Security for Developers.pdf
Supply Chain Security for Developers.pdfSupply Chain Security for Developers.pdf
Supply Chain Security for Developers.pdf
ssuserc5b30e
 
DevOps and DevSecOps, Incident Management
DevOps and DevSecOps, Incident ManagementDevOps and DevSecOps, Incident Management
DevOps and DevSecOps, Incident Management
ShriniKulkarni
 
Comparing Legacy and Modern e-commerce solutions
Comparing Legacy and Modern e-commerce solutionsComparing Legacy and Modern e-commerce solutions
Comparing Legacy and Modern e-commerce solutions
Mike Ensor
 
Building enterprise platforms - off the beaten path - SharePoint User Group U...
Building enterprise platforms - off the beaten path - SharePoint User Group U...Building enterprise platforms - off the beaten path - SharePoint User Group U...
Building enterprise platforms - off the beaten path - SharePoint User Group U...
Andy Talbot
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycleManindra Simhadri
 
Software product development process
Software product development processSoftware product development process
Software product development process
Sri Kanajan
 
ALM with TFS: From the Drawing Board to the Cloud
ALM with TFS: From the Drawing Board to the CloudALM with TFS: From the Drawing Board to the Cloud
ALM with TFS: From the Drawing Board to the Cloud
Jeremy Likness
 
Jan De Nul & LoQutus: Implementing an API strategy at Jan De Nul
Jan De Nul & LoQutus: Implementing an API strategy at Jan De NulJan De Nul & LoQutus: Implementing an API strategy at Jan De Nul
Jan De Nul & LoQutus: Implementing an API strategy at Jan De Nul
LoQutus
 
DevOps intro
DevOps introDevOps intro
DevOps intro
Abdelrhman Shawky
 

Similar to JDA: Building an Open Source Center of Excellence (20)

Software Standards
Software StandardsSoftware Standards
Software Standards
 
Mage Titans USA 2016 - Mathew Beane - Edit Fully Stacked: Less OOPS, More OPS...
Mage Titans USA 2016 - Mathew Beane - Edit Fully Stacked: Less OOPS, More OPS...Mage Titans USA 2016 - Mathew Beane - Edit Fully Stacked: Less OOPS, More OPS...
Mage Titans USA 2016 - Mathew Beane - Edit Fully Stacked: Less OOPS, More OPS...
 
Best practices for fusion hcm cloud implementation
Best practices for fusion hcm cloud implementationBest practices for fusion hcm cloud implementation
Best practices for fusion hcm cloud implementation
 
20 best practices for fusion hcm cloud implementation
20   best practices for fusion hcm cloud implementation20   best practices for fusion hcm cloud implementation
20 best practices for fusion hcm cloud implementation
 
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
 
Open Source & Identity Management
Open Source & Identity ManagementOpen Source & Identity Management
Open Source & Identity Management
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
 
Challenges Scaling DevOps
Challenges Scaling DevOpsChallenges Scaling DevOps
Challenges Scaling DevOps
 
What You Need to Know Before Upgrading to SharePoint 2013
What You Need to Know Before Upgrading to SharePoint 2013What You Need to Know Before Upgrading to SharePoint 2013
What You Need to Know Before Upgrading to SharePoint 2013
 
Enterprise-Grade DevOps Solutions for a Start Up Budget
Enterprise-Grade DevOps Solutions for a Start Up BudgetEnterprise-Grade DevOps Solutions for a Start Up Budget
Enterprise-Grade DevOps Solutions for a Start Up Budget
 
Supply Chain Security for Developers.pdf
Supply Chain Security for Developers.pdfSupply Chain Security for Developers.pdf
Supply Chain Security for Developers.pdf
 
Journey to the center of DevOps - v6
Journey to the center of DevOps - v6Journey to the center of DevOps - v6
Journey to the center of DevOps - v6
 
DevOps and DevSecOps, Incident Management
DevOps and DevSecOps, Incident ManagementDevOps and DevSecOps, Incident Management
DevOps and DevSecOps, Incident Management
 
Comparing Legacy and Modern e-commerce solutions
Comparing Legacy and Modern e-commerce solutionsComparing Legacy and Modern e-commerce solutions
Comparing Legacy and Modern e-commerce solutions
 
Building enterprise platforms - off the beaten path - SharePoint User Group U...
Building enterprise platforms - off the beaten path - SharePoint User Group U...Building enterprise platforms - off the beaten path - SharePoint User Group U...
Building enterprise platforms - off the beaten path - SharePoint User Group U...
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycle
 
Software product development process
Software product development processSoftware product development process
Software product development process
 
ALM with TFS: From the Drawing Board to the Cloud
ALM with TFS: From the Drawing Board to the CloudALM with TFS: From the Drawing Board to the Cloud
ALM with TFS: From the Drawing Board to the Cloud
 
Jan De Nul & LoQutus: Implementing an API strategy at Jan De Nul
Jan De Nul & LoQutus: Implementing an API strategy at Jan De NulJan De Nul & LoQutus: Implementing an API strategy at Jan De Nul
Jan De Nul & LoQutus: Implementing an API strategy at Jan De Nul
 
DevOps intro
DevOps introDevOps intro
DevOps intro
 

More from Black Duck by Synopsys

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
Black Duck by Synopsys
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
Black Duck by Synopsys
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
Black Duck by Synopsys
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Black Duck by Synopsys
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Black Duck by Synopsys
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
Black Duck by Synopsys
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Black Duck by Synopsys
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Black Duck by Synopsys
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Black Duck by Synopsys
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Black Duck by Synopsys
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Black Duck by Synopsys
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Black Duck by Synopsys
 

More from Black Duck by Synopsys (20)

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 

JDA: Building an Open Source Center of Excellence

  • 1. Building an Open Source Center of Excellence John Vrankovich Principal Architect, JDA Software
  • 2. • Leading Supply Chain Solution Provider ($1 Billion+ Annual Revenue) • Optimization and Execution of the End-to-End Supply Chain JDA Software Group
  • 3. Some of Our Customers
  • 4. John Vrankovich, Principal Architect, Office of the CTO • Working at JDA since 1998 • Director and Architect, JDA Platform (1998-2015) • Technology Review Committee Lead • Technology due diligence for Partnerships, Mergers and Acquisitions • Current Focus • Architecture Strategy and Standards Across our Portfolio • Technology Strategy (SaaS, API Strategy, IAM, ALM) • Security Processes and Application Security Architecture • Open Source Compliance • john.vrankovich@jda.com / john.vrankovich@gmail.com About me…
  • 7. Open Source Process Timeline 2000 2005 2010 2015 20182017 FOSS Education Honor System JDA acquires Manugistics (1st M&A experience) I2 Acquisition RedPrairie Merger Black Duck Code Center, Protex Black Duck HUB Technology Review Committee (Architecture, Commercials, OS Licenses) Full Migration to HUB Very Little, “Versionless”, Spreadsheets, Honor System Tracking Black Duck Tools
  • 8. • Tracking • Spreadsheets, Honor System, Architecture tool review and approvals • Education • Basic guidance on permissive vs viral licenses • Challenges • Tracking ”System” / Spreadsheets highly inaccurate, not validated or updated • Many teams were not staying up-to-date • No awareness of security issues in open source software • Lack of awareness of open source license complexities • Not as well prepared for M&A activity Open Source Process before Black Duck
  • 9. • Frequently asked for or of: • BOM of all Commercial and Open Source components • Results of a Code Scan • Independent Code Scan and Analysis • Acquiring company typically will use open source compliance to drive down the acquisition price • Very beneficial to be prepared Mergers and Acquisition Experiences
  • 12. Black Duck Code Center Adoption • Automate our TRC Review Process • Architectural Review • Security Review • Commercial Review • Executive Review • Across all JDA Products • Products primed in system • Delegate entry to teams • Globally approved components • Release Gateways • BOM Validation, Security, License
  • 13. • POC on core JDA Platform codebase • Tactical scanning majority of codebases • Major concern was code snippets and modified open source • Found very few • Prior investment in education of development staff paid off! • Good build process standards insured 3rd party components always isolated from our source code • Remediation plans developed and tracked • Found Protex too labor intensive to implement / automate A Brief Foray Into Black Duck Protex (2015)
  • 14. • Wrote a broad Open Source Compliance Strategy • Identified all requirements and their priorities • Identify our Open Source Goals • Ensure no major Open Source license or security issues are released • Ensure all issues needing remediation are tracked • Be prepared for M&A activities • Know what we use, their licenses and remediate open issues • Ensure all license obligations are met • Only allow approved tools to be used in our products Now That We Are Better Education (by using BD Tools)
  • 15. • Convincing Leadership – Fear Mongering (oops, I meant education)! • Examples of M&A experiences work well with Executive Leadership • Cautionary tales help • Cisco/Linksys/Broadcom – open source license compliance • Heartbleed security vulnerability - OpenSSL • Equifax Breach – Apache Struts • Examples in our past and their potential ramifications • Modified viral licensed open source, modified open source without code distributed • Use of copyrighted or licensed book source and snippets • Use of source code that requires a commercial license • Metrics • #components, % components with issues, active remediations, what we know and don’t know.. • Present a plan with resource requirements The Need for More Investment in Compliance – building a CoE
  • 16. Identify Roles and Activities (justifying needs) Compliance Lead •Policy Development •Process Designer •BlackDuck Tools •Legal complexities of using open source •Ability to make and manage remediation decisions •Attribution requirements •Obligations tracking and processes •Manage integration of open source compliance into JDA Tools •Monitoring of overall process •Continuous process improvements •Liaison to JDA Legal Other Tasks •Standards development and Education •Architecture Review •Security review, remediation recommendations •License Review •Process Implementer (Rules, Workflow) •Scanner, for tactical scans •Build/CI Pipeline Integrator •Obligations Compliance •Metrics and Report development •Remediation decision making, tracking, publishing/dashboards •Implement workflow strategy for overall JDA Open Source processes
  • 17. • Compliance Leadership • John Vrankovich – Policy and TRC Lead • Meghan Caudill – Commercial and Open Source Process Management / Oversight • Legal (3) • Release Management (3) • Security (2) • Development Operations (3 - not enough!) • BlackDuck Implementation and Maintenance • Integration and Process Implementation • Commercial and OS Metrics Development Growing a Team: Cross Functional Team – most part time
  • 18. • Education and Awareness • Simple, concise process documentation • License Categorization (Permissive, Viral, etc.), Top license of each kind. • Explain risks with examples (fear mongering again) • Licensing, Security, External and Internal Examples (current issues) • License obligations and conflicts • Processes • Open Source Compliance Policy and Process Documentation • Attribution Documentation Standards • Technology Review Process • Release Management Process (Gateways) • Fostering Communication • Enterprise Social Collaboration (avoiding email) Product Development Education
  • 20. • A New World • SaaS Delivery • PaaS Usage / Google Cloud Platform • Microservices (50+), Separate Repositories, Duplication of components • Continuous Delivery • Polyglot Programming • Containerization • Challenges • Need to also publish attribution and meet license obligations in ‘real-time’ • Volume of open source components (Javascript, Node, hundreds/repository) • Partitioning distributed (Javascript, etc.) code from ‘behind the Cloud’ artifacts JDA Next Open Source Challenges
  • 21. • Timing of the release of Black Duck HUB could not have been more perfect • Protex too labor intensive to implement / automate • Perfect tool for our JDA Next – Next Generation SaaS Solution challenges • Exception based issue management! • Any other way would have been impossible Black Duck HUB
  • 22. Compliance Process with Black Duck HUB Architecture and Commercial Approvals Artifactory Integration
  • 24. Consolidation of Compliance Tracking, Metrics and Remediation Combining OS License and Overall Security Compliance HUB Code Center Static Source Scanning Dynamic Scanning PEN Tests Results (internal, customers) Customer Issues Self Reporting • Metrics • Remediation Workflows
  • 25. • Code Center  HUB Migration (2018) • All ‘Classic’ products migrated to HUB. No Code Center use after 2018 • Gaps • Workflow: Implementing some Code Center Processes • Architectural and Commercial Review and Approval Process • Cross Product Metrics • Black Duck HUB 4.0 Hosting (IT and Legal Challenges) • Continue On-premises?, Google Cloud Platform – Google Cloud Launcher (POC)? • Improved education and yearly certification of development staff • Attribution Standardization • Artfactory Integration, Whitelist/Globally Approved Components What’s Next
  • 26. • Don’t enable Bad Data (Code Center) • Once it’s in the system it takes a LONG time to clean-up (7,000+ components) • Review and Validate Critical Fields -- License and Usage Fields • Manage by Exception • BD Code Center – only require approvals for exception cases. • BD HUB – designed in from the start! • Narrow down what needs Architecture Review • How much global oversight should there be? • How much and what can be delegated to lead architects • Don’t let Security Compliance be Overlooked Lessons Learned
  • 27. 1. Educate your teams as soon as possible 2. Understand the current status of all your open source usage • License Compliance, Security Risk • Develop Metrics for corporate education and future tracking 1. Develop an open source policy and goals • Working with Legal team to get their guidance and approval 1. Use data to get leadership buy-in and investment 2. Automate everything 3. Use release gateway checks to validate compliance 4. Implement a common tracking and remediation process Summary / Guidance
  • 28. Q&A

Editor's Notes

  1. For over 30 years, JDA has been the leading provider of end-to-end, integrated retail and supply chain planning and execution solutions. Their Open Source Center of Excellence (OSCOE) Is charged with standardizing implementation of open source software used within the JDA software ecosystem. JDA experts will share lessons learned and benefits reaped by building Open Source Center of Excellence
  2. Suggested changes: Architecture tool review and MANUAL approvals
  3. More lenient since MOST code is not distributed Permissive and many viral open source licenses are ok for ‘behind the cloud deployment. Unlike for software we distribute to customers Typically client-side Javascript is the only code that needs to be scrutinized since it’s ‘distributed’ to the client Browser All other code remains on our servers which the customers do not have access to Good assumption on GCP, correct? Need different policy rules for client side Javascript vs ‘behind the cloud’ deployed components