As a pioneer in cloud computing, Salesforce realized early on that transparency is the key to trust. With one of the world’s first public uptime monitors and one of the world’s first public web APIs (in February of 2000), the company’s leadership knew from the start that being open about technology was the only way to earn customer trust.
Like other companies founded in the ’90s, however, Salesforce predated the explosion of open source as the game changer it is now. Certainly, major parts of the technology stack (like Linux and Java) have always been open source, but the majority of the code that runs the product is proprietary by default. As attitudes have shifted toward open source in the world, Salesforce leadership has moved along with them. But the question is: how do you turn a belief into reality?
The fact is, even if your company “gets” open source, that doesn’t mean it’s easy, especially if you have well-established practices around IT and product development. The challenges mount, one after another: What about legal concerns? What about intellectual property? How will you decide what to open source? How will you maintain strong security?
Regina Burkebile and Ian Varley candidly discuss the cultural and process challenges Salesforce has faced and the path it has taken. These days, Salesforce releases new open source projects regularly and employs full-time committers on many projects, including HBase, Ruby, and Postgres. It has an active nonprofit open source arm in Salesforce.org and contributes ongoing development across hundreds of open source projects. To support this, Salesforce has streamlined many of its processes, built in proactive education for all engineers, and started a virtual team to support better tooling and faster turnaround time.
If your business has computers, then you probably also have a help desk. But not every help desk is made equal. Some are impressively efficient, able to resolve most incoming calls with a minimum of effort. Others, not so much.
The difference is automation, and here’s the secret: Getting there isn’t hard.
By integrating event management, ridiculously remote tools, and automated actions directly into your help desk application, you can automatically empower help desk administrators with solutions for a wide array of common problems – without exposing dangerous complexities or excessive permissions that might get misused.
Join Greg Shields of Concentrated Technology and Jayson Gehri of ScriptLogic in this expert conversation. You’ll leave with some useful tips, tricks, and tools that will bring ridiculous efficiency to your help desk activities.
To Open Source or Not to Open Source...Where is the ROI?Ted Haeger
This presentation is from Evans Data Corp's 2009 Developer Relations Conference.
It is about how to approach code sharing (Open Source) to enable a developer community.
(We do not confuse Open Source with Free Software. You shouldn't Either.)
The ZeroTrust Initiative aims to improve overall IT security by removing the need to base it on trust. With cryptography, the ability to independently verify algorithms and protocols is something we take as a given. Cryptography is only part of the picture. The ZTI goal is to promote products development model that allows for end-to-end independent verification starting from source code and finishing at compiled and installed binaries.
Securing The Studio: How Netflix Protects Productions From Pitch To PlayPatrick Thomas
Enigma 2020 Evening Session, Sponsored by Netflix
Speakers: Ben Lim, Manager of Studio Information Security; Patrick Thomas, Senior Security Partner in Application Security; and Amie Tornincasa, Director of Product, Production in Studio Product Innovation
Many thousands of people worldwide are working to make movies and shows for Netflix. They include writers, directors, actors, crew members, editors, animators, subtitlers, and many more. As a newcomer to the century-old business of movie making, Netflix is looking for new ways to help these talented professionals put their best work on the screen. However the technologies we’re developing come with important security needs. Scripts, prerelease content, and personal data must all be managed efficiently and securely. In this presentation, Netflixers working at the frontier of a new era of movie making will talk about how we are meeting these technological and security challenges.
https://www.usenix.org/conference/enigma2020/evening-events
OWASP AppSec Cali 2018 - Enabling Product Security With Culture and Cloud (As...Patrick Thomas
Abstract from OWASP AppSec California 2018:
----------------------------
What would it look like if security never had to say “no”?
This talk explores that counter-intuitive premise, and shows how it is not just possible but *necessary* to discard many traditional security behaviors in order to support modern high-velocity, cloud-centric engineering teams. For the product security team at Netflix, this is the logical implication of a cultural commitment to enabling the organization.
Attendees will learn how to replace heavy-handed gating with an automation-first approach, and build powerful security capabilities on top of cloud deployment primitives. Specific examples including provable application identity, immutable and continuous deployment, and secret bootstrapping illustrate how this approach balances security impact with engineering enablement.
Contact:
@astha_singhal
@coffeetocode
Version with speaker notes: https://www.slideshare.net/coffeetocode/owasp-appsec-cali-2018-enabling-product-security-with-culture-and-cloud-astha-singhal-patrick-thomas-with-speaker-notes-public
The real value of open source: ROI and beyondJeffrey McGuire
The slides from my presentation, "The real value of open source: ROI and beyond" from LinuxWochen Austria and Drupal Business Days Vienna 2012. - jam | Jeffrey A. McGuire | Acquia Manager of Community Affairs | jam@acquia.com
If your business has computers, then you probably also have a help desk. But not every help desk is made equal. Some are impressively efficient, able to resolve most incoming calls with a minimum of effort. Others, not so much.
The difference is automation, and here’s the secret: Getting there isn’t hard.
By integrating event management, ridiculously remote tools, and automated actions directly into your help desk application, you can automatically empower help desk administrators with solutions for a wide array of common problems – without exposing dangerous complexities or excessive permissions that might get misused.
Join Greg Shields of Concentrated Technology and Jayson Gehri of ScriptLogic in this expert conversation. You’ll leave with some useful tips, tricks, and tools that will bring ridiculous efficiency to your help desk activities.
To Open Source or Not to Open Source...Where is the ROI?Ted Haeger
This presentation is from Evans Data Corp's 2009 Developer Relations Conference.
It is about how to approach code sharing (Open Source) to enable a developer community.
(We do not confuse Open Source with Free Software. You shouldn't Either.)
The ZeroTrust Initiative aims to improve overall IT security by removing the need to base it on trust. With cryptography, the ability to independently verify algorithms and protocols is something we take as a given. Cryptography is only part of the picture. The ZTI goal is to promote products development model that allows for end-to-end independent verification starting from source code and finishing at compiled and installed binaries.
Securing The Studio: How Netflix Protects Productions From Pitch To PlayPatrick Thomas
Enigma 2020 Evening Session, Sponsored by Netflix
Speakers: Ben Lim, Manager of Studio Information Security; Patrick Thomas, Senior Security Partner in Application Security; and Amie Tornincasa, Director of Product, Production in Studio Product Innovation
Many thousands of people worldwide are working to make movies and shows for Netflix. They include writers, directors, actors, crew members, editors, animators, subtitlers, and many more. As a newcomer to the century-old business of movie making, Netflix is looking for new ways to help these talented professionals put their best work on the screen. However the technologies we’re developing come with important security needs. Scripts, prerelease content, and personal data must all be managed efficiently and securely. In this presentation, Netflixers working at the frontier of a new era of movie making will talk about how we are meeting these technological and security challenges.
https://www.usenix.org/conference/enigma2020/evening-events
OWASP AppSec Cali 2018 - Enabling Product Security With Culture and Cloud (As...Patrick Thomas
Abstract from OWASP AppSec California 2018:
----------------------------
What would it look like if security never had to say “no”?
This talk explores that counter-intuitive premise, and shows how it is not just possible but *necessary* to discard many traditional security behaviors in order to support modern high-velocity, cloud-centric engineering teams. For the product security team at Netflix, this is the logical implication of a cultural commitment to enabling the organization.
Attendees will learn how to replace heavy-handed gating with an automation-first approach, and build powerful security capabilities on top of cloud deployment primitives. Specific examples including provable application identity, immutable and continuous deployment, and secret bootstrapping illustrate how this approach balances security impact with engineering enablement.
Contact:
@astha_singhal
@coffeetocode
Version with speaker notes: https://www.slideshare.net/coffeetocode/owasp-appsec-cali-2018-enabling-product-security-with-culture-and-cloud-astha-singhal-patrick-thomas-with-speaker-notes-public
The real value of open source: ROI and beyondJeffrey McGuire
The slides from my presentation, "The real value of open source: ROI and beyond" from LinuxWochen Austria and Drupal Business Days Vienna 2012. - jam | Jeffrey A. McGuire | Acquia Manager of Community Affairs | jam@acquia.com
Maturing DevSecOps: From Easy to High ImpactSBWebinars
Digital Transformation and DevSecOps are the buzzwords du jour. Increasingly, organizations embrace the notion that if you implement DevOps, you must transform security as well. Failing to do so would either leave you insecure or make your security controls negate the speed you aimed to achieve in the first place.
So doing DevSecOps is good... but what does it actually mean? This talk unravels what it looks like with practical, good (and bad) examples of companies who are:
Securing DevOps technologies - by either adapting or building new solutions that address the new security concerns
Securing DevOps methodologies - changing when and how security controls interact with the application and the development process
Adapting to a DevOps philosophy of shared ownership for security
In the end, you'll have the tools you need to plan your interpretation of DevSecOps, choose the practices and tooling you need to support it, and ensure that Security leadership is playing an important role in making it a real thing in your organization.
DevOps and Security, a Match Made in HeavenDana Gardner
Transcript of a Briefings Direct discussion on the relationship between DevOps and security and exploring the impact of security on compliance, risk, and auditing.
Protecting Your IP: Data Security for Software TechnologyShawn Tuma
Cybersecurity attorney Shawn Tuma presented on Protecting Your IP: Data Security for Software Technology at Texas Bar CLE's Intellectual Property Law 101 Course for 2017 on February 22, 2017 in Austin, Texas.
An exploration of the cyber security market factors that lend to pervasive issues with hyperbole and feelings of broken trust across the various participants. Much is left off the slide & was covered in narrative at a recent OWASP LA meetup, original done for B-Sides LV.
2022 Rea & Associates' Cybersecurity Conference Rea & Associates
This presentation will give you insights into timely information about current cybersecurity threats faced by small and mid-sized businesses, incident response plans, and Cybersecurity Maturity Model Certification (CMMC) compliance protocols required for government contracts and what you need to do now to protect your business from a cyberattack.
business model, business model canvas, mission model, mission model canvas, customer development, hacking for defense, H4D, lean launchpad, lean startup, stanford, startup, steve blank, pete newell, bmnt, entrepreneurship, I-Corps, Security, NSIN, NSA, disposable infrastructure, cyber, Joe Felter, DOD
Slides from my DevOpsExpo London talk "From oops to NoOps".
They tell you in these conferences that DevOps is not about tools, but about culture. And they are partially right. I am going to tell you that it’s not only about culture or tools but also abstractions.
It is a lot about how you see software and its value. About our mental model of what software is: how it runs, evolves, and interacts with the other facets of an enterprise.
We used to view software as code. As a state of code. Now we think about software as change, as a flow. A dynamic system where people, machines, and processes interact continuously.
At Platform.sh we spend a bunch of time asking ourselves not “How do you build?” - or even “How do you build consistently?” - but rather “What does it mean to consistently build in a world where change is good?” A world that lets you push security fixes into production as soon as they’re available because you don’t want to be an Equifax but you do want stability.
In this presentation, I will go over what we think software is and why having the right ideas about software will help you get your culture right and your tooling aligned, as well as gain in productivity, and general happiness and well-being.
How to Open Source an Internal Project
Presented at: All Things Open RTP Meetup
Presented by: VM Brasseur
Abstract: Your company is going to release an internal project as open source. Are you ready for your new responsibilities? You could just throw the code up on a forge (like GitHub, GitLab), but it's unlikely to receive attention or provide much benefit to the company. Open sourcing an internal project requires a lot of thought & work.
Releasing a project as open source requires changes to the development/build/release workflow. This is not about the code per se; it’s about the processes & infrastructure that surround the code & that make the project successful.
This talk will introduce what you need to know & to expect before you release your internal project, including:
- Identifying company goals for the project
- Pre-release due diligence: licenses & code hygiene
- Community expectations & maintenance
- Processes which need to happen in the open
- Communication: internal & external
For more info on our Meetups: https://www.meetup.com/All-Things-Open-RTP-Meetup/
We are delighted to have Gary Miliefsky on our second Hacker Hotshot of 2013! Gary is the Editor of Cyber Defense Magazine, which he recently founded after years of being a cover story author and regular contributor to Hakin9 Magazine. In partnership with UMASS, he started the Cyber Defense Test Labs to perform independent lab reviews of next generation information security products. Gary is also the founder of NetClarity, Inc., which is the world's first next generation agentless, non-inline network access control (NAC) and bring your own device (BYOD) management appliances vendor based on a patented technology which he invented.
business model, business model canvas, mission model, mission model canvas, customer development, hacking for defense, H4D, lean launchpad, lean startup, stanford, startup, steve blank, pete newell, bmnt, entrepreneurship, I-Corps, Security, NSIN, NSA, cybersecurity, Joe Felter, ATO, DOD
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
May Marketo Masterclass, London MUG May 22 2024.pdfAdele Miller
Can't make Adobe Summit in Vegas? No sweat because the EMEA Marketo Engage Champions are coming to London to share their Summit sessions, insights and more!
This is a MUG with a twist you don't want to miss.
More Related Content
Similar to Knocking Down Blockers: Transforming your company into an open source contributor
Maturing DevSecOps: From Easy to High ImpactSBWebinars
Digital Transformation and DevSecOps are the buzzwords du jour. Increasingly, organizations embrace the notion that if you implement DevOps, you must transform security as well. Failing to do so would either leave you insecure or make your security controls negate the speed you aimed to achieve in the first place.
So doing DevSecOps is good... but what does it actually mean? This talk unravels what it looks like with practical, good (and bad) examples of companies who are:
Securing DevOps technologies - by either adapting or building new solutions that address the new security concerns
Securing DevOps methodologies - changing when and how security controls interact with the application and the development process
Adapting to a DevOps philosophy of shared ownership for security
In the end, you'll have the tools you need to plan your interpretation of DevSecOps, choose the practices and tooling you need to support it, and ensure that Security leadership is playing an important role in making it a real thing in your organization.
DevOps and Security, a Match Made in HeavenDana Gardner
Transcript of a Briefings Direct discussion on the relationship between DevOps and security and exploring the impact of security on compliance, risk, and auditing.
Protecting Your IP: Data Security for Software TechnologyShawn Tuma
Cybersecurity attorney Shawn Tuma presented on Protecting Your IP: Data Security for Software Technology at Texas Bar CLE's Intellectual Property Law 101 Course for 2017 on February 22, 2017 in Austin, Texas.
An exploration of the cyber security market factors that lend to pervasive issues with hyperbole and feelings of broken trust across the various participants. Much is left off the slide & was covered in narrative at a recent OWASP LA meetup, original done for B-Sides LV.
2022 Rea & Associates' Cybersecurity Conference Rea & Associates
This presentation will give you insights into timely information about current cybersecurity threats faced by small and mid-sized businesses, incident response plans, and Cybersecurity Maturity Model Certification (CMMC) compliance protocols required for government contracts and what you need to do now to protect your business from a cyberattack.
business model, business model canvas, mission model, mission model canvas, customer development, hacking for defense, H4D, lean launchpad, lean startup, stanford, startup, steve blank, pete newell, bmnt, entrepreneurship, I-Corps, Security, NSIN, NSA, disposable infrastructure, cyber, Joe Felter, DOD
Slides from my DevOpsExpo London talk "From oops to NoOps".
They tell you in these conferences that DevOps is not about tools, but about culture. And they are partially right. I am going to tell you that it’s not only about culture or tools but also abstractions.
It is a lot about how you see software and its value. About our mental model of what software is: how it runs, evolves, and interacts with the other facets of an enterprise.
We used to view software as code. As a state of code. Now we think about software as change, as a flow. A dynamic system where people, machines, and processes interact continuously.
At Platform.sh we spend a bunch of time asking ourselves not “How do you build?” - or even “How do you build consistently?” - but rather “What does it mean to consistently build in a world where change is good?” A world that lets you push security fixes into production as soon as they’re available because you don’t want to be an Equifax but you do want stability.
In this presentation, I will go over what we think software is and why having the right ideas about software will help you get your culture right and your tooling aligned, as well as gain in productivity, and general happiness and well-being.
How to Open Source an Internal Project
Presented at: All Things Open RTP Meetup
Presented by: VM Brasseur
Abstract: Your company is going to release an internal project as open source. Are you ready for your new responsibilities? You could just throw the code up on a forge (like GitHub, GitLab), but it's unlikely to receive attention or provide much benefit to the company. Open sourcing an internal project requires a lot of thought & work.
Releasing a project as open source requires changes to the development/build/release workflow. This is not about the code per se; it’s about the processes & infrastructure that surround the code & that make the project successful.
This talk will introduce what you need to know & to expect before you release your internal project, including:
- Identifying company goals for the project
- Pre-release due diligence: licenses & code hygiene
- Community expectations & maintenance
- Processes which need to happen in the open
- Communication: internal & external
For more info on our Meetups: https://www.meetup.com/All-Things-Open-RTP-Meetup/
We are delighted to have Gary Miliefsky on our second Hacker Hotshot of 2013! Gary is the Editor of Cyber Defense Magazine, which he recently founded after years of being a cover story author and regular contributor to Hakin9 Magazine. In partnership with UMASS, he started the Cyber Defense Test Labs to perform independent lab reviews of next generation information security products. Gary is also the founder of NetClarity, Inc., which is the world's first next generation agentless, non-inline network access control (NAC) and bring your own device (BYOD) management appliances vendor based on a patented technology which he invented.
business model, business model canvas, mission model, mission model canvas, customer development, hacking for defense, H4D, lean launchpad, lean startup, stanford, startup, steve blank, pete newell, bmnt, entrepreneurship, I-Corps, Security, NSIN, NSA, cybersecurity, Joe Felter, ATO, DOD
Similar to Knocking Down Blockers: Transforming your company into an open source contributor (20)
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
May Marketo Masterclass, London MUG May 22 2024.pdfAdele Miller
Can't make Adobe Summit in Vegas? No sweat because the EMEA Marketo Engage Champions are coming to London to share their Summit sessions, insights and more!
This is a MUG with a twist you don't want to miss.
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfJay Das
With the advent of artificial intelligence or AI tools, project management processes are undergoing a transformative shift. By using tools like ChatGPT, and Bard organizations can empower their leaders and managers to plan, execute, and monitor projects more effectively.
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
Knocking Down Blockers: Transforming your company into an open source contributor
1. Knocking Down Blockers
Ian Varley
Architect
ivarley@salesforce.com
@thefutureian
Transforming your company into an open source contributor
Regina Burkebile
Director, Engineering Marketing
rburkebile@salesforce.com
@rburkebile
22. A license can actually say anything. It’s a legal document.
Outside the “well known” ones, it requires legal review.
All work is copyright by default.
If someone “gives” you some
code without any official
representation, they can later
claim you didn’t have right to it.
That’s why CLAs exist.
23. Patents are tricky.
(This typically only
applies to larger
companies.)
If you have a portfolio,
even one only meant
for defense, it makes
the approvals harder.
24. The point is, open source IS giving up IP (by definition).
The legal team is involved to make set the boundaries.
25. Key tip: get to know your IP team,
and learn what they care about protecting
54. We agreed on a 5 business day response time.
DAYS DAYS
55. Bi-weekly OSS
Core Meetings
● Discuss process
improvements
(i.e. automate
approval workflow,
track CLAs, etc.)
Bi-weekly Legal
Meetings
● Discuss pending
approvals
● Check in on
process and
potential
improvements
Ad hoc Legal
Meetings
● Open door to
discuss any
potential
blockers/pain points
that we can solve
together.
56. We actually took the time to write things down in a guide
for engineers.
57. We created a green / yellow / red light model,
to make contributions faster and easier.
We used Salesforce to track our work.
Our virtual kanban board would ensure everyone was on the same page with where the bottlenecks were.
We were also able to capture any pending questions or confirmed approvals on a single record.
We went from piecemealing info across emails, spreadsheets, etc. into a single record.
But, you don’t need Salesforce to accomplish this, any tracking system will do. For us, using our own product was an easy decision.
https://pixabay.com/static/uploads/photo/2014/08/29/19/20/applause-431234_960_720.jpg
Once the proper tracking was in place and the process was working much smoother for all of us, we were then able to decide on a reasonable cadence to respond to OSS requests.
We setup a bi-weekly meeting where we all met to discuss any projects that might not have been as clear cut.
We also agreed on a 5BD SLA that meant the engineer would hear initial thoughts re: their project within that timeframe. Of course there are always extenuating circumstances when legal is getting pulled into higher priority projects (like an acquisition), but generally speaking all of the process improvements made a huge difference.
It’s also important to clarify the full approval could take longer depending on the complexity of the project, but at least the engineer would no longer be waiting 93 days to hear something.
In order to keep the OSS process and culture continuing to move in the right direction, we have ongoing, regular meetings.
Legal and security are both key participants in the discussions.
And the relationship with all parties is extremely strong. We all understand our key goals, and we know that we have to continue to talk openly about how we can move towards those together.
Internally, we also use a tool called the V2MOM that sets the strategy each FY.
Often times, you’ll hear folks say, “If it’s not on the V2MOM, it’s not real.”
However, people are pretty selective about what they include because there is always so much going on.
The good news is, we’re now starting to see OSS become a part of various leaders’ V2MOM.