SlideShare a Scribd company logo
Intetics Inc.
www.intetics.com
intetics@intetics.com
Office: +1-239-217-4907
Open Source Code
In Product Development
Best Practices And Risk Mitigation
© Хopyright, 1995-2020 2
Modern software development
involves the increased use of
open source code
72% of organizations make non-
commercial use of open source code
and 55% use it for commercial
product development
But it’s crucial to make sure
every component is well
scrutinized before it’s
integrated into your project
Open source code in product
development
© Хopyright, 1995-2020 3
3 key problems related to the use of
open source code
Violation of license
agreement for
commercial uses
Use of outdated open
source components
causing vulnerability
risks
Use of libraries
without community
support
How to manage these issues?
© Хopyright, 1995-2020 4
Problem 1 – Violation of license
agreement for commercial uses
Using unlicensed open source сode
is unsafe. You might end up
violating intellectual property rights
or bringing security vulnerabilities
and risks into your project, which
can translate into financial and
legal consequences.
© Хopyright, 1995-2020 5
1
Document the use of all third-party resources on
the project
Although it requires time and resources, you get to know where all your
open source elements come from.
2
Import libraries only after getting approval from
the project tech lead
Solution - Watch out for hidden
inconsistencies
© Хopyright, 1995-2020 6
Problem 2 – Use of libraries
without community support
A lot of open source code libraries might
often fail to comply with security
standards, work incorrectly with other
open source components, be out-of-date
or have no license at all.
© Хopyright, 1995-2020 7
1
Start with scrutinizing the library component you
need:
сheck its license, source and version before you use it.
2 Try to only use libraries from official sites, and if
possible, do not import code manually
Solution - Check the origin of
the libraries you use
© Хopyright, 1995-2020
Problem 3 – Use of outdated
open source components causing
vulnerability risks
91% of product development projects
use outdated open source components,
thus jeopardizing project security
significantly. 82% of codebases have
four-year-old parts and 88% have had
no add-ons during the last two years.
8
© Хopyright, 1995-2020 9
Solution - Track the software
versions you use
1
Be sure the software you use is brand new and
receives vendor support and upgrades
In case you work with different frameworks, check that all libraries work
together correctly.
2
Choose automated open source code assessment
tools to verify the relevance of code elements
A top-notch tool automatically tracks possible vulnerabilities in open
source code and spots issues on time.
© Хopyright, 1995-2020 10
Final recommendations
Inventory your open source components
Create policies for your development and legal teams
to regulate every open source activity in the project
Keep on auditing your open source code regularly to
detect and troubleshoot issues on time
Engage in open source communities
© Хopyright, 1995-2020 11
TETRA
Not confident about the product quality
and wish to scrutinize your open source
components? Go for a large-scale
software project assessment!
The TETRA platform can help you uncover
technical debt and get an in-depth
analysis of code quality, as well as useful
ideas for solving your burning issues.
TM
12
Thank you!
Intetics Inc.
10001 Tamiami Trl N, Suite 114
Naples, Florida 34108
United States
www.intetics.com
intetics@intetics.com
Office: +1-239-217-4907

More Related Content

What's hot

Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
Black Duck by Synopsys
 
Webinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in ReviewWebinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in Review
Synopsys Software Integrity Group
 
OpenChain Automation Case Study - September to December 2021
OpenChain Automation Case Study - September to December 2021OpenChain Automation Case Study - September to December 2021
OpenChain Automation Case Study - September to December 2021
Shane Coughlan
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What?
Synopsys Software Integrity Group
 
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Synopsys Software Integrity Group
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Protecode
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Source Code Control Limited
 
Webinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source LicensingWebinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source Licensing
Synopsys Software Integrity Group
 
Software Audit Strategies - How often is good enough for a software audit?
Software Audit Strategies - How often is good enough for a software audit? Software Audit Strategies - How often is good enough for a software audit?
Software Audit Strategies - How often is good enough for a software audit?
Tiberius Forrester
 
What does open source mean for the institutional web manager?
What does open source mean for the institutional web manager?What does open source mean for the institutional web manager?
What does open source mean for the institutional web manager?
IWMW
 
Exploring Open Source Licensing
Exploring Open Source LicensingExploring Open Source Licensing
Exploring Open Source Licensing
Stefano Fago
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
Synopsys Software Integrity Group
 
Samsung & The Path to Open Source Leadership (OBC)
Samsung & The Path to Open Source Leadership (OBC)Samsung & The Path to Open Source Leadership (OBC)
Samsung & The Path to Open Source Leadership (OBC)
Samsung Open Source Group
 
Why is Open Source Important to Samsung and What Are We Doing About It?
Why is Open Source Important to Samsung and What Are We Doing About It?Why is Open Source Important to Samsung and What Are We Doing About It?
Why is Open Source Important to Samsung and What Are We Doing About It?
Samsung Open Source Group
 
OpenChain Automation Case Study - September to December 2021
OpenChain Automation Case Study - September to December 2021OpenChain Automation Case Study - September to December 2021
OpenChain Automation Case Study - September to December 2021
Shane Coughlan
 
Reliable Engineering for InsurTech StartUps
Reliable Engineering for InsurTech StartUpsReliable Engineering for InsurTech StartUps
Reliable Engineering for InsurTech StartUps
Fortifier. IT Company
 
Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions
Synopsys Software Integrity Group
 
OpenChain Japan Work Group Meeting #18 (Virtual Meeting #5) - Keynote Message
OpenChain Japan Work Group Meeting #18 (Virtual Meeting #5) - Keynote MessageOpenChain Japan Work Group Meeting #18 (Virtual Meeting #5) - Keynote Message
OpenChain Japan Work Group Meeting #18 (Virtual Meeting #5) - Keynote Message
Shane Coughlan
 
Open source technology, freeware drone (by Joris KrĂŒse)
Open source technology, freeware drone (by Joris KrĂŒse)Open source technology, freeware drone (by Joris KrĂŒse)
Open source technology, freeware drone (by Joris KrĂŒse)
Verhaert Masters in Innovation
 
The Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementThe Case for Continuous Open Source Management
The Case for Continuous Open Source Management
Black Duck by Synopsys
 

What's hot (20)

Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
 
Webinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in ReviewWebinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in Review
 
OpenChain Automation Case Study - September to December 2021
OpenChain Automation Case Study - September to December 2021OpenChain Automation Case Study - September to December 2021
OpenChain Automation Case Study - September to December 2021
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What?
 
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the Risk
 
Leveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the RiskLeveraging Open Source Opportunity in the Public Sector Without the Risk
Leveraging Open Source Opportunity in the Public Sector Without the Risk
 
Webinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source LicensingWebinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source Licensing
 
Software Audit Strategies - How often is good enough for a software audit?
Software Audit Strategies - How often is good enough for a software audit? Software Audit Strategies - How often is good enough for a software audit?
Software Audit Strategies - How often is good enough for a software audit?
 
What does open source mean for the institutional web manager?
What does open source mean for the institutional web manager?What does open source mean for the institutional web manager?
What does open source mean for the institutional web manager?
 
Exploring Open Source Licensing
Exploring Open Source LicensingExploring Open Source Licensing
Exploring Open Source Licensing
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 
Samsung & The Path to Open Source Leadership (OBC)
Samsung & The Path to Open Source Leadership (OBC)Samsung & The Path to Open Source Leadership (OBC)
Samsung & The Path to Open Source Leadership (OBC)
 
Why is Open Source Important to Samsung and What Are We Doing About It?
Why is Open Source Important to Samsung and What Are We Doing About It?Why is Open Source Important to Samsung and What Are We Doing About It?
Why is Open Source Important to Samsung and What Are We Doing About It?
 
OpenChain Automation Case Study - September to December 2021
OpenChain Automation Case Study - September to December 2021OpenChain Automation Case Study - September to December 2021
OpenChain Automation Case Study - September to December 2021
 
Reliable Engineering for InsurTech StartUps
Reliable Engineering for InsurTech StartUpsReliable Engineering for InsurTech StartUps
Reliable Engineering for InsurTech StartUps
 
Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions
 
OpenChain Japan Work Group Meeting #18 (Virtual Meeting #5) - Keynote Message
OpenChain Japan Work Group Meeting #18 (Virtual Meeting #5) - Keynote MessageOpenChain Japan Work Group Meeting #18 (Virtual Meeting #5) - Keynote Message
OpenChain Japan Work Group Meeting #18 (Virtual Meeting #5) - Keynote Message
 
Open source technology, freeware drone (by Joris KrĂŒse)
Open source technology, freeware drone (by Joris KrĂŒse)Open source technology, freeware drone (by Joris KrĂŒse)
Open source technology, freeware drone (by Joris KrĂŒse)
 
The Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementThe Case for Continuous Open Source Management
The Case for Continuous Open Source Management
 

Similar to Open source code

Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization
Rogue Wave Software
 
Open Source Software: What Are Your Obligations?
Open Source Software: What Are Your Obligations? Open Source Software: What Are Your Obligations?
Open Source Software: What Are Your Obligations?
Source Code Control Limited
 
How temenos manages open source use, the easy way combined
How temenos manages open source use, the easy way combinedHow temenos manages open source use, the easy way combined
How temenos manages open source use, the easy way combined
WhiteSource
 
Introduction to the proposed EU cyber resilience act (CRA)
Introduction to the proposed EU cyber resilience act (CRA)Introduction to the proposed EU cyber resilience act (CRA)
Introduction to the proposed EU cyber resilience act (CRA)
Olle E Johansson
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
Rogue Wave Software
 
A Comprehensive Breakdown of Low Code, No Code and Traditional Development.pdf
A Comprehensive Breakdown of Low Code, No Code and Traditional Development.pdfA Comprehensive Breakdown of Low Code, No Code and Traditional Development.pdf
A Comprehensive Breakdown of Low Code, No Code and Traditional Development.pdf
Expert App Devs
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
Rogue Wave Software
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
All Things Open
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Synopsys Software Integrity Group
 
Webinar–2019 Open Source Risk Analysis Report
Webinar–2019 Open Source Risk Analysis ReportWebinar–2019 Open Source Risk Analysis Report
Webinar–2019 Open Source Risk Analysis Report
Synopsys Software Integrity Group
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
Paris Open Source Summit
 
Find & fix the flaws in your code
Find & fix the flaws in your codeFind & fix the flaws in your code
Find & fix the flaws in your code
Rogue Wave Software
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle software
Rogue Wave Software
 
Code campiasi scm-project-gabriel-cristescu-ditech
Code campiasi scm-project-gabriel-cristescu-ditechCode campiasi scm-project-gabriel-cristescu-ditech
Code campiasi scm-project-gabriel-cristescu-ditech
Codecamp Romania
 
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
South Tyrol Free Software Conference
 
Winning open source vulnerabilities without loosing your deveopers - Azure De...
Winning open source vulnerabilities without loosing your deveopers - Azure De...Winning open source vulnerabilities without loosing your deveopers - Azure De...
Winning open source vulnerabilities without loosing your deveopers - Azure De...
WhiteSource
 
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black DuckSoftware Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Black Duck by Synopsys
 
Building application security with 0 money down
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money down
DefCamp
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
Rogue Wave Software
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps

Similar to Open source code (20)

Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization
 
Open Source Software: What Are Your Obligations?
Open Source Software: What Are Your Obligations? Open Source Software: What Are Your Obligations?
Open Source Software: What Are Your Obligations?
 
How temenos manages open source use, the easy way combined
How temenos manages open source use, the easy way combinedHow temenos manages open source use, the easy way combined
How temenos manages open source use, the easy way combined
 
Introduction to the proposed EU cyber resilience act (CRA)
Introduction to the proposed EU cyber resilience act (CRA)Introduction to the proposed EU cyber resilience act (CRA)
Introduction to the proposed EU cyber resilience act (CRA)
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
 
A Comprehensive Breakdown of Low Code, No Code and Traditional Development.pdf
A Comprehensive Breakdown of Low Code, No Code and Traditional Development.pdfA Comprehensive Breakdown of Low Code, No Code and Traditional Development.pdf
A Comprehensive Breakdown of Low Code, No Code and Traditional Development.pdf
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
 
Webinar–2019 Open Source Risk Analysis Report
Webinar–2019 Open Source Risk Analysis ReportWebinar–2019 Open Source Risk Analysis Report
Webinar–2019 Open Source Risk Analysis Report
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
 
Find & fix the flaws in your code
Find & fix the flaws in your codeFind & fix the flaws in your code
Find & fix the flaws in your code
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle software
 
Code campiasi scm-project-gabriel-cristescu-ditech
Code campiasi scm-project-gabriel-cristescu-ditechCode campiasi scm-project-gabriel-cristescu-ditech
Code campiasi scm-project-gabriel-cristescu-ditech
 
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
SFScon 2020 - Luisa Romano - Cybersecurity Managers Liability and Use of Open...
 
Winning open source vulnerabilities without loosing your deveopers - Azure De...
Winning open source vulnerabilities without loosing your deveopers - Azure De...Winning open source vulnerabilities without loosing your deveopers - Azure De...
Winning open source vulnerabilities without loosing your deveopers - Azure De...
 
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black DuckSoftware Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
 
Building application security with 0 money down
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money down
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
 

More from Intetics

Examples of Selecting Technology and Designing Architecture.pptx
Examples of Selecting Technology and Designing Architecture.pptxExamples of Selecting Technology and Designing Architecture.pptx
Examples of Selecting Technology and Designing Architecture.pptx
Intetics
 
Mobile app-monetization-intetics-2020
Mobile app-monetization-intetics-2020Mobile app-monetization-intetics-2020
Mobile app-monetization-intetics-2020
Intetics
 
Visual delivery-reconstruction-for-international Finance Centre
Visual delivery-reconstruction-for-international Finance CentreVisual delivery-reconstruction-for-international Finance Centre
Visual delivery-reconstruction-for-international Finance Centre
Intetics
 
Do not even try to be remote without these 6 principles!
Do not even try to be remote without these 6 principles!Do not even try to be remote without these 6 principles!
Do not even try to be remote without these 6 principles!
Intetics
 
The Startup Lifecycle: How to Win at Each Stage
The Startup Lifecycle: How to Win at Each Stage The Startup Lifecycle: How to Win at Each Stage
The Startup Lifecycle: How to Win at Each Stage
Intetics
 
How Centers of Excellence Can Change Your Business?
How Centers of Excellence Can Change Your Business?How Centers of Excellence Can Change Your Business?
How Centers of Excellence Can Change Your Business?
Intetics
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
Intetics
 
Cloud computing infographics
Cloud computing infographicsCloud computing infographics
Cloud computing infographics
Intetics
 
Amazon ĐĄloud Migration
Amazon ĐĄloud MigrationAmazon ĐĄloud Migration
Amazon ĐĄloud Migration
Intetics
 
IoT infographic
IoT infographicIoT infographic
IoT infographic
Intetics
 
Robotic process automation (RPA) Infographic
Robotic process automation (RPA) InfographicRobotic process automation (RPA) Infographic
Robotic process automation (RPA) Infographic
Intetics
 
Industry 4.0 infographic
Industry 4.0 infographicIndustry 4.0 infographic
Industry 4.0 infographic
Intetics
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
Intetics
 
A brief history of software development methodologies
A brief history of software development methodologiesA brief history of software development methodologies
A brief history of software development methodologies
Intetics
 
Tetra technical debt reduction platform
Tetra   technical debt reduction platformTetra   technical debt reduction platform
Tetra technical debt reduction platform
Intetics
 
The future of outsourcing in Belarus and Ukraine
The future of outsourcing in Belarus and UkraineThe future of outsourcing in Belarus and Ukraine
The future of outsourcing in Belarus and Ukraine
Intetics
 
A simple History of a Mobile Phone
A simple History of a Mobile PhoneA simple History of a Mobile Phone
A simple History of a Mobile Phone
Intetics
 
TDD & BDD as efficient practices of software development
TDD & BDD as efficient practices of software developmentTDD & BDD as efficient practices of software development
TDD & BDD as efficient practices of software development
Intetics
 
What is Quality Assurance and why do you need that?
What is Quality Assurance and why do you need that?  What is Quality Assurance and why do you need that?
What is Quality Assurance and why do you need that?
Intetics
 
20 Years of Software Development at Intetics Inc
20 Years of Software Development at Intetics Inc20 Years of Software Development at Intetics Inc
20 Years of Software Development at Intetics Inc
Intetics
 

More from Intetics (20)

Examples of Selecting Technology and Designing Architecture.pptx
Examples of Selecting Technology and Designing Architecture.pptxExamples of Selecting Technology and Designing Architecture.pptx
Examples of Selecting Technology and Designing Architecture.pptx
 
Mobile app-monetization-intetics-2020
Mobile app-monetization-intetics-2020Mobile app-monetization-intetics-2020
Mobile app-monetization-intetics-2020
 
Visual delivery-reconstruction-for-international Finance Centre
Visual delivery-reconstruction-for-international Finance CentreVisual delivery-reconstruction-for-international Finance Centre
Visual delivery-reconstruction-for-international Finance Centre
 
Do not even try to be remote without these 6 principles!
Do not even try to be remote without these 6 principles!Do not even try to be remote without these 6 principles!
Do not even try to be remote without these 6 principles!
 
The Startup Lifecycle: How to Win at Each Stage
The Startup Lifecycle: How to Win at Each Stage The Startup Lifecycle: How to Win at Each Stage
The Startup Lifecycle: How to Win at Each Stage
 
How Centers of Excellence Can Change Your Business?
How Centers of Excellence Can Change Your Business?How Centers of Excellence Can Change Your Business?
How Centers of Excellence Can Change Your Business?
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
Cloud computing infographics
Cloud computing infographicsCloud computing infographics
Cloud computing infographics
 
Amazon ĐĄloud Migration
Amazon ĐĄloud MigrationAmazon ĐĄloud Migration
Amazon ĐĄloud Migration
 
IoT infographic
IoT infographicIoT infographic
IoT infographic
 
Robotic process automation (RPA) Infographic
Robotic process automation (RPA) InfographicRobotic process automation (RPA) Infographic
Robotic process automation (RPA) Infographic
 
Industry 4.0 infographic
Industry 4.0 infographicIndustry 4.0 infographic
Industry 4.0 infographic
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
A brief history of software development methodologies
A brief history of software development methodologiesA brief history of software development methodologies
A brief history of software development methodologies
 
Tetra technical debt reduction platform
Tetra   technical debt reduction platformTetra   technical debt reduction platform
Tetra technical debt reduction platform
 
The future of outsourcing in Belarus and Ukraine
The future of outsourcing in Belarus and UkraineThe future of outsourcing in Belarus and Ukraine
The future of outsourcing in Belarus and Ukraine
 
A simple History of a Mobile Phone
A simple History of a Mobile PhoneA simple History of a Mobile Phone
A simple History of a Mobile Phone
 
TDD & BDD as efficient practices of software development
TDD & BDD as efficient practices of software developmentTDD & BDD as efficient practices of software development
TDD & BDD as efficient practices of software development
 
What is Quality Assurance and why do you need that?
What is Quality Assurance and why do you need that?  What is Quality Assurance and why do you need that?
What is Quality Assurance and why do you need that?
 
20 Years of Software Development at Intetics Inc
20 Years of Software Development at Intetics Inc20 Years of Software Development at Intetics Inc
20 Years of Software Development at Intetics Inc
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
みăȘă•ă‚“ă“ă‚“ă«ăĄăŻă“ă‚Œäœ•æ–‡ć­—ăŸă§ć…„ă‚‹ăźïŒŸ40æ–‡ć­—ä»„äž‹äžćŻăšă‹æœŹćœ“ă«æ„ć‘łă‚ă‹ă‚‰ăȘă„ă‘ă©ă“ă‚Œé™ç•Œæ–‡ć­—æ•°æ›žă„ăŠăȘă„ă‹ă‚‰ăƒžă‚žă§ă‚„ă°ă„æ–‡ć­—æ•°ă„ă‘ă‚‹ă‚“ă˜ă‚ƒăȘă„ăźïŒŸăˆă“...
みăȘă•ă‚“ă“ă‚“ă«ăĄăŻă“ă‚Œäœ•æ–‡ć­—ăŸă§ć…„ă‚‹ăźïŒŸ40æ–‡ć­—ä»„äž‹äžćŻăšă‹æœŹćœ“ă«æ„ć‘łă‚ă‹ă‚‰ăȘă„ă‘ă©ă“ă‚Œé™ç•Œæ–‡ć­—æ•°æ›žă„ăŠăȘă„ă‹ă‚‰ăƒžă‚žă§ă‚„ă°ă„æ–‡ć­—æ•°ă„ă‘ă‚‹ă‚“ă˜ă‚ƒăȘă„ăźïŒŸăˆă“...みăȘă•ă‚“ă“ă‚“ă«ăĄăŻă“ă‚Œäœ•æ–‡ć­—ăŸă§ć…„ă‚‹ăźïŒŸ40æ–‡ć­—ä»„äž‹äžćŻăšă‹æœŹćœ“ă«æ„ć‘łă‚ă‹ă‚‰ăȘă„ă‘ă©ă“ă‚Œé™ç•Œæ–‡ć­—æ•°æ›žă„ăŠăȘă„ă‹ă‚‰ăƒžă‚žă§ă‚„ă°ă„æ–‡ć­—æ•°ă„ă‘ă‚‹ă‚“ă˜ă‚ƒăȘă„ăźïŒŸăˆă“...
みăȘă•ă‚“ă“ă‚“ă«ăĄăŻă“ă‚Œäœ•æ–‡ć­—ăŸă§ć…„ă‚‹ăźïŒŸ40æ–‡ć­—ä»„äž‹äžćŻăšă‹æœŹćœ“ă«æ„ć‘łă‚ă‹ă‚‰ăȘă„ă‘ă©ă“ă‚Œé™ç•Œæ–‡ć­—æ•°æ›žă„ăŠăȘă„ă‹ă‚‰ăƒžă‚žă§ă‚„ă°ă„æ–‡ć­—æ•°ă„ă‘ă‚‹ă‚“ă˜ă‚ƒăȘă„ăźïŒŸăˆă“...
損才 です男
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
みăȘă•ă‚“ă“ă‚“ă«ăĄăŻă“ă‚Œäœ•æ–‡ć­—ăŸă§ć…„ă‚‹ăźïŒŸ40æ–‡ć­—ä»„äž‹äžćŻăšă‹æœŹćœ“ă«æ„ć‘łă‚ă‹ă‚‰ăȘă„ă‘ă©ă“ă‚Œé™ç•Œæ–‡ć­—æ•°æ›žă„ăŠăȘă„ă‹ă‚‰ăƒžă‚žă§ă‚„ă°ă„æ–‡ć­—æ•°ă„ă‘ă‚‹ă‚“ă˜ă‚ƒăȘă„ăźïŒŸăˆă“...
みăȘă•ă‚“ă“ă‚“ă«ăĄăŻă“ă‚Œäœ•æ–‡ć­—ăŸă§ć…„ă‚‹ăźïŒŸ40æ–‡ć­—ä»„äž‹äžćŻăšă‹æœŹćœ“ă«æ„ć‘łă‚ă‹ă‚‰ăȘă„ă‘ă©ă“ă‚Œé™ç•Œæ–‡ć­—æ•°æ›žă„ăŠăȘă„ă‹ă‚‰ăƒžă‚žă§ă‚„ă°ă„æ–‡ć­—æ•°ă„ă‘ă‚‹ă‚“ă˜ă‚ƒăȘă„ăźïŒŸăˆă“...みăȘă•ă‚“ă“ă‚“ă«ăĄăŻă“ă‚Œäœ•æ–‡ć­—ăŸă§ć…„ă‚‹ăźïŒŸ40æ–‡ć­—ä»„äž‹äžćŻăšă‹æœŹćœ“ă«æ„ć‘łă‚ă‹ă‚‰ăȘă„ă‘ă©ă“ă‚Œé™ç•Œæ–‡ć­—æ•°æ›žă„ăŠăȘă„ă‹ă‚‰ăƒžă‚žă§ă‚„ă°ă„æ–‡ć­—æ•°ă„ă‘ă‚‹ă‚“ă˜ă‚ƒăȘă„ăźïŒŸăˆă“...
みăȘă•ă‚“ă“ă‚“ă«ăĄăŻă“ă‚Œäœ•æ–‡ć­—ăŸă§ć…„ă‚‹ăźïŒŸ40æ–‡ć­—ä»„äž‹äžćŻăšă‹æœŹćœ“ă«æ„ć‘łă‚ă‹ă‚‰ăȘă„ă‘ă©ă“ă‚Œé™ç•Œæ–‡ć­—æ•°æ›žă„ăŠăȘă„ă‹ă‚‰ăƒžă‚žă§ă‚„ă°ă„æ–‡ć­—æ•°ă„ă‘ă‚‹ă‚“ă˜ă‚ƒăȘă„ăźïŒŸăˆă“...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 

Open source code

  • 1. Intetics Inc. www.intetics.com intetics@intetics.com Office: +1-239-217-4907 Open Source Code In Product Development Best Practices And Risk Mitigation
  • 2. © ĐĄopyright, 1995-2020 2 Modern software development involves the increased use of open source code 72% of organizations make non- commercial use of open source code and 55% use it for commercial product development But it’s crucial to make sure every component is well scrutinized before it’s integrated into your project Open source code in product development
  • 3. © ĐĄopyright, 1995-2020 3 3 key problems related to the use of open source code Violation of license agreement for commercial uses Use of outdated open source components causing vulnerability risks Use of libraries without community support How to manage these issues?
  • 4. © ĐĄopyright, 1995-2020 4 Problem 1 – Violation of license agreement for commercial uses Using unlicensed open source сode is unsafe. You might end up violating intellectual property rights or bringing security vulnerabilities and risks into your project, which can translate into financial and legal consequences.
  • 5. © ĐĄopyright, 1995-2020 5 1 Document the use of all third-party resources on the project Although it requires time and resources, you get to know where all your open source elements come from. 2 Import libraries only after getting approval from the project tech lead Solution - Watch out for hidden inconsistencies
  • 6. © ĐĄopyright, 1995-2020 6 Problem 2 – Use of libraries without community support A lot of open source code libraries might often fail to comply with security standards, work incorrectly with other open source components, be out-of-date or have no license at all.
  • 7. © ĐĄopyright, 1995-2020 7 1 Start with scrutinizing the library component you need: сheck its license, source and version before you use it. 2 Try to only use libraries from official sites, and if possible, do not import code manually Solution - Check the origin of the libraries you use
  • 8. © ĐĄopyright, 1995-2020 Problem 3 – Use of outdated open source components causing vulnerability risks 91% of product development projects use outdated open source components, thus jeopardizing project security significantly. 82% of codebases have four-year-old parts and 88% have had no add-ons during the last two years. 8
  • 9. © ĐĄopyright, 1995-2020 9 Solution - Track the software versions you use 1 Be sure the software you use is brand new and receives vendor support and upgrades In case you work with different frameworks, check that all libraries work together correctly. 2 Choose automated open source code assessment tools to verify the relevance of code elements A top-notch tool automatically tracks possible vulnerabilities in open source code and spots issues on time.
  • 10. © ĐĄopyright, 1995-2020 10 Final recommendations Inventory your open source components Create policies for your development and legal teams to regulate every open source activity in the project Keep on auditing your open source code regularly to detect and troubleshoot issues on time Engage in open source communities
  • 11. © ĐĄopyright, 1995-2020 11 TETRA Not confident about the product quality and wish to scrutinize your open source components? Go for a large-scale software project assessment! The TETRA platform can help you uncover technical debt and get an in-depth analysis of code quality, as well as useful ideas for solving your burning issues. TM
  • 12. 12 Thank you! Intetics Inc. 10001 Tamiami Trl N, Suite 114 Naples, Florida 34108 United States www.intetics.com intetics@intetics.com Office: +1-239-217-4907