SlideShare a Scribd company logo
Rookies Candidates by Category
Project Backing
Sponsored [22%]
Commercial [37%]
Community [41%]
Project Focus
VNF Orchestration [2%]
Connected/Autonomous Vehicles [5%]
Application Security [5%]
Communications Tools [5%]
Augmented Reality [5%]
Speech Recognition & AI [5%]
Civil Enablement & Security [7%]
Data Collection/Management [15%]
Blockchain & Cryptocurrency [22%]
Application Lifecycle Tools [29%]
This year, community members took center stage.
Some projects’ strategic decisions and technological
priorities were determined by the masses, while other
projects intended to foster innovation atop a
communal technology foundation.
Australia | Austria | Belgium | Brazil | Canada | China
Czech Republic | France | Germany | Greenland | India
Indonesia | Ireland | Italy | Japan | Malaysia | Netherlands
Philippines | Portugal | Romania | Russia | Singapore | South Korea
Spain | Sweden | Switzerland | Tunisia | Turkey | UK | USA
Rookies Candidates are Global
Rookies join together from around the
world to build groundbreaking projects.
Open Source Community Activity
Projects became
Rookies candidates48
7 Winners
Projects started in 2017
across major repositories
78,918
The Synopsys difference
Synopsys helps development teams build secure, high-quality software, minimizing risks while
maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software
composition analysis, and application security testing, is uniquely positioned to apply best
practices across proprietary code, open source, and the runtime environment. With a combination
of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize
security and quality in DevSecOps and throughout the software development life cycle.
For more information go to www.synopsys.com/software
"Common Voice is inviting everyone
globally to participate: not only to
improve the quality of speech
recognition and foster innovation in
the space but also to make it truly
inclusive, reflecting the diversity of
voices around the world."
— Katharina Borchert,
Chief Open Innovation Officer, Mozilla
"Haven would not exist without the
foundational open-source code and
knowledge shared before us, and the
amazing contributions since we
launched."
— Nathan Freitas,
Director, Guardian Project
"With hundreds of contributions in
just a few months, the community is
not just supporting the creation of a
tool that makes people's lives better;
they're making it possible."
— Regis Freyd,
Founder, Monica

More Related Content

What's hot

Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
3G4G
 
Is Code from Mars and Policy from Venus?
Is Code from Mars and Policy from Venus?Is Code from Mars and Policy from Venus?
Is Code from Mars and Policy from Venus?
Jed Miller
 
Red Hat Summit, World IP Day, and the new OWASP Top 10
Red Hat Summit, World IP Day,  and the new OWASP Top 10Red Hat Summit, World IP Day,  and the new OWASP Top 10
Red Hat Summit, World IP Day, and the new OWASP Top 10
Black Duck by Synopsys
 
Cognitive computing in the digital health era - Federico Neri
Cognitive computing in the digital health era - Federico NeriCognitive computing in the digital health era - Federico Neri
Cognitive computing in the digital health era - Federico Neri
Data Driven Innovation
 
Grounding Conversational AI in a Knowledge Base
Grounding Conversational AI in a Knowledge BaseGrounding Conversational AI in a Knowledge Base
Grounding Conversational AI in a Knowledge Base
Vaticle
 
RisingStarsOfCybersecurity
RisingStarsOfCybersecurityRisingStarsOfCybersecurity
RisingStarsOfCybersecurityIndy Dh
 
iDate: AI and blockchain
iDate: AI and blockchainiDate: AI and blockchain
iDate: AI and blockchain
3G4G
 
From TRL to MRL: Assessing Open Source Project Market Readiness, Cédric Thoma...
From TRL to MRL: Assessing Open Source Project Market Readiness, Cédric Thoma...From TRL to MRL: Assessing Open Source Project Market Readiness, Cédric Thoma...
From TRL to MRL: Assessing Open Source Project Market Readiness, Cédric Thoma...
OW2
 
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
FinTech Belgium
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT Security
Bill Harpley
 
SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...
SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...
SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...
South Tyrol Free Software Conference
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
Anchises Moraes
 
Kijiji 160616
Kijiji 160616Kijiji 160616
Kijiji 160616
Carlos Chalico
 
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web ApplicationWeb Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
Eryk Budi Pratama
 
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
IDC Italy
 
Rapid Prototyping for IoT
Rapid Prototyping for IoT Rapid Prototyping for IoT
Rapid Prototyping for IoT
M2M Alliance e.V.
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the sky
Carlos Chalico
 
The Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive AdvantageThe Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive Advantage
IDC Italy
 
Gsc mstf m_koster_atlanta_may_7_2013_rev1.1
Gsc mstf m_koster_atlanta_may_7_2013_rev1.1Gsc mstf m_koster_atlanta_may_7_2013_rev1.1
Gsc mstf m_koster_atlanta_may_7_2013_rev1.1
Michael Koster
 

What's hot (19)

Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
 
Is Code from Mars and Policy from Venus?
Is Code from Mars and Policy from Venus?Is Code from Mars and Policy from Venus?
Is Code from Mars and Policy from Venus?
 
Red Hat Summit, World IP Day, and the new OWASP Top 10
Red Hat Summit, World IP Day,  and the new OWASP Top 10Red Hat Summit, World IP Day,  and the new OWASP Top 10
Red Hat Summit, World IP Day, and the new OWASP Top 10
 
Cognitive computing in the digital health era - Federico Neri
Cognitive computing in the digital health era - Federico NeriCognitive computing in the digital health era - Federico Neri
Cognitive computing in the digital health era - Federico Neri
 
Grounding Conversational AI in a Knowledge Base
Grounding Conversational AI in a Knowledge BaseGrounding Conversational AI in a Knowledge Base
Grounding Conversational AI in a Knowledge Base
 
RisingStarsOfCybersecurity
RisingStarsOfCybersecurityRisingStarsOfCybersecurity
RisingStarsOfCybersecurity
 
iDate: AI and blockchain
iDate: AI and blockchainiDate: AI and blockchain
iDate: AI and blockchain
 
From TRL to MRL: Assessing Open Source Project Market Readiness, Cédric Thoma...
From TRL to MRL: Assessing Open Source Project Market Readiness, Cédric Thoma...From TRL to MRL: Assessing Open Source Project Market Readiness, Cédric Thoma...
From TRL to MRL: Assessing Open Source Project Market Readiness, Cédric Thoma...
 
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT Security
 
SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...
SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...
SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
Kijiji 160616
Kijiji 160616Kijiji 160616
Kijiji 160616
 
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web ApplicationWeb Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
 
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
 
Rapid Prototyping for IoT
Rapid Prototyping for IoT Rapid Prototyping for IoT
Rapid Prototyping for IoT
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the sky
 
The Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive AdvantageThe Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive Advantage
 
Gsc mstf m_koster_atlanta_may_7_2013_rev1.1
Gsc mstf m_koster_atlanta_may_7_2013_rev1.1Gsc mstf m_koster_atlanta_may_7_2013_rev1.1
Gsc mstf m_koster_atlanta_may_7_2013_rev1.1
 

Similar to Open Source Rookies and Community

Company overview
Company overviewCompany overview
Company overview
DynamizeIT
 
Open Source Software: Perspectives for Development (World Bank & Paul Dravis)
Open Source Software: Perspectives for Development (World Bank & Paul Dravis)Open Source Software: Perspectives for Development (World Bank & Paul Dravis)
Open Source Software: Perspectives for Development (World Bank & Paul Dravis)
Paul Dravis
 
Case Study Chordiant
Case Study ChordiantCase Study Chordiant
Case Study ChordiantAmanda Shenon
 
Solutions to Develop Applications for Greater Impact in the Communities Serve...
Solutions to Develop Applications for Greater Impact in the Communities Serve...Solutions to Develop Applications for Greater Impact in the Communities Serve...
Solutions to Develop Applications for Greater Impact in the Communities Serve...
tistalks
 
Research Software Sustainability takes a Village
Research Software Sustainability takes a VillageResearch Software Sustainability takes a Village
Research Software Sustainability takes a Village
Carole Goble
 
Hyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for BusinessHyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for Business
Cloud Standards Customer Council
 
FINOS June 2018 Members Meeting - Welcome and Introduction - Gabriele Columbro
FINOS June 2018 Members Meeting - Welcome and Introduction - Gabriele ColumbroFINOS June 2018 Members Meeting - Welcome and Introduction - Gabriele Columbro
FINOS June 2018 Members Meeting - Welcome and Introduction - Gabriele Columbro
FINOS
 
Gephi Consortium Presentation
Gephi Consortium PresentationGephi Consortium Presentation
Gephi Consortium PresentationGephi Consortium
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
YashikaSharma391629
 
2019-03 - An introduction to FINOS
2019-03 - An introduction to FINOS2019-03 - An introduction to FINOS
2019-03 - An introduction to FINOS
FINOS
 
Oseli seville-monday
Oseli seville-mondayOseli seville-monday
Oseli seville-monday
Serge Gladkoff
 
InSTEDD - Introductions for PACT Myanmar Mobile
InSTEDD - Introductions for PACT Myanmar MobileInSTEDD - Introductions for PACT Myanmar Mobile
InSTEDD - Introductions for PACT Myanmar Mobile
Eduardo Jezierski
 
Organization culture
Organization cultureOrganization culture
Organization culture
kishankumar387
 
Netmust
Netmust Netmust
Rockefeller tsg meeting 27_may2012_fnl
Rockefeller tsg meeting 27_may2012_fnlRockefeller tsg meeting 27_may2012_fnl
Rockefeller tsg meeting 27_may2012_fnl
DaraWestling
 
Social Networking in Government
Social Networking in GovernmentSocial Networking in Government
Social Networking in Government
Albert Simard
 
Cultivating Sustainable Software For Research
Cultivating Sustainable Software For ResearchCultivating Sustainable Software For Research
Cultivating Sustainable Software For Research
Neil Chue Hong
 
Neutrinos introductions v1.2 240718
Neutrinos   introductions v1.2 240718Neutrinos   introductions v1.2 240718
Neutrinos introductions v1.2 240718
Daya Virasamy
 
The Internet of Things & Open Data: New forms of business?
The Internet of Things & Open Data: New forms of business?The Internet of Things & Open Data: New forms of business?
The Internet of Things & Open Data: New forms of business?Paris Open Source Summit
 
Building an Equitable Tech Future - By ThoughtWorks Brisbane
Building an Equitable Tech Future - By ThoughtWorks BrisbaneBuilding an Equitable Tech Future - By ThoughtWorks Brisbane
Building an Equitable Tech Future - By ThoughtWorks Brisbane
Thoughtworks
 

Similar to Open Source Rookies and Community (20)

Company overview
Company overviewCompany overview
Company overview
 
Open Source Software: Perspectives for Development (World Bank & Paul Dravis)
Open Source Software: Perspectives for Development (World Bank & Paul Dravis)Open Source Software: Perspectives for Development (World Bank & Paul Dravis)
Open Source Software: Perspectives for Development (World Bank & Paul Dravis)
 
Case Study Chordiant
Case Study ChordiantCase Study Chordiant
Case Study Chordiant
 
Solutions to Develop Applications for Greater Impact in the Communities Serve...
Solutions to Develop Applications for Greater Impact in the Communities Serve...Solutions to Develop Applications for Greater Impact in the Communities Serve...
Solutions to Develop Applications for Greater Impact in the Communities Serve...
 
Research Software Sustainability takes a Village
Research Software Sustainability takes a VillageResearch Software Sustainability takes a Village
Research Software Sustainability takes a Village
 
Hyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for BusinessHyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for Business
 
FINOS June 2018 Members Meeting - Welcome and Introduction - Gabriele Columbro
FINOS June 2018 Members Meeting - Welcome and Introduction - Gabriele ColumbroFINOS June 2018 Members Meeting - Welcome and Introduction - Gabriele Columbro
FINOS June 2018 Members Meeting - Welcome and Introduction - Gabriele Columbro
 
Gephi Consortium Presentation
Gephi Consortium PresentationGephi Consortium Presentation
Gephi Consortium Presentation
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
2019-03 - An introduction to FINOS
2019-03 - An introduction to FINOS2019-03 - An introduction to FINOS
2019-03 - An introduction to FINOS
 
Oseli seville-monday
Oseli seville-mondayOseli seville-monday
Oseli seville-monday
 
InSTEDD - Introductions for PACT Myanmar Mobile
InSTEDD - Introductions for PACT Myanmar MobileInSTEDD - Introductions for PACT Myanmar Mobile
InSTEDD - Introductions for PACT Myanmar Mobile
 
Organization culture
Organization cultureOrganization culture
Organization culture
 
Netmust
Netmust Netmust
Netmust
 
Rockefeller tsg meeting 27_may2012_fnl
Rockefeller tsg meeting 27_may2012_fnlRockefeller tsg meeting 27_may2012_fnl
Rockefeller tsg meeting 27_may2012_fnl
 
Social Networking in Government
Social Networking in GovernmentSocial Networking in Government
Social Networking in Government
 
Cultivating Sustainable Software For Research
Cultivating Sustainable Software For ResearchCultivating Sustainable Software For Research
Cultivating Sustainable Software For Research
 
Neutrinos introductions v1.2 240718
Neutrinos   introductions v1.2 240718Neutrinos   introductions v1.2 240718
Neutrinos introductions v1.2 240718
 
The Internet of Things & Open Data: New forms of business?
The Internet of Things & Open Data: New forms of business?The Internet of Things & Open Data: New forms of business?
The Internet of Things & Open Data: New forms of business?
 
Building an Equitable Tech Future - By ThoughtWorks Brisbane
Building an Equitable Tech Future - By ThoughtWorks BrisbaneBuilding an Equitable Tech Future - By ThoughtWorks Brisbane
Building an Equitable Tech Future - By ThoughtWorks Brisbane
 

More from Black Duck by Synopsys

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
Black Duck by Synopsys
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
Black Duck by Synopsys
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
Black Duck by Synopsys
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Black Duck by Synopsys
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Black Duck by Synopsys
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Black Duck by Synopsys
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Black Duck by Synopsys
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Black Duck by Synopsys
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Black Duck by Synopsys
 
20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security
Black Duck by Synopsys
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Black Duck by Synopsys
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Black Duck by Synopsys
 

More from Black Duck by Synopsys (20)

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

Open Source Rookies and Community

  • 1. Rookies Candidates by Category Project Backing Sponsored [22%] Commercial [37%] Community [41%] Project Focus VNF Orchestration [2%] Connected/Autonomous Vehicles [5%] Application Security [5%] Communications Tools [5%] Augmented Reality [5%] Speech Recognition & AI [5%] Civil Enablement & Security [7%] Data Collection/Management [15%] Blockchain & Cryptocurrency [22%] Application Lifecycle Tools [29%] This year, community members took center stage. Some projects’ strategic decisions and technological priorities were determined by the masses, while other projects intended to foster innovation atop a communal technology foundation. Australia | Austria | Belgium | Brazil | Canada | China Czech Republic | France | Germany | Greenland | India Indonesia | Ireland | Italy | Japan | Malaysia | Netherlands Philippines | Portugal | Romania | Russia | Singapore | South Korea Spain | Sweden | Switzerland | Tunisia | Turkey | UK | USA Rookies Candidates are Global Rookies join together from around the world to build groundbreaking projects. Open Source Community Activity Projects became Rookies candidates48 7 Winners Projects started in 2017 across major repositories 78,918 The Synopsys difference Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle. For more information go to www.synopsys.com/software "Common Voice is inviting everyone globally to participate: not only to improve the quality of speech recognition and foster innovation in the space but also to make it truly inclusive, reflecting the diversity of voices around the world." — Katharina Borchert, Chief Open Innovation Officer, Mozilla "Haven would not exist without the foundational open-source code and knowledge shared before us, and the amazing contributions since we launched." — Nathan Freitas, Director, Guardian Project "With hundreds of contributions in just a few months, the community is not just supporting the creation of a tool that makes people's lives better; they're making it possible." — Regis Freyd, Founder, Monica