If you believe the myth, “OSS is free so I don’t have any license obligations,” then you may want to reconsider how you approach your risks. Taking time to learn common mistakes made by developers can save your company costly expenses and slipups.
Identifying and managing the risks of open source software for PHP developersRogue Wave Software
Do you really need to worry about using open source software in developing commercial applications? This presentation looks at the key risk areas, how to identify and quantify the risk, and what steps if any are needed to deal with the risks.
This presentation shows how technology evolution has allowed syndicate criminals to become organised criminal “corporations”. How the evolution of hacking and the cyber world is putting our society at risk.
(2017) GDPR – What Does It Mean For The Mainframe v0.2Rui Miguel Feio
In this session Rui will explain what the General Data Protection Regulation (GDPR) is and what the implications are for the mainframe. Get your mainframe ready and compliant with the GDPR before it comes to effect on May 25th, 2018.
OSS has taken over the enterprise: The top five OSS trends of 2015Rogue Wave Software
It’s everywhere. From your phone to the enterprise, open source software (OSS) is running far and wide. Gartner predicts that by 2016, 99 percent of Global 2000 enterprises will use open source in mission-critical software. While it’s free, easy to find, and pushes software to the market faster, it’s vital to understand how to use OSS safely.
Join Richard Sherrard, director of product management at Rogue Wave, for a live webinar reviewing the top five OSS trends of 2015. From OSS discovery, to risk, and governance, we’ll take a deep dive into the trends we’ve noticed this year while providing you with some predictions for 2016.
In this webinar you’ll learn how to:
-Discover the OSS in your codebase to ensure that code is free of bugs, security vulnerabilities, and license conflicts
-Implement controls on OSS usage at your organization
-Create a multi-tier approach to OSS risk reduction with open source tools, static code analysis and dynamic analysis
Watch the webinar recording now: https://www.brighttalk.com/webcast/12285/164531
Related OSS Projects - Peter Rowe, Flexera SoftwareOpenStack
Audience Level
Intermediate
Synopsis
Today’s fast-paced development environment has changed the compliance landscape. Many software projects consist of more than 50% Open Source Software (OSS) components, but as much as 99% are undocumented, increasing the complexities of managing your company’s software compliance process.
Of particular concern is “Zombie software”, or software that is outdated and contains vulnerable versions of certain components. Zombies can live in your code forever if you’re not aware of them. The acceleration of modern development lifecycles and the breakdown of an undocumented software supply chain have opened up new pathways for zombies to enter your software – leaving you exposed to security threats.
This presentation discusses best practices for implementing an Open Source Software management strategy that covers common pitfalls and commercial licence issues as well as the optimal way to track and eliminate the risks associated with Zombies!
Speaker Bio:
Involved in and around IT development for over 20 years, starting as a web developer using NotePad in 1995 when the most exciting thing online was Sun’s animated Java coffee cup, through Numega Pre-Sales selling BoundsChecker and now into the brave, new World of Open Source and software composition analysis.
Identifying and managing the risks of open source software for PHP developersRogue Wave Software
Do you really need to worry about using open source software in developing commercial applications? This presentation looks at the key risk areas, how to identify and quantify the risk, and what steps if any are needed to deal with the risks.
This presentation shows how technology evolution has allowed syndicate criminals to become organised criminal “corporations”. How the evolution of hacking and the cyber world is putting our society at risk.
(2017) GDPR – What Does It Mean For The Mainframe v0.2Rui Miguel Feio
In this session Rui will explain what the General Data Protection Regulation (GDPR) is and what the implications are for the mainframe. Get your mainframe ready and compliant with the GDPR before it comes to effect on May 25th, 2018.
OSS has taken over the enterprise: The top five OSS trends of 2015Rogue Wave Software
It’s everywhere. From your phone to the enterprise, open source software (OSS) is running far and wide. Gartner predicts that by 2016, 99 percent of Global 2000 enterprises will use open source in mission-critical software. While it’s free, easy to find, and pushes software to the market faster, it’s vital to understand how to use OSS safely.
Join Richard Sherrard, director of product management at Rogue Wave, for a live webinar reviewing the top five OSS trends of 2015. From OSS discovery, to risk, and governance, we’ll take a deep dive into the trends we’ve noticed this year while providing you with some predictions for 2016.
In this webinar you’ll learn how to:
-Discover the OSS in your codebase to ensure that code is free of bugs, security vulnerabilities, and license conflicts
-Implement controls on OSS usage at your organization
-Create a multi-tier approach to OSS risk reduction with open source tools, static code analysis and dynamic analysis
Watch the webinar recording now: https://www.brighttalk.com/webcast/12285/164531
Related OSS Projects - Peter Rowe, Flexera SoftwareOpenStack
Audience Level
Intermediate
Synopsis
Today’s fast-paced development environment has changed the compliance landscape. Many software projects consist of more than 50% Open Source Software (OSS) components, but as much as 99% are undocumented, increasing the complexities of managing your company’s software compliance process.
Of particular concern is “Zombie software”, or software that is outdated and contains vulnerable versions of certain components. Zombies can live in your code forever if you’re not aware of them. The acceleration of modern development lifecycles and the breakdown of an undocumented software supply chain have opened up new pathways for zombies to enter your software – leaving you exposed to security threats.
This presentation discusses best practices for implementing an Open Source Software management strategy that covers common pitfalls and commercial licence issues as well as the optimal way to track and eliminate the risks associated with Zombies!
Speaker Bio:
Involved in and around IT development for over 20 years, starting as a web developer using NotePad in 1995 when the most exciting thing online was Sun’s animated Java coffee cup, through Numega Pre-Sales selling BoundsChecker and now into the brave, new World of Open Source and software composition analysis.
Are open source and embedded software development on a collision course?Rogue Wave Software
Presented at Embedded Systems Conference (ESC) Minneapolis 2018, this session discusses the most effective uses of open source software; how to maintain MISRA, CWE, OWASP, and other standards compliance across all code sources; how to avoid license risk; and reduce critical safety and security issues.
Software development organizations are using open source software at an unprecedented scale to build better software faster. Yet while the adoption of open source races ahead, the establishment of policies to govern its use lag far behind. According to Gartner Group, only a minority of IT organizations have established, open-source governance policies in place, and it predicts that by 2014, 50% of Global 2000 organizations will experience technology, cost and security challenges through lack of open-source governance.
In this Webinar, Greg Olson, Senior Strategy Consultant with Olliance Group, a Black Duck company, will explain:
--The four steps to create an open source policy
--How to obtain ‘buy-in’ and support from key stakeholders
--Best practices for rolling out an open source policy in your organization
On the path to innovation, development teams fear nothing but try to avoid three things: Re-work, lawyers, and, missing deadlines. In this presentation, Rod Cope will discuss what to do when software is not license compliant, to help avoid lawyers getting involved, disrupting schedules and potential architectural or code changes.
There are hundreds of open source licenses. Most developers don't take the time to read or understand them, but can you continue to ignore them? We have seen a rise in litigation around open source license over the last 10 years. And, in the last 12 months we have seen the first examples of OSS copyright trolls that are taking developers to court in an attempt to monetize GPL violations.
This presentation covers: How OSS licenses are enforced;
What are the main types of OSS licenses; How to identify them;
and what steps you need to take to ensure you are complying.
We cover use case scenarios and do a "deep dive" on the most used licenses today and how to understand them
How to keep developers happy and lawyers calm (Presented at ESC Boston)Rogue Wave Software
On the path to innovation, development teams fear nothing but try to avoid three things: Re-work, lawyers, and, missing deadlines. In this talk, Rod Cope will discuss what to do when software is not license compliant, to help avoid lawyers getting involved, disrupting schedules and potential architectural or code changes.
The initial step in helping make sure teams are in compliance with open source licenses is education.
The goal is to provide concrete steps towards development teams adopting a vested interest in paying attention to what open source they download and how it's used.
When something goes wrong in your software, you fix it. When something is wrong in an OSS package you’re beholden to community fixes and web search - neither cares about your needs or your timeline.
In this webinar, our director of product management and OSS expert, Richard Sherrard, examines: How to know exactly what packages are used in your company; Specific technical, security, and licensing hurdles that many organizations face; and
What “free” actually means when it comes to OSS.
Strategies for Commercial Software Developers Using Open Source Code in Propr...Mary Lou Wakimura
Commercial software developers are often drawn to open source code to help deliver a low cost and flexible product that can quickly be brought to market. While there are benefits, there are also risks and pitfalls. With the growth and influence of free software licensing, some have been asserting the General Public License (GPL) violations in litigation to attempt to gain an advantage. Please join us as we explore these issues and discuss strategies to protect your product from litigation and to evaluate whether your new product will be strengthened or weakened by the integration of open source software, and in particular the GPL.
Gain insight into:
- Reach of the influential free software license GPL;
- Emerging risk of copyright trolls in open source;
- Risk of Free Software Foundation sponsored litigation in response to GPL violations;
- Contours of what constitutes a derivative work employing Linux code in the context of the GPL; and
- Lessons learned from the Hellwig vs. VMware case.
Implementing and Managing an Open Source Compliance Program: A Crash CourseFINOS
Ibrahim Haddad, Samsung Research America: Implementing and Managing an Open Source Compliance Program: A Crash Course.
The past decade has witnessed an unprecedented adoption of open source software by enterprises for the various advantages it offers. This massive adoption of open source software came with legal and compliance responsibilities. Enterprises and development organizations have since then started establishing policies around open source usage (and contribution), and implementing engineering development processes to insure that software products that deploy are in compliance. This presentation provides a guide to doing compliance the right way (one of many) with an overview on setting up an open source compliance program and institutionalizing best practices.
Course Outline (subject to change based on time allocation)
• Overview of open source compliance
• Failure to comply
• Lessons learned from non compliance cases
• Overview of the compliance program
• Compliance challenges and solutions
• Achieving compliance: roles and responsibilities
• Sample compliance process
• Tools and automation
• Responding to compliance inquiries
Audience
Anyone involved in bringing software into the organization and anyone involved in developing and distributing products or interfacing with customers, including
• Corporate Management
• Engineering
• Product Management, Project Management, and Process Management
• Testing, Quality Assurance, Configuration Management and Logistics
• Law Department
• Purchasing / Supply Chain
Peter Monks - VP of Technology, Symphony Software Foundation
Diane Mueller - Director Community Development, Red Hat
Azi Cohen - Co-founder and GM, WhiteSource
2017 Open Source Strategy Forum
How enterprises learned to stop worrying and love open sourceRogue Wave Software
There's an obvious competitive edge to using OSS and it's at the core of your enterprise, but do you know the key lessons learned from the history of open source risks? Learn:
The history of the OSS revolution; The impacts of package, language, and skills growth; Lessons learned for security, technical, and licensing risks.
Continuous security: Bringing agility to the secure development lifecycleRogue Wave Software
Presented at AppSec California 2017. The fact that software development is moving towards agile methodologies and DevOps is a given, the question is: How do you transform processes and tools to get the biggest advantage? Using application security testing as an example, this talk cuts through all the news, research, and standards to define a holistic process for integrating Agile testing and feedback into development teams. The talk describes specific processes, automation techniques, and the smart selection of tools to help organizations produce more secure, OWASP-compliant code and free up development time to focus on features.
Shifting the conversation from active interception to proactive neutralization Rogue Wave Software
When did we forget that old saying, “prevention is the best medicine”, when it comes to cybersecurity? The current focus on mitigating real-time attacks and creating stronger defensive networks has overshadowed the many ways to prevent attacks right at the source – where security management has the biggest impact. Source code is where it all begins and where attack mitigation is the most effective.
In this webinar we’ll discuss methods of proactive threat assessment and mitigation that organizations use to advance cybersecurity goals today. From using static analysis to detect vulnerabilities as early as possible, to managing supply chain security through standards compliance, to scanning for and understanding potential risks in open source, these methods shift attack mitigation efforts left to simplify fixes and enable more cost-effective solutions.
Webinar recording: http://www.roguewave.com/events/on-demand-webinars/shifting-the-conversation-from-active-interception
Two of the most important topics on everyone’s mind when developing PHP applications are performance and security.
Rogue Wave Software and RIPS Technologies are teaming up to show you how you can utilize our solutions to help make your PHP applications safe and fast. We will use a typical Magento implementation as an example to speak about finding and eliminating bottlenecks and debugging your code. We will also demonstrate how you can detect security vulnerabilities using cutting edge static code analysis.
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveRogue Wave Software
Open Banking is being driven by regulation in Europe, however, it is ultimately about expanding consumer choice in financial services. Open Banking provides opportunities for financial services and FinTech companies as well as consumers. In this webinar, we’ll examine the influence of Open Banking across the globe and the key differences between regulation-led and market-led initiatives. We’ll also explore essential security standards in Open Banking and how they contribute to a secure Open Banking API interface.
No liftoff, touchdown, or heartbeat shall miss because of a software failureRogue Wave Software
Presented at Embedded World 2019, Walter Capitani, director of product management, discusses static code analysis technology and the applications in safety-critical development. Topics covered include coding standards, development processes and methodologies, and ideas for the future.
More Related Content
Similar to Open source software: Diligence, compliance, and future trends
Are open source and embedded software development on a collision course?Rogue Wave Software
Presented at Embedded Systems Conference (ESC) Minneapolis 2018, this session discusses the most effective uses of open source software; how to maintain MISRA, CWE, OWASP, and other standards compliance across all code sources; how to avoid license risk; and reduce critical safety and security issues.
Software development organizations are using open source software at an unprecedented scale to build better software faster. Yet while the adoption of open source races ahead, the establishment of policies to govern its use lag far behind. According to Gartner Group, only a minority of IT organizations have established, open-source governance policies in place, and it predicts that by 2014, 50% of Global 2000 organizations will experience technology, cost and security challenges through lack of open-source governance.
In this Webinar, Greg Olson, Senior Strategy Consultant with Olliance Group, a Black Duck company, will explain:
--The four steps to create an open source policy
--How to obtain ‘buy-in’ and support from key stakeholders
--Best practices for rolling out an open source policy in your organization
On the path to innovation, development teams fear nothing but try to avoid three things: Re-work, lawyers, and, missing deadlines. In this presentation, Rod Cope will discuss what to do when software is not license compliant, to help avoid lawyers getting involved, disrupting schedules and potential architectural or code changes.
There are hundreds of open source licenses. Most developers don't take the time to read or understand them, but can you continue to ignore them? We have seen a rise in litigation around open source license over the last 10 years. And, in the last 12 months we have seen the first examples of OSS copyright trolls that are taking developers to court in an attempt to monetize GPL violations.
This presentation covers: How OSS licenses are enforced;
What are the main types of OSS licenses; How to identify them;
and what steps you need to take to ensure you are complying.
We cover use case scenarios and do a "deep dive" on the most used licenses today and how to understand them
How to keep developers happy and lawyers calm (Presented at ESC Boston)Rogue Wave Software
On the path to innovation, development teams fear nothing but try to avoid three things: Re-work, lawyers, and, missing deadlines. In this talk, Rod Cope will discuss what to do when software is not license compliant, to help avoid lawyers getting involved, disrupting schedules and potential architectural or code changes.
The initial step in helping make sure teams are in compliance with open source licenses is education.
The goal is to provide concrete steps towards development teams adopting a vested interest in paying attention to what open source they download and how it's used.
When something goes wrong in your software, you fix it. When something is wrong in an OSS package you’re beholden to community fixes and web search - neither cares about your needs or your timeline.
In this webinar, our director of product management and OSS expert, Richard Sherrard, examines: How to know exactly what packages are used in your company; Specific technical, security, and licensing hurdles that many organizations face; and
What “free” actually means when it comes to OSS.
Strategies for Commercial Software Developers Using Open Source Code in Propr...Mary Lou Wakimura
Commercial software developers are often drawn to open source code to help deliver a low cost and flexible product that can quickly be brought to market. While there are benefits, there are also risks and pitfalls. With the growth and influence of free software licensing, some have been asserting the General Public License (GPL) violations in litigation to attempt to gain an advantage. Please join us as we explore these issues and discuss strategies to protect your product from litigation and to evaluate whether your new product will be strengthened or weakened by the integration of open source software, and in particular the GPL.
Gain insight into:
- Reach of the influential free software license GPL;
- Emerging risk of copyright trolls in open source;
- Risk of Free Software Foundation sponsored litigation in response to GPL violations;
- Contours of what constitutes a derivative work employing Linux code in the context of the GPL; and
- Lessons learned from the Hellwig vs. VMware case.
Implementing and Managing an Open Source Compliance Program: A Crash CourseFINOS
Ibrahim Haddad, Samsung Research America: Implementing and Managing an Open Source Compliance Program: A Crash Course.
The past decade has witnessed an unprecedented adoption of open source software by enterprises for the various advantages it offers. This massive adoption of open source software came with legal and compliance responsibilities. Enterprises and development organizations have since then started establishing policies around open source usage (and contribution), and implementing engineering development processes to insure that software products that deploy are in compliance. This presentation provides a guide to doing compliance the right way (one of many) with an overview on setting up an open source compliance program and institutionalizing best practices.
Course Outline (subject to change based on time allocation)
• Overview of open source compliance
• Failure to comply
• Lessons learned from non compliance cases
• Overview of the compliance program
• Compliance challenges and solutions
• Achieving compliance: roles and responsibilities
• Sample compliance process
• Tools and automation
• Responding to compliance inquiries
Audience
Anyone involved in bringing software into the organization and anyone involved in developing and distributing products or interfacing with customers, including
• Corporate Management
• Engineering
• Product Management, Project Management, and Process Management
• Testing, Quality Assurance, Configuration Management and Logistics
• Law Department
• Purchasing / Supply Chain
Peter Monks - VP of Technology, Symphony Software Foundation
Diane Mueller - Director Community Development, Red Hat
Azi Cohen - Co-founder and GM, WhiteSource
2017 Open Source Strategy Forum
How enterprises learned to stop worrying and love open sourceRogue Wave Software
There's an obvious competitive edge to using OSS and it's at the core of your enterprise, but do you know the key lessons learned from the history of open source risks? Learn:
The history of the OSS revolution; The impacts of package, language, and skills growth; Lessons learned for security, technical, and licensing risks.
Continuous security: Bringing agility to the secure development lifecycleRogue Wave Software
Presented at AppSec California 2017. The fact that software development is moving towards agile methodologies and DevOps is a given, the question is: How do you transform processes and tools to get the biggest advantage? Using application security testing as an example, this talk cuts through all the news, research, and standards to define a holistic process for integrating Agile testing and feedback into development teams. The talk describes specific processes, automation techniques, and the smart selection of tools to help organizations produce more secure, OWASP-compliant code and free up development time to focus on features.
Shifting the conversation from active interception to proactive neutralization Rogue Wave Software
When did we forget that old saying, “prevention is the best medicine”, when it comes to cybersecurity? The current focus on mitigating real-time attacks and creating stronger defensive networks has overshadowed the many ways to prevent attacks right at the source – where security management has the biggest impact. Source code is where it all begins and where attack mitigation is the most effective.
In this webinar we’ll discuss methods of proactive threat assessment and mitigation that organizations use to advance cybersecurity goals today. From using static analysis to detect vulnerabilities as early as possible, to managing supply chain security through standards compliance, to scanning for and understanding potential risks in open source, these methods shift attack mitigation efforts left to simplify fixes and enable more cost-effective solutions.
Webinar recording: http://www.roguewave.com/events/on-demand-webinars/shifting-the-conversation-from-active-interception
Two of the most important topics on everyone’s mind when developing PHP applications are performance and security.
Rogue Wave Software and RIPS Technologies are teaming up to show you how you can utilize our solutions to help make your PHP applications safe and fast. We will use a typical Magento implementation as an example to speak about finding and eliminating bottlenecks and debugging your code. We will also demonstrate how you can detect security vulnerabilities using cutting edge static code analysis.
Similar to Open source software: Diligence, compliance, and future trends (20)
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveRogue Wave Software
Open Banking is being driven by regulation in Europe, however, it is ultimately about expanding consumer choice in financial services. Open Banking provides opportunities for financial services and FinTech companies as well as consumers. In this webinar, we’ll examine the influence of Open Banking across the globe and the key differences between regulation-led and market-led initiatives. We’ll also explore essential security standards in Open Banking and how they contribute to a secure Open Banking API interface.
No liftoff, touchdown, or heartbeat shall miss because of a software failureRogue Wave Software
Presented at Embedded World 2019, Walter Capitani, director of product management, discusses static code analysis technology and the applications in safety-critical development. Topics covered include coding standards, development processes and methodologies, and ideas for the future.
Disrupt or be disrupted – Using secure APIs to drive digital transformationRogue Wave Software
In today’s economy, companies of all kinds are looking to disrupt their own and other industries across everything from banking through logistics and retail. Disruption and innovation are typically built on the back of a digital transformation strategy; disrupting a market is all about finding new ways of servicing customers through innovative channels or approaches. APIs have become the foundation of disruption, innovation, and digital transformation.
This presentation will help you understand the necessary components of a well-constructed API strategy, with particular attention paid to security.
Leveraging open banking specifications for rigorous API security – What’s in...Rogue Wave Software
Presented at APIdays Paris.
API security is the principal concern when it comes to establishing a trusted API ecosystem. Rightly so, because opening up business systems through APIs by definition expands the attack surface that can be exploited. Although many threat vectors and vulnerabilities are well known, we have to remain on the lookout for new threats continuously.
On the positive side, open standards that help defend against security threats are constantly being created and refined. What is even more helpful are the specifications that aggregate relevant standards into a comprehensive API security profile. Excellent examples of these are the current specifications that support open banking initiatives like UK Open Banking and PSD2. Could these specifications not have a wider applicability? In other words, would we be able to benefit from the security guidelines captured in these specifications in other verticals like logistics, retail, energy, healthcare and government, too?
In this talk, we will compare security guidelines covered in the specifications and see to what extent they may benefit the wider enterprise API developer community.
Getting the most from your API management platform: A case studyRogue Wave Software
API management plays an important role in many large enterprises as it sets up the foundation for accelerating the integration of applications, databases, and key processes to derive business value from your APIs. How do you know if your organization is getting the most value out of your API management platform?
Ian Goldsmith from Rogue Wave for an in-depth discussion of the importance of an enterprise-class API architecture and key considerations to ensure you are getting the most from your API management platform. As well as a case study that demonstrates how one organization uses the Akana API Platform to create a secure, integrated system to mitigate the risks of business on a public cloud network.
Advanced technologies and techniques for debugging HPC applicationsRogue Wave Software
Presented at Supercomputing 18. Debugging and analyzing today's HPC applications requires a tool with capabilities and features to support the demands of today’s complex HPC applications. Debugging tools must be able to handle the extensive use of C++ templates and the STL, use of many shared libraries, optimized code, code leveraging GPU accelerators and applications constructed with multiple languages.
This presentation walks through the different advanced technologies provided by the debugger, TotalView for HPC, and shows how they can be used to easily understand complex code and quickly solve difficult problems. Showcasing TotalView’s new user interface, you will learn how to leverage the amazing technology of reverse debugging to replay how your program ran. You will also see how TotalView provides a unified view across applications that utilize Python and C++, debug CUDA applications, find memory leaks in your HPC codes and other powerful techniques for improving the quality of your code.
This is a classic example of older technology not being used to its fullest, which Justin proves by walking through little-known configuration and optimization tricks that get data flowing reliably and efficiently – even for today’s complexity and scale. This session covers:
A – Camel basics, understanding Exchanges, Routes, and how to implement EIPs with them
B – Examples of real implementations of common EIPs like Content Based Routers and Recipient Lists
C – Integration of Camel with common endpoints, like JMS, FTP, and HTTP
Microservices and APIs might sound like fairy dust you sprinkle on applications to make them “agile,” judging by today’s industry talk. The reality is that they work as the critical foundations for digital transformation only when done right. The goal isn’t simply to build agile apps, it’s for businesses to gain agility and thrive against the onslaught of digital disruption – and this requires going deeper. Organizations must ensure microservices and APIs add value, and also understand how to put the two together. Walk away with a better understanding of microservices and APIs and be better prepared to drive the right solutions for your organization. Watch on-demand webinar at www.roguewave.com
Whether starting from greenfield or modernizing existing infrastructure, how do you remove the guesswork in deploying and maintaining cloud-based, business-critical workloads?
From architectural decisions to fine-tuning scale and performance, our open source architects explain how top enterprises build and maintain their open source stacks, focusing on operational agility and cost-effectiveness.
You will walk away with real use case examples and five ways to better plan and deliver your next cloud strategy.
PSD2 & Open Banking: How to go from standards to implementation and complianceRogue Wave Software
PSD2-driven Open Banking is here, and with it comes challenges in understanding what it means, choosing which standards organizations to follow, which practices are right for you, and whether to aim for regulatory compliance only or use the regulation as an opportunity to differentiate and transform. From a strategic and technical point of view, compliance dictates that now is the time to chart a precise implementation for your organization – do you know where to begin?
Java 10 and beyond: Keeping up with the language and planning for the futureRogue Wave Software
With the release of Java 10, the impact of Java 9, and the spread of multiple emerging technologies, the biggest questions for high-performing development teams is: How do we keep up and take advantage of the features relevant to us?
Java experts, Toomas Romer and Rod Cope, discuss recent changes to the language and how they impact tools, development velocity, and the ability to innovate; along with industry insights to better plan for more complex systems, the inevitable modernization, and adapting to scale.
Open source applied - Real world use cases (Presented at Open Source 101)Rogue Wave Software
This isn’t your typical case study, this is the reality of open source: One hundred percent of organizations use varying degrees of OSS, yet we still focus on one particular package or layer when it comes to sharing best practices. The reality is, when we get stuck, it’s the configuration and operational interrelationships between packages that matter.
This session takes open source support data across multiple organizations to examine three different scenarios that represent the most common issues we see today (in fact, 80% of the cases we see are due to configuration and package interrelationship issues). Justin Reock covers e-commerce, mobile PaaS, and high performance computing examples to illustrate top problems and solutions for stack selection, infrastructure implementation, and production troubleshooting.
For users of SourcePro and Tools.h++, the future of Solaris is uncertain, as seen by the recent reductions of the Oracle Solaris team and an increase in inquiries we're receiving on how to migrate applications from Solaris to Linux.
Prepare for your future by joining this webinar on how to best plan and execute a successful migration for your SourcePro or Tools.h++ components.
Our technical experts walk through:
- Options to migrate code that contains Tools 7 or Tools.h++ libraries
- Tips and tricks to migrate code to Linux
- How to determine whether you can do it yourself
- What to tell your service provider
Whether you plan to do it yourself or enlist Rogue Wave professional services, at the end of this webinar you will understand the best path for migration.
The HPC community is embracing the advantages of mixed-language development environments, presenting challenges for debugging and testing when application execution and data flow cross languages. How can we take advantage of the unique features offered by different languages while minimizing the impact on bug reproduction, root-cause analysis, and solution?
This presentation walks through the current mixed-language HPC landscape to describe the problems with testing these types of applications and best-practice solutions using TotalView for HPC. You will learn how these architectures make it easy to “steer” computation between modules of different languages, to accelerate prototyping and development, and how advanced testing techniques provide visibility into the call stack and data for efficient debugging.
Enterprise Linux: Justify your migration from Red Hat to CentOSRogue Wave Software
Red Hat Enterprise Linux (RHEL) is the dominant distribution used by commercial organizations today. But did you know that there's a functionally-compatible alternative that offers options when it comes to licensing, support, and cost effectiveness? Whether you're thinking about moving away from RHEL or have already made the decision, this webinar gives you the background, proof points, and data to justify why moving to CentOS makes sense. At the end of this presentation, you will have all the data you need to consider for an enterprise Linux migration activity and reasons why CentOS is a viable, cost-effective solution.
Dive deep into an actual enterprise Linux migration by walking through the planning and execution of the process as seen by our customers. Our enterprise architects will break down the key migration steps to explain the available options, decisions made, and demonstrate actions on a live system. This episode gives you a representative migration experience before you actually migrate, illustrating: Side-by-side comparisons between Red Hat Enterprise Linux and CentOS; steps to consider for the operating system; and
steps to consider for common application stacks and packages.
With open source software being used these days in enterprises both large and small, the path to faster code is clear. But you need to weight the open source adoption against the risks. In embedded software, risk can equate to late releases, over-budget projects, and in some cases, casualties to life and limb. It’s a classic risk versus reward scenario. Are you confident your embedded developers know how to estimate the risks? In this presentation, Rod Cope discusses the most effective uses of open source software; how to avoid license risk; and reduce critical safety and security issues. Those involved in developing embedded software will have the right understanding, can ask the right questions, and leverage OSS to gain the most while risking the least.
Open source software drives efficiency and innovation, but affects your application stacks and introduces new challenges to keeping them highly available and performing. Find out about the hottest open source options and how they can help your organization achieve better uptime and performance levels. We also explore the tradeoffs of using open source software, how to evaluate and assess the available types, and the potential effects on your applications and infrastructure.
Migrating mission-critical enterprise systems requires careful planning, preparation, and execution—plus a healthy dose of experience. It's one thing to migrate the operating system, it's another to port the application stack, with all its commercial and open source packages, configurations, and connections to the outside environment. This episode guides your Linux migration strategy using Red Hat Enterprise Linux and CentOS.
Top 7 Unique WhatsApp API Benefits | Saudi ArabiaYara Milbes
Discover the transformative power of the WhatsApp API in our latest SlideShare presentation, "Top 7 Unique WhatsApp API Benefits." In today's fast-paced digital era, effective communication is crucial for both personal and professional success. Whether you're a small business looking to enhance customer interactions or an individual seeking seamless communication with loved ones, the WhatsApp API offers robust capabilities that can significantly elevate your experience.
In this presentation, we delve into the top 7 distinctive benefits of the WhatsApp API, provided by the leading WhatsApp API service provider in Saudi Arabia. Learn how to streamline customer support, automate notifications, leverage rich media messaging, run scalable marketing campaigns, integrate secure payments, synchronize with CRM systems, and ensure enhanced security and privacy.
May Marketo Masterclass, London MUG May 22 2024.pdfAdele Miller
Can't make Adobe Summit in Vegas? No sweat because the EMEA Marketo Engage Champions are coming to London to share their Summit sessions, insights and more!
This is a MUG with a twist you don't want to miss.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
OpenMetadata Community Meeting - 5th June 2024OpenMetadata
The OpenMetadata Community Meeting was held on June 5th, 2024. In this meeting, we discussed about the data quality capabilities that are integrated with the Incident Manager, providing a complete solution to handle your data observability needs. Watch the end-to-end demo of the data quality features.
* How to run your own data quality framework
* What is the performance impact of running data quality frameworks
* How to run the test cases in your own ETL pipelines
* How the Incident Manager is integrated
* Get notified with alerts when test cases fail
Watch the meeting recording here - https://www.youtube.com/watch?v=UbNOje0kf6E
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeAftab Hussain
Understanding variable roles in code has been found to be helpful by students
in learning programming -- could variable roles help deep neural models in
performing coding tasks? We do an exploratory study.
- These are slides of the talk given at InteNSE'23: The 1st International Workshop on Interpretability and Robustness in Neural Software Engineering, co-located with the 45th International Conference on Software Engineering, ICSE 2023, Melbourne Australia
Atelier - Innover avec l’IA Générative et les graphes de connaissancesNeo4j
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Allez au-delà du battage médiatique autour de l’IA et découvrez des techniques pratiques pour utiliser l’IA de manière responsable à travers les données de votre organisation. Explorez comment utiliser les graphes de connaissances pour augmenter la précision, la transparence et la capacité d’explication dans les systèmes d’IA générative. Vous partirez avec une expérience pratique combinant les relations entre les données et les LLM pour apporter du contexte spécifique à votre domaine et améliorer votre raisonnement.
Amenez votre ordinateur portable et nous vous guiderons sur la mise en place de votre propre pile d’IA générative, en vous fournissant des exemples pratiques et codés pour démarrer en quelques minutes.
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Graspan: A Big Data System for Big Code AnalysisAftab Hussain
We built a disk-based parallel graph system, Graspan, that uses a novel edge-pair centric computation model to compute dynamic transitive closures on very large program graphs.
We implement context-sensitive pointer/alias and dataflow analyses on Graspan. An evaluation of these analyses on large codebases such as Linux shows that their Graspan implementations scale to millions of lines of code and are much simpler than their original implementations.
These analyses were used to augment the existing checkers; these augmented checkers found 132 new NULL pointer bugs and 1308 unnecessary NULL tests in Linux 4.4.0-rc5, PostgreSQL 8.3.9, and Apache httpd 2.2.18.
- Accepted in ASPLOS ‘17, Xi’an, China.
- Featured in the tutorial, Systemized Program Analyses: A Big Data Perspective on Static Analysis Scalability, ASPLOS ‘17.
- Invited for presentation at SoCal PLS ‘16.
- Invited for poster presentation at PLDI SRC ‘16.
Software Engineering, Software Consulting, Tech Lead, Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Transaction, Spring MVC, OpenShift Cloud Platform, Kafka, REST, SOAP, LLD & HLD.