SlideShare a Scribd company logo
OSS has taken over the
enterprise: The top five
OSS trends of 2015
Richard Sherrard
director of product management
Richard Sherrard
director of product management
Presenters
Rogue Wave Software
2© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Top five open source
trends of 2015
Open source trends we’ve seen in 2015
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
• Open source has taken over the enterprise
• Open source discovery challenges
• Open source risk management
• Open source governance
• Multi-tiered approach to open source management
4
#1
Open source has taken
over the enterprise
Growth of open source
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 6
Use of open source continues to grow
at a fast pace!
90% of companies use
OSS components in
commercial software
(Gartner)
>80% of a typical Java
application is open-
source components and
frameworks
(TechCrunch)
11 million developers
worldwide make 13
billion open source
requests each year
Innovation drives open source adoption
7
 Open source components provide critical functionality
 Improves developer productivity
No license fees
 “More eyes” improves quality & security
Leveraged development effort
 Apache, Tomcat, Wildfly, Jakarta Commons, jQuery
 Communities continuously improve features
Mature, commoditized applications and libraries
Community peer review
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Open source in the enterprise
8
“By 2016, open source software will be in mission-critical software
portfolios within 99% of all Global 1,000 enterprises.”
Innovate
• Opens up code options
• Deploy applications with any
combination of code source
• Optimize developer effort and
time
• Quicker time to market
Identify and mitigate risk
• Technical risk
• Business risk
• Security risk
• Legal and compliance risk
Balance risk and reward
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
How open source enters your codebase
9
“90% of code in modern applications is open source” and
“31% of companies have had or suspect a breach in an open source component“
Open source
community
Legacy code
Internally
developed code
Reused code
Third party code
Supply chain
code
Outsource code
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Delivered
code
Mixed source risks
10© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Loss of
intellectual
property
Defects and quality
issues
License restrictions
and obligations
Support costs
Security
vulnerabilities
Injunctions
What organizations are looking to answer?
11
Dev VP
& Mgr
OSS Compliance Mgr
CTO/ CIO/CISO
Security Mgr
Legal
What open source am I using
Where are we using open source
across the organization
How can I increase the security
of the open source
What are my legal obligations
Are we able to participate in the
open source communities
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Embrace OSS and automate the governance process
12
Create an automated organization-wide OSS policy and leverage the
benefits
• Increase developer productivity
• Educate and develop OSS policies for the developers to follow
• Marshal the resources of the OSS community
• Accelerate software development
Understand, manage, and govern OSS comprehensively
Inventory Support Govern
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
#2
Open source discovery
Large codebases: Open source is everywhere
14
• Companies today have extremely large codebases made up of 1000’s of
developed applications.
• Lots of different technologies in play – web, mobile, embedded
• Larger number of 3rd party software suppliers being used today
Over 100 million
lines of code goes
into a average high
end car today!
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Into the “unknown”
15
• Once DISCOVERY of the open source is known you can then better understand
it
– What license(s) is it distributed under – GPL, Apache, BSD…
– What version(s) are being used; are they outdated!
– Are there known security risks
– Do I have quality issues with it
– Is their a strong community behind it!
• A plan of action can then be worked on to resolve identified risks and issues
– There will be many!
Biggest open source
challenge organizations
face today is the “Not
knowing” what they have
and “Where they have it”
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
How are they doing discovery today?
16
• Companies find it extremely hard if not impossible to uncover where open
source is being used across the organization
• It is a very ad hoc process across the organization
• Manual code reviews can take multiple man years to complete.
• Surveying or interviewing the development teams is slow and inaccurate as
developers leave and move on
• Larger number of 3rd party software suppliers being used today
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Automate the discovery of open source
17
Automated OSS
Scanning
SDLC
Integrations
OSS
Approvals
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Automate discovery of your open source
18
• Discovery by scanning your code
• Conduct scan in-place – access code where it is
• Run baseline and delta scans on your code
• Identify the “right” project
• Multiple matching techniques to find projects, files, snippets, modified code
• Patented noise reduction techniques to avoid false positives, pinpoint the
“right” project
• Search for the “right” OSS for your needs
• Large knowledgebase of OSS
• Rich information about the package
• Automated approval policy for OSS usage
• Integrate into the SDLC
• Continuous Integration builds enable on-going automation of your code
scanning
Get a comprehensive view
of OSS across projects &
teams
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
#3
Open source risk
Assessing risk in open source
20
For all its benefits, risks exist
Legal risk
Using the wrong
license can
compromise IP
Security risk
The OSS
component can
include
vulnerabilities
Support risk
Who do you call
for help?
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Cisco’s loss of IP
21
•Used GPL code to
customize
Broadcom's Linux
distribution
CyberTan
• Embedded the
code in chipset
Broadcom
• Adopted this into
its WRT54G
router
Linksys
•Bought Linksys for
$500m
•FSF Accused Cisco of
license violation
•Source code made
available
CISCO
Developers modified
firmware turning a low-
end ($60) device into a
high functioning router
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Unknown OSS and security issues
22© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Code vulnerabilities
23© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Lack of open source support
24
• Open source software does not come with commercial support; you are
dependent upon the OSS communities to provide you help and fixes
• Who do you call when your “Mission Critical” open source application has
an issue?...“No throat to choke”!
• Developers have to negotiate wasted cycles and downtime while waiting for
fixes from the community
• Developers do not have anyone to help with risks and development pitfalls
• No formal training provided on the OSS package
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Managing OSS risk
25
20%
of organizations lack meaningful controls
over OSS selection and use
of developers need not prove security of
OSS they are using
of the organizations claim to track
vulnerabilities in OSS over time
76%
80%
Increased use + few controls = unmanaged risk
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Open source support
26
• With the ubiquity of open source, enterprises need commercial-grade
support.
• We are the only vendor offering 24x7 support across hundreds of
OSS packages.
• Our “Tier 4” support gives you one call access to enterprise
architects, tackling a range of challenging and critical issues.
• We are thought leaders in the industry, and can provide enormous
value to any business that utilizes open source software.
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Value of open source support
27
Support offerings range across hundreds of open source products. We
help customers:
 Avoid downtime and wasted cycles
 Navigate complex OSS packages requiring broad and deep expertise
 Mitigate risks and development pitfalls
 Receive formal, instructor-led training across several OSS packages
 Gain the peace of mind that comes with 24X7 support coverage
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
We support the best of open source
28© 2015 Rogue Wave Software, Inc. All Rights Reserved.
#4
Open source governance
OSS best practices
30
Acquisition
& Approval
Support &
Maintenance
Tracking
Audit &
Governance
Training
Legal
Compliance
Community
Interaction
Acquisition
& Approval
Support &
Maintenance
Tracking
Audit &
Governance
Training
Legal
Compliance
Community
Interaction
Consulting
Certified library
request &
approval process
SLA support
OpenUpdate
Project tracking
Auditing services
License obligation audit
Certification services
Technical and
OSS training
OSS Policy
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Manual OSS process
31
Web search Ask around
Check the
spreadsheet
Answer
questions
Security
review
Update
spreadsheet
Contact legal
Fill out form Advocate
Monitor
security alerts
Where Used?
Code Review Rewrite
Wait Wait
Arch. review
Other approval
boards
Monitor
updates to
components
Select
Approve
Monitor
Discover
Inventory
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
OSS management process
32
Select
Discover
ApproveInventory
Monitor
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Approve your OSS
33
Requirement: Workflows reflect policies
Request and approval workflow
– Fully customizable, flexible workflow engine
• Create workflows that match the way teams work
• Forms that ask the questions you need to approve requests
• Support complex workflows with serial or parallel reviewers
• Track OSS by use, what, where, when, how and who
Flexible OSS policy management
– Effectively communicate policies to all employees
• Easily create policies based on combination of OSS package, version
and license
• Auto approve or deny requests based on usage model
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Inventory and monitor your OSS
34
Requirement: Understand what you have, learn about it and where you
have it
See OSS inventory by project
– Policy violations
– Combined lists of both approved, known OSS, and newly discovered
OSS via scanning
– Comprehensive OSS Bill of Materials
Continuously monitor OSS for security vulnerabilities and updates
– Automatic: Daily updates via link to National Vulnerability Database
(NVD) to list all know CVEs by OSS package
– Manual: Daily updates on new security vulnerabilities from OSS experts
after reviewing of hundreds of packages
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
#5
Multi tiered approach to
open source management
Multiple approaches to managing open source
36
• Finding issues late and maybe in production
are very expensive to resolve
• Not able to dig deeper into your code to find
potential problems
• Not able to fix issues on open source in use
• Continuous architecture and package reviews
to stay on top of the latest technology
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Static code analysis
37
Significantly reduces the cost of reliable, secure software
• Complements existing testing approaches
• Automated and repeatable analysis
Enforces key industry standards
• DISA STIG, CWE, MISRA
• CERT, SAMATE
• OWASP, DO-178B, FDA validation
• ...and more
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Dynamic code analysis
38
• Interactive debugging
• Interactive memory debugging
• Reverse debugging
• Unattended debugging
• Serial and parallel applications
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
To wrap up
Open source is everywhere!
40
Open source can no longer be avoided in your application
development
Learn to embrace the usage of open source
Need to understand what you have and where you have it
Open source is not “FREE” and comes with it own risks and
rewards
With out checks & balances in place, open source chaos will arise
Take a multi pronged approach to managing open source
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Rogue Wave capabilities
41© 2015 Rogue Wave Software, Inc. All Rights Reserved.
What we do
42
Rogue Wave helps organizations simplify
complex software development, improve
code quality, and shorten cycle times
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
See us in action:
www.roguewave.com
Richard Sherrard
richard.sherrard@roguewave.com
OSS has taken over the enterprise: The top five OSS trends of 2015

More Related Content

What's hot

Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Pvt. Ltd
 
How enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceHow enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open source
Rogue Wave Software
 
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationSecurity Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Denim Group
 
Application Asset Management with ThreadFix
 Application Asset Management with ThreadFix Application Asset Management with ThreadFix
Application Asset Management with ThreadFix
Denim Group
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from Code
DevOps.com
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
Synopsys Software Integrity Group
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
Tim Mackey
 
Open source software support for the enterprise
Open source software support for the enterpriseOpen source software support for the enterprise
Open source software support for the enterprise
Rogue Wave Software
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on Giving
Black Duck by Synopsys
 
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Denim Group
 
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudShift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Black Duck by Synopsys
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Black Duck by Synopsys
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
DevOps.com
 
Monitoring Attack Surface to Secure DevOps Pipelines
Monitoring Attack Surface to Secure DevOps PipelinesMonitoring Attack Surface to Secure DevOps Pipelines
Monitoring Attack Surface to Secure DevOps Pipelines
Denim Group
 
Making the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationMaking the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network Communication
Black Duck by Synopsys
 
Secure DevOps with ThreadFix 2.3
Secure DevOps with ThreadFix 2.3Secure DevOps with ThreadFix 2.3
Secure DevOps with ThreadFix 2.3
Denim Group
 
Programming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldProgramming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT world
Rogue Wave Software
 
September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source: September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source:
Black Duck by Synopsys
 
Black duck Software's pitch
Black duck Software's pitchBlack duck Software's pitch
Black duck Software's pitchi7
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Synopsys Software Integrity Group
 

What's hot (20)

Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020
 
How enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open sourceHow enterprises learned to stop worrying and love open source
How enterprises learned to stop worrying and love open source
 
Security Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your OrganizationSecurity Champions: Pushing Security Expertise to the Edges of Your Organization
Security Champions: Pushing Security Expertise to the Edges of Your Organization
 
Application Asset Management with ThreadFix
 Application Asset Management with ThreadFix Application Asset Management with ThreadFix
Application Asset Management with ThreadFix
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from Code
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
Open source software support for the enterprise
Open source software support for the enterpriseOpen source software support for the enterprise
Open source software support for the enterprise
 
Collaborative Development the Gift That Keeps on Giving
Collaborative Development  the Gift That Keeps on GivingCollaborative Development  the Gift That Keeps on Giving
Collaborative Development the Gift That Keeps on Giving
 
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
 
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudShift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
Monitoring Attack Surface to Secure DevOps Pipelines
Monitoring Attack Surface to Secure DevOps PipelinesMonitoring Attack Surface to Secure DevOps Pipelines
Monitoring Attack Surface to Secure DevOps Pipelines
 
Making the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationMaking the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network Communication
 
Secure DevOps with ThreadFix 2.3
Secure DevOps with ThreadFix 2.3Secure DevOps with ThreadFix 2.3
Secure DevOps with ThreadFix 2.3
 
Programming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldProgramming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT world
 
September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source: September 13, 2016: Security in the Age of Open Source:
September 13, 2016: Security in the Age of Open Source:
 
Black duck Software's pitch
Black duck Software's pitchBlack duck Software's pitch
Black duck Software's pitch
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
 

Similar to OSS has taken over the enterprise: The top five OSS trends of 2015

Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization
Rogue Wave Software
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
Rogue Wave Software
 
RVAsec Bill Weinberg Open Source Hygiene Presentation
RVAsec Bill Weinberg Open Source Hygiene PresentationRVAsec Bill Weinberg Open Source Hygiene Presentation
RVAsec Bill Weinberg Open Source Hygiene Presentation
Black Duck by Synopsys
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
FINOS
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
Rogue Wave Software
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
Paris Open Source Summit
 
Open Source Support
Open Source SupportOpen Source Support
Open Source Support
Sébastien Grimonet
 
Identifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developersIdentifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developers
Rogue Wave Software
 
Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016
Black Duck by Synopsys
 
Breaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullBreaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational Pull
Great Wide Open
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
Rogue Wave Software
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The Things
All Things Open
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurity
Rogue Wave Software
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle software
Rogue Wave Software
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for Devops
Jerika Phelps
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
Black Duck by Synopsys
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
Marcel de Vries
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
All Things Open
 
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeOpen DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Emerasoft, solutions to collaborate
 
Create code confidence for better application security
Create code confidence for better application securityCreate code confidence for better application security
Create code confidence for better application security
Rogue Wave Software
 

Similar to OSS has taken over the enterprise: The top five OSS trends of 2015 (20)

Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 
RVAsec Bill Weinberg Open Source Hygiene Presentation
RVAsec Bill Weinberg Open Source Hygiene PresentationRVAsec Bill Weinberg Open Source Hygiene Presentation
RVAsec Bill Weinberg Open Source Hygiene Presentation
 
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...Managing the Software Supply Chain: Policies that Promote Innovation While Op...
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
 
Open Source Support
Open Source SupportOpen Source Support
Open Source Support
 
Identifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developersIdentifying and managing the risks of open source software for PHP developers
Identifying and managing the risks of open source software for PHP developers
 
Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016
 
Breaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational PullBreaking Free from Proprietary Gravitational Pull
Breaking Free from Proprietary Gravitational Pull
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The Things
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurity
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle software
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for Devops
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Best practices for using open source software in the enterprise
Best practices for using open source software in the enterpriseBest practices for using open source software in the enterprise
Best practices for using open source software in the enterprise
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
 
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeOpen DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
 
Create code confidence for better application security
Create code confidence for better application securityCreate code confidence for better application security
Create code confidence for better application security
 

More from Rogue Wave Software

The Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveThe Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data Perspective
Rogue Wave Software
 
No liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureNo liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failure
Rogue Wave Software
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Rogue Wave Software
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...
Rogue Wave Software
 
Adding layers of security to an API in real-time
Adding layers of security to an API in real-timeAdding layers of security to an API in real-time
Adding layers of security to an API in real-time
Rogue Wave Software
 
Getting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyGetting the most from your API management platform: A case study
Getting the most from your API management platform: A case study
Rogue Wave Software
 
Advanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsAdvanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applications
Rogue Wave Software
 
The forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youThe forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for you
Rogue Wave Software
 
Are open source and embedded software development on a collision course?
Are open source and embedded software development on a  collision course?Are open source and embedded software development on a  collision course?
Are open source and embedded software development on a collision course?
Rogue Wave Software
 
Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices
Rogue Wave Software
 
5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success
Rogue Wave Software
 
PSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliancePSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliance
Rogue Wave Software
 
Java 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureJava 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the future
Rogue Wave Software
 
How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)
Rogue Wave Software
 
Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)
Rogue Wave Software
 
How to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxHow to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to Linux
Rogue Wave Software
 
Approaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsApproaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC apps
Rogue Wave Software
 
Enterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSEnterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOS
Rogue Wave Software
 
Walk through an enterprise Linux migration
Walk through an enterprise Linux migrationWalk through an enterprise Linux migration
Walk through an enterprise Linux migration
Rogue Wave Software
 
How to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmHow to keep developers happy and lawyers calm
How to keep developers happy and lawyers calm
Rogue Wave Software
 

More from Rogue Wave Software (20)

The Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveThe Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data Perspective
 
No liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureNo liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failure
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformation
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...
 
Adding layers of security to an API in real-time
Adding layers of security to an API in real-timeAdding layers of security to an API in real-time
Adding layers of security to an API in real-time
 
Getting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyGetting the most from your API management platform: A case study
Getting the most from your API management platform: A case study
 
Advanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsAdvanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applications
 
The forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youThe forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for you
 
Are open source and embedded software development on a collision course?
Are open source and embedded software development on a  collision course?Are open source and embedded software development on a  collision course?
Are open source and embedded software development on a collision course?
 
Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices
 
5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success
 
PSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliancePSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliance
 
Java 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureJava 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the future
 
How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)
 
Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)
 
How to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxHow to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to Linux
 
Approaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsApproaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC apps
 
Enterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSEnterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOS
 
Walk through an enterprise Linux migration
Walk through an enterprise Linux migrationWalk through an enterprise Linux migration
Walk through an enterprise Linux migration
 
How to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmHow to keep developers happy and lawyers calm
How to keep developers happy and lawyers calm
 

Recently uploaded

Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptxText-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
ShamsuddeenMuhammadA
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Pro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp BookPro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp Book
abdulrafaychaudhry
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 

Recently uploaded (20)

Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptxText-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Pro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp BookPro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp Book
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 

OSS has taken over the enterprise: The top five OSS trends of 2015

  • 1. OSS has taken over the enterprise: The top five OSS trends of 2015 Richard Sherrard director of product management
  • 2. Richard Sherrard director of product management Presenters Rogue Wave Software 2© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 3. Top five open source trends of 2015
  • 4. Open source trends we’ve seen in 2015 © 2015 Rogue Wave Software, Inc. All Rights Reserved. • Open source has taken over the enterprise • Open source discovery challenges • Open source risk management • Open source governance • Multi-tiered approach to open source management 4
  • 5. #1 Open source has taken over the enterprise
  • 6. Growth of open source © 2015 Rogue Wave Software, Inc. All Rights Reserved. 6 Use of open source continues to grow at a fast pace! 90% of companies use OSS components in commercial software (Gartner) >80% of a typical Java application is open- source components and frameworks (TechCrunch) 11 million developers worldwide make 13 billion open source requests each year
  • 7. Innovation drives open source adoption 7  Open source components provide critical functionality  Improves developer productivity No license fees  “More eyes” improves quality & security Leveraged development effort  Apache, Tomcat, Wildfly, Jakarta Commons, jQuery  Communities continuously improve features Mature, commoditized applications and libraries Community peer review © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 8. Open source in the enterprise 8 “By 2016, open source software will be in mission-critical software portfolios within 99% of all Global 1,000 enterprises.” Innovate • Opens up code options • Deploy applications with any combination of code source • Optimize developer effort and time • Quicker time to market Identify and mitigate risk • Technical risk • Business risk • Security risk • Legal and compliance risk Balance risk and reward © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 9. How open source enters your codebase 9 “90% of code in modern applications is open source” and “31% of companies have had or suspect a breach in an open source component“ Open source community Legacy code Internally developed code Reused code Third party code Supply chain code Outsource code © 2015 Rogue Wave Software, Inc. All Rights Reserved. Delivered code
  • 10. Mixed source risks 10© 2015 Rogue Wave Software, Inc. All Rights Reserved. Loss of intellectual property Defects and quality issues License restrictions and obligations Support costs Security vulnerabilities Injunctions
  • 11. What organizations are looking to answer? 11 Dev VP & Mgr OSS Compliance Mgr CTO/ CIO/CISO Security Mgr Legal What open source am I using Where are we using open source across the organization How can I increase the security of the open source What are my legal obligations Are we able to participate in the open source communities © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 12. Embrace OSS and automate the governance process 12 Create an automated organization-wide OSS policy and leverage the benefits • Increase developer productivity • Educate and develop OSS policies for the developers to follow • Marshal the resources of the OSS community • Accelerate software development Understand, manage, and govern OSS comprehensively Inventory Support Govern © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 14. Large codebases: Open source is everywhere 14 • Companies today have extremely large codebases made up of 1000’s of developed applications. • Lots of different technologies in play – web, mobile, embedded • Larger number of 3rd party software suppliers being used today Over 100 million lines of code goes into a average high end car today! © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 15. Into the “unknown” 15 • Once DISCOVERY of the open source is known you can then better understand it – What license(s) is it distributed under – GPL, Apache, BSD… – What version(s) are being used; are they outdated! – Are there known security risks – Do I have quality issues with it – Is their a strong community behind it! • A plan of action can then be worked on to resolve identified risks and issues – There will be many! Biggest open source challenge organizations face today is the “Not knowing” what they have and “Where they have it” © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 16. How are they doing discovery today? 16 • Companies find it extremely hard if not impossible to uncover where open source is being used across the organization • It is a very ad hoc process across the organization • Manual code reviews can take multiple man years to complete. • Surveying or interviewing the development teams is slow and inaccurate as developers leave and move on • Larger number of 3rd party software suppliers being used today © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 17. Automate the discovery of open source 17 Automated OSS Scanning SDLC Integrations OSS Approvals © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 18. Automate discovery of your open source 18 • Discovery by scanning your code • Conduct scan in-place – access code where it is • Run baseline and delta scans on your code • Identify the “right” project • Multiple matching techniques to find projects, files, snippets, modified code • Patented noise reduction techniques to avoid false positives, pinpoint the “right” project • Search for the “right” OSS for your needs • Large knowledgebase of OSS • Rich information about the package • Automated approval policy for OSS usage • Integrate into the SDLC • Continuous Integration builds enable on-going automation of your code scanning Get a comprehensive view of OSS across projects & teams © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 20. Assessing risk in open source 20 For all its benefits, risks exist Legal risk Using the wrong license can compromise IP Security risk The OSS component can include vulnerabilities Support risk Who do you call for help? © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 21. Cisco’s loss of IP 21 •Used GPL code to customize Broadcom's Linux distribution CyberTan • Embedded the code in chipset Broadcom • Adopted this into its WRT54G router Linksys •Bought Linksys for $500m •FSF Accused Cisco of license violation •Source code made available CISCO Developers modified firmware turning a low- end ($60) device into a high functioning router © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 22. Unknown OSS and security issues 22© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 23. Code vulnerabilities 23© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 24. Lack of open source support 24 • Open source software does not come with commercial support; you are dependent upon the OSS communities to provide you help and fixes • Who do you call when your “Mission Critical” open source application has an issue?...“No throat to choke”! • Developers have to negotiate wasted cycles and downtime while waiting for fixes from the community • Developers do not have anyone to help with risks and development pitfalls • No formal training provided on the OSS package © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 25. Managing OSS risk 25 20% of organizations lack meaningful controls over OSS selection and use of developers need not prove security of OSS they are using of the organizations claim to track vulnerabilities in OSS over time 76% 80% Increased use + few controls = unmanaged risk © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 26. Open source support 26 • With the ubiquity of open source, enterprises need commercial-grade support. • We are the only vendor offering 24x7 support across hundreds of OSS packages. • Our “Tier 4” support gives you one call access to enterprise architects, tackling a range of challenging and critical issues. • We are thought leaders in the industry, and can provide enormous value to any business that utilizes open source software. © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 27. Value of open source support 27 Support offerings range across hundreds of open source products. We help customers:  Avoid downtime and wasted cycles  Navigate complex OSS packages requiring broad and deep expertise  Mitigate risks and development pitfalls  Receive formal, instructor-led training across several OSS packages  Gain the peace of mind that comes with 24X7 support coverage © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 28. We support the best of open source 28© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 30. OSS best practices 30 Acquisition & Approval Support & Maintenance Tracking Audit & Governance Training Legal Compliance Community Interaction Acquisition & Approval Support & Maintenance Tracking Audit & Governance Training Legal Compliance Community Interaction Consulting Certified library request & approval process SLA support OpenUpdate Project tracking Auditing services License obligation audit Certification services Technical and OSS training OSS Policy © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 31. Manual OSS process 31 Web search Ask around Check the spreadsheet Answer questions Security review Update spreadsheet Contact legal Fill out form Advocate Monitor security alerts Where Used? Code Review Rewrite Wait Wait Arch. review Other approval boards Monitor updates to components Select Approve Monitor Discover Inventory © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 32. OSS management process 32 Select Discover ApproveInventory Monitor © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 33. Approve your OSS 33 Requirement: Workflows reflect policies Request and approval workflow – Fully customizable, flexible workflow engine • Create workflows that match the way teams work • Forms that ask the questions you need to approve requests • Support complex workflows with serial or parallel reviewers • Track OSS by use, what, where, when, how and who Flexible OSS policy management – Effectively communicate policies to all employees • Easily create policies based on combination of OSS package, version and license • Auto approve or deny requests based on usage model © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 34. Inventory and monitor your OSS 34 Requirement: Understand what you have, learn about it and where you have it See OSS inventory by project – Policy violations – Combined lists of both approved, known OSS, and newly discovered OSS via scanning – Comprehensive OSS Bill of Materials Continuously monitor OSS for security vulnerabilities and updates – Automatic: Daily updates via link to National Vulnerability Database (NVD) to list all know CVEs by OSS package – Manual: Daily updates on new security vulnerabilities from OSS experts after reviewing of hundreds of packages © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 35. #5 Multi tiered approach to open source management
  • 36. Multiple approaches to managing open source 36 • Finding issues late and maybe in production are very expensive to resolve • Not able to dig deeper into your code to find potential problems • Not able to fix issues on open source in use • Continuous architecture and package reviews to stay on top of the latest technology © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 37. Static code analysis 37 Significantly reduces the cost of reliable, secure software • Complements existing testing approaches • Automated and repeatable analysis Enforces key industry standards • DISA STIG, CWE, MISRA • CERT, SAMATE • OWASP, DO-178B, FDA validation • ...and more © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 38. Dynamic code analysis 38 • Interactive debugging • Interactive memory debugging • Reverse debugging • Unattended debugging • Serial and parallel applications © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 40. Open source is everywhere! 40 Open source can no longer be avoided in your application development Learn to embrace the usage of open source Need to understand what you have and where you have it Open source is not “FREE” and comes with it own risks and rewards With out checks & balances in place, open source chaos will arise Take a multi pronged approach to managing open source © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 41. Rogue Wave capabilities 41© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 42. What we do 42 Rogue Wave helps organizations simplify complex software development, improve code quality, and shorten cycle times © 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 43. See us in action: www.roguewave.com Richard Sherrard richard.sherrard@roguewave.com