You've requested...

Share this with your colleagues:

Dirk Hohndel on Intel and the Linux Foundation

If a new window did not open, click here to view this asset.

Download this next:

How to find and mitigate open source security risks

Open source code is common. Developers routinely take code from open source repositories to embed in their company’s products to speed up the development process. While the use of open source software itself is not risky, it’s the use of unmanaged open source that you should be worried about.

In a survey by Black Duck Audit Services in 2018, 60% of codebases contained at least one open source vulnerability.

Open these survey results to learn where open source vulnerabilities are most likely lurking, and best practices for mitigating open source security risks.

These are also closely related to: "Dirk Hohndel on Intel and the Linux Foundation"

  • How to make better use of open source software

    Developers turns to the open source community for the resources they need to build better software, faster. By adding an open source software (OSS) component to your project, you stand to benefit from the work of potentially thousands of developers worldwide.

    Most organizations aren’t used to working with external communities, but the ones who embrace change and build balanced relationships with the OSS community are oftentimes the most innovative in their industries.

    Open this whitepaper to learn how to become an open source enterprise.

  • Achieve collaboration you need with open source communities

    Open source is changing the way we build software. Almost every new application built today begins with code that anyone can inspect, modify, and enhance. However, few have been able to truly tap into the full advantages that the OSS community has to offer.

    Developers are at the core of innovation, meaning leading software companies today don’t just hire the best developers; they leverage the community of worldwide developers now at their disposal.

    Learn how to make the shift to an open source enterprise in this whitepaper, and collaborate with open source communities like never before.

Find more content like what you just read:

  • Best practices for securing open source code

    You never want to leave security to chance. Open this report to find best practices for finding and mitigating security vulnerabilities in your open source code.

    Download

  • CW Buyer's Guide: Government IT

    This 9 page Computer Weekly Buyer's Guide takes you through the UK government's open source initiatives and explains how they could benefit your business.

    Download

  • The benefits of adopting an open source IAM solution

    Open source IAM solutions are now gaining attention from enterprises similar to proprietary and commercial IAMs. Why? In this white paper, learn all about the benefits and use cases of open source for IAM today.

    Download

  • Focus: Open source

    Open source used to be an alternative to commercial off –the-shelf software. Today, the largest commercial software providers are big supporters of open source technologies.

    Download

  • Discover how Linux has changed the tech industry

    In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.

    Download

  • A Computer Weekly Buyer's Guide to Enterprise Open Source

    In this 13-page buyer's guide, Computer Weekly looks at open source technology. Discover more about why open source has become the infrastructure choice over commercial software; the due diligence required to reap the rewards of open source and how to choose the best fit for your needs.

    Download

  • Private Cloud E-Zine Vol. 4

    As cloud continues to evolve, IT managers are looking for better integration of cloud platforms with existing tools, greater control and management, improved self-service and greater portability among cloud environments. This e-zine takes a look at trends in cloud computing, using open source software, moving applications to the cloud.

    Download

  • Data science: Are open source tools for you?

    This report examines the importance of open source tools in enterprise data science, including the technical and business advantages of open source languages and platforms used by data scientists in the development of ML and AI applications, as well as core platforms including Apache Hadoop and Apache Spark.

    Download

  • Open Trusted Technology Provider Standard (O-TTPS)

    This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.

    Download

  • Open source network security tools for beginners

    In this white paper, get an overview of some of the leading open source tools as well as tips on how to use them for network security.

    Download

  • Explore different intrusion detection tools

    Threat and intrusion detection have become a top priority in cybersecurity, making it more important than ever. If you aren't already running an intrusion detection system (IDS) in your network, you should start now. In this white paper, explore different IDS tools to determine which would be the best fit for your organization.

    Download

  • Open source as an alternative to proprietary relational database tech

    Read this handbook to examine the evolution of open source database software, its potential uses versus commercial database management systems and issues to consider before starting a deployment.

    Download

  • 6 advantages of open-source databases

    In the database management systems (DBMS) space, adoption of open-source implementation over the past 5 years is increasing. Read this white paper to learn about the 6 advantages of open-source DBMSes that are pushing this trend.

    Download

  • Simplify Bro management and deployment with Corelight

    In this white paper, learn about the Corelight Sensor, which was designed to simplify the notoriously complicated open source Bro deployment and management. Also, explore 7 reasons to switch from the open source format to a Corelight Sensor.

    Download

  • A four-level analysis of your software's security model

    While open source software continues to offer product development benefits, it also brings harmful risks you need to manage. Read this whitepaper to explore the 4 levels of a composition analysis model that supports open source security and compliance.

    Download

  • How to assure quality software deployment in open source DBMSes

    Read this white paper to learn how using an Instaclustr Certification Framework for your open source software deployment can assure your products are enterprise-grade and production-ready.

    Download

  • How ABN AMRO Embraced CI/CD to Accelerate Innovation and Improve Security

    In this webinar find out how open source tools, automation, and security are changing the way applications are being developed, and how your development team can adjust with the times.

    Download

  • A Computer Weekly Buyer's Guide to Application Development and DevOps

    Harnessing the right developer tools offers new advantages for businesses. In this 14-page buyer's guide, Computer Weekly looks at the benefits and limitations of the DevOps approach, what Microsoft is doing with its developer platform and the rise of the holistic application.

    Download

  • 44% of big data projects are fueled by advanced analytics

    Discover how a comprehensive and open analytics portfolio with code-free techniques and open-source programming can help your data science and analytics team deal with an avalanche of new demands.

    Download

  • Computer Weekly – 19 July 2016: Building big ideas in banking

    In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.

    Download

  • A Computer Weekly Buyer's Guide to Data Management

    Organisations have an ever-increasing amount of data at their disposal. In this 13-page buyer's guide, Computer Weekly looks at what the future holds for data management, how the Met Office is opening up large volumes of data, and why business outcomes should be the focus for data use.

    Download

  • How to get open-source application support

    When it comes to open source applications, an integrated managed platform can help provide this foundation, and can provide 24/7 support, management of thousands of nodes, and more. Download this white paper to learn more about a managed platform option for open source applications.

    Download

  • OpenStack: The essential guide

    The opportunities and challenges presented by the OpenStack and VMware virtualisation environments when it comes to storage, backup and disaster recovery

    Download

  • Verifying the integrity of open source Android apps

    This article in our Royal Holloway Information Security Thesis Series looks at how researchers can determine whether an app was built from its published source code.

    Download

  • Computer Weekly Buyer's Guide: Service Integration & Asset Management

    In this 13-page buyer's guide, Computer Weekly looks at the effects on the IT department of technology commoditisation, open source and software as a service, the trend of insourcing IT, and the concept of service integration and management for outsourced services.

    Download

  • How Groupon easily transitioned to GitHub

    As organizations grow and hire more engineers, it's often these new engineers that are accustomed to hosting code or contributing to open source projects on GitHub. Open this case study with Groupon to see how they've smoothly made the switch to using GitHub for developer collaboration.

    Download

  • How to get high-fidelity data streams for network traffic analysis

    Watch this webcast to learn about Zeek—formally known as Bro—an open-source network security monitor that empowers incident responders and threat hunters to locate and prevent attacks by providing high-fidelity data streams for traffic analysis.

    Download

  • Datasheet: Compact, cloud-ready data protection

    Open this whitepaper to learn about what Data Domain DD3300 from Dell EMC can bring to the table as an entry-level, cloud-ready data protection option, built with the scaling, backup, and cost demands of small to midsize IT environments in mind.

    Download

  • Enterprise-wide network visibility with open-source framework

    Watch this video to hear Director of Customer Solutions at Corelight, Vincent Stoffer, discuss network visibility and threat hunting as well as pairing the company's hardware appliance with the open-source software, Bro, now known as Zeek—enabling security teams to use Bro at an enterprise scale for accurate network traffic analysis.

    Download

  • How you can unlock new threat hunting capabilities

    When an international law firm wanted to expand its threat hunting capabilities through analysis technique with network visibility, they decided on Bro Network Security Monitor. However, after realizing they couldn't scale it properly, the law firm looked to Corelight AP Sensor. See how it helped them achieve their goals in this white paper.

    Download

  • An overview of Apache Kafka

    Apache Kafka is a streaming and queuing technology for large-scale, always-on applications. Download this resource to discover an overview of the many benefits and capabilities.

    Download

  • Computer Weekly – 7 June 2016: Apple lures open source developers with Swift

    In this week's Computer Weekly, we look at Apple's plan to woo open source developers to its Swift programming language. DevOps practitioners are warning of growing stress on IT operations staff through the growth of continuous development practices. And Specsavers' CIO tells us why the store is a vital part of digital retail. Read the issue now.

    Download

  • Modelling the Insurance Enterprise

    This report from the Open Group is aimed at managers, architects, and designers that serve the insurance industry or have an interest in integrating the TOGAF and ArchiMate standards.

    Download

  • Key software development trends to drive business success

    In this e-guide, you will learn more about leveraging DevOps to automate processes between development and IT teams, the importance of testing to keep internet of things devices safe from prying eyes and how one company has made use of open source software to automate the roll-out of application changes.

    Download

  • Get a holistic view of network traffic

    Watch this webinar to learn about an open source framework designed to transform network traffic into high-fidelity logs that summarize activity, and automate traffic analysis to help you focus on finding the attacker.

    Download

  • Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?

    In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.

    Download

  • Why is Bristol Britain's smartest city?

    In this week's Computer Weekly, we visit Bristol, ranked as the UK's top smart city, to find out what it's learned and future plans. Our latest buyer's guide examines software-defined wide area networks (SD-WAN). And we trace the evolution of open source as more organisations contribute code to the community. Read the issue now.

    Download

  • Optimising Linux on System z

    Linux on System z has opened up new opportunities for the mainframe say analysts Clive Longbottom and Rob Bamforth.

    Download

  • CW Middle East July to Sept 2016:

    In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.

    Download

  • Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws

    In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.

    Download

  • Computer Weekly – 19 June 2018: Microsoft becomes devoted to open source developers

    In this week's Computer Weekly, after Microsoft's recent acquisition of GitHub, we examine the software giant's tools for embracing open source developers. Also, secretary of state for digital, culture, media and sport Matt Hancock talks about growing the UK digital economy and supporting the tech sector. Read the issue now.

    Download

  • Double your revenue with modern data protection tools

    Organizations that invest in modern data protection solutions are 2x more likely to exceed revenue goals, ESG reports. How is this possible? Check out the following video to find out.

    Download

  • Application development without the sprawl

    Enterprise architects (EAs) are combatting sprawl through IT transformation projects that seek to rationalize applications and data sources, control and standardize development across functional siloes, and make technology choices that support future growth. This e-book covers five ways to help EAs achieve all this while minimizing sprawl.

    Download

  • Computer Weekly – 27 November 2018: Software patching at scale – how to make it work

    In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.

    Download

  • Double your IOPS with NVMe-ready midrange storage

    Download this infographic to meet an NVMe-ready midrange storage system designed to double your IOPS, reduce latency by 75%, and create 31% more usable capacity so you can fully capitalize on your data's value.

    Download

  • Explore how Zeek reliably identifies encrypted traffic

    The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source Zeek framework (formerly called 'Bro') was purpose-built for network security monitoring.

    Download

  • Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games

    In this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.

    Download