Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Intellectual Property Law  >   Intellectual Property  >   Copyright  >  

Open Source

RSS Feed   
DEFINITION: Shared source is a software licensing concept that is more open than the proprietary approach to licensing but more restricted than the open source model. Under a shared source program license, authorized parties are granted full or partial access to source code. Typically, those granted access can view source code but cannot alter it for any commercial purpose. Some shared source programs allow  … 

Open Source definition sponsored by SearchEnterpriseLinux.com, powered by WhatIs.com an online computer dictionary
Open Source Reports
1 - 25 of 248 Matches Previous Page  |  Next Page
Social Media Research Tools
sponsored by Authentic8, Inc.
RESOURCE: Authentic8 ‘s Top of FormOSINT Training Specialists recently published 6 favorite tools for conducting social media investigations. Learn how Authentic8's Silo Research Toolbox can make your investigations compliant, anonymous and secure.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Authentic8, Inc.

Auditing Your Company’s Use of Open Source
sponsored by Fossa
WHITE PAPER: As more and more companies continue to include open source as part of their software program, it’s critical to establish a strategy to manage consumption and ensure efficient use of resources. Download this guide for the key aspects of an open source strategy designed to keep you on track with your operational and compliance objectives.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Fossa

5 Reasons Why Using Spreadsheets for Open Source Management is a Recipe for Disaster
sponsored by Fossa
WHITE PAPER: Management of open source is a growing concern that many organizations are struggling with handling effectively. Most organizations start off managing all of their open source dependencies in a spreadsheet. In this white paper, discover 5 reasons on why that can be a recipe for disaster.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Fossa

The Rise of the Open Source Program Office
sponsored by Fossa
WHITE PAPER: Open source software is fundamentally different from proprietary software. Often, different teams use and/or build open source differently. Because of this variability, it needs to be approached differently. Managing this strategy is the job of the OSPO (Open Source Program Office). But what is an OSPO and how do you build one? Read on to find out.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Fossa

Mitigating IP Risk: Three Strategies to Ensure Open Source Compliance
sponsored by Fossa
WHITE PAPER: As open source software continues to be adopted at an increasing rate, compliance with open source licenses becomes a more pressing initiative. Download this white paper for 3 strategies you can use to ensure open source compliance.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

Fossa

Asurion developers choose Snyk for developer-focused approach and for its product vision and innovation
sponsored by Snyk
CASE STUDY: Most companies use a huge amount of open source code in their development process – without the proper security channels set up for managing and protecting their data. Here, a company with microservices-based architecture found an open source-specific security tool that met their data management needs. Read the case study now to learn how.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Snyk

Securing Open Source Libraries: 2019 Update
sponsored by Snyk
ANALYST REPORT: In this 79-page eBook, find an in-depth analysis on the current state of open source security. The eBook features insights into finding and fixing vulnerable packages, integrating testing to prevent vulnerabilities, and choosing a SCA solution. Access the full guide here.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Snyk

The Total Economic Impact™ Of Snyk
sponsored by Snyk
RESEARCH CONTENT: The global security industry is struggling to keep up with rapidly evolving and unpredictable security threats – and many of these threats can be sourced to open source vulnerabilities. In this report, Forrester examines the TEI™ and ROI of an open source security platform. Check out the report here.
Posted: 21 Jan 2020 | Published: 29 Nov 2019

Snyk

Auth0 Case Study: Developer Security at High-Growth Scale
sponsored by Snyk
CASE STUDY: For an organization that focuses on authentication and authorization processes, security is the number one priority – teams must be able to identify vulnerabilities before attackers do. See how this CIAM platform company made that possible in this open source security case study. Click here to read more.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

Snyk

MongoDB Security Team Enables Secure Development with Snyk
sponsored by Snyk
CASE STUDY: Manually sorting through open source libraries for vulnerabilities can take hours, and doublechecking CVE lists can keep you at work late. That’s why automated open source security solutions are so effective – time spent ensuring secure development is cut in half. Learn more about the perks of open source security in this resource now.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

TOPICS:  Open Source
Snyk

The state of open source security report
sponsored by Snyk
RESOURCE: The open source software landscape is rooted in rich soil – but someone forgot to lock the garden gate. In this 50-page report, Snyk examines the state of security in open source software through survey results, external research, and internal data. Read the report now to get out of the weeds.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Snyk

Open Source Network Security Tools
sponsored by AT&T Cybersecurity
RESOURCE: With so many open-source tools available to help with network security, it can be tricky to figure out where to start. This beginner’s guide will provide you with the advice and expertise to help you navigate the extensive selection of tools. Read on to get started.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

AT&T Cybersecurity

Top 10 ASEAN IT stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: Over the year, Computer Weekly looked at how the region is embracing technology, not for its own sake but to become more nimble, secure and to overcome the challenges of a growing economy. Here are Computer Weekly's top 10 ASEAN IT stories of 2019.
Posted: 06 Jan 2020 | Published: 07 Jan 2020

ComputerWeekly.com

Sonatype Nexus Lifecycle Review From A Customer
sponsored by Sonatype
CASE STUDY: Accuracy matters in security management. As it happens, security management at a reasonable cost matters quite a bit too. Luckily, select security platforms offer both. Sonatype’s Nexus Lifecycle ensures quality open source software security. Read how Sonatype helped one business improve their proactivity in this IT Central Station review.
Posted: 30 Dec 2019 | Published: 30 Dec 2019

Sonatype

Open Source Security Intelligence
sponsored by Sonatype
CASE STUDY: Is open source security a priority for your organization? If not, be sure to add it to your list of resolutions for 2020. This case study compares how two top vendors – Nexus Intelligence with Black Duck – address common security threats for open source components. Read the study now to see who came out on top.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Sonatype

Sonatype Nexus Lifecycle and WhiteSource: Buyer's Guide and Reviews October 2019
sponsored by Sonatype
RESOURCE: Software composition analysis (SCA) is new to the IT scene – sort of. SCA gives users visibility into security risks in open source components. SCA used to be waterfall-native, but now, with newly automated processes, SCA is back with a DevOps foundation. Check out this report for a comparison of top SCA vendors.
Posted: 23 Dec 2019 | Published: 31 Oct 2019

Sonatype

DevSecOps for Containers - Nexus Lifecycle Container Analysis
sponsored by Sonatype
VIDEO: Ever thought about applying DevSecOps methodologies to containers? Sonatype has. With this security-focused approach to containers, organizations can analyze, automate, and scale their containers with higher efficiency and lower risk. Watch this video demonstration of the Nexus Lifecycle Container Analysis now to see how.
Posted: 20 Dec 2019 | Premiered: 20 Dec 2019

TOPICS:  Open Source
Sonatype

Technology Insight for Software Composition Analysis
sponsored by Sonatype
RESEARCH CONTENT: According to a Gartner survey, over 90% of respondents reported using open-source software. The accessibility of open source is inviting, but its popularity is mirrored by a steady increase in security risks. In this research report, Gartner examines the vulnerabilities associated with open-source and third-party software. Read the full report now.
Posted: 19 Dec 2019 | Published: 29 Nov 2019

Sonatype

OpenShift Container Platform
sponsored by Red Hat
DATA SHEET: With a Kubernetes platform, managing containers on cloud environments is easy. With Red Hat OpenShift, it can be even easier. See how a hybrid cloud Kubernetes application platform can help your business by reading this data sheet.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Red Hat

The Total Economic Impact of Red Hat OpenShift Dedicated
sponsored by Red Hat
CASE STUDY: With a growing demand to modernize IT architecture, migrating and updating legacy applications can increase administrative and operational time. Forrester’s case study on OpenShift Dedicated (OSD) found that operations and administrative costs decrease by 2 FTEs each year. Read how three organizations benefited from OSD in the full case study here.
Posted: 05 Dec 2019 | Published: 28 Jun 2019

Red Hat

Comparing Red Hat Ansible Automation and Puppet Enterprise
sponsored by Red Hat
WHITE PAPER: Finding a simple automation tool is a top priority for many organizations looking to better their processes. Consult with this competitive review of Red Hat Ansible Automation and Puppet Enterprise to weigh the pros and cons of each platform.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Red Hat

The Future of Financial Services: Part 2
sponsored by ComputerWeekly.com
EGUIDE: In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

ComputerWeekly.com

Case Study: DBS Bank goes big on open source
sponsored by ComputerWeekly.com
EGUIDE: Besides using a slew of open source software, DBS Bank is looking to contribute some of its own projects to the open source community in future
Posted: 29 Jul 2019 | Published: 30 Jul 2019

ComputerWeekly.com

Real-Time Anomaly Detection at Scale: 19 Billion Events per Day
sponsored by Instaclustr
WHITE PAPER: Read this white paper to learn how to utilize open source software and the cloud to enable scalable anomaly detection in your organization with the capability to process 19 billion events in a single day.
Posted: 25 Jun 2019 | Published: 31 Dec 2018

Instaclustr

A Computer Weekly buyer's guide to deep learning
sponsored by ComputerWeekly.com
EGUIDE: Deep learning can help companies operate faster and more efficiently. In this 13-page buyer'sguide, Computer Weekly looks at the advanced tools available for developers building intelligentapps, the frameworks that can be used and the kit that can enhance a programmer's toolbox.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

ComputerWeekly.com
1 - 25 of 248 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info