Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Intellectual Property Law  >   Intellectual Property  >   Copyright  >  

Open Source

RSS Feed   
DEFINITION: Shared source is a software licensing concept that is more open than the proprietary approach to licensing but more restricted than the open source model. Under a shared source program license, authorized parties are granted full or partial access to source code. Typically, those granted access can view source code but cannot alter it for any commercial purpose. Some shared source programs allow  … 

Open Source definition sponsored by SearchEnterpriseLinux.com, powered by WhatIs.com an online computer dictionary
Open Source Reports
1 - 25 of 247 Matches Previous Page  |  Next Page
The Top 5 Open Source Vulnerabilities in Technology Companies
sponsored by Sonatype
WHITE PAPER: The tech industry relies on open source technology as a competitive advantage to enable their teams to bring products to market quickly. However, this increased speed also comes with risks. In this white paper, explore the top five areas of vulnerability plaguing organizations in the tech industry today.
Posted: 11 May 2020 | Published: 11 May 2020

Sonatype

The Top 5 Open Source Vulnerabilities in Financial Institutions
sponsored by Sonatype
WHITE PAPER: In terms of operational efficiency, open source is unmatched. However, for the financial industry, heavy regulations make ensuring the security of open source applications difficult to manage and prove. In this white paper, take a closer look at the top five areas of vulnerability plaguing today’s financial services organizations.
Posted: 11 May 2020 | Published: 11 May 2020

Sonatype

5 steps to faster builds with Jenkins Shared Libraries
sponsored by nClouds
RESOURCE: Jenkins is an open-source CI tool that helps automate the build cycle. In this blog, learn what Jenkins Shared Library can bring to your organization (here’s a sneak peek: accelerated builds, decreased memory overhead, and extracted reusable parts of your pipeline).Read the blog here to learn more.
Posted: 04 May 2020 | Published: 04 May 2020

nClouds

Best Practices for Using Open Source Code
sponsored by TechTarget
RESOURCE: A huge amount of applications are now built with open source components, but what affects does this open source code use have on your apps later on down the line? Take a look at this guide, Open Source Compliance, Security, & Risk Best Practices to learn how to monitor your open source code and make sure you're using it safely.
Posted: 22 Apr 2020 | Published: 30 Mar 2020

TechTarget

Your Cloud Computing New Year's Resolution
sponsored by TechTarget
RESOURCE: Stick to your new year's resolution and improve your cloud strategy with this Cloud Computing: Market Insights and Best Practices for 2020 e-guide.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

TechTarget

Computer Weekly - 7 April 2020: Adapting IT to the new normal
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
Posted: 06 Apr 2020 | Published: 07 Apr 2020

ComputerWeekly.com

Kubernetes: The Cloud Strategy You’ve Been Waiting For...
sponsored by ATC
WHITE PAPER: Need a quick-but-thorough refresher on Kubernetes? This eBook provides a concise overview of Kubernetes. One of the major selling points of Kubernetes is that they benefit both IT and business teams respectively – so using them is a win for the whole organization. Learn about the other benefits of Kubernetes by downloading the eBook now.
Posted: 28 Feb 2020 | Published: 28 Feb 2020

ATC

Computer Weekly - 3 March 2020: What will points-based immigration mean for IT recruitment?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the government's new points-based immigration rules and assess the implications for the tech sector. IR35 tax rules change in April – we find out how IT contractors need to prepare. And we examine whether the rise of cloud is really displacing the datacentre. Read the issue now.
Posted: 28 Feb 2020 | Published: 03 Mar 2020

ComputerWeekly.com

Auditing Your Company’s Use of Open Source
sponsored by Fossa
WHITE PAPER: As more and more companies continue to include open source as part of their software program, it’s critical to establish a strategy to manage consumption and ensure efficient use of resources. Download this guide for the key aspects of an open source strategy designed to keep you on track with your operational and compliance objectives.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Fossa

5 Reasons Why Using Spreadsheets for Open Source Management is a Recipe for Disaster
sponsored by Fossa
WHITE PAPER: Management of open source is a growing concern that many organizations are struggling with handling effectively. Most organizations start off managing all of their open source dependencies in a spreadsheet. In this white paper, discover 5 reasons on why that can be a recipe for disaster.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Fossa

The Rise of the Open Source Program Office
sponsored by Fossa
WHITE PAPER: Open source software is fundamentally different from proprietary software. Often, different teams use and/or build open source differently. Because of this variability, it needs to be approached differently. Managing this strategy is the job of the OSPO (Open Source Program Office). But what is an OSPO and how do you build one? Read on to find out.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Fossa

Mitigating IP Risk: Three Strategies to Ensure Open Source Compliance
sponsored by Fossa
WHITE PAPER: As open source software continues to be adopted at an increasing rate, compliance with open source licenses becomes a more pressing initiative. Download this white paper for 3 strategies you can use to ensure open source compliance.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

Fossa

Asurion developers choose Snyk for developer-focused approach and for its product vision and innovation
sponsored by Snyk
CASE STUDY: Most companies use a huge amount of open source code in their development process – without the proper security channels set up for managing and protecting their data. Here, a company with microservices-based architecture found an open source-specific security tool that met their data management needs. Read the case study now to learn how.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Snyk

Securing Open Source Libraries: 2019 Update
sponsored by Snyk
ANALYST REPORT: In this 79-page eBook, find an in-depth analysis on the current state of open source security. The eBook features insights into finding and fixing vulnerable packages, integrating testing to prevent vulnerabilities, and choosing a SCA solution. Access the full guide here.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Snyk

The Total Economic Impact™ Of Snyk
sponsored by Snyk
RESEARCH CONTENT: The global security industry is struggling to keep up with rapidly evolving and unpredictable security threats – and many of these threats can be sourced to open source vulnerabilities. In this report, Forrester examines the TEI™ and ROI of an open source security platform. Check out the report here.
Posted: 21 Jan 2020 | Published: 29 Nov 2019

Snyk

Auth0 Case Study: Developer Security at High-Growth Scale
sponsored by Snyk
CASE STUDY: For an organization that focuses on authentication and authorization processes, security is the number one priority – teams must be able to identify vulnerabilities before attackers do. See how this CIAM platform company made that possible in this open source security case study. Click here to read more.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

Snyk

MongoDB Security Team Enables Secure Development with Snyk
sponsored by Snyk
CASE STUDY: Manually sorting through open source libraries for vulnerabilities can take hours, and doublechecking CVE lists can keep you at work late. That’s why automated open source security solutions are so effective – time spent ensuring secure development is cut in half. Learn more about the perks of open source security in this resource now.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

TOPICS:  Open Source
Snyk

The state of open source security report
sponsored by Snyk
RESOURCE: The open source software landscape is rooted in rich soil – but someone forgot to lock the garden gate. In this 50-page report, Snyk examines the state of security in open source software through survey results, external research, and internal data. Read the report now to get out of the weeds.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Snyk

Top 10 ASEAN IT stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: Over the year, Computer Weekly looked at how the region is embracing technology, not for its own sake but to become more nimble, secure and to overcome the challenges of a growing economy. Here are Computer Weekly's top 10 ASEAN IT stories of 2019.
Posted: 06 Jan 2020 | Published: 07 Jan 2020

ComputerWeekly.com

Sonatype Nexus Lifecycle Review From A Customer
sponsored by Sonatype
CASE STUDY: Accuracy matters in security management. As it happens, security management at a reasonable cost matters quite a bit too. Luckily, select security platforms offer both. Sonatype’s Nexus Lifecycle ensures quality open source software security. Read how Sonatype helped one business improve their proactivity in this IT Central Station review.
Posted: 30 Dec 2019 | Published: 30 Dec 2019

Sonatype

Open Source Security Intelligence
sponsored by Sonatype
CASE STUDY: Is open source security a priority for your organization? If not, be sure to add it to your list of resolutions for 2020. This case study compares how two top vendors – Nexus Intelligence with Black Duck – address common security threats for open source components. Read the study now to see who came out on top.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Sonatype

Sonatype Nexus Lifecycle and WhiteSource: Buyer's Guide and Reviews October 2019
sponsored by Sonatype
RESOURCE: Software composition analysis (SCA) is new to the IT scene – sort of. SCA gives users visibility into security risks in open source components. SCA used to be waterfall-native, but now, with newly automated processes, SCA is back with a DevOps foundation. Check out this report for a comparison of top SCA vendors.
Posted: 23 Dec 2019 | Published: 31 Oct 2019

Sonatype

DevSecOps for Containers - Nexus Lifecycle Container Analysis
sponsored by Sonatype
VIDEO: Ever thought about applying DevSecOps methodologies to containers? Sonatype has. With this security-focused approach to containers, organizations can analyze, automate, and scale their containers with higher efficiency and lower risk. Watch this video demonstration of the Nexus Lifecycle Container Analysis now to see how.
Posted: 20 Dec 2019 | Premiered: 20 Dec 2019

TOPICS:  Open Source
Sonatype

Technology Insight for Software Composition Analysis
sponsored by Sonatype
RESEARCH CONTENT: According to a Gartner survey, over 90% of respondents reported using open-source software. The accessibility of open source is inviting, but its popularity is mirrored by a steady increase in security risks. In this research report, Gartner examines the vulnerabilities associated with open-source and third-party software. Read the full report now.
Posted: 19 Dec 2019 | Published: 29 Nov 2019

Sonatype

The Future of Financial Services: Part 2
sponsored by ComputerWeekly.com
EGUIDE: In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

ComputerWeekly.com
1 - 25 of 247 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info