Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Intellectual Property Law  >   Intellectual Property  >   Copyright  >  

Open Source

RSS Feed   
DEFINITION: Shared source is a software licensing concept that is more open than the proprietary approach to licensing but more restricted than the open source model. Under a shared source program license, authorized parties are granted full or partial access to source code. Typically, those granted access can view source code but cannot alter it for any commercial purpose. Some shared source programs allow  … 

Open Source definition sponsored by SearchEnterpriseLinux.com, powered by WhatIs.com an online computer dictionary
Open Source Reports
1 - 25 of 253 Matches Previous Page  |  Next Page
Five Ways Open Source Innovation Supports You in Uncertain Economic Times
sponsored by SUSE
WHITE PAPER: In this guide, learn about the 5 ways open source innovation can support your business through uncertain economic times—and how it can reduce costs without sacrificing business outcomes.
Posted: 23 Sep 2020 | Published: 23 Sep 2020

SUSE

ABN AMRO and Nexus Lifecycle
sponsored by Sonatype
CASE STUDY: For a long time, development at ABN AMRO used a waterfall methodology. After a transition to DevOps, ABN AMRO wanted to take it one step further. In this resource, learn why they chose Nexus Lifecycle and Nexus Repository for open source monitoring and a binary artifact store.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Sonatype

Bloomberg Industry Group Strengthens Their Software Supply Chain
sponsored by Sonatype
CASE STUDY: One of the most difficult parts of using open source software is having to search for vulnerabilities. But this process can be made easier through the improvement of open source governance. Read this case study to view an example of how Bloomberg Industry Group was able to secure their DevOps operations and pave the way for DevSecOps in doing so.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Sonatype

Open Your Possibilities with Red Hat
sponsored by Red Hat
EBOOK: In virtually every industry, mid-sized organizations have ensured business success by harnessing data and analytics. But they still face challenges. Dive into this eBook to learn how mid-size organizations like your own are redefining the power and potential of their IT environments while tackling major hurdles along the way.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

Red Hat

How Service Providers with Open Source Expertise Drive Midmarket Customer Success
sponsored by Red Hat
WHITE PAPER: Open source software is behind many aspects of modern cloud environments, from private cloud to containers. But what are the main drivers behind the use of open source technology? Among benefits such as more stable code, ease of use and extra functionality, which do midmarket service providers value most (and least)? Open this brief to find out.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

Red Hat

Understanding the risk of open-source software
sponsored by Contrast Security
WHITE PAPER: Open this white paper to learn more about the licensing and security risks of open-source software and how to overcome them.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

TOPICS:  Open Source
Contrast Security

Breadth and Depth of Commercial Support is a Driver for Open Source Success with Midsized Companies
sponsored by Red Hat
RESEARCH CONTENT: A recent survey conducted by 451 Research found that between nearly 1,350 IT respondents, security, support, and assurance were the most valued open source attributes. Dive into this executive summary to get a snapshot of the exact survey results.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Red Hat

Contrast OSS: Automated Open-Source Security Without the Noise
sponsored by Contrast Security
WHITE PAPER: Open-source software comes with its risks. Not only does your team have to work with complex licensing issues, but open source channels can lead to security vulnerabilities. These open-source risks require unique AppSec solutions. Learn how to get started with the right application security tools in this guide.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Contrast Security

5 things to know about building and certifying software on Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: Did you know that 9 of the top 10 public clouds run on Linux? In this exclusive guide, get the basics on building and certifying software on Red Hat Enterprise Linux—including some tips and tricks to get ahead.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Red Hat

Running SAP Solutions: The Future is Open Source
sponsored by SUSE
WHITE PAPER: Learn how SUSE’s open-source platform can help ensure your SAP systems run smoothly in this white paper.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

SUSE

Bringing Open Source to the Core of your Data & AI
sponsored by IBM
WEBCAST: In this webcast, two IBM platform offerings experts weigh in on the importance of bringing open source to the core of your data & AI. Access it to learn about the open source adoption process, understand IBM's perspective approach to data & discover 3 data & AI open source use case scenarios that showcase its potential.
Posted: 11 Jun 2020 | Premiered: Jun 11, 2020

IBM

Bringing Open Source to the Core of your Data & AI
sponsored by IBM
WEBCAST: In this webcast, two IBM platform offerings experts weigh in on the importance of bringing open source to the core of your data & AI. Access it to learn about the open source adoption process, understand IBM's perspective approach to data & discover 3 data & AI open source use case scenarios that showcase its potential.
Posted: 11 Jun 2020 | Premiered: Jun 11, 2020

IBM

Best Practices for Using Open Source Code
sponsored by TechTarget
RESOURCE: A huge amount of applications are now built with open source components, but what affects does this open source code use have on your apps later on down the line? Take a look at this guide, Open Source Compliance, Security, & Risk Best Practices to learn how to monitor your open source code and make sure you're using it safely.
Posted: 22 Apr 2020 | Published: 30 Mar 2020

TechTarget

Your Cloud Computing New Year's Resolution
sponsored by TechTarget
RESOURCE: Stick to your new year's resolution and improve your cloud strategy with this Cloud Computing: Market Insights and Best Practices for 2020 e-guide.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

TechTarget

Computer Weekly - 7 April 2020: Adapting IT to the new normal
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
Posted: 06 Apr 2020 | Published: 07 Apr 2020

ComputerWeekly.com

Computer Weekly - 3 March 2020: What will points-based immigration mean for IT recruitment?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the government's new points-based immigration rules and assess the implications for the tech sector. IR35 tax rules change in April – we find out how IT contractors need to prepare. And we examine whether the rise of cloud is really displacing the datacentre. Read the issue now.
Posted: 28 Feb 2020 | Published: 03 Mar 2020

ComputerWeekly.com

Auditing Your Company’s Use of Open Source
sponsored by Fossa
WHITE PAPER: As more and more companies continue to include open source as part of their software program, it’s critical to establish a strategy to manage consumption and ensure efficient use of resources. Download this guide for the key aspects of an open source strategy designed to keep you on track with your operational and compliance objectives.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Fossa

5 Reasons Why Using Spreadsheets for Open Source Management is a Recipe for Disaster
sponsored by Fossa
WHITE PAPER: Management of open source is a growing concern that many organizations are struggling with handling effectively. Most organizations start off managing all of their open source dependencies in a spreadsheet. In this white paper, discover 5 reasons on why that can be a recipe for disaster.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Fossa

The Rise of the Open Source Program Office
sponsored by Fossa
WHITE PAPER: Open source software is fundamentally different from proprietary software. Often, different teams use and/or build open source differently. Because of this variability, it needs to be approached differently. Managing this strategy is the job of the OSPO (Open Source Program Office). But what is an OSPO and how do you build one? Read on to find out.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Fossa

Mitigating IP Risk: Three Strategies to Ensure Open Source Compliance
sponsored by Fossa
WHITE PAPER: As open source software continues to be adopted at an increasing rate, compliance with open source licenses becomes a more pressing initiative. Download this white paper for 3 strategies you can use to ensure open source compliance.
Posted: 31 Jan 2020 | Published: 31 Jan 2020

Fossa

Asurion developers choose Snyk for developer-focused approach and for its product vision and innovation
sponsored by Snyk
CASE STUDY: Most companies use a huge amount of open source code in their development process – without the proper security channels set up for managing and protecting their data. Here, a company with microservices-based architecture found an open source-specific security tool that met their data management needs. Read the case study now to learn how.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Snyk

Securing Open Source Libraries: 2019 Update
sponsored by Snyk
ANALYST REPORT: In this 79-page eBook, find an in-depth analysis on the current state of open source security. The eBook features insights into finding and fixing vulnerable packages, integrating testing to prevent vulnerabilities, and choosing a SCA solution. Access the full guide here.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Snyk

The Total Economic Impact™ Of Snyk
sponsored by Snyk
RESEARCH CONTENT: The global security industry is struggling to keep up with rapidly evolving and unpredictable security threats – and many of these threats can be sourced to open source vulnerabilities. In this report, Forrester examines the TEI™ and ROI of an open source security platform. Check out the report here.
Posted: 21 Jan 2020 | Published: 29 Nov 2019

Snyk

Auth0 Case Study: Developer Security at High-Growth Scale
sponsored by Snyk
CASE STUDY: For an organization that focuses on authentication and authorization processes, security is the number one priority – teams must be able to identify vulnerabilities before attackers do. See how this CIAM platform company made that possible in this open source security case study. Click here to read more.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

Snyk

MongoDB Security Team Enables Secure Development with Snyk
sponsored by Snyk
CASE STUDY: Manually sorting through open source libraries for vulnerabilities can take hours, and doublechecking CVE lists can keep you at work late. That’s why automated open source security solutions are so effective – time spent ensuring secure development is cut in half. Learn more about the perks of open source security in this resource now.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

TOPICS:  Open Source
Snyk
1 - 25 of 253 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info