Open Source Infrastructure Solidifying Quickly

Size: px
Start display at page:

Download "Open Source Infrastructure Solidifying Quickly"

Transcription

1 IEEE DISTRIBUTED SYSTEMS ONLINE Published by the IEEE Computer Society Vol. 6, No. 3; March 2005 Open Source Infrastructure Solidifying Quickly Greg Goth Technology industry executives and observers often disagree on the significance of a given development or trend. However, sentiment that the infrastructure supporting open source development is becoming truly "industrial strength" is nearly unanimous. "We're near an understanding that we're approaching an equilibrium point," says Bob Sutor, IBM's vice president of standards. "We're not in a situation where everything is proprietary or everything is going to be open source. There's a lot of need for both." Sutor says IBM's approach to supporting Linux is a good example of open source development's new maturity and the way big software companies can use it to extend their offerings and add another dimension to a more broadly competitive landscape. "There's no bigger booster of Linux than IBM, but we still sell middleware products that run on top of Linux and run fine," says Sutor. "But what we are seeing, and what people are understanding, is hard evidence that when you're dealing with certain types of projects and you're doing it out in the open, a tremendous amount of creativity can be garnered that you weren't necessarily able to pull together before. This equilibrium point is saying there's a lot to be done in the open community, and we need to support that to feed it even more." 1

2 The difference a year makes However, just a year ago, open source development seemed to be suffering a public perception problem. No blockbuster consumer-level application had yet emerged to draw mass end-user attention to open source, and a potentially blockbuster legal case between IBM and plaintiff SCO Group threatened to slow Linux deployment until copyright ownership of key Unix code was established. In the past six months, both factors changed considerably. The open source Firefox browser ( developed by the Mozilla Foundation, has enticed millions of users away from Microsoft's Internet Explorer browser. The OpenOffice productivity suite ( has received numerous positive reviews and is becoming a widely used, basic office suite. These two developments alone are giving open source applications much greater visibility among the large percentage of "general" end users, not apt to tinker with their desktops. The SCO suit against IBM is also turning out to be far less critical for the Linux community at large. In early February, US District Court Judge Dale Kimball chastised SCO severely for failing to produce "any competent evidence" in its case. A wholesale dismantling of Linux's industrywide development and deployment processes appears extremely unlikely at this point, according to several analysts. Just prior to those legal developments, IBM and Sun Microsystems also gave open source development two potentially huge boosts: IBM pledged to take no legal action against open source developers if they used technology included in 500 of IBM's patents ( and Sun announced it was going to make its hallmark Solaris Unix operating system ( open source by the second quarter of this year. Legal foundation firming up Also in early February, Columbia University law professor Eben Moglen, one of the open source community's most notable advocates, announced the formation of the Software Freedom Law Center. The center's mission is to provide pro bono legal services to eligible nonprofit open 2

3 source software projects and developers. Open Source Development Labs ( a global consortium dedicated to accelerating the adoption of Linux, has raised more than US$4 million for a newly established intellectual property (IP) fund that will provide the seed money for the center, based in New York. This money is in addition to $10 million in OSDL's Linux Legal Defense Fund, which will provide legal support for Linus Torvalds and end-user companies subjected to Linux-related litigation by SCO. Trends of acceptance "The announcement with Professor Moglen is an example of a series of assurances being provided at the legal level in general, and by very specific participants," says William Weinberg, OSDL's open source architecture specialist. "Compound that with the first anniversary of the OSDL defense fund, and you get this larger trend of acceptance of both the challenges and the risks, and finally understanding that open source intellectual property is no more horrific than proprietary intellectual property. It just bears greater scrutiny for two reasons: one, it's new and therefore threatening to some people, and two, because it's open it's subject to scrutiny in a way proprietary software isn't." Weinberg also believes the great amount of discussion on developers' bulletin boards and blogs about the IBM patent pledge and Sun's Solaris strategy signals a new appreciation of open source one that goes beyond the "us versus them" oversimplification of an underdog technology like Linux taking on proprietary heavyweights like Microsoft. "I'm very pleased by the level of discussion," Weinberg says. "It represents a new height in sophistication among these developers. The fact people are asking these questions shows software licensing is no longer a background issue in people's minds." Private relationships Mark Webbink, deputy general counsel at Red Hat, agrees with Weinberg that open source issues have reached a new height of awareness from the market's major players, which may signal consensus on a confusing pastiche of IP issues. "A number of the proprietary players, including those that have been embracing open source for some time, including IBM and Sun, are still in the midst of redefining their relationship with open source," Webbink says, "and Microsoft is seemingly coming to grips with the fact this is 3

4 something that's not going to just go away. My highest hope would be that the industry as a whole can come to grips with this sort of thing with all these IP issues that are more difficult in this industry than most and reasonably reward companies for coming up with novel ideas and, at the same time, not end up with a system that ends up killing our software industry because it just makes it too darn difficult to operate." An industry IP commons? One of the industry's most vexing issues has been the fear that patent holders could take legal action on any technology that even accidentally violated patent protection. IBM's Sutor says that pledging 500 patents to the open source community was intended to kick-start a "patent commons," into which companies can contribute protected intellectual property and from which open source developers can draw freely without fear of legal action. Sutor says he would consider the patent commons idea a success if the industry were to contribute 5,000 patents within the next year. Red Hat's Webbink says the IBM move may indeed lead to an industrywide commons and a consensus that rigid enforcement of software patents could stifle innovation in the long term. While Red Hat issued a patent pledge some time ago, he says, the heft of IBM's patent portfolio gives the movement critical mass. "I also don't think we've seen the last of IBM on this front," he says. "They'll continue to scrutinize their portfolio and release that which they deem to hold the most value for the open source community, but will also expect active members of community to do the same thing. Eventually that will become one key element to bring about patent peace." However, Webbink also says the global nature of open source development could render patentprotection maneuvers by proprietary software makers moot. He cited the growing popularity of OpenOffice as an example. "I think there's a huge place for OpenOffice worldwide," he says. "First of all, the biggest threat to OpenOffice would be some Microsoft patents, but patents, unlike copyright, are jurisdictionally limited. If all of a sudden OpenOffice development is shifted and a lot has been outside the US, to countries where there are no patents right now or where Microsoft's reach doesn't extend, then you're going to see it continue to evolve and start to accelerate." 4

5 License, yes; liberty, no If the patent issue appears to be inching its way toward consensus, the new complexity of licensing open source development also suggests the irrelevance of looking for a united force of underdog developers fighting a monolithic proprietary foe. The new open source landscape will feature plenty of collaboration, but also plenty of competition and plenty of maneuvering around licensing terms. The Solaris case might illustrate this issue with clarity. CDDL versus GPL Sun chose to release Solaris under terms of the Common Development and Distribution License ( a modified Mozilla open source license. The CDDL approach confused some open source developers who have been used to working under provisions of the General Public License that governs Linux development. Depending on who you read or listen to, either Sun executives made sure the CDDL is incompatible with GPL development hence hobbling mixing Linux with Solaris or the GPL forbids mixing code under the two licenses. Numerous developer mail lists and blogs have posted theories on what is and isn't allowed. Sun has promised to make the distinctions clear in nonlegalese, says Sun vice president of operating systems Tom Goguen, who has asked his legal team to write a simplified guide to the license. "Parsing through the legalese is always difficult," Goguen says. "Frankly, you can read through just about any license and have the same problem. It's not clear, for example, with the GPL, how to combine even binaries from other licenses. This has never been adjudicated in a court, but a lot of people are building driver-level plug-ins into Linux distributions and keeping them proprietary. It's not clear the GPL allows for that. People are kind of out there doing things that have never really been sorted out or specified as far as GPL code goes. With the CDDL, we worked pretty hard with members of the open source community to define how to combine source code from another license with CDDL." Goguen contends that one common perception on bulletin boards, that Sun is blocking Linux developers from combining their code with Solaris code, is backward. "There is a broad open source landscape to begin with," he says. "Among the various licenses such as the BSD license, the Apache license, the Mozilla license, and of course the GPL of all these licenses there is only one that does not permit external code with code from that license, 5

6 and that's the GPL. You can't mix nongpl code with GPL. It prevents it. Maybe future versions of the GPL will allow for different combinations, and we can get it sorted out." Open competition Industry analysts and developers have begun handicapping the odds of OpenSolaris making significant inroads on what has been a Linux world of open source operating systems. "We have to look at it in terms of how the end user buyer looks at it," says Yankee Group senior analyst Dana Gardner, "and the right price-to-performance equation is what they're going to take out of it. A lot of Linux growth was around the hardware issue. Linux allowed people to swap out higher priced hardware for x86 hardware. Open sourcing Solaris allows Sun the opportunity to start saying, 'Look what you get for the same basic opportunity even though our license is a bit different.' The developer who is looking for the best addressable market with Solaris has both commercial and open source directions to go in, whereas if they go Linux, they only have open source." Another analyst, Illuminata's Gordon Haff, says the open sourcing of Solaris may be the first move in a comprehensive open source offering from Sun that encompasses everything from the desktop to middleware and databases to operating systems. "It wouldn't be realistic for Sun to expect, and I don't think they do expect, some huge overnight defection of people involved in Linux development over to Solaris," Haff says. "Over a period of years perhaps, OpenSolaris will be more broadly embraced as an open source alternative to Linux, BSD, and of course Windows, and there will be an increased level of interest in OpenSolaris in places like universities, where Sun has historical strength and interest. How much OpenSolaris will garner outside today's basically closed source Solaris community, we'll see. It's a good move for Sun. What really is the down side? Not much." Haff notes recent news that Sun might open source at least part of Java Enterprise server. "That's actually pretty interesting," he says, "because there's an argument around OpenSolaris that we already have a very functional open source operating system, and that Solaris's advantages are incremental, essentially. But in the middleware space, the open source offerings are much less mature and much less complete." IBM's Sutor agrees with Haff that the middleware-application server area could see the next explosion of open source deployment, between efforts such as JBoss, the Apache Foundation's 6

7 Geronimo, and Red Hat. All these programs are Java-based, and while analysts and rival software executives have said that open sourcing Java code would be a boon for Sun as well as others, Goguen says the company is examining its options. Conclusion Regardless of the specifics of future open source initiatives from the major players, a new game is clearly afoot, in which respect and trash talk play together. "Sun is clearly one of the leaders and perhaps they're Number Two with us being Number One," Sutor says. "They'll say they're Number One." Sun's Goguen bears out Sutor's observations. The entire stack, from operating system to office suite, is now fully in play across the industry and around the world. "We are definitely looking across the board at all our software to figure out what the answer is," he says. "And just for the record, we are the largest contributor of source code now to the industry." Cite this article: Greg Goth, "Open Source Infrastructure Solidifying Quickly," IEEE Distributed Systems Online, vol. 6, no. 3,

IBM AND THE FUTURE OF SMART IT. February 26, 2008

IBM AND THE FUTURE OF SMART IT. February 26, 2008 IBM AND THE FUTURE OF SMART IT February 26, 2008 LANINGHAM: Welcome to a podcast on IBM and the Future of Smart IT. I'm Scott Laningham. We're here to talk about the ballooning energy use by computing

More information

Your Data Demands More NETAPP ENABLES YOU TO LEVERAGE YOUR DATA & COMPUTE FROM ANYWHERE

Your Data Demands More NETAPP ENABLES YOU TO LEVERAGE YOUR DATA & COMPUTE FROM ANYWHERE Your Data Demands More NETAPP ENABLES YOU TO LEVERAGE YOUR DATA & COMPUTE FROM ANYWHERE IN ITS EARLY DAYS, NetApp s (www.netapp.com) primary goal was to build a market for network-attached storage and

More information

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives, Virtualization Q&A with an industry leader Virtualization is rapidly becoming a fact of life for agency executives, as the basis for data center consolidation and cloud computing and, increasingly, as

More information

State of Cloud Survey GERMANY FINDINGS

State of Cloud Survey GERMANY FINDINGS 2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff

More information

I'm Andy Glover and this is the Java Technical Series of. the developerworks podcasts. My guest is Brian Jakovich. He is the

I'm Andy Glover and this is the Java Technical Series of. the developerworks podcasts. My guest is Brian Jakovich. He is the I'm Andy Glover and this is the Java Technical Series of the developerworks podcasts. My guest is Brian Jakovich. He is the director of Elastic Operations for Stelligent. He and I are going to talk about

More information

Welcome to this IBM Rational podcast, enhanced. development and delivery efficiency by improving initial

Welcome to this IBM Rational podcast, enhanced. development and delivery efficiency by improving initial IBM Podcast [ MUSIC ] GIST: Welcome to this IBM Rational podcast, enhanced development and delivery efficiency by improving initial core quality. I'm Kimberly Gist with IBM. Catching defects earlier in

More information

Hello, my name is Cara Daly, I am the Product Marketing Manager for Polycom Video Content Management Solutions and today I am going to be reviewing

Hello, my name is Cara Daly, I am the Product Marketing Manager for Polycom Video Content Management Solutions and today I am going to be reviewing Page 1 of 19 Hello, my name is Cara Daly, I am the Product Marketing Manager for Polycom Video Content Management Solutions and today I am going to be reviewing the upcoming changes for our Q2 2013 Solutions

More information

Linux rising. 19 October Lead

Linux rising. 19 October Lead 19 October 2009 Lead Linux rising Virtualization and interoperability are seen as driving the adoption of Linux servers in a big way, writes Nivedan Prakash Linux has established a firm presence in the

More information

Hello, and welcome to a searchsecurity.com. podcast: How Security is Well Suited for Agile Development.

Hello, and welcome to a searchsecurity.com. podcast: How Security is Well Suited for Agile Development. [ MUSIC ] Hello, and welcome to a searchsecurity.com podcast: How Security is Well Suited for Agile Development. My name is Kyle Leroy, and I'll be moderating this podcast. I'd like to start by introducing

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security

More information

The Role of Converged and Hyper-converged Infrastructure in IT Transformation

The Role of Converged and Hyper-converged Infrastructure in IT Transformation Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief The Role of Converged and Hyper-converged Infrastructure in IT Transformation The Quantified Effects of Organizational

More information

SELLING NODE.JS TO YOUR COLLEAGUES

SELLING NODE.JS TO YOUR COLLEAGUES SELLING NODE.JS TO YOUR COLLEAGUES 2018 Contents About Node.js Developer Productivity DevEx Cost Reduction Performance 2 About Node.js Node.js is emerging as a universal development platform for digital

More information

Stand: File: gengler_java_e. Java Community Process: Not perfect, but operating very successfully

Stand: File: gengler_java_e. Java Community Process: Not perfect, but operating very successfully Stand: 14.04.03 File: gengler_java_e Java Community Process: Not perfect, but operating very successfully While Sun Microsystems was the original sole driving force behind Java at one time, the company

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

CLOUD COMPUTING ARTICLE. Submitted by: M. Rehan Asghar BSSE Faizan Ali Khan BSSE Ahmed Sharafat BSSE

CLOUD COMPUTING ARTICLE. Submitted by: M. Rehan Asghar BSSE Faizan Ali Khan BSSE Ahmed Sharafat BSSE CLOUD COMPUTING ARTICLE Submitted by: M. Rehan Asghar BSSE 715126 Faizan Ali Khan BSSE 715125 Ahmed Sharafat BSSE 715109 Murawat Hussain BSSE 715129 M. Haris BSSE 715123 Submitted to: Sir Iftikhar Shah

More information

BUILDING the VIRtUAL enterprise

BUILDING the VIRtUAL enterprise BUILDING the VIRTUAL ENTERPRISE A Red Hat WHITEPAPER www.redhat.com As an IT shop or business owner, your ability to meet the fluctuating needs of your business while balancing changing priorities, schedules,

More information

This slide is relevant to providing either a single three hour training session or explaining how a series of shorter sessions focused on per chapter

This slide is relevant to providing either a single three hour training session or explaining how a series of shorter sessions focused on per chapter Welcome to the OpenChain Curriculum Slides. These slides can be used to help train internal teams about FOSS compliance issues and to conform with the OpenChain Specification. You can deliver these slides

More information

KEY ECONOMIC CONCEPTS ILLUSTRATED IN THIS DOCUMENTARY

KEY ECONOMIC CONCEPTS ILLUSTRATED IN THIS DOCUMENTARY LIGHTHOUSE CPA SOCIAL SCIENCES DEPARTMENT ECONOMICS VIDEO STUDY GUIDE : THE VIRTUAL REVOLUTION - PART 1 - THE GREAT LEVELING? KEY ECONOMIC CONCEPTS ILLUSTRATED IN THIS DOCUMENTARY 1. THE IMPORTANCE OF

More information

Hello, and welcome to another episode of. Getting the Most Out of IBM U2. This is Kenny Brunel, and

Hello, and welcome to another episode of. Getting the Most Out of IBM U2. This is Kenny Brunel, and Hello, and welcome to another episode of Getting the Most Out of IBM U2. This is Kenny Brunel, and I'm your host for today's episode which introduces wintegrate version 6.1. First of all, I've got a guest

More information

The world's leading Provider of open source Enterprise IT products and services Rainer Liedtke

The world's leading Provider of open source Enterprise IT products and services Rainer Liedtke The world's leading Provider of open source Enterprise IT products and services Regional Director EMEA Sales, Country Manager Germany 1 Status Of Open Source Software Adoption 2 What Do These Numbers Represent?

More information

Storage Key Issues for 2017

Storage Key Issues for 2017 by, Nick Allen May 1st, 2017 PREMISE: Persistent data storage architectures must evolve faster to keep up with the accelerating pace of change that businesses require. These are times of tumultuous change

More information

Managed Security Provider onshore Security is using a Panoptic Approach to revolutionize Cyberdefence, Governance, Risk and Compliance

Managed Security Provider onshore Security is using a Panoptic Approach to revolutionize Cyberdefence, Governance, Risk and Compliance CEOCFO Magazine ceocfointerviews.com All rights reserved Issue: May 7, 2018 Managed Security Provider onshore Security is using a Panoptic Approach to revolutionize Cyberdefence, Governance, Risk and Compliance

More information

Why Enterprises Need to Optimize Their Data Centers

Why Enterprises Need to Optimize Their Data Centers White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals

More information

2018 Report The State of Securing Cloud Workloads

2018 Report The State of Securing Cloud Workloads 2018 Report The State of Securing Cloud Workloads 1 Welcome to our 2018 report on the state of securing cloud workloads A summary of the responses of close to 350 professionals whose primary areas of responsibility

More information

5G Readiness Survey 2017

5G Readiness Survey 2017 5G Readiness Survey 2017 An assessment of operators progress on the road to 5G 1 5G READINESS SURVEY 2017: AN ASSESSMENT OF OPERATORS PROGRESS ON THE ROAD TO 5G Are Operators Ready for 5G? 5G next-generation

More information

Intel (INTC) Analyst: Brian von Hein Jr. Fall Recommendation: SELL Target Price until (12/31/2015): $24.46

Intel (INTC) Analyst: Brian von Hein Jr. Fall Recommendation: SELL Target Price until (12/31/2015): $24.46 Recommendation: SELL Target Price until (12/31/2015): $24.46 1. Reasons for the Recommendation Intel has been the markets leader in microprocessors for personal computers over the last decade. The industry

More information

Veeam demonstrates its ambitions and capabilities

Veeam demonstrates its ambitions and capabilities Veeam demonstrates its ambitions and capabilities Publication Date: 14 Jul 2016 Product code: IT0022-000730 Roy Illsley Ovum view Summary The market for data protection and availability is undergoing a

More information

a story of alternatives

a story of alternatives a story of alternatives There was a time when computers were big... really big. For the next 30 or so years computers would find a place in the academic institution, government agency and corporation.

More information

BBC Learning English 6 Minute English Work s

BBC Learning English 6 Minute English Work  s BBC Learning English 6 Minute English Work Emails NB: This is not a word for word transcript Hello and welcome to 6 Minute English from BBC Learning English. I'm Michelle. And I'm Neil. Thanks for joining

More information

History of Unix, Linux and the Open Source

History of Unix, Linux and the Open Source History of Unix, Linux and the Open Source 12.2.2012 George Ajam College of Science /Computer Science Dept. DEC PDP 7 History of UNIX 1969: First version of "Unics" by Ken Thompson and Dennis Richie Multi

More information

Poulsen, Kevin Wednesday, November 07, :54 PM Singel, Ryan FW: [hush.com # ] Journalist's query

Poulsen, Kevin Wednesday, November 07, :54 PM Singel, Ryan FW: [hush.com # ] Journalist's query Singel, Ryan From: Sent: To: Subject: Poulsen, Kevin Wednesday, November 07, 2007 1:54 PM Singel, Ryan FW: [hush.com #2012168] Journalist's query -----Original Message----- From: Brian Smith [mailto:sbs@hushmail.com]

More information

ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump

ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS By George Crump Economical, Storage Purpose-Built for the Emerging Data Centers Most small, growing businesses start as a collection of laptops

More information

Welcome to this IBM podcast, Realizing More. Value from Your IMS Compiler Upgrade. I'm Kimberly Gist

Welcome to this IBM podcast, Realizing More. Value from Your IMS Compiler Upgrade. I'm Kimberly Gist IBM Podcast [ MUSIC ] Welcome to this IBM podcast, Realizing More Value from Your IMS Compiler Upgrade. I'm Kimberly Gist with IBM. System z compilers continue to deliver the latest programming interfaces

More information

A PROTECTION REDEFINED DATA PROTECTION REDEFINED INSIDE. 12 It s All About the Applications Shifting Sands: Data Protection s Transformational Role

A PROTECTION REDEFINED DATA PROTECTION REDEFINED INSIDE. 12 It s All About the Applications Shifting Sands: Data Protection s Transformational Role DATA PROTECTION REDEFINED A PROTECTION REDEFINED INSIDE 2 Introduction 4 12 It s All About the Applications Shifting Sands: Data Protection s Transformational Role 20 7 Archiving Matters Too Transformation

More information

PROFESSOR: Last time, we took a look at an explicit control evaluator for Lisp, and that bridged the gap between

PROFESSOR: Last time, we took a look at an explicit control evaluator for Lisp, and that bridged the gap between MITOCW Lecture 10A [MUSIC PLAYING] PROFESSOR: Last time, we took a look at an explicit control evaluator for Lisp, and that bridged the gap between all these high-level languages like Lisp and the query

More information

THE STATE OF IT TRANSFORMATION FOR RETAIL

THE STATE OF IT TRANSFORMATION FOR RETAIL THE STATE OF IT TRANSFORMATION FOR RETAIL An Analysis by Dell EMC and VMware Dell EMC and VMware are helping IT groups at retail organizations transform to business-focused service providers. The State

More information

SDN and NFV: The Keys to Successful Telecom Transformation

SDN and NFV: The Keys to Successful Telecom Transformation SDN and NFV: The Keys to Successful Telecom Transformation In this E-Guide: Hear from CIMI Corporation President Tom Nolle about why he thinks NFV and SDN will help drive telecom transformation by generating

More information

Cloud Foundry User Survey

Cloud Foundry User Survey Cloud Foundry User Survey Semi-annual snapshot of Cloud Foundry users deployments and productivity April 2018 Introduction Cloud Foundry is the prevailing open source cloud application platform used by

More information

Show notes for today's conversation are available at the podcast website.

Show notes for today's conversation are available at the podcast website. Title: Managing Security Vulnerabilities Based on What Matters Most Transcript Part 1: The Challenges in Defining a Security Vulnerability Julia Allen: Welcome to CERT's Podcast Series: Security for Business

More information

IT Project Management Challenges with Open Source. George A Pace

IT Project Management Challenges with Open Source. George A Pace IT Project Management Challenges with Open Source George A Pace Tonight s agenda Two parts to the Presentation What is Open Source? A background primer on the key elements of Open Source. A specific focus

More information

A CISO GUIDE TO MULTI-CLOUD SECURITY Achieving Transparent Visibility and Control and Enhanced Risk Management

A CISO GUIDE TO MULTI-CLOUD SECURITY Achieving Transparent Visibility and Control and Enhanced Risk Management A CISO GUIDE TO MULTI-CLOUD SECURITY Achieving Transparent Visibility and Control and Enhanced Risk Management CONTENTS INTRODUCTION 1 SECTION 1: MULTI-CLOUD COVERAGE 2 SECTION 2: MULTI-CLOUD VISIBILITY

More information

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business

More information

Stay Calm and Carry On. Charles Profitt

Stay Calm and Carry On. Charles Profitt Stay Calm and Carry On Charles Profitt IBM Purchases Red Hat IBM BE ALARMED RH and PANIC There are tons of projects that Red hat developers support that aren't red hat projects. We could see a lot of that

More information

Security as a Service (Implementation Guides) Research Sponsorship

Security as a Service (Implementation Guides) Research Sponsorship Security as a Service (Implementation Guides) Research Sponsorship Overview The purpose of the Security as a Service (SecaaS) Working Group will be to identify consensus definitions of what Security as

More information

x445 Endorsements & Reviews

x445 Endorsements & Reviews x445 Endorsements & Reviews What are they saying about this next-generation server? Donn Bullock Global Product Manager IBM eserver xseries 445 donnb@us.ibm.com 2 March 2004 Our biggest endorsement: OUR

More information

Q&A TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL. An interview with John Summers, Enterprise VP and GM, Akamai

Q&A TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL. An interview with John Summers, Enterprise VP and GM, Akamai TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL An interview with John Summers, Enterprise VP and GM, Akamai Q&A What are the top things that business leaders need to understand about today s cybersecurity

More information

The Red Hat Way. Lee Miles General Manager, Red Hat Middle East, Turkey & Africa

The Red Hat Way. Lee Miles General Manager, Red Hat Middle East, Turkey & Africa The Red Hat Way Lee Miles General Manager, Red Hat Middle East, Turkey & Africa Connecting People is the best way to create Technology Community Builder Open source communities can innovate far more effectively

More information

Evolution For Enterprises In A Cloud World

Evolution For Enterprises In A Cloud World Evolution For Enterprises In A Cloud World Foreword Cloud is no longer an unseen, futuristic technology that proves unattainable for enterprises. Rather, it s become the norm; a necessity for realizing

More information

Caching Use Cases in the Enterprise

Caching Use Cases in the Enterprise terracotta whitepaper: Caching Use Cases in the Enterprise What You Can Learn from Hundreds of Ehcache Users Around the Globe Eric J. Bruno Allure Technology, Inc www.alluretechnology.com I was recently

More information

SEO: SEARCH ENGINE OPTIMISATION

SEO: SEARCH ENGINE OPTIMISATION SEO: SEARCH ENGINE OPTIMISATION SEO IN 11 BASIC STEPS EXPLAINED What is all the commotion about this SEO, why is it important? I have had a professional content writer produce my content to make sure that

More information

Business Continuity: Getting it Right Al Berman of DRI International on How to Rise to Global Challenges Credit Eligible S

Business Continuity: Getting it Right Al Berman of DRI International on How to Rise to Global Challenges Credit Eligible S Page 1 of 5 Business Continuity: Getting it Right Al Berman of DRI International on How to Rise to Global Challenges Credit Eligible S Listen To This Interview When it comes to business continuity and

More information

-archiving. project roadmap CHAPTER 1. archiving Planning, policies and product selection

-archiving. project roadmap CHAPTER 1.  archiving Planning, policies and product selection INSIDE email archiving Planning, policies and product selection CHAPTER 1 Ready to dive into email archiving? Try this four-phased approach to get your project up and running Email-archiving project roadmap

More information

How to Evaluate a Next Generation Mobile Platform

How to Evaluate a Next Generation Mobile Platform How to Evaluate a Next Generation Mobile Platform appcelerator.com Introduction Enterprises know that mobility presents an unprecedented opportunity to transform businesses and build towards competitive

More information

August a. Input on the first question - the requirement for a link between GUIs, Icons, Typeface/Type Font Designs and the article or product

August a. Input on the first question - the requirement for a link between GUIs, Icons, Typeface/Type Font Designs and the article or product 14B rue de la Science, 1040 Brussels, Belgium Tel: +32 2 880 3720 Fax: +32 2 808 8464 inta.org Comments to the Standing Committee on the Law of Trademarks, Industrial Designs and Geographical Indications

More information

Benefits and Costs of Structured Data. August 11, Secretary Securities and Exchange Commission 100 F Street, NE Washington, DC

Benefits and Costs of Structured Data. August 11, Secretary Securities and Exchange Commission 100 F Street, NE Washington, DC August 11, 2015 1211 Avenue of the Americas 19 th Floor New York, NY 10036 Secretary Securities and Exchange Commission 100 F Street, NE Washington, DC 20549-1090 RE: Investment Company Reporting Modernization,

More information

Top Priority for Hybrid IT

Top Priority for Hybrid IT Make Your Enterprise Network a Top Priority for Hybrid IT Hybrid IT has become a vital element in enterprises digital transformation strategy. But putting in place a hybrid IT framework is one thing, and

More information

OPEN SOURCE SECURITY ANALYSIS The State of Open Source Security in Commercial Applications

OPEN SOURCE SECURITY ANALYSIS The State of Open Source Security in Commercial Applications OPEN SOURCE SECURITY ANALYSIS The State of Open Source Security in Commercial Applications By Mike Pittenger, Vice President, Security Strategy Black Duck s On-Demand business conducts audits of customers

More information

Linked Lists. What is a Linked List?

Linked Lists. What is a Linked List? Linked Lists Along with arrays, linked lists form the basis for pretty much every other data stucture out there. This makes learning and understand linked lists very important. They are also usually the

More information

These Are the Top Languages for Enterprise Application Development

These Are the Top Languages for Enterprise Application Development These Are the Top Languages for Enterprise Application Development And What That Means for Business August 2018 Enterprises are now free to deploy a polyglot programming language strategy thanks to a decrease

More information

Website ADA Compliance Made Easy: How to Respond to Legal Demand Letters or Avoid Them, Altogether.

Website ADA Compliance Made Easy: How to Respond to Legal Demand Letters or Avoid Them, Altogether. Website ADA Compliance Made Easy: How to Respond to Legal Demand Letters or Avoid Them, Altogether. Legal Demand Letters. Solved. Accessibility 101: What s the Big Deal? When we think (or hear) of accessibility

More information

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure An IDC InfoBrief, Sponsored by IBM April 2018 Executive Summary Today s healthcare organizations

More information

JBoss Enterprise Middleware

JBoss Enterprise Middleware JBoss Enterprise Middleware Making software from the open source community ready for the enterprise DLT Solutions 2411 Dulles Corner Park, Suite 800 Herndon, VA 20171 Web: www.dlt.com Phone: 703-709-7172

More information

Up in the Air: The state of cloud adoption in local government in 2016

Up in the Air: The state of cloud adoption in local government in 2016 Up in the Air: The state of cloud adoption in local government in 2016 Introduction When a Cloud First policy was announced by the Government Digital Service in 2013, the expectation was that from that

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

Speech 2 Part 2 Transcript: The role of DB2 in Web 2.0 and in the IOD World

Speech 2 Part 2 Transcript: The role of DB2 in Web 2.0 and in the IOD World Speech 2 Part 2 Transcript: The role of DB2 in Web 2.0 and in the IOD World Slide 1: Cover Welcome to the speech, The role of DB2 in Web 2.0 and in the Information on Demand World. This is the second speech

More information

IBM i Edition Express for BladeCenter S

IBM i Edition Express for BladeCenter S Affordable Solution for a Flexible Business Foundation IBM i Edition Express for BladeCenter S The i Edition Express for BladeCenter S is a complete integrated business system that offers an attractive

More information

Promoting Component Architectures in a Dysfunctional Organization

Promoting Component Architectures in a Dysfunctional Organization Promoting Component Architectures in a Dysfunctional Organization by Raj Kesarapalli Product Manager Rational Software When I first began my career as a software developer, I didn't quite understand what

More information

Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid

Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid Enterprise Strategy Group Getting to the bigger truth. SOLUTION SHOWCASE Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid Date: September 2015 Authors: Jason Buffington, Senior

More information

BRINGING CLARITY TO THE CLOUD

BRINGING CLARITY TO THE CLOUD BRINGING CLARITY TO THE CLOUD OpenSky Networks discusses the complexities of the cloud market by distinguishing the difference between true cloud solutions and rebranded services; and how knowing that

More information

DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER

DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER D-Zone DNS Firewall 18-10-20171 EXECUTIVE SUMMARY Cyber attacks continue to grow at an alarming rate with ransomware

More information

It Might Be Valid, But It's Still Wrong Paul Maskens and Andy Kramek

It Might Be Valid, But It's Still Wrong Paul Maskens and Andy Kramek Seite 1 von 5 Issue Date: FoxTalk July 2000 It Might Be Valid, But It's Still Wrong Paul Maskens and Andy Kramek This month, Paul Maskens and Andy Kramek discuss the problems of validating data entry.

More information

Networking for a smarter data center: Getting it right

Networking for a smarter data center: Getting it right IBM Global Technology Services October 2011 Networking for a smarter data center: Getting it right Planning the network needed for a dynamic infrastructure 2 Networking for a smarter data center: Getting

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

Website ADA Compliance Made Easy: How to Respond to Legal Demand Letters or Avoid Them, Altogether.

Website ADA Compliance Made Easy: How to Respond to Legal Demand Letters or Avoid Them, Altogether. Website ADA Compliance Made Easy: How to Respond to Legal Demand Letters or Avoid Them, Altogether. Legal Demand Letters. Solved. Background Across the country, thousands of businesses and organizations,

More information

Victra A Verizon Authorized Retailer

Victra A Verizon Authorized Retailer Case Study & TCO Analysis Victra Victra A Verizon Authorized Retailer National Verizon Retailer with nearly 1,200 stores in 46 states Saved 80% in hardware and operational costs by going with Meraki Leverages

More information

Perfect Balance of Public and Private Cloud

Perfect Balance of Public and Private Cloud Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These

More information

Oracle and Tangosol Acquisition Announcement

Oracle and Tangosol Acquisition Announcement Oracle and Tangosol Acquisition Announcement March 23, 2007 The following is intended to outline our general product direction. It is intended for information purposes only, and may

More information

Peer Participation and Software

Peer Participation and Software Peer Participation and Software Booth, David R. Published by The MIT Press Booth, R.. Peer Participation and Software: What Mozilla Has to Teach Government. Cambridge: The MIT Press, 2010. Project MUSE.,

More information

SDN-Based Open Networking Building Momentum Among IT Decision Makers

SDN-Based Open Networking Building Momentum Among IT Decision Makers SDN-Based Open Networking Building Momentum Among IT Decision Makers Two of the most important new enterprise technologies are open networking and softwaredefined networking (SDN). For the past few years,

More information

Welcome to this IBM Rational Podcast. I'm. Angelique Matheny. Joining me for this podcast, Delivering

Welcome to this IBM Rational Podcast. I'm. Angelique Matheny. Joining me for this podcast, Delivering Welcome to this IBM Rational Podcast. I'm Angelique Matheny. Joining me for this podcast, Delivering Next Generation Converged Applications with Speed and Quality, is Derek Baron, Worldwide Rational Communications

More information

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data

More information

Website Designs Australia

Website Designs Australia Proudly Brought To You By: Website Designs Australia Contents Disclaimer... 4 Why Your Local Business Needs Google Plus... 5 1 How Google Plus Can Improve Your Search Engine Rankings... 6 1. Google Search

More information

Cloud First: Policy Not Aspiration. A techuk Paper April 2017

Cloud First: Policy Not Aspiration. A techuk Paper April 2017 Cloud First: Policy Not Aspiration A techuk Paper April 2017 2 Cloud First: Policy Not Aspiration Introduction As more organisations begin to use cloud computing as part of the evolution of their business

More information

VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment

VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment RELIABLE, FAMILIAR INFRASTRUCTURE BACKED BY VMWARE AND DELIVERED THROUGH PARTNERS HELPS OPTIMIZE CLOUD INVESTMENTS AS ENTERPRISES

More information

The OpenSolaris Story

The OpenSolaris Story The OpenSolaris Story Jim Grisanzio Community Manager, OpenSolaris Sun Microsystems 2 3 Our Community Values Independence Openness Honesty Transparency Quality Inclusiveness Respect 4 The Original Idea

More information

Linux Automation.

Linux Automation. Linux Automation Using Red Hat Enterprise Linux to extract maximum value from IT infrastructure www.redhat.com Table of contents Summary statement Page 3 Background Page 4 Creating a more efficient infrastructure:

More information

Preparing your network for the next wave of innovation

Preparing your network for the next wave of innovation Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt

More information

Homework Question. Faster, faster, faster! (40 points)

Homework Question. Faster, faster, faster! (40 points) Homework Question. Faster, faster, faster! (40 points) Microprocessor Challenge to Intel Launched By MATTHEW FORDAHL, The Associated Press, Monday, February 7, 2005; 8:11 PM http://www.washingtonpost.com/wp-dyn/articles/a6039-2005feb7.html

More information

2017 USER SURVEY EXECUTIVE SUMMARY

2017 USER SURVEY EXECUTIVE SUMMARY 2017 USER SURVEY EXECUTIVE SUMMARY INTRODUCTION Survey methodology 2017 NODE.JS USER SURVEY The primary objective of the research was to profile Node.js users, understand usage patterns and trends and

More information

THE CYBERSECURITY LITERACY CONFIDENCE GAP

THE CYBERSECURITY LITERACY CONFIDENCE GAP CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks

More information

Pervasive PSQL Summit v10 Highlights Performance and analytics

Pervasive PSQL Summit v10 Highlights Performance and analytics Pervasive PSQL Summit v10 Highlights Performance and analytics A Monash Information Services Bulletin by Curt A. Monash, PhD. September, 2007 Sponsored by: Pervasive PSQL Version 10 Highlights Page 2 PSQL

More information

Should You Use Liberty or Passport for Digital Identities?

Should You Use Liberty or Passport for Digital Identities? Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft

More information

An Introduction to the Waratek Application Security Platform

An Introduction to the Waratek Application Security Platform Product Analysis January 2017 An Introduction to the Waratek Application Security Platform The Transformational Application Security Technology that Improves Protection and Operations Highly accurate.

More information

Services solutions for Managed Service Providers (MSPs)

Services solutions for Managed Service Providers (MSPs) McAfee Advanced Threat Defense Services solutions for Managed Service Providers (MSPs) Differentiate your services and protect customers against zero-day attacks with the industry s most comprehensive

More information

Is there an Open Source Business Model: YES or NO?

Is there an Open Source Business Model: YES or NO? Is there an Open Source Business Model: YES or NO? Stephen Walli, Principle Program Manager, Microsoft @stephenrwalli Jeffrey Borek, WW Program Director, IBM @jeffborek Is there an Open Source Business

More information

COPYRIGHTED MATERIAL. What Is Linux? Linux History. Linux as an Operating System. Linux as Free Software. Commercial Applications for Linux

COPYRIGHTED MATERIAL. What Is Linux? Linux History. Linux as an Operating System. Linux as Free Software. Commercial Applications for Linux 2915ch01.qxd 04/19/01 12:57 PM Page 3 Linux History C H A P T E R O N E What Is Linux? Linux as an Operating System Linux as Free Software Commercial Applications for Linux COPYRIGHTED MATERIAL 1 2915ch01.qxd

More information

Industry Trends and Their Impact on Today s Operating Systems

Industry Trends and Their Impact on Today s Operating Systems Al Gillen Research Director, System Software agillen@idc.com 732-842-4276 Industry Trends and Their Impact on Today s Operating Systems SCO Forum August 8, 2005 www.idc.com Discussion Agenda 1. A Confluence

More information

Evaluating the Security of Software Defined Networking

Evaluating the Security of Software Defined Networking Evaluating the Security of Software Defined Networking This expert e-guide explores the latest challenges in network security. Get tips for evaluating network security virtualization and explore the security

More information

TRUSTED MOBILITY INDEX

TRUSTED MOBILITY INDEX TRUSTED MOBILITY INDEX Published May 2012 A GLOBAL STUDY INDEXING CONSUMER CONFIDENCE IN MOBILITY The mobile ecosystem of devices, services and networks is at a critical inflection point. While the mobile

More information