The use of open source software and components continues to grow both in companies and in private projects. But this trend comes with its own set of risks and problems. In an interview at DevOpsCon in Munich, Stanislav Sivak, software and security consultant at Synopsys, talks about the common risks for open source, how to avoid them and what role open source plays in the DevOps universe.
Open source communities have never been as bustling, and joining the fray has never been easier. Are you looking for a new project to work on? Do you have some code that you’d like to donate? We take a look at some organizations that deserve a time in the sun and your attention.
As our tech history series winds down, we want to take a moment and focus on a topic that has shaped how code is reviewed and how developers collaborate nowadays. Open your textbooks to chapter 11 – class is in session with the birth and evolution of social coding.
The news that tech giant IBM is acquiring Red Hat made waves throughout the industry. We talked to Murray Rode, Chief Executive Officer of TIBCO about the impact of the acquisition on the open source ecosystem, the multi-cloud trend and more. Since both IBM and Red Hat are deeply involved in the Java ecosystem, we also discussed what the Java market has to lose if things go south.
“Red Hat being acquired by IBM proves that open source software company value has reached a new high water mark”
The news that tech giant IBM is acquiring Red Hat made waves throughout the industry. We talked to Sid Sijbrandij, co-founder and CEO of GitLab about the impact of the acquisition on the open source ecosystem, the multi-cloud trend and more.
The news that tech giant IBM is acquiring Red Hat made waves throughout the industry. We talked to WSO2 CEO Tyler Jewell and Paul Fremantle, CTO of WSO2 about the impact of the acquisition on the open source ecosystem, the Java market, the JCP EC seats and more.
The news that tech giant IBM is acquiring Red Hat made waves throughout the industry. This acquisition breathes new life into the open source ecosystem but it also adds a note of caution. We talked to Karthik Ramasamy, co-founder of Streamlio about the impact of the acquisition on the open source ecosystem and more.
The time has come for another Currents report! The fifth edition of the Currents Report on Developer Trends in the Cloud is here and in order to celebrate the 20th anniversary of the open source movement, it is focused solely on the open source ecosystem. Here, we take a closer look at some of the most interesting highlights.
Microsoft has an excellent opportunity in front of them and the GitHub acquisition shouldn’t be viewed in a vacuum. Continuing to find ways to give back to the community will prove to be invaluable for Microsoft in winning over the hearts and minds of skeptical developers.
Stop the presses. Microsoft open sourced 60,000 patents and joined the Open Invention Network. Is this a natural progression of open source? Has the infamous company changed their song and tune? Time to focus on the positives: open source is here to stay.
Another one joins the open source club. Sourcegraph is a code search tool available for individual users and businesses that helps you navigate with powerful queries. The creators have a noble vision about the future of software creation, and by open sourcing their project we are one step closer.
trivago firmly believes that a sustainable open source ecosystem is good for all internet users. Patrick Gotthardt urges management teams across the technology industry to look closely at the open source tools that they rely on.
Welcome to our History 101 series! This week, we explore open source. How did Richard Stallman’s wild ideals about free software grow to become the defining ethos of the entire internet? Open your textbooks to chapter three; class is in session!
How secure is open source software? This question has serious implications for enterprises looking to make a decision between an open source project or a commercial product. In this article, Vittorio Bertola lays out the advantages and disadvantages of each for data security.