Open Source Policy Builder
|
|
|
- Duane McGee
- 9 years ago
- Views:
Transcription
1 Open Source Policy Builder The following questions represent components of a comprehensive open source policy. Each question has several policy choices listed below. Your organization can build its open source policy by answering the questions and formulating language expressing its choices in a policy statement. Examples of how policy choices can be expressed as policy statements are given in Question Which licenses are approved for use by the company? Choices All Open Source licenses OSI-approved licenses All except reciprocal licenses Company-specified list: Example Policy Statement All: Software distributed under all Open Source licenses is permissible [link to review process]. OSI-approved: All OSI-approved licenses are approved [specify exception process] Company-specified list: The following licenses are approved for use [approved list] [specify exception process] 2. External Acquisition where can an end-user obtain source code? Where can you acquire the canonical source? From the Internet, any source (SourceForge, FreshMeat, Krugle, Google, OSDir, other repositories) Directly from the community source or record From a third party supplier, i.e. Red Hat, IBM, Covalent 3. Internal Acquisition how is the canonical source distributed internally? Anybody can obtain the source There must be a centralized location internally, e.g. a server where people can download internally There is a manual process 9/7/2006 Open Source Policy JumpStart Page 1
2 4. Who/what level in the organization is responsible for understanding and ensuring compliance with the terms and conditions of OSS licenses? Legal Audit Engineering Managers Individual Developers IT management Central OS Review Board Other All of the above 5. Business Justification None needed Must meet engineering requirements Must demonstrate business value TCO vs functionally-equivalent commercial software, ROI, etc. Need to demonstrate why OSS was chosen over a commercial solution 6. Who is the owner? Who is responsible for initial acquisition and lifecycle management of an OSS component? Individual end-user Each OSS component has a named owner (can be used in 20 divisions) One person or central body/team, e.g. OSS Review Board 7. How is acquisition initiated? Acquisition is the responsibility of the individual developer Acquisition is the responsibility of the Procurement/Supply Chain Management Acquisition requests are directed to the central body/team 8. Security and Integrity: What kind of security/integrity review must OSS undergo before it is procured? None Download from trusted source is sufficient MD5 Checksum or other prevailing security verification method Virus scan with an up-to-date fingerprint library Complete source code scanning for security and integrity Manual review 9/7/2006 Open Source Policy JumpStart Page 2
3 9. Warranty: What warranties must be obtained from OSS vendors? (e.g. free replacement of IP infringing code) None, terms of OSS license is sufficient (no warranties) Warranty scales with risk if internal infrastructure use, none needed if customer-facing, warranty required [criteria needed EXERCISE] All OSS must be obtained from a source that provides warranty 10. Indemnification: What kind of indemnification must be obtained from OSS vendors? None; terms of license sufficient Scales with risk [criteria needed - EXERCISE] Full indemnification 11. Policy Scope: What is the scope of the OSS Policy? Enterprise-wide Divisional/LOB Department 12. Remediation: Once this policy is established, what are remediation requirements with respect to existing OSS? None, grandfathered in Existing OSS inventory must be inventoried within X days All existing OSS inventory must be immediately remediated per policy 13. OSS Architecture: Is there a minimum technical standard that OSS must meet to be considered for acquisition? Minimum: None developers take all the responsibility, use at own risk Project is considered stable in SourceForge/Freshmeat and/or community must be considered stable Must have significant widespread adoption as measured by downloads Must have significant commercial base, i.e. MySQL dual-license 14. Forking/Community Abandonment: How will the company deal with project forking or abandonment? Are there alternate vendors/suppliers available? Will deal with it when it happens Must have alternate vendor/suppliers listed or identified Must have active written response plan Must test and deploy backup Must have deploy dual-standard, must have two-vendor integrity, must have backup source available at all times (e.g. Hibernate and BEA Topspin) 9/7/2006 Open Source Policy JumpStart Page 3
4 15. Certification: Do OSS components have to be certified before they can be implemented or deployed? If so, who must certify and what kinds of certification must be done? When can OSS be deployed to production? None, no certification needed Locally certified by owner or end-user Formal certification by central IT staff External certification, e.g. BRR Commercial certification, e.g. IBM, HP, OpenLogic 16. Will OSS be distributed? No, all use is internal No, but will be used in customer-facing environments Yes, will distribute unmodified OSS externally Yes, will distribute modified OSS externally Yes, will integrate and distribute OSS with proprietary IP 17. Can OSS be modified? No, must be used in native form Can be modified with approval [EXERCISE: what is approval] Can be modified in specified ways [EXERCISE: what are specified modifications?] Can be modified in any way if not distributed Can be modified without restriction 18. Who is responsible for maintaining inventory, usage and other metadata related to OSS component, including licenses? Individual end-user Each OSS component has a named owner (can be used in 20 divisions) One central person or central body/team, e.g. OSS Review Board 19. Security: Who will be responsible for overseeing security of OSS components? Who will check if the code contains vulnerabilities? Who is responsible for applying security patches? Individual end-user One central person or central body/team, e.g. OSS Review Board Team to be named IT Security staff 9/7/2006 Open Source Policy JumpStart Page 4
5 20. Will contributions be allowed? No Yes, by indirectly via use of a proxy Yes, with valid business need and/or approval from management Yes, unregulated 21. Under what circumstance can an employee make a contribution to an OSS project if it is not related to company business? Under no circumstance possible violation of employment contracts Yes, without attribution to company name and on employee s personal time 22. communication: Under what circumstances can employees communicate with OSS communities (with company attribution)? Directly linked to contribution question (Q 20-21) Never When business need dictates Freely for any reason 23. Public Speaking No (e.g. Barclay s, Wells Fargo) Yes, with prior management approval Yes, with specified approved topics (e.g. Fidelity) Yes, under any circumstance (e.g. Google) 24. Support: What level of support must be in place prior to implementation Individual end-user responsibility Provided by formal internal team, end-user or central IT Combination internal with external provider Must have SLA signed with business partner 25. Where should OSS be housed? End-user responsibility Centrally-managed repository Vendor-managed repository (OpenLogic) 26. Will source code scanning be required (for IP infringements)? No Yes, source code must be fingerprinted upon initial acquisition only Yes, source code must be scanned periodically Custom list 9/7/2006 Open Source Policy JumpStart Page 5
6 27. Project Tracking: how is OSS tracked? No special project tracking Yes, in custom-built project tracking tool Yes, with vendor-provided tool (e.g. OpenLogic, Black Duck, etc.) 28. Offshoring/Outsourcing/Contracting None, responsibility of contractor to make sure they are adhering to OSS licenses Must make sure things are complementary contractor policy should sufficiently be comparable in scope to Company s, or vendor must commit to follow Company s policy All engagements must adhere to every part of company s OSS policy 9/7/2006 Open Source Policy JumpStart Page 6
Open Source Policy Builder
Open Source Policy Builder In This Guide: Key issues to consider when formulating an open source policy Characteristics of best-in-class open source policies Sample open source policy statements Helping
Open Source Policy Builder
Open Source Policy Builder Effective and comprehensive open source policies are based on a thorough and unbiased organizational assessment. You can start building your organization s open source policy
FOSSBazaar A Governance Initiative to manage Free and Open Source Software life cycle
FOSSBazaar A Governance Initiative to manage Free and Open Source Software life cycle Table of contents Executive summary......2 What is FOSS Governance 3 The importance of open source governance...3 Why
FOSS Governance Fundamentals
FOSS Governance Fundamentals HP Part Number: 5992-4059 Published: January 2008 Edition: 1.0 Copyright 2008 Hewlett-Packard Development Company, L.P. Legal Notice Confidential computer software. Valid license
How To Manage An Open Source Software
Executive Briefing: Four Steps to Creating an Effective Open Source Policy Greg Olson Sr. Director OSS Management Olliance Group Speaker Greg Olson Sr. Director, Open Source Management Over 30 years of
JBoss Enterprise MIDDLEWARE
JBoss Enterprise MIDDLEWARE WHAT IS IT? JBoss Enterprise Middleware integrates and hardens the latest enterprise-ready features from JBoss community projects into supported, stable, enterprise-class middleware
Managing Open Source Code Best Practices
Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate
OPEN SOURCE SECURITY
OPEN SOURCE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
BOM based on what they input into fossology.
SPDX Tool Website SPDX Tool Description License and copyright scanner that emits license names that conform to SPDX. In March a module should be added that gives the user an SPDX FOSSology fossology.org
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
DOT.Comm Oversight Committee Policy
DOT.Comm Oversight Committee Policy Enterprise Computing Software Policy Service Owner: DOTComm Operations Effective Date: TBD Review Schedule: Annual Last Review Date: Last Revision Date: Approved by:
How To Use Open Source Software
Open Source Software: What You Need to Know Presented By: Lisa Abe, Ian Kyer and Marek Nitoslawski September 15, 2005 Open source software ( OSS ): What you need to know Understanding the business and
Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise
Best practices in open source governance Managing the selection and proliferation of open source software across your enterprise Table of contents The importance of open source governance... 2 Executive
Dynamic Service Desk. Unified IT Management. Solution Overview
I T S E R V I C E + I T A S S E T M A N A G E M E N T INFRASTRUCTURE MANAGEMENT Dynamic Service Desk Unified IT Management Achieving business and IT alignment requires having insight into hardware and
Getting Started with Open Source Compliance
Getting Started with Open Source Compliance August 9, 2006 www.hro.com Denver Boulder Colorado Springs London Los Angeles Munich Salt Lake City San Francisco Copyright 2006 Holme, Roberts & Owen LLP Where
Open Source and the New Software Supply Chain. Mark Tolliver, CEO Palamida Inc.
Open Source and the New Software Supply Chain Mark Tolliver, CEO Palamida Inc. Could You Sign This? Typical Software Project Metrics 2.9 GB 87,863 Files 8,535,345 LOC Copyright holders ~350 Archives 178
Introduction to OVAL: A new language to determine the presence of software vulnerabilities
Introduction to OVAL: A new language to determine the presence of software vulnerabilities Matthew Wojcik / Tiffany Bergeron / Robert Roberge November 2003 The MITRE Corporation Table of Contents Introduction
Service Schedule for CLOUD SERVICES
Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this
Information Security Services. Achieving PCI compliance with Dell SecureWorks security services
Information Security Services Achieving PCI compliance with Dell SecureWorks security services Executive summary In October 2010, the Payment Card Industry (PCI) issued the new Data Security Standard (DSS)
Symantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
HIPAA Compliance Evaluation Report
Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations
Open-Source Business Models:
Open-Source Business Models: Making money by giving it away Andrew J. Hall February 20, 2015 Linux Collaboration Summit Santa Rosa, CA 2015 Hall Law. All rights reserved. This presentation is licensed
Patch Management Policy
Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:
PII Compliance Guidelines
Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last
Secondary DMZ: DMZ (2)
Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or
BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture
BladeLogic Software-as-a- Service (SaaS) Solution Help reduce operating cost, improve security compliance, strengthen cybersecurity posture February 20, 2014 Contents The Configuration Security Compliance
Rational Asset Manager 7.2 Editions and Licensing
Rational Asset Manager 7.2 Editions and Licensing Derek D. Baron, [email protected] Product Manager, Rational Asset Manager 2009 IBM Corporation IBM Corporation 200 The information contained in this presentation
Check Point and Security Best Practices. December 2013 Presented by David Rawle
Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs
IBM Endpoint Manager Product Introduction and Overview
IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to
Evolutyz Corp. is a future proof evolution of endless opportunities with a fresh mind set in Technology Consulting and Professional Services.
Evolutyz Corp. is a future proof evolution of endless opportunities with a fresh mind set in Technology Consulting and Professional Services. Who we are? In order to remain competitive, enterprises today
The Security Development Lifecycle at SAP How SAP Builds Security into Software Products
SAP Security Concepts and Implementation The Security Development Lifecycle at SAP How SAP Builds Security into Software Products Table of Contents 4 Integrating Security Right from the Start 4 Establishing
Patch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
KwikTag Technical Information
KwikTag Technical Information Frequently Asked Questions KwikTag balances powerful and proven, feature-rich Transactional Content Management with practicality, fast implementation, ease of use and maintenance,
CA Client Automation
CA Client Automation Supported Content for CA Patch Manager and Supported Application Signature Content April 2015 Contents CA Content Research Team... 3 CA Patch Manager Content... 3 Operating Systems
Invest in your business with Ubuntu Advantage.
Invest in your business with Ubuntu Advantage. Expert advice. Specialist tools. Dedicated support. Introducing Ubuntu Advantage Contents 02 Introducing Ubuntu Advantage 03 Ubuntu Advantage 04 - Landscape
Security Controls in Service Management
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Security
Cracking the Code on Software License Management
Cracking the Code on Software License Management Overview of IT Asset Management Integration Integration of the physical, financial, and contractual attributes of IT assets Enables the delivery of timely
WÜRTHPHOENIX NetEye. FAQs. WÜRTHPHOENIX NetEye. Why pay for Open Source?
WÜRTHPHOENIX NetEye FAQs WÜRTHPHOENIX NetEye Why pay for Open Source? IT System Management with NetEye WÜRTHPHOENIX NetEye is an Open Source applications package for monitoring complex IT infrastructures.
The 7 Myths of IP Risk: The Real Exposure Issues with Free and Open Source Software. Black Duck Software White Paper
The 7 Myths of IP Risk: The Real Exposure Issues with Free and Open Source Software Black Duck Software White Paper FOSS is widely recognized as providing significant technology, innovation and financial
Predicts 2004: Supplier Relationship Management
Strategic Planning, D. Hope-Ross Research Note 17 November 2003 Predicts 2004: Supplier Relationship Management Enterprises using technology to improve supplier relationships should pay attention to changes
Open Source in the Real World: Beyond the Rhetoric
Open Source in the Real World: Beyond the Rhetoric Maureen Dorney Partner, DLA Piper Kat McCabe Board of Advisors, Black Duck Software, Inc. Gemma Dreher Senior Counsel, BAE Systems Introduction Widespread
Guardium Change Auditing System (CAS)
Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
White Paper. Managed IT Services as a Business Solution
White Paper Managed IT Services as a Business Solution 1 TABLE OF CONTENTS 2 Introduction... 2 3 The Need for Expert IT Management... 3 4 Managed Services Explained... 4 5 Managed Services: Key Benefits...
Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs
Technology Lifecycle Management A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Even as technology improves, government s fundamental IT challenge remains
How To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
LCM IT Asset Management
LCM IT Asset Management Management Summary Version 1.0 (16.03.2011) Table of Contents 1 LCM IT Asset Management... 3 1.1 License master data... 4 1.2 Management of IT-relevant contractual relationships,
CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY
CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY Akash Chandrashekar - Solution Architect, Red Hat Renaud Deraison - Tenable Network Security, Inc. / Nessus.org Compliance Issues
Agenda. Agenda. Security Testing: The Easiest Part of PCI Certification. Core Security Technologies September 6, 2007
Security Testing: The Easiest Part of PCI Certification Core Security Technologies September 6, 2007 Agenda Agenda The PCI Standard: Security Basics and Compliance Challenges Compliance + Validation =
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
OSS LOGISTICS: DRIVING INNOVATIVE SOFTWARE FROM DEVELOPER TO CUSTOMER Alex Bigmore Senior Architect & Open Source Governance Programme Manager SITA
OSS LOGISTICS: DRIVING INNOVATIVE SOFTWARE FROM DEVELOPER TO CUSTOMER Alex Bigmore Senior Architect & Open Source Governance Programme Manager SITA Phil Granof EVP & Chief Marketing Officer Black Duck
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
IBM Endpoint Manager Version 9.0. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.0 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.0 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
SapphireIMS 4.0 Asset Management Feature Specification
SapphireIMS 4.0 Asset Management Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission
HIT System Procurement Issues and Pitfalls Session 2.03
HIT System Procurement Issues and Pitfalls Session 2.03 Presented by: Gerry Hinkley Davis Wright Tremaine LLP and Joseph M. DeLuca IT Optimizers Session Goals Provide you with A best practices approach
SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013
SOFTWARE ASSET MANAGEMENT Continuous Monitoring September 16, 2013 Tim McBride National Cybersecurity Center of Excellence [email protected] David Waltermire Information Technology Laboratory [email protected]
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed
Managed Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE
Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4
Asset management guidelines
Asset management guidelines 1 IT asset management (ITAM) overview Objective Provide a single, integrated view of agency assets in order to allow agencies to identify the asset location and assess the potential
Tecknodreams Software Consulting Pvt. Ltd. Managing global IT operations using SapphireIMS
Tecknodreams Software Consulting Pvt. Ltd. Managing global IT operations using SapphireIMS Company Profile The company is a global online technology and operations company which transforms customer interactions
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Total Cost of Ownership for Enterprise Content Management
Total Cost of Ownership for Enterprise Content Management Discover how to cut through the complexity of the ECM technology stack, avoid proprietary lock-ins and significantly reduce costs by using Open
Making software from the open source community ready for the enterprise
JBoss Enterprise Middleware Making software from the open source community ready for the enterprise 2 Executive summary 2 JBoss Community projects 3 JBoss Enterprise Middleware Recommended for production
Risk profile table for deployment of releases to the main web site. High Acceptable Unacceptable Unacceptable
ITIL V3 Intermediate Capability Stream: RELEASE, CONTROL AND VALIDATION (RC&V) CERTIFICATE SCENARIO BOOKLET Scenario One A global company develops their own applications to support the business. The Service
Mobile and BYOD Strategy
Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring
The New Style of IT. Rob McMahon. Director Cloud Computing HP General Western Europe
The New Style of IT Rob McMahon Director Cloud Computing HP General Western Europe Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments
Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments Andrew J. Hall Fenwick & West LLP April 16, 2013 Linux Foundation Collaboration Summit Presentation Topics Introduction
JBoss Enterprise Middleware
JBoss Enterprise Middleware The foundation of your open source middleware reference architecture Presented By : Sukanta Basak Red Hat -- Vital Statistics Headquarters in Raleigh, NC Founded in 1993 Over
How To Improve Your Software
Driving Quality, Security and Compliance in Third- Party Code Dave Gruber Director of Product Marketing, Black Duck Keri Sprinkle Sr Product Marketing Manager, Coverity Jon Jarboe Sr Technical Marketing
White Paper Instant Messaging (IM) and Sarbanes Oxley Compliance
White Paper Instant Messaging (IM) and Sarbanes Oxley Compliance - 1 - Statement of Purpose This document is focused on providing financial companies, and all others bound by Sarbanes-Oxley regulations,
IBM Infrastructure Resource Management Services Offering Overview. IBM Global Services
IBM Infrastructure Resource Management Services Offering Overview The role of IT infrastructure within the enterprise has evolved as business functions have become virtually inseparable from the IT that
APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW
EHIBIT H to Amendment No. 60 APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT SECURITY SERVICES SOW EHIBIT H to Amendment No. 60 Table of Contents 1.0 Security Services Overview
CSPA. Common Statistical Production Architecture Descritption of the Business aspects of the architecture: business models for sharing software
CSPA Common Statistical Production Architecture Descritption of the Business aspects of the architecture: business models for sharing software Carlo Vaccari Istat ([email protected]) Index Costs categories
Enabling Data Quality
Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &
Red Hat ISV Program Guide
Red Hat ISV Program Guide Accelerate Your Success! APJ ISV program Guide 1 of 17 WELCOME TO THE ISV PARTNER PROGRAM RED HAT PARTNER PROGRAM ISV PARTNER TRACK Welcome to the Red Hat Partner Program ISV
Using EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments
Using EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments Technology Concepts and Business Considerations Abstract EMC SourceOne Email Management enables customers to mitigate risk, reduce
Goals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
Intellectual Property Group Presentation. Using Open Source Software Issues to Consider. Peter J. Guffin, Esq. Pierce Atwood LLP January 22, 2009
Intellectual Property Group Presentation Using Open Source Software Issues to Consider Peter J. Guffin, Esq. Pierce Atwood LLP January 22, 2009 I. Agenda Select key terms in various open source licenses
AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC
AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC MANAGE SECURITY AT THE SPEED OF BUSINESS AlgoSec Whitepaper Simplifying PCI-DSS Audits and Ensuring Continuous Compliance with AlgoSec
Nexus Professional Whitepaper. Repository Management: Stages of Adoption
Sonatype Nexus Professional Whitepaper Repository Management: Stages of Adoption Adopting Repository Management Best Practices SONATYPE www.sonatype.com [email protected] +1 301-684-8080 12501 Prosperity
CONDIS. IT Service Management and CMDB
CONDIS IT Service and CMDB 2/17 Table of contents 1. Executive Summary... 3 2. ITIL Overview... 4 2.1 How CONDIS supports ITIL processes... 5 2.1.1 Incident... 5 2.1.2 Problem... 5 2.1.3 Configuration...
XEROX TALKS BEST PRACTICES FOR OPEN SOURCE GOVERNANCE
XEROX TALKS BEST PRACTICES FOR OPEN SOURCE GOVERNANCE November 2014 2014 Black Duck Software, Inc. All Rights Reserved. SPEAKERS Phil Odence Vice President and General Manager Black Duck Software Robert
