Research Library

Powered by

Open Source Software Research

  • Social Media Research Tools

    Sponsored by: Authentic8, Inc.

    Authentic8 ‘s Top of FormOSINT Training Specialists recently published 6 favorite tools for conducting social media investigations. Learn how Authentic8's Silo Research Toolbox can make your investigations compliant, anonymous and secure.

  • Auditing Your Company’s Use of Open Source

    Sponsored by: Fossa

    As more and more companies continue to include open source as part of their software program, it’s critical to establish a strategy to manage consumption and ensure efficient use of resources. Download this guide for the key aspects of an open source strategy designed to keep you on track with your operational and compliance objectives.

  • 5 Reasons Why Using Spreadsheets for Open Source Management is a Recipe for Disaster

    Sponsored by: Fossa

    Management of open source is a growing concern that many organizations are struggling with handling effectively. Most organizations start off managing all of their open source dependencies in a spreadsheet. In this white paper, discover 5 reasons on why that can be a recipe for disaster.

  • The Rise of the Open Source Program Office

    Sponsored by: Fossa

    Open source software is fundamentally different from proprietary software. Often, different teams use and/or build open source differently. Because of this variability, it needs to be approached differently. Managing this strategy is the job of the OSPO (Open Source Program Office). But what is an OSPO and how do you build one? Read on to find out.

  • Mitigating IP Risk: Three Strategies to Ensure Open Source Compliance

    Sponsored by: Fossa

    As open source software continues to be adopted at an increasing rate, compliance with open source licenses becomes a more pressing initiative. Download this white paper for 3 strategies you can use to ensure open source compliance.

  • Asurion developers choose Snyk for developer-focused approach and for its product vision and innovation

    Sponsored by: Snyk

    Most companies use a huge amount of open source code in their development process – without the proper security channels set up for managing and protecting their data. Here, a company with microservices-based architecture found an open source-specific security tool that met their data management needs. Read the case study now to learn how.

  • Securing Open Source Libraries: 2019 Update

    Sponsored by: Snyk

    In this 79-page eBook, find an in-depth analysis on the current state of open source security. The eBook features insights into finding and fixing vulnerable packages, integrating testing to prevent vulnerabilities, and choosing a SCA solution. Access the full guide here.

  • Open Source Network Security Tools

    Sponsored by: AT&T Cybersecurity

    With so many open-source tools available to help with network security, it can be tricky to figure out where to start. This beginner’s guide will provide you with the advice and expertise to help you navigate the extensive selection of tools. Read on to get started.

  • Sonatype Nexus Lifecycle Review From A Customer

    Sponsored by: Sonatype

    Accuracy matters in security management. As it happens, security management at a reasonable cost matters quite a bit too. Luckily, select security platforms offer both. Sonatype’s Nexus Lifecycle ensures quality open source software security. Read how Sonatype helped one business improve their proactivity in this IT Central Station review.

  • Software Composition Analysis: Getting to the signal through the noise

    Sponsored by: Sonatype

    Software composition analysis (SCA) is back. But what is it, again? As innovation centers around open source software, security threats need to be assessed, monitored, and quashed. This is where SCA comes in. Read this report to learn what exactly SCA is and how it dismantles major security threats in open source software –with automated ease.

  • Technology Insight for Software Composition Analysis

    Sponsored by: Sonatype

    According to a Gartner survey, over 90% of respondents reported using open-source software. The accessibility of open source is inviting, but its popularity is mirrored by a steady increase in security risks. In this research report, Gartner examines the vulnerabilities associated with open-source and third-party software. Read the full report now.

  • Questas improves VM performance and management with Red Hat Virtualization

    Sponsored by: Red Hat

    Legacy virtualization platforms often result in degrading performance and decreasing productivity. For Questas, migrating to Red Hat Virtualization reduced average log-in time from 2.5 minutes to just 35 seconds, while also reducing CapEx by 30%. Learn more about Questas’ success with Red Hat in the full case study here.

  • OpenShift Container Platform

    Sponsored by: Red Hat

    With a Kubernetes platform, managing containers on cloud environments is easy. With Red Hat OpenShift, it can be even easier. See how a hybrid cloud Kubernetes application platform can help your business by reading this data sheet.

  • The Total Economic Impact of Red Hat OpenShift Dedicated

    Sponsored by: Red Hat

    With a growing demand to modernize IT architecture, migrating and updating legacy applications can increase administrative and operational time. Forrester’s case study on OpenShift Dedicated (OSD) found that operations and administrative costs decrease by 2 FTEs each year. Read how three organizations benefited from OSD in the full case study here.

  • Comparing Red Hat Ansible Automation and Puppet Enterprise

    Sponsored by: Red Hat

    Finding a simple automation tool is a top priority for many organizations looking to better their processes. Consult with this competitive review of Red Hat Ansible Automation and Puppet Enterprise to weigh the pros and cons of each platform.

  • Open Source Represents Opportunity and Risk

    Sponsored by: Veracode, Inc.

    Open source is here to stay, but so too are the security risks involved in using open source software. Open this resource to learn more about the underlying risks and how you can mitigate them.

  • DevOps and Open Source 101: The DevOps Role in Modernizing Open Source Best Practices

    Sponsored by: Fossa

    Open this whitepaper to learn about the risks involved in foregoing open source software audits, and how you can improve the compliance and security of your open source software.

  • Case Study: DBS Bank goes big on open source

    Sponsored by:

    Besides using a slew of open source software, DBS Bank is looking to contribute some of its own projects to the open source community in future

  • Computer Weekly – 22 January 2019: Moving beyond network boundaries

    Sponsored by:

    In this week's Computer Weekly, we look at how businesses are adapting to the challenges of perimeterless network security. We examine how digital transformation is bringing increased complications for identity and access management. And we ask if public cloud providers are a threat to the funding model for open source software. Read the issue now.

  • CW ASEAN – January 2019: Dive into microservices

    Sponsored by:

    In this edition of CW ASEAN, we uncover the state of adoption of microservices in ASEAN and what needs to be in place for enterprises to get the most out of the technology.

  • Cloud migration: What enterprises need to know

    Sponsored by:

    In this e-guide, we take a closer look at what enterprises need to consider to make moving to the cloud as seamless as possible, while sharing some success stories of big name enterprises that have already successfully done it.

  • A Managed Platform for Open-Source Applications

    Sponsored by: Instaclustr

    When it comes to open source applications, an integrated managed platform can help provide this foundation, and can provide 24/7 support, management of thousands of nodes, and more. Download this white paper to learn more about a managed platform option for open source applications.

  • Kubernetes Open-Source Orchestration & Security

    Sponsored by: Aqua Security

    For those who use the open-source capabilities of Kubernetes security, there are 4 types of threats that you should know about. In this resource, explore a discussion of threat models, various security considerations and best practices for optimizing your Kubernetes deployment.

  • Computer Weekly – 19 June 2018: Microsoft becomes devoted to open source developers

    Sponsored by:

    In this week's Computer Weekly, after Microsoft's recent acquisition of GitHub, we examine the software giant's tools for embracing open source developers. Also, secretary of state for digital, culture, media and sport Matt Hancock talks about growing the UK digital economy and supporting the tech sector. Read the issue now.

  • SAM: Managing the hidden costs in software and cloud subscriptions

    Sponsored by:

    In this e-guide we discover how software asset managers are coming up with new ways to give employees freedom and flexibility whilst keeping the ability to easily audit what is being used on-premise and in the cloud as well as what is no longer being used.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.