Governance Issues May Bedevil Open Source Projects

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12
Previous Next

Click through for results from a software development survey conducted by Sonatype.

There’s no doubt that open software has been a boon to IT. Without it there would be a lot fewer IT projects to go round because of not only the cost of proprietary commercial software, but also the complexity of acquiring it.

In fact, a new survey of 1,500 IT people conducted by Sonatype, a provider of open source project management software for application development, finds that almost half of them have standardized on some form of open source software, while another 26 percent said they make frequent use of it.

But the survey also shines a light on the fact that there is no governance over open source software usage within most organizations. Charles Gold, chief marketing officer for Sonatype, says that could prove to be a significant problem for IT organizations because it makes it difficult to keep track of what version of any given open source software artifact is included in any given project.

That not only creates a management headache in terms of trying to manage the overall application development process, it could have legal ramifications down the road should any of those artifacts become the subject of a patent infringement case. Most companies might not even be aware that they are relying on those artifacts until someone makes them a party in a lawsuit they are bringing against someone else.

None of that necessarily means IT organizations should shy away from open source software. In fact, in the wake of the economic downturn, more companies have adopted an “open source first” approach to IT to help rein in costs.

But Gold says there is a strong economic case for taking a more structured approach to managing its usage throughout the organization. After all, a “don’t ask, don’t tell” approach to any kind of application development project that eliminates management’s visibility into what is being used when and where is just begging for trouble later on down the line.

 

Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

 
More Slideshows

DataM31-190x128 Five Ways Dirty Data Is Killing Marketing Performance

As marketing becomes increasingly data driven, it’s time for marketers to make data quality a top priority. ...  More >>

UnitrendsDogAteHomework0x A Presidential History of the 'Dog Ate My Email' Excuse

Ever since email first entered the White House, presidential administrations have used the "I lost my email" excuse to evade all sorts of controversies. ...  More >>

mobile58-190x128 Five Tips for Closing the Enterprise Mobility Gap

Without the right infrastructure, the essential business of app development ends up taking more time, money and resources, leaving businesses behind the eight ball. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date