Welcome!

@DevOpsSummit Authors: Yeshim Deniz, Pat Romanski, Liz McMillan, Zakia Bouachraoui, Elizabeth White

Related Topics: @DevOpsSummit, Open Source Cloud, Cloud Security

@DevOpsSummit: Article

B2B Startups and Open Source | @CloudExpo #Cloud #Security #Linux #AI

Perhaps one of the most overlooked aspects of open source is security

For a long time, Bill Gates and in fact the entire leadership team at Microsoft were vehemently against the open source community. Steve Ballmer had once called Linux “a malignant cancer” in reference to Linux allegedly violating nearly 235 patents that Microsoft owned. Even post-retirement, Bill Gates had once picked on open source claiming that this model creates a license that prevents anybody from improving the software. “I think if you invent drugs, you should be able to charge for them,” he had said.

But Microsoft, and the entire gamut of B2B service providers, have come a long way since then. Today, the company has embraced open source and while Microsoft products are themselves not open-source, the company has been actively contributing to open source projects like Node.js and Hadoop.

So why did Microsoft turn a corner with open source? And why is it important for new-age B2B startups to open source their applications? One of the main reasons for this is compatibility. According to Yoav Kutner, the former CTO of Magento who is now the CEO of Oro, an open source eCommerce platform for B2B businesses, the back office systems of many a B2B business is still archaic and does not permit customization. With an open source model, it is possible to still offer a full lifecycle of order management.

Another important reason to open source your application is interoperability. Businesses regularly collaborate with stakeholders like vendors, distributors and suppliers who are outside their premises. It can be difficult to build a closed application that is compatible with the technology system that your vendor or distributor is using. Open source applications are a lot more interoperable and are not restricted by proprietary data formats. This makes them valuable in a business setup.

But perhaps one of the most overlooked aspects of open source is security. There has been a substantial rise in data breaches globally over the past few years. According to one study, the average total cost of a data breach is nearly $3.79 million. With traditional closed systems, business customers are at the mercy of the vendor and are in no position to tell whether the systems in place are as secure as the manufacturers claim. With open source systems, thousands of collaborators get to poke holes into your software product. This makes it easy to identify bugs and loopholes that could potentially be abused by hackers.

There are also other factors that make open source attractive to customers. Open source software tools are essentially free to download which make them the first choice for many businesses. But this can also be a challenge in monetizing your startup. Businesses can however adopt other strategies like selling add-ons and plugins through a marketplace, taking a cut on payment transactions through the platform, charging for live support and offering paid training to customers.

Bootstrapped startups routinely face resource crunch that prevents them from building products that can match the scale and size of established rivals. With open source, your business is likely to bring together thousands of contributors who can potentially grow your business much faster than your startup can do it as a closed team.

More Stories By Harry Trott

Harry Trott is an IT consultant from Perth, WA. He is currently working on a long term project in Bangalore, India. Harry has over 7 years of work experience on cloud and networking based projects. He is also working on a SaaS based startup which is currently in stealth mode.

@DevOpsSummit Stories
Hackers took three days to identify and exploit a known vulnerability in Equifax’s web applications. I will share new data that reveals why three days (at most) is the new normal for DevSecOps teams to move new business /security requirements from design into production. This session aims to enlighten DevOps teams, security and development professionals by sharing results from the 4th annual State of the Software Supply Chain Report -- a blend of public and proprietary data with expert research and analysis.Attendees can join this session to better understand how DevSecOps teams are applying lessons from W. Edwards Deming (circa 1982), Malcolm Goldrath (circa 1984) and Gene Kim (circa 2013) to improve their ability to respond to new business requirements and cyber risks.
DXWorldEXPO LLC announced today that Nutanix has been named "Platinum Sponsor" of CloudEXPO | DevOpsSUMMIT | DXWorldEXPO New York, which will take place November 12-13, 2018 in New York City. Nutanix makes infrastructure invisible, elevating IT to focus on the applications and services that power their business. The Nutanix Enterprise Cloud Platform blends web-scale engineering and consumer-grade design to natively converge server, storage, virtualization and networking into a resilient, software-defined solution with rich machine intelligence.
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like "How is my application doing" but no idea how to get a proper answer.
This session will provide an introduction to Cloud driven quality and transformation and highlight the key features that comprise it. A perspective on the cloud transformation lifecycle, transformation levers, and transformation framework will be shared. At Cognizant, we have developed a transformation strategy to enable the migration of business critical workloads to cloud environments. The strategy encompasses a set of transformation levers across the cloud transformation lifecycle to enhance process quality, compliance with organizational policies and implementation of information security and data privacy best practices. These transformation levers cover core areas such as Cloud Assessment, Governance, Assurance, Security and Performance Management. The transformation framework presented during this session will guide corporate clients in the implementation of a successful cloud solu...
So the dumpster is on fire. Again. The site's down. Your boss's face is an ever-deepening purple. And you begin debating whether you should join the #incident channel or call an ambulance to deal with his impending stroke. Yes, we know this is a developer's fault. There's plenty of time for blame later. Postmortems have a macabre name because they were once intended to be Viking-like funerals for someone's job. But we're civilized now. Sort of. So we call them post-incident reviews. Fires are never going to stop. We're human. We miss bugs. Or we fat finger a command - deleting dozens of servers and bringing down S3 in US-EAST-1 for hours - effectively halting the internet. These things happen.