SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
Fighting Forks
 When Open Source Disappears into the Pentagon
         and What We Can Do About It



Gunnar Hellekson
Chief Technology Strategist, Red Hat US Public Sector
gunnar.hellekson@redhat.com · 202 507 9027 · @ghelleks

3 August 2010
Licenses keep open software open.
           That's all we have.
Our process keeps software closed.
Licenses keep open software open.
               That's all we have.
       The world conspires against us.
Licenses keep open software open.
          Tivo-ization.
     Which is a fancy all we have. free-riding.
                 That's word for
Licenses keep Open software open.
       Secret open Source.
If my lawyer finds out That's allGPL code, he's gonna kill me.
                       I used we have.
Licenses keep open software open.
            Tweakers.
                   That's all we have.
    I just added this one teeny-weeny patch...
Licenses keep open software open.
   Government is Government.
No code distribution That's all we have. it's all Government.
                     requirements:
Licenses keep open software open.
       Government Forges.
             That's all we have.
         Roach motels for code.
Licenses keep open software open.
            Security.
      DSS > GPL. Andall we have.
               That's don't forget ITAR.
Licenses What openwe do?
         keep can software open.
    Hack the process.all we our act together.
                That's Get have.
What do we want from the process?
                          Let's ask an expert.

Design for evolution.
Open a dialogue between inside and outside perspectives.
Invite different levels of participation.
Develop both public and private community spaces.
Focus on value.
Combine familiarity and excitement.
Create a rhythm for the community.

                     Etienne Wenger, Richard McDermott, and William M. Snyder
      Cultivating Communities of Practice, 1st ed. (Harvard Business Press, 2002)
Licenses keep for Evolution open.
       Design open software
                  That's all we have.
   Include upstream contributions in contracts.
Invite different levels of participation.
     Operationalize Dave Wheeler and Dan Risacher.
Develop public and private spaces.
Forges are for secrets. Unclassified work should be public.
Open a dialogue.
Talk to your PMs, your lawyers, your engineers.
Focus on value.
Less talking. More doing. Perfect is the enemy of the good, etc.




  “Democracy is the enemy of useful work.” - Clay Johnson
Combine familiarity with excitement.
           Tools are important.
Create a rythym.
Stay vocal and stay visible.
Do these three things.


Understand the contribution process in your patch.
Make sure everyone knows they can come to you with
questions. We have your back.

Shout your success.
We're winning every day, but nobody knows about it.

Find one patch, one script you can free.
These little guys are whithering. Get them out into the
sunlight, where they can grow.
20

Contenu connexe

Similaire à Fighting Forks

A tale of two cities: Merging Yahoo and Aol’s open source programs
A tale of two cities: Merging Yahoo and Aol’s open source programsA tale of two cities: Merging Yahoo and Aol’s open source programs
A tale of two cities: Merging Yahoo and Aol’s open source programs
Ashley Wolf
 
Open Source Compliance at Twitter
Open Source Compliance at TwitterOpen Source Compliance at Twitter
Open Source Compliance at Twitter
Chris Aniszczyk
 
Stefan Marsiske - What would hackers use? part2
Stefan Marsiske - What would hackers use? part2Stefan Marsiske - What would hackers use? part2
Stefan Marsiske - What would hackers use? part2
ecommerce poland expo
 
Economics of Open Source Software
Economics of Open Source SoftwareEconomics of Open Source Software
Economics of Open Source Software
Ray Toal
 
SFSCON23 - Johannes Näder Linus Sehn - Let’s monitor implementation of Free S...
SFSCON23 - Johannes Näder Linus Sehn - Let’s monitor implementation of Free S...SFSCON23 - Johannes Näder Linus Sehn - Let’s monitor implementation of Free S...
SFSCON23 - Johannes Näder Linus Sehn - Let’s monitor implementation of Free S...
South Tyrol Free Software Conference
 
Ethical Consideration of Open Source Software
Ethical Consideration of Open Source SoftwareEthical Consideration of Open Source Software
Ethical Consideration of Open Source Software
Larry Jennings
 

Similaire à Fighting Forks (20)

A tale of two cities: Merging Yahoo and Aol’s open source programs
A tale of two cities: Merging Yahoo and Aol’s open source programsA tale of two cities: Merging Yahoo and Aol’s open source programs
A tale of two cities: Merging Yahoo and Aol’s open source programs
 
Introduction To Open Source
Introduction To Open SourceIntroduction To Open Source
Introduction To Open Source
 
Open Source Compliance at Twitter
Open Source Compliance at TwitterOpen Source Compliance at Twitter
Open Source Compliance at Twitter
 
The free software history and communities’ journey ahead
The free software history and communities’ journey aheadThe free software history and communities’ journey ahead
The free software history and communities’ journey ahead
 
Stefan Marsiske - What would hackers use? part2
Stefan Marsiske - What would hackers use? part2Stefan Marsiske - What would hackers use? part2
Stefan Marsiske - What would hackers use? part2
 
Succeeding with FOSS!
Succeeding with FOSS!Succeeding with FOSS!
Succeeding with FOSS!
 
Economics of Open Source Software
Economics of Open Source SoftwareEconomics of Open Source Software
Economics of Open Source Software
 
Collaboration for Good Futures
Collaboration for Good FuturesCollaboration for Good Futures
Collaboration for Good Futures
 
Industry Moves to Fill Gap for Building Trusted Supply Chain Technology Accre...
Industry Moves to Fill Gap for Building Trusted Supply Chain Technology Accre...Industry Moves to Fill Gap for Building Trusted Supply Chain Technology Accre...
Industry Moves to Fill Gap for Building Trusted Supply Chain Technology Accre...
 
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
 
Open Source Solutions Swansea April 2009
Open Source Solutions Swansea April 2009Open Source Solutions Swansea April 2009
Open Source Solutions Swansea April 2009
 
SFSCON23 - Johannes Näder Linus Sehn - Let’s monitor implementation of Free S...
SFSCON23 - Johannes Näder Linus Sehn - Let’s monitor implementation of Free S...SFSCON23 - Johannes Näder Linus Sehn - Let’s monitor implementation of Free S...
SFSCON23 - Johannes Näder Linus Sehn - Let’s monitor implementation of Free S...
 
Open Source & Free Software
Open Source & Free SoftwareOpen Source & Free Software
Open Source & Free Software
 
Session 2 - Libraries and Open Source
Session 2 - Libraries and Open SourceSession 2 - Libraries and Open Source
Session 2 - Libraries and Open Source
 
Gup2011| open source
Gup2011| open sourceGup2011| open source
Gup2011| open source
 
Ethical Consideration of Open Source Software
Ethical Consideration of Open Source SoftwareEthical Consideration of Open Source Software
Ethical Consideration of Open Source Software
 
The Role of IT for Social Change
The Role of IT for Social ChangeThe Role of IT for Social Change
The Role of IT for Social Change
 
Why software freedom matters
Why software freedom mattersWhy software freedom matters
Why software freedom matters
 
Free software basics
Free software basicsFree software basics
Free software basics
 
Open Source & Open Development
Open Source & Open Development Open Source & Open Development
Open Source & Open Development
 

Dernier

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Dernier (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 

Fighting Forks

  • 1. Fighting Forks When Open Source Disappears into the Pentagon and What We Can Do About It Gunnar Hellekson Chief Technology Strategist, Red Hat US Public Sector gunnar.hellekson@redhat.com · 202 507 9027 · @ghelleks 3 August 2010
  • 2. Licenses keep open software open. That's all we have.
  • 3. Our process keeps software closed. Licenses keep open software open. That's all we have. The world conspires against us.
  • 4. Licenses keep open software open. Tivo-ization. Which is a fancy all we have. free-riding. That's word for
  • 5. Licenses keep Open software open. Secret open Source. If my lawyer finds out That's allGPL code, he's gonna kill me. I used we have.
  • 6. Licenses keep open software open. Tweakers. That's all we have. I just added this one teeny-weeny patch...
  • 7. Licenses keep open software open. Government is Government. No code distribution That's all we have. it's all Government. requirements:
  • 8. Licenses keep open software open. Government Forges. That's all we have. Roach motels for code.
  • 9. Licenses keep open software open. Security. DSS > GPL. Andall we have. That's don't forget ITAR.
  • 10. Licenses What openwe do? keep can software open. Hack the process.all we our act together. That's Get have.
  • 11. What do we want from the process? Let's ask an expert. Design for evolution. Open a dialogue between inside and outside perspectives. Invite different levels of participation. Develop both public and private community spaces. Focus on value. Combine familiarity and excitement. Create a rhythm for the community. Etienne Wenger, Richard McDermott, and William M. Snyder Cultivating Communities of Practice, 1st ed. (Harvard Business Press, 2002)
  • 12. Licenses keep for Evolution open. Design open software That's all we have. Include upstream contributions in contracts.
  • 13. Invite different levels of participation. Operationalize Dave Wheeler and Dan Risacher.
  • 14. Develop public and private spaces. Forges are for secrets. Unclassified work should be public.
  • 15. Open a dialogue. Talk to your PMs, your lawyers, your engineers.
  • 16. Focus on value. Less talking. More doing. Perfect is the enemy of the good, etc. “Democracy is the enemy of useful work.” - Clay Johnson
  • 17. Combine familiarity with excitement. Tools are important.
  • 18. Create a rythym. Stay vocal and stay visible.
  • 19. Do these three things. Understand the contribution process in your patch. Make sure everyone knows they can come to you with questions. We have your back. Shout your success. We're winning every day, but nobody knows about it. Find one patch, one script you can free. These little guys are whithering. Get them out into the sunlight, where they can grow.
  • 20. 20