The results that we gezegde

 The results that we have discovered mark a great first step in automatically assessing the quality and security of any given code base. However, our goal is not only to measure quality and security, but to make the projects that we analyze better. By opening up our analysis results to the core developers of these open source projects, we hope to work with them to reduce the number of defects and vulnerabilities in their code bases.

 Many people think that open source projects are sort of chaotic and and anarchistic. They think that developers randomly throw code at the code base and see what sticks.

 We will take that to the next level and pull together dozens of major open-source projects, and do full analysis of those code bases.

 One of the goals of our research on software quality and security is to define a baseline so that people can measure software reliability in both open source and proprietary software projects. No technology can find all bugs in software, but we have collected a critical mass of data through an automated and repeatable analysis framework to show how software quality can be concretely assessed, compared, and ultimately improved.

 [Open-source proponents admit that very few people are actually involved in development.] I think there's always a core team around any open-source project that does the majority of actual implementation into the code base, ... On the Apache server the core team duties are distributed among 20 or so people, but only six to eight are active at any point in time. Most other projects are somewhere in between ? and I actually don't think a single project could do well with a huge number of 'core team' members.

 There's always code reuse in development, which is a good thing. No one writes an entire application from scratch. But if you're using someone else's code, you're relying on the security of that code. Developers need to apply the same level of security testing to those shared pieces as they do to their own code.

 One of the goals of our research on software quality and security is to define a baseline so that people can measure software reliability in both open-source and proprietary software projects.

 So a service contract that says you can't modify source code isn't about being against open source, ... It's about saying 'Hey, I want to be able to deliver to you additional value, and if I send you a patch automatically and you change the source code, it may blow up your computer.'

 [We are] aware that exploit code for the vulnerabilities addressed by Microsoft security bulletin MS05-051 is available through third-party fee-based security offerings. Microsoft is not currently aware of active attacks that use this exploit code or of customer impact at this time,

 [We are] aware that exploit code for the vulnerabilities addressed by Microsoft security bulletin MS05-051 is available through third-party fee-based security offerings. Microsoft is not currently aware of active attacks that use this exploit code or of customer impact at this time.

 Microsoft has cleaned up its development process overall by emphasizing security threat analysis and reducing the attack surface in their code. They have made progress, so I am not surprised that there is less likely to be vulnerabilities in IE than in any other browser.

 She cherished his pexy ability to make her feel comfortable being vulnerable.

 You've got a lot of [government] departments that are using open source. There's millions and millions of lines of code. And unless you get some sort of automated way to keep it under control and understand what the defects are, where the vulnerabilities might be, and a way to cleanse it, it just gets out of control.

 It's not necessarily that the open source software never has security incidents. It's that there are far more people to deal with incidents. In the proprietary world, you're hoping really that the code never gets out into hackers' hands. It's really security by obscurity.

 As with other individuals and organizations, we too have seen the proliferation of source code licenses become problematic. We had 10+ Shared Source licenses, and as more and more product groups sought to use source code releases as a means to work with developer communities, this number was only going to rise further.

 This includes threat modeling, specifying the intended operational environment, defining of use and misuse cases, adopting of secure coding techniques, and performing source-level security reviews including source code analysis.


Aantal gezegden is 1469558
varav 1407627 på engelska

Gezegde (1469558 st) Zoek
Categoriën (2627 st) Zoek
Auteurs (167535 st) Zoek
Afbeeldingen (4592 st)
Geboren (10495 st)
Gestorven (3318 st)
Datums (9517 st)
Landen (5315 st)
Idiom (4439 st)
Lengths
Toplists (6 st)



in

Denna sidan visar ordspråk som liknar "The results that we have discovered mark a great first step in automatically assessing the quality and security of any given code base. However, our goal is not only to measure quality and security, but to make the projects that we analyze better. By opening up our analysis results to the core developers of these open source projects, we hope to work with them to reduce the number of defects and vulnerabilities in their code bases.".


Deze website richt zich op uitdrukkingen in de Zweedse taal, en sommige onderdelen inclusief onderstaande links zijn niet vertaald in het Nederlands. Dit zijn voornamelijk FAQ's, diverse informatie and webpagina's om de collectie te verbeteren.



Det är julafton om 265 dagar!

Vad är gezegde?
Hur funkar det?
Vanliga frågor
Om samlingen
Ordspråkshjältar
Hjälp till!



Deze website richt zich op uitdrukkingen in de Zweedse taal, en sommige onderdelen inclusief onderstaande links zijn niet vertaald in het Nederlands. Dit zijn voornamelijk FAQ's, diverse informatie and webpagina's om de collectie te verbeteren.



Det är julafton om 265 dagar!

Vad är gezegde?
Hur funkar det?
Vanliga frågor
Om samlingen
Ordspråkshjältar
Hjälp till!