article thumbnail

Open Source Software Security: Is Open Source Software Safe?

Percona

Even though open source software is firmly in the mainstream, used widely by businesses, governments, and everyone who owns a cell phone or computer, the question repeatedly arises: “Is open source software safe?” Is open source software as stable as other software? Our bar is higher than that.

article thumbnail

All of Netflix’s HDR video streaming is now dynamically optimized

The Netflix TechBlog

As noted in an earlier blog post , we began developing an HDR variant of VMAF; let’s call it HDR-VMAF. Yes, we are committed to supporting the open-source community. A vital aspect of such development is subjective testing with HDR encodes in order to generate training data. Krasula, A. Choudhury, S. Malfait, A.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What is Greenplum Database? Intro to the Big Data Database

Scalegrid

In this blog post, we explain what Greenplum is, and break down the Greenplum architecture, advantages, major use cases, and how to get started. Greenplum Database is an open-source , hardware-agnostic MPP database for analytics, based on PostgreSQL and developed by Pivotal who was later acquired by VMware. Open Source.

Big Data 321
article thumbnail

Dynatrace Application Security protects your applications in complex cloud environments

Dynatrace

Open source has also become a fundamental building block of the entire cloud-native stack. While leveraging cloud-native platforms, open-source and third-party libraries accelerate time to value significantly, it also creates new challenges for application security. Is it exposed to the public Internet?

Cloud 294
article thumbnail

What is Log4Shell? The Log4Shell vulnerability explained (and what to do about it)

Dynatrace

The vulnerability, published as CVE-2021-44228 , enables a remote attacker to take control of a device on the internet, if the device is running certain versions of Log4j 2. Simply put, attackers can remotely take over any internet-connected device that uses certain versions of the Log4j library anywhere in the software stack.

Internet 262
article thumbnail

Container security: What it is, why it’s tricky, and how to do it right

Dynatrace

Application developers commonly leverage open-source software when building containerized applications. In fact, the market research firm Forrester says that the average container image is comprised of 70% open-source software.[1] 1] And unfortunately, open-source software is often fraught with security vulnerabilities.

article thumbnail

What is web application security? Everything you need to know.

Dynatrace

In this blog, I’ll first cover the basics, explaining what web application security is and why it’s important. Their “ State of Open Source Security Report, 2020 ” found that the most common vulnerabilities are cross-site scripting vulnerabilities (18%), followed by malicious packages (13%). Dynatrace news.