Sonatype Selected by Equifax to Support OS Governance Press Release

blog-logo Sonatype Blog

[Part 3] Code, Cars, and Congress: A Time for Cyber Supply Chain Management

[Part 3] Code, Cars, and Congress: A Time for Cyber Supply Chain Management
Read More...

[Part 2] Code, Cars, and Congress: A Time for Cyber Supply Chain Management

[Part 2] Code, Cars, and Congress: A Time for Cyber Supply Chain Management
Read More...

Code, Cars, and Congress: A Time for Cyber Supply Chain Management

Code, Cars, and Congress: A Time for Cyber Supply Chain Management
Read More...

Part 3: The Internet of Everything: Code, Cars, and More

In part two of my blog 'A Closer Look at Today's Software Supply Chain', I discussed why human-speed supply chain management can’t keep pace with today’s agile software development practices and why

Read More...

Are You Choosing the "Right" Component?

In our recent open source developer survey we asked, what are the TOP FOUR characteristics considered when selecting a component? And since components are the building blocks used when creating an

Read More...

Part 1: The Internet of Everything: Code, Cars, and More

Just like automobile manufacturers, software “manufacturers” need to apply supply chain management principles for both efficiency and quality. They need to be prepared to conduct a rapid and

Read More...

Stewing Over Software Ingredients

Just the other day I was planning dinner for my family and thought it would be a great idea to bust out the Dutch oven I had to have, but rarely use, and make a nice stew. I ran to the grocery store

Read More...

Open source components, a fine vintage or sour milk?

The U.S. recently overtook France as the world’s largest wine market. And here at Sonatype, we can proudly say we’ve contributed to this achievement. By not only consuming our fair share of wine but

Read More...

Securosis Dives Deep into our 2014 Survey

There are two ways to motivate others to action: emotional appeal and fact based analysis. Our 2014 Open Source and Application Security survey results touched on both. We've run this survey for the

Read More...