Manage the Risks of Software Reuse

Maria J. Smith

1.CVE-2021-44228,” Mitre, accessed Dec. 12, 2021, https://cve.mitre.org.

2. M. Sojer and J. Henkel, “Code Reuse in Open Resource Software program Progress: Quantitative Proof, Motorists, and Impediments,” Journal of the Association for Info Systems 11, no. 12 (March 2010): 868-901.

3. T. Mikkonen and A. Taivalsaari, “Software Reuse in the Era of Opportunistic Structure,” IEEE Software package 36, no. 3 (May perhaps-June 2019): 105-111.

4. D. Goodin, “Malicious NPM Packages Are Portion of a Malware ‘Barrage’ Hitting Repositories,” Ars Technica, Dec. 8, 2021, https://arstechnica.com A. Sharma, “Dev Corrupts NPM Libs ‘Colors’ and ‘Faker’ Breaking Thousands of Apps,” Bleeping Laptop or computer, Jan. 9, 2022, www.bleepingcomputer.com and A. Miller, “State of Open up Resource Safety Report 2020,” PDF file (Boston: Snyk, 2020), https://go.snyk.io.

5. T. Seals, “‘Ripple20’ Bugs Impression Hundreds of Hundreds of thousands of Related Equipment,” Threatpost, June 16, 2020, https://threatpost.com.

6. C. Soto-Valero, N. Harrand, M. Monperrus, et al., “A Thorough Research of Bloated Dependencies in the Maven Ecosystem,” Empirical Software package Engineering 26, no. 3 (March 2021): 1-44.

7. H. Solomon, “Canadian Internet sites Quickly Shut Down as Entire world Scrambles to Mitigate or Patch Log4Shell Vulnerability,” IT Entire world Canada, Dec. 13, 2021, www.itworldcanada.com.

Next Post

Radar Trends to Watch: June 2022 – O’Reilly

The explosion of large models continues. Several developments are especially noteworthy. DeepMind’s Gato model is unique in that it’s a single model that’s trained for over 600 different tasks; whether or not it’s a step towards general intelligence (the ensuing debate may be more important than the model itself), it’s an […]