Feeds

Ex-Sun VP guns for IP violations

Tolliver takes over at Palamida

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Sun Microsystems' former marketing and strategy vice president Mark Tolliver is taking over at a Silicon Valley start-up that promises to find hidden intellectual property (IP) traps in open source software.

Tolliver, who left Sun following last year's technology sharing and legal settlement with Microsoft, is taking over as Palamida's chief executive officer and president. Tolliver was one of Sun's management behind the company's technology sharing and legal settlement with Microsoft.

Tolliver told The Register he would help Palamida ramp-up staff numbers, currently at 10, and expand the company's customer base and network of partners.

"We can raise the visibility of the company. It's a shortlist of two in this space. It's my job to make sure we are visible in that list," Tolliver said. "One of the things I can bring is a network of organizations and companies to expand [our] partnerships."

Palamida is one of an early generation of start-ups targeting IP and licensing of software. The company is pitching its products and services against Black Duck Software. Ironically, Black Duck's own head of marketing Paul Henderson also spent time with Sun - Henderson led developer marketing for eight years.

Palamida's core product is IP Amplifier, which searches source code, binary file types and Java name space information, cross referencing information with a database of 40,000 open source projects and 38 million files. IP Amplifier will tell developers which licenses are associated with specific pieces of software.

What developers do next is up to them, according to Tolliver, who believes companies must develop corporate policies for handling IP in software.

Tolliver is drawing on his own experiences at Sun to promote Palamida - Tolliver was once head of the NetScape-Sun iPlanet joint venture.

"We inherited millions of lines of Netscape enterprise code. We weren't sure what was in there or whether there was third-party party or open source code. It took us three years to figure that out and establish where we were. Many times I'd say: ' Why don't we find some tools that help us do this faster?', and many times there aren't any... when Palamida came along I said: 'Hey I've been there'."®

Related stories

'Get a lawyer!' Sun tells developers
Captain McBride and the SCO Titanic
Creative Commons prez asks for some lurv

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.