Skip to content

Commit ec86649

Browse files
committed
Update project data, cards and modals
Signed-off-by: johnmhoran <johnmhoran@gmail.com>
1 parent d03f45f commit ec86649

File tree

18 files changed

+400
-417
lines changed

18 files changed

+400
-417
lines changed

website/blog/atom-chen-aboutcode/2025-02-04-atom-chen-aboutcode.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ lead maintainer of atom and chen, founder of AppThreat, and creator of other
2323
open source supply chain security tools like [OWASP CycloneDX Generator
2424
(cdxgen)](https://github.com/CycloneDX/cdxgen),
2525
[OWASP blint](https://github.com/owasp-dep-scan/blint), and
26-
[OWASP depscan](https://owasp.org/www-project-dep-scan/).
26+
[OWASP depscan](https://owasp.org/www-project-dep-scan/). <!-- truncate -->
2727

2828
While working on a different problem, Prabhu uncovered a lack of high-quality
2929
code hierarchy analysis libraries and CLI tools. atom and chen were built as

website/blog/copyleft-licensed-software-java-app/2021-01-31-copyleft-licensed-software-java-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ This document explains some key considerations for the use of Copyleft-licensed
1717

1818
For this document, “JAR” refers specifically to an executable Java library that is a collection of `.class` files packaged into a file with the `.jar` extension; it does not refer to the use of a `.jar` file as an archive file only (such as for packaging source files for a Java library).
1919

20-
The purpose of this document is to present a “conservative” interpretation of what linking, or interaction may mean in the Java context. It is not based on any particular product or application and we are not aware of any specific license compliance enforcement actions in this area.
20+
The purpose of this document is to present a “conservative” interpretation of what linking, or interaction may mean in the Java context. It is not based on any particular product or application and we are not aware of any specific license compliance enforcement actions in this area. <!-- truncate -->
2121

2222
## “Strong” Copyleft-licensed Components
2323

website/blog/curated-licenses-public-database-scancode-licensedb/2026-01-29-scancode-licensedb.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ hide_table_of_contents: false
99
The ScanCode LicenseDB is all about identifying a wide variety of licenses that are actually found in software.
1010

1111
![ScanCode-LicenseDB-2026-01](ScanCode-LicenseDB-2026-01.png)
12-
12+
<!-- truncate -->
1313
New software licenses appear constantly (like mushrooms popping out of the ground after a heavy rain) and old nearly-forgotten ones are rediscovered when someone [scans a codebase](https://www.nexb.com/scancode/) that incorporates legacy code (like finding rare medieval manuscripts in the back shelves of a library). The [ScanCode LicenseDB](https://scancode-licensedb.aboutcode.org/) precisely identifies and organizes licenses and their metadata so that multiple members of the software community can understand exactly which licenses are being referenced in project documentation.
1414

1515
If you have seen a license notice, passed it on to your legal team for scrutiny, and completed that review, then you probably do not want to repeat that process over and over again.

website/blog/non-vulnerable-dependency-resolution/2023-04-13-non-vulnerable-dependency-resolution.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Until now, these contexts have been considered as separate domains:
1818

1919
- Security tools check if resolved package versions are affected by known vulnerabilities (even when integrated in a package management tool)
2020

21-
As a result, the typical approach to get a non-vulnerable dependency tree is:
21+
As a result, the typical approach to get a non-vulnerable dependency tree is: <!-- truncate -->
2222

2323
1. Resolve a dependency tree and install the resolved package versions.
2424

website/blog/purls-of-wisdom/2023-05-03-purls-of-wisdom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Accurately identify third-party software packages with PURL.
1212

1313
If you need to generate (or consume) Software Bill of Materials (SBOMs), then you need a standardized way to communicate information about what components are in your software.
1414

15-
If you’re using or building applications, you need tools to determine if there are any known security issues with open source and third-party components.
15+
If you’re using or building applications, you need tools to determine if there are any known security issues with open source and third-party components. <!-- truncate -->
1616

1717
If you’re building tools for Software Composition Analysis (SCA) like analyzing the origin, license, security, and quality of the code across different ecosystems. You need a simple way to identify the packages used.
1818

website/blog/scancode-license-clarity-scoring/2022-10-27-scancode-license-clarity-scoring.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ When automating SCA, License Clarity Scoring helps determine if scan results req
1212

1313
When automating Software Composition Analysis (SCA) with a scanning tool, you need to quickly evaluate the results – especially to determine whether or not the results require a deeper investigation.
1414

15-
[ScanCode](https://www.nexb.com/scancode) now includes License Clarity Scoring to provide users with a confidence level regarding the automated scan results.
15+
[ScanCode](https://www.nexb.com/scancode) now includes License Clarity Scoring to provide users with a confidence level regarding the automated scan results. <!-- truncate -->
1616

1717
License Clarity is a set of criteria that indicate how clearly, comprehensively and accurately a software project has defined and communicated the licensing that applies to the project software. Note that this is not an indication of the license clarity of any software dependencies.
1818

website/blog/software-versioning/2022-11-15-software-versioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ One software version control to rule them (modern software development) all?
1212

1313
Software projects make many decisions, but one of the most critical is deciding how to implement version control (also known as revision control, source control, or source code management). With modern software development, a versioning convention is a key tool to manage software releases and revisions. The two main approaches are calendar versioning (CalVer) and semantic versioning (SemVer), often with some alterations depending on an organization’s or project’s requirements.
1414

15-
For AboutCode projects, we started with SemVer, transitioned to CalVer and then migrated back to a format that mostly resembles SemVer. This blog post details the pros and cons of each version convention, along with explaining why we embarked on this version convention journey.
15+
For AboutCode projects, we started with SemVer, transitioned to CalVer and then migrated back to a format that mostly resembles SemVer. This blog post details the pros and cons of each version convention, along with explaining why we embarked on this version convention journey. <!-- truncate -->
1616

1717
## The Fellowship of the Version Conventions
1818

website/blog/tags.yml

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,16 +18,51 @@ chen:
1818
permalink: /chen
1919
description: chen tag description
2020

21+
copyleft:
22+
label: copyleft
23+
permalink: /copyleft
24+
description: copyleft tag description
25+
2126
dependencies:
2227
label: dependencies
2328
permalink: /dependencies
2429
description: dependencies tag description
2530

31+
dual license:
32+
label: dual license
33+
permalink: /dual license
34+
description: dual license tag description
35+
36+
java:
37+
label: java
38+
permalink: /java
39+
description: java tag description
40+
41+
license clarity scoring:
42+
label: license clarity scoring
43+
permalink: /license clarity scoring
44+
description: license clarity scoring tag description
45+
46+
license compliance:
47+
label: license compliance
48+
permalink: /license compliance
49+
description: license compliance tag description
50+
51+
license detection:
52+
label: license detection
53+
permalink: /license detection
54+
description: license detection tag description
55+
2656
purl:
2757
label: PURL
2858
permalink: /PURL
2959
description: PURL tag description
3060

61+
SCA automation:
62+
label: SCA automation
63+
permalink: /SCA automation
64+
description: SCA automation tag description
65+
3166
vcio:
3267
label: vcio
3368
permalink: /vcio
@@ -38,6 +73,11 @@ vers:
3873
permalink: /VERS
3974
description: VERS tag description
4075

76+
version control:
77+
label: version control
78+
permalink: /version control
79+
description: version control tag description
80+
4181
vulnerabilities:
4282
label: vulnerabilities
4383
permalink: /vulnerabilities

website/blog/vcio-migration-announcement-aboutcode/2026-01-21-vcio-migration-announcement-aboutcode.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ The AboutCode team is planning to deprecate the V1 and V2 API of VulnerableCode
1414

1515
## Why this new API
1616

17-
The existing V1 and V2 APIs are both based on the “vulnerabilities” model, designed to aggregate information from multiple advisory sources based on identifiers and aliases. With the "vulnerabilities" model it is difficult to determine which source is correct because of the combination of sources. This may result in data from one source overwriting data from another source.
17+
The existing V1 and V2 APIs are both based on the “vulnerabilities” model, designed to aggregate information from multiple advisory sources based on identifiers and aliases. With the "vulnerabilities" model it is difficult to determine which source is correct because of the combination of sources. This may result in data from one source overwriting data from another source. <!-- truncate -->
1818

1919
---
2020

@@ -32,20 +32,20 @@ The new “advisories” model introduces an Advisory ID (AVID) for each advisor
3232

3333
We are planning to complete the following tasks by the end of January 2026:
3434

35-
- Redesigning the API and UI
36-
- Migrating our existing data sources
37-
- Documenting the V3 API and the new UI
35+
- Redesigning the API and UI
36+
- Migrating our existing data sources
37+
- Documenting the V3 API and the new UI
3838

3939
---
4040

4141
## Current Status
4242

43-
https://public2.vulnerablecode.io/v2 uses the new advisory based UI
43+
https://public2.vulnerablecode.io/v2 uses the new advisory based UI
4444
https://public2.vulnerablecode.io/api/v3/ uses new API, but it is still under development and not ready for production use.
4545

4646
---
4747

4848
## Migration Progress
4949

50-
You can track the progress of migration here:
50+
You can track the progress of migration here:
5151
https://github.com/orgs/aboutcode-org/projects/52/views/48

website/blog/what-is-a-dual-license-anyway/2023-03-14-what-is-a-dual-license-anyway.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ What does “Dual” mean in this context? In a practical sense, it means you ha
1919
- Which version of BSD?
2020
- And which version of GPL?
2121

22-
Typically, but not always, this example statement means that you have a choice of BSD-3-Clause OR GPL 2.0 or later because these are the most common versions of those licenses. As the consumer of the software project you must conclude that interpretation and choice, usually after exploring the other license notices in the project files. You must declare that choice in the attribution of your project(s) or product(s) that use that software.
22+
Typically, but not always, this example statement means that you have a choice of BSD-3-Clause OR GPL 2.0 or later because these are the most common versions of those licenses. As the consumer of the software project you must conclude that interpretation and choice, usually after exploring the other license notices in the project files. You must declare that choice in the attribution of your project(s) or product(s) that use that software. <!-- truncate -->
2323

2424
But doesn’t “Dual” mean “consisting of two parts”? Well, yes, that is true in standard English usage, but in the historical practice of many open source projects, this term is ambiguously applied. This wreaks havoc on license detection programs, and creates more busy-work for anyone wanting to use the “Dual-licensed” software.
2525

0 commit comments

Comments
 (0)