Satisfaction-driven programs, 61-62, 81-82
Scale-out, 340-341, 366n11
Scale-up, 340-341
Scaling, 20, 323-324
economic issues and, 339-342
Moore's law and, 34-36
slowed technological advance and, 352
Search engines, 45, 185, 227
Secure socket layer (SSL), 160, 162
Security, 121, 131. See also Privacy
access control and, 138-139, 149-150
accountability and, 162-164
application software and, 57-59
authentication and, 150-154
challenge of, 147-148
challenge-respond protocol, 152-154
Computer Fraud and Abuse Act, 139-140
confidentiality and, 160-162
cryptography and, 153-154, 160-162 (see also Cryptography)
DBMS and, 136-137
denial-of-service attacks and, 289-290
digital certificate and, 155-160, 164-165, 286-287
digital signature and, 104-105, 162-164
distributed software and, 111
execution trust and, 104-105
firewalls and, 137-138
government and, 285-291
hardware and, 138-139
law enforcement and, 135-136, 139
management and, 135-140, 145-166
national, 285-288
networks and, 111
passwords and, 136, 152
PKI and, 160
policies, 138
session key and, 162
shared secret and, 156-160
smartcards and, 152
as sociotechnical system, 164-165
SSL, 160, 162
usability and, 59
worms, 289
Sensors, 14-15
Service level agreement (SLA), 337
Service providers, 176-177, 209
rights management and, 276-284
Session key, 162
Shared secret, 156-160
Shared source model, 81
Shareware, 273
Smartcards, 152, 287-288
Social issues, 4
application software and, 46-48
management and, 135-145
morals and, 6-7
privacy and, 140-145 (see also Privacy)
security and, 135-140, 145-166 (see also Security)
software creation and, 5-6
Software, xi
application, 25, 51-52 (see also Application software)
architecture of, 84-94, 171-172
categories of, 26
complexity of, 6
component, 244-263
defects in, 56
development, 70-82
distinguishing characteristics of, 23-24
distributed, 106-117, 186-188 (see also Distribution)
downloading of, 186-188
economic issues and, 2-3, 309-349 (see also Economic issues)
embedded, 25, 355-357
fidelity and, 55-57
freeware, 272-273
functionality and, 55-57
future and, 351-363
government and, 267-308
importance of, 3-4
improvement of, 4-5
independent vendors and, 178-184
information content and, 365n7
infrastructure, 25
interactivity of, 3
internal-use, 195-196
learnability and, 58
management and, 121-169 (see also Management)
materialism and, 344-346
Moore's law and, 26-37
moral issues and, 6-7
multiple use and, 342-343
patches, 127, 130
performance and, 57
plug-and-play, 321
portability and, 98-100
pricing and, 188-193, 327-338, 342
processors and, 94
provisioning of, 129-133
release, 127
shareware, 273
social nature of, 5-6
superiority of, 23-24
support, 126-129, 133
upgrades, 73, 127-129, 272, 319, 336-337
value chain and, 122-133
versioning and, 127-129, 333-334
Software creation, 10, 121
agile development and, 81-82
architecture and, 84-94
Brooks' law and, 85
collective welfare and, 69
community-based development and, 78-81
compilation and, 100-104
conceptualization and, 48-49
Conway's law and, 86
efficiency and, 76-78
environment and, 96-97
interpretation and, 100-104
iterative development and, 73-76
marketplace and, 69
operating system and, 105-106
organization and, 69-84
platforms and, 96-97
portability and, 98-100
pricing and, 188-193
program distribution/execution and, 94-117
programming and, 67
sequential development and, 70-73
spiral model and, 74-76
success in, 68-69
users and, 68-69, 83-84
value chain and, 122-133
waterfall model and, 70-83
Software industry, 12, 118-119, 264-265
access control and, 205
APIs and, 200-204, 231-232
bundling and, 203
change in, xiii, 5
competition and, 228-229
complexity of, xi-xii
component software and, 244-263
consultants and, 174-176
convergence and, 207-209
cooperation in, 229-244
core competencies and, 219-222
economic issues and, 29, 309-349 (see also Economic issues)
expectation fulfillment and, 36-37
growth of, 361-363
horizontal heterogeneity and, 222-227
impact of, 1-5
IT and, 13-38 (see also Information technology (IT))
layering and, 207-219
lock-in and, 317-320
Moore's law and, 26-37
organization and, 199-229
pricing and, 327-338
standards and, 232-244
suppliers and, 230 (see also Suppliers)
versioning and, 333-334
vertical heterogeneity and, 207-219
SONET (synchronous optical network), 208
Source code, 100-104, 225
licensing and, 244-247, 272-276
property rights and, 267-284 (see also Property rights)
Spanning layer, 211-212, 229
Specification-driven programs, 61-62
Spiral model, 74-76
Sprint, 181
Stakeholders, 74-76
Standards, 10, 218
APIs and, 237-238
component software and, 255-260
copy protection and, 267-284
CORBA and, 214, 223, 237-238, 240, 244
emergence of, 235-238
escrowed encryption, 286-288
Hayes command set and, 235-236
interfaces and, 90-92
Internet and, 238
ISO and, 232-233
LANs and, 109-110
MIME and, 223, 372n5
minimizing role of, 241-244
open, 232-233
process evolution of, 238-240
reason for, 233-235
regeneration and, 18-20
XML and, 225
StarOffice, 62
Statistical multiplexing, 339
Storage, 21
application software and, 42-45
hardware and, 22-23
Internet and, 42-44, 224-225
layering and, 207-209
Moore's law and, 32, 34
smartcards and, 152
sociotechnical applications and, 46-48
software creation and, 68-69
suppliers and, 176-177
transfer rates and, 366n15
Subscriptions, 190-191
Superdistribution model, 191, 325
Suppliers, 197. See also Software industry
accounting issues and, 195-196
application software and, 175
architecture and, 171-173, 176-177
ASP, 180-184
bundling and, 334-336
consultants and, 174-176
customer types and, 185
division of labor and, 173
economic issues and, 323-327 (see also Economic issues)
ERP, 180
function composition/decomposition and, 173-184
government and, 299-300 (see also Government)
independent vendors and, 178-184
industry-specific applications and, 191-193
information content, 177
infrastructure for, 175, 194-195
intermediary exchange and, 225-227
lock-in and, 317-320
modularity and, 172-174
security and, 135-140, 145-166 (see also Security)
support and, 127-129
systems and, 172
user relationships and, 230
Supply value chain. See Value chain
SurfWax, 185
Switching costs, 317
Symmetric encryption, 161-162
Systems. See also Distribution
administration, 133
authentication and, 150-154
BIOS, 25-26
bottlenecks and, 33
copying and, 18-20
DBMS, 44-45
economic issues and, 320-322
FAT32 files and, 237-238
integrators and, 133
management, 133
Moore's law and, 26-37
multitasking and, 105-106
network effects and, 52-55
open vs. closed, 320-322
operating, 105-106
property rights and, 267-284 (see also Property rights)
qualities and, 87
recommender, 20
regeneration and, 18-20
rights management and, 276-284
security and, 135-140, 145-166, 164-165 (see also Security)
software creation and, 105-106
suppliers and, 172
traditions in, 42-45