Index_S


S

Satisfaction-driven programs, 61-62, 81-82

Scale-out, 340-341, 366n11

Scale-up, 340-341

Scaling, 20, 323-324

economic issues and, 339-342

Moore's law and, 34-36

slowed technological advance and, 352

Search engines, 45, 185, 227

Secure socket layer (SSL), 160, 162

Security, 121, 131. See also Privacy

access control and, 138-139, 149-150

accountability and, 162-164

application software and, 57-59

authentication and, 150-154

challenge of, 147-148

challenge-respond protocol, 152-154

Computer Fraud and Abuse Act, 139-140

confidentiality and, 160-162

cryptography and, 153-154, 160-162 (see also Cryptography)

DBMS and, 136-137

denial-of-service attacks and, 289-290

digital certificate and, 155-160, 164-165, 286-287

digital signature and, 104-105, 162-164

distributed software and, 111

execution trust and, 104-105

firewalls and, 137-138

government and, 285-291

hardware and, 138-139

law enforcement and, 135-136, 139

management and, 135-140, 145-166

national, 285-288

networks and, 111

passwords and, 136, 152

PKI and, 160

policies, 138

session key and, 162

shared secret and, 156-160

smartcards and, 152

as sociotechnical system, 164-165

SSL, 160, 162

usability and, 59

worms, 289

Sensors, 14-15

Service level agreement (SLA), 337

Service providers, 176-177, 209

rights management and, 276-284

Session key, 162

Shared secret, 156-160

Shared source model, 81

Shareware, 273

Smartcards, 152, 287-288

Social issues, 4

application software and, 46-48

management and, 135-145

morals and, 6-7

privacy and, 140-145 (see also Privacy)

security and, 135-140, 145-166 (see also Security)

software creation and, 5-6

Software, xi

application, 25, 51-52 (see also Application software)

architecture of, 84-94, 171-172

categories of, 26

complexity of, 6

component, 244-263

defects in, 56

development, 70-82

distinguishing characteristics of, 23-24

distributed, 106-117, 186-188 (see also Distribution)

downloading of, 186-188

economic issues and, 2-3, 309-349 (see also Economic issues)

embedded, 25, 355-357

fidelity and, 55-57

freeware, 272-273

functionality and, 55-57

future and, 351-363

government and, 267-308

importance of, 3-4

improvement of, 4-5

independent vendors and, 178-184

information content and, 365n7

infrastructure, 25

interactivity of, 3

internal-use, 195-196

learnability and, 58

management and, 121-169 (see also Management)

materialism and, 344-346

Moore's law and, 26-37

moral issues and, 6-7

multiple use and, 342-343

patches, 127, 130

performance and, 57

plug-and-play, 321

portability and, 98-100

pricing and, 188-193, 327-338, 342

processors and, 94

provisioning of, 129-133

release, 127

shareware, 273

social nature of, 5-6

superiority of, 23-24

support, 126-129, 133

upgrades, 73, 127-129, 272, 319, 336-337

value chain and, 122-133

versioning and, 127-129, 333-334

Software creation, 10, 121

agile development and, 81-82

architecture and, 84-94

Brooks' law and, 85

collective welfare and, 69

community-based development and, 78-81

compilation and, 100-104

conceptualization and, 48-49

Conway's law and, 86

efficiency and, 76-78

environment and, 96-97

interpretation and, 100-104

iterative development and, 73-76

marketplace and, 69

operating system and, 105-106

organization and, 69-84

platforms and, 96-97

portability and, 98-100

pricing and, 188-193

program distribution/execution and, 94-117

programming and, 67

sequential development and, 70-73

spiral model and, 74-76

success in, 68-69

users and, 68-69, 83-84

value chain and, 122-133

waterfall model and, 70-83

Software industry, 12, 118-119, 264-265

access control and, 205

APIs and, 200-204, 231-232

bundling and, 203

change in, xiii, 5

competition and, 228-229

complexity of, xi-xii

component software and, 244-263

consultants and, 174-176

convergence and, 207-209

cooperation in, 229-244

core competencies and, 219-222

economic issues and, 29, 309-349 (see also Economic issues)

expectation fulfillment and, 36-37

growth of, 361-363

horizontal heterogeneity and, 222-227

impact of, 1-5

IT and, 13-38 (see also Information technology (IT))

layering and, 207-219

lock-in and, 317-320

Moore's law and, 26-37

organization and, 199-229

pricing and, 327-338

standards and, 232-244

suppliers and, 230 (see also Suppliers)

versioning and, 333-334

vertical heterogeneity and, 207-219

SONET (synchronous optical network), 208

Source code, 100-104, 225

licensing and, 244-247, 272-276

property rights and, 267-284 (see also Property rights)

Spanning layer, 211-212, 229

Specification-driven programs, 61-62

Spiral model, 74-76

Sprint, 181

Stakeholders, 74-76

Standards, 10, 218

APIs and, 237-238

component software and, 255-260

copy protection and, 267-284

CORBA and, 214, 223, 237-238, 240, 244

emergence of, 235-238

escrowed encryption, 286-288

Hayes command set and, 235-236

interfaces and, 90-92

Internet and, 238

ISO and, 232-233

LANs and, 109-110

MIME and, 223, 372n5

minimizing role of, 241-244

open, 232-233

process evolution of, 238-240

reason for, 233-235

regeneration and, 18-20

XML and, 225

StarOffice, 62

Statistical multiplexing, 339

Storage, 21

application software and, 42-45

hardware and, 22-23

Internet and, 42-44, 224-225

layering and, 207-209

Moore's law and, 32, 34

smartcards and, 152

sociotechnical applications and, 46-48

software creation and, 68-69

suppliers and, 176-177

transfer rates and, 366n15

Subscriptions, 190-191

Superdistribution model, 191, 325

Suppliers, 197. See also Software industry

accounting issues and, 195-196

application software and, 175

architecture and, 171-173, 176-177

ASP, 180-184

bundling and, 334-336

consultants and, 174-176

customer types and, 185

division of labor and, 173

economic issues and, 323-327 (see also Economic issues)

ERP, 180

function composition/decomposition and, 173-184

government and, 299-300 (see also Government)

independent vendors and, 178-184

industry-specific applications and, 191-193

information content, 177

infrastructure for, 175, 194-195

intermediary exchange and, 225-227

lock-in and, 317-320

modularity and, 172-174

security and, 135-140, 145-166 (see also Security)

support and, 127-129

systems and, 172

user relationships and, 230

Supply value chain. See Value chain

SurfWax, 185

Switching costs, 317

Symmetric encryption, 161-162

Systems. See also Distribution

administration, 133

authentication and, 150-154

BIOS, 25-26

bottlenecks and, 33

copying and, 18-20

DBMS, 44-45

economic issues and, 320-322

FAT32 files and, 237-238

integrators and, 133

management, 133

Moore's law and, 26-37

multitasking and, 105-106

network effects and, 52-55

open vs. closed, 320-322

operating, 105-106

property rights and, 267-284 (see also Property rights)

qualities and, 87

recommender, 20

regeneration and, 18-20

rights management and, 276-284

security and, 135-140, 145-166, 164-165 (see also Security)

software creation and, 105-106

suppliers and, 172

traditions in, 42-45




Software Ecosystems(c) Understanding an Indispensable Technology and Industry
Software Ecosystem: Understanding an Indispensable Technology and Industry
ISBN: 0262633310
EAN: 2147483647
Year: 2005
Pages: 145

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net