Access control, 138-139
cleanrooms and, 271
e-commerce and, 149-150
free speech and, 293-296
government and, 293-296
privilege enforcement and, 149-150
rights management and, 276-284
security and, 148 (see also Security)
software industry and, 205
Accountability, 162-164
Accounting issues, 195-196
ActiveX, 104, 322
Ada, 236
Admission control, 341
Adobe Acrobat, 186, 333
Aggregation services, 141, 144-145
Agile development, 81-82
Algorithms, 94
Content Scrambling System and, 295-296
decryption, 153
source code, 100-104, 225, 244-247, 267-284
tradition of, 43, 46
Anonymity. See Privacy
Antitrust, 296-299
Appliances, 187, 321, 353-355
Application programming interfaces (APIs), 9, 231-232, 362
antitrust and, 298-299
bundling and, 190
core competencies and, 219-222
distribution and, 95-96
diversity and, 201-202
extension and, 91-92
modularity and, 90-92
portability and, 98-100
software industry and, 201-202
standards and, 235-238 (see also Standards)
suppliers and, 190
Application service providers, 176-177
suppliers and, 180-184
Application software, 64-65. See also Software; Software industry
composability and, 62-63
conceptualizing new, 48-49
cost and, 62
diversity and, 48
extensibility and, 60-61
federation of applications and, 60-61
flexibility and, 60-61
functionality and, 55-57
handcrafting and, 63
heterogeneity and, 46
industry-specific, 191-193
infrastructure and, 95-96
learnability and, 58
legacy and, 60-61
Moore's law and, 41
networks and, 42-44, 52-55
pay-per-use and, 190-191
performance and, 57
privacy and, 59-60
productivity and, 50-51
satisfaction-driven programs and, 61-62
security and, 57-58
sociotechnical, 46-48
subscriptions and, 190-191
suppliers and, 175
traditions in, 42-45
user types and, 45-46
value and, 49-63
Architecture, 84, 130. See also Software creation
administration and, 110-112
Brooks' law and, 85
client-server, 110-114
competition and, 228-229
composability and, 93-94
Conway's law and, 86
CORBA, 214, 218-219, 223, 237-238, 244
core competencies and, 219-222
development and, 70-82
divide and conquer approach, 71, 73
emergence and, 92-93
heterogeneity and, 207-219, 222-229
hierarchical decomposition and, 89-90
independent vendors and, 178-184
layering and, 207-219
modularity and, 87-90 (see also Modularity)
need for, 85-87
open systems and, 320-322
peer-to-peer, 110-114, 178-184, 243-244, 259-260
performance and, 110-112
pricing and, 188-193
product line, 245
reference, 255
role of, 87
of software industry, 199-229 (see also Software industry)
spiral model and, 74-76
suppliers and, 171-177
waterfall model and, 70-83
Arms Control Export Act, 285-286
Assets. See Economic issues
Atomic actions, 90-92
Authentication, 150-151
challenge-respond protocol, 152-154
cryptographic keys and, 152
digital certificates and, 155-160
passwords and, 152
smartcards and, 152
Automation, 47-48