Capacity, 27
Cell phones, 142, 144
Certificate authority, 155-156, 159-160, 286-287
Challenge-response protocol, 152-154
Ciphertext. See Cryptography
C languages, 99, 101, 233, 368n12
Cleanroom, 271
Client-servers, 110-114
independent vendors and, 178-184
protocols and, 236
rich, 134-135
thin, 134-135
COBOL, 101, 232
Coexistence, 131
Cohesion, 88
Collaboration tradition, 45
Common Language Runtime (CLR), 99, 104
Common object request broker architecture (CORBA), 214, 218-219, 223
standards and, 237-238, 240, 244
Communication, 22, 202-204
application software and, 42-45
ASPs and, 180-184
independent vendors and, 178-184
layering and, 213-214
network externality and, 52-55
service providers and, 176-177
sociotechnical applications and, 46-48
software industry and, 207-209
suppliers and, 190
Community-based development, 78-81, 227
Community license, 273
Competition, 326-327
antitrust and, 296-299
resource sharing and, 338-342
Compilers, 100-104
Complimentarity, 93, 324-325
Component software
description of, 247-250
evolution of, 251-252
make vs. license decisions and, 244-247
portability and, 250-251
revolution of, 252-255
standards and, 255-260
Web services and, 260-263
Composability, 62-63, 87, 93-94
Computer Fraud and Abuse Act, 139-140, 290
Computers
as information appliance, 353-355
mobile, 357-360
Moore's law and, 26-37
overlapping phases and, 32
processors and, 21
programmability and, 23
Computing
pervasive, 355-357
suppliers and, 178-179
Confidentiality, 160-162
Congestion-induced delay, 28
Congestion pricing, 342
Consultants, 133, 174-176
Convergence, 207-209
Conway's law, 86, 172
Copying, 18-20
Copyleft license, 273, 275
Copy Protection for Removable Media (CPRM), 280-283
Copyright, 316, 326. See also Property rights
DMCA and, 283-284
expression and, 270-271
piracy and, 272-272
rights management and, 276-284
Core competencies, 219-222
Coupling, 88, 174-175
Crackers, 59, 135-136, 281. See also Security
Cramming, 29
Cryptography, 152, 154, 267
accountability and, 162-164
Arms Control Export Act and, 285-286
ciphertext, 153
confidentiality and, 160-162
digital certificates and, 155-160
digital signature and, 162-164
property rights and, 269-270
rights management and, 276-284
session key and, 162
Customers. See also Users
distribution and, 186-188 (see also Distribution)
lock-in and, 317-320
pricing and, 330-334
relationship management (CRM), 180
security and, 136-137
suppliers and, 185-188
switching costs and, 317
value chain and, 185-188