Passwords, 136, 152
Pasteur's quadrant, 303
Patches, 127, 130
Patents, 268-270
Path-dependent effects, 206
Pay-per-use, 190-191
Peer-to-peer architecture, 110-114
frameworks and, 259-260
independent vendors and, 178-184
standards and, 243-244
Perceived defects, 56
Performance, 57-58, 129
architecture and, 110-114
metrics, 26-30
online optimizer and, 368n15
software architecture and, 110-112
Personal digital assistants (PDAs), 142, 353, 357
Personal identity, 141-145
Personal video recorder (PVR), 187, 190-191, 353
Pervasive computing, 355-357
Phases, 74
Piracy, 20, 271-272. See also Property rights
Pixels, 15-17
PL/1, 232
Plaintext, 153
Platform for Privacy Preferences (P3P), 144-145, 292
Platforms, 96-97, 200. See also Networks
compilation and, 100-104
Content Scrambling System and, 295-296
distributed software and, 106-117
frameworks and, 255-260
industry cooperation and, 229-244
layering and, 222-223
portability and, 98-100
rights management and, 276-284
suppliers and, 194-195
Web services and, 260-263
Plug-and-play software, 321, 356-357
Pornography, 294-295
Portability, 98-100
component software and, 250-251
information appliances and, 353-355
mobility and, 357-360
virtual machine and, 211-212
Postscript, 242
Pricing, 331, 338
bundling and, 334-335
customer-based, 330-334
discrimination and, 331
individualized, 330-334
revenue spreading and, 327-330
terms/conditions and, 336-337
value chain and, 188-193
versioning and, 333-334
Privacy, 10-11, 131
anonymity and, 141-145
application software and, 59-60
confidentiality and, 160-162
control of, 141-142
digital certificates and, 155-160
e-commerce and, 142-143
e-mail and, 141-143
GLB and, 60
government and, 291-293
management and, 140-145
P3P and, 144-145
shared secret and, 156-160
SSL, 160, 162
Processing, 21-22
algorithmic tradition and, 43, 46
application software and, 42-45
collaboration tradition and, 45
database tradition and, 44
document tradition and, 43-44, 46
networks and, 52-55, 115-117
OTP, 44
publication tradition, 44-45
sociotechnical applications and, 46-48
Processors, 21, 94
Productivity, 50-51
Product line architecture, 245
Program manager, 82
Programming, 23, 67-68, 367n2
Project efficiency, 76-78
Proof-carrying code, 369n17
Property rights
copyright and, 270-272, 276-284, 316, 326
floating license and, 55
government and, 267-284
licensing and, 272-275
patents and, 268-270
rights management and, 276-284
trademarks and, 275-276
trade secrets and, 268-270
Proprietary solutions, 320-322
Protocols, 90-92
challenge-response, 152-154
client-servers and, 236
HTTP, 211, 236
Internet (IP), 109, 210-213, 217-218, 233
IIOP, 211
Internet and, 210-213, 217-218
RTP, 211-213
TCP, 210-213, 218
UDP, 210-213, 233
Provisioning, 123, 129-133
core competencies and, 219-222
government and, 299-300
lock-in and, 317-320
overprovisioning and, 341-342
self, 187
Web services and, 260-263
Publication tradition, 44-45
Public key infrastructure (PKI), 160