Articles the Host’S Dilemma: Strategic Forfeiture in Platform Markets for Informational Goods

Total Page:16

File Type:pdf, Size:1020Kb

Articles the Host’S Dilemma: Strategic Forfeiture in Platform Markets for Informational Goods ARTICLES THE HOST’S DILEMMA: STRATEGIC FORFEITURE IN PLATFORM MARKETS FOR INFORMATIONAL GOODS Jonathan M. Barnett CONTENTS I. VOLUNTARY FORFEITURE: A TYPICAL PRACTICE ....................................................... 1869 A. Bell Labs: Open Licensing ................................................................................................ 1870 B. Microsoft: Application Programming Interfaces ........................................................... 1872 II. VOLUNTARY FORFEITURE: A RATIONAL PRACTICE .................................................. 1874 A. Some Economics of Platform Markets ............................................................................ 1875 B. The Double Commitment Problem .................................................................................. 1878 1. The Intertemporal Dilemma ........................................................................................ 1878 2. The Host’s Dilemma ..................................................................................................... 1879 (a) The Simple Case .................................................................................................... 1879 (b) The Complex Case ................................................................................................ 1881 C. Solutions to the Host’s Dilemma ..................................................................................... 1884 1. Contract ......................................................................................................................... 1884 2. Integration ..................................................................................................................... 1885 3. Forfeiture ....................................................................................................................... 1887 (a) Simple Forfeiture ................................................................................................... 1887 (b) Complex Forfeiture ............................................................................................... 1888 III. ORGANIZATIONAL CONVERGENCE IN OPERATING SYSTEMS MARKETS .......... 1890 A. Old Models ......................................................................................................................... 1891 1. The Unix Model: Software as a Mostly Open Platform .......................................... 1891 2. The Windows Model: Software as Semi-Closed Platform ....................................... 1892 B. New Models ....................................................................................................................... 1893 1. The Open Source Model: Software as Semi-Open Platform ................................... 1893 (a) Credible Commitment Through Controlled Forfeiture .................................... 1896 (i) Contractual Giveaways .................................................................................... 1896 (ii) Community Norms .......................................................................................... 1898 (iii) Foundation Entity .......................................................................................... 1899 (b) Funding Controlled Forfeiture (or, Is Linux a Subsidiary of IBM?).............. 1906 2. The Nokia/Google Model: Software as Semi-Open Platform .................................. 1913 (a) Nokia’s Gifts (and Regrets) .................................................................................. 1914 (b) Nonprofit Organization as Strategic Choice ...................................................... 1920 1861 1862 HARVARD LAW REVIEW [Vol. 124:1861 IV. IMPLICATIONS: WHAT’S SO GOOD ABOUT “FREE”? ................................................... 1925 A. The Indifference Baseline ................................................................................................. 1927 B. The Case for Closed Models ............................................................................................. 1929 C. The Case for Open Models ............................................................................................... 1932 CONCLUSION ............................................................................................................................... 1934 APPENDIX: FOUNDATION DOCUMENTS ............................................................................... 1936 THE HOST’S DILEMMA: STRATEGIC FORFEITURE IN PLATFORM MARKETS FOR INFORMATIONAL GOODS ∗ Jonathan M. Barnett Voluntary forfeiture of intellectual assets — often, exceptionally valuable assets — is surprisingly widespread in information technology markets. A simple economic rationale can account for these practices. By giving away access to core technologies, a platform holder commits against expropriating (and thereby induces) user investments that support platform value. To generate revenues that cover development and maintenance costs, the platform holder must regulate access to other goods and services within the total consumption bundle. The trade-off between forfeiting access (to induce adoption) and regulating access (to recover costs) anticipates the substantial convergence of open and closed innovation models. Organizational patterns in certain software and operating system markets are consistent with this hypothesis: open and closed structures substantially converge across a broad range of historical and contemporary settings and commercial and noncommercial environments. In particular, this Article shows that (i) contrary to standard characterizations in the legal literature, leading “open source” software projects are now primarily funded and substantially governed and staffed by corporate sponsors, and (ii) proprietary firms have formed nonprofit consortia and other cooperative arrangements and adopted “open source” licensing strategies in order to develop operating systems for the smartphone market. n June 2008, Nokia paid $410 million to buy out all other ownership Iinterests in the Symbian operating system,1 which was then the most widely used operating system in smartphone devices2 worldwide.3 That would be a fairly mundane corporate acquisition if it were not for the fact that Nokia immediately transferred responsibilities for managing, developing, and distributing the operating system to the ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– ∗ Associate Professor, University of Southern California Gould School of Law. I am grateful for comments from Peter Siegelman and other participants at a faculty workshop at the Universi- ty of Connecticut School of Law, the Colloquium on Innovation Policy at NYU School of Law, the 2010 Annual Intellectual Property Scholars Conference at the University of California, Berke- ley, School of Law, and the Law and Innovation Symposium at the University of Southern Cali- fornia Gould School of Law. Jinmin Chen, Daniel Fullerton, Blake Horn, Kawon Lee, and Ingrid Newquist provided excellent research assistance. This project was supported by a grant from the Southern California Innovation Project, which is funded by the Ewing Marion Kauffman Foun- dation. All errors are mine. 1 J. Nicholas Hoover & Paul McDougall, Nokia’s Symbian Deal Rewrites the Smartphone Rules, INFORMATIONWEEK, June 30, 2008, at 18, 18. 2 While there is no standard industry definition, a “smartphone” can be understood to refer to a mobile phone with advanced capabilities (such as email and internet access) that resemble some of the functions of a personal computer. 3 Until recently, Nokia’s Symbian system was the clear market leader in the smartphone op- erating system market, on a worldwide basis. As discussed subsequently, stiff competition, in par- ticular from Google’s Android system, has challenged its lead. For detailed information on mar- ket share, see infra Figure 3, p. 1918. 1863 1864 HARVARD LAW REVIEW [Vol. 124:1861 Symbian Foundation, a nonprofit entity.4 Even that transfer might be construed as a large but similarly unexceptional act of corporate lar- gesse if it were not for the fact that Nokia, the world’s leading handset maker,5 invited telecommunications providers, handset makers, and other firms that compete with it to serve on the Foundation’s board and other governing entities.6 To cap off what was an exceptional se- quence of events, the Foundation then spent two years clearing all third-party rights in the Symbian source code,7 which it made publicly available in February 2010 without charge under an “open source” li- cense.8 Even more surprisingly, however, this exceptional giveaway ultimately turns out to be fairly unexceptional. From the inception of the information and communication technology (ICT) industry, some of the most dominant firms have regularly ceded — that is, given away or distributed at nominal or below-market fees — some of their most valuable innovations to all interested parties, including customers and rivals. Examples include some of the industry’s most important inno- vations: to name just a few, AT&T’s forfeiture of transistor technology in the 1950s,9 Xerox’s forfeiture of Ethernet local area network tech- nology in 1979,10 and Intel’s release of the Universal Serial Bus (USB) standard in 1995.11 Dominant firms have developed some of the most fundamental building blocks of the digital economy at great cost and then have given away or distributed those innovations at a nominal or below-market fee, often accompanied by complementary support ser- vices and tools. The substantial incidence and magnitude of
Recommended publications
  • Solaris 2.5 Software Developer Kit Introduction
    Solaris 2.5 Software Developer Kit Introduction 2550 Garcia Avenue Mountain View, CA 94043 U.S.A. A Sun Microsystems, Inc. Business 1995 Sun Microsystems, Inc. 2550 Garcia Avenue, Mountain View, California 94043-1100 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Portions of this product may be derived from the UNIX® system, licensed from UNIX Systems Laboratories, Inc., a wholly owned subsidiary of Novell, Inc., and from the Berkeley 4.3 BSD system, licensed from the University of California. Third-party software, including font technology in this product, is protected by copyright and licensed from Sun’s Suppliers. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. The product described in this manual may be protected by one or more U.S. patents, foreign patents, or pending applications. TRADEMARKS Sun, Sun Microsystems, the Sun logo, SunSoft, the SunSoft logo, Solaris, SunOS, OpenWindows, DeskSet, ONC, ONC+, NFS, SunExpress, ProCompiler, XView, ToolTalk, XGL, XIL, Solaris VISUAL, Solaris PEX, and AnswerBook are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. CatalystSM is a service mark of Sun Microsystems, Inc.
    [Show full text]
  • Open Source Projects As Incubators of Innovation
    RESEARCH CONTRIBUTIONS TO ORGANIZATIONAL SOCIOLOGY AND INNOVATION STUDIES / STUTTGARTER BEITRÄGE ZUR ORGANISATIONS- UND INNOVATIONSSOZIOLOGIE SOI Discussion Paper 2017-03 Open Source Projects as Incubators of Innovation From Niche Phenomenon to Integral Part of the Software Industry Jan-Felix Schrape Institute for Social Sciences Organizational Sociology and Innovation Studies Jan-Felix Schrape Open Source Projects as Incubators of Innovation. From Niche Phenomenon to Integral Part of the Software Industry. SOI Discussion Paper 2017-03 University of Stuttgart Institute for Social Sciences Department of Organizational Sociology and Innovation Studies Seidenstr. 36 D-70174 Stuttgart Editor Prof. Dr. Ulrich Dolata Tel.: +49 711 / 685-81001 [email protected] Managing Editor Dr. Jan-Felix Schrape Tel.: +49 711 / 685-81004 [email protected] Research Contributions to Organizational Sociology and Innovation Studies Discussion Paper 2017-03 (May 2017) ISSN 2191-4990 © 2017 by the author(s) Jan-Felix Schrape is senior researcher at the Department of Organizational Sociology and Innovation Studies, University of Stuttgart (Germany). [email protected] Additional downloads from the Department of Organizational Sociology and Innovation Studies at the Institute for Social Sciences (University of Stuttgart) are filed under: http://www.uni-stuttgart.de/soz/oi/publikationen/ Abstract Over the last 20 years, open source development has become an integral part of the software industry and a key component of the innovation strategies of all major IT providers. Against this backdrop, this paper seeks to develop a systematic overview of open source communities and their socio-economic contexts. I begin with a recon- struction of the genesis of open source software projects and their changing relation- ships to established IT companies.
    [Show full text]
  • MINCS - the Container in the Shell (Script)
    MINCS - The Container in the Shell (script) - Masami Hiramatsu <[email protected]> Tech Lead, Linaro Ltd. Open Source Summit Japan 2017 LEADING COLLABORATION IN THE ARM ECOSYSTEM Who am I... Masami Hiramatsu - Linux kernel kprobes maintainer - Working for Linaro as a Tech Lead LEADING COLLABORATION IN THE ARM ECOSYSTEM Demo # minc top # minc -r /opt/debian/x86_64 # minc -r /opt/debian/arm64 --arch arm64 LEADING COLLABORATION IN THE ARM ECOSYSTEM What Is MINCS? My Personal Fun Project to learn how linux containers work :-) LEADING COLLABORATION IN THE ARM ECOSYSTEM What Is MINCS? Mini Container Shell Scripts (pronounced ‘minks’) - Container engine implementation using POSIX shell scripts - It is small (~60KB, ~2KLOC) (~20KB in minimum) - It can run on busybox - No architecture dependency (* except for qemu/um mode) - No need for special binaries (* except for libcap, just for capsh --exec) - Main Features - Namespaces (Mount, PID, User, UTS, Net*) - Cgroups (CPU, Memory) - Capabilities - Overlay filesystem - Qemu cross-arch/system emulation - User-mode-linux - Image importing from dockerhub And all are done by CLI commands :-) LEADING COLLABORATION IN THE ARM ECOSYSTEM Why Shell Script? That is my favorite language :-) - Easy to understand for *nix administrators - Just a bunch of commands - Easy to modify - Good for prototyping - Easy to deploy - No architecture dependencies - Very small - Able to run on busybox (+ libcap is perfect) LEADING COLLABORATION IN THE ARM ECOSYSTEM MINCS Use-Cases For Learning - Understand how containers work For Development - Prepare isolated (cross-)build environment For Testing - Test new applications in isolated environment - Test new kernel features on qemu using local tools For products? - Maybe good for embedded devices which has small resources LEADING COLLABORATION IN THE ARM ECOSYSTEM What Is A Linux Container? There are many linux container engines - Docker, LXC, rkt, runc, ..
    [Show full text]
  • LVC20-108 Arm64 Linux Kernel Architecture Update
    Arm64 Linux Kernel architecture update Matteo Carlini Director, Software Technology Management Arm – Open Source Software A-profile Architecture new feature names! https://developer.arm.com/architectures/cpu-architecture/a-profile/exploration-tools/feature-names-for-a-profile A-profile features: arm64 kernel support table https://developer.arm.com/tools-and-software/open-source-software/linux-kernel/architecture-and-kvm-enablement A-class architecture kernel enablement – Mar 20 TTS2UXN A64ISA AA32HPD PAUTH CNTS PMU S2FW FHM TTPBHA C B Trace LSE LSE IESB LSMAOC Debug SHA PMU RDMA CompNum JSconv S-EL2 SM SM TTCNP TTST VMID16 HPD v8.3 DIT SHA UAO v8.1 v8.2 RAS v8.4 IDST RCPC CCIDX DotProd ATS1E1 LOR VHE DFE CondM TTRe NV RCPC RAS LP16 m PAN TTHM MPAM AMU TTL NV Debug LVA TLBI VPIPT LPA DCPOP EVT DoPD GTG ECV MTPMU ETS SVE2 SPE SpecRest MPAM CTSS PMU PredInv PAuth2/ Future FGT FPAC architectures v8.0 RNG BT v8.5 v8.6 F64MM DGH DCCVADP MemTag Enablement complete TME EOPD CSEH F32MM TWED Enablement ongoing Enablement TBD SB CMODX I8MM BF16 FRINT CondM AMU N/A – no Kernel impact A-class architecture kernel enablement – Today TTS2UXN A64ISA AA32HPD PAUTH PMU FHM TTPBHA CNTSC S2FWB S-EL2 LSE LSE IESB LSMAOC TTST SHA PMU RDMA CompNum JSconv RAS SM SM TTCNP VMID16 HPD v8.3 DFE DIT SHA UAO TTRem v8.4 v8.1 v8.2 IDST RCPC CCIDX DotProd ATS1E1 LOR VHE Trace CondM NV Debug RCPC RAS LP16 PAN TTHM MPAM AMU Debug LVA NV TLBI TTL VPIPT LPA DCPOP GTG SPE SpecRest ECV MTPMU ETS SVE2 PMU PredInv MPAM CTSS RNG MemTag PAuth2/ Future FGT FPAC architectures v8.0
    [Show full text]
  • FLOSS Final Report – Part 3 Free/Libre Open Source Software: Survey and Study
    FLOSS Final Report – Part 3 Free/Libre Open Source Software: Survey and Study Basics of Open Source Software Markets and Business Models Berlin, July 2002 3 BERLECON RESEARCH GmbH Oranienburger Str. 32 10117 Berlin Tel.: +49 30 285296-0 Fax: +49 30 285296-29 Web: http://www.berlecon.de Email: [email protected] Acknowledgements: This work was prepared by Dorit Spiller and Thorsten Wichmann from Berlecon Research. It is part of the final report for the project „FLOSS – Free/Libre Open Source Software: Survey and Study“, which was financed under the European Com- mission‘s IST programme, key action 4 as accompanying measure (IST-2000-4.1.1). Disclaimer: The views expressed in this report are those of the authors and do not necessarily re- flect those of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use that might be made of the following information. Nothing in this report implies or expresses a warranty of any kind. Results from this report should only be used as guidelines as part of an overall strategy. For detailed ad- vice on corporate planning, business processes and management, technology integra- tion and legal or tax issues, the services of a professional should be obtained. Names and trademarks mentioned in the report are the property of their respective owners. © 2002 by Berlecon Research GmbH. 4 V 1.1 - 020905 © 2002 by Berlecon Research GmbH. 5 Table of contents 1 Introduction....................................................................................................... 9 2 Software and the Open Source phenomenon.................................................... 11 2.1 The Open Source phenomenon .................................................................
    [Show full text]
  • Installing Mac OS X Developer Preview 2
    LL0113.Book Page 1 Tuesday, October 12, 1999 1:09 PM Installing Mac OS X Developer Preview 2 LL0113.Book Page 2 Tuesday, October 12, 1999 1:09 PM K Apple Computer, Inc. © 1999 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of Apple. Your rights to the software are governed by the accompanying software license agreement. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Every effort has been made to ensure that the information in this manual is accurate. Apple is not responsible for printing or clerical errors. Apple Computer, Inc. 1 Infinite Loop Cupertino, CA 95014-2084 408-996-1010 http://www.apple.com Apple, the Apple logo, AppleTalk, AppleVision, FireWire, Mac, Macintosh, PowerBook, and Power Macintosh are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. Disk First Aid, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. PostScript is a trademark of Adobe Systems, Inc. OpenGL is a registered trademark of Silicon Graphics, Inc. Other company and product names mentioned herein are trademarks of their respective companies. Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the performance or use of these products.
    [Show full text]
  • The Implications of Incumbent Intellectual Property
    THE IMPLICATIONS OF INCUMBENT INTELLECTUAL PROPERTY STRATEGIES FOR OPEN SOURCE SOFTWARE SUCCESS AND COMMERCIALIZATION A Dissertation Presented to The Academic Faculty by Wen Wen In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the School of College of Management Georgia Institute of Technology August 2012 THE IMPLICATIONS OF INCUMBENT INTELLECTUAL PROPERTY STRATEGIES FOR OPEN SOURCE SOFTWARE SUCCESS AND COMMERCIALIZATION Approved by: Dr. Chris Forman, Advisor Dr. Sandra Slaughter College of Management College of Management Georgia Institute of Technology Georgia Institute of Technology Dr. Marco Ceccagnoli Dr. D.J. Wu College of Management College of Management Georgia Institute of Technology Georgia Institute of Technology Dr. Dan Breznitz Dr. Ram Chellappa College of Management Goizueta Business School Georgia Institute of Technology Emory Unive rsity Date Approved: June 18, 2012 To Mom, Dad, and Xihao ACKNOWLEDGEMENTS First of all, I sincerely thank Chris Forman for being a great advisor and mentor. This dissertation would not have been possible without his guidance. I owe him a great debt of gratitude for his generous support and boundless patience throughout the dissertation process. I am honored to follow in his footsteps to always strive to identify important research questions and conduct rigorous research. I am also indebted to the constructive advice and insights of my committee members, Sandra Slaughter, Marco Ceccagnoli, DJ Wu, Dan Breznitz, and Ram Chellappa. Their sage counsel along the course of this dissertation has both enriched my research in Information Systems and cultivated my interdisciplinary knowledge and skills. I also gratefully acknowledge the enormous support from the entire faculty of the Information Technology Management group and the Scheller College of Business at Georgia Tech.
    [Show full text]
  • Steve French IBM – Linux Technology Center
    IBM Server & Technology Group Linux Kernel Clients: A Year in Review “Man-Eating Seals of Antiquity” to “Sheep on Meth” Steve French IBM – Linux Technology Center Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 Legal Statement –This work represents the views of the author(s) and does not necessarily reflect the views of IBM Corporation –A full list of U.S. trademarks owned by IBM may be found at http://www.ibm.com/legal/copytrade.shtml. –Linux is a registered trademark of Linus Torvalds. –Other company, product, and service names may be trademarks or service marks of others. 2 IBM Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 Who am I? –Steve French ([email protected] or [email protected]) –Author and maintainer of Linux cifs vfs (for accessing Samba, Windows and various SMB/CIFS based NAS appliances) –Wrote initial SMB2 kernel client prototype –Member of the Samba team, coauthor of CIFS Technical Reference and former SNIA CIFS Working Group chair –Architect: Filesystems/NFS/Samba for IBM LTC IBM Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 • Last September Kernel version 2.6.31: • [Since 2.6.34] Now we have • “Man-Eating Seals of Antiquity” 2.6.36-rc4 – 2.6.31 came out on September 9th, 2009 • “Sheep on Meth” 4 IBM Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 Development on Linux kernel clients is very active • 187 kernel changesets for cifs since 2.6.31 (typical year) • But … improvements to related tools have accelerated dramatically: in a few month period early this year 100+ changesets in mount helper and related utilities were merged • And smb2 development accelerated … – A month after SambaXP last year, public git tree for smb2 development created on kernel.org – More than 130 kernel changesets for smb2 since January – SMB2 module now close to full function but 30% smaller (17188 lines of code, CIFS is now 24447 LOC).
    [Show full text]
  • Hdcp Support in Optee
    HDCP SUPPORT IN OPTEE PRODUCT PRESENTATION Linaro Multimedia Working Group MICR ADVANCED TECHNOLOGIES • https://www.linaro.org/ SEPTEMBER 2019 Agenda • Quick introduction to HDCP • Secure Video Path overview • Current HDCP control in Linux • Proposal to control HDCP in OPTEE • Questions HDCP OVERVIEW 3 HDCP : High bandwidth Digital Content Protection • A digital copy protection developed by Intel™ to prevent copying of digital and audio video content. Before sending data, the source device shall check the destination device is authorized to received it. If so, the source device encrypts the data, only the destination device can decrypt. - data encryption - prevent non-licensed devices from receiving content • Android and Linux NXP bsp manage HDCP at Linux Level, through libDRM. So nothing prevent a user to disable HDCP protection while secure content is under playback. It is a security holes in the Secure Video Path. • HDCP support currently under development for wayland/Weston: https://gitlab.freedesktop.org/wayland/weston/merge_requests/48 • No Open Source solution exists to manage HDCP in secure mode. • HDCP versions: ▪ HDCP 1.X: Hacked: Master key published (leak/reverse engineering) ▪ HDCP 2.0: Hacked before release ▪ HDCP 2.1: Hacked before release ▪ HDCP 2.2: Not yet hacked 4 ▪ HDCP 2.3: Not yet hacked HDCP control state Machine Content with HDCP protection mandatory no yes Local display Local display yes no yes no Video displayed Video displayed without HDCP Digital Display without HDCP Digital Display encryption encryption yes no yes no It means we have analog display Video displayed Video displayed HDCP supported without HDCP HDCP supported without HDCP encryption encryption yes no yes no Video displayed Video displayed without Widevine/PlayReady To Video not displayed Application to decide if HDCP check current HDCP version Application to display a Warning 5 HDCP encryption message HDCP Unauthorized, encryption to be used >= expected HDCP version Content Disabled.' Error.
    [Show full text]
  • Technical Support Services for Linux from IBM Robust Linux Support Solutions from an Industry Leader
    IBM Technical Support Services Technical Support Services for Linux from IBM Robust Linux support solutions from an industry leader IBM Technical Support Services (TSS) — Highlights Linux Support Summary • IBM’s Operational Support Services — Support Line for Linux is IBM Technical Support Services offers comprehensive, flexible support for Linux a remotely delivered support service designed to answer how-to and environments across all IBM hardware diagnostic questions. Services include: platforms as well as OEM Intel. – Assistance for Linux installation, configuration, usage, Business Impact technical questions, and code-related defects • Helps maximize the return on your Linux – Standard problem determination/resolution investment through increased reliability – Defect support and change team for emergency fixes • Designed to increase IT staff productivity with installation, configuration and – Call-back response from technicians in specialist area within how-to support 2 hours prime shift and 4 hours off shift • Leverage IBM skills and infrastructure to help – Per environment support based on total server count lower your overall Linux operational costs – Support for all IBM hardware platforms and OEM Intel IBM Value – Red Hat or SUSE Linux, IBM Director, VMware and US • Unmatched breadth, depth, reach Citizens support available • Unparalleled speed to resolution – Linux subscription options available • Access to relevant OEM vendors and IBM Linux Technology Center • Enhanced Services (i.e. Account Advocate, Enhanced Technical Support,
    [Show full text]
  • The Bioinformatics Playground
    Gearing for bioinformatics Gearing for bioinformatics Bela Tiwari and Dawn Field explore the tools and facilities that ioinformatics’ is a buzz word that is Projects with enough funding are able to hire users will depend on the system, how they will becoming increasingly audible in the dedicated system administrators to provide access it, etc. Live CD or DVD distributions may can be used by the budding open source bioinformatician ‘BLinux world. Fast, economical, sustainable bioinformatics computing systems, be good for an individual and for demonstration flexible, and extensible computing power is but many of us are not that lucky and have to purposes, but they are probably not the right making Linux increasingly attractive to scientists go it alone. choice for the provision of tools to a whole in many areas of research, including biology. To add to the challenge, much bioinformatics department. More generally, the open source movement has software is written by academics, and while greatly benefited biological research; the most there are some very good, well tested packages LIVE DISTRIBUTIONS publicised project being the publicly funded out there, there are also many that were Live Linux distributions are a relatively new effort to sequence and make freely available the intended to answer a particular question, on a phenomenon and offer some big advantages. human genome. Less well publicised is the huge particular machine, for a particular group. Such You don’t have to install anything to run them. amount of biological data that can be freely packages were often not built with portability, Just slot the CD or DVD into the drive and boot accessed.
    [Show full text]
  • Redhawk Linux User's Guide
    Linux® User’s Guide 0898004-510 May 2006 Copyright 2006 by Concurrent Computer Corporation. All rights reserved. This publication or any part thereof is intended for use with Concurrent products by Concurrent personnel, customers, and end–users. It may not be reproduced in any form without the written permission of the publisher. The information contained in this document is believed to be correct at the time of publication. It is subject to change without notice. Concurrent makes no warranties, expressed or implied, concerning the information contained in this document. To report an error or comment on a specific portion of the manual, photocopy the page in question and mark the correction or comment on the copy. Mail the copy (and any additional comments) to Concurrent Computer Corporation, 2881 Gateway Drive, Pompano Beach, Florida, 33069. Mark the envelope “Attention: Publications Department.” This publication may not be reproduced for any other reason in any form without written permission of the publisher. RedHawk, iHawk, NightStar, NightTrace, NightSim, NightProbe and NightView are trademarks of Concurrent Computer Corporation. Linux is used pursuant to a sublicense from the Linux Mark Institute. Red Hat is a registered trademark of Red Hat, Inc. POSIX is a registered trademark of the Institute of Electrical and Electronics Engineers, Inc. AMD Opteron and AMD64 are trademarks of Advanced Micro Devices, Inc. The X Window System is a trademark of The Open Group. OSF/Motif is a registered trademark of the Open Software Foundation, Inc. Ethernet is a trademark of the Xerox Corporation. NFS is a trademark of Sun Microsystems, Inc. HyperTransport is a licensed trademark of the HyperTransport Technology Consortium.
    [Show full text]