Open Source Business Model

Total Page:16

File Type:pdf, Size:1020Kb

Open Source Business Model Linköping Studies in Science and Dissertation from the International Technology, Thesis No. Graduate School of Management and LiU-TEK-LIC 2008:26 Industrial Engineering, No. 116, Licentiate Thesis Open Source Business Model – Balancing Customers and Community Thomas Rosén 2008 Department of Management and Engineering Linköping University, SE-581 83 Linköping © Thomas Rosén, 2008 Linköping studies in science and technology, Thesis No. 1368 LiU-TEK-LIC-2008:26 ISBN: 978-91-7393-867-9 ISSN: 0280-7971 ISSN: 1402-0793 Printed by: LiU-Tryck, Linköping Distributed by: Linköping University Department of Management and Economics SE-581 83 Linköping, Sweden Tel: +46 13 281000, fax: +46 13 28187 Abstract Free and Open Source Software has not only increased researchers’ interest about community-driven software development, but lately, interest from commercial actors increased as well. In addition, some scientists have claimed that Open Source Software has entered a new phase: OSS 2.0. Even so, a coherent way of analyzing commercial Open Source ventures is still missing. Commercial Open Source firms’ strategies are often described using the term “business models”. However, these models often lack stringent struc- tures and have been used primarily to describe the firms’ offerings and methods to earn revenue. Through the adaptation of an existing, firmly theoretically-based analytical business model framework, this thesis suggests a new analysis model for studying for-profit Open Source companies. In addition, the framework is generically constructed, ensuring its usability for other industries as well. The model consists of three elements: market positions, operational platform and offering. This particular study concerned four software product vendors, all of which base their products on Open Source Software. When analyzing their business, insights were made about how these firms operated. The result show that there are certain key elements and factors that determine if a company has a sustainable business or not. From the analysis framework, three elements were refined. The main Open Source Software project con- nects the market positions and the operational platform; and from the offer- ing, the product and service and the revenue model were very important. The study identified eight key factors which influenced the elements: brand for the product, the company and the Open Source Software project; com- munity, that is the sum of the non-paying users and developers connected to Open Source Software projects; resources, which are community-based re- sources such as development and testing; legitimacy, the perceived legiti- macy regarding licenses and the revenue models; control, i.e. the control the firm has of the software; ability to charge, or how the company can charge for its services; customers, the paying users; and finally volume, which is the number of paying customers. The findings also indicate that companies interested in working with the open-source community have to be able to balance the demands from both their customers and the community in order to benefit and gain competitive advantage. i Acknowledgements This has been one of the greatest challenges in my life, not only mentally, but also physically. During the time spent working with this thesis, I have managed to go from part to full-time PhD candidate. I have had a major sur- gery and had to recoup from that. Without my family (Hi mom!), this would not have been possible. Therefore, I am glad this ordeal is over and I am ready for the next… I would like to thank my supervisors, Staffan and Anna, for their patience, perseverance, advice and support that enabled me to get me through this. I would like to thank Daniel for the excellent help with the business model framework and interviews and his overall support. I would like to thank Pe- ter for our crazy trip to the United States for the first round of interviews. I would also like to extend my thanks to all the nice people in my department for all the support I they have given me through these years. A comforting thought is sent to poor Mica who graciously agreed to correct the language I so brutishly have mangled in this thesis. He may not have realized the magnitude of the task he accepted. I am forever grateful for your work! I am especially grateful to Peo, the CEO at Cendio. Not only did you let me start this endeavor part-time, but you also supported me when I decided to quit at Cendio in order to become a full-time PhD candidate. Heartfelt thanks go out to my other “victims” in the case companies: Inge and Daniel at Cendio; Jeremy and Jon at Codeweavers; Mårten and David at MySQL; and Michael at Red Hat. Without your help, this thesis would never have happened. Finally, I would like to express my gratitude to Lundbergsstiftelsen, which financed this thesis. Linköping, 2008 Thomas Rosén ii Content 1 Introduction...................................................................................1 1.1 Purpose................................................................................................. 2 1.2 The Study.............................................................................................. 2 1.3 Outline of the Thesis ............................................................................. 2 2 Free and Open Source Software .....................................................5 2.1.1 Hardware and software ............................................................................ 6 2.1.2 Licenses................................................................................................. 7 2.1.3 Hackers and crackers ............................................................................... 8 2.2 Free Software or Open Source Software ............................................... 8 2.2.1 Free Software, Free Society ...................................................................... 9 2.2.1.1 Free or open source software? .......................................................................... 9 2.2.1.2 Software patents ............................................................................................ 10 2.2.1.3 Understanding Stallman’s point of view.......................................................... 10 2.2.2 The Cathedral and the Bazaar ................................................................. 11 2.2.2.1 Commercializing “free software”...................................................................... 11 2.2.2.2 Business models and OSS.............................................................................. 11 2.2.3 Beyond software: OSS in political science ................................................. 12 2.2.4 User innovation..................................................................................... 14 2.2.5 The motivations of the developers ........................................................... 15 2.2.5.1 Floss report - developer survey ....................................................................... 15 2.2.5.2 Floss study – Source code authors ................................................................. 16 2.2.6 Economics and business of OSS............................................................... 17 2.2.6.1 Strategies for OSS companies......................................................................... 17 2.2.6.2 FLOSS study – Use of OSS ............................................................................. 20 2.2.6.3 FLOSS study – Firms OSS activities ............................................................... 21 2.2.6.4 FLOSS study – OSS Markets and Business Models......................................... 21 2.2.6.5 Gaming theory and other methods ................................................................. 22 2.2.6.6 Balancing closed and open source.................................................................. 22 2.2.6.7 OSS 2.0? ........................................................................................................ 23 2.2.6.8 OSS licensing ................................................................................................. 25 2.2.6.9 Licensing schemes.......................................................................................... 26 2.2.6.10 Enforcing the copyleft................................................................................... 28 3 Strategy, management and business models ............................... 29 3.1 Long-term strategy ............................................................................. 29 3.1.1 Structure and Strategy........................................................................... 29 3.1.2 Planning............................................................................................... 30 3.1.3 Positioning ........................................................................................... 30 3.1.4 Resource-based view (RBV) .................................................................... 31 3.1.5 Dynamic capabilities .............................................................................. 32 3.2 Short-term strategies and typologies.................................................. 33 3.2.1 Domains and uncertainty........................................................................ 33 3.2.2 Configurations ...................................................................................... 34 3.2.3 The Adaptive Cycle ................................................................................ 35 3.3 Vision and culture ..............................................................................
Recommended publications
  • End User License Agreement
    MICROSOFT SOFTWARE LICENSE TERMS WINDOWS EMBEDDED STANDARD 7 These license terms are an agreement between you and YSI incorporated. Please read them. They apply to the software included on this device. The software also includes any separate media on which you received the software. The software on this device includes software licensed from Microsoft Corporation or its affiliate. The terms also apply to any Microsoft • updates, • supplements, • Internet-based services, and • support services for this software, unless other terms accompany those items. If so, those terms apply. If you obtain updates or supplements directly from Microsoft, then Microsoft, and not YSI incorporated, licenses those to you. As described below, using the software also operates as your consent to the transmission of certain computer information for Internet-based services. By using the software, you accept these terms. If you do not accept them, do not use the software. Instead, contact YSI incorporated to determine its return policy for a refund or credit. If you comply with these license terms, you have the rights below. 1. USE RIGHTS Use. The software license is permanently assigned to the device with which you acquired the software. You may use the software on the device. 2. ADDITIONAL LICENSING REQUIREMENTS AND/OR USE RIGHTS a. Specific Use. YSI incorporated designed the device for a specific use. You may only use the software for that use. b. Other Software. You may use other programs with the software as long as the other programs directly supports the manufacturer’s specific use for the device, or provide system utilities, resource management, or anti-virus or similar protection.
    [Show full text]
  • Running Windows Programs on Ubuntu with Wine Wine Importer Shanna Korby, Fotolia
    KNoW-HoW Wine Running Windows programs on Ubuntu with Wine Wine importer Shanna Korby, Fotolia Korby, Shanna Users who move from Windows to Ubuntu often miss some of their favorite programs and games. Wouldn’t it be practical to run Windows applications on the free Ubuntu operating system? Time for a little taste of Wine. BY TIM SCHÜRMANN any Ubuntu migrants miss to develop something similar for Linux. Box or VMware, Wine does not emulate games and graphics programs A short while later, the first version of a whole PC and thus cannot be consid- Msuch as CorelDRAW or prod- Wine was released. Today, more than ered a real emulator. This also explains ucts such as Adobe Photoshop. The only 300 volunteer programmers from all over the name Wine, which means Wine Is solution is to install Windows parallel to the world continue to contribute to the Not an Emulator. Ubuntu – or try Wine, which tricks ap- Wine project. Because of the way Wine works, it of- plications into believing they are run- fers a number of advantages. Chiefly, ning on a Windows system. What’s in a Name? you do not need an expensive Windows The history of Wine goes back to the To run Windows programs on Ubuntu, license. Programs will run almost as fast year 1993. At the time, Sun developed a Wine uses a fairly complex trick: It sits as on the Redmond operating system, small tool to run Windows applications between the Windows application and and windows behave as if they belong on its own Solaris operating system, Ubuntu like a simultaneous interpreter.
    [Show full text]
  • Virtualgl / Turbovnc Survey Results Version 1, 3/17/2008 -- the Virtualgl Project
    VirtualGL / TurboVNC Survey Results Version 1, 3/17/2008 -- The VirtualGL Project This report and all associated illustrations are licensed under the Creative Commons Attribution 3.0 License. Any works which contain material derived from this document must cite The VirtualGL Project as the source of the material and list the current URL for the VirtualGL web site. Between December, 2007 and March, 2008, a survey of the VirtualGL community was conducted to ascertain which features and platforms were of interest to current and future users of VirtualGL and TurboVNC. The larger purpose of this survey was to steer the future development of VirtualGL and TurboVNC based on user input. 1 Statistics 49 users responded to the survey, with 32 complete responses. When listing percentage breakdowns for each response to a question, this report computes the percentages relative to the total number of complete responses for that question. 2 Responses 2.1 Server Platform “Please select the server platform(s) that you currently use or plan to use with VirtualGL/TurboVNC” Platform Number of Respondees (%) Linux/x86 25 / 46 (54%) ● Enterprise Linux 3 (x86) 2 / 46 (4.3%) ● Enterprise Linux 4 (x86) 5 / 46 (11%) ● Enterprise Linux 5 (x86) 6 / 46 (13%) ● Fedora Core 4 (x86) 1 / 46 (2.2%) ● Fedora Core 7 (x86) 1 / 46 (2.2%) ● Fedora Core 8 (x86) 4 / 46 (8.7%) ● SuSE Linux Enterprise 9 (x86) 1 / 46 (2.2%) 1 Platform Number of Respondees (%) ● SuSE Linux Enterprise 10 (x86) 2 / 46 (4.3%) ● Ubuntu (x86) 7 / 46 (15%) ● Debian (x86) 5 / 46 (11%) ● Gentoo (x86) 1 /
    [Show full text]
  • Software Licensing in the Cloud Age Solving the Impact of Cloud Computing on Software Licensing Models
    The International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, Special Issue: The Proceeding of International Conference on Soft Computing and Software Engineering 2013 [SCSE’13], San Francisco State University, CA, U.S.A., March 2013 Doi: 10.7321/jscse.v3.n3.60 e-ISSN: 2251-7545 Software Licensing in the Cloud Age Solving the Impact of Cloud Computing on Software Licensing Models Malcolm McRoberts Enterprise Architecture Core Technology Center Harris Corporation GCSD Melbourne, Florida, USA [email protected] Abstract—Cloud computing represents a major shift in identify key issues that require the attention of the industry information systems architecture, combining both new as a whole. deployment models and new business models. Rapid provisioning, elastic scaling, and metered usage are essential A. Characteristics of Cloud Computing (Benefits) characteristics of cloud services, and they require cloud According to the National Institute of Standards and resources with these same characteristics. When cloud services Technology (NIST) [1], cloud computing is a model for depend on commercial software, the licenses for that software enabling ubiquitous, convenient, on-demand network access become another resource to be managed by the cloud. This to a shared pool of configurable computing resources (e.g., paper examines common licensing models, including open networks, servers, storage, applications, and services) that source, and how well they function in a cloud services model. It can be rapidly provisioned and released with minimal discusses creative, new, cloud-centric licensing models and how management effort or service provider interaction. they allow providers to preserve and expand their revenue This translates to a number of benefits for large and small streams as their partners and customers transition to the organizations alike, as well as for individuals.
    [Show full text]
  • An Introduction to Malware
    Downloaded from orbit.dtu.dk on: Sep 24, 2021 An Introduction to Malware Sharp, Robin Publication date: 2017 Document Version Publisher's PDF, also known as Version of record Link back to DTU Orbit Citation (APA): Sharp, R. (2017). An Introduction to Malware. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. An Introduction to Malware Robin Sharp DTU Compute Spring 2017 Abstract These notes, written for use in DTU course 02233 on Network Security, give a short introduction to the topic of malware. The most important types of malware are described, together with their basic principles of operation and dissemination, and defenses against malware are discussed. Contents 1 Some Definitions............................2 2 Classification of Malware........................2 3 Vira..................................3 4 Worms................................
    [Show full text]
  • MX-18.3 Users Manual
    MX-18.3 Users Manual v. 20190614 manual AT mxlinux DOT org Ctrl-F = Search this Manual Ctrl+Home = Return to top Table of Contents 1 Introduction................................................................................2 2 Installation..................................................................................8 3 Configuration...........................................................................37 4 Basic use..................................................................................93 5 Software Management...........................................................126 6 Advanced use.........................................................................141 7 Under the hood.......................................................................164 8 Glossary.................................................................................178 1 Introduction 1.1 About MX Linux MX Linux is a cooperative venture between the antiX and former MEPIS communities, using the best tools and talents from each distro and including work and ideas originally created by Warren Woodford. It is a midweight OS designed to combine an elegant and efficient desktop with simple configuration, high stability, solid performance and medium-sized footprint. Relying on the excellent upstream work by Linux and the open-source community, we deploy Xfce 4.12 as Desktop Environment on top of a Debian Stable base, drawing from the core antiX system. Ongoing backports and outside additions to our Repos serve to keep components current with developments.
    [Show full text]
  • Malware Analysis Sandboxing: Is Open Source Or Commercial Right for You?
    Malware Analysis Sandboxing: Is Open Source or Commercial Right for You? Summary Sandboxing: What is the Best Fit for You? Many enterprises In the war against cybercriminals and hackers, dynamic malware analysis technology has emerged as one of the most valuable weapons for information evaluating sandboxing security teams. “Sandboxing” products help security professionals identify products find unknown malware, respond more quickly to Zero-day attacks, thwart APTs and themselves considering other advanced attacks, and perform forensic examinations of breaches. both products from Many enterprises evaluating sandboxing products find themselves considering commercial vendors and both products from commercial vendors and open source projects. The commercial solutions are more mature and feature-rich, and are supported open source projects. by the vendors; the open source alternatives are “free” and make source code available for modification. This comparison of What is the best fit for you? Do the additional features and predictable support Cuckoo Sandbox and of the commercial products justify the extra up-front cost? ThreatAnalyzer, two This white paper will help you answer those questions by comparing two dynamic malware analysis solutions: ThreatAnalyzer from ThreatTrack Security, leading dynamic malware and Cuckoo Sandbox from the Cuckoo project. analysis solutions, will We will discuss: help you determine 1. “Generic” advantages that often differentiate open source and which approach is the commercial alternatives. best fit for you. 2. What advantages actually apply to sandboxing solutions. 3. Three feature areas that are particularly important for dynamic malware analysis: - Defeating VM-aware malware. - Providing customized environments and detection rules. - Accelerating malware analysis and reporting. Generic Advantages of Open Source and Commercial Solutions Through many debates in the IT industry press, advocates of open source and commercial software have presented what might be called the generic advantages of each approach.
    [Show full text]
  • MX-19.2 Users Manual
    MX-19.2 Users Manual v. 20200801 manual AT mxlinux DOT org Ctrl-F = Search this Manual Ctrl+Home = Return to top Table of Contents 1 Introduction...................................................................................................................................4 1.1 About MX Linux................................................................................................................4 1.2 About this Manual..............................................................................................................4 1.3 System requirements..........................................................................................................5 1.4 Support and EOL................................................................................................................6 1.5 Bugs, issues and requests...................................................................................................6 1.6 Migration............................................................................................................................7 1.7 Our positions......................................................................................................................8 1.8 Notes for Translators.............................................................................................................8 2 Installation...................................................................................................................................10 2.1 Introduction......................................................................................................................10
    [Show full text]
  • COTS-Based Software Development: Processes and Open Issues
    The Journal of Systems and Software 61 (2002) 189–199 www.elsevier.com/locate/jss COTS-based software development: Processes and open issues M. Morisio d,*, C.B. Seaman b,c, V.R. Basili a,c, A.T. Parra e, S.E. Kraft f, S.E. Condon e a University of Maryland, College Park, MD 20742, USA b University of Maryland Baltimore County, Baltimore, MD 21250, USA c Fraunhofer Center Maryland, College Park, MD 20742, USA d Dipartimento di Automatica e Informatica, Politecnico di Torino, Corso Duca degli Abruzzi 24, Torino 10129, Italy e Computer Sciences Corporation, Lanham, MD, USA f NASA/Goddard Space Flight Center, Greenbelt, MD, USA Received 1 March 2001; received in revised form 1 July 2001; accepted 1 September 2001 Abstract The work described in this paper is an investigation of the COTS-based software development within a particular NASA en- vironment, with an emphasis on the processes used. Fifteen projects using a COTS-based approach were studied and their actual process was documented. This process is evaluated to identify essential differences in comparison to traditional software develop- ment. The main differences, and the activities for which projects require more guidance, are requirements definition and COTS selection, high level design, integration and testing. Starting from these empirical observations, a new process and set of guidelines for COTS-based development are developed and briefly presented. Ó 2002 Elsevier Science Inc. All rights reserved. Keywords: Commercial off-the-shelf; COTS; Component-based; Empirical study; Software development process 1. Introduction [The marketplace is] characterized by a vast array of products and product claims, extreme quality The world of software development has evolved and capability differences between products, and rapidly in the last decade.
    [Show full text]
  • NIST SP 800-28 Version 2 Guidelines on Active Content and Mobile
    Special Publication 800-28 Version 2 (Draft) Guidelines on Active Content and Mobile Code Recommendations of the National Institute of Standards and Technology Wayne A. Jansen Theodore Winograd Karen Scarfone NIST Special Publication 800-28 Guidelines on Active Content and Mobile Version 2 Code (Draft) Recommendations of the National Institute of Standards and Technology Wayne A. Jansen Theodore Winograd Karen Scarfone C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 March 2008 U.S. Department of Commerce Carlos M. Gutierrez, Secretary National Institute of Standards and Technology James M. Turner, Acting Director GUIDELINES ON ACTIVE CONTENT AND MOBILE CODE Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-28 Version 2 Natl. Inst. Stand. Technol. Spec. Publ.
    [Show full text]
  • Download the Index
    41_067232945x_index.qxd 10/5/07 1:09 PM Page 667 Index NUMBERS 3D video, 100-101 10BaseT Ethernet NIC (Network Interface Cards), 512 64-bit processors, 14 100BaseT Ethernet NIC (Network Interface Cards), 512 A A (Address) resource record, 555 AbiWord, 171-172 ac command, 414 ac patches, 498 access control, Apache web server file systems, 536 access times, disabling, 648 Accessibility module (GNOME), 116 ACPI (Advanced Configuration and Power Interface), 61-62 active content modules, dynamic website creation, 544 Add a New Local User screen, 44 add command (CVS), 583 address books, KAddressBook, 278 Administrator Mode button (KDE Control Center), 113 Adobe Reader, 133 AFPL Ghostscript, 123 41_067232945x_index.qxd 10/5/07 1:09 PM Page 668 668 aggregators aggregators, 309 antispam tools, 325 aKregator (Kontact), 336-337 KMail, 330-331 Blam!, 337 Procmail, 326, 329-330 Bloglines, 338 action line special characters, 328 Firefox web browser, 335 recipe flags, 326 Liferea, 337 special conditions, 327 Opera web browser, 335 antivirus tools, 331-332 RSSOwl, 338 AP (Access Points), wireless networks, 260, 514 aKregator webfeeder (Kontact), 278, 336-337 Apache web server, 529 album art, downloading to multimedia dynamic websites, creating players, 192 active content modules, 544 aliases, 79 CGI programming, 542-543 bash shell, 80 SSI, 543 CNAME (Canonical Name) resource file systems record, 555 access control, 536 local aliases, email server configuration, 325 authentication, 536-538 allow directive (Apache2/httpd.conf), 536 installing Almquist shells
    [Show full text]
  • Architecture for Analyzing Potentially Unwanted Applications
    Architecture for analyzing Potentially Unwanted Applications Alberto Geniola School of Science Thesis submitted for examination for the degree of Master of Science in Technology. Espoo 10.10.2016 Thesis supervisor: Prof. Tuomas Aura Thesis advisor: M.Sc. Markku Antikainen aalto university abstract of the school of science master’s thesis Author: Alberto Geniola Title: Architecture for analyzing Potentially Unwanted Applications Date: 10.10.2016 Language: English Number of pages: 8+149 Department of Computer Science Professorship: Information security Supervisor: Prof. Tuomas Aura Advisor: M.Sc. Markku Antikainen The spread of potentially unwanted programs (PUP) and its supporting pay par install (PPI) business model have become relevant issues in the IT security area. While PUPs may not be explicitly malicious, they still represent a security hazard. Boosted by PPI companies, PUP software evolves rapidly. Although manual analysis represents the best approach for distinguishing cleanware from PUPs, it is inapplicable to the large amount of PUP installers appearing each day. To challenge this fast evolving phenomenon, automatic analysis tools are required. However, current automated malware analisyis techniques suffer from a number of limitations, such as the inability to click through PUP installation processes. Moreover, many malware analysis automated sandboxes (MSASs) can be detected, by taking advantage of artifacts affecting their virtualization engine. In order to overcome those limitations, we present an architectural design for imple- menting a MSAS mainly targeting PUP analysis. We also provide a cross-platform implementation of the MSAS, capable of running PUP analysis in both virtual and bare metal environments. The developed prototype has proved to be working and was able to automatically analyze more that 480 freeware installers, collected by the three top most ranked freeware websites, such as cnet.com, filehippo.com and softonic.com.
    [Show full text]