Gentoo, GNOME 2.6, Wordperfect

Total Page:16

File Type:pdf, Size:1020Kb

Gentoo, GNOME 2.6, Wordperfect NEWS Software ■Perfect Word by Corel Corel returns to the Linux arena with its announcement of plans to publish a Software News Linux-native version of its productivity software suite, WordPerfect. Version 12 ■KD Executor of the office tool is said to offer similar Klarälvdalens Datakonsult AB has script demonstrating the bug where pos- features as those found in Microsoft’s released a first beta version of KD Execu- sible. Office. tor 2.0, an automatic testing tool for Qt KD Executor requires Qt 3.0.6 or Back in 1998, and KDE applications. higher. It will not work with either the Corel was selling With KD Executor it’s possible to test older Qt 2.x versions or the Professional a Linux native graphical user interfaces automatically. Edition of Qt. Since KD Executor is plat- version of its The tool can record scripts for running form-independent, it is possible to record WordPerfect 8, the application. The Klarälvdalens a script on Linux and reuse it for other which was soon Datakonsult team says that those scripts platforms which support Qt (and vice followed by a are more stable than scripts recorded versa). Linux-translated with toolkit-independent tools, because The tool is available under a commer- version of Word- they “know” about the internals of the cial licensing scheme, based on the Perfect 9 in 2000. application – “even if the layout changes number of platforms and developers. Since then, the company has allowed the script will still work.” Qt properties Holders of such a commercial license its Linux focus to slip a little, to the can be selected during recording and will have access to both the source code extent of even selling its rights in Corel printed while doing the playback to package and, upon request, prebuilt Linux to Xandros. The company is now ensure that the GUI works correctly. binaries. One year’s support is included planning to conquer the Office market by KD Executor can be used for internal in this offer, but the support contract can offering alternatives to Sun Microsys- testing as well as for recording auto- be extended. A special KDE community tem’s StarOffice and its popular Open mated demos of applications to present edition, which only works with KDE Source variant OpenOffice. It is expected them to customers. Another possibility is applications, is also available and can that the new WordPerfect version 12 will to ship KD Executor-enabled versions of be downloaded from Klarälvdalens be available soon from Corel’s own programs and ask customers that are Datakonsult’s website. ■ online store. ■ reporting a bug to send an Excecutor http://www.klaralvdalens-datakonsult.se/ http://www.corel.com/ ■Open Doors After collecting vulnerabilities in both freely available. OSVDB is an open pro- work, and reduce expenses inherent software and hardware for the past two ject that aims to provide an unbiased, with the development and maintenance years, the results are now publicly acces- vendor neutral vulnerability database of in-house vulnerability databases.” sible via the Open Source vulnerability freely to everyone. “The overall goals of New entries for the database are col- database (OSVDB). It is planned to the project are to promote greater, more lected from numerous security mailing update the database with at least one open collaboration between companies lists. After determining a vulnerability to new item every day and collect data on and individuals, eliminate redundant be valid, it is then added in a pending all kinds of software and operating mode to be reviewed and edited by systems. a project member. There are also “Getting reliable and complete plans to include a web form for information on security vulnerabili- submitting new entries or updat- ties is typically a hunt among ing existing vulnerabilities. dozens of websites and mailing The OSVDB team plans to lists, not to mention dealing with release several other services in proprietary and copyrighted infor- the upcoming months; such as mation,” said OSVDB founder Tyler making database access easier for Owen in a statement. end users as well as offering better According to CERT, who collected support for specialized tasks per- statistical data on this subject, the formed by software developers number of new computer security and security analysts. The team is vulnerabilities found each year has still looking for security experts to risen over two thousand percent help the with project. For contact since 1995. While other vulnerabil- details, visit the OSVDB website. ■ ity databases exist, they are not http://osvdb.org/ 6 June 2004 www.linux-magazine.com Software NEWS ■Gentoo Linux 2004.0 released ■Free X! The Gentoo team has announced the tomized binary packages for the Gentoo Back in January, members of X.Org and release of Gentoo Linux 2004.0 for the Reference Platform (GRP).” various companies announced the for- x86, AMD64, PowerPC, Sun SPARC, and To download installation stages, mation of the X.Org Foundation, a SGI MIPS architectures. The new LiveCDs, and GRP sets, go to the community to “maintain and enhance version includes several bug- Gentoo website and select the existing X Window System code fixes and security updates one of the FTP mirrors. base”. The foundation has now and provides Linux ker- Gentoo Linux LiveCDs announced its first official X Window nel 2.6.3, GCC 3.3.2, with installation hand- System release. GLIBC 2.3.2, KDE 3.2, book (included on the X11R6.7 (X Window System Version 11 GNOME 2.4.2, and CD-ROM) and opti- Release 6.7) is based on the last XFree86 xfce4. mized pre-compiled version that was released before XFree86 Included in Gentoo binary packages are changed the license under which its code Linux 2004.0 is Catalyst, also available at the new is published. Distributors such as Gen- Gentoo’s new release Gentoo Store. It’s also too, MandrakeSoft, OpenBSD, and meta-tool. Catalyst allows possible to purchase a sub- Debian GNU/Linux have rejected the developers and users to create scription that offers shipments of new XFree86 license, largely on the basis and customize every aspect of the Gen- the quarterly 2004.x releases. ■ that it is GPL incompatible, meaning that too Linux system – “from installation http://www.gentoo.org/ the new X.Org code tree will likely stages, to bootable LiveCDs, to cus- http://store.gentoo.org/ become the new default X11. In addition, Red Hat announced that it will to work with the new X.Org foundation to ■GNOME 2.6 ready include X11R6.7 in the upcoming release The new GNOME 2.6 dekstop has been Other new features include FileRoller’s of Fedora Core 2 along with future Red published and offers several interesting new handling of RPMs (Red Hat Package Hat Enterprise Linux products based on new features as well as numerous bug Manager). GNOME’s equivalent of Fedora. fixes. Also included are improvements in Winzip is now able to deal with archives There are plans to periodically release the user interface, general stability and in RPM format. GPDF, GNOME’s default X Window System updates and provide speed. PDF viewer, provides new features, such them to the general public free of charge. GNOME’s file manager Nautilus pro- as support for Yelp, GNOME’s help “The X.Org Foundation will govern the vides a new feature called “spatial viewer. Release notes and a changelog evolution of the X11R6 specifications, browsing”. It works in a similar way to are available on the project’s homepage. working with appropriate groups to the finder or query function provided by To test the new GNOME dekstop, you revise and post updates to the standard MAC OS X. For each file directory, Nau- can download the source code from the as required.” tilus opens a new window and remem- project’s website and build it from More information about the founda- bers its location and size. When Nautilus scratch, or simply wait for the next tion and its plans along with the X11R6.7 needs to reopen such a folder, the win- release of your favorite Linux distribu- release can be found at the X.Org dow will appear as it did before or, if it’s tion, which will most likely include website. ■ already open, it will be quickly brought GNOME 2.6. ■ http://www.x.org/ back to the front. http://www.gnome.org/ http://freedesktop.org/Software/xorg ■And the winners are… Thanks to all of you who participated Liam Egan, Kingston, Canada in our recent reader survey. Your input Raymond Holilgrave, Liverpool, is valuable, and we appreciate the time United Kingdom taken to give us your opinion. Laurent Julliard, Biviers, United Our special thanks to Sophia for draw- Kingdom ing the winners and to O’Reilly for Mika Lundell, Vaasa, Finland providing book prizes. Paul Mobbs, Banbury, United The winners of a 1-year Linux Maga- Kingdom zine DVD subscription are: A. G. Nichols, Ripley, WV, USA Geert Anthonis, Kaomsiung, Taiwan Michael Zouridakis, Brussels, Belgium Michael Crees, Walsall, United Enjoy your free subscription! Kingdom All other winners will be receiving Sinisa Dumanic, Split, Croatia their prizes in the mail soon. www.linux-magazine.com June 2004 7.
Recommended publications
  • Automated Acceptance Testing on Macos – a Survey Study Focused On
    ASSIGNMENT OF BACHELOR’S THESIS Title: Automated Acceptance Testing on macOS – A survey study focused on Avast Passwords for mac Student: David Mokoš Supervisor: MSc Felix Javier Acero Salazar Study Programme: Informatics Study Branch: Web and Software Engineering Department: Department of Software Engineering Validity: Until the end of summer semester 2018/19 Instructions 1] Survey the different technologies available for writing acceptance tests on macOS. 2] Select an appropriate test stack: GUI driving technology, testing framework, etc. 3] Prepare application for acceptance testing based on the selected test stack. 4] Implement a suite of acceptance tests to cover the most relevant requirements of Avast Passwords for mac. References Will be provided by the supervisor. Ing. Michal Valenta, Ph.D. doc. RNDr. Ing. Marcel Jiřina, Ph.D. Head of Department Dean Prague November 28, 2017 Czech Technical University in Prague Faculty of Information Technology Department of Software Engineering Bachelor’s thesis Automated Acceptance Testing on macOS – A survey study focused on Avast Passwords for Mac David Mokoˇs Supervisor: MSc. Felix Javier Acero Salazar May 14, 2018 Acknowledgements First and foremost, I would like to thank my thesis supervisor, MSc. Felix Javier Acero Salazar, for his patient guidance, advice and encouragement he has provided throughout the whole time I have been working in Avast. I have been lucky to meet such a hardworking, inspirative and helpful person who cares so much about my work and who always keeps his word. His curiosity and positive mindset inspired me and helped me particularly when exploring new ideas. His careful revising contributed hugely to the creation of the thesis.
    [Show full text]
  • List of NMAP Scripts Use with the Nmap –Script Option
    List of NMAP Scripts Use with the nmap –script option Retrieves information from a listening acarsd daemon. Acarsd decodes ACARS (Aircraft Communication Addressing and Reporting System) data in real time. The information retrieved acarsd-info by this script includes the daemon version, API version, administrator e-mail address and listening frequency. Shows extra information about IPv6 addresses, such as address-info embedded MAC or IPv4 addresses when available. Performs password guessing against Apple Filing Protocol afp-brute (AFP). Attempts to get useful information about files from AFP afp-ls volumes. The output is intended to resemble the output of ls. Detects the Mac OS X AFP directory traversal vulnerability, afp-path-vuln CVE-2010-0533. Shows AFP server information. This information includes the server's hostname, IPv4 and IPv6 addresses, and hardware type afp-serverinfo (for example Macmini or MacBookPro). Shows AFP shares and ACLs. afp-showmount Retrieves the authentication scheme and realm of an AJP service ajp-auth (Apache JServ Protocol) that requires authentication. Performs brute force passwords auditing against the Apache JServ protocol. The Apache JServ Protocol is commonly used by ajp-brute web servers to communicate with back-end Java application server containers. Performs a HEAD or GET request against either the root directory or any optional directory of an Apache JServ Protocol ajp-headers server and returns the server response headers. Discovers which options are supported by the AJP (Apache JServ Protocol) server by sending an OPTIONS request and lists ajp-methods potentially risky methods. ajp-request Requests a URI over the Apache JServ Protocol and displays the result (or stores it in a file).
    [Show full text]
  • D4.6 Real-Time Executor Software Release Y3
    D4.6 Real-time Executor Software Release Y3 Grant agreement no. 780785 Project acronym OFERA (micro-ROS) Project full title Open Framework for Embedded Robot Applications Deliverable number D4.6 Deliverable name Real-time Executor – Software Release Y3 Date December 2020 Dissemination level public Workpackage and task 4.2 Author Jan Staschulat (Bosch) Contributors Ralph Lange (Bosch) Keywords micro-ROS, robotics, ROS, microcontrollers, scheduling, executor Abstract This document provides links to the released software and documentation for deliverable D4.6 Real-time Execu- tor Software Release Y3 of the Task 4.2 Predictable Scheduling and Execution. D4.6: Real-time Executor – Software Release Y3 Contents 1 Overview to Results 2 2 Links to Software Repositories 2 3 Annex 1: Webpage on Real-Time Executor 3 3.1 Table of contents ....................................... 3 3.2 Introduction ......................................... 4 3.3 Analysis of rclcpp standard Executor ........................... 5 3.3.1 Architecture ..................................... 5 3.3.2 Scheduling Semantics ................................ 6 3.4 RCLC-Executor ........................................ 7 3.4.1 Requirement Analysis ................................ 7 3.4.2 Features ........................................ 12 3.4.3 Executor API ..................................... 13 3.4.4 Examples ....................................... 14 3.4.5 Summary ....................................... 17 3.4.6 Future work ..................................... 18 3.4.7 Download
    [Show full text]
  • Red Hat Enterprise Linux 8 Configuring and Managing High Availability Clusters
    Red Hat Enterprise Linux 8 Configuring and managing high availability clusters Configuring and managing the Red Hat High Availability Add-On Last Updated: 2021-09-23 Red Hat Enterprise Linux 8 Configuring and managing high availability clusters Configuring and managing the Red Hat High Availability Add-On Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent.
    [Show full text]
  • Migration Toolkit for Applications 5.1 Web Console Guide
    Migration Toolkit for Applications 5.1 Web Console Guide Use the Migration Toolkit for Applications web console to group your applications into projects for analysis. Last Updated: 2021-08-02 Migration Toolkit for Applications 5.1 Web Console Guide Use the Migration Toolkit for Applications web console to group your applications into projects for analysis. Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • A/UX® Command Reference Section Lca-L)
    A/UX®Command Reference Section lCA-L) .® A/UX® Command Reference Section leA-L) 030-0781 • APPLE COMPUTER, INC. © 1990, Apple Computer, Inc., and Diablo and Ethernet are registered UniSoft Corporation. All rights trademarks of Xerox Corporation. reserved. Hewlett-Packard 2631 is a trademark of Portions of this document have been Hewlett-Packard. previously copyrighted by AT&T MacPaint is a registered trademark of Information Systems and the Regents Claris Corporation. of the University of California, and are reproduced with permission. Under POSTSCRIPT is a registered trademark, the copyright laws, this manual may and TRANSCRIPT is a trademark, of not be copied, in whole or part, Adobe Systems, Incorporated. without the written consent of Apple Teletype is a registered trademark of or UniSoft. The same proprietary and AT&T. copyright notices must be affIXed to any permitted copies as were affIXed to TermiNet is a trademark of General the original. Under the law, copying Electric. includes translating into another UNIX is a registered trademark of language or format. AT&T Information Systems. The Apple logo is a registered Versatec is a trademark of Versatec. trademark of Apple Computer, Inc. Use of the "keyboard" Apple logo Wang C/ AlT is a trademark of Wang (Option-Shift-K) for commercial Laboratories. purposes without the prior written Simultaneously published in the consent of Apple may constitute United States and Canada. trademark infringement and unfair competition in violation of federal and state laws. Apple Computer, Inc. 20525 Mariani Ave. Cupertino, California 95014 (408) 996-1010 Apple, the Apple logo, AppleTalk, AlUX, ImageWriter, LaserWriter, and Macintosh are registered trademarks of Apple Computer, Inc.
    [Show full text]
  • Jenkins User Handbook
    Jenkins User Handbook [email protected] Table of Contents Getting Started with Jenkins . 1 Installing Jenkins . 2 Prerequisites . 3 Installation platforms . 4 Docker . 4 WAR file . 7 macOS. 8 Linux. 8 Windows . 9 Other operating systems . 9 Post-installation setup wizard . 12 Unlocking Jenkins . 12 Customizing Jenkins with plugins . 12 Creating the first administrator user . 13 Using Jenkins . 14 Pipeline . 15 What is Jenkins Pipeline?. 16 Why Pipeline? . 18 Pipeline Terms . 19 Getting Started with Pipeline. 20 Prerequisites . 21 Defining a Pipeline . 22 Defining a Pipeline in the Web UI . 22 Defining a Pipeline in SCM . 25 Built-in Documentation . 26 Snippet Generator . 26 Global Variable Reference. 27 Further Reading . 28 Additional Resources . 28 Using a Jenkinsfile . 29 Creating a Jenkinsfile . 30 Build . 31 Test . 32 Deploy . 33 Advanced Syntax for Pipeline. 35 String Interpolation . 35 Working with the Environment. 35 Parameters . 37 Handling Failures . 37 Using multiple agents . 38 Optional step arguments . 40 Advanced Scripted Pipeline . 41 Branches and Pull Requests . 43 Creating a Multibranch Pipeline . 44 Additional Environment Variables . 47 Supporting Pull Requests. 47 Using Organization Folders . 48 Using Docker with Pipeline . 49 Customizing the execution environment. 50 Caching data for containers . 50 Using multiple containers . ..
    [Show full text]
  • Ut99 Working Fine for Mac
    1 / 2 Ut99 Working Fine For Mac Basically I need to know how to install UT GOTY on MacOS X. PLEASE help. thx ... Can't keep off it,so UT keep up the good work,ps i also have UT 2004 but am .... Feb 07, 2021 · OldUnreal's Unreal Tournament 99 patches. ... Apr 15, 2020 · How to set up Unreal to work with Oculus Quest on Ubuntu (20. ... Does anyone know of any good reference docs for packaging a build for Oculus ... 3 on a Mac. 20.. Feb 6, 2017 — so i found a working power mac in the alley i have some mac games, quake, shadow ... You should be fine with Tiger unless the games require 10.5 but I would ... Other games like Rune/Unreal/UT99 have "lagging" issues.. im looking for mac mods for UT'99 any one know of any good sites..... ... but never got it to work on my old machine, and haven't tried on my new one. ... However, UT99 doesn't run so fine on my tibook, which made me kinda give up on it.. :(.. May 19, 2014 — I've done some originals too but they're in Batch 1 & 2. These work fine in ut99... and I got no idea if they'll work in Unreal1 so someone be sure ... Dec 18, 2007 — Home · Operating Systems · macOS; Unreal Tournament 3 comes to the Mac ... ?We have a long history of bringing the Unreal series to Mac gamers, and with its expanded ... Good news for you mac fans, however the mac is not going to save this game, according ..
    [Show full text]
  • What Good Is a Linux Client?
    Preparing Today for Linux® Tomorrow What Good is a Linux Client? A Linux White Paper Preface Anyone who has followed the progress of Linux the past few years has noted the surprising gains that Linux has made in server operating system market share and “mindshare” against the entrenched opposition, notably Microsoft® Windows NT®, Novell Netware and various varieties of UNIX®. A complete Linux network, of course, would require Linux clients (networked PCs or terminals) as well. Therefore, an important question is, “Is Linux a viable desktop operating system for general business use?” or must we continue to be confined to the Windows world for our non-server needs? And what about laptop support, or a Small Office/Home Office (SOHO) user or home user, who does not need a network server? Is there a place for Linux in a stand-alone environment? These are some of the questions this paper addresses. I must confess that until recently I was merely a bystander watching with curiosity from the sidelines—without any real involvement— the progress Linux has made. So writing this paper not only gave me the excuse to join in on the action, but it also provides you with the perspective of a Linux “newbie” who is attempting to find the applications and utilities needed to create a working system. The conventional wisdom so far is that Linux is not “ready for prime time” as anything but a network operating system. We shall test this notion to see if I can find commercial, shareware and/or freeware programs for Linux to replace the existing applications I currently use with Windows.
    [Show full text]
  • Apple Confidential 2.0 the Definitive History of the World's Most Colorful
    vi Reviewers love Apple Confidential “The Apple story itself is here in all its drama.” New York Times Book Review “An excellent textbook for Apple historians.” San Francisco Chronicle “Written with humor, respect, and care, it absolutely is a must-read for every Apple fan.” InfoWorld “Pretty much irresistible is the only way to describe this quirky, highly detailed and illustrated look at the computer maker’s history.” The Business Reader Review “The book is full of basic facts anyone will appreciate. But it’s also full of interesting extras that Apple fanatics should love.” Arizona Republic “I must warn you. This 268-page book is hard to put down for a MacHead like me, and probably you too.” MacNEWS “You’ll love this book. It’s a wealth of information.” AppleInsider “Rife with gems that will appeal to Apple fanatics and followers of the computer industry.” Amazon.com “Mr. Linzmayer has managed to deliver, within the confines of a single book, just about every juicy little tidbit that was ever leaked from the company.” MacTimes “The most entertaining book about Apple yet to be published.” Booklist i …and readers love it too! “Congratulations! You should be very proud. I picked up Apple Confidential and had a hard time putting it down. Obviously, you invested a ton of time in this. I hope it zooms off the shelves.” David Lubar, Nazareth, PA “I just read Apple Confidentialfrom cover to cover…you have written a great book!” Jason Whong, Rochester, NY “There are few books out there that reveal so much about Apple and in such a fun and entertaining manner.
    [Show full text]
  • Series 30I-MA, 300I-MA, 300Is-MA C Language Executor Operator's
    GE Fanuc Automation Computer Numerical Control Products Series 30i-Model A Series 300i-Model A Series 300is-Model A C Language Executor Operator’s Manual GFZ-63944EN-3/01 January 2004 GFL-001 Warnings, Cautions, and Notes as Used in this Publication Warning Warning notices are used in this publication to emphasize that hazardous voltages, currents, temperatures, or other conditions that could cause personal injury exist in this equipment or may be associated with its use. In situations where inattention could cause either personal injury or damage to equipment, a Warning notice is used. Caution Caution notices are used where equipment might be damaged if care is not taken. Note Notes merely call attention to information that is especially significant to understanding and operating the equipment. This document is based on information available at the time of its publication. While efforts have been made to be accurate, the information contained herein does not purport to cover all details or variations in hardware or software, nor to provide for every possible contingency in connection with installation, operation, or maintenance. Features may be described herein which are not present in all hardware and software systems. GE Fanuc Automation assumes no obligation of notice to holders of this document with respect to changes subsequently made. GE Fanuc Automation makes no representation or warranty, expressed, implied, or statutory with respect to, and assumes no responsibility for the accuracy, completeness, sufficiency, or usefulness of the information contained herein. No warranties of merchantability or fitness for purpose shall apply. ©Copyright 2004 GE Fanuc Automation North America, Inc.
    [Show full text]
  • Schumpeterian Competition and Diseconomies of Scope; Illustrations from the Histories of Microsoft and IBM
    Schumpeterian competition and diseconomies of scope; illustrations from the histories of Microsoft and IBM Timothy Bresnahan Shane Greenstein Rebecca Henderson Working Paper 11-077 Copyright © 2011 by Timothy Bresnahan, Shane Greenstein, Rebecca Henderson Working papers are in draft form. This working paper is distributed for purposes of comment and discussion only. It may not be reproduced without permission of the copyright holder. Copies of working papers are available from the author. Schumpeterian competition and diseconomies of scope; illustrations from the histories of Microsoft and IBM. Timothy Bresnahan, Shane Greenstein, Rebecca Henderson* Abstract: We address a longstanding question about the causes of creative destruction. Dominant incumbent firms, long successful in an existing technology, are often much less successful in new technological eras. This is puzzling, since a cursory analysis would suggest that incumbent firms have the potential to take advantage of economies of scope across new and old lines of business and, if economies of scope are unavailable, to simply reproduce entrant behavior by creating a “firm within a firm.” There are two broad streams of explanation for incumbent failure in these circumstances. One posits that incumbents fear cannibalization in the market place, and so under-invest in the new technology. The second suggests that incumbent firms develop organizational capabilities and cognitive frames that make them slow to “see” new opportunities and that make it difficult to respond effectively once the new opportunity is identified. In this paper we draw on two of the most important historical episodes in the history of the computing industry, the introduction of the PC and of the browser, to develop a third hypothesis.
    [Show full text]