COMPSCI 111 / 111G • Runs (Executes) from RAM Mastering Cyberspace: an Introduction to Practical Computing Software Is Loaded CPU Executes Instruction

Total Page:16

File Type:pdf, Size:1020Kb

COMPSCI 111 / 111G • Runs (Executes) from RAM Mastering Cyberspace: an Introduction to Practical Computing Software Is Loaded CPU Executes Instruction What is software? Instructions and other data for the computer • Also known as “programs” • Loaded from Secondary Storage into Primary Memory COMPSCI 111 / 111G • Runs (executes) from RAM Mastering Cyberspace: An introduction to practical computing Software is loaded CPU executes instruction Hard Disk RAM Read / Write CPU Software http://en.wikipedia.org/wiki/Software 5/03/2008 COMPSCI 111/111G - Lecture 03 1 5/03/2008 COMPSCI 111/111G - Lecture 03 2 File Formats Standards All data is stored as (binary) numbers Open Standard • Data is organised in files (chunks of related data) • Published publicly • MthdfMethod of enco ding depen ds on the so ftware, call llded file format • Free to use • Maintained by a "non-profit" organisation File Formats • E.g. XML, HTML, UML • Defines the way that the numbers are interpreted • “Open” does not necessarily mean “good” • E.g. for a graphics file: “first the width, then the height, then all the pixel color values line by line” PitStddProprietary Standard File Extensions • Intellectual property of an entity (individual / company) • A dot followed by letters at the end of a file name • Use of the standard is usually through license • Windows OS uses the file extension to determine the file format • E.g. Adobe Flash, RealPlayer, • Also used to decide which application to use to open the file some digital rights management (DRM) technologies • Risk for users: vendor lock-in Graphics .jpg , .png , .gif Video .mpg , .avi , .divx Sound .mp3 , .wma , .ogg Programs .exe , .com , .bat "The nice thing about standards is that there are so many to choose from." Text .txt , .doc Program Code .c , .java , .cs , .py 5/03/2008 COMPSCI 111/111G - Lecture 03 3 5/03/2008 COMPSCI 111/111G - Lecture 03 4 Copyright and Patents Proprietary Software Software subject to normal legal copyright Software that has restrictions on using and copying • Copyright = “right to copy” • All rights are retained by the owner. • Creator retains the rights to their creations (not the ideas behind them) • Owner enforces these restrictions • Usually lasts for the life of the author plus 50 or 70 years • Best applicable to: music, visual art, literature, programs Can be: • Commercial Software Patents • Freeware • RtiRetain con tro l over ideas /i/ inven tions • Shareware • Usually enables to exclusively commercialise an idea for 20 years • Semi-free (for non-profit) (can be important to amortise research cost) • US recognises software patents, Europe does not • Hotly debated issue 5/03/2008 COMPSCI 111/111G - Lecture 03 5 5/03/2008 COMPSCI 111/111G - Lecture 03 6 Freeware Shareware Software is distributed free of charge Idea: try before you buy • No agreement about distribution, access to source code Trial period offered Types of Freeware • Purchase the license and upgrade to commercial version • Loss Leader (given away with loss as sales promotion) • Adware Nagware • Donationware • Reminder messages to license software • PtPostcar dware Crippleware Abandonware • Software lacks the advanced features until licensed • Not legally recognised • E.g. Word processor that cannot Save or Print E. g. MS Internet Explorer , Apple iTunes, Adobe Reader E.g. WinZip, TextPad 5/03/2008 COMPSCI 111/111G - Lecture 03 7 5/03/2008 COMPSCI 111/111G - Lecture 03 8 Open Source / Free Software Spyware, Malware, Viruses Free Software Spyware • Freedom to use and study the work • Collects data from your PC and sends it to someone else • Freedom to copy and share the work with others • May otherwise look like (or even be) a useful program • Freedom to change the work • The data may be sensitive (e.g. passwords, personal documents) • Freedom to distribute changed and therefore derivative works or just statistical Malware Copyright prevents these acts "I would love to change the world, but they won't give me the source code"code • Generic term for malicious software • EliitExplicit perm iiission is requ idired • Usually malicious program is disguised as useful program • Free software license gives permission • Causes harm, such as deleting or modifying data Richard Stallman Viruses • Free Software Foundation (FSF) • Small programs that attach themselves to other programs • GNU General Public License (GPL) • May cause harm • Copyleft Golden rule: never run programs (or open files) that you cannot trust !!! http://en.wikipedia.org/wiki/Copyleft 5/03/2008 COMPSCI 111/111G - Lecture 03 9 5/03/2008 COMPSCI 111/111G - Lecture 03 10 Kinds of Software Operating System Application Software Low-level software that allows you to use the system • Helps the user complete a task • Default interface when no application is running • E.g. word processor, spreadsheet, database, web browser, games • Manages the system: CPU, memory, HD, … • Does all the direct interaction with the hardware (using drivers) System Software • Needed to run the computer system Examples: • Operating System (OS): • Microsoft Windows: “Windows - so intuitive manages all the hardware resources for application programs most used, but many complaints you only need a 678-page manual. ” (CPU, RAM, HD, …) • Macintosh OS: • Device drivers: more expensive, less software & hardware, more focus on usability programs that help an OS to control a piece of hardware • UiUnix, Linux: • Diagnostic and maintenance tools: more technical tools for analysis, trouble shooting and optimisation Mac and PC: (e.g. c hec kdis k, de frag ) "Unix is user-friendly. http://www.apple .com/getamac/ads/ It's just very selective about who its friends are." http://en.wikipedia.org/wiki/Operating_system 5/03/2008 COMPSCI 111/111G - Lecture 03 11 5/03/2008 COMPSCI 111/111G - Lecture 03 12 Command Line Interface Graphical User Interface (GUI) Text-based Picture based • Powerful way to combine different commands • Windows, Icons, Mouse, Pointer • Hard to use: textual commands look weird if you don’t know them • Easy to use • Good for experts that use it often • Good for beginners http://en.wikipedia.org/wiki/Command_line_interface http://en.wikipedia.org/wiki/GUI 5/03/2008 COMPSCI 111/111G - Lecture 03 13 5/03/2008 COMPSCI 111/111G - Lecture 03 14 Web Browsers Email Clients 5/03/2008 COMPSCI 111/111G - Lecture 03 15 5/03/2008 COMPSCI 111/111G - Lecture 03 16 Office Software Graphics Software Inkscape Paint.net Blender Terragen 5/03/2008 COMPSCI 111/111G - Lecture 03 17 5/03/2008 COMPSCI 111/111G - Lecture 03 18 Sound/Music Software Scientific Software 5/03/2008 COMPSCI 111/111G - Lecture 03 19 5/03/2008 COMPSCI 111/111G - Lecture 03 20 Security Software Software Development Tools 5/03/2008 COMPSCI 111/111G - Lecture 03 21 5/03/2008 COMPSCI 111/111G - Lecture 03 22 What if software fails? Summary Usually software is not perfect !!! • Software (programs) consists of instructions that control the • Too complex to be completely free of errors computer and data • MhdthilkMany programmers have good technical know-how • PlddfdtitiPrograms are loaded from secondary storage into primary memory, but lack a sense of usability then executed by the CPU • User interfaces are often not logical "Men are from Mars. • Data is organized in files, which have different file formats WfVWomen are from Venus. If a problem occurs… • Software (and other data) is protected by copyright laws Computers are from hell." • It may not be your fault • Software can be proprietary or open-source or a mixture of both • You are most likely not the only one with that problem • Different kinds of software: • Ask others for help !!! • System software • Search the Internet and you will often find solutions • Applications Is it easy to fix a defect in a program? • SMlViSpyware, Malware, Viruses • Unfortunately, usually not • The internals of ppproprietary software are usually not accessible If all else fails, read the manual. • Open-source programs can be large and hard to understand • But often problems can be circumvented by using the program in a different way 5/03/2008 COMPSCI 111/111G - Lecture 03 23 5/03/2008 COMPSCI 111/111G - Lecture 03 24.
Recommended publications
  • Is Published Semi-Annually by the Journal on Telecommunications & High Technology Law, Campus Box 401, Boulder, CO 80309-040
    JOURNAL ON TELECOMMUNICATIONS & HIGH TECHNOLOGY LAW is published semi-annually by the Journal on Telecommunications & High Technology Law, Campus Box 401, Boulder, CO 80309-0401 ISSN: 1543-8899 Copyright © 2009 by the Journal on Telecommunications & High Technology Law an association of students sponsored by the University of Colorado School of Law and the Silicon Flatirons Telecommunications Program. POSTMASTER: Please send address changes to JTHTL, Campus Box 401, Boulder, CO 80309-0401 Subscriptions Domestic volume subscriptions are available for $45.00. City of Boulder subscribers please add $3.74 sales tax. Boulder County subscribers outside the City of Boulder please add $2.14 sales tax. Metro Denver subscribers outside of Boulder County please add $1.85 sales tax. Colorado subscribers outside of Metro Denver please add $1.31 sales tax. International volume subscriptions are available for $50.00. Inquiries concerning ongoing subscriptions or obtaining an individual issue should be directed to the attention of JTHTL Managing Editor at [email protected] or by writing JTHTL Managing Editor, Campus Box 401, Boulder, CO 80309-0401. Back issues in complete sets, volumes, or single issues may be obtained from: William S. Hein & Co., Inc., 1285 Main Street, Buffalo, NY 14209. Back issues may also be found in electronic format for all your research needs on HeinOnline http://heinonline.org/. Manuscripts JTHTL invites the submission of unsolicited manuscripts. Please send softcopy manuscripts to the attention of JTHTL Articles Editors at [email protected] in Word or PDF formats or through ExpressO at http://law.bepress.com/expresso. Hardcopy submissions may be sent to JTHTL Articles Editors, Campus Box 401, Boulder, CO 80309-0401.
    [Show full text]
  • 2020-Floss-Roadmap.Pdf
    -1- -2- Why do we need a 2020 FLOSS1 Roadmap? Based in Paris, Open World Forum (openworldforum.org) is a forum dedicated to FLOSS, its players and projects. OWF offers all contributors this open space in which they can express their own vision of FLOSS. 2020 FLOSS Roadmap is the Open World Forum’s main manifesto, and is designed to support discussions taking place during the different OWF seminars and forums. This is a prospective Roadmap, and a projection of the influences that will affect FLOSS between now (2008) and 2020, with descriptions of all FLOSS-related trends as anticipated by OWF contributors over this period of time. It also highlights all sectors that will, potentially, be impacted by FLOSS, from the economy to the Information Society. It is easy to find a wealth of writings on the subject of FLOSS contributed by various analysts, but this study represents a first, not just because of its inward looking vision of the future of the FLOSS Community itself, but also because it is the result of a collaborative effort by all OWF contributors. This first version of 2020 Roadmap is open to comment, and will be re-assessed annually during the OWF. Studies have been carried out in seven key areas: Theme 1: Public policies: promoting sustainable development of shared resources Theme 2: FLOSS: the key to future innovation and competitive differentiation? Theme 3: Ensuring sustainability for FLOSS developer communities and business ecosystems Theme 4: Technological and economic breakthroughs: challenge or opportunity for FLOSS? Theme 5: IT 3.0: towards new governance for information systems? Theme 6: FLOSS: a lever for employment and careers Theme 7: FLOSS in an Open World: Innovations and best practices from Brazil In the first section, we have summarized the discussions that took place during the study period, and this is followed by a special focus on Cloud Computing.
    [Show full text]
  • Open Source Software
    The Medicine Behind the Image OOppeenn SSoouurcrcee SSoofftwtwaarere -- IIss iitt aa VViiaabbllee AAlltteerrnnaattiivvee foforr aa HHeeaalltthhccaarree IInnssttiittuuttiioonn?? David Clunie, MBBS, FRACR CTO - RadPharm, Inc. AAcckknnoowwleleddggeemmeenntsts • Several recent presentations by various PACS luminaries – Steve Langer (Mayo) – Brad Erickson (Mayo) – Paul Nagy (University of Maryland) – Steve Horii (University of Pennsylvania) • Most recent (RSNA 2005) talk at OpenRad – http://www.openrad.com/rsnaopensource.pdf IIss PPrroopprriieettaarryy PPAACCSS VViiaabbllee ?? • Why are PACS much more expensive than the underlying off-the-shelf PC, server and storage hardware ? • How profitable is PACS for the vendor ? • Will the vendor fail or be acquired ? • Will the installed base survive acquisition ? • Will there be long term support ? • How long will the current offering last before sites are forced to upgrade ? • Big vendors are not immune - how many PACS have the they built or acquired then orphaned ? • Is their pace of innovation sufficient ? It only needs to be “incrementally better than the competition” IIss OOppeenn SSoouurcrcee VViaiabblele ?? • Does it exist for your application ? • How much hand-holding do you need ? • Open source deployment is about taking control • With control comes responsibility • Requires that you have the necessary expertise to deploy and support - may be out-sourced WhatWhat isis OpenOpen SourceSource SoftwareSoftware ?? • Open source software (OSS) licensees are free to: – Use software for any purpose
    [Show full text]
  • Crippleware - Wikipedia, the Free Encyclopedia Page 1 of 1
    Crippleware - Wikipedia, the free encyclopedia Page 1 of 1 Crippleware From Wikipedia, the free encyclopedia Crippleware is any product whose functions have been limited (or "crippled", thus the name) with the express purpose of requiring the user to pay for those functions (either paying a one-time fee or continually paying a service). Crippleware is also used to describe software that makes use of Digital Rights Management. Crippleware programs are usually free versions of computer programs that lack the most advanced (or in some cases, even crucial) features of the original program. Crippleware versions are made available in order to increase the popularity of the full program without giving it away for free. An example of crippleware is a word processor that cannot save or print. There are several types of crippleware programs. A crippleware version can be the full program with the features disabled; this type can be "unlocked" into a fully functional version of the software, usually via a serial number. A crippleware version can also be a special trial version of the program that does not even include the executable code for the disabled features. In this case, only users who buy a license are given access to another version of the program, which is fully functional. A third type is where the functionality of the software or hardware is permanently compromised from full functionality due to third party agreements. For something to become crippleware, it usually requires the manufacturer or author to take active steps to reduce the capabilities that the hardware or software could otherwise handle.
    [Show full text]
  • Consumer Response to Versioning: How Brands Production Methods Affect Perceptions of Unfairness
    Consumer Response to Versioning: How Brands’ Production Methods Affect Perceptions of Unfairness ANDREW D. GERSHOFF RAN KIVETZ ANAT KEINAN Marketers often extend product lines by offering limited-capability models that are created by removing or degrading features in existing models. This production method, called versioning, has been lauded because of its ability to increase both consumer and firm welfare. According to rational utility models, consumers weigh benefits relative to their costs in evaluating a product. So the production method should not be relevant. Anecdotal evidence suggests otherwise. Six studies show how the production method of versioning may be perceived as unfair and unethical and lead to decreased purchase intentions for the brand. Building on prior work in fairness, the studies show that this effect is driven by violations of norms and the perceived similarity between the inferior, degraded version of a product and the full-featured model offered by the brand. The idea of Apple gratuitously removing fea- been recommended by economists as a production method tures that would have been actually easier to that benefits both firms and consumers (Deneckere and leave in is downright perplexing. McAfee 1996; Hahn 2006; Varian 2000). Firms benefit by reducing design and production costs and by increasing profits The intentional software crippling stance they have taken with the iPod Touch is disturbing through price discrimination when multiple configurations of at best. (Readers’ responses to iPod Touch re- a product are offered. Consumers benefit because versioning view on www.engadget.com) results in lower prices and makes it possible for many to gain access to products that they might otherwise not be able to afford (Shapiro and Varian 1998; Varian 2000).
    [Show full text]
  • Free Software to Edit Pdf Documents
    Free Software To Edit Pdf Documents SearchingThornie often and entoils epidemic proportionally Godwin misspeaks when reigning so whistlingly Demetre that clearcole Saunders laigh busses and literalized his tames. her sternums. discriminatively.Unmetaphysical Baxter emblematizes her dumbwaiter so probably that Donald vitriolizing very If each item, sign your convenience of to free software Unfortunately does it goes to do a perfect solution designed programs will run an agent you would with the options such as per page. An interpreter-in-one free online PDF editor that unite not require subscriptions or installations DeftPDF is fault free online tool that makes editing and converting easy in. Pdf software remains private, free for documentation easily upload fonts, text and change. Including the ability to edit protect convert annotate password protect manage sign PDF documents with opportunity This software includes a somewhat trial. PDF-XChange Editor. Pdf documents like to free version allows you! Which cool the route free PDF editor software? Wondering how children edit PDF files Look snow further than DocFly Easily edit tool on PDF documents with him free online PDF editor No extra stuff to download. Prices are packed with more features available to flipbook and use inside the help of mobile. PDF Buddy Online PDF Editor. Best Free PDF Editor for Windows in 2021. Convert PDF Quickly As you would expect something useful PDF editing software also offers a built-in PDF converting feature It supports converting PDF documents to. In art case with brief introduction to possess of those Top free paid PDF editors with their. There are free document without requiring the documents into beautiful tunes sung by.
    [Show full text]
  • A Glossary of Open Source Legal Terms for Engineers | Michael Barr
    A Glossary of Open Source Legal Terms for Engineers | Michael Barr A Glossary of Open Source Legal Terms for Engineers By Michael Barr Updated November 27, 2018 When using software developed by others, such as Freeware Linux, within an embedded system design, it is recommended that developers consult with an Freeware is shareware with no registration fee. intellectual property lawyer to read license agreements. Free software Free software is software that is distributed free of The following is a brief glossary of licensing charge whereby users can modify and redistribute terminology to help engineering teams understand without restrictions. Focused on access to the source legal terms related to open source software. code, the free software movement is as much a Proprietary software political organization as anything else. Under the free software licensing model, developers are even Proprietary Software is owned exclusively by an allowed to charge for their distribution of the individual or company and is protected under software. However, these broad rights are copyright law. Heavy restrictions are usually conditioned upon the users’ commitment to provide established for the use, modification and distribution similar access to their code modifications and to of proprietary software, and the source code is never narrow the licensing rights as a condition of typically kept secret. distribution. In the most traditional licensing model for Proponents of free software generally believe that all commercial software, no customer is allowed to information, especially source code, has a right to be examine the source code for the product. The one free. Therefore, free software is being in the "free exception to this is a customer willing to pay an speech" sense—not as in "free lunch." They advocate additional source code license fee.
    [Show full text]
  • Jargon File, Version 4.0.0, 24 Jul 1996
    JARGON FILE, VERSION 4.0.0, 24 JUL 1996 This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor. This document (the Jargon File) is in the public domain, to be freely used, shared, and modified. There are (by intention) no legal restraints on what you can do with it, but there are traditions about its proper use to which many hackers are quite strongly attached. Please extend the courtesy of proper citation when you quote the File, ideally with a version number, as it will change and grow over time. (Examples of appropriate citation form: "Jargon File 4.0.0" or "The on-line hacker Jargon File, version 4.0.0, 24 JUL 1996".) The Jargon File is a common heritage of the hacker culture. Over the years a number of individuals have volunteered considerable time to maintaining the File and been recognized by the net at large as editors of it. Editorial responsibilities include: to collate contributions and suggestions from others; to seek out corroborating information; to cross-reference related entries; to keep the file in a consistent format; and to announce and distribute updated versions periodically. Current volunteer editors include: Eric Raymond [email protected] Although there is no requirement that you do so, it is considered good form to check with an editor before quoting the File in a published work or commercial product. We may have additional information that would be helpful to you and can assist you in framing your quote to reflect not only the letter of the File but its spirit as well.
    [Show full text]
  • The User Friendly Guide to INTERNET & COMPUTER TERMS
    The User Friendly Guide to INTERNET & COMPUTER TERMS Charles Steed Gold Standard Press Inc. Reno, Nevada Copyright ã 2001 Charles Steed and Gold Standard Press Inc. Permission is granted to ALL USERS and readers to download, print and freely dis- tribute The User Friendly Guide To Internet & Computer Terms. No changes to this text is authorized. THIS TEXT MAY NOT BE SOLD EXCEPT BY AUTHORIZED AGENTS OR REPRESENTATIVES OF GOLD STANDARD PRESS INC. For information, contact Gold Standard Press Inc. 1475 Terminal Way, Suite E, Reno, Nevada 89502, tel. 360-482-2510. This book contains information gathered from many sources. It is published for gen- eral reference and not as a substitute for independent verification by users when circumstances warrant. It is sold with the understanding that neither the author nor publisher is engaged in rendering legal, psychological, accounting or professional advice. The publisher and author disclaim any personal liability, either directly or indirectly, for advice presented within. Although the author and publisher have used care and diligence in the preparation, and made every effort to ensure the accuracy and completeness of information contained in this book, we assume no responsibility for errors, inaccuracies, omissions, or any inconsistency herein. Any slights of people, places, publishers, books, or organizations are unintentional. The online version of this text has been slightly modified to faciliate easy download- ing. No significant differences from the printed version are present. Library of Congress
    [Show full text]
  • COMPSCI 111 / 111G Software
    COMPSCI 111 / 111G Software COMPSCI 111 / 111G 1 What is software? •Instructions and other data for the computer. Also known as “programs” or “applications”. • Loaded from Secondary Storage into Primary Memory. • Runs (executes) from RAM. • 1936 Turing’s universal machine. Programs are data. Software is loaded CPU executes instructions Hard Disk RAM Read / Write CPU COMPSCI 111 / 111G 2 2 File Formats •All data is stored as (binary) numbers •Data is organised in files (named collections of related data) •Method of encoding depends on the software, called the file format •File Formats •Defines the way that the numbers are interpreted •E.g. for a graphics file: “first the width, then the height, then all the pixel colour values line by line” •File Extensions •A dot followed by letters at the end of a file name •Most operating systems use the file extension to determine the file format Graphics .jpg , .png , .gif Video .mpg , .avi , .divx Sound .mp3 , .wma , .ogg Programs .exe , .com , .bat Text .txt , .doc Program Code .c , .java , .cs , .py COMPSCI 111 / 111G 3 3 Standards •Open Standard • Published openly • Free to use • Maintained by a "non-profit" organisation • E.g. HTML, PDF •Proprietary Standard • Intellectual property of an entity (individual / company) • Use of the standard is usually through a license • E.g. Adobe Flash, RealPlayer, some digital rights management (DRM) technologies • Risk for users: vendor lock-in COMPSCI 111 / 111G 4 4 .pdf files •PDF stands for ``portable document format”. Proprietary standard of Adobe Corp.
    [Show full text]
  • Tech Application Glossary
    Technology Applications Terminology # or Symbol 4th generation languages (4GL) Very high-level languages. These are results oriented and include database query languages A access slot Opening in the back of the computer to allow devices to connect to peripheral cards acoustical modem A modem in which the telephone handset is placed into the device, which is connected to the computer. activation code A code needed to 'activate' a newly installed program or service. This is different from a registration code, which shows that you bought the product. Activation codes are usually good for only one use. adapter card See expansion card ADSL A very fast data transfer method that uses normal phone lines to handle phone calls and data transfer at the same time. Download rates of 512 KBps up to 8MBps. add-on program Requires another program to be of any use analog signal Variations (modulations) in a signal used to convey information animation A sequence of images that are shown one after the other very quickly. The human eye and brain blend the images to produce the effect of motion. animation effect A motion applied to a slide or part of a slide in a presentation. antivirus program A program which finds and eliminates computer viruses application A computer program Arithmetic/Logic Unit (ALU) The part of the CPU that executes the computer's commands by doing arithmetic or the logical comparisons <(less than),> (greater than), and = (equal to). ASCII A code system for turning letters, numbers and symbols into digital data. Used for PCs. assembly language Abbreviations for machine language B background task A task of low priority.
    [Show full text]
  • The Pennsylvania State University the Graduate School College Of
    The Pennsylvania State University The Graduate School College of Information Sciences and Technology THE IMPACT OF PLATFORM CERTIFICATION ON A PLATFORM-BASED PRODUCT MARKET: THE CASE OF MOBILE APPLICATIONS A Dissertation in Information Sciences and Technology by Ankur Tarnacha Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy May 2008 The dissertation of Ankur Tarnacha was reviewed and approved* by the following: Carleen F. Maitland Assistant Professor of Information Sciences and Technology Dissertation Advisor Chair of Committee Steven B. Sawyer Associate Professor of Information Sciences and Technology Irene J. Petrick Professor of Practice of Information Sciences and Technology Thomas F. LaPorta Distinguished Professor of Computer Sciences and Engineering John Yen Associate Dean for Research and Graduate Programs Head of the Department of Information Sciences and Technology *Signatures are on file in the Graduate School iii ABSTRACT Complex Information and Communication technology (ICT) systems operating in diverse environments rely on technology platforms to ensure scalable product development and compatibility across the components that make up these systems. Recent times have witnessed an increasing use of certification programs that seek to evaluate the reliability and compatibility of platform-based products. While various studies have focused on the phenomenon of certification, the evolution and diffusion of platforms, and the influence of certification and platforms on industry structure per se; to date little is known about platform certification programs and their implications for firms that supply platform-based products. To address these gaps, this study examines platform certification by conceptualizing it as a market regulatory mechanism that is expected to influence the dynamics of the platform-based product market.
    [Show full text]