RNTL Project. “New Economic Models, New Software Industry Economy”

Total Page:16

File Type:pdf, Size:1020Kb

RNTL Project. “New Economic Models, New Software Industry Economy” FINAL REPORT. RNTL project. “New Economic Models, New Software Industry Economy”. Managed by Nicolas JULLIEN, Mélanie CLÉMENT-FONTAINE, Jean-Michel DALLE. Realized thanks to the financial support from the French National Network for Software Technologies. Contents 1 The economic and legal context of a new software economy. 1 The economic and legal context of a new software economy. 1 1.1 Free software: a driving force. 2 1.1.1 The evolution of the IT production system. 3 1.1.2 Free software: a new advance in information technology? . 6 1.2 Producing and developing free software programs. 12 1.2.1 Developing standard software programs and valorizing in-house software programs. 12 1.2.2 Valorizing software programs which stem from public research. 13 1.2.3 Inventing free software program markets. 14 1.3 The future legal framework for the production of software programs. 20 I Studies on the evolution of computer industry: how do “free software companies” present themselves? 25 2 The manufacturers: the exemple of IBM. 27 2.1 A few reminders. 28 2.2 Strategy. 29 2.3 Products and services offered. 31 2.4 The community . 32 2.5 Economic model. 32 2.6 The necessary promotion. 34 2.7 A story about men and women. 34 2.8 IBM and the others. 34 3 The editors: ACT Europe. 37 3.1 A few reminders. 38 3.2 Strategy. 39 3.3 Products and services offered. 40 3.4 Economic model. 43 ii CONTENTS 3.5 A story about men and women. 45 3.6 As a conclusion. 45 4 The editors: MandrakeSoft. 47 4.1 MandrakeSoft. 48 4.1.1 Activity. 48 4.1.2 History. 49 4.1.3 Products. 49 4.1.4 The consulting offer. 50 4.1.5 The training offer. 51 4.1.6 The support offer. 51 4.1.7 Competitors. 51 4.1.8 Explications for a success. 52 4.2 Possition in the Community. 53 4.3 Strategy. 54 4.4 Economic model. 54 4.4.1 Stock market listing. 54 4.4.2 Mandrake in the beginning of 2002. 55 4.4.3 Creation of an Users’ club. 56 4.5 A story about men and women. 57 4.6 Interactions. 58 4.6.1 Free Software Foundation (FSF) Europe. 58 4.6.2 GNOME Foundation. 58 4.6.3 KDE League. 59 4.6.4 KDE. 59 4.6.5 Plex86. 59 4.6.6 Bastille Linux. 59 4.6.7 Prelude. 60 4.6.8 RpmLint. 60 4.6.9 Urpmi. 60 4.6.10 PHP-Nuke. 60 4.6.11 Development of Kernel Linux. 60 5 The Free Software Service Companies: the exemple of Makina Corpus. 63 5.1 Makina Corpus . 64 5.1.1 Activity . 64 5.1.2 Competitors . 67 5.2 The place of the Community . 67 CONTENTS iii 5.3 Promoting Free Software programs . 68 5.3.1 The necessary promotion . 68 5.3.2 Licenses . 69 5.4 Strategy . 70 5.5 Economic model . 70 5.6 A story of men and women . 71 5.6.1 Organization . 72 5.6.2 Who are they? . 74 5.6.3 Recruitment . 76 5.7 Interactions . 76 II Economical Analysis of software production strategies of valorisation. 79 6 Free Software Service Companies: the Emergence of an Alternative Production System within the Software Industry? 81 6.1 Managing the uncertainty of the market: which competitive edge for the SSLL? . 83 6.1.1 How do the SSLLs fit in their competitive environment? . 83 6.1.2 How do SSLLs fit in? Competitive advantages, market segments, types of services. 86 6.2 The implementation of the production system: the sslls’ Organisational Specificities. 90 6.2.1 Organizing the production of services - SSLLs: between the community and the market. 90 6.2.2 Manage the uncertainty of work: an arbitration between rules and freedoms. 93 7 Company strategies for the freeing of a software source code: opportunities and difficulties. 99 7.1 Open Cascade. 103 7.1.1 The historical background of Open Cascade . 103 7.1.2 Decision-making and necessary investments. 105 7.1.3 Preliminary results. 106 7.2 The freeing of E.D.F.’s Code Aster Source Code. 110 7.2.1 The history of Code Aster. 110 7.2.2 Preliminary results. 112 7.3 First lessons. 114 7.3.1 Constrained strategies. 114 7.3.2 Software computer scientists: a layer model. 115 7.3.3 The Search for a Standard. 116 7.3.4 Limited successes must not mask the difficulty of adapting oneself to unedited eco- nomic models. 116 7.3.5 More social than private benefits, at least in the short run. 119 7.4 Conclusion. 120 iv CONTENTS 8 Licences: strategic tools for software publishers? 123 8.1 Characteristics of the software industry: increasing output and standardization. 124 8.1.1 Characteristics of a network industry. 125 8.1.2 Strategies benefiting from feedback effect. 126 8.2 License strategies: a typology. 127 8.2.1 A few concepts. ..
Recommended publications
  • Licensing 101 December 3, 2020 Meet the Speakers
    Licensing 101 December 3, 2020 Meet The Speakers Sushil Iyer Adam Kessel Principal Principal fr.com | 2 Roadmap • High level, introductory discussion on IP licensing • Topics – Types of IP – Monetization strategies – Key parts of a license agreement – Certain considerations • Licensing software, especially open source software • Licensing pharmaceutical patents • Trademarks • Trade secrets • Know-how fr.com | 3 Types of IP Patents Trademarks Copyrights Know-how (including trade secrets) fr.com | 4 Monetization Strategies • IP licensing – focus of this presentation – IP owner (licensor) retains ownership and grants certain rights to licensee – IP licensee obtains the legal rights to practice the IP – Bundle of rights can range from all the rights that the IP owner possesses to a subset of the same • Sale – IP owner (assignor) transfers ownership to the purchaser (assignee) • Litigation – Enforcement, by IP owner, of IP rights against an infringer who impermissibly practices the IP owner’s rights – Damages determined by a Court fr.com | 5 What is an IP License? • Contract between IP owner (Licensor) and Licensee – Licensor’s offer – grant of Licensor’s rights in IP • Patents – right to sell products that embody claimed inventions of Licensor’s US patents • Trademarks – right to use Licensor’s US marks on products or when selling products • Copyright – right to use and/or make derivative works of Licensor’s copyrighted work • Trade Secret – right to use and obligation to maintain Licensor’s trade secret – Licensee’s consideration – compensation
    [Show full text]
  • IBM Websphere Studio Application Developer for Windows, Version 4.0 Helps Java Developers to Build, Test, and Deploy J2EE-Based E-Business Applications
    Software Announcement November 6, 2001 IBM WebSphere Studio Application Developer for Windows, Version 4.0 Helps Java Developers To Build, Test, and Deploy J2EE-based e-business Applications Overview flexible source control management, pluggable At a Glance Introducing IBM′s premier Java repositories, as well as adapters development environment for for Concurrent Versioning System WebSphere Studio Application professional developers, the first (CVS) and for Rational ClearCase Developer for Windows, V4.0 product in the WebSphere Studio LT (CCLT) (Application Developer) provides product suite, WebSphere Studio • A comprehensive visual XML an advanced development Application Developer for development environment, environment for J2EE application Windows , V4.0 (Application including components for building development. Developer). DTDs, XML Schemas, XML files, and XSL style sheets Application Developer offers the Application Developer is built on the • Built-in WebSphere test following key functions: WebSphere Studio Workbench, an environment • integrated platform designed to A powerful Java development provide a common set of services Application Developer is next environment, that includes and frameworks unparalleled generation technology for support for JDK 1.3, a development tool integration and VisualAge for Java Enterprise configurable runtime, tool construction. Edition. It combines many popular incremental compilation, features of VisualAge for Java scrapbook, dynamic debugging, Application Developer includes the Enterprise Edition and WebSphere and a Java text editor • following functions: Studio Advanced Edition integrated Advanced Web, Java, and XML development environments • on top of WebSphere Studio An advanced development Workbench. designed to J2SE and J2EE environment for J2EE application specifications development that meets J2SE and Application Developer is focused on • A Relational Schema Center J2EE specifications and EJB optimizing J2EE application (RSC) focused on relational development and deployment and development.
    [Show full text]
  • End User License Agreement
    MICROSOFT SOFTWARE LICENSE TERMS WINDOWS EMBEDDED STANDARD 7 These license terms are an agreement between you and YSI incorporated. Please read them. They apply to the software included on this device. The software also includes any separate media on which you received the software. The software on this device includes software licensed from Microsoft Corporation or its affiliate. The terms also apply to any Microsoft • updates, • supplements, • Internet-based services, and • support services for this software, unless other terms accompany those items. If so, those terms apply. If you obtain updates or supplements directly from Microsoft, then Microsoft, and not YSI incorporated, licenses those to you. As described below, using the software also operates as your consent to the transmission of certain computer information for Internet-based services. By using the software, you accept these terms. If you do not accept them, do not use the software. Instead, contact YSI incorporated to determine its return policy for a refund or credit. If you comply with these license terms, you have the rights below. 1. USE RIGHTS Use. The software license is permanently assigned to the device with which you acquired the software. You may use the software on the device. 2. ADDITIONAL LICENSING REQUIREMENTS AND/OR USE RIGHTS a. Specific Use. YSI incorporated designed the device for a specific use. You may only use the software for that use. b. Other Software. You may use other programs with the software as long as the other programs directly supports the manufacturer’s specific use for the device, or provide system utilities, resource management, or anti-virus or similar protection.
    [Show full text]
  • Software Licensing in the Cloud Age Solving the Impact of Cloud Computing on Software Licensing Models
    The International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, Special Issue: The Proceeding of International Conference on Soft Computing and Software Engineering 2013 [SCSE’13], San Francisco State University, CA, U.S.A., March 2013 Doi: 10.7321/jscse.v3.n3.60 e-ISSN: 2251-7545 Software Licensing in the Cloud Age Solving the Impact of Cloud Computing on Software Licensing Models Malcolm McRoberts Enterprise Architecture Core Technology Center Harris Corporation GCSD Melbourne, Florida, USA [email protected] Abstract—Cloud computing represents a major shift in identify key issues that require the attention of the industry information systems architecture, combining both new as a whole. deployment models and new business models. Rapid provisioning, elastic scaling, and metered usage are essential A. Characteristics of Cloud Computing (Benefits) characteristics of cloud services, and they require cloud According to the National Institute of Standards and resources with these same characteristics. When cloud services Technology (NIST) [1], cloud computing is a model for depend on commercial software, the licenses for that software enabling ubiquitous, convenient, on-demand network access become another resource to be managed by the cloud. This to a shared pool of configurable computing resources (e.g., paper examines common licensing models, including open networks, servers, storage, applications, and services) that source, and how well they function in a cloud services model. It can be rapidly provisioned and released with minimal discusses creative, new, cloud-centric licensing models and how management effort or service provider interaction. they allow providers to preserve and expand their revenue This translates to a number of benefits for large and small streams as their partners and customers transition to the organizations alike, as well as for individuals.
    [Show full text]
  • Mcafee Potentially Unwanted Programs (PUP) Policy March, 2018
    POLICY McAfee Potentially Unwanted Programs (PUP) Policy March, 2018 McAfee recognizes that legitimate technologies such as commercial, shareware, freeware, or open source products may provide a value or benefit to a user. However, if these technologies also pose a risk to the user or their system, then users should consent to the behaviors exhibited by the software, understand the risks, and have adequate control over the technology. McAfee refers to technologies with these characteristics as “potentially unwanted program(s),” or “PUP(s).” The McAfee® PUP detection policy is based on the process includes assessing the risks to privacy, security, premise that users should understand what is being performance, and stability associated with the following: installed on their systems and be notified when a ■ Distribution: how users obtain the software including technology poses a risk to their system or privacy. advertisements, interstitials, landing-pages, linking, PUP detection and removal is intended to provide and bundling notification to our users when a software program or technology lacks sufficient notification or control over ■ Installation: whether the user can make an informed the software or fails to adequately gain user consent to decision about the software installation or add- the risks posed by the technology. McAfee Labs is the ons and can adequately back out of any undesired McAfee team responsible for researching and analyzing installations technologies for PUP characteristics. ■ Run-Time Behaviors: the behaviors exhibited by the technology including advertisements, deception, and McAfee Labs evaluates technologies to assess any impacts to privacy and security risks exhibited by the technology against the degree of user notification and control over the technology.
    [Show full text]
  • FLOSS Final Report – Part 3 Free/Libre Open Source Software: Survey and Study
    FLOSS Final Report – Part 3 Free/Libre Open Source Software: Survey and Study Basics of Open Source Software Markets and Business Models Berlin, July 2002 3 BERLECON RESEARCH GmbH Oranienburger Str. 32 10117 Berlin Tel.: +49 30 285296-0 Fax: +49 30 285296-29 Web: http://www.berlecon.de Email: [email protected] Acknowledgements: This work was prepared by Dorit Spiller and Thorsten Wichmann from Berlecon Research. It is part of the final report for the project „FLOSS – Free/Libre Open Source Software: Survey and Study“, which was financed under the European Com- mission‘s IST programme, key action 4 as accompanying measure (IST-2000-4.1.1). Disclaimer: The views expressed in this report are those of the authors and do not necessarily re- flect those of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use that might be made of the following information. Nothing in this report implies or expresses a warranty of any kind. Results from this report should only be used as guidelines as part of an overall strategy. For detailed ad- vice on corporate planning, business processes and management, technology integra- tion and legal or tax issues, the services of a professional should be obtained. Names and trademarks mentioned in the report are the property of their respective owners. © 2002 by Berlecon Research GmbH. 4 V 1.1 - 020905 © 2002 by Berlecon Research GmbH. 5 Table of contents 1 Introduction....................................................................................................... 9 2 Software and the Open Source phenomenon.................................................... 11 2.1 The Open Source phenomenon .................................................................
    [Show full text]
  • Steve French IBM – Linux Technology Center
    IBM Server & Technology Group Linux Kernel Clients: A Year in Review “Man-Eating Seals of Antiquity” to “Sheep on Meth” Steve French IBM – Linux Technology Center Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 Legal Statement –This work represents the views of the author(s) and does not necessarily reflect the views of IBM Corporation –A full list of U.S. trademarks owned by IBM may be found at http://www.ibm.com/legal/copytrade.shtml. –Linux is a registered trademark of Linus Torvalds. –Other company, product, and service names may be trademarks or service marks of others. 2 IBM Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 Who am I? –Steve French ([email protected] or [email protected]) –Author and maintainer of Linux cifs vfs (for accessing Samba, Windows and various SMB/CIFS based NAS appliances) –Wrote initial SMB2 kernel client prototype –Member of the Samba team, coauthor of CIFS Technical Reference and former SNIA CIFS Working Group chair –Architect: Filesystems/NFS/Samba for IBM LTC IBM Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 • Last September Kernel version 2.6.31: • [Since 2.6.34] Now we have • “Man-Eating Seals of Antiquity” 2.6.36-rc4 – 2.6.31 came out on September 9th, 2009 • “Sheep on Meth” 4 IBM Linux Technology Center © 2010 IBM Corporation SNIA SDC 2010 Development on Linux kernel clients is very active • 187 kernel changesets for cifs since 2.6.31 (typical year) • But … improvements to related tools have accelerated dramatically: in a few month period early this year 100+ changesets in mount helper and related utilities were merged • And smb2 development accelerated … – A month after SambaXP last year, public git tree for smb2 development created on kernel.org – More than 130 kernel changesets for smb2 since January – SMB2 module now close to full function but 30% smaller (17188 lines of code, CIFS is now 24447 LOC).
    [Show full text]
  • An Introduction to Malware
    Downloaded from orbit.dtu.dk on: Sep 24, 2021 An Introduction to Malware Sharp, Robin Publication date: 2017 Document Version Publisher's PDF, also known as Version of record Link back to DTU Orbit Citation (APA): Sharp, R. (2017). An Introduction to Malware. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. An Introduction to Malware Robin Sharp DTU Compute Spring 2017 Abstract These notes, written for use in DTU course 02233 on Network Security, give a short introduction to the topic of malware. The most important types of malware are described, together with their basic principles of operation and dissemination, and defenses against malware are discussed. Contents 1 Some Definitions............................2 2 Classification of Malware........................2 3 Vira..................................3 4 Worms................................
    [Show full text]
  • Urpmi.Addmedia
    Todo lo que siempre quisiste saber sobre urpmi pero nunca te atreviste a preguntarlo Todo lo que siempre quisiste saber sobre urpmi pero nunca te atreviste a preguntarlo Traducido por Willy Walker de http://mandrake.vmlinuz.ca/bin/view/Main/UsingUrpmi Descargalo en PDF Otros recursos para aprender sobre urpmi Urpmi es una importante herramienta para todos los usuarios de Mandriva. Tomate tiempo para aprender utilizarlo. Esta página te da una descripción de las opciones más comúnmente usadas. Debajo están otros recursos con una información más detallada sobre urpmi: ● http://www.urpmi.org/ : Página de buena documentación de urpmi en Francés y en Inglés. ● Páginas man: comprueba las páginas man para todas las opciones. Ésas son la fuente más actualizada de información. Junto a una introducción muy básica, esta página intenta cubrir lo qué no se cubre en las dos fuentes antedichas de información. Asumimos que sabes utilizar una página man y que has leído la página antedicha. Una vez que lo hayas hecho así, vuelve a esta página: hay más información sobre problemas no tan obvios que puede no funcionarte. Usando urpmi Lista rápida de tareas comunes Comando Que te dice urpmq -i xxx.rpm Información del programa urpmq -il xxx.rpm Información y los archivos que instala urpmq --changelog xxx.rpm changelog (cambios) urpmq -R xxx.rpm Que requiere este rpm urpmf ruta/a/archivo Que rpm proporciona este archivo rpm -q --whatprovides ruta/a/ similar a urpmf, pero trabaja con ambos hdlist.cz y synthesis.hdlist.cz archivo urpmi.update updates Actualizaciones disponibles desde sus fuentes de actualización Actualizaciones disponibles desde todas las fuentes urpmi (puede urpmc necesitar urpmi a urpmc primero) urpmq --list-media Lista los repositorios que tienes Todo lo que siempre quisiste saber sobre urpmi pero nunca te atreviste a preguntarlo Comando Que hace urpme xxxx Elimina el rpm (y dependencias) Muestra todos los rpms que coinciden con esta cadena.
    [Show full text]
  • Technical Support Services for Linux from IBM Robust Linux Support Solutions from an Industry Leader
    IBM Technical Support Services Technical Support Services for Linux from IBM Robust Linux support solutions from an industry leader IBM Technical Support Services (TSS) — Highlights Linux Support Summary • IBM’s Operational Support Services — Support Line for Linux is IBM Technical Support Services offers comprehensive, flexible support for Linux a remotely delivered support service designed to answer how-to and environments across all IBM hardware diagnostic questions. Services include: platforms as well as OEM Intel. – Assistance for Linux installation, configuration, usage, Business Impact technical questions, and code-related defects • Helps maximize the return on your Linux – Standard problem determination/resolution investment through increased reliability – Defect support and change team for emergency fixes • Designed to increase IT staff productivity with installation, configuration and – Call-back response from technicians in specialist area within how-to support 2 hours prime shift and 4 hours off shift • Leverage IBM skills and infrastructure to help – Per environment support based on total server count lower your overall Linux operational costs – Support for all IBM hardware platforms and OEM Intel IBM Value – Red Hat or SUSE Linux, IBM Director, VMware and US • Unmatched breadth, depth, reach Citizens support available • Unparalleled speed to resolution – Linux subscription options available • Access to relevant OEM vendors and IBM Linux Technology Center • Enhanced Services (i.e. Account Advocate, Enhanced Technical Support,
    [Show full text]
  • An Introduction to Linux and Open Source
    IBM Systems and Technology Group An Introduction to Linux and Open Source Jim Elliott Consulting Sales Specialist – System z Product Manager – System z Operating Systems IBM Canada Ltd. 1 SHARE 109 - Session 9200 2007-08-13 © 2007 IBM Corporation IBM Systems and Technology Group 9200 – An Introduction to Linux and Open Source Linux and Open Source continue to see substantial growth around the world This session will provide an overview of Open Source and an introduction to Linux (including concepts and terminology) Jim will also provide an overview of Novell's SUSE Linux Enterprise (SLE) 10 and Red Hat Enterprise Linux (RHEL) 5 2 SHARE 109 - Session 9200 2007-08-13 IBM Systems and Technology Group Topics Introduction to Open Source Introduction to Linux Novell SUSE Linux Enterprise 10 Red Hat Enterprise Linux 5 Linux and Open Source on the Web at IBM 3 SHARE 109 - Session 9200 2007-08-13 IBM Systems and Technology Group Linux user presentations on Wednesday All sessions on the 3rd floor, Ford A&B Session Speaker Title 9215 Marcy Cortes – Penguins Board the Stagecoach 1:30pm Wells Fargo for the Linux Frontier: A User Experience with Linux on zSeries 9230 Alain Leclerc – How to Rise Above the Challenges 3:00pm CSPQ and of Deploying z/VM and Linux on David Kreuter – the Mainframe and Thrive VM Resources 9231 Alain Leclerc – Building a Strong z/VM and Linux 4:30pm CSPQ and Architecture on the Mainframe David Kreuter – VM Resources 4 SHARE 109 - Session 9200 2007-08-13 IBM Systems and Technology Group Linux user presentations on Thursday
    [Show full text]
  • Introducing... the IBM Toolbox for Javatm
    Session Number: 403552 Introducing... The IBM Toolbox for Java TM Jeff Lee ([email protected]) © 2010 IBM Corporation IBM Power Systems IBM Toolbox for Java™ What is the Toolbox/JTOpen? A set of Java classes and utilities which provide access to IBM i® data and resources class { Integer id; String name; String address; BigDecimal balance; String ccnumber; String expdate; } 2 © 2010 IBM Corporation 1 IBM Power Systems IBM Toolbox for Java The big picture - Client/Server Your Java TM program IBM Toolbox for Java Java Virtual Machine TCP/IP IBM i Access for Windows is not required! TCP/IP IBM i Host Servers *PGM IFS IBM i data and resources DB2/400 *CMD 3 © 2010 IBM Corporation IBM Power Systems IBM Toolbox for Java The big picture - Toolbox and data on same IBM i Your JavaTM program IBM Toolbox for Java TCP/IP JNI IBM i Host Servers IFS *PGM IBM i data and resources DB2/400 *CMD 4 © 2010 IBM Corporation 2 IBM Power Systems IBM Toolbox for Java Using the Toolbox in client/server applications • Toolbox installed on client • Java application runs on client • IBM i Access for Windows is not required • The same Java application runs on any client with a Java-compatible JVM! TCP/IP • Server running IBM i • Uses existing IBM i host servers • IBM i Java Virtual Machine (JVM) is not required on the server 5 © 2010 IBM Corporation IBM Power Systems IBM Toolbox for Java Using the Toolbox in server applications • Toolbox installed on IBM i • Java application runs on IBM i • Use Toolbox instead of JNI • "Local" sockets used to communicate between Toolbox
    [Show full text]