Free Essay

Osi Four Ways to Win

In:

Submitted By gogga
Words 293
Pages 2
Four Ways To Win
Now for a higher-level, investor's point of view. There are at least four known business models for making money with open source: 1. Support Sellers (otherwise known as "Give Away the Recipe, Open A Restaurant"): In this model, you (effectively) give away the software product, but sell distribution, branding, and after-sale service. This is what (for example) Red Hat does. 2. Loss Leader: In this model, you give away open-source as a loss-leader and market positioner for closed software. This is what Netscape is doing. 3. Widget Frosting: In this model, a hardware company (for which software is a necessary adjunct but strictly a cost rather than profit center) goes open-source in order to get better drivers and interface tools cheaper. Silicon Graphics, for example, supports and ships Samba. 4. Accessorizing: Selling accessories - books, compatible hardware, complete systems with open-source software pre-installed. It's easy to trivialize this (open-source T-shirts, coffee mugs, Linux penguin dolls) but at least the books and hardware underly some clear successes: O'Reilly Associates, and SSC are among them.
The open-source culture's exemplars of commercial success have, so far, been service sellers or loss leaders. Nevertheless, there is good reason to believe that the clearest near-term gains in open-source will be in widget frosting.
For widget-makers (such as semiconductor or peripheral-card manufacturers), interface software is not even potentially a revenue source. Therefore the downside of moving to open source is minimal.
(Frank Hecker of Netscape proposes more models and discusses them in detail in his paperSetting Up Shop.)
There are even, as it turns out, people willing to argue that the open-source model could work well economically for hardware design.

Similar Documents

Premium Essay

Office Supply

...Page 1 of 4 Case #8: Outsourcing at Office Supply Inc. Through the initial integration of information technology into its core business, Office Supply Incorporated (OSI) attained a large cost advantage over its competitors and reaped rewards in both profits and stock prices. Unfortunately, as Nicholas Carr outlines, IT is becoming more of a commodity for companies and less of a source for strategic differentiation. Moreover, lack of IT expertise within OSI has begun to inhibit the growth of business operations and rising IT costs are shrinking profits. Jim Anfield’s proposition for OSI to outsource its IT infrastructure to Technology Infrastructure Solutions (TIS) provides the opportunity to not only match the pace of business growth, but to cut costs and increase the reliability of service to OSI customers. Anfield’s detailed and careful analysis indicates both cost savings and support for growth, however in moving forward from this point TIS will need to work closely with OSI to avoid what Thomas Kern refers to as the “Winner’s Curse.” As Carr suggests, “When a resource becomes essential to competition but inconsequential to strategy, the risks it creates becomes more important than the advantages it provides.” OSI’s IT infrastructure is clearly essential to their success as it provides their customers with easy access to their products, however this does not necessarily mean it is essential to their strategy. More specifically, we can say that IT infrastructure is vital...

Words: 1490 - Pages: 6

Premium Essay

Microsoft

...M I C R O S O F T T E C H N O L O G Y A S S O C I AT E Student Study Guide EXAM 98-366 Networking Fundamentals Preparing for MTA Certification for Cert ca n Certification MICROSOFT TECHNOLOGY ASSOCIATE (MTA TECHNOLOGY ASSOCIATE (MTA) ECHNOLOGY C (MTA A) STUDENT STUDY GUIDE F UDY FOR IT PROS 98-366 Networking Fundamentals Authors Shari Due (Networking). Shari is an IT Network Specialist Instructor at Gateway Technical College in Racine, Wisconsin where she has worked for the past 15 years. Previously, she worked for Digital Equipment Corporation (DEC) in Elk Grove, Illinois. She holds a Bachelor of Science from the University of Wisconsin-Parkside in Math and Economics with a minor in Computer Science and a MBA from the University of Wisconsin-Eau Claire. Shari’s current industry certifications include: Comptia Server+, Linux+, A+, Network+, and i-Net+. Her past certifications include: MCSE-NT 4.0, CCNA, and Pathworks for Macintosh. She is a Cisco Certified Instructor for Cisco’s Network Academy and teaches the CCNA curriculum. She is the author of Advanced WordPerfect Using Macro Power: A Guide for VMS and DOS Users from Digital Press. Patricia Phillips (Lead Author and Project Manager). Patricia taught computer science for 20 years in Janesville, Wisconsin. She served on Microsoft’s National K-12 Faculty Advisory Board and edited the Microsoft MainFunction website for technology teachers for two years. For the past five years she has worked with Microsoft in...

Words: 12317 - Pages: 50

Free Essay

Clns

...Cisco Network Solutions for the Telco DCN: SONET/SDH OSI Environments This document is directed to competitive local exchange carriers (CLECs), incumbent local exchange carriers (ILECs), and Post, Telephone and Telegraphs (PTTs), collectively referred to as telcos (short for telephone companies). This document describes Cisco network solutions for transporting data between Synchronous Optical Network (SONET) and Synchronous Digital Hierarchy (SDH) and the Operations Support System (OSS) in a telco data communications network (DCN). The DCN transports network management traffic between network elements and their respective OSS, making them a vital link between the service network and the network operations center (NOC). The solutions presented in this document will help telcos connect their SONET/SDH network elements to a router-based network using the Open System Interconnection (OSI) protocol, which simplifies the DCN and reduces equipment costs. Version History Version Number 1 Date April 28, 2004 Notes This document was created as a joint effort between Don Schriner in the Cisco CTO Consulting Engineering Group and Alliene Turner in Cisco IOS Documentation. This document was updated. This document was updated. 2 3 May 6, 2005 January 3, 2008 Contents The document presents the recommended Cisco architecture for building the OSI network. Several methods for implementing and scaling an OSI network are included with detailed configuration examples. Specific...

Words: 28935 - Pages: 116

Free Essay

Exercise Java

...Programming Exercises For Chapter 2 -------------------------------------------------------------------------------- THIS PAGE CONTAINS programming exercises based on material from Chapter 2 of this on-line Java textbook. Each exercise has a link to a discussion of one possible solution of that exercise. http://www.java2s.clanteam.com -------------------------------------------------------------------------------- Exercise 2.1: Write a program that will print your initials to standard output in letters that are nine lines tall. Each big letter should be made up of a bunch of *'s. For example, if your initials were "DJE", then the output would look something like: ****** ************* ********** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ******** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ** ***** **** ********** See the solution! : visit this website http://java2s.clanteam.com/ -------------------------------------------------------------------------------- Exercise 2.2: Write a program that simulates rolling a pair of dice. You can simulate rolling one die by choosing one of the integers 1, 2...

Words: 18137 - Pages: 73

Premium Essay

Sql Quiz

...a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. The following articles provide information different LAN technologies: * Ethernet Technologies * Token Ring/IEEE 802.5 WAN Technologies A WAN is a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the...

Words: 217433 - Pages: 870

Premium Essay

Mba Hr

...Monday, April 21, 2008 Roche vs CIPLA: The Rhetoric of Patent Busting Roche, a multinational pharma company and CIPLA, a generic manufacturer from India. CIPLA brazenly defied Roche's patent over an anticancer drug, Tarceva and went ahead and introduced a generic version at 1/3rd the price. It claimed that the patent ought not have been granted in the first place. CIPLA's counsel, Arun Jaitley argued very persuasively in court that Roche's drug did not meet the requirements of section 3(d), a unique section introduced into India's patent regime in 2005 to prevent a phenomenon widely known as "evergreening". Under section 3(d), derivatives of existing pharmaceutical substances would not merit patent protection, unless such derivative was more "efficacious" than the earlier existing pharma substance. The section was challenged by Novartis as being violative of TRIPS and of the Indian constitution CIPLA also stressed that since the price differential between the patented drug and the generic version sold by CIPLA was extremely high, "public interest" demanded that no injunction be granted in favour of Roche. In a remarkably sophisticated and well researched judgment, Justice S Ravindra Bhat of the Delhi High Court ruled in favour of CIPLA. The matter is now under appeal. Unless Roche is able to demonstrate empirically that CIPLA's lower prices for Tarceva (the lung cancer drug in issue) does not really translate to increased access to poor patients, it is difficult...

Words: 7301 - Pages: 30

Premium Essay

Nothing

...TELECOMMUNICATION SWITCHING AND NETWORKS TElECOMMUNICATION SWITCHING NffiWRKS AND THIS PAGE IS BLANK Copyright © 2006, 2005 New Age International (P) Ltd., Publishers Published by New Age International (P) Ltd., Publishers All rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to rights@newagepublishers.com ISBN (10) : 81-224-2349-3 ISBN (13) : 978-81-224-2349-5 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com PREFACE This text, ‘Telecommunication Switching and Networks’ is intended to serve as a onesemester text for undergraduate course of Information Technology, Electronics and Communication Engineering, and Telecommunication Engineering. This book provides in depth knowledge on telecommunication switching and good background for advanced studies in communication networks. The entire subject is dealt with conceptual treatment and the analytical or mathematical approach is made only to some extent. For best understanding, more diagrams (202) and tables (35) are introduced wherever necessary in each chapter. The telecommunication switching is the fast growing field and enormous research and development are undertaken by...

Words: 115682 - Pages: 463

Premium Essay

Hello

...that refers to unauthorized data manipulation, system access, or privileged escalation. An all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. Unauthorized data retrieval is simply reading, writing, copying, or moving files that are not intended to be accessible to the intruder. Limiting the flow of information from the resources of a system to only the authorized persons or systems in the network. See ACE. access control Access Control Entry access control list See ACL. access device access layer Access Method Hardware component used in your signaling controller system: access server or mux. The point at which local end users are allowed into the network. 1.) Generally, the way in which network devices access the network medium. 2.) Software within an SNA processor that controls the flow of information through a network. Defines access rights and privileges for the network users. The access policy should provide guidelines for connecting external networks, connecting devices to a network, and adding new software to systems. The remote computer system which connects a personal computer to the Internet. Access Virtual Private Network. A Virtual Private Network (VPN) that provides remote access to a corporate intranet or extranet over a shared infrastructure with the same policies as a private network. Access VPNs encompass analog, dial, ISDN, Digital Subscriber Line (DSL), mobile IP, and cable technologies to securely...

Words: 23221 - Pages: 93

Premium Essay

Ccna

...specific icons Cisco uses to represent network devices and connections. Represents Icon Hub Bridge Switch Router Access point Network cloud Ethernet connection Serial Line connection Wireless connection Virtual Circuit The OSI Model As you study this section, answer the following questions:       What is the OSI model and why is it important in understanding networking? How does the third OSI model layer relate to administering routers? Which OSI model layer is concerned with MAC addresses? What protocols correspond to the Presentation and Session layers? What is the difference between the TCP and UDP protocols? What is the EIA/TIA 232 protocol concerned with? This section covers the following exam objectives:    103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach OSI Model Facts The OSI model classifies and organizes the tasks that hosts perform to prepare data for transport across the network. You should be familiar with the OSI model because it is the most widely used method for understanding and talking about network communications. However, remember that it is only a theoretical model that defines standards for programmers and network...

Words: 73801 - Pages: 296

Premium Essay

Term Paper

...Ethernet cards are essential parts of a network. They connect a computer to another computer or to a server by using a cable, an alternative to a wireless network. Ethernet Network – The Role of Ethernet in Computer Networks An ethernet network is a situation in which multiple computers are connected to one another and share the same Internet protocol address. An ethernet network has multiple computers on the same server. The benefit in this is that multiple networks do not need to be created. The downside to an ethernet network is that the connection of multiple computers leaves each computer open to hacking, malware, and viruses — in the event that a virus should attack one computer on the system. There are certain components necessary for an ethernet network: * Ethernet cable * Ethernet hub * Crossover cable * Router Ethernet Cable An ethernet cable is a necessary cord to connect two or more computers to the same network. Each computer must have its own ethernet cable in order to operate on the same ethernet network. Ethernet Hub An ethernet hub is a device used to string together each ethernet cable, which connects each computer on the same network. An ethernet hub contains several ethernet ports. Crossover Cable A crossover cable is a substitute for ethernet cables when one wants to connect two or more computers to the same ethernet network. Router A router is similar to an ethernet cable in that it connects two or more devices. Routers are more often used for...

Words: 9787 - Pages: 40

Premium Essay

Computer Engineer

...* CCNA Routing & Switching 200-120 * Chapter 1 – Understanding Networks and their Building Blocks * 1-1 Introduction to Networks * 1-2 Networking Types * 1-3 OSI Reference Model * 1-4 TCP/IP Model * 1-5 Ethernet Technologies and Cabling * 1-6 Cisco 3 Layer Model * 1-7 Summary * Chapter 2 – IP Addressing and Subnets * 2-1 IP Addresses – Composition, Types and Classes * 2-2 Private and Public IP addresses * 2-3 Subnetting * 2-4 Variable Length Subnet Masks (VLSM) * 2-5 Route Summarization * 2-6 Troubleshooting IP Addressing * Chapter 3 Introduction to Cisco Routers, Switches and IOS * 3-1 Introduction to Cisco Routers, Switches, IOS & the Boot Process * 3-2 Using the Command-Line Interface (CLI) * 3-3 Basic Configuration of Router and Switches * 3-4 Configuring Router Interfaces * 3-5 Gathering Information and Verifying Configuration * 3-6 Configuring DNS & DHCP * 3-7 Saving, Erasing, Restoring and Backing up Configuration & IOS File * 3-8 Password Recovery on a Cisco Router * 3-9 Cisco Discovery Protocol (CDP) * 3-10 Using Telnet on IOS * 3-11 CCNA Lab #1 * Chapter 4 Introduction to IP Routing * 4-1 Understanding IP Routing * 4-2 Static, Default and Dynamic Routing * 4-3 Administrative Distance and Routing...

Words: 95744 - Pages: 383

Premium Essay

Security Analyst

...Contents 1. Introduction 2. Assessment Test 3. Chapter 1: Getting Started with Ethical Hacking 1. Hacking: A Short History 2. What Is an Ethical Hacker? 3. Summary 4. Exam Essentials 5. Review Questions 4. Chapter 2: System Fundamentals 1. Exploring Network Topologies 2. Working with the Open Systems Interconnection Model 3. Dissecting the TCP/IP Suite 4. IP Subnetting 5. Hexadecimal vs. Binary 6. Exploring TCP/IP Ports 7. Understanding Network Devices 8. Working with MAC Addresses 9. Intrusion Prevention and Intrusion Detection Systems 10. Network Security 11. Knowing Operating Systems 12. Backups and Archiving 13. Summary 14. Exam Essentials 15. Review Questions 5. Chapter 3: Cryptography 2 1. Cryptography: Early Applications and Examples 2. Cryptography in Action 3. Understanding Hashing 4. Issues with Cryptography 5. Applications of Cryptography 6. Summary 7. Exam Essentials 8. Review Questions 6. Chapter 4: Footprinting and Reconnaissance 1. Understanding the Steps of Ethical Hacking 2. What Is Footprinting? 3. Terminology in Footprinting 4. Threats Introduced by Footprinting 5. The Footprinting Process 6. Summary 7. Exam Essentials 8. Review Questions 7. Chapter 5: Scanning Networks 1. What Is Network Scanning? 2. Checking for Live Systems 3. Checking for Open Ports 4. Types of Scans 5. OS Fingerprinting 6. Banner Grabbing 7. Countermeasures 8. Vulnerability Scanning 9. Drawing Network Diagrams 10. Using Proxies 11. Summary 12. Exam Essentials 13. Review Questions...

Words: 71242 - Pages: 285

Free Essay

Hacking the Art of Exploitation

...2nd Edition Hacking the art of exploitation jon erickson PRAISE FOR THE FIRST EDITION OF HACKING: THE ART OF EXPLOITATION “Most complete tutorial on hacking techniques. Finally a book that does not just show how to use the exploits but how to develop them.” —PHRACK “From all the books I’ve read so far, I would consider this the seminal hackers handbook.” —SECURITY FORUMS “I recommend this book for the programming section alone.” —UNIX REVIEW “I highly recommend this book. It is written by someone who knows of what he speaks, with usable code, tools and examples.” —IEEE CIPHER “Erickson’s book, a compact and no-nonsense guide for novice hackers, is filled with real code and hacking techniques and explanations of how they work.” —COMPUTER POWER USER (CPU) MAGAZINE “This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly.” —ABOUT.COM INTERNET/NETWORK SECURITY ® San Francisco HACKING: THE ART OF EXPLOITATION, 2ND EDITION. Copyright © 2008 by Jon Erickson. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed on recycled paper in the United States of America 11 10 09 08 07 123456789 ISBN-10: 1-59327-144-1 ISBN-13: 978-1-59327-144-2 Publisher:...

Words: 139438 - Pages: 558

Premium Essay

Computer

...This page intentionally left blank Copyright © 2008, New Age International (P) Ltd., Publishers Published by New Age International (P) Ltd., Publishers All rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to rights@newagepublishers.com ISBN (13) : 978-81-224-2631-1 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com This page intentionally left blank Table Of Contents PART I (Computer Application Theory) 1 Introduction To Computer .........................................................1 History Of Computer .................................................................................................. 1 Generations Of Computer ........................................................................................... 7 First Generation Computers........................................................................... 7 Second Generation Computers ...................................................................... 7 Third Generation Computers ......................................................................... 8 Fourth Generation Computers .......................................................

Words: 60713 - Pages: 243

Premium Essay

Research

...Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States SEVENTH EDITION Data Communications and Computer Networks A Business User’s Approach Curt M. White DePaul University Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition Curt M. White Editor-In-Chief: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Editorial Assistant: Courtney Bavaro Marketing Director: Keri Witman Marketing Manager: Adam Marsh Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Media Editor: Chris Valentine Art and Cover Direction, Production Management, and Composition: PreMediaGlobal Cover Credit: © Masterfile Royalty Free Manufacturing Coordinator: Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance...

Words: 234459 - Pages: 938