4 research outputs found

    Commercial open source software companies: what drives the popularity of open source projects?

    Get PDF
    This thesis identifies issues regarding the commercialization of open source software. Moreover, the largest open source software platform GitHub is scanned for recently created projects as some have the potential to be commercially successful. More than 15.000projectswere obtained and analyzed using regressions and simple machine learning models to determine variables that influence popularity. Additionally, projects created by individuals and organizations are compared. Furthermore, patterns of popularity growth of the most popular projects are shown. The results should provide valuable information for venture capitalists seeking for investment opportunities in the software market

    The effect of competition from open source software on the quality of proprietary software in the presence of network externalities

    Get PDF
    Purpose: A growing number of open source software emerges in many segments of the software market. In addition, software products usually exhibit network externalities. The purpose of this paper is to study the impact of open source software on the quality strategies of proprietary software vendors when the market presents positive network externalities. Design/methodology/approach: To analyze how open source software affects the quality of proprietary software, this paper constructs two vertical differentiation models: the basic model considers proprietary software monopolizing the market, and the extended model considers proprietary software competing with open source substitute. Findings: This paper mainly finds that the presence of open source software does not necessarily lead to the improvement of proprietary software quality. The network externalities and the compatibility between open source and proprietary software can change the impact of open source software on the quality of proprietary software and affect the quality strategies of proprietary software vendors under certain conditions. Originality/value: The main contribution of this paper is to examine the effect of open source software on the quality strategies for proprietary software vendors in software markets with network externalities.Peer Reviewe

    Competition between Free Open Source, Commercial Open Source and Proprietary Software

    No full text

    Marco de trabajo para el diseño e implementación de un SOC “Security Operation Center” usando herramientas de código abierto para Pymes

    Get PDF
    El Centro de Operaciones de Seguridad, conocido como "SOC," consiste en un grupo de operaciones donde se integran recursos humanos y recursos tecnológicos para poder monitorear y gestionar los incidentes de seguridad informática que un cliente de servicios de TI pueda experimentar. El objetivo de un equipo de SOC es identificar, evaluar y responder a los incidentes de seguridad informática mediante el uso de herramientas tecnológicas y la aplicación de procesos y procedimientos establecidos a través de marcos de referencia. Esto se hace para garantizar la cobertura de las necesidades de seguridad de los sistemas de información de las organizaciones. Estas herramientas deben permitir la gestión de la seguridad informática, el seguimiento de los incidentes, la detección y prevención de intrusiones, así como la implementación de la inteligencia de amenazas. Por lo tanto, se requieren sistemas como IPS, WAF, MFA, ADC y PAM, entre otras tecnologías, que eviten el acceso y los ataques a la infraestructura de las organizaciones. Sin embargo, debido a los costos asociados con la implementación y puesta en marcha de este tipo de esquemas, las empresas de tipo PYME no pueden costear proyectos de esta naturaleza. Por lo tanto, una decisión clave que debe tomarse con cuidado es la creación de un equipo de seguridad que puede implementarse reduciendo los costos asociados a las herramientas propias de estos proyectos mediante el uso de plataformas de código abierto.The Security Operations Center, known as "SOC," consists of an operations group where human resources and technological resources are integrated to monitor and manage cybersecurity incidents that a client of IT services may experience. The goal of a SOC team is to identify, assess, and respond to cybersecurity incidents using technological tools and established processes and procedures based on reference frameworks. This is done to ensure coverage of the security needs of organizations' information systems. These tools should enable the management of cybersecurity, incident tracking, intrusion detection and prevention, as well as the implementation of threat intelligence. Therefore, systems such as IPS, WAF, MFA, ADC, and PAM, among other technologies, are required to prevent access and attacks on the infrastructure of organizations. However, due to the costs associated with implementing and launching such schemes, small and medium-sized enterprises (SMEs) cannot afford projects of this nature. Hence, a key decision that must be made carefully is the creation of a security team that can be implemented, reducing the costs associated with the tools used in these projects by utilizing open-source platforms
    corecore