497 research outputs found

    PRODUCT STRATEGIES AND STARTUPS’ SURVIVAL IN TURBULENT INDUSTRIES: EVIDENCE FROM THE SECURITY SOFTWARE INDUSTRY

    Get PDF
    This paper seeks to explore the drivers of startups’ survival in turbulent industries, characterized by high rates of entry and exit, fragmented market shares, and a rapid pace of product innovation. Specifically, the paper aims to underscore the role played by post-entry product strategies, along with their interaction, beyond that of pre-entry conditions. Based on a sample of 270 startups that entered the Security Software Industry from 1989 till 1998, we find evidence that surviving entities are those that more aggressively adopt versioning and product portfolio strategies. Interesting enough, strategic learning seems to play a major role: Focusing on one of the two product strategies commands a higher survival probability than adopting a mixed strategy.

    Product strategies and survival in schumpeterian environments: evidence from the US security software industry.

    Get PDF
    This paper seeks to explore the drivers of survival in environments characterized by high rates of entry and exit, fragmented market shares, rapid pace of product innovation and proliferation of young ventures. The paper aims to underscore the role played by postentry product strategies, along with their interaction, after carefully controlling for "at entry" factors and demographic conditions. Based on a population of 270 firms that entered the US security software industry between 1989 and 1998, we find evidence that surviving entities are those that are more aggressive in the adoption of versioning and portfolio broadening strategies. In particular, focusing on any one of these two strategies leads to a higher probability of survival as opposed to adopting a mixed strategy.Survival; Versioning; Portfolio broadening; Young ventures; Sotware;

    Layering in Provenance Systems

    Get PDF
    Digital provenance describes the ancestry or history of a digital object. Most existing provenance systems, however, operate at only one level of abstraction: the sys- tem call layer, a workflow specification, or the high-level constructs of a particular application. The provenance collectable in each of these layers is different, and all of it can be important. Single-layer systems fail to account for the different levels of abstraction at which users need to reason about their data and processes. These systems cannot integrate data provenance across layers and cannot answer questions that require an integrated view of the provenance. We have designed a provenance collection structure facilitating the integration of provenance across multiple levels of abstraction, including a workflow engine, a web browser, and an initial runtime Python provenance tracking wrapper. We layer these components atop provenance-aware network storage (NFS) that builds upon a Provenance-Aware Storage System (PASS). We discuss the challenges of building systems that integrate provenance across multiple layers of abstraction, present how we augmented systems in each layer to integrate provenance, and present use cases that demonstrate how provenance spanning multiple layers provides functionality not available in existing systems. Our evaluation shows that the overheads imposed by layering provenance systems are reasonable.Engineering and Applied Science

    BlogForever D2.4: Weblog spider prototype and associated methodology

    Get PDF
    The purpose of this document is to present the evaluation of different solutions for capturing blogs, established methodology and to describe the developed blog spider prototype

    Building regulatory compliant storage systems

    Full text link
    In the past decade, informational records have become entirely digital. These include financial statements, health care records, student records, private consumer information and other sensitive data. Because of the delicate nature of the data these records contain, Congress and the courts have begun to recognize the importance of properly storing and securing electronic records. Examples of legislation in-clude the Health Insurance Portability and Accountabilit

    A primer on provenance

    Get PDF
    Better understanding data requires tracking its history and context.</jats:p

    JISC Preservation of Web Resources (PoWR) Handbook

    Get PDF
    Handbook of Web Preservation produced by the JISC-PoWR project which ran from April to November 2008. The handbook specifically addresses digital preservation issues that are relevant to the UK HE/FE web management community”. The project was undertaken jointly by UKOLN at the University of Bath and ULCC Digital Archives department
    • …
    corecore