How should knowledge be managed in global software development projects? To answer this question, the authors draw on established software engineering research and study three focus groups in two global companies, discussing which knowledge management approaches are appropriate.
Moving toward the open innovation (OI) model requires multifaceted transformations within companies. It often involves giving away the tools for product development or sharing future product directions with open tools ecosystems. Moving from the traditional closed innovation model toward an OI model for software development tools shows the potential to increase software development competence and efficiency of organizations. We report a case study in software-intensive company developing embedded devices (e.g., smartphones) followed by a survey in OSS communities such as Gerrit, Git, and Jenkins. The studied branch focuses on developing Android phones. This paper presents contribution strategies and triggers for openness. These strategies include avoid forking OSS tools, empower developers to participate in the ecosystem, steer ecosystems through contributions, create business through differentiation, and create new ecosystems. The triggers of openness are from 30 different companies with examples. Finally, openness requires a cultural change aligned with strategies and business models. © 1999-2012 IEEE.
The IEEE 802.11 wireless standard provides little support for secure access control. As a result, access control in IEEE 802.11 on a per packet basis requires a new and robust identity authentication protocol. The SOLA (Statistical One-Bit Lightweight Authentication) protocol is well suited in a wireless constrained environment because this protocol's communication overhead is extremely low: only one bit. Furthermore, SOLA fulfills the requirements of being secure, useful, cheap, and robust. The synchronization algorithm performs very well. SOLA also makes it easy to develop a framework to detect and respond to, for instance, denial-of-service attacks or an adversary who tries to guess the identity authentication bit for successive packets.