Why Post-Launch Support and Maintenance is Critical for Software Success

shape
shape
shape
shape
shape
shape
shape
shape

Introduction

Software launches create a compelling narrative: months of development culminate in a product hitting production, and the company celebrates. The team moves on to the next project. This moment feels like completion.

It is actually the beginning.

A widespread misconception treats software development as a finite project. You build software, you launch it, you're done. This narrative persists because it's emotionally satisfying and simplifies budgeting conversations. But it is profoundly untrue.

Software is not a static artifact like a printed book. It is a living system requiring constant care. Operating systems evolve, creating compatibility issues. Security vulnerabilities emerge that must be patched. Users discover bugs the testing team missed. Business requirements change, necessitating feature updates. Technology stacks age, requiring upgrades to avoid obsolescence.

The companies that recognize this—treating post-launch support and maintenance as critical rather than optional—maintain competitive advantages. The companies that treat launch as the end suffer technical debt accumulation, security vulnerabilities, performance degradation, and ultimately, user abandonment.

The data is clear: 75% of organizations report that maintenance challenges directly impact product competitiveness. Yet many companies still underfund or neglect post-launch maintenance, discovering too late that decisions made at launch have consequences extending years into the future.

This article explores why post-launch support and maintenance is not optional overhead—it is strategic investment determining software longevity, security, competitiveness, and ultimately, business success.

The Hidden Reality: What Happens After Launch

The Post-Launch Surprise

Most companies discover post-launch maintenance needs within weeks:

Day One: System launches. Users discover the first bugs testing missed. Support tickets begin arriving.

Week One: An operating system update causes compatibility issues. Performance problems appear under real-world load. Security vulnerabilities are discovered by the community or (worse) by attackers.

Month One: The business wants new features based on user feedback. Dependencies need updating for security patches. Minor bugs that seemed insignificant during development now impact user experience.

Quarter One: Accumulated technical shortcuts made at launch to meet deadlines now require remediation. The cost of fixing them now far exceeds the cost of doing them correctly at launch.

Year One: The original codebase has accumulated so much technical debt that adding new features requires disproportionate effort. What should take weeks takes months. Developers spend more time navigating workarounds than building new capabilities.

This progression is not hypothetical—it is the norm. Companies consistently underestimate post-launch maintenance requirements, discovering that the period after launch requires comparable or greater resource investment than pre-launch development.

Why Post-Launch Maintenance Is Underestimated

Several factors conspire to make post-launch maintenance invisible to business decision-makers:

Launch Euphoria: The successful launch creates celebration and resource reallocation to new projects. Maintenance appears boring compared to building the next product.

Budget Completion Bias: Development budgets appear to complete at launch. Business leaders believe spending is finished, making maintenance budget requests seem like failure to plan adequately.

Invisible Until Crisis: Maintenance challenges emerge gradually. Slight performance degradation, slow feature delivery, and security patches don't generate urgency until something breaks catastrophically.

Deferred Costs: Underfunding maintenance doesn't create immediate crises—it defers costs to the future. Budget-conscious executives often choose to pay later rather than now, without understanding the interest accumulation on technical debt.

Misaligned Incentives: Development teams are often incentivized on feature delivery, not maintenance. A developer completing a feature on time has done their job well; a developer preventing future maintenance costs is invisible.

The Cost of Neglected Maintenance: Technical Debt

Understanding Technical Debt

Technical debt is a metaphor for the future costs incurred by choosing short-term solutions over optimal long-term approaches. Like financial debt, technical debt compounds—the longer it persists, the more expensive it becomes.

Examples of technical debt:

  • Hurried code: Code written quickly to meet launch deadlines is often poorly structured, inadequately documented, and difficult to maintain
  • Postponed testing: Skipping comprehensive test automation creates brittle systems where changes risk unintended consequences
  • Inadequate documentation: When documentation is minimal, onboarding new developers takes longer and errors increase
  • Fragile integrations: Quick integrations between systems work initially but break when either system is updated
  • Performance shortcuts: Using inefficient algorithms or unoptimized database queries that work acceptably initially but create problems at scale

The Accumulation Problem

Technical debt doesn't remain static—it compounds. A company launching with $50,000 in deliberate technical shortcuts (code written quickly, insufficient documentation, limited testing automation) should expect:

  • Immediate cost: $50,000 in poor-quality code and missing documentation
  • Year 1: Fixing bugs discovered in production, implementing missing error handling, writing documentation for undocumented code → additional 30,00030,000-50,000
  • Year 2: New features take 40-50% longer to develop because developers spend time navigating existing debt → additional 75,00075,000-100,000
  • Year 3: Performance problems appear as data volumes grow; refactoring required → additional 100,000100,000-150,000
  • Year 4: System becomes unmaintainable; significant rewrite required → additional 200,000200,000-400,000

Total 4-year cost of 50Kinlaunchphaseshortcuts:50K in launch-phase shortcuts: 455,000-$700,000

Had the company invested an additional 80,00080,000-100,000 at launch to eliminate technical debt through proper architecture, comprehensive testing, and clear documentation, they would have saved 300,000300,000-600,000 over 4 years. More importantly, they would have maintained development velocity rather than watching it degrade.

Organizational Impact of Accumulated Technical Debt

Beyond financial cost, technical debt creates organizational consequences:

Velocity Degradation: Developers deliver features faster initially, but velocity progressively declines as debt accumulates. A team delivering 20 story points weekly at launch might deliver only 8 story points weekly by year two as they navigate technical complexity.

Quality Challenges: High-debt systems are fragile. Changes intended to fix one problem create new problems elsewhere. Regression bugs increase. Customer experience deteriorates.

Team Burnout: Developers working with high-debt systems become frustrated. They understand they're inefficient but feel powerless because debt is systemic. Turnover increases—experienced developers leave for cleaner codebases.

Competitive Disadvantage: Competitors with lower debt move faster, implementing features quicker and responding to market changes faster. The high-debt company falls progressively behind.

Acquisition Risk: If the company seeks acquisition or investment, investors often conduct code reviews. High technical debt significantly reduces valuation or becomes a dealbreaker.

The Security Imperative: Why Patches Are Non-Negotiable

The Vulnerability Reality

Software is never perfectly secure at launch. Vulnerabilities fall into two categories:

Known vulnerabilities: Published security flaws that vendors have addressed through patches. Developers can identify and fix these immediately by keeping dependencies current.

Unknown vulnerabilities: Flaws not yet discovered by vendors or the security community. These become dangerous once attackers or researchers discover and publicize them.

The Patch Window

When a security vulnerability is publicly disclosed, a "patch window" opens—the period between disclosure and when attackers can reliably exploit the vulnerability. This window is typically days to weeks.

Organizations face a dilemma:

  • Patch immediately, risking that the patch itself introduces instability
  • Test thoroughly before patching, extending the window that attackers can exploit

The optimal strategy balances both: maintain a robust testing process so patches can deploy within days rather than weeks, closing the window before attackers can weaponize vulnerabilities.

Real-World Cost of Neglected Patches

Equifax (2017): Failed to apply a known patch to Apache Struts, resulting in breach of 147 million consumers' personal information. Costs: $700 million settlement, incalculable reputational damage, regulatory penalties, lawsuits. The patch cost: approximately 2 hours of developer time to apply.

Target (2013): Attackers exploited unpatched systems in the HVAC vendor network to access Target's payment systems, stealing 40 million credit card numbers. Cost: $18.5 million settlement, reputational damage, lost customer trust. Time to patch the vulnerability: hours.

WannaCry (2017): Ransomware exploited Windows vulnerability for which Microsoft had released patches months earlier. Organizations that hadn't patched were affected; organizations maintaining current patches were protected. Damage: billions in direct costs, countless disrupted operations.

These incidents share a pattern: known vulnerabilities that organizations failed to patch within reasonable timeframes. The cost of patching is trivial compared to the cost of breaches resulting from neglected patches.

Security Patch Maintenance in Practice

Effective patch management involves:

Monitoring: Tracking published vulnerabilities affecting software and dependencies, typically through security advisories and vendor communications

Prioritization: Assessing vulnerability severity (critical vs. important vs. low-risk) and deploying critical patches within days, important patches within weeks

Testing: Validating patches in controlled environments before production deployment, ensuring patches don't introduce new problems

Deployment: Systematically rolling out patches across all deployed instances

Verification: Confirming patches deployed successfully and vulnerabilities are closed

This process requires dedicated effort—typically 1-2 hours weekly for mid-sized applications, more for large systems. Organizations treating patching as optional overhead eventually pay catastrophic costs.

The Maintenance Cost Reality: What You Actually Need to Budget

Annual Maintenance Cost Breakdown

Software maintenance costs typically range from 15-25% of initial development costs annually. For a 250,000developmentproject,expect250,000 development project, expect 37,500-$62,500 in annual maintenance.

Typical maintenance cost allocation:

Maintenance CategoryCostPercentage
Corrective (bug fixes)$22,00035%
Adaptive (OS/API updates)$18,00028%
Perfective (enhancements)$12,00019%
Preventive (refactoring)$8,00013%
Testing & QA$4,0006%
Total Annual$64,000100%

What each category covers:

Corrective Maintenance (35%): Fixing bugs discovered post-launch through user reports, automated monitoring, or security assessments. Includes reproduction, root cause analysis, fix development, testing, and deployment.

Adaptive Maintenance (28%): Updating software to remain compatible with changing environments. Operating system updates, API changes in dependencies, new platform versions, cloud infrastructure updates, database version upgrades. Without adaptive maintenance, software gradually becomes incompatible with modern environments.

Perfective Maintenance (19%): Adding new features requested by users, improving existing features based on feedback, and enhancing user experience. Often conflated with "development," but it's actually maintaining competitive relevance of existing products.

Preventive Maintenance (13%): Refactoring code to reduce technical debt, updating documentation, improving test coverage, optimizing performance, and simplifying complex sections. This is the category most frequently cut from budgets despite being most important for long-term health.

Testing & QA (6%): Automated testing infrastructure, regression testing, performance testing, security testing. Modern development requires continuous testing; maintenance of testing infrastructure is non-trivial.

First-Year Spike

First-year maintenance costs often spike to 30-50% of development costs as:

  • Launch bugs are discovered and fixed
  • Operating system and dependency updates need application
  • Performance problems emerge under real-world load
  • Security vulnerabilities are discovered and patched
  • User feedback drives immediate refinements

A 200,000developmentprojectmightbudget200,000 development project might budget 40,000-50,000foryearonemaintenance,thennormalizeto50,000 for year-one maintenance, then normalize to 30,000-$50,000 annually thereafter.

Maintenance Cost Factors

Maintenance costs vary based on several factors:

Application Complexity: Simple applications require less maintenance. Complex systems with many dependencies require more.

User Base Size: Applications serving millions of users require more robust monitoring, faster bug fixes, and more frequent updates.

Regulatory Requirements: Applications handling sensitive data (healthcare, finance, payment cards) require more frequent security audits, compliance updates, and documentation.

External Dependency Count: Applications with many external dependencies (APIs, libraries, frameworks) require more maintenance as those dependencies are updated.

Activity Level: Active applications with frequent user growth require more optimization and scaling work.

Technology Stack Age: Older technology stacks require more adaptive maintenance as environments evolve.

Real-World Case Studies

Case Study 1: E-Commerce Platform - The Cost of Neglect

Situation: An e-commerce company launched a custom platform in 2019 with a $150,000 development investment. After launch, they aggressively moved to new projects, treating maintenance as optional cost to minimize.

Neglect Approach:

  • Budget allocated: $0 for dedicated maintenance (developers fixed critical issues as emergencies)
  • No regular security patching (dependencies outdated by 12-18 months)
  • No performance monitoring or optimization
  • No preventive maintenance (technical debt accumulated)

Year 1 Consequences:

  • Users reported increasing performance slowness
  • Cart abandonment rate increased 8-10%
  • First security vulnerability discovered in dependencies; remediation took 3 weeks of emergency development
  • No new features delivered; all development effort consumed fighting fires

Year 2 Crises:

  • Complete security audit revealed 23 known vulnerabilities in unpatched dependencies
  • Remediation required 6 weeks of developer time ($30,000)
  • Performance had degraded to unacceptable levels; major users complaining
  • Platform required significant refactoring
  • Total emergency spending: $80,000

Year 3 Reality:

  • Original codebase was essentially unmaintainable
  • Adding simple features took 5x longer than expected
  • Team completely burned out on technical debt
  • Company rewrite decision: $300,000 for complete platform rebuild

Total cost of "saving" maintenance budget: 150,000(original)+150,000 (original) + 80,000 (emergency) + 300,000(rebuild)=300,000 (rebuild) = 530,000 for equivalent functionality to what proactive maintenance would have cost 30,00030,000-40,000 annually.

Case Study 2: SaaS Company - Strategic Maintenance Investment

Situation: A SaaS platform launched in 2020 with 200,000developmentinvestment.Companyimmediatelyestablishedmaintenancebudget:20200,000 development investment. Company immediately established maintenance budget: 20% of development cost annually (40,000).

Strategic Approach:

  • Allocated $40,000 annually to maintenance
  • Established weekly security patch review process
  • Implemented comprehensive automated testing
  • Conducted quarterly code reviews for technical debt assessment
  • Monitored application performance continuously

Year 1-4 Outcomes:

MetricYear 1Year 2Year 3Year 4
Development velocity (story points/sprint)18181716
Critical bugs (annual)3100
Security incidents0000
Unplanned downtime hours2000
New features delivered (annual)12141516
Customers at launch502005001000

Financial Analysis:

  • Maintenance investment (4 years): 40,000×4=40,000 × 4 = 160,000
  • Emergency costs: $0
  • Unplanned downtime costs: $0
  • Revenue growth enabled by stable platform: $2M+ cumulative

ROI: For every dollar spent on maintenance, the company generated 1212-15 in revenue growth by maintaining platform stability and enabling rapid feature development.

Case Study 3: Financial Application - Security-Driven Maintenance

Situation: Financial services company launched custom accounting application in 2021 with $300,000 development investment. Regulatory compliance requires PCI-DSS certification, GDPR compliance for EU data, and SOC 2 audit annually.

Strategic Approach:

  • Allocated $50,000 annually for maintenance
  • Maintained 25% of maintenance budget ($12,500) for security-specific activities
  • Conducted quarterly security audits and penetration testing
  • Maintained 100% patch currency for critical/important severity vulnerabilities within 7 days
  • Documented all changes for compliance auditing

Results:

Regulatory Success:

  • Passed PCI-DSS audit annually without findings
  • Maintained SOC 2 Type II certification
  • Zero security incidents across 4 years

Financial Impact:

  • Avoided potential GDPR fines (up to €20 million for violations)
  • Avoided potential PCI-DSS non-compliance fines (5,0005,000-100,000 per violation)
  • Customers required SOC 2 certification for partnerships; had it
  • Enabled expansion into regulated markets (healthcare, finance)

Platform Capability:

  • Launched in 2021 serving 5 customers with $2M revenue
  • By 2025, served 200 customers with $50M+ revenue
  • Scalability enabled by platform stability maintained through proactive maintenance

Maintenance Packages: Ensuring Long-Term Success

Understanding Maintenance Service Models

Model 1: Retainer-Based Maintenance

Fixed monthly cost covering:

  • Regular bug fixes (within SLA)
  • Security patching and updates
  • Performance monitoring and optimization
  • Minor feature enhancements
  • Infrastructure management and scaling
  • Helpdesk support

Typical cost: 8-12% of original development cost annually

Advantages: Predictable costs, continuous support, rapid response to issues

Best for: Companies wanting stable, predictable maintenance costs and rapid issue response

Model 2: Hourly/Time-and-Materials Maintenance

Pay per hour as maintenance work is needed

Typical cost: 100100-200/hour depending on expertise and location

Advantages: Flexible—pay only for work performed

Disadvantages: Unpredictable costs, potentially slower response for non-urgent issues

Best for: Companies with sporadic maintenance needs or those testing relationships before committing to retainers

Model 3: Break-Fix Maintenance

Reactive support—developers available when issues arise

Advantages: Very low cost if issues are rare

Disadvantages: Slow response times, crisis mode responses often costly, cannot plan for patches/updates

Best for: Non-critical applications rarely requiring updates

Model 4: Managed Services Model

Outsourced team managing entire application lifecycle including operations, monitoring, and support

Typical cost: 15-25% of development cost annually

Advantages: Comprehensive coverage, scale without internal hiring, 24/7 monitoring/support

Disadvantages: Vendor dependency, less control over implementation decisions

Best for: Companies lacking internal expertise or preferring to outsource infrastructure management

What to Expect from Professional Maintenance

Professional maintenance typically includes:

Proactive Monitoring:

  • Continuous system health monitoring
  • Performance tracking and alerting
  • Security vulnerability scanning
  • Automated dependency update checking

Responsive Support:

  • Defined SLAs (critical issues < 1 hour response, important issues < 4 hours, low priority < 1 business day)
  • Dedicated support contact
  • Issue tracking and status visibility

Regular Updates:

  • Security patch deployment within defined windows
  • Dependency upgrades on scheduled basis
  • Operating system and infrastructure updates

Performance Optimization:

  • Regular performance audits
  • Database query optimization
  • Caching and CDN optimization
  • Code performance analysis

Documentation and Knowledge:

  • Maintenance documentation
  • Knowledge transfer for team changes
  • Architecture documentation updates

Compliance and Reporting:

  • Audit trail documentation for compliance
  • Monthly reporting on maintenance activities
  • Compliance attestation (SOC 2, ISO 27001, etc.)

Best Practices for Post-Launch Maintenance

Establish Clear Maintenance Strategy Immediately After Launch

Don't wait for problems to establish maintenance approach. Define:

  • Update schedule: When will operating systems, frameworks, and dependencies be updated?
  • Security patch process: How quickly will security patches be deployed?
  • Bug fix prioritization: How will bugs be prioritized for fixing?
  • Performance thresholds: What performance levels trigger optimization work?
  • Capacity planning: How much development capacity is dedicated to maintenance vs. new features?

Implement Comprehensive Monitoring

Deploy monitoring capturing:

  • Application performance metrics (response time, error rates, resource utilization)
  • User experience metrics (conversion rate, session duration, page load time)
  • Business metrics (revenue, user growth, feature adoption)
  • Infrastructure health (uptime, capacity, error logs)
  • Security metrics (failed authentication attempts, suspicious patterns)

Monitoring enables early detection of problems before users discover them.

Automate Everything That Can Be Automated

Automation reduces manual effort and human error:

  • Automated testing runs on every code change, catching regressions
  • Automated security scanning identifies known vulnerabilities
  • Automated performance testing catches performance regressions
  • Automated deployment of security patches (in staging first) accelerates patching
  • Automated scaling responds to demand without manual intervention

Maintain Adequate Documentation

Keep documentation current:

  • Architecture documentation describing system design
  • Run-books for common operations (deployments, incident response, scaling)
  • Known issues and workarounds
  • Configuration documentation
  • Third-party system integration documentation

Documentation reduces onboarding time for new team members and enables faster incident response.

Conduct Regular Maintenance Reviews

Schedule quarterly or semi-annual reviews examining:

  • Accumulated technical debt and plans to address it
  • Security patch status and any outstanding vulnerabilities
  • Performance trends and optimization opportunities
  • Upcoming dependency lifecycle end-dates
  • Team capacity vs. maintenance needs

This ensures maintenance strategy remains aligned with evolving needs.

Invest in Preventive Maintenance

Allocate budget for work that prevents future problems:

  • Code refactoring reducing complexity
  • Test automation improving reliability
  • Performance optimization preventing degradation
  • Documentation reducing team onboarding time
  • Technical debt remediation preventing future problems

Preventive maintenance is the most cost-effective investment, yet it's often the first cut when budgets tighten.

Calculating Your Maintenance Budget

Estimation Framework

For a custom application with initial development cost of D:

Conservative estimate: 15% of D annually

Typical estimate: 18-20% of D annually

Comprehensive estimate: 20-25% of D annually

Factors Increasing Maintenance Costs

  • High user growth: Fast scaling requires more infrastructure management
  • Regulatory requirements: Compliance work increases maintenance burden
  • Complex integrations: More external dependencies = more adaptive maintenance
  • High availability requirements: 99.99% uptime requires more infrastructure work than 99% uptime
  • Legacy technology dependencies: Older stacks require more adaptation work
  • Active user base: More users = more bug reports = more corrective maintenance

Factors Decreasing Maintenance Costs

  • Stable user base: Minimal infrastructure scaling required
  • Few external dependencies: Fewer libraries/APIs to maintain
  • Modern technology stack: Contemporary frameworks have better tooling
  • High-quality initial development: Less technical debt to manage
  • Limited feature requests: Fewer enhancements required
  • Low regulatory burden: Compliance requirements minimized

Budget Planning Example

For a $250,000 custom web application serving 500 users in a stable industry:

Year 1 (High maintenance needs):

  • Corrective maintenance (bug fixes): $18,000
  • Adaptive maintenance (OS updates, dependency updates): $12,000
  • Perfective maintenance (user-requested features): $8,000
  • Preventive maintenance (technical debt, optimization): $8,000
  • Testing/infrastructure: $4,000
  • Total Year 1: $50,000 (20% of development cost)

Years 2-5 (Steady state):

  • Annual maintenance: 37,50037,500-50,000 (15-20% of development cost)
  • Plan for ~$100,000 every 3-4 years for major refactoring or platform modernization

10-Year Total Cost of Ownership:

  • Original development: $250,000
  • Maintenance years 1-10: 400,000400,000-475,000
  • Major refactor (year 5): $100,000
  • Total 10-year cost: 750,000750,000-825,000

Conclusion: Maintenance as Strategic Investment

The myth that software development ends at launch has caused countless organizations to make expensive mistakes. Companies treating post-launch support and maintenance as optional overhead inevitably face a reckoning—technical debt accumulation, security vulnerabilities, performance degradation, and eventually, systems requiring costly rebuilds.

The companies that succeed recognize the reality: software is a living system requiring constant care. They invest in professional maintenance, implement proactive monitoring, keep dependencies current, and systematically address technical debt. These investments seem expensive in the short-term but deliver extraordinary returns over the software's lifetime through:

  • Security: Preventing costly breaches through proactive patching
  • Reliability: Maintaining system uptime through monitoring and rapid issue response
  • Performance: Preventing degradation that impacts user experience
  • Competitiveness: Enabling rapid feature development by maintaining low technical debt
  • Longevity: Extending productive software lifetime through preventive maintenance

The economics are clear: investing 15-20% annually in maintenance costs one-tenth what emergency remediation costs when maintenance is neglected. More importantly, well-maintained systems enable business growth; neglected systems constrain it.

For any software investment, allocate at least 15-20% annually for maintenance in your financial planning. Partner with a development firm understanding this reality—one that views maintenance as strategic partnership ensuring your software remains secure, stable, and competitive for years to come.

The question is not whether you can afford to invest in maintenance. The question is whether you can afford not to.


References

  1. The Nine Hertz. (2025). "How Much Does It Cost to Maintain a Software in 2025?" Retrieved from https://theninehertz.com/blog/software-maintainance-cost

  2. Ptolemay. (2025). "What App Maintenance Really Costs in 2025." Retrieved from https://www.ptolemay.com/post/application-maintenance-support-costs

  3. Codiant. (2025). "How Much Does It Cost to Maintain an App in 2025?" Retrieved from https://codiant.com/blog/cost-to-maintain-an-app/

  4. DevTechnoSys. (2025). "Best Software Maintenance Cost In All Regions [2025]." Retrieved from https://devtechnosys.com/insights/software-maintenance-cost-in-all-regions/

  5. GoWest IT. (2025). "Software Patching Strategy for 2025: More Than Just Updates." Retrieved from https://www.gowestit.com/software-patching-strategy-for-2025-more-than-just-updates/

  6. Motadata. (2025). "Strategic Importance of Software Updates and Patch Management." Retrieved from https://www.motadata.com/blog/importance-of-regular-software-updates-and-patch-management/

  7. Monday.com. (2025). "Technical debt: a strategic guide for 2026." Retrieved from https://monday.com/blog/rnd/technical-debt/

  8. GitHub. (2025). "What is technical debt?" Retrieved from https://github.com/resources/articles/what-is-technical-debt

  9. NIST. (2025). "NIST Revises Security and Privacy Control Catalog to Improve Software Update Management." Retrieved from https://www.nist.gov/news-events/news/2025/08/nist-revises-security-and-privacy-control-catalog-improve-software-update

  10. ArXiv. (2023). "SoHist: A Tool for Managing Technical Debt through Retro Perspective Code Analysis." Retrieved from http://arxiv.org/pdf/2304.14464.pdf

  11. ArXiv. (2024). "Technical Debt Management: The Road Ahead for Successful Software Delivery." Retrieved from https://arxiv.org/pdf/2403.06484.pdf

  12. ArXiv. (2024). "A Survey of Predictive Maintenance: Systems, Purposes and Approaches." Retrieved from http://arxiv.org/pdf/1912.07383.pdf

  13. International Journal of Finance and Management Research. (2022). "Software Maintenance Process Towards Cloud Environment: A Review Study." Retrieved from https://ijfmr.com/papers/2022/6/1184.pdf

  14. Revista de Informatica Economica. (2011). "Estimating Maintenance Cost for Web Applications." Retrieved from http://revistaie.ase.ro/content/80/04%20-%20Ivan,%20Despa.pdf

  15. ArXiv. (2024). "Pricing4SaaS: Towards a pricing model to drive the operation of SaaS." Retrieved from http://arxiv.org/pdf/2404.00311.pdf

  16. ArXiv. (2024). "Pricing-driven Development and Operation of SaaS: Challenges and Opportunities." Retrieved from http://arxiv.org/pdf/2403.14007.pdf

  17. ArXiv. (2023). "After-sales services during an asset's lifetime: collaborative planning of system upgrades." Retrieved from http://arxiv.org/pdf/2202.12128.pdf

  18. ArXiv. (2025). "Tracing the Lifecycle of Architecture Technical Debt in Software Products." Retrieved from https://arxiv.org/pdf/2501.15387.pdf