Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Communication (3)
- Communication Technology and New Media (3)
- Social and Behavioral Sciences (3)
- Antitrust and Trade Regulation (2)
- Communications Law (2)
-
- Computer Engineering (2)
- Computer and Systems Architecture (2)
- Engineering (2)
- Intellectual Property Law (2)
- Mass Communication (2)
- Privacy Law (2)
- Science and Technology Law (2)
- Arts and Humanities (1)
- Broadcast and Video Studies (1)
- Computer Sciences (1)
- Consumer Protection Law (1)
- Data Storage Systems (1)
- Databases and Information Systems (1)
- Digital Communications and Networking (1)
- History (1)
- History of Science, Technology, and Medicine (1)
- Internet Law (1)
- Law and Economics (1)
- Physical Sciences and Mathematics (1)
- Public Affairs, Public Policy and Public Administration (1)
- Science and Technology Policy (1)
- Science and Technology Studies (1)
- Institution
- Keyword
-
- Antitrust (2)
- Science and Technology (2)
- Security (2)
- AT&T (1)
- Bandwidth (1)
-
- Best practices (1)
- Broadband (1)
- Business History Trade Regulation (1)
- Business practices (1)
- Cloud bursting (1)
- Communications Law (1)
- Computer Law (1)
- Disaster recovery (1)
- Free Speech (1)
- Google (1)
- Government Regulation (1)
- Grid computing (1)
- IaaS (1)
- Illegal actions (1)
- Intellectual Property Law (1)
- Internet architecture (1)
- Latency (1)
- Law & technology (1)
- Law and Economics (1)
- Law and Technology (1)
- Microsoft (1)
- Monopolization (1)
- Network engineering (1)
- Openness (1)
- PC operating systems (1)
Articles 1 - 5 of 5
Full-Text Articles in Computer Law
As Antitrust Case Ends, Microsoft Is Victorious In Defeat, Norman Hawker, Robert H. Lande
As Antitrust Case Ends, Microsoft Is Victorious In Defeat, Norman Hawker, Robert H. Lande
All Faculty Scholarship
As the final judgment in the celebrated Microsoft case ends, this piece very briefly assesses the impact of its remedy. When evaluated in terms of its most important goals, the remedy has proven to be a failure. Microsoft's monopoly power in the PC operating systems market is now as great as it was when the case was brought in 1998 or the remedy was ordered in 2002. The article also very briefly discusses the implications of this remedy for Google and AT&T.
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
All Faculty Scholarship
Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital expenditures …
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
All Faculty Scholarship
This is the introduction to a symposium issue for a conference designed to bring the engineering community, policymakers, legal academics, and industry participants together in an attempt to provide policymakers with a better understanding of the Internet’s technical aspects and to explore emerging issues of particular importance to current broadband policy.
Vulnerable Software: Product-Risk Norms And The Problem Of Unauthorized Access, Richard Warner, Robert H. Sloan
Vulnerable Software: Product-Risk Norms And The Problem Of Unauthorized Access, Richard Warner, Robert H. Sloan
All Faculty Scholarship
Unauthorized access to online information costs billions of dollars per year. Software vulnerabilities are a key. Software currently contains an unacceptable number of vulnerabilities. The standard solution notes that the typical software business strategy is to keep costs down and be the first to market even if that means the software has significant vulnerabilities. Many endorse the following remedy: make software developers liable for negligent or defective design. This remedy is unworkable. We offer an alternative based on an appeal to product-risk norms. Product-risk norms are social norms that govern the sale of products. A key feature of such norms …
Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo
Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo
All Faculty Scholarship
In The Master Switch, Tim Wu argues that four leading communications industries have historically followed a single pattern that he calls “the Cycle.” Because Wu’s argument is almost entirely historical, the cogency of its claims and the force of its policy recommendations depends entirely on the accuracy and completeness of its treatment of the historical record. Specifically, he believes that industries begin as open, only to be transformed into closed systems by a great corporate mogul until some new form of ingenuity restarts the Cycle anew. Interestingly, even taken at face value, many of the episodes described in the …