Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Antitrust and Trade Regulation (3)
- Computer Engineering (3)
- Digital Communications and Networking (3)
- Law (3)
- Law and Economics (3)
-
- Public Affairs, Public Policy and Public Administration (3)
- Science and Technology Law (3)
- Social and Behavioral Sciences (3)
- Business (2)
- Communication (2)
- Communication Technology and New Media (2)
- Communications Law (2)
- Computer Law (2)
- Internet Law (2)
- Policy Design, Analysis, and Evaluation (2)
- Science and Technology Policy (2)
- Technology and Innovation (2)
- Business Law, Public Responsibility, and Ethics (1)
- Comparative and Foreign Law (1)
- Computer and Systems Architecture (1)
- Curriculum and Instruction (1)
- Economic Policy (1)
- Education (1)
- Electrical and Computer Engineering (1)
- Engineering Education (1)
- European Law (1)
- Infrastructure (1)
- Intellectual Property Law (1)
- Legal Education (1)
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo
Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo
All Faculty Scholarship
Open source and modular platforms represent two powerful conceptual paradigms that have fundamentally transformed the software industry. While generally regarded complementary, the freedom inherent in open source rests in uneasy tension with the strict structural requirements required by modularity theory. In particular, third party providers can produce noncompliant components, and excessive experimentation can fragment the platform in ways that reduce its economic benefits for end users and app providers and force app providers to spend resources customizing their code for each variant. The classic solutions to these problems are to rely on some form of testing to ensure that the …
U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo
U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo
All Faculty Scholarship
As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.
• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …
Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo
Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo
All Faculty Scholarship
Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …
Protocol Layering And Internet Policy, Christopher S. Yoo
Protocol Layering And Internet Policy, Christopher S. Yoo
All Faculty Scholarship
An architectural principle known as protocol layering is widely recognized as one of the foundations of the Internet’s success. In addition, some scholars and industry participants have urged using the layers model as a central organizing principle for regulatory policy. Despite its importance as a concept, a comprehensive analysis of protocol layering and its implications for Internet policy has yet to appear in the literature. This Article attempts to correct this omission. It begins with a detailed description of the way the five-layer model developed, introducing protocol layering’s central features, such as the division of functions across layers, information hiding, …