Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Law
Microsoft Tying Consumers' Hands - The Windows Vista Problem And The South Korean Solution, Daniel J. Silverthorn
Microsoft Tying Consumers' Hands - The Windows Vista Problem And The South Korean Solution, Daniel J. Silverthorn
Michigan Telecommunications & Technology Law Review
Currently, more than ninety percent of the world's PCs operate under Windows. To cement its market power, Microsoft has engaged in controversial business practices. Those practices have led to adverse antitrust decisions in the United States, the European Union (EU), and South Korea. Many of these decisions, both judicial and administrative, revolve around Microsoft's bundling, or "tying," of certain subsidiary applications with the Windows operating system, including Internet Explorer and Windows Media Player. In doing so, Microsoft arguably gains a greater than deserved market share with these bundled applications, inhibiting fair competition in the software marketplace. The United States, EU …
Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale
Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale
Michigan Telecommunications & Technology Law Review
The modern commercial systems and software industry in the United States have grown up in a snake-oil salesman's paradise. The largest sector of this industry by far is composed of standard commercial systems that are marketed to provide specified functionality (e.g. Internet web server, firewall, router, etc.) Such products are generally provided with a blanket disclaimer stating that the purchaser must evaluate the suitability of the product for use, and that the user assumes all liability for product behavior. In general, users cannot evaluate and cannot be expected to evaluate the security claims of a product. The ability to analyze …