87 research outputs found

    On the Scalability of Addressing in Private Networks Using RPX

    Get PDF
    In recent times, the imminent lack of public IPv4 addresses has attracted the attention of both research community and industry. The cellular industry has decided to combat this problem by using IPv6 for all new terminals. However, the success of 3G network deployment will depend on the services offered to end users. Currently, almost all services reside in the public IPv4 address space, making them inaccessible to users in IPv6 networks. Thus, an intermediate translation mechanism is required. Previous studies on network address translation methods have shown that REBEKAH-IP with Port Extension (RPX) supports all types of services that can be offered to IPv6 terminals from the public IPv4 based Internet, and provides excellent scalability. However, this method suffers from an ambiguity problem which may lead to call blocking. In this paper, we present an improvement to RPX scheme in which the side effect is removed and fully scalable system. We firstly show the expected number of public IPv4 addresses utilization to the DNS of RPX server. This utilization is computed in terms of the probability of socket open requests from mobile terminals, the probability of call blocking and the estimated number of mobile terminals at the network initialization phase. The mathematical model is also provided as a guideline to determine the range of public IPv4 addresses allocated to an RPX gateway in a cellular network. In addition, the results are presented through a set of simulations. However, we proposed the RPX scheme to use a simple round robin scheduling algorithm is sub-optimal in terms of call blocking probability and further propose to use a priority queue algorithm to improve the scalability. In addition, we present extensive simulation results on the practical scalability of RPX with different traffic compositions to provide a guideline of the expected scalability in large-scale networks such as 3G networks

    RPX U+2013 a system for extending the IPv4 address range

    Full text link

    Patent collateral, investor commitment, and the market for venture lending

    Full text link
    This paper investigates the market for lending to technology startups (i.e., venture lending) and examines two mechanisms that may facilitate trade within it: (1) the ‘salability’ of patent collateral; and (2) the credible commitment of existing equity investors. We find that intensified trading in the secondary patent market is strongly related to the annual rate of startup lending, particularly for startups with more redeployable patent assets. Moreover, we show that the credibility of venture capitalist commitments to reinvest in their startups’ next round of financing can be critical for startup debt provision. Utilizing the crash of 2000 as a severe and unexpected capital supply shock for VCs, we show that lenders continue to finance startups with recently funded investors better able to credibly commit to refinance their portfolio companies, but withdraw from otherwise-promising projects that may have needed their funds the most. The findings are consistent with predictions of incomplete contracting and financial intermediation theory.Accepted manuscrip

    The Giants Among Us

    Get PDF

    Exploring the Boundaries of Patent Commercialization Models via Litigation

    Get PDF
    This thesis explores direct patent commercialization via patent assertion, particularly patent infringement litigation, a complex nonmarket activity whose successful undertaking requires knowledge, creativity, and financial resources, as well as a colorable infringement case. Despite these complexities, firms have increasingly employed patents as competitive tools via patent assertions, particularly in the United States. This thesis explores the business models that have been created to facilitate the direct monetization of patents. Since secrecy underpins the patent assertion strategies studied, the thesis is based on rich and enhanced secondary data. In particular, a data chaining technique has been developed to assemble relevant but disparate data into a larger coherent data set that is amenable to combination and pairing with other forms of relevant public data. This research has discovered that one particularly successful business model that employs a leveraging strategy, known as the non-practicing entity (“NPE”), has itself spawned at least two other business models, the highly capitalized “patent mass aggregator” and the “patent privateer.” The patent privateer, newly discovered in this research, is particularly interesting because it provides a way for firms to employ patents to attack competitors by forming specialized NPEs in a manner that essentially expands the boundaries of the firm. This research has also examined plaintiff firm management processes during litigations brought under leveraging and proprietary strategies, the two patent litigation strategies in which firms affirmatively initiate infringement litigations. In particular, this research investigates the commercial contexts that drive patent assertion strategies to explore the effective limits of the patent right in a litigation context. The investigation concludes that a variety of robust business models and management processes may be quite successful in extracting value from patents in the US

    Counter-IP Conspiracies: Patent Alienability and the Sherman Antitrust Act

    Get PDF
    Anticompetitive collusion by intellectual property owners frequently triggered antitrust enforcement during the twentieth century. An emerging area of litigation and scholarship, however, involves conspiracies by potential licensees of intellectual property to reduce or eliminate opportunities by a property’s holders to profit from it, or even to recoup their investments in creating and protecting it. The danger is that potential licensees will collude with one another to suppress royalties or sale prices. This Article traces the history of such litigation, provides an overview of the scholarly and theoretical arguments against monopsonistic or oligopsonistic collusion against licensors of intellectual property, and summarizes empirical evidence that the prime economic and business-related justification for such collusion, namely the need to reduce patent holdup, is relatively weak. It argues that some decisions not to license intellectual-property rights, or to license them at suppressed rates, may be anticompetitive, particularly if they are the result of a collusive process or serve to maintain or expand market power. Finally, it urges greater attention from a macroeconomic perspective to the plight of inventors and workers in the high-technology and patent-intensive industries. As a preliminary attempt to heighten awareness of the issue, it describes recent allegations that market power on the part of consumers of high-technology patent licenses, and reduced bargaining clout on the part of individual employees and inventors, may be contributing to unemployment and inequality

    Brain Drain from Turkey: Return Intentions of Skilled Migrants

    Get PDF
    The study estimates an empirical model of return intentions using a dataset compiled from an internet survey of Turkish professionals residing abroad. In the migration literature, wage differentials are often cited as an important factor explaining skilled migration. The findings of our study suggest, however, that non-pecuniary factors, such as the importance of family and social considerations, are also influential in the return or non-return decision of the highly educated. In addition, economic instability in Turkey, prior intentions to stay abroad and work experience in Turkey also increase non-return. Female respondents also appear less likely to return indicating a more selective migration process for females.Skilled migration, Brain drain, Return intentions, Turkey

    Titans and Trolls Enter the Open-Source Arena

    Get PDF
    Open-source software has become a prominent part of the software industry, due in part to its applications in mobile devices, online social networks, and cloud computing. As a result, the open-source community is an increasingly attractive litigation target for patent trolls and titans. While in the past the open-source community focused primarily on ensuring license compliance, it now must reach beyond open-source licensing agreements and vigilantly employ multiple current or as yet untested defensive maneuvers to withstand the threats of patent lawsuits
    • 

    corecore