28,578 research outputs found

    Seventy Years of Getting Transistorized

    Get PDF
    Vacuum tubes appeared at the break of the twentieth century giving birth to electronics. By the 1930s, they had become established as a mature technology, spreading into areas such as radio communications, long distance radiotelegraphy, radio broadcasting, telephone communication and switching, sound recording and playing, television, radar, and air navigation. During World War II, vacuum tubes were used in the first electronic computers, which were built in the United Kingdom and the United States. Although vacuum tubes had been a successful technology, they were also bulky, fragile and expensive, had a short life, and consumed a lot of power to heat the thermo-emitters. These drawbacks promoted the search for completely new devices. Alternative solutions had long been considered, but without significant developments

    "Download for Free" - When Do Providers of Digital Goods Offer Free Samples?

    Get PDF
    In a monopoly setting where consumers cannot observe the quality of the product we show that free samples which are of a lower quality than the marketed digital goods are used together with high prices as signals for a superior quality if the number of informed consumers is small and if the difference between the high and the low quality is not too small. Social welfare is higher, if the monopolist uses also free samples as signals, compared to a situation where he is restricted to pure price signalling. Both, the monopolist and consumers benefit from the additional signal

    Economic Factors of Vulnerability Trade and Exploitation

    Full text link
    Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently exists on the economics of attack acquisition and deployment. Yet, this understanding is critical to characterize the production of (traded) exploits, the economy that drives it, and its effects on the overall attack scenario. In this paper we provide an empirical investigation of the economics of vulnerability exploitation, and the effects of market factors on likelihood of exploit. Our data is collected first-handedly from a prominent Russian cybercrime market where the trading of the most active attack tools reported by the security industry happens. Our findings reveal that exploits in the underground are priced similarly or above vulnerabilities in legitimate bug-hunting programs, and that the refresh cycle of exploits is slower than currently often assumed. On the other hand, cybercriminals are becoming faster at introducing selected vulnerabilities, and the market is in clear expansion both in terms of players, traded exploits, and exploit pricing. We then evaluate the effects of these market variables on likelihood of attack realization, and find strong evidence of the correlation between market activity and exploit deployment. We discuss implications on vulnerability metrics, economics, and exploit measurement.Comment: 17 pages, 11 figures, 14 table

    Networks, Standards and Intellectual Property Rights

    Get PDF
    This paper reviews issues that lie at the intersection between intellectual property rights (IPR) and network effects, especially in the context of the global economy. Some of the relevant questions are: (1) How do IPR influence the provision of goods exhibiting network effects? (2) How do network effects in turn influence the creation of intellectual property? And (3) how do aspects of the global economy interact with both IPR and network effects? We synthesize what is known from the existing literature to answer these questions.Intellectual Property Rights, Network Effects, Globalization, Standards, Social Networks, Software Piracy

    Implementing TURF analysis through binary linear programming

    Get PDF
    This paper introduces the approach of using Total Unduplicated Reach and Frequency analysis (TURF) to design a product line through a binary linear programming model. This improves the efficiency of the search for the solution to the problem compared to the algorithms that have been used to date. The results obtained through our exact algorithm are presented, and this method shows to be extremely efficient both in obtaining optimal solutions and in computing time for very large instances of the problem at hand. Furthermore, the proposed technique enables the model to be improved in order to overcome the main drawbacks presented by TURF analysis in practice.Total Unduplicated Reach and Frequency; Market research; Competitive algorithm; Product optimization; Large datasets

    Market Segmentation and the Sources of Rents from Innovation: Personal Computers in the Late 1980's

    Get PDF
    This paper evaluates the sources of transitory market power in the market for personal computers (PCs) during the late 1980's. Our analysis is motivated by the coexistence of low entry barriers into the PC industry and high rates of innovative investment by a small number of PC manufacturers. We attempt to understand these phenomena by measuring the role that different principles of product differentiation (PDs) played in segmenting this dynamic market. Our first PD measures the substitutability between Frontier (386-based) and Non- Frontier products, while the second PD measures the advantage of a brand-name reputation (e.g., by IBM). Building on advances in the measurement of product differentiation, we measure the separate roles that these PDs played in contributing to transitory market power. In so doing, this paper attempts to account for the market origins of innovative rents in the PC industry. Our principal finding is that, during the late 1980's, the PC market was highly segmented along both the Branded (B versus NB) and Frontier (F versusNF) dimensions. The effects of competitive events in any one cluster were confined mostly to that particular cluster, with little effect on other clusters. For example, less than 5% of the market share achieved by a hypothetical entrant would be market-stealing from other clusters. In addition, the product diffe- rentiation advantages of B and F were qualitatively different. The main advantage of F was limited to the isolation from NF competitors it provided; Brandedness both shifted out the product demand curve as well as segmenting B products from NB competition. These results help explain how transitory market power (arising from market segmentation) shaped the underlying incen- tives for innovation in the PC industry during the mid to late 1980s.

    "Download for Free": When do providers of digital goods offer free samples?

    Get PDF
    In a monopoly setting where consumers cannot observe the quality of the product we show that free samples which are of a lower quality than the marketed digital goods are used together with high prices as signals for a superior quality if the number of informed consumers is small and if the difference between the high and the low quality is not too small. Social welfare is higher, if the monopolist uses also free samples as signals, compared to a situation where he is restricted to pure price signalling. Both, the monopolist and consumers benefit from the additional signal. --

    "Download for Free" - When Do Providers of Digital Goods Offer Free Samples?

    Get PDF
    In a monopoly setting where consumers cannot observe the quality of the product we show that free samples which are of a lower quality than the marketed digital goods are used together with high prices as signals for a superior quality if the number of informed consumers is small and if the difference between the high and the low quality is not too small. Social welfare is higher, if the monopolist uses also free samples as signals, compared to a situation where he is restricted to pure price signalling. Both, the monopolist and consumers benefit from the additional signal.Digital Goods; Free Samples; Multi-dimensional Signalling

    The Economics of Music Production. The Narrow Paths for Record Companies to Enter the Digital Era

    Get PDF
    On the basis of an in depth analysis of the flow of revenues within the music industry and of the emerging practices, we attempt to understand the logic at play in the current evolution of the structure of the industry. We claim that the record companies used to play a role that was useful for the dynamic and for the quality of music production, and analyze whether it can be maintained despite the impossibility for them to further control the formation and distribution of revenues generated by recorded music. Two antagonistic strategies, corresponding to different segments of the market, are highlighted in this paper. One targets the mass market and relies on the recognition by the on-line distributors of the mutual dependency between them and the record companies. It also admits that this music is characterized by short commercial life cycles and that it should be marketed as a consumer product. Moreover revenues are not necessarily generated by sales, but by the value of temporally exclusive release in some channels. The second model targets the wide number of niches at the fringe of this mass market and relies on the building of communities of customers sharing common tastes and values and on the development of their loyalty. The model is commercial, but relies clearly on the cooperation among the various stakeholders that build a common safe harbor enabling specific types of music to sustainably develop. Value added services funded by ubscription have to be developed.economics of culture, cultural industries, digital business model, P2P, industrial organization.
    corecore