167,876 research outputs found

    A Critical Appraisal of Remedies in the EU Microsoft Cases

    Get PDF
    We discuss and compare the remedies in the two cases antitrust cases of the European Union (EU) against Microsoft. The first EU case alleged (i) that Microsoft illegally bundled the Windows Media Player (WMP) with Windows; and (ii) that Microsoft did not provide adequate documentation that would allow full interoperability between Windows servers and non-Microsoft servers as well as between Windows clients and non-Microsoft servers. After finding Microsoft liable and imposing a large fine, the EU imposed as remedies the requirements on Microsoft (i) to sell a version of Windows without WMP (Windows-N); and (ii) to publish and license interoperability information. Windows-N was a commercial failure, and there has been only limited cross-platform server entry. In its second investigation of Microsoft, the EU alleged illegal tying of Internet Explorer (IE) with Windows. The EU settled with Microsoft with Microsoft undertaking the obligation to ask (through compulsory Windows updates) consumers whose computers have Internet Explorer pre-installed to choose a browser from a menu of competing browsers. Thus, the EU imposed quite different remedies in the two cases: an unbundling remedy for the WMP but a close to a must-carry requirement for IE. We analyze and compare the different approaches.antitrust, remedies, Microsoft, complementarity, innovation, efficiency, monopoly, oligopoly, media player, interoperability, Internet browser

    How open is open enough?: Melding proprietary and open source platform strategies

    Get PDF
    Computer platforms provide an integrated architecture of hardware and software standards as a basis for developing complementary assets. The most successful platforms were owned by proprietary sponsors that controlled platform evolution and appropriated associated rewards. Responding to the Internet and open source systems, three traditional vendors of proprietary platforms experimented with hybrid strategies which attempted to combine the advantages of open source software while retaining control and differentiation. Such hybrid standards strategies reflect the competing imperatives for adoption and appropriability, and suggest the conditions under which such strategies may be preferable to either the purely open or purely proprietary alternatives

    Economic Aspects of the Microsoft Case: Networks, Interoperability and Competition

    Get PDF
    In this paper, we discuss the main economic aspects of the European Microsoft case; in particular, Microsoft’s refusal to supply the necessary information to make the competitors’ work group server systems interoperable with Windows Operating System. The case can be seen as an example of competition between networks. We review the relevant economics literature with the objective of understanding the motivations behind Microsoft’s strategies.Networks; Complementarities; Foreclosure; Interoperability; Antitrust

    Some Policy Issues on Open Source and Proprietary Software

    Get PDF
    Software industry is a fast growing sector of the economy which is undergoing significant changes both for the presence of the open source mode of production and for the challenges of globalization and convergence with other industries. This paper analyses the role of open source software (OSS) on competition and innovation in the software industry and debates the economic rationales for promoting the adoption of OSS by national and local governments.software industry, open source software, patent system

    Digital Architecture as Crime Control

    Get PDF
    This paper explains how theories of realspace architecture inform the prevention of computer crime. Despite the prevalence of the metaphor, architects in realspace and cyberspace have not talked to one another. There is a dearth of literature about digital architecture and crime altogether, and the realspace architectural literature on crime prevention is often far too soft for many software engineers. This paper will suggest the broad brushstrokes of potential design solutions to cybercrime, and in the course of so doing, will pose severe criticisms of the White House\u27s recent proposals on cybersecurity. The paper begins by introducing four concepts of realspace crime prevention through architecture. Design should: (1) create opportunities for natural surveillance, meaning its visibility and susceptibility to monitoring by residents, neighbors, and bystanders; (2) instill a sense of territoriality so that residents develop proprietary attitudes and outsiders feel deterred from entering a private space; (3) build communities and avoid social isolation; and (4) protect targets of crime. There are digital analogues to each goal. Natural-surveillance principles suggest new virtues of open-source platforms, such as Linux, and territoriality outlines a strong case for moving away from digital anonymity towards psuedonymity. The goal of building communities will similarly expose some new advantages for the original, and now eroding, end-to-end design of the Internet. An understanding of architecture and target prevention will illuminate why firewalls at end points will more effectively guarantee security than will attempts to bundle security into the architecture of the Net. And, in total, these architectural lessons will help us chart an alternative course to the federal government\u27s tepid approach to computer crime. By leaving the bulk of crime prevention to market forces, the government will encourage private barricades to develop - the equivalent of digital gated communities - with terrible consequences for the Net in general and interconnectivity in particular
    • …
    corecore