I think one of the best pieces of evidence that patents are harmful to the software industry is the way that software companies’ behavior changes when they’re facing bankruptcy. A couple of weeks ago I discussed Transmeta’s transformation from an innovative technology company into a patent troll. Back in June, I covered Creative’s lawsuit against Apple after losing in the marketplace. This week we’ll consider SGI, another company with a proud history that has sadly descended into trolldom.

If a software patent were an ordinary productive asset like a plot of land or a truck, SGI’s behavior would make no sense. If somebody were squatting on SGI’s land, they would evict him immediately, they wouldn’t wait until they were facing bankruptcy before defending their property rights. Likewise, Disney or Merck wouldn’t tolerate another company using its movie copyrights or pharmaceutical patents without permission. Yet here we have SGI suddenly interested in suing over Patent #6,650,327, granted three years ago. Why didn’t SGI file this lawsuit back in 2003?

Continue reading →

Microsoft and Novell announced a collaborative effort. Whoa, this is big news! Windows and SuSE Linux, proprietary and open source, Microsoft and Novell–working together? Well, yes, according to a recent announcement. And for this collaborative effort to have even been formalized, a required element was some intellectual property rights housecleaning.

Microsoft’s press release says this:

First, Microsoft will work with Novell and actively contribute to several open source software projects, including projects focused on Office file formats and Web services management. Second, Microsoft will not assert its patents against individual noncommercial open source developers. And third, Microsoft is promising not to assert its patents against individual contributors to OpenSUSE.org whose code is included in the SuSE Linux Enterprise platform, including SuSE Linux Enterprise Server and SuSE Linux Enterprise Desktop.

From an intellectual property perspective, numbers 2 and 3 standout – Microsoft’s legally binding promise not to assert its IP rights against SuSE Linux.

What is Microsoft doing here? It’s trying to put SuSE developers at ease that they won’t be sued. So there’s no need to obtain a license from Microsoft. Furthermore, there’s no need for sublicensing – which is particularly important for the decentralized nature of open source development.

Non-assertion covenants (also called a “promise not to assert” or “covenant not to sue”) are binding agreements. It’s a “promise” but it’s still legally enforceable under the doctrine of promissory estoppel–if Microsoft were to withdraw its promise, anyone who justifiably relied on the promise and suffered harm from the withdrawal can sue. They are ways for one party with intellectual property rights to create zones of enforcement and increase certainty for other parties. Its an example of market participants contracting around (or within) the patent and copyright legal system to reduce transaction costs of negotiating, monitoring and enforcing licenses.

Non-assertion promises are better than RAND (Reasonable and Non-Discriminatory) licenses. What is “reasonable” and “non-discriminatory” depends on the particular circumstance and is open to legal interpretation and business negotiation hassles. Furthermore, RAND does not mean royalty-free. For more on Non-assertion covenants see Andy Updegrove’s informative blog post.

I believe we’ll see more and more of these non-assertion agreements from IP rights holders. And I expound further on this in my posting at the ACT blog.

A Series of Tube Lawsuits

by on November 2, 2006 · 2 comments

Apparently UTube is suing YouTube for causing their website to have too much traffic. Jason Schulz is on the case:

Now I’m definitely sympathetic to Universal Tube’s plight. They’re a small business that mostly operates in an off-line world. This much traffic shutting down its servers is not something it asked for or deserves. But to respond by suing YouTube for it doesn’t make any sense. YouTube didn’t ask those people to go to the wrong website. In fact, YouTube wants nothing more than for all those people to find the right website. (Okay, maybe not the child pornographers, but everyone else).

Moreover, the fact that Universal Tube is suing primarily under trademark law and the old property doctrine of “trespass to chattels” is particularly disingenous. I mean, the company isn’t even called “utube”–it’s called Universal Tube & Rollform Equipment. They just picked the domain “utube” as a shorthand.

Trademark law is about companies in the same field using similar marks to confuse consumers not about blaming companies for the mistakes of Internet searchers who can’t find the right websites. No consumer looking for videos on the Internet is going to mistakenly buy used tubbing or visa-versa (unless of course, they’re looking for a series of tubes ;). What Universal Tube is trying to do here is right a wrong by squeezing a square peg in a round hole. There is no “trespass” here or trademark violation and they shouldn’t try to trick a court into finding one.

The only way this lawsuit makes sense is if it’s a negotiating tactic. After all, Mike says they’ve already turned down a million dollar offer for the domain–it surely doesn’t cost a small business a million dollars to change its web address. So they can’t honestly feel they’ve been injured. More likely, they’re expecting Google to buy them out, and they’re hoping a lawsuit will give them more leverage in the price negotiations.

Oops

by on November 2, 2006 · 2 comments

Mike Masnick has some depressing news:

Within the security community, there’s been a lot of talk about “security theater” when it comes to the airline business. In the last few years, plenty of new security measures have been put in place–but just because we can see or deal with new security measures (dump your liquids, everyone!), does it actually make us any safer. While there’s been a ton of attention paid in the last week to a security researcher who showed just how easy it was for anyone to create their own boarding pass to get past the security check point, a much scarier story is sent in by Damon, who points out for all of the security changes, new technologies and new processes it doesn’t do a damn bit of good if the TSA screeners let people with weapons through the checkpoint. That’s exactly what happened at Newark airport, where a “secret shopper” (or should that be “secret bomber”?) test found that 20 out of 22 weapons got through the security clearing process. Now aren’t you glad that you have to remove your shoes and can’t bring a bottle of water on board any more? If we’re serious about air travel security, then it’s about time that we actually focused on security–not play-acting to make people think that something’s been done.

Let me repeat that: 20 out of 22 weapons got through. That’s more than 90 percent failure.

The fundamental problem here is that the TSA has no particular incentive to make air travel safer. They have to act like they’re responding to terrorist threats, but as long as they appear to be “doing something,” it doesn’t matter if any of their “security measures” actually accomplish anything. And, not surprisingly, it appears that to a first approximation, they don’t.

Interesting Stuff from IGF

by on November 2, 2006

The UN’s Internet Governance Forum (IGF) held in Athens, Greece just ended. There’s some interesting blogs that discuss the happenings there, including one from the BBC and from my colleagues that were there in attendance, Jonathan Zuck and Steve DelBianco.

There was a lot of talk – but that’s ok, this is what this UN-created forum is all (and thankfully only) about. There were sessions with such broad topics as “openness” and “diversity” and “access.” Basic access to infrastructure for Internet connections is a problem for many people, especially in Africa. We think all youngsters know about MySpace? Think again (from the BBC blog):

A representative of the Council of Europe was made to look a little foolish when he asked the panel of young people about the growing use of social networks by young people and possible over use of such things as MySpace.

A young Nigerian told him: “If you ask a person in Lagos ‘What is MySpace?’ he is going to stare at your face.

And regarding “openness” I invite you to check out the ACT blog where, among other IGF entries, Jonathan writes how the phrase “no one has a monopoly on knowledge” has been a popular refrain at the IGF:

While it certainly sounds good, it is being used to justify everything from tweaking copyright law to outright theft. Many from the audience of a plenary on Openness brought up the topic of patents and copyrights as barriers to the broad access to “knowledge” regardless of what it took to come up with that “knowledge.”

Now it’s true that a lot of material that is paid for by the government, especially if they are not paid back, and stuff for which the term of patent and copyright have passed should all be in the public domain and there’s some work to get them there. That’s a far cry from simply taking entire sectors of innovation, like software and security and declaring them public goods whereby the moment that innovation is developed it must be shared by everyone for free. In market economies, copyright and patents provide the incentives necessary for investment in innovation, and declaring any innovation of value a “common good” and giving it to the public will cripple that system.

Continue reading →

Math You Can’t Use

by on November 1, 2006 · 14 comments

Via Software Patent Watch, Slashdot has a review of Ben Klemens’s 2005 book, Math You Can’t Use: Patents, Copyright and Software:

Most of the rest of the book shows how software patents in the real world create problems. He cites interviews with venture capitalists by a University of Texas researcher in which they say that they just expect to be violating patents left and right in the normal course of business. He cites another set of researchers who surveyed technologists in a variety of fields, and found that companies in most fields mostly patent in order to protect their inventions, while computing companies are most likely to patent so they can game the system.

Klemens seems to be downplaying the role of open source in all of this. In Chapter 6, he points out that the U.S. software market is evenly split between software companies (32.6%), consultants (36.4%), and in-house software (31.0%). That is, most software isn’t written by software companies, and some of that not-software-company software is OSS. It’s the decentralization, not the openness, that matters. Patents have never been applied to a decentralized industry before, and they don’t work there because independent invention is not a valid defense against claims of patent infringement, and independent invention is inevitable in such a decentralized industry.

Sounds like a great book. I’ve put it on my Amazon list, and I’ll blog more about it once I get a chance to read it. You can get your copy here.

If you thought “net neutrality” is primarily about preventing telephone and cable companies from blocking access to particular web sites or degrading someone else’s services and applications, you would be wrong. AT&T and BellSouth, who are seeking approval from the Federal Communications Commission to complete their merger, will voluntarily commit not to do those things. Consumer groups, however, want the FCC to impose an “additional fifth principle of non-discrimination” on AT&T and BellSouth as a condition of their merger.

If you’re keeping track, here are the four principles that are no longer subject to debate:

(1) consumers are entitled to access the lawful Internet content of their choice;
(2) consumers are entitled to run applications and services of their choice, subject to the needs of law enforcement;
(3) consumers are entitled to connect their choice of legal devices that do not harm the network; and
(4) consumers are entitled to competition among network providers, application and service providers, and content providers.

If the FCC falls for this suggestion, to impose a non-discrimination requirement on network providers, it would outlaw the partnership, bundling and pricing strategies that are the basis for all advertising efforts. That would harm consumers, who benefit the most from advertising.

Continue reading →

The Miami Herald is reporting that at least one voter in Florida claims that voting machines registered a vote for a Republican after he attempted to vote for a Democrat:

Debra A. Reed voted with her boss on Wednesday at African-American Research Library and Cultural Center near Fort Lauderdale. Her vote went smoothly, but boss Gary Rudolf called her over to look at what was happening on his machine. He touched the screen for gubernatorial candidate Jim Davis, a Democrat, but the review screen repeatedly registered the Republican, Charlie Crist.

That’s exactly the kind of problem that sends conspiracy theorists into high gear–especially in South Florida, where a history of problems at the polls have made voters particularly skittish. A poll worker then helped Rudolf, but it took three tries to get it right, Reed said.

”I’m shocked because I really want . . . to trust that the issues with irregularities with voting machines have been resolved,” said Reed, a paralegal. “It worries me because the races are so close.”

Broward Supervisor of Elections spokeswoman Mary Cooney said it’s not uncommon for screens on heavily used machines to slip out of sync, making votes register incorrectly. Poll workers are trained to recalibrate them on the spot–essentially, to realign the video screen with the electronics inside. The 15-step process is outlined in the poll-workers manual.

The first time I read that, it sounded like nonsense, but after re-reading it I think I can guess what this is trying to say: my guess is that the touch-sensitive electronics are mis-aligned with the screen, so that the machine registers touches as being offset from their actual location.

For example, suppose that the screen is mis-aligned such that each touch is registered as being one inch above its actual position on the screen. In that case, if the Republican candidate’s button were an inch above the Democratic candidate’s button, pressing the screen in the center of the Democrat’s button would register as a press in the center of the Republican button. To vote for the Democrat, you would have to touch the screen an inch below the Democrat’s button. Voter who weren’t paying attention would accidentally vote for the Republican without noticing.

So it sounds to me like this glitch is entirely benign. But here’s the problem: if such glitches are common, they become a good way to mask real tampering. You could, for example, write a program that simulates this glitch in Republican-heavy precincts, while working correctly in Democrat-controlled precincts. In a close election, that might be enough to tip things in favor of the Democrats, and it would be extremely hard to prove afterwards.

I find it frustrating that advocates of network neutrality regulations are always so vague about what, exactly, they think the telecom companies would do if we preserve the status quo. Here’s the closest that Yochai Benkler has come (as of p. 240) in The Wealth of Networks to describing a specific threat:

As long as [broadband access is] open and neutral among uses, and are relatively cheap, the basic economics of nonmarket production described in part I should not change. Under oligopolistic conditions, however, there is a threat that the network will become too expensive to be neutral as among market and nonmarket production. If the basic upstream network connections, server space, and up-to-date reading and writing utilities become so expensive that one needs to adopt a commercial model to sustain them, then the basic economic characteristic that typifies the network information economy–the relatively large role of nonproprietary, nonmarket production–will have been reversed. However, the risk is not focused solely or even primarily on explicit pricing. One of the primary remaining scarce resources in the networked environment is user time and attention. As chapter 5 explained, owners of communications facilities can extract value from their users in ways that are more subtle than increasing price. In particular, they can make some sites and statements easier to reach and see–more prominently displayed on the screen, faster to load–and sell that relative ease to those who are willing to pay. In that environment, nonmarket sites are systematically disadvantaged irrespective of the quality of their content.

I’ve discussed the issue of blocking or slowing down sites here, so I won’t re-hash that discussion. I think the fear is overblown, but I can at least imagine how such a scheme might work. In contrast, his suggestion that a broadband ISP might make favored content “more prominently displayed on the screen” than non-favored content strikes me as fantastically implausible. I’m having trouble imagining an even halfway plausible scenario in which that might happen.

Continue reading →

Ars on the WIPO Broadcast Treaty

by on October 31, 2006

Ars has an in-depth write-up of the Broadcast Treaty now wending its way through WIPO. Their conclusion:

The most consistent criticism of the treaty is much broader than any of these specific worries. It’s a simple question: “why do we need this treaty at all?”

As the CDT puts it, “proponents of the treaty have largely failed to articulate why such a treaty is necessary.” Most broadcasters make the case that they need protection from signal theft, but the rights found in the treaty often go far beyond preventing pirates from ripping off a signal. Intel argued back in April that “the treaty should be abandoned,” and many nongovernmental organizations feel the same way.

On September 5, 2006, a group of technology and civil liberties groups (that included Verizon, Intel, and HP) banded together to sign an open letter on the treaty. “We remain unconvinced that a treaty is necessary at all.,” they said. “We note with concern that treaty proponents have not clearly identified the particular problems that the treaty would ostensibly solve, and we question whether there are in fact significant problems that are not addressed adequately under existing law.”

iCraveTV was mentioned earlier as an example of the problems that broadcasters wanted to address, but it’s noteworthy that the case was resolved without any of these new rights, and that such cases are infrequent in developed countries, where existing law is generally sufficient to address them.

Sounds about right to me. And as the article explains, this is a rare battle where the good guys seem to be winning.