-
3
-
-
77953572649
-
-
See, supra note 1, at, "How do you build a democratic system that would scale, that would get stronger as it got bigger, and bigger as it got stronger?... But like the American West of 1787, cyberspace is or at least it has been a Jeffersonian kind of place."
-
See POST, supra note 1, at 116 ("How do you build a democratic system that would scale, that would get stronger as it got bigger, and bigger as it got stronger?... But like the American West of 1787, cyberspace is (or at least it has been) a Jeffersonian kind of place.").
-
-
-
Post1
-
4
-
-
77953555745
-
-
See id, at, "The perfect Jeffersonian world, then, is one that has as much protection for speech as it can have, but only as much protection for intellectual property as it needs. Sounds like cyberspace!"
-
See id. at 202 ("The perfect Jeffersonian world, then, is one that has as much protection for speech as it can have, but only as much protection for intellectual property as it needs. Sounds like cyberspace!").
-
-
-
-
5
-
-
77953586495
-
-
See, supra note 2, at, defining and analyzing generativity
-
See ZITTRAIN, supra note 2, at 71-74 (defining and analyzing generativity);
-
-
-
Zittrain1
-
6
-
-
77953552699
-
-
id, at, "This book has explained how the Internet's generative characteristics primed it for extraordinary success-"
-
id. at 149 ("This book has explained how the Internet's generative characteristics primed it for extraordinary success-").
-
-
-
-
7
-
-
0001275092
-
Semicommon property rights and scattering in the open fields
-
See generally, introducing semicommons concept
-
See generally Henry E. Smith, Semicommon Property Rights and Scattering in the Open Fields, 29 J. LEGAL STUD. 131 (2000) (introducing semicommons concept).
-
(2000)
J. Legal Stud
, vol.29
, pp. 131
-
-
Smith, H.E.1
-
8
-
-
77953592543
-
-
Id
-
Id. at 131.
-
-
-
-
9
-
-
77953572975
-
-
See Smith, supra note 6, at, "The open-field system is a mixture of common and private ownership, and the question is, why not one or the other?"
-
See Smith, supra note 6, at 145 ("[T]he open-field system is a mixture of common and private ownership, and the question is, why not one or the other?");
-
-
-
-
10
-
-
77953600324
-
-
infra Part III
-
infra Part III.
-
-
-
-
11
-
-
77953551979
-
-
See POST, supra note 1, at, discussing layering
-
See POST, supra note 1, at 80-86 (discussing layering);
-
-
-
-
12
-
-
77953576294
-
-
supra note 2, at, "Layers facilitate polyarchies-"
-
ZITTRAIN, supra note 2, at 67-69 ("Layers facilitate polyarchies-");
-
-
-
Zittrain1
-
13
-
-
77953561835
-
-
infra Part IV. A
-
infra Part IV. A.
-
-
-
-
14
-
-
77953557383
-
-
See, supra note 2, at, 147-48 discussing "netizenship" and "personal commitments" of Wikipedia editors
-
See ZITTRAIN, supra note 2, at 142-43, 147-48 (discussing "netizenship" and "personal commitments" of Wikipedia editors);
-
-
-
Zittrain1
-
15
-
-
77953573277
-
-
infra Part IV. B. See generally, describing the history and norms of Wikipedia in detail
-
infra Part IV. B. See generally ANDREW DALBY, THE WORLD AND WIKIPEDIA: HOW WE ARE EDITING REALITY (2009) (describing the history and norms of Wikipedia in detail).
-
(2009)
The World and Wikipedia: How We Are Editing Reality
-
-
Andrew, D.1
-
16
-
-
77953599704
-
-
See POST, supra note 1, at, "Perhaps it was a coincidence that the network that became 'the Internet' was the one that operated this way.... I doubt it, though."
-
See POST, supra note 1, at 103 ("Perhaps it was a coincidence that the network that became 'the Internet' was the one that operated this way.... I doubt it, though.");
-
-
-
-
17
-
-
77953553631
-
-
supra note 2, at 30 "The bundled proprietary model. had been defeated by the Internet model...."
-
Zittrain, supra note 2, at 30 ("The bundled proprietary model... had been defeated by the Internet model....").
-
-
-
Zittrain1
-
18
-
-
77953556415
-
-
See infra Part II. A
-
See infra Part II. A.
-
-
-
-
19
-
-
77953566665
-
-
See infra Part II. B
-
See infra Part II. B.
-
-
-
-
20
-
-
77953599333
-
-
See infra Part II. C.
-
See infra Part II. C.
-
-
-
-
21
-
-
77953584389
-
-
POST, supra note 1
-
POST, supra note 1, at 16-18.
-
-
-
-
22
-
-
77953566029
-
-
Id
-
Id. at 63-64.
-
-
-
-
23
-
-
77953553629
-
-
See id
-
See id. at 63-68
-
-
-
-
24
-
-
0004310678
-
-
citing, Frank Shuffelton ed., Penguin Books, 1785
-
(citing THOMAS JEFFERSON, NOTES ON THE STATE OF VIRGINIA (Frank Shuffelton ed., Penguin Books 1999) (1785)).
-
(1999)
Notes on the State of Virginia
-
-
Thomas, J.1
-
25
-
-
77953566354
-
-
Or so Jefferson thought when he referred to the moose as a "species not existing in Europe." He was wrong; Alces aices also thrives in Scandinavia and Russia
-
Or so Jefferson thought when he referred to the moose as a "species not existing in Europe." He was wrong; Alces aices also thrives in Scandinavia and Russia.
-
-
-
-
26
-
-
77953570063
-
-
See, "Simply put, moose are giant deer that live in the northern forests of Europe, Asia, and North America."
-
See VICTOR VAN BALLENBERGHE, IN THE COMPANY OF MOOSE 1 (2004) ("Simply put, moose are giant deer that live in the northern forests of Europe, Asia, and North America.").
-
(2004)
In the Company of Moose
, pp. 1
-
-
Van Ballenberghe, V.1
-
28
-
-
77953557382
-
-
supra note 1
-
POST, supra note 1, at 63-68.
-
-
-
Post1
-
29
-
-
77953574675
-
-
See id
-
See id. at 110-16.
-
-
-
-
30
-
-
77953589872
-
-
Id
-
Id. at 209.
-
-
-
-
31
-
-
77953579001
-
-
See Press Release, comScore, Inc., Global Internet Audience Surpasses One Billion Visitors, According to comScore Jan. 23
-
See Press Release, comScore, Inc., Global Internet Audience Surpasses One Billion Visitors, According to comScore (Jan. 23, 2009), http://www.comscore. com/Press-Events/Press-Releases/2009/l/Global-Internet-Audience-l-Billion/ %281anguage%29/eng-US.
-
(2009)
-
-
-
32
-
-
77953558024
-
-
Netcraft, December 2009 Web Server Survey, last visited Apr. 10
-
Netcraft, December 2009 Web Server Survey, http://news.netcraft.com/ archives/2009/12/24/december-2009-web-server-survey.html (last visited Apr. 10, 2010);
-
(2010)
-
-
-
33
-
-
77953551327
-
The verisign domain report
-
see also, VeriSign, Mountain View, Cal., Dec. 2009, at 2, available, at, over 187 million registered domains
-
see also The VeriSign Domain Report, DOMAIN NAME INDUSTRY BRIEF (VeriSign, Mountain View, Cal.), Dec. 2009, at 2, available at http://www.verisign. com/domain-name-services/domaininformation-center/domain- name-resources/domain-name-report-dec09.pdf (over 187 million registered domains).
-
Domain Name Industry Brief
-
-
-
34
-
-
77953608705
-
-
See Posting of Jesse Alpert & Nissan Hajaj to Official Google Blog, July 25, 2008, 10:12 PDT
-
See Posting of Jesse Alpert & Nissan Hajaj to Official Google Blog, http://googleblog.blogspot.com/2008/07/we-knew-web-was-big.html (July 25, 2008, 10:12 PDT).
-
-
-
-
35
-
-
77953604190
-
Cisco sys., inc., cisco
-
available, at, pdf
-
CISCO SYS., INC., CISCO 2008 ANNUAL SECURITY REPORT 13 (2009), available at http://www.cisco.com/en/US/prod/collateral/vpndevc/securityreview 12-2.pdf.
-
(2008)
Annual Security Report
, vol.13
, pp. 12-2
-
-
-
37
-
-
77953599703
-
-
app. B, at, available
-
REPORT ON AMERICAN CONSUMERS app. B, at 32 (2009), available at http://hmi.ucsd.edu/pdf/HMI-2009-ConsumerReport-Dec9-2009.pdf.
-
(2009)
Report on American Consumers
, pp. 32
-
-
-
38
-
-
77953568415
-
-
See YouTube, YouTube Fact Sheet, last visited Apr. 10, reporting twenty hours of video uploaded per minute. My calculation assumes a forty-hour workweek. If you didn't stop to sleep or eat, you could watch a day's worth of YouTube videos in only three years and a few months
-
See YouTube, YouTube Fact Sheet, http://www.youtube.com/t/fact-sheet (last visited Apr. 10, 2010) (reporting twenty hours of video uploaded per minute). My calculation assumes a forty-hour workweek. If you didn't stop to sleep or eat, you could watch a day's worth of YouTube videos in only three years and a few months.
-
(2010)
-
-
-
39
-
-
84897607571
-
Information policy for the library of babel
-
Cf, comparing the Internet to Borges's infinite Library of Babel
-
Cf James Grimmelmann, Information Policy for the Library of Babel, 3 J. BUS. & TECH. L. 29, 38-40 (2008) (comparing the Internet to Borges's infinite Library of Babel).
-
(2008)
J. Bus. & Tech. L
, vol.3
, Issue.29
, pp. 38-40
-
-
Grimmelmann, J.1
-
40
-
-
77953564759
-
-
See, supra note 1
-
See POST, supra note 1, at 80-99.
-
-
-
Post1
-
41
-
-
77953574674
-
-
See id
-
See id. at 126-41.
-
-
-
-
42
-
-
77953584388
-
-
See id
-
See id. at 107-17.
-
-
-
-
43
-
-
77953601968
-
-
See id, at, 172-78 discussing Jefferson's vision of the settlement of the American West
-
See id. at 116-17, 172-78 (discussing Jefferson's vision of the settlement of the American West).
-
-
-
-
44
-
-
77953563794
-
-
See, supra note 2
-
See ZITTRAIN, supra note 2, at 19-35;
-
-
-
Zittrain1
-
45
-
-
33744478413
-
The generative internet
-
see also
-
see also Jonathan L. Zittrain, The Generative Internet, 119 HARV. L. REV. 1974 (2006)..
-
(2006)
Harv. L. Rev.
, vol.119
, pp. 1974
-
-
Zittrain, J.L.1
-
46
-
-
77953600648
-
-
supra note 2
-
ZITTRAIN, supra note 2, at 80-90.
-
-
-
Zittrain1
-
47
-
-
77953597454
-
-
See id, at, discussing "procrastination principle" of deferring decisions by leaving architecture open initially
-
See id. at 31 (discussing "procrastination principle" of deferring decisions by leaving architecture open initially);
-
-
-
-
48
-
-
33745599879
-
The architecture of participation: Does code architecture mitigate free riding in the open source development model?
-
cf, &, discussing importance of "option values" in open source software projects
-
cf. Carliss Y. Baldwin & Kim B. Clark, The Architecture of Participation: Does Code Architecture Mitigate Free Riding in the Open Source Development Model?, 52 MGMT. SCI. 1116 (2006) (discussing importance of "option values" in open source software projects).
-
(2006)
Mgmt. Sci
, vol.52
, pp. 1116
-
-
Baldwin, C.Y.1
Clark, K.B.2
-
49
-
-
77953605746
-
-
supra note 1
-
POST, supra note 1, at 73-99.
-
-
-
Post1
-
50
-
-
77953600977
-
-
Id, at, 178-86
-
Id. at 133-41, 178-86.
-
-
-
-
51
-
-
77953602273
-
-
supra note 2
-
ZITTRAIN, supra note 2, at 80-90.
-
-
-
Zittrain1
-
52
-
-
77953582066
-
-
Id, at, 134-35, 141-48, 223-25
-
Id. at 90-96, 134-35, 141-48, 223-25.
-
-
-
-
53
-
-
77953572648
-
-
See, e.g., supra note 1, at, titling one chapter, "Jefferson's Moose and the Problem of Scalel"
-
See, e.g., POST, supra note 1, at 60 (titling one chapter, "Jefferson's Moose and the Problem of Scalel").
-
-
-
Post1
-
54
-
-
77953554558
-
-
Id
-
Id. at 61.
-
-
-
-
55
-
-
32744475305
-
On being the right size
-
Haldane's essay itself links biological and political scale, concluding with a passage on the maximum size of a democratic state increasing with technological change and the impossibility of socialist governance of truly large states, 427, "I find it no easier to picture a completely socialized British Empire or United States than an elephant turning somersaults or a hippopotamus jumping a hedge.". Had Haldane been exposed to the Internet, he might have noted that it has an inordinate fondness for pictures of cats
-
Haldane's essay itself links biological and political scale, concluding with a passage on the maximum size of a democratic state (increasing with technological change) and the impossibility of socialist governance of truly large states. J. B. S. Haldane, On Being the Right Size, 152 HARPER'S MAG. 424, 427 (1926) ("I find it no easier to picture a completely socialized British Empire or United States than an elephant turning somersaults or a hippopotamus jumping a hedge."). Had Haldane been exposed to the Internet, he might have noted that it has an inordinate fondness for pictures of cats.
-
(1926)
Harper's Mag
, vol.152
, pp. 424
-
-
Haldane, J.B.S.1
-
56
-
-
77953583407
-
-
major networks that carry the heaviest volumes of Internet traffic are referred to as "backbones." See, e.g., supra note 2, at, Note the use of the plural
-
The major networks that carry the heaviest volumes of Internet traffic are referred to as "backbones." See, e.g., ZITTRAIN, supra note 2, at 158. Note the use of the plural.
-
-
-
Zittrain1
-
57
-
-
77953564109
-
-
See, supra note 1
-
See POST, supra note 1, at 68-79.
-
-
-
Post1
-
58
-
-
77953604838
-
-
intuition, as Henry Smith notes, goes back to Aristotle
-
The intuition, as Henry Smith notes, goes back to Aristotle.
-
-
-
-
59
-
-
67549132424
-
Governing water: The semicommons of fluid property rights
-
See, 451
-
See Henry E. Smith, Governing Water: The Semicommons of Fluid Property Rights, 50 ARIZ. L. REV. 445, 451 n. 25 (2008)
-
(2008)
Ariz. L. Rev.
, vol.50
, Issue.25
, pp. 445
-
-
Smith, H.E.1
-
61
-
-
77953569407
-
-
See infra Part II. B
-
See infra Part II. B.
-
-
-
-
62
-
-
77953589945
-
-
supra note 2, at, "Wikipedia is the canonical bee that flies despite scientists' skepticism that the aerodynamics add up. "
-
ZITTRAIN, supra note 2, at 148 ("Wikipedia is the canonical bee that flies despite scientists' skepticism that the aerodynamics add up. "
-
-
-
Zittrain1
-
64
-
-
77953558817
-
-
his conclusion, Post applies his own biological metaphor to Wikipedia, writing that Wikipedia might well be "a pretty good moose, something we could bring with us. to show to people of the Old World.", supra note 1
-
In his conclusion, Post applies his own biological metaphor to Wikipedia, writing that Wikipedia might well be "a pretty good moose, something we could bring with us... to show to people of the Old World." POST, supra note 1, at 209.
-
-
-
Post1
-
66
-
-
27644494986
-
-
Ideas, Artifacts, and Facilities: Information as a Common-Pool Resource, Winter/Spring, at 111
-
Charlotte Hess & Elinor Ostrom, Ideas, Artifacts, and Facilities: Information as a Common-Pool Resource, LAW & CONTEMP. PROBS., Winter/Spring 2003, at 111, 119-21.
-
(2003)
Law & Contemp. Probs.
, pp. 119-21
-
-
Hess, C.1
Ostrom, E.2
-
67
-
-
0001394870
-
Toward a theory of property rights
-
See
-
See Harold Demsetz, Toward a Theory of Property Rights, 57 AM. ECON. REV. 347, 354-55 (1967).
-
(1967)
Am. Econ. Rev.
, vol.57
, Issue.347
, pp. 354-55
-
-
Demsetz, H.1
-
68
-
-
0002214922
-
The structure of a contract and the theory of a non-exclusive resource
-
Excludability, by making it possible to "own" a resource, thus makes it possible to transact over it. See Steven
-
Excludability, by making it possible to "own" a resource, thus makes it possible to transact over it. See Steven N. S. Cheung, The Structure of a Contract and the Theory of a Non-exclusive Resource, 13 J. L. & ECON. 49, 64-67 (1970).
-
(1970)
J. L. & Econ.
, vol.13
, Issue.49
, pp. 64-67
-
-
Cheung, N.S.1
-
69
-
-
0006208546
-
The public production of private goods
-
See, e.g., giving example involving slaughterhouse that supplies both meat and leather
-
See, e.g., Harold Demsetz, The Public Production of Private Goods, 13 J. L. & ECON. 293, 293-94 (1970) (giving example involving slaughterhouse that supplies both meat and leather).
-
(1970)
J. L. & Econ.
, vol.13
, Issue.293
, pp. 293-94
-
-
Demsetz, H.1
-
70
-
-
0014413249
-
The tragedy of the commons
-
Garrett Hardin, The Tragedy of the Commons, 162 SCIENCE 1243 (1968).
-
(1968)
Science
, vol.162
, pp. 1243
-
-
Hardin, G.1
-
71
-
-
77953584084
-
-
Id, at, omission in original
-
Id. at 1244 (omission in original).
-
-
-
-
72
-
-
0348106307
-
On rent of fishing grounds": A translation of jens warming's 1911 article, with an introduction
-
Others had made a similar observation about another scarce natural resource that functioned as a commons: fisheries. See
-
Others had made a similar observation about another scarce natural resource that functioned as a commons: fisheries. See Peder Anderson, " On Rent of Fishing Grounds": A Translation of Jens Warming's 1911 Article, with an Introduction, 15 HIST. POL. ECON. 391 (1983);
-
(1983)
Hist. Pol. Econ.
, vol.15
, pp. 391
-
-
Anderson, P.1
-
73
-
-
0001418901
-
The economic theory of a common-property resource: The fishery
-
H. Scott Gordon, The Economic Theory of a Common-Property Resource: The Fishery, 62 J. POL. ECON. 124 (1954);
-
(1954)
J. Pol. Econ.
, vol.62
, pp. 124
-
-
Gordon, H.S.1
-
74
-
-
77953591274
-
-
see also, supra note 48
-
see also Cheung, supra note 48.
-
-
-
Cheung1
-
75
-
-
77953592193
-
-
supra note 50
-
Hardin, supra note 50, at 1248.
-
-
-
Hardin1
-
76
-
-
77953559459
-
-
Id
-
Id. at 1247.
-
-
-
-
77
-
-
77953562810
-
-
Id
-
Id. at 1245.
-
-
-
-
78
-
-
77953576293
-
-
See, supra note 48
-
See Demsetz, supra note 48, at 355.
-
-
-
Demsetz1
-
79
-
-
77953553630
-
-
See, & supra note 47
-
See CORNES & SANDLER, supra note 47, at 43;
-
-
-
Cornes1
Sandler2
-
80
-
-
77953570724
-
-
supra note 50, "Consider bank-robbing. The man who takes money from a bank acts as if the bank were a commons. How do we prevent such action?" emphasis added
-
Hardin, supra note 50, at 1247 ("Consider bank-robbing. The man who takes money from a bank acts as if the bank were a commons. How do we prevent such action?" (emphasis added)).
-
-
-
Hardin1
-
81
-
-
0041669218
-
Exclusion versus governance: Two strategies for delineating property rights
-
Henry E. Smith, Exclusion Versus Governance: Two Strategies for Delineating Property Rights, 31 J. LEGAL STUD. S453, S454-55 (2002).
-
(2002)
J. Legal Stud.
, vol.31
, Issue.S453
-
-
Smith, H.E.1
-
82
-
-
77953590261
-
-
Id
-
Id. at S454.
-
-
-
-
83
-
-
77953583747
-
-
Id
-
Id. at S455.
-
-
-
-
84
-
-
77953593735
-
-
supra note 50
-
Hardin, supra note 50, at 1247.
-
-
-
Hardin1
-
86
-
-
77953601967
-
-
Id
-
Id. at 51-88.
-
-
-
-
87
-
-
77953594064
-
-
See id, at, discussing "institutional failures and fragilities"
-
See id. at 143-78 (discussing "institutional failures and fragilities").
-
-
-
-
88
-
-
77953587851
-
-
See id
-
See id. at 88-102.
-
-
-
-
90
-
-
77953585037
-
-
See, supra note 62
-
See OSTROM, supra note 62, at 91-92.
-
-
-
Ostrom1
-
92
-
-
77953549662
-
-
See, &, supra note 47
-
See Hess & Ostrom, supra note 47, at 120.
-
-
-
Hess1
Ostrom2
-
93
-
-
77953597144
-
-
This arrangement is also described in the literature as a "limited-access commons, " see, e.g., Smith, supra note 58, at, or "limited common property, "
-
This arrangement is also described in the literature as a "limited-access commons, " see, e.g., Smith, supra note 58, at S458, or "limited common property, "
-
-
-
-
94
-
-
0041734597
-
The several futures of property: Of cyberspace and folk tales, emission trades and ecosystems
-
see, e.g., 132
-
see, e.g., Carol M. Rose, The Several Futures of Property: Of Cyberspace and Folk Tales, Emission Trades and Ecosystems, 83 MINN. L. REV. 129, 132 (1998).
-
(1998)
Minn. L. Rev.
, vol.83
, pp. 129
-
-
Rose, C.M.1
-
95
-
-
77953593081
-
-
supra note 62, at, 92-100
-
OSTROM, supra note 62, at 42-45, 92-100.
-
-
-
Ostrom1
-
96
-
-
77953555235
-
-
See, e.g., available, at, "The broadband value chain is headed for a train wreck-The broadband locomotive left the station with a critical missing piece: the incentive for network operators to support many of the bandwidth-intensive innovations planned by upstream industries and users."
-
See, e.g., BROADBAND WORKING GROUP, MASS. INST, OF TECH. COMMC'N FUTURES PROGRAM, THE BROADBAND INCENTIVE PROBLEM 2 (2005), available at http://cfp. mit.edu/docs/incentive-wp-sept2005.pdf ("The broadband value chain is headed for a train wreck-The broadband locomotive left the station with a critical missing piece: the incentive for network operators to support many of the bandwidth-intensive innovations planned by upstream industries and users.");
-
(2005)
Broadband Working Group, Mass. Inst, of Tech. Commc'N Futures Program, the Broadband Incentive Problem
, pp. 2
-
-
-
97
-
-
70349368107
-
The coming exaflood
-
Jan. 20, at All "Today's networks are not remotely prepared to handle this exaflood."
-
Bret Swanson, The Coming Exaflood, WALL ST. J., Jan. 20, 2007, at All ("Today's networks are not remotely prepared to handle this exaflood.").
-
(2007)
Wall St. J.
-
-
Swanson, B.1
-
98
-
-
77953595023
-
Shutting down big downloaders
-
See, e.g., Sept. 7, at Al "Comcast has punished some transgressors by cutting off their Internet service, arguing that excessive downloaders hog Internet capacity and slow down the network for other customers."
-
See, e.g., Kim Hart, Shutting Down Big Downloaders, WASH. POST, Sept. 7, 2007, at Al ("Comcast has punished some transgressors by cutting off their Internet service, arguing that excessive downloaders hog Internet capacity and slow down the network for other customers.").
-
(2007)
Wash. Post
-
-
Hart, K.1
-
99
-
-
79952592765
-
Wikipedia's labor squeeze and its consequences
-
See
-
See Eric Goldman, Wikipedia's Labor Squeeze and Its Consequences, 8 J. ON TELECOMM. & HIGH TECH. L. 157, 159-61 & n. l2 (2010).
-
(2010)
J. on Telecomm. & High Tech. L
, vol.8
, Issue.12-157
, pp. 159-61
-
-
Goldman, E.1
-
100
-
-
34249037496
-
Wealth without markets?
-
reviewing Benkler, supra note 46 "Taken together, these challenges are daunting, and they might push social production to the peripheries of the new economy."
-
Lior Jacob Strahilevitz, Wealth Without Markets?, 116 YALE L. J. 1472, 1493-504 (2007) (reviewing Benkler, supra note 46) ("Taken together, these challenges are daunting, and they might push social production to the peripheries of the new economy.").
-
(2007)
Yale L. J.
, vol.116
, Issue.1472
, pp. 1493-504
-
-
Strahilevitz, L.J.1
-
101
-
-
77952156335
-
Do you think bandwidth grows on trees?
-
See, e.g., 14, "YouTube has to pay for a gargantuan Internet connection to send videos to your computer and the millions of others who are demanding the most recent Dramatic Chipmunk mash-up.... Not even Google can long sustain a company that's losing close to half a billion dollars a year."
-
See, e.g., Farhad Manjoo, Do You Think Bandwidth Grows on Trees?, SLATE, APR. 14, 2009, http://www.slate.com/id/2216162/("YouTube has to pay for a gargantuan Internet connection to send videos to your computer and the millions of others who are demanding the most recent Dramatic Chipmunk mash-up.... [N]ot even Google can long sustain a company that's losing close to half a billion dollars a year.").
-
(2009)
Slate, Apr
-
-
Manjoo, F.1
-
102
-
-
77953550305
-
-
See, e.g., supra note 2, at, describing the "untenable" state of online security
-
See, e.g., ZITTRAIN, supra note 2, at 43-54 (describing the "untenable" state of online security).
-
-
-
Zittrain1
-
103
-
-
18944389038
-
An economic theory of infrastructure and commons management
-
To be more precise, as Brett Frischmann explains, goods vary in their capacity to accommodate multiple uses. But even a good with a finite capacity can still be effectively nonrivalrous if that capacity is also renewable
-
Brett M. Frischmann, An Economic Theory of Infrastructure and Commons Management, 89 MINN. L. REV. 917, 945-46 (2005). To be more precise, as Brett Frischmann explains, goods vary in their capacity to accommodate multiple uses. But even a good with a finite capacity can still be effectively nonrivalrous if that capacity is also renewable.
-
(2005)
Minn. L. Rev.
, vol.89
, Issue.917
, pp. 945-46
-
-
Frischmann, B.M.1
-
104
-
-
77953575315
-
-
Id, at, A stretch of highway may be able to accommodate 2000 cars per hour, but its use at 6:00 a.m. has essentially no effect on its ability to accommodate cars at 6:00 p. m. As long as we're beneath the level of use at which adding cars would create a traffic jam now, the highway is nonrival. Yochai Benkler has developed this point into a theory of "sharable" goods
-
Id. at 950-56. A stretch of highway may be able to accommodate 2000 cars per hour, but its use at 6:00 a.m. has essentially no effect on its ability to accommodate cars at 6:00 p. m. As long as we're beneath the level of use at which adding cars would create a traffic jam now, the highway is nonrival. Yochai Benkler has developed this point into a theory of "sharable" goods.
-
-
-
-
105
-
-
22744444496
-
Sharing nicely: On shareable goods and the emergence of sharing as a modality of economic production
-
See
-
See Yochai Benkler, Sharing Nicely: On Shareable Goods and the Emergence of Sharing as a Modality of Economic Production, 114 YALE L. J. 273, 330-44 (2004).
-
(2004)
Yale L. J.
, vol.114
, Issue.273
, pp. 330-44
-
-
Benkler, Y.1
-
107
-
-
77953554871
-
-
See, e.g., U. S. CONST, art. I, § 8, cl. 8 "To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries." emphasis added
-
See, e.g., U. S. CONST, art. I, § 8, cl. 8 ("To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries." (emphasis added)).
-
-
-
-
108
-
-
77953596790
-
-
See, e.g., & supra note 79
-
See, e.g., LANDES & POSNER, supra note 79, at 112-13.
-
-
-
Landes1
Posner2
-
109
-
-
0347125566
-
Property (and copyright) in cyberspace
-
See
-
See Trotter Hardy, Property (and Copyright) in Cyberspace, 1996 U. CHI. LEGAL F. 217, 221-28.
-
U. Chi. Legal F
, vol.1996
, Issue.217
, pp. 221-28
-
-
Hardy, T.1
-
110
-
-
58949104162
-
Making room for consumers under the DMCA
-
See
-
See Niva Elkin-Koren, Making Room for Consumers Under the DMCA, 22 BERKELEY TECH. L. J. 1119, 1119-20 (2007).
-
(2007)
Berkeley Tech. L. J.
, vol.22
, Issue.1119
, pp. 1119-20
-
-
Elkin-Koren, N.1
-
111
-
-
77953603556
-
-
See, supra note 49, at, arguing that the resulting equilibrium "allocates resources efficiently to the production of the public good"
-
See Demsetz, supra note 49, at 300-03 (arguing that the resulting equilibrium "allocates resources efficiently to the production of the public good").
-
-
-
Demsetz1
-
112
-
-
77953587850
-
-
There are, however, other important ways in which they differ. Because these nonrival goods have high fixed or first-copy costs but very low marginal costs, there's an enormous competitive advantage to being the bigger competitor in a market. Your average costs will be lower than your competitors, helping you undercut their prices and seize the whole of the market. This gives these markets-one kind of "network industry"-distinctive economics and creates special managerial and regulatory challenges
-
There are, however, other important ways in which they differ. Because these nonrival goods have high fixed (or first-copy) costs but very low marginal costs, there's an enormous competitive advantage to being the bigger competitor in a market. Your average costs will be lower than your competitors, helping you undercut their prices and seize the whole of the market. This gives these markets-one kind of "network industry"-distinctive economics and creates special managerial and regulatory challenges.
-
-
-
-
114
-
-
0004032997
-
-
semicommons analysis developed in this essay may have implications for these industries
-
OZ SHY, THE ECONOMICS OF NETWORK INDUSTRIES (2001). The semicommons analysis developed in this essay may have implications for these industries.
-
(2001)
The Economics of Network Industries
-
-
Oz, S.1
-
115
-
-
77953590968
-
-
It also has other unfortunate side effects: it cripples otherwise useful devices and smothers innovation
-
It also has other unfortunate side effects: it cripples otherwise useful devices and smothers innovation.
-
-
-
-
116
-
-
77953578006
-
The imperfect is the enemy of the good: Anticircumvention versus open development
-
See, forthcoming
-
See Wendy Seltzer, The Imperfect Is the Enemy of the Good: Anticircumvention Versus Open Development, 25 BERKELEY TECH. L. J. (forthcoming 2010).
-
(2010)
Berkeley Tech. L. J.
, vol.25
-
-
Seltzer, W.1
-
117
-
-
77953587519
-
-
a world in which she cannot price discriminate perfectly and costlessly, that is. If she could, perfect price discrimination would also in theory lead to an efficient outcome, one in which she appropriates all the value of the good, rather than other users
-
In a world in which she cannot price discriminate perfectly and costlessly, that is. If she could, perfect price discrimination would also in theory lead to an efficient outcome, one in which she appropriates all the value of the good, rather than other users.
-
-
-
-
118
-
-
0347740474
-
Cruel, mean, or lavish? Economic analysis, price discrimination and digital intellectual property
-
See, discussing "Econo-World" view of price discrimination. But that world isn't our world, and, in ours, price discrimination is costly and imperfect, leaving us to argue over second bests
-
See James Boyle, Cruel, Mean, or Lavish? Economic Analysis, Price Discrimination and Digital Intellectual Property, 53 VAND. L. REV. 2007, 2021-35 (2000) (discussing "Econo-World" view of price discrimination). But that world isn't our world, and, in ours, price discrimination is costly and imperfect, leaving us to argue over second bests.
-
(2000)
Vand. L. Rev.
, vol.53
, pp. 2021-35
-
-
Boyle, J.1
-
119
-
-
0347740473
-
An unhurried view of private ordering in information transactions
-
See, e.g., 2072
-
See, e.g., Yochai Benkler, An Unhurried View of Private Ordering in Information Transactions, 53 VAND. L. REV. 2063, 2072 (2000).
-
(2000)
Vand. L. Rev.
, vol.53
, pp. 2063
-
-
Benkler, Y.1
-
120
-
-
0009422077
-
Copyright policy and the limits of freedom of contract
-
See
-
See Niva Elkin-Koren, Copyright Policy and the Limits of Freedom of Contract, 12 BERKELEY TECH. L. J. 93, 99-100 (1997).
-
(1997)
Berkeley Tech. L. J.
, vol.12
, Issue.93
, pp. 99-100
-
-
Elkin-Koren, N.1
-
121
-
-
66049145259
-
Forseeability and copyright incentives
-
See
-
See Shyamkrishna Balganesh, Forseeability and Copyright Incentives, 122 HARV. L. REV. 1569, 1577-79 (2009).
-
(2009)
Harv. L. Rev.
, vol.122
, Issue.1569
, pp. 1577-79
-
-
Balganesh, S.1
-
122
-
-
0001011471
-
The lighthouse in economics
-
See, discussing British lighthouse system, maintained by Trinity House, a governmental body. But see id. at 363-72 discussing history of private lighthouses in Britain
-
See R. H. Coase, The Lighthouse in Economics, 17 J. L. & ECON. 357, 360-62 (1974) (discussing British lighthouse system, maintained by Trinity House, a governmental body). But see id. at 363-72 (discussing history of private lighthouses in Britain).
-
(1974)
J. L. & Econ.
, vol.17
, Issue.357
, pp. 360-62
-
-
Coase, R.H.1
-
123
-
-
77953553930
-
-
See, e.g., at, predicting that the $1, 000, 000 prize for proof of Poincare Conjecture is likely to be refused by mathematician who proved it
-
See, e.g., MASHA GESSEN, PERFECT RIGOR: AGENIUS AND THE MATHEMATICAL BREAKTHROUGH OF THE CENTURY, at vii-xi (2009) (predicting that the $1, 000, 000 prize for proof of Poincare Conjecture is likely to be refused by mathematician who proved it);
-
(2009)
Perfect Rigor: A Genius and the Mathematical Breakthrough of the Century
-
-
Masha, G.1
-
125
-
-
77953588164
-
-
On the other hand, having the government pay for it doesn't solve the problem of deciding how much to pay for it. Here, it's even more difficult to decide how much the government should spend for the sheep photograph. Since the photograph will ultimately be given away for free, the government will find it well-nigh impossible to learn how much each individual would have been willing to pay for it
-
On the other hand, having the government pay for it doesn't solve the problem of deciding how much to pay for it. Here, it's even more difficult to decide how much the government should spend for the sheep photograph. Since the photograph will ultimately be given away for free, the government will find it well-nigh impossible to learn how much each individual would have been willing to pay for it.
-
-
-
-
126
-
-
0001306218
-
The pure theory of public expenditure
-
See
-
See Paul A. Samuelson, The Pure Theory of Public Expenditure, 36 REV. ECON. & STAT. 387, 388-89 (1954).
-
(1954)
Rev. Econ. & Stat.
, vol.36
, Issue.387
, pp. 388-89
-
-
Samuelson, P.A.1
-
127
-
-
77953606742
-
-
See, supra note 78
-
See Frischmann, supra note 78, at 946-59.
-
-
-
Frischmann1
-
128
-
-
77953586314
-
-
Indeed, one of the other virtues of commons theory is its willingness to recognize that "consumers" and "producers" are often the exact same people, that individuals move between these roles seamlessly in their cultural, social, and intellectual lives
-
Indeed, one of the other virtues of commons theory is its willingness to recognize that "consumers" and "producers" are often the exact same people, that individuals move between these roles seamlessly in their cultural, social, and intellectual lives.
-
-
-
-
129
-
-
2442473073
-
Digital speech and democratic culture: A theory of freedom of expression for the information society
-
See, e.g., 4, "Freedom of speech... is interactive because speech is about speakers and listeners, who in turn become speakers themselves.... Individual speech acts are part of a larger, continuous circulation. ". The idea, however, has led to some unfortunate portmanteaus
-
See, e.g., Jack M. Balkin, Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society, 79 N. Y. U. L. REV. 1, 4 (2004) ("Freedom of speech... is interactive because speech is about speakers and listeners, who in turn become speakers themselves.... [Individual speech acts are part of a larger, continuous circulation. "). The idea, however, has led to some unfortunate portmanteaus.
-
(2004)
N. Y. U. L. Rev.
, vol.79
, pp. 1
-
-
Balkin, J.M.1
-
131
-
-
34248512822
-
Authorship in the age of the conducer
-
conducer"
-
Erez Reuveni, Authorship in the Age of the Conducer, 54 J. COPYRIGHT SOC'Y U. S. 285, 286-87 (2007) ("conducer").
-
(2007)
J. Copyright Soc'y U. S.
, vol.54
, Issue.285
, pp. 286-87
-
-
Reuveni, E.1
-
132
-
-
84864066009
-
-
Cf. Int'l News Serv. v. Associated Press, 250, Brandeis, J., dissenting "The general rule of law is, that the noblest of human productions- knowledge, truths ascertained, conceptions, and ideas-become, after voluntary communication to others, free as the air to common use."
-
Cf. Int'l News Serv. v. Associated Press, 248 U. S. 215, 250 (1918) (Brandeis, J., dissenting) ("The general rule of law is, that the noblest of human productions-knowledge, truths ascertained, conceptions, and ideas-become, after voluntary communication to others, free as the air to common use.").
-
(1918)
U. S.
, vol.248
, pp. 215
-
-
-
134
-
-
77953566028
-
-
See, supra note 78, at, arguing that this claim is likely to hold for certain kinds of infrastructural information
-
See Frischmann, supra note 78, at 990-1003 (arguing that this claim is likely to hold for certain kinds of infrastructural information).
-
-
-
Frischmann1
-
135
-
-
0242685828
-
Coase's penguin, or, linux and
-
See, e.g., The Nature of the Firm
-
See, e.g., Yochai Benkler, Coase's Penguin, or, Linux and The Nature of the Firm, 112 YALE L. J. 369, 423-36 (2002).
-
(2002)
Yale L. J.
, vol.112
, Issue.369
, pp. 423-36
-
-
Benkler, Y.1
-
136
-
-
77953577693
-
-
See, supra note 46
-
See BENKLER, supra note 46, at 59-90;
-
-
-
Benkler1
-
138
-
-
84904656914
-
The comedy of the commons: Custom, commerce, and inherently public property
-
phrase comes from Carol Rose, 768
-
The phrase comes from Carol Rose, The Comedy of the Commons: Custom, Commerce, and Inherently Public Property, 53 U. CHI. L. REV. 711, 768 (1986).
-
(1986)
U. Chi. L. Rev.
, vol.53
, pp. 711
-
-
-
140
-
-
77953589944
-
-
Eric Raymond gives the metaphor of a "magic cauldron" that produces soup ex nihilo, then argues that open source software is that cauldron made real
-
Eric Raymond gives the metaphor of a "magic cauldron" that produces soup ex nihilo, then argues that open source software is that cauldron made real.
-
-
-
-
141
-
-
77953561834
-
-
See id
-
See id. at 115.
-
-
-
-
142
-
-
77953600322
-
-
supra note
-
BENKLER, supra note 46;
-
-
-
Benkler1
-
143
-
-
77953557069
-
-
supra note 98, at, "There are increasing returns to the scale of the pool of individuals, resources, and projects to which they can be applied."
-
Benkler, supra note 98, at 415 ("[T]here are increasing returns to the scale of the pool of individuals, resources, and projects to which they can be applied.").
-
-
-
Benkler1
-
144
-
-
77953593407
-
-
inspiration for this term comes from Carol Rose's remarkable, supra note
-
The inspiration for this term comes from Carol Rose's remarkable Comedy of the Commons, supra note 100.
-
Comedy of the Commons
, pp. 100
-
-
-
145
-
-
77953566353
-
-
See, e.g., supra note 98
-
See, e.g., Benkler, supra note 98, at 404-05.
-
-
-
Benkler1
-
147
-
-
27944436178
-
Anarchism triumphant: Free software and the death of copyright
-
Cf, Aug. 2, "So Moglen's Metaphorical Corollary to Faraday's Law says that if you wrap the Internet around every person on the planet and spin the planet, software flows in the network. It's an emergent property of connected human minds that they create things for one another's pleasure and to conquer their uneasy sense of being too alone."
-
Cf Eben Moglen, Anarchism Triumphant: Free Software and the Death of Copyright, FIRST MONDAY, Aug. 2, 1999, http://firstmonday.org/htbin/cgiwrapftin/ ojs/index.php/frn/article/view/684/594 ("So Moglen's Metaphorical Corollary to Faraday's Law says that if you wrap the Internet around every person on the planet and spin the planet, software flows in the network. It's an emergent property of connected human minds that they create things for one another's pleasure and to conquer their uneasy sense of being too alone.").
-
(1999)
First Monday
-
-
Moglen, E.1
-
148
-
-
77953605418
-
-
See, e.g., supra note 2, at, closure of Nupedia
-
See, e.g., ZITTRAIN, supra note 2, at 133 (closure of Nupedia);
-
-
-
Zittrain1
-
149
-
-
77953587170
-
Encyclopedic knowledge, then vs. Now
-
May 3, at BU3 end of Encarta
-
Randall Stross, Encyclopedic Knowledge, Then vs. Now, N. Y. TIMES, May 3, 2009, at BU3 (end of Encarta);
-
(2009)
N. Y. Times
-
-
Stross, R.1
-
150
-
-
77953565685
-
-
On Wikipedia, On Citizendium, Jan. 18, 2010, 16:06 "stagnation" of Citizendium
-
On Wikipedia, On Citizendium, http://onwikipedia.blogspot.com/2010/01/ oncitizendium.html (Jan. 18, 2010, 16:06) ("stagnat[ion]" of Citizendium);
-
-
-
-
151
-
-
77953566996
-
Poor google knol has gone from a wikipedia killer to a craigslist wannabe
-
Aug. 11, decline of Knol
-
Erick Schonfeld, Poor Google Knol Has Gone from a Wikipedia Killer to a Craigslist Wannabe, TECHCRUNCH, Aug. 11, 2009, http://techcrunch.com/2009/08/ll/ poor-google-knol-hasgone-from-a-wikipedia-killer-to-a-craigslist-wannabe/ (decline of Knol).
-
(2009)
Techcrunch
-
-
Schonfeld, E.1
-
152
-
-
77953572647
-
-
supra note 1
-
POST, supra note 1, at 133-41.
-
-
-
Post1
-
153
-
-
77953564758
-
-
supra note 2
-
ZITTRALN, supra note 2, at 141.
-
-
-
Zittraln1
-
154
-
-
77953590260
-
-
These same standards were in many cases developed in open participatory processes, where all-important decisions were made on a consensus basis
-
These same standards were in many cases developed in open participatory processes, where all-important decisions were made on a consensus basis.
-
-
-
-
156
-
-
51849158053
-
What is web 2.0
-
See, Sept. 30
-
See Tim O'Reilly, What Is Web 2.0, O'REILLY, Sept. 30, 2005, http://oreilly.com/web2/archive/what-is-web-20.html;
-
(2005)
O'Reilly
-
-
O'Reilly, T.1
-
157
-
-
77953598392
-
-
cf, supra note 2, at, discussing "API neutrality"
-
cf. ZITTRAIN, supra note 2, at 181-85 (discussing "API neutrality").
-
-
-
Zittrain1
-
159
-
-
77953572328
-
-
See supra Part II. B
-
See supra Part II. B.
-
-
-
-
160
-
-
77953591883
-
-
See supra Part II. C.
-
See supra Part II. C.
-
-
-
-
161
-
-
77953598700
-
-
supra note 6
-
Smith, supra note 6, at 131-32.
-
-
-
Smith1
-
162
-
-
77953549661
-
-
See id
-
See id. at 168.
-
-
-
-
163
-
-
77953571389
-
-
Id, at, Yes, sheep and pastures again. Hardin's tragic commons and Ostrom's potentially sustainable one are the same as Smith's semicommons, just theorized differently
-
Id. at 132. Yes, sheep and pastures again. Hardin's tragic commons and Ostrom's potentially sustainable one are the same as Smith's semicommons, just theorized differently.
-
-
-
-
164
-
-
77953579000
-
-
Id
-
Id.
-
-
-
-
165
-
-
77953576927
-
-
Id
-
Id. at 135-36.
-
-
-
-
166
-
-
77953605745
-
-
See id
-
See id. at 136-38.
-
-
-
-
167
-
-
33947542912
-
Property in land
-
See
-
See Robert C. Ellickson, Property in Land, 102 YALE L. J. 1315, 1327-30 (1993).
-
(1993)
Yale L. J.
, vol.102
, Issue.1315
, pp. 1327-30
-
-
Ellickson, R.C.1
-
168
-
-
77953569406
-
-
sometimes during them, as required by crop rotation
-
And sometimes during them, as required by crop rotation.
-
-
-
-
169
-
-
77953550647
-
-
supra note 6, at, 135
-
Smith, supra note 6, at 132, 135.
-
-
-
Smith1
-
170
-
-
77953608156
-
-
Id
-
Id. at 136.
-
-
-
-
171
-
-
77953592759
-
-
Id
-
Id. at 138-41.
-
-
-
-
172
-
-
77953599332
-
-
Id
-
Id. at 138-39.
-
-
-
-
173
-
-
77953599030
-
-
Id
-
Id. at 149.
-
-
-
-
174
-
-
77953560456
-
-
Id
-
Id. at 140-41.
-
-
-
-
175
-
-
77953594377
-
-
Id
-
Id. at 141.
-
-
-
-
176
-
-
77953550982
-
-
Id
-
Id. at 141-42.
-
-
-
-
177
-
-
77953573925
-
-
Id
-
Id. at 142 & n. 27.
-
, Issue.27
, pp. 142
-
-
-
178
-
-
77953547391
-
-
Id
-
Id.
-
-
-
-
179
-
-
77953581399
-
-
Id
-
Id. at 161-67.
-
-
-
-
180
-
-
77953596093
-
-
Id
-
Id. at 146-54.
-
-
-
-
181
-
-
77953589477
-
-
Id
-
Id. at 147-48.
-
-
-
-
182
-
-
77953608493
-
-
See infra Part IV. A
-
See infra Part IV. A.
-
-
-
-
183
-
-
77953579354
-
-
See infra Part IV. C.
-
See infra Part IV. C.
-
-
-
-
184
-
-
77953595663
-
-
See, Definitions and Technical Jargon of the Hosting Industry, last visited Apr. 10, 2010 "In a managed hosting environment, the provider owns the data centers, the network, the server and other devices, and is responsible for deploying, maintaining and monitoring them.... Dedicated Hosting... allows customers to lease pre-configured, dedicated equipment and connectivity from the provider."
-
See Rackspace, Definitions and Technical Jargon of the Hosting Industry, http://www.rackspace.corn/information/hostingl01/definitions.php (last visited Apr. 10, 2010) ("In a managed hosting environment, the provider owns the data centers, the network, the server and other devices, and is responsible for deploying, maintaining and monitoring them.... Dedicated Hosting... allows customers to lease pre-configured, dedicated equipment and connectivity from the provider.").
-
-
-
Rackspace1
-
185
-
-
77953596443
-
-
® Network today operates as one of the largest IP transit networks in North America and Europe."
-
® Network today operates as one of the largest IP transit networks in North America and Europe.").
-
Our Network
-
-
-
186
-
-
77953590250
-
-
To be clear, I'm focusing more on tangible communications platform as a common use, rather than the intangible information exchanged on it. The nonrivalry of information and the Comedic story explain why the Internet is so valuable as a communications platform; they don't actually make the Internet into information or eliminate the challenges of rivalry. We've faced the problem of exchanging nonrival information over rival communications infrastructure for a long time; the Internet is just better at the task than its predecessors
-
To be clear, I'm focusing more on tangible communications platform as a common use, rather than the intangible information exchanged on it. The nonrivalry of information and the Comedic story explain why the Internet is so valuable as a communications platform; they don't actually make the Internet into information or eliminate the challenges of rivalry. We've faced the problem of exchanging nonrival information over rival communications infrastructure for a long time; the Internet is just better at the task than its predecessors.
-
-
-
-
187
-
-
77953583746
-
-
See generally, supra note 78, at, describing the Internet as infrastructure. Robert Heverly has written an important and illuminating article on how intellectual property law makes information a semicommons of positively interacting private and common uses
-
See generally Frischmann, supra note 78, at 1005-22 (describing the Internet as infrastructure). Robert Heverly has written an important and illuminating article on how intellectual property law makes information a semicommons of positively interacting private and common uses.
-
-
-
Frischmann1
-
188
-
-
33751557843
-
-
he Information Semicommons
-
Robert A. Heverly, he Information Semicommons, 18 BERKELEY TECH. L. J. 1127 (2003);
-
(2003)
Berkeley Tech. L. J.
, vol.18
, pp. 1127
-
-
Heverly, R.A.1
-
189
-
-
67549094580
-
Building a reliable semicommons of creative works: Enforcement of creative commons licenses and limited abandonment of copyright
-
see also
-
see also Lydia Pallas Loren, Building a Reliable Semicommons of Creative Works: Enforcement of Creative Commons Licenses and Limited Abandonment of Copyright, 14 GEO. MASON L. REV. 271 (2007);
-
(2007)
Geo. Mason L. Rev.
, vol.14
, pp. 271
-
-
Loren, L.P.1
-
190
-
-
1842815078
-
A new dynamism in the public domain
-
describing Creative Commons as a "semicommons" in Heverly's sense
-
Robert P. Merges, A New Dynamism in the Public Domain, 71 U. CHI. L. REV. 183 (2004) (describing Creative Commons as a "semicommons" in Heverly's sense).
-
(2004)
U. Chi. L. Rev.
, vol.71
, pp. 183
-
-
Merges, R.P.1
-
192
-
-
0003527984
-
-
See 1, 5th ed, describing IP datagram format and routing; INFO. SCIS. INST., RFC 791, INTERNET PROTOCOL: DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION § 2.3 1981, "The function or purpose of Internet Protocol is to move datagrams through an interconnected set of networks. This is done by passing the datagrams from one internet module to another until the destination is reached."
-
See 1 DOUGLAS COMER, INTERNETWORKING WITH TCP/IP: PRINCIPLES, PROTOCOLS, AND ARCHITECTURE (5th ed. 2006) (describing IP datagram format and routing); INFO. SCIS. INST., RFC 791, INTERNET PROTOCOL: DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION § 2.3 (1981), http://tools.ietf.org/html/rfc791 ("The function or purpose of Internet Protocol is to move datagrams through an interconnected set of networks. This is done by passing the datagrams from one internet module to another until the destination is reached.").
-
(2006)
Internetworking With TCP/IP: Principles, Protocols, and Architecture
-
-
Douglas, C.1
-
193
-
-
34547696894
-
-
See generally, & HTTP:, describing HTTP standard
-
See generally DAVID GOURLEY & BRIAN TOTTY, HTTP: THE DEFINITIVE GUIDE (2002) (describing HTTP standard).
-
(2002)
The Definitive Guide
-
-
David, G.1
Totty, B.2
-
195
-
-
0003663927
-
-
RFC 821, hereinafter RFC 821 detailing SMTP standard
-
JONATHAN B. POSTEL, RFC 821, SIMPLE MAIL TRANSFER PROTOCOL (1982), http://tools.ietf.org/html/rfc821 [hereinafter RFC 821] (detailing SMTP standard).
-
(1982)
Simple Mail Transfer Protocol
-
-
Jonathan, B.P.1
-
196
-
-
77953606073
-
-
See, supra note 1
-
See POST, supra note 1, at 101-03;
-
-
-
Post1
-
197
-
-
77953578322
-
-
supra note 2
-
ZITTRAIN, supra note 2, at 26-35.
-
-
-
Zittrain1
-
198
-
-
67549130098
-
Governing the tele-semicommons
-
Cf, applying semicommons theory to argue against the use of common property treatment of individual physical network elements
-
Cf. Henry E. Smith, Governing the Tele-Semicommons, 22 Yale J. on Reg. 289 (2005) (applying semicommons theory to argue against the use of common property treatment of individual physical network elements).
-
(2005)
Yale J. on Reg
, vol.22
, pp. 289
-
-
Smith, H.E.1
-
199
-
-
77953580377
-
-
See, CNET NEWS, Jan. 19
-
See Joris Evers, Computer Crime Costs $67 Billion, FBI Says, CNET NEWS, Jan. 19, 2006, http://news.cnet.com/Computer-crime-costs-67-billion,-FBI- says/2100-7349-3-6028946.html.
-
(2006)
Computer Crime Costs $67 Billion, Fbi Says
-
-
Evers, J.1
-
200
-
-
77953593079
-
-
See, e.g., supra note 2, at, advocating "a simple dashboard that lets the users of PCs make quick judgments about the nature and quality of the code they are about to run". Such sentiments assume that users have the sort of autonomy over their PCs that a private property owner would, a principle Zittrain strongly endorses
-
See, e.g., ZITTRAIN, supra note 2, at 159 (advocating "a simple dashboard that lets the users of PCs make quick judgments about the nature and quality of the code they are about to run"). Such sentiments assume that users have the sort of autonomy over their PCs that a private property owner would, a principle Zittrain strongly endorses.
-
-
-
Zittrain1
-
201
-
-
77953563146
-
-
See id
-
See id. at 108-09.
-
-
-
-
202
-
-
77953588809
-
-
See, &, A Refutation of Metcalfe's Law and a Better Estimate for the Value of Networks and Network Interconnections 4 Mar. 2, unpublished manuscript, available, at, arguing that the value of an n-user network grows as n log n
-
See Andrew Odlyzko & Benjamin Tilly, A Refutation of Metcalfe's Law and a Better Estimate for the Value of Networks and Network Interconnections 4 (Mar. 2, 2005) (unpublished manuscript), available at http://www.dtc.umn. edu/-odlyzko/doc/metcalfe.pdf (arguing that the value of an n-user network grows as n log n);
-
(2005)
-
-
Odlyzko, A.1
Tilly, B.2
-
203
-
-
33746165139
-
Metcalfe's law is wrong
-
see also, July, at, later version of Odlyzko & Tilly article
-
see also Bob Briscoe et al., Metcalfe's Law Is Wrong, IEEE Spectrum, July 2006, at 35 (later version of Odlyzko & Tilly article).
-
(2006)
Ieee Spectrum
, pp. 35
-
-
Briscoe, B.1
-
204
-
-
77953568414
-
-
Lauren Gelman observes that users often post sensitive information in publicly accessible ways online. Her point is that public accessibility allows you to reach others who share your interests, even when you couldn't identify them at the time of the posting. The value of reaching them can outweigh even significant privacy risks of being noticed by outsiders
-
Lauren Gelman observes that users often post sensitive information in publicly accessible ways online. Her point is that public accessibility allows you to reach others who share your interests, even when you couldn't identify them at the time of the posting. The value of reaching them can outweigh even significant privacy risks of being noticed by outsiders.
-
-
-
-
205
-
-
77953552698
-
Privacy, free speech, and "blurry-edged" social networks
-
See
-
See Lauren Gelman, Privacy, Free Speech, and "Blurry-Edged" Social Networks, 50 B. C. L. REV. 1315, 1334-35 (2009).
-
(2009)
B. C. L. Rev.
, vol.50
, Issue.1315
, pp. 1334-35
-
-
Gelman, L.1
-
206
-
-
77953574983
-
-
Paul Ohm has pointed out that in many cases, just trying to meter or monitor these information flows-a necessary step in privatizing them-would in many circumstances be ruinously costly
-
Paul Ohm has pointed out that in many cases, just trying to meter or monitor these information flows-a necessary step in privatizing them-would in many circumstances be ruinously costly.
-
-
-
-
207
-
-
70450253119
-
The rise and fall of invasive isp surveillance, 2009
-
See
-
See Paul Ohm, The Rise and Fall of Invasive ISP Surveillance, 2009 U. ILL. L. REV. 1417.
-
U. Ill. L. Rev.
, pp. 1417
-
-
Ohm, P.1
-
208
-
-
0037986424
-
Cyberspace as place and the tragedy of the digital anticommons
-
See, e.g.
-
See, e.g., Dan Hunter, Cyberspace as Place and the Tragedy of the Digital Anticommons, 91 CAL. L. REV. 439, 500-14 (2003).
-
(2003)
Cal. L. Rev.
, vol.91
, Issue.439
, pp. 500-14
-
-
Hunter, D.1
-
209
-
-
58049141211
-
Free! why $0.00 is the future of business
-
See, Mar
-
See Chris Anderson, Free! Why $0.00 Is the Future of Business, WIRED, Mar. 2008, at 140.
-
(2008)
Wired
, pp. 140
-
-
Anderson, C.1
-
210
-
-
77953575946
-
One year after capping bandwidth, comcast still offers no meter
-
See, e.g., Aug. 21
-
See, e.g., Jesse Kirdahy-Scalia, One Year After Capping Bandwidth, Comcast Still Offers No Meter, OPEN MEDIA BOSTON, Aug. 21, 2009, http://www.openmediaboston.org/node/860.
-
(2009)
Open Media Boston
-
-
Kirdahy-Scalia, J.1
-
211
-
-
77953558023
-
-
See supra notes 22-23 and accompanying text
-
See supra notes 22-23 and accompanying text.
-
-
-
-
212
-
-
77953568744
-
-
supra note 6
-
Smith, supra note 6, at 132.
-
-
-
Smith1
-
213
-
-
77953578005
-
-
supra note 2
-
ZITTRAIN, supra note 2, at 11-18.
-
-
-
Zittrain1
-
214
-
-
77953553628
-
-
Id
-
Id. at 19-35.
-
-
-
-
215
-
-
77953574349
-
-
Id
-
Id. at 101-04.
-
-
-
-
216
-
-
77950953070
-
Lost in the cloud
-
Op-Ed., July 20
-
Jonathan Zittrain, Op-Ed., Lost in the Cloud, N. Y. TIMES, July 20, 2009, at A19.
-
(2009)
N. Y. Times
-
-
Zittrain, J.1
-
217
-
-
77953565025
-
-
supra note 2
-
ZITTRAIN, supra note 2, at 165.
-
-
-
Zittrain1
-
218
-
-
77953581035
-
-
supra note 33
-
ZITTRAIN, supra note 33, at 1990.
-
-
-
Zittrain1
-
219
-
-
77953607081
-
-
supra note 6
-
Smith, supra note 6, at 138-39.
-
-
-
Smith1
-
220
-
-
77953601628
-
-
See supra Part II. A
-
See supra Part II. A.
-
-
-
-
221
-
-
77953557714
-
-
Smith, supra note 6, at, arguing that border-setting semicommons explanation of scattering is superior to other economic explanations
-
Smith, supra note 6, at 146-54 (arguing that border-setting semicommons explanation of scattering is superior to other economic explanations).
-
-
-
-
224
-
-
77953581398
-
Int'l telecomm. Union, itu-t recommendation x.200
-
TELECOMM. STANDARDIZATION SECTOR, § 5.2
-
TELECOMM. STANDARDIZATION SECTOR, INT'L TELECOMM. UNION, ITU-T RECOMMENDATION X.200, INFORMATION TECHNOLOGY-OPEN SYSTEMS INTERCONNECTION-BASIC REFERENCE MODEL: THE BASIC MODEL § 5.2, at 6-8 (1994), http://www.itu.int/ rec/dologin-pub.asp? lang=e&id=T-REC-X.200-199407-I!!PDF-E&type=items.
-
(1994)
Information Technology-Open Systems Interconnection-Basic Reference Model: The Basic Model
, pp. 6-8
-
-
-
227
-
-
77953593406
-
-
See, supra note 167
-
See TANENBAUM, supra note 167, at 37-71.
-
-
-
Tanenbaum1
-
228
-
-
77953559777
-
-
To be more precise, this claim would also include the ancillary routing protocols, such as the Border Gateway Protocol BGP and the Routing Information Protocol RIP, that tell IP-implementing systems which other computers they should forward IP traffic through
-
To be more precise, this claim would also include the ancillary routing protocols, such as the Border Gateway Protocol (BGP) and the Routing Information Protocol (RIP), that tell IP-implementing systems which other computers they should forward IP traffic through.
-
-
-
-
229
-
-
77953560455
-
-
See COMER, supra note 143, at, describing BGP and RIP
-
See COMER, supra note 143, at 249-93 (describing BGP and RIP).
-
-
-
-
230
-
-
77953568099
-
-
current version of IP in broad use is version 4; there is a worldwide effort underway to upgrade to version 6. But IP's universality makes this upgrade both technically challenging and politically contentious: any widely adopted change to IP will change the nature of the Internet itself
-
The current version of IP in broad use is version 4; there is a worldwide effort underway to upgrade to version 6. But IP's universality makes this upgrade both technically challenging and politically contentious: any widely adopted change to IP will change the nature of the Internet itself.
-
-
-
-
231
-
-
77953553627
-
-
See, supra note 142
-
See DENARDIS, supra note 142, at 4;
-
-
-
Denardis1
-
232
-
-
0003725885
-
-
We again will have to decide whether this architecture of regulabiliry is creating the cyberspace we want. A choice. A need to make a choice."
-
LAWRENCE LESSIG, CODE: AND OTHER LAWS OF CYBERSPACE 207-09 (1999) ("[W]e again will have to decide whether this architecture of regulabiliry is creating the cyberspace we want. A choice. A need to make a choice.").
-
(1999)
Code: And Other Laws of Cyberspace
, pp. 207-09
-
-
Lawrence, L.1
-
233
-
-
77953561450
-
Dr. Generative-or how I learned to stop worrying and love the iphone
-
See, &, forthcoming, book review
-
See James Grimmelmann & Paul Ohm, Dr. Generative-Or How I Learned To Stop Worrying and Love the iPhone, 69 MD. L. REV. (forthcoming 2010) (book review).
-
(2010)
Md. L. Rev.
, vol.69
-
-
Grimmelmann, J.1
Ohm, P.2
-
235
-
-
2642547504
-
The layers principle: Internet architecture and the law
-
Lawrence B. Solum & Minn Chung, The Layers Principle: Internet Architecture and the Law, 79 NOTRE DAME L. REV. 815, 818-20 (2004);
-
(2004)
Notre Dame L. Rev.
, vol.79
, Issue.815
, pp. 818-20
-
-
Solum, L.B.1
Chung, M.2
-
236
-
-
18144362705
-
A layered model for internet policy
-
Kevin Werbach, A Layered Model for Internet Policy, 1 J. ON TELECOMM. & HIGH TECH. L. 37, 57-60 (2002);
-
(2002)
J. on Telecomm. & High Tech. L
, vol.1
, Issue.37
, pp. 57-60
-
-
Werbach, K.1
-
237
-
-
0347651293
-
Application-centered internet analysis
-
Timothy Wu, Application-Centered Internet Analysis, 85 VA. L. REV. 1163, 1188-93 (1999).
-
(1999)
Va. L. Rev.
, vol.85
, Issue.1163
, pp. 1188-93
-
-
Wu, T.1
-
238
-
-
77953561826
-
-
See, &, supra note 173, at, discussing coexistence of multiple layers
-
See Solum & Chung, supra note 173, at 838-44 (discussing coexistence of multiple layers).
-
-
-
Solum1
Chung2
-
239
-
-
77953554864
-
-
See, supra note 2, at, discussing "hourglass architecture" of IP
-
See ZITTRAIN, supra note 2, at 67-71 (discussing "hourglass architecture" of IP).
-
-
-
Zittrain1
-
241
-
-
77953563793
-
-
See, supra note 1, at, discussing the simplicity of IP
-
See POST, supra note 1, at 82-89 (discussing the simplicity of IP).
-
-
-
Post1
-
243
-
-
77953582057
-
Rise of the stupid network
-
See, June, "The Stupid Network would let you send mixed data types at will.... You would not have to ask your Stupid Network provider for any special network modifications.... A rudimentary form of the Stupid Network-the Internet-is here today."
-
See David Isenberg, Rise of the Stupid Network, J. HYPERLINKED ORG., June 1997, http://www.hyperorg.com/misc/stupidnet.html ("The Stupid Network would let you send mixed data types at will.... You would not have to ask your Stupid Network provider for any special network modifications.... A rudimentary form of the Stupid Network-the Internet-is here today.").
-
(1997)
J. Hyperlinked Org.
-
-
Isenberg, D.1
-
244
-
-
84976845043
-
End-to-end arguments in system design
-
See, 278
-
See J. H. Saltzer et al., End-to-End Arguments in System Design, 2 ACM TRANSACTIONS ON COMPUTER SYS. 277, 278 (1984).
-
(1984)
Acm Transactions on Computer Sys
, vol.2
, pp. 277
-
-
Saltzer, J.H.1
-
245
-
-
27744507420
-
-
For example, network A will hand off packets destined for network B's users as soon as possible, so that network B does the bulk of the work to deliver them. See, &
-
For example, network A will hand off packets destined for network B's users as soon as possible, so that network B does the bulk of the work to deliver them. See JONATHAN E. NUECHTERLEIN & PHILIP J. WEISER, DIGITAL CROSSROADS: AMERICAN TELECOMMUNICATIONS POLICY IN THE INTERNET AGE 42-44 (2005).
-
(2005)
Digital Crossroads: American Telecommunications Policy in the Internet Age
, pp. 42-44
-
-
Jonathan, E.N.1
Weiser, P.J.2
-
246
-
-
77953567326
-
-
See, supra note 2, at, Of course, we might classify these contentlevel costs as burdens on the private resources of users' attention, but saying that this is a cost imposed on the commons, even if less descriptively precise, is clearer in terms of pinpointing the problem
-
See ZITTRAIN, supra note 2, at 36-51. Of course, we might classify these contentlevel costs as burdens on the private resources of users' attention, but saying that this is a cost imposed on the commons, even if less descriptively precise, is clearer in terms of pinpointing the problem.
-
-
-
Zittrain1
-
247
-
-
77953547065
-
On the job, a spam fighter is learning
-
See, Mar. 30, at C1 describing the Spam Cube, a home device to filter spam. The Spam Cube, like other spam-fighting technologies, is costly in two different ways. It costs $150, and along with the spam it catches, it also blocks legitimate emails
-
See David Pogue, On the Job, a Spam Fighter Is Learning, N. Y. TIMES, Mar. 30, 2006, at C1 (describing the Spam Cube, a home device to filter spam). The Spam Cube, like other spam-fighting technologies, is costly in two different ways. It costs $150, and along with the spam it catches, it also blocks legitimate emails.
-
(2006)
N. Y. Times
-
-
Pogue, D.1
-
248
-
-
77953583018
-
-
Id
-
Id.
-
-
-
-
249
-
-
77953589530
-
-
See ReCAPTCHA, What Is a CAPTCHA?, last visited Apr. 10, "A CAPTCHA is a program that can generate and grade tests that humans can pass but current computer programs cannot."
-
See ReCAPTCHA, What Is a CAPTCHA?, http://recaptcha.net/captcha.html (last visited Apr. 10, 2010) ("A CAPTCHA is a program that can generate and grade tests that humans can pass but current computer programs cannot.").
-
(2010)
-
-
-
250
-
-
77953567328
-
-
But CAPTCHAs are costly, too. See BaltTech, Towson U., National Federation of the Blind Re-Invent CAPTCHA, Nov. 18, 2009, 8:18 EST quoting computer science professor Jonathan Lazar as saying, "basically, computer viruses are twice as successful as blind people on the old captchas."
-
But CAPTCHAs are costly, too. See BaltTech, Towson U., National Federation of the Blind Re-Invent CAPTCHA, http://weblogs.bdtimoresun. com/news/tecrmology/2009/ll/towso (Nov. 18, 2009, 8:18 EST) (quoting computer science professor Jonathan Lazar as saying, "[b]asically, computer viruses are twice as successful as blind people on the old captchas.").
-
-
-
-
251
-
-
0003437009
-
-
See, at, 2d ed, defining "firewall gateway" as a dedicated computer that is the only one on a network to communicate with the outside world
-
See WILLIAM R. CHESWICK ET AL., FIREWALLS AND INTERNET SECURITY: REPELLING THE WILY HACKER, at xviii (2d ed. 2003) (defining "firewall gateway" as a dedicated computer that is the only one on a network to communicate with the outside world);
-
(2003)
Firewalls and Internet Security: Repelling the Wily Hacker
-
-
William, R.C.1
-
252
-
-
77953556411
-
-
id, at, describing how firewalls can provide specialized security. It's costly to add a dedicated computer to a network for no other purpose than security-to say nothing of the expense of configuring and monitoring it, or buying books like Firewalls and Internet Security
-
id. at 173-96 (describing how firewalls can provide specialized security). It's costly to add a dedicated computer to a network for no other purpose than security-to say nothing of the expense of configuring and monitoring it, or buying books like Firewalls and Internet Security.
-
-
-
-
254
-
-
77953547690
-
-
Id
-
Id.
-
-
-
-
255
-
-
77953557381
-
-
Solum & Chung, supra note 173, discuss at length the policy virtues of respecting boundaries between layers
-
Solum & Chung, supra note 173, discuss at length the policy virtues of respecting boundaries between layers.
-
-
-
-
256
-
-
0039625789
-
Limiting a medium without boundaries
-
Jan. 15
-
Peter H. Lewis, Limiting a Medium Without Boundaries, N. Y. TIMES, Jan. 15, 1996, at D4.
-
(1996)
N. Y. Times
-
-
Lewis, P.H.1
-
257
-
-
77953556721
-
-
supra note 173, at, 936-42
-
Solum & Chung, supra note 173, at 829-31, 936-42.
-
-
-
Solum1
Chung2
-
258
-
-
77953585661
-
-
This is not to enter the debates on network neutrality as a matter of policy. My point is merely that layering as a form of boundary-setting limits certain forms of self-interested behavior by private owners; evaluating whether this is a good thing or a bad thing would require more analysis than can fit in this margin
-
This is not to enter the debates on network neutrality as a matter of policy. My point is merely that layering as a form of boundary-setting limits certain forms of self-interested behavior by private owners; evaluating whether this is a good thing or a bad thing would require more analysis than can fit in this margin.
-
-
-
-
259
-
-
77953560106
-
-
This is another layered system, but note that the private/common division is different than the one discussed in the previous section. Here, the system is held in common at the content layer, but is essentially private at every lower layer
-
This is another layered system, but note that the private/common division is different than the one discussed in the previous section. Here, the system is held in common at the content layer, but is essentially private at every lower layer.
-
-
-
-
260
-
-
77953591576
-
-
Laboratorium, last visited Apr. 10
-
The Laboratorium, http://laboratorium.net/(last visited Apr. 10, 2010).
-
(2010)
-
-
-
261
-
-
77953558016
-
-
See, Posting of Chad Hurley to YouTube Blog, Oct. 9
-
See Posting of Chad Hurley to YouTube Blog, http://youtube-global. blogspot.com/2009/10/y000000000utube.html (Oct. 9, 2009).
-
(2009)
-
-
-
262
-
-
77953583318
-
-
this respect, these particular Internet semicommons are more susceptible to Demsetzian explanations than many offline property systems and legal regimes, where the problem of collective action looms larger
-
In this respect, these particular Internet semicommons are more susceptible to Demsetzian explanations than many offline property systems and legal regimes, where the problem of collective action looms larger.
-
-
-
-
263
-
-
0001394870
-
Toward a theory of property rights
-
See, describing evolution of property rights as efficient response when value from more intensive use increases. Scholars, however, have raised difficult questions about the mechanism by which this evolution would take place
-
See Harold Demsetz, Toward a Theory of Property Rights, 57 AM. ECON. REV. PROC. 347 (1967) (describing evolution of property rights as efficient response when value from more intensive use increases). Scholars, however, have raised difficult questions about the mechanism by which this evolution would take place.
-
(1967)
Am. Econ. Rev. Proc
, vol.57
, pp. 347
-
-
Demsetz, H.1
-
264
-
-
0042170038
-
Two stories about the evolution of property rights
-
See, e.g., noting ambiguity between optimistic Demsetzian story of the evolution of efficient property regimes and pessimistic story about selfish interest groups capturing value for themselves. A UGC site, however, as a resource, doesn't preexist the semicommons form so that its users can hardly be accused of appropriating a commons for their exclusive use, and its users make individual voluntary decisions to take part when the rewards outweigh the costs thus providing a straightforward mechanism for the collective decision to use a particular governance regime. This isn't to say that UGC sites are free of interest-group dynamics, or that they don't face collective action dilemmas, only that their initial development of a property system may pose less of a puzzle than the development of property systems in purely tangible online resources
-
See, e.g., Saul Levmore, Two Stories About the Evolution of Property Rights, 31 J. LEGAL STUD. S421, S425-33 (2002) (noting ambiguity between optimistic Demsetzian story of the evolution of efficient property regimes and pessimistic story about selfish interest groups capturing value for themselves). A UGC site, however, as a resource, doesn't preexist the semicommons form (so that its users can hardly be accused of appropriating a commons for their exclusive use), and its users make individual voluntary decisions to take part when the rewards outweigh the costs (thus providing a straightforward mechanism for the collective decision to use a particular governance regime). This isn't to say that UGC sites are free of interest-group dynamics, or that they don't face collective action dilemmas, only that their initial development of a property system may pose less of a puzzle than the development of property systems in purely tangible online resources.
-
(2002)
J. Legal Stud.
, vol.31
, Issue.S421
-
-
Levmore, S.1
-
265
-
-
77953593069
-
-
See, supra note 106
-
See ROSENBERG, supra note 106, at 178-85.
-
-
-
Rosenberg1
-
266
-
-
77953602902
-
-
Sometimes, as with Twitter, the ad revenue isn't there yet and may not ever be, if the skeptics are to be believed, but the prospect of monetizing the eyeballs justifies the upfront expenses of building the community
-
Sometimes, as with Twitter, the ad revenue isn't there yet (and may not ever be, if the skeptics are to be believed), but the prospect of monetizing the eyeballs justifies the upfront expenses of building the community.
-
-
-
-
267
-
-
32644438146
-
-
See A & M Records, Inc. v. Napster, Inc., 902, 921-22 N. D. Cal
-
See A & M Records, Inc. v. Napster, Inc., 114 F. Supp. 2d 896, 902, 921-22 (N. D. Cal. 2000)
-
(2000)
F. Supp. 2D
, vol.114
, pp. 896
-
-
-
268
-
-
28644440915
-
-
basing a holding of vicarious copyright infringement on the argument that although Napster had no present revenue, a larger user base would give it greater future revenue potential, affd in part, rev'd in part, 9th Cir
-
(basing a holding of vicarious copyright infringement on the argument that although Napster had no present revenue, a larger user base would give it greater future revenue potential), affd in part, rev'd in part, 239 F.3d 1004 (9th Cir. 2001).
-
(2001)
F.3d
, vol.239
, pp. 1004
-
-
-
269
-
-
77953553925
-
-
Cf, supra note 154
-
Cf. Anderson, supra note 154, at 146.
-
-
-
Anderson1
-
270
-
-
77953550643
-
-
Lest this seem unremarkable, keep in mind that it would be nearly inconceivable for an Internet backbone provider to decide sua sponte that it needed to block traffic from a particular IP address, and that when Comcast started blocking particular traffic, it drew an FCC investigation and injunctive relief. Formal Complaint of Free Press & Pub. Knowledge Against Comcast Corp. for Secretly Degrading Peer-to-Peer Applications, 23 F. C. C. R. 13, 028
-
Lest this seem unremarkable, keep in mind that it would be nearly inconceivable for an Internet backbone provider to decide sua sponte that it needed to block traffic from a particular IP address, and that when Comcast started blocking particular traffic, it drew an FCC investigation and injunctive relief. Formal Complaint of Free Press & Pub. Knowledge Against Comcast Corp. for Secretly Degrading Peer-to-Peer Applications, 23 F. C. C. R. 13, 028 (2008).
-
(2008)
-
-
-
271
-
-
77953594689
-
-
See, Google Help, YouTube Glossary: Flag as Inappropriate, last visited Apr. 10
-
See Google Help, YouTube Glossary: Flag as Inappropriate, http://www.google.com/support/youtube/bin/answer.py?hl=en&answer=95403 (last visited Apr. 10, 2010).
-
(2010)
-
-
-
272
-
-
77953563138
-
-
See, e.g., last visited Apr. 10, 2010
-
See, e.g., Wikipedia: Blocking IP Addresses, http://en. wikipedia.org/wiki/Wikipedia:Blocking-IP-addresses (last visited Apr. 10, 2010).
-
Wikipedia: Blocking Ip Addresses
-
-
-
273
-
-
8844253599
-
The rise and fall of sysopdom
-
note
-
See Jonathan Zittrain, The Rise and Fall of Sysopdom, 10 HARV. J. L. & TECH. 495, 501-06 (1997) (discussing role played by amateur "sysops" of online forums, newsgroups, and bulletin boards in fostering community). Zittrain's message in 1997 was pessimistic; he saw the sysop as a dying breed presiding over fragile communities. The Future of the Internet is far more optimistic about the potential of bottom-up collaboration and altruistic community creation in creating a healthy online society. One possible difference between then and now, I would submit, is that the benefits of linking these communities together on the Internet-putting the "commons" in "semicommons"-are much clearer today. Zittrain's invocation of the "sysop" also leads us off into the world of bulletin-board systems (or "BBSes"). Time and space constraints don't permit me to discuss them in detail as an additional example of an online organizational form. Their basic model, however-privately owned servers, connected to the telephone network, accessible to anyone who wished to dial in via modem-fits the basic semicommons pattern described in this essay, and their history also illustrates the applicability of Smith's model. For more on BBSes
-
(1997)
Harv. J. L. & Tech.
, vol.10
, Issue.495
, pp. 501-06
-
-
Zittrain, J.1
-
274
-
-
77953607706
-
-
see generally, last visited Apr. 10, 2010, Textfiles. Com, History
-
see generally BBS: THE DOCUMENTARY (Bovine Ignition Systems 2005); Textfiles.com, History, http://www.textfiles.com/history/(last visited Apr. 10, 2010).
-
Bbs: The Documentary (Bovine Ignition Systems 2005)
-
-
-
275
-
-
2442473073
-
Digital speech and democratic culture: A theory of freedom of expression for the information society
-
See, e.g., discussing censorship powers of platform owners
-
See, e.g., Jack M. Balkin, Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society, 79 N. Y. U. L. REV. 1 (2004) (discussing censorship powers of platform owners);
-
(2004)
N. Y. U. L. Rev.
, vol.79
, pp. 1
-
-
Balkin, J.M.1
-
276
-
-
68949182898
-
Saving facebook
-
discussing platform lock-in. There's also the larger question of the proper division of value between private owner and commons users. One could argue that the platform owner who becomes rich off of user contributions is engaged in a form of digital exploitation
-
James Grimmelmann, Saving Facebook, 94 IOWA L. REv. 1137, 1192-95 (2009) (discussing platform lock-in). There's also the larger question of the proper division of value between private owner and commons users. One could argue that the platform owner who becomes rich off of user contributions is engaged in a form of digital exploitation.
-
(2009)
Iowa L. Rev.
, vol.94
, Issue.1137
, pp. 1192-95
-
-
Grimmelmann, J.1
-
277
-
-
41849083741
-
-
See, e.g., FIRST MONDAY, Mar. 6, As this is a normative question, not an analytic one, I put it aside for the time being
-
See, e.g., Søren Mark Petersen, Loser Generated Content: From Participation to Exploitation, FIRST MONDAY, Mar. 6, 2008, http://www.uic.edu/ htbin/cgiwrap/bin/ojs/index.php/fin/article/view/2141/1948. As this is a normative question, not an analytic one, I put it aside for the time being.
-
(2008)
Loser Generated Content: From Participation to Exploitation
-
-
Petersen, R.S.1
-
278
-
-
77953560782
-
-
last visited Apr. 10
-
Craigslist, Flags and Community Moderation, http://www.craigslist.org/ about/help/flags-and-community-moderation (last visited Apr. 10, 2010).
-
(2010)
Flags and Community Moderation
-
-
Craigslist1
-
279
-
-
77953597449
-
-
See, supra note 2, at, discussing Wikipedia
-
See ZITTRAIN, supra note 2, at 131-42 (discussing Wikipedia).
-
-
-
Zittrain1
-
280
-
-
43549104341
-
Facebook retreats on online tracking
-
Nov. 30
-
Louise Story & Brad Stone, Facebook Retreats on Online Tracking, N. Y. TIMES, Nov. 30, 2007, at C1.
-
(2007)
N. Y. Times
-
-
Story, L.1
Stone, B.2
-
281
-
-
77953585033
-
-
See generally, describing the Internet's success in terms of this loose coupling of small components in multiple domains
-
See generally DAVID WEINBERGER, SMALL PIECES LOOSELY JOINED: HOW THE WEB SHOWS US WHO WE REALLY ARE (2002) (describing the Internet's success in terms of this loose coupling of small components in multiple domains).
-
(2002)
Small Pieces Loosely Joined: How the Web Shows Us Who We Really Are
-
-
David, W.1
-
282
-
-
77953585034
-
-
See, supra note 106
-
See ROSENBERG, supra note 106, at 205-06;
-
-
-
Rosenberg1
-
283
-
-
77953592190
-
-
June 18, 4:03 EDT
-
Posting of James Grimmelmann to LawMeme, http://lawmeme.research.yale. edu/modules.php?name=New&file=print&sid=1155 (June 18, 2003, 4:03 EDT).
-
(2003)
Posting of James Grimmelmann to Lawmeme
-
-
-
285
-
-
77953594372
-
-
See, supra note 168, at, describing common pattern of tightly coupled modules themselves loosely coupled to each other
-
See SIMON, supra note 168, at 197-205 (describing common pattern of tightly coupled modules themselves loosely coupled to each other);
-
-
-
Simon1
-
286
-
-
34247960076
-
The strength of weak ties
-
describing power of loose links to bridge different social groups
-
Mark S. Granovetter, The Strength of Weak Ties, 78 AM. J. SOC. 1360 (1973) (describing power of loose links to bridge different social groups).
-
(1973)
Am. J. Soc
, vol.78
, pp. 1360
-
-
Granovetter, M.S.1
-
287
-
-
77953557708
-
-
This point may have implications for Zittrain's goal of stopping malware through "suasion" and "experimentation. ", supra note 2, at, Zittrain's discussion of the challenges and goals of the StopBadware project clearly recognizes the dangers of both too much and not enough private control, at multiple scales
-
This point may have implications for Zittrain's goal of stopping malware through "suasion" and "experimentation. " ZITTRAIN, supra note 2, at 173. Zittrain's discussion of the challenges and goals of the StopBadware project clearly recognizes the dangers of both too much and not enough private control, at multiple scales.
-
-
-
Zittrain1
-
288
-
-
77953559766
-
-
Id, at, Sites experimenting with security policies in an informed way are private and Tragic. Internetwide monitoring and information-sharing are common and Comedic
-
Id. at 168-73. Sites experimenting with security policies in an informed way are private and Tragic. Internetwide monitoring and information-sharing are common and Comedic.
-
-
-
-
289
-
-
77953595017
-
-
See id
-
See id.
-
-
-
-
290
-
-
77953581393
-
-
See Wikipedia: WikiProject, last visited Apr. 10, 2010 "A WikiProject is a collection of pages devoted to the management of a specific topic or family of topics within Wikipedia; and, simultaneously, a group of editors who use those pages to collaborate on encyclopedic work."
-
See Wikipedia: WikiProject, http://en. wikipedia.org/wiki/WikiProject (last visited Apr. 10, 2010) ("A WikiProject is a collection of pages devoted to the management of a specific topic or family of topics within Wikipedia; and, simultaneously, a group of editors who use those pages to collaborate on encyclopedic work.").
-
-
-
-
291
-
-
77953589867
-
-
On the technology and operation of Usenet sometimes also written as "USENET'
-
On the technology and operation of Usenet (sometimes also written as "USENET')
-
-
-
-
299
-
-
77953576289
-
-
Within the law review literature
-
and CLAY SHIRKY, VOICES FROM THE NET 80-89 (1995). Within the law review literature
-
(1995)
Voices From the Net
, pp. 80-89
-
-
Clay, S.1
-
300
-
-
0037257398
-
Habermas discourse.net: Toward a critical theory of cyberspace
-
see generally
-
see generally A. Michael Froomkin, HabermasDiscourse.net: Toward a Critical Theory of Cyberspace, 116 HARV. L. REV. 749, 821-31 (2003);
-
(2003)
Harv. L. Rev.
, vol.116
, Issue.749
, pp. 821-31
-
-
Froomkin, A.M.1
-
301
-
-
33646569258
-
On regulating the internet: Usenet, a case study
-
Paul K. Ohm, On Regulating the Internet: Usenet, a Case Study, 46 UCLA L. REV. 1941 (1999);
-
(1999)
Ucla L. Rev.
, vol.46
, pp. 1941
-
-
Ohm, P.K.1
-
302
-
-
33750636635
-
Pooling intellectual capital: Thoughts on anonymity, pseudonymity, and limited liability in cyberspace
-
1996, 163
-
David G. Post, Pooling Intellectual Capital: Thoughts on Anonymity, Pseudonymity, and Limited Liability in Cyberspace, 1996 U. CHI. LEGAL F. 139, 163 n. 54;
-
U. Chi. Legal F
, Issue.54
, pp. 139
-
-
Post, D.G.1
-
303
-
-
77953548342
-
Rule formation in non-hierarchical systems
-
190-99
-
and Charles D. Siegal, Rule Formation in Non-hierarchical Systems, 16 TEMP. ENVTL. L. & TECH. J. 173, 181-83, 190-99 (1997).
-
(1997)
Temp. Envtl. L. & Tech. J.
, vol.16
, Issue.173
, pp. 181-83
-
-
Siegal, C.D.1
-
304
-
-
77953582374
-
-
See also, last visited Apr. 10, Usenet has made sporadic appearances in the case reports. Highlights with significant factual discussion of Usenet include Arista Records LLC v. USENET.com, Inc., F. Supp. 2d, S. D. N. Y
-
See also Eric Schlachter, War of the Cancelbots!, http://eric-goldman. tripod.corn/articles/cancelbotarticle.htm (last visited Apr. 10, 2010). Usenet has made sporadic appearances in the case reports. Highlights with significant factual discussion of Usenet include Arista Records LLC v. USENET.com, Inc., 633 F. Supp. 2d 124, 129-31 (S. D. N. Y. 2009);
-
(2009)
War of the Cancelbots!
, vol.633
, Issue.124
, pp. 129-31
-
-
Schlachter, E.1
-
305
-
-
77953599696
-
-
Ellison v. Robertson, CD. Cal
-
Ellison v. Robertson, 189 F. Supp. 2d 1051, 1053-54 (CD. Cal. 2002)
-
(2002)
F. Supp. 2D
, vol.189
, Issue.1051
, pp. 1053-54
-
-
-
306
-
-
85050621952
-
-
rev 'd, 9th Cir
-
rev 'd, 357 F.3d 1072 (9th Cir. 2004);
-
(2004)
F.3d
, vol.357
, pp. 1072
-
-
-
307
-
-
77953576614
-
-
ACLU v. Reno, E. D. Pa
-
ACLU v. Reno, 929 F. Supp. 824, 834-35 (E. D. Pa. 1996)
-
(1996)
F. Supp
, vol.929
, Issue.824
, pp. 834-35
-
-
-
308
-
-
84863572580
-
-
aff' d
-
aff' d, 521 U. S. 844 (1997);
-
(1997)
U. S.
, vol.521
, pp. 844
-
-
-
309
-
-
33847399965
-
-
Religious Tech. Ctr. v. Netcom On-Line Commc'n Servs., Inc., 1366, 1367-68, N. D. Cal, Purists may insist that "Usenet" refers only to one particular set of newsgroups, and that "Network News" is the correct umbrella term that also includes local newsgroups and even a few alternative hierarchies
-
and Religious Tech. Ctr. v. Netcom On-Line Commc'n Servs., Inc., 907 F. Supp. 1361, 1366 n. 4, 1367-68 (N. D. Cal. 1995). Purists may insist that "Usenet" refers only to one particular set of newsgroups, and that "Network News" is the correct umbrella term that also includes local newsgroups and even a few alternative hierarchies.
-
(1995)
F. Supp
, vol.907
, Issue.4
, pp. 1361
-
-
-
310
-
-
77953573271
-
-
See, e.g., supra, at, In practice, though, users often also referred to these other hierarchies as "Usenet."
-
See, e.g., KROL, supra, at 151-57. In practice, though, users often also referred to these other hierarchies as "Usenet."
-
-
-
Krol1
-
311
-
-
77953582056
-
-
See id, at, Similarly, one could technically distinguish between the higher-level protocol governing Usenet's messages and newsgroups
-
See id. at 452. Similarly, one could technically distinguish between the higher-level protocol governing Usenet's messages and newsgroups
-
-
-
-
312
-
-
0343180351
-
-
see, & RFC, hereinafter RFC 1036, and the lower-level protocols governing how those messages are transferred from one computer to another
-
see M. HORTON & R. ADAMS, RFC 1036 STANDARD FOR INTERCHANGE OF USENET MESSAGES (1987), http://tools.ietf.org/html/rfcl036 [hereinafter RFC 1036], and the lower-level protocols governing how those messages are transferred from one computer to another.
-
(1987)
Standard For Interchange of Usenet Messages
, vol.1036
-
-
Horton, M.1
Adams, R.2
-
314
-
-
0013134288
-
-
RFC, But in practice, the same social conventions causing users and administrators to standardize on the one protocol also led them to standardize on the other. As Paul Ohm puts it, "Just as you can get from downtown to Westwood without a car, you can communicate via Usenet without NNTP Network News Transfer Protocol. But most people would not take this trip without a car, just as most people do not use USENET except over NNTP." Ohm, supra, 1949-50 n. 28 citing RFC 1036, supra, § 4
-
BRIAN KANTOR & PHIL LAPSLEY, RFC 977, NETWORK NEWS TRANSFER PROTOCOL (1986), http://tools.ietf.org/html/rfcl036. But in practice, the same social conventions causing users and administrators to standardize on the one protocol also led them to standardize on the other. As Paul Ohm puts it, "Just as you can get from downtown to Westwood without a car, you can communicate via Usenet without NNTP [Network News Transfer Protocol]. But most people would not take this trip without a car, just as most people do not use USENET except over NNTP." Ohm, supra, 1949-50 n. 28 (citing RFC 1036, supra, § 4).
-
(1986)
Network News Transfer Protocol
, vol.977
-
-
Brian, K.1
Lapsley, P.2
-
315
-
-
77953588493
-
-
See infra Part IV. C.1
-
See infra Part IV. C.1.
-
-
-
-
316
-
-
77953567327
-
-
See infra Part IV. C.2
-
See infra Part IV. C.2.
-
-
-
-
317
-
-
77953595657
-
-
See infra Part IV. C.3
-
See infra Part IV. C.3.
-
-
-
-
318
-
-
77953603250
-
-
This exchange originally took place through direct telephone-line connections between Usenet servers; as the Internet became more widely available, the exchanges gradually switched over to using the Internet for their transport
-
This exchange originally took place through direct telephone-line connections between Usenet servers; as the Internet became more widely available, the exchanges gradually switched over to using the Internet for their transport.
-
-
-
-
319
-
-
77953571042
-
-
See, & HAUBEN, supra note, 44
-
See HAUBEN & HAUBEN, supra note 212, 39-40, 44;
-
, Issue.212
, pp. 39-40
-
-
Hauben1
-
320
-
-
77953570056
-
-
supra note 212
-
RHEINGOLD, supra note 212, at 120-21.
-
-
-
Rheingold1
-
321
-
-
77953563475
-
-
See RFC 1036, supra note 212, § 5 describing algorithm for propagation of Usenet messages through network
-
See RFC 1036, supra note 212, § 5 (describing algorithm for propagation of Usenet messages through network).
-
-
-
-
322
-
-
77953595346
-
-
See, supra note 212
-
See KROL, supra note 212, at 153-54.
-
-
-
Krol1
-
323
-
-
77953585351
-
-
See, The History of the Net Sept. 20, unpublished master's thesis, Grand Valley State University, available
-
See Henry Edward Hardy, The History of the Net (Sept. 20, 1993) (unpublished master's thesis, Grand Valley State University), available at http://w2.eff.org/Net-culture/net.history.txt.
-
(1993)
-
-
Hardy, H.E.1
-
324
-
-
77953568407
-
-
On the topical nature of particular newsgroups, see generally the archive of Usenet Frequently Asked Question FAQ files, at, which are organized by newsgroup
-
On the topical nature of particular newsgroups, see generally the archive of Usenet Frequently Asked Question (FAQ) files at www.faqs.org, which are organized by newsgroup.
-
-
-
-
325
-
-
77953568738
-
-
See Ohm, supra note 212, at, describing posting to newsgroups; id. at 1949-50 describing replication
-
See Ohm, supra note 212, at 1945-47 (describing posting to newsgroups); id. at 1949-50 (describing replication).
-
-
-
-
326
-
-
77953548343
-
-
On server operation, see generally, & supra note 212
-
On server operation, see generally O'REILLY & TODINO, supra note 212.
-
-
-
O'Reilly1
Todino2
-
327
-
-
77953601960
-
-
See, supra note 212, at, "Last, we must deal with how can I write this delicately? censorship. Some administrators decide that some groups especially in the alt category are not for consumption by the server's clientele. So they choose not to carry them.". Since, by 2002, Usenet carried 1000 gigabytes of data per day, see Froomkin, supra note 212, at 822, some prioritization of which groups to carry was a technical necessity
-
See KROL, supra note 212, at 157 ("Last, we must deal with (how can I write this delicately?) censorship. Some administrators decide that some groups (especially in the alt category) are not for consumption by the server's clientele. So they choose not to carry them."). Since, by 2002, Usenet carried 1000 gigabytes of data per day, see Froomkin, supra note 212, at 822, some prioritization of which groups to carry was a technical necessity.
-
-
-
Krol1
-
328
-
-
77953608486
-
-
See, supra note 212, at, "A server administrator may choose not to accept a certain group because it is very active and eats up too much disk space."
-
See KROL, supra note 212, at 156 ("A server administrator may choose not to accept a certain group because it is very active and eats up too much disk space.").
-
-
-
Krol1
-
329
-
-
77953557375
-
-
supra note 62, at, discussing importance of "nested enterprises"
-
OSTROM, supra note 62, at 101-02 (discussing importance of "nested enterprises").
-
-
-
Ostrom1
-
330
-
-
77953555226
-
-
See, supra note 212
-
See Froomkin, supra note 212, at 823-24.
-
-
-
Froomkin1
-
331
-
-
77953593078
-
-
Id
-
Id. at 824-25.
-
-
-
-
332
-
-
77953553623
-
-
See, supra note 212, at, "Usenet is a place for conversation or publication, like a giant coffeehouse with a thousand rooms; it is also a worldwide digital version of the Speaker's Corner in London's Hyde Park, an unedited collection of letters to the editor, a floating flea market, a huge vanity publisher, and a coalition of every odd special-interest group in the world."
-
See RHEINGOLD, supra note 212, at 130 ("Usenet is a place for conversation or publication, like a giant coffeehouse with a thousand rooms; it is also a worldwide digital version of the Speaker's Corner in London's Hyde Park, an unedited collection of letters to the editor, a floating flea market, a huge vanity publisher, and a coalition of every odd special-interest group in the world.").
-
-
-
Rheingold1
-
333
-
-
77953573272
-
-
supra note 212
-
Froomkin, supra note 212, at 822.
-
-
-
Froomkin1
-
334
-
-
77953574341
-
-
See, supra note 212, at, The years of publication of the books on Usenet cited in footnote 212 are telling:, 1993, 1994, 1994, 1994, 1995, 1995, and, See supra note 212
-
See RHEINGOLD, supra note 212, at 120. The years of publication of the books on Usenet cited in footnote 212 are telling: 1992, 1993, 1994, 1994, 1994, 1995, 1995, and 1997. See supra note 212.
-
(1992)
, pp. 120
-
-
Rheingold1
-
335
-
-
77953581394
-
-
See, supra note 212, at, "All you had to do to join Usenet was to obtain the free software, find a site to feed you News and take your postings, and you were in action. "
-
See RHEINGOLD, supra note 212, at 119 ("All you had to do to join Usenet was to obtain the free software, find a site to feed you News and take your postings, and you were in action. ").
-
-
-
Rheingold1
-
337
-
-
77953548968
-
-
Internet folklore, at least, the tide turned in 1993, as commercial services like Delphi and AOL began offering their millions of subscribers access to Usenet newsgroups, an event known as the "Eternal September"-a never-ending stream of new users as unfamiliar with Usenet's norms as the annual crop of college first-years had been. See
-
In Internet folklore, at least, the tide turned in 1993, as commercial services like Delphi and AOL began offering their millions of subscribers access to Usenet newsgroups, an event known as the "Eternal September"-a never-ending stream of new users as unfamiliar with Usenet's norms as the annual crop of college first-years had been. See WENDY M. GROSSMAN, NET. WARS 9-11 (1997).
-
(1997)
Net. Wars
, pp. 9-11
-
-
Wendy, M.G.1
-
338
-
-
77953546771
-
-
See, supra note 212
-
See Froomkin, supra note 212, at 825-29.
-
-
-
Froomkin1
-
339
-
-
77953559451
-
-
See, last visited Apr. 10, "For example, the quote I seem to be most famous for, "The net treats censorship as damage and routes around it', came directly out of my Usenet experience. I was actually talking about the Usenet when I first said it. And that's how the Usenet works-if you have three news feeds coming in, and one of those feeds censors the material it handles, the censored info automatically comes in from the other two."
-
See Giganews, Usenet Interview with John Gilmore, http://www.giganews. com/usenet-history/gilmore.html (last visited Apr. 10, 2010) ("For example, the quote I seem to be most famous for, "The net treats censorship as damage and routes around it', came directly out of my Usenet experience. I was actually talking about the Usenet when I first said it. And that's how the Usenet works-if you have three news feeds coming in, and one of those feeds censors the material it handles, the censored info automatically comes in from the other two.").
-
(2010)
Usenet Interview With John Gilmore
-
-
Giganews1
-
340
-
-
77953556412
-
-
See, supra note 212, at, "If you are offended by your server administrator's refusal to carry a newsgroup, you have two choices: find another server or beat up on your administrator."
-
See KROL, supra note 212, at 132 ("If you are offended [by your server administrator's refusal to carry a newsgroup], you have two choices: find another server or beat up on your administrator.").
-
-
-
Krol1
-
341
-
-
77953592758
-
-
supra note 212
-
Siegal, supra note 212, at 192.
-
-
-
Siegal1
-
342
-
-
77953589871
-
-
Id
-
Id.
-
-
-
-
343
-
-
77953586811
-
-
supra note 212, at, "Mass self-defense...."
-
Froomkin, supra note 212, at 827-28 ("[M]ass self-defense....") ;
-
-
-
Froomkin1
-
344
-
-
77953577689
-
-
supra note 212, at, "Extreme self-help-"
-
Siegal, supra note 212, at 192-93 ("[E]xtreme self-help-").
-
-
-
Siegal1
-
345
-
-
77953549977
-
-
See, supra note 212, at, "Moreover, Canter and Seigel, unbowed by their role as outcasts on the Internet, published a book telling other would be cyber-entrepreneurs how to profit by following their example...."
-
See Siegal, supra note 212, at 193 ("Moreover, Canter and Seigel, unbowed by their role as outcasts on the Internet, published a book telling other would be cyber-entrepreneurs how to profit by following their example....").
-
-
-
Siegal1
-
346
-
-
77953562467
-
-
See id. "Spamming is common...."
-
See id. ("[S]pamming is common....").
-
-
-
-
347
-
-
77953572641
-
-
Id
-
Id.
-
-
-
-
348
-
-
77953575936
-
-
Id. "But these guidelines obviously do not deter those who seek either financial gain or perverse pleasure from spamming."
-
Id. ("But these guidelines obviously do not deter those who seek either financial gain or perverse pleasure from spamming.").
-
-
-
-
349
-
-
77953583739
-
-
See Ohm, supra note 212, at, "Still too early for a legislature to intervene...."
-
See Ohm, supra note 212, at 1941 ("[S]till too early for a legislature to intervene....");
-
-
-
-
350
-
-
77953608152
-
-
supra note 212
-
Siegal, supra note 212, at 193-95.
-
-
-
Siegal1
-
351
-
-
77953601318
-
-
See FRISTUP, supra note 212
-
See FRISTUP, supra note 212, at 25;
-
-
-
-
352
-
-
77953567670
-
-
Ohm, supra note 212
-
Ohm, supra note 212, at 1976-77.
-
-
-
-
353
-
-
77953595345
-
-
See, last visited Apr. 10, "In general, hand-moderated newsgroups often have some unavoidable delay...."
-
See Internet FAQ Archives, Moderated Newsgroups FAQ, http://www.faqs.org/ faqs/usenet/moderated-ng-faq/(last visited Apr. 10, 2010) ("In general, hand-moderated newsgroups often have some unavoidable delay....").
-
(2010)
Internet Faq Archives, Moderated Newsgroups Faq
-
-
-
354
-
-
77953580685
-
-
See id. "A typical setup for doing moderation would include... several hours of spare time per week for at least a year...."
-
See id. ("[A] typical setup for doing moderation would include... several hours of spare time per week for at least a year....").
-
-
-
-
355
-
-
77953547385
-
-
See id. "The discussion of differences between moderation and censorship has been erupting several times a year in news.groups for about 15 years."
-
See id. ("The discussion of differences between moderation and censorship has been erupting several times a year in news.groups for about 15 years.").
-
-
-
-
356
-
-
77953601961
-
-
See id. noting a total of about 300 moderated Usenet newsgroups
-
See id. (noting a total of about 300 moderated Usenet newsgroups);
-
-
-
-
357
-
-
77953588157
-
-
cf, supra note 212, at, counting "thousands" of newsgroups overall
-
cf. Froomkin, supra note 212, at 822 (counting "thousands" of newsgroups overall).
-
-
-
Froomkin1
-
358
-
-
77953597135
-
-
supra note 212, at, "The Unfortunately Necessary Art of the Kill File.... The proper remedy for all the above-mentioned forms of net.abuse is the kill file.". Items could also be killed based on other criteria, such as the use of a particular phrase
-
PFAFFENBERGER, supra note 212, at 193 ("The (Unfortunately Necessary) Art of the Kill File.... The proper remedy for all the above-mentioned forms of net.abuse is the kill file."). Items could also be killed based on other criteria, such as the use of a particular phrase.
-
-
-
Pfaffenberger1
-
359
-
-
77953593070
-
-
See, supra note 212, at, explaining use of keyword-based tagging and killing to help newsgroup readers quickly browse topics. But the term "kill file" is most colorfully used to describe user-based filtering
-
See KROL, supra note 212, at 166-69 (explaining use of keyword-based tagging and killing to help newsgroup readers quickly browse topics). But the term "kill file" is most colorfully used to describe user-based filtering.
-
-
-
Krol1
-
360
-
-
77953575313
-
-
See, 3d ed, "Thus to add a person or subject to one's kill file is to arrange for that person to be ignored by one's newsreader in future. By extension, it may be used for a decision to ignore the person or subject in other media."
-
See ERIC S. RAYMOND, THE NEW HACKER'S DICTIONARY 269 (3d ed. 1996) ("Thus to add a person (or subject) to one's kill file is to arrange for that person to be ignored by one's newsreader in future. By extension, it may be used for a decision to ignore the person or subject in other media.").
-
(1996)
The New Hacker's Dictionary
, vol.269
-
-
Eric, S.R.1
-
361
-
-
77953599025
-
-
See, last visited Apr. 10, noting in passing that there is a killfile "for each user". The killfile works a bit like a personal filter that sends all messages from your crazy cousin straight to an archive folder. Compare the nearly identical interfaces for "Rules" including killing, marking as read, and sorting messages in Unison a newsreader and Mail.app an e-mail client for Mac OS X
-
See Internet FAQ Archivers, m KILL file FAQ § 1, http://www.faqs.org/faqs/killfile-faq/(last visited Apr. 10, 2010) (noting in passing that there is a killfile "for each user"). The killfile works a bit like a personal filter that sends all messages from your crazy cousin straight to an archive folder. Compare the nearly identical interfaces for "Rules" (including killing, marking as read, and sorting messages) in Unison (a newsreader) and Mail.app (an e-mail client) for Mac OS X.
-
(2010)
Internet Faq Archivers, M Kill File Faq § 1
-
-
-
362
-
-
77953580032
-
-
See, supra note 212, at, "Kill files perfectly illustrate the burden placed on the reader on Usenet where freedom of speech is as absolute as its gets anywhere. For all intents and purposes, anyone can say anything to anyone. If a certain kind of speech causes upset, it is usually up to the reader not to read posts about those subjects or mail from those people."
-
See SHIRKY, supra note 212, at 82 ("Kill files perfectly illustrate the burden placed on the reader on Usenet where freedom of speech is as absolute as its gets anywhere. For all intents and purposes, anyone can say anything to anyone. If a certain kind of speech causes upset, it is usually up to the reader not to read posts about those subjects or mail from those people.").
-
-
-
Shirky1
-
363
-
-
77953586489
-
-
This observation is based on the personal experience of the author. I would rather not, for reasons that should be obvious, name the specific newsgroups and mailing lists on which I have resorted to using a killfile
-
This observation is based on the personal experience of the author. I would rather not, for reasons that should be obvious, name the specific newsgroups and mailing lists on which I have resorted to using a killfile.
-
-
-
-
364
-
-
77953587514
-
-
See, e.g., James "Kibo" Parry, Killfiles and You, last visited Apr. 10, providing detailed suggestions for efficient use of a killfile. Note the assumption that filtering out specific unwanted users will not suffice to make a newsgroup readable; more detailed filtering is required
-
See, e.g., James "Kibo" Parry, Killfiles and You, http://www.kibo.com/kibokill/(last visited Apr. 10, 2010) (providing detailed suggestions for efficient use of a killfile). Note the assumption that filtering out specific unwanted users will not suffice to make a newsgroup readable; more detailed filtering is required.
-
(2010)
-
-
-
365
-
-
77953555735
-
-
See, supra note 212
-
See Siegal, supra note 212, at 194;
-
-
-
Siegal1
-
366
-
-
77953578003
-
-
RFC 1036, supra note 212, § 3.1
-
RFC 1036, supra note 212, § 3.1;
-
-
-
-
367
-
-
77953593728
-
-
Internet FAQ Archives, Cancel Messages: Frequently Asked Questions, Part 2/4 v1.75, last visited Apr. 10, hereinafter Cancel FAQ, Part 2/4
-
Internet FAQ Archives, Cancel Messages: Frequently Asked Questions, Part 2/4 (v1.75), http://www.faqs.org/faqs/usenet/cancel-faq/part2/(last visited Apr. 10, 2010) [hereinafter Cancel FAQ, Part 2/4].
-
(2010)
-
-
-
368
-
-
77953581727
-
-
See, supra note 212
-
See Siegal, supra note 212, at 194;
-
-
-
Siegal1
-
369
-
-
77953592536
-
-
Internet FAQ Archives, Cancel Messages: Frequently Asked Questions, Part 1/4 v1.75, at I-II, last visited Apr. 10, 2010 discussing "third- party" cancels, including "forged" cancels
-
Internet FAQ Archives, Cancel Messages: Frequently Asked Questions, Part 1/4 (v1.75), at I-II, http://www.faqs.org/faqs/usenet/cancel-faq/part1/(last visited Apr. 10, 2010) (discussing "third-party" cancels, including "forged" cancels).
-
-
-
-
370
-
-
77953590629
-
-
Cancel FAQ, Part 2/4, supra note 252, at IV. C. "A cancelbot is a program that searches for messages matching a certain pattern and sends out cancels for them; it's basically an automated cancel program, run by a human operator."
-
Cancel FAQ, Part 2/4, supra note 252, at IV. C. ("A cancelbot is a program that searches for messages matching a certain pattern and sends out cancels for them; it's basically an automated cancel program, run by a human operator.").
-
-
-
-
371
-
-
77953568090
-
-
See, supra note 230, at, discussing technical back-and-forth between message posters and message cancelers
-
See GROSSMAN, supra note 230, at 75-78 (discussing technical back-and-forth between message posters and message cancelers).
-
-
-
Grossman1
-
372
-
-
77953555225
-
-
See, supra note 212, at, discussing "Usenet Death Penalty" in which a site considered to be too lax in stopping spam "has every single Usenet post originating from it immediately canceled or at least not forwarded. Thus, every person using that ISP loses the ability to post to Usenet regardless of his or her guilt or, in most cases, innocence"
-
See Froomkin, supra note 212, at 829-31 (discussing "Usenet Death Penalty" in which a site considered to be too lax in stopping spam "has every single Usenet post originating from it immediately canceled or at least not forwarded. Thus, every person using that ISP loses the ability to post to Usenet regardless of his or her guilt or, in most cases, innocence");
-
-
-
Froomkin1
-
373
-
-
77953594690
-
-
Cancel FAQ, Part 2/4, supra note 252, at E, "Giving out a cancelbot is like handing out loaded guns with no safeties."
-
Cancel FAQ, Part 2/4, supra note 252, at IV. E ("Giving out a cancelbot is like handing out loaded guns with no safeties.").
-
-
-
-
374
-
-
77953578001
-
-
See Cancel FAQ, Part 2/4, supra note 252, at, D, discussing spammers who used cancels as an offensive weapon, such as "Krazy Kevin, " who "cancelled many posts on news.admin. net-abuse.misc concerning his spams" and "Crusader, " who tried to prevent investigation of a neo-Nazi mass email by cancelling Usenet messages discussing it
-
See Cancel FAQ, Part 2/4, supra note 252, at V. D (discussing spammers who used cancels as an offensive weapon, such as "Krazy Kevin, " who "cancelled many posts on news.admin. net-abuse.misc concerning his spams" and "Crusader, " who tried to prevent investigation of a neo-Nazi mass email by cancelling Usenet messages discussing it).
-
-
-
-
375
-
-
77953590249
-
-
See, supra note 212, at, 166 discussing pseudonymity of Cancelmoosetm
-
See Post, supra note 212, at 163 n. 54, 166 (discussing pseudonymity of Cancelmoose[tm]);
-
, Issue.54
, pp. 163
-
-
Post1
-
376
-
-
77953582055
-
-
Internet FAQ Archives, Net Abuse FAQ, § 2.9, last visited Apr. 10, 2010 "Cancelmoosetm is, to misquote some wise poster, 'the greatest public servant the net has seen in quite some time.' Once upon a time, the 'Moose would send out spam-cancels and then post notice anonymously to news.admin. policy, news.admin. misc, and alt.current-events.net-abuse. The 'Moose stepped to the fore on its own initiative, at a time mid 1994 when spam-cancels were irregular and disorganized, and behaved altogether admirably-fair, even-handed, and quick to respond to comments and criticism, all without self-aggrandizement or martyrdom.... Nobody knows who Cancelmoosetm really is, and there aren't even any good rumors."
-
Internet FAQ Archives, Net Abuse FAQ, § 2.9, http://www.faqs.org/ faqs/net-abuse-faq/partl/(last visited Apr. 10, 2010)) ("Cancelmoose[tm] is, to misquote some wise poster, 'the greatest public servant the net has seen in quite some time.' Once upon a time, the 'Moose would send out spam-cancels and then post notice anonymously to news.admin. policy, news.admin. misc, and alt.current-events.net-abuse. The 'Moose stepped to the fore on its own initiative, at a time (mid 1994) when spam-cancels were irregular and disorganized, and behaved altogether admirably-fair, even-handed, and quick to respond to comments and criticism, all without self-aggrandizement or martyrdom.... Nobody knows who Cancelmoose[tm] really is, and there aren't even any good rumors.").
-
-
-
-
377
-
-
70449592321
-
Griefer madness
-
See, Feb, at, 92, defining "griefer" as "an online version of the spoilsport-someone who takes pleasure in shattering the world of play itself
-
See Julian Dibbell, Griefer Madness, WIRED, Feb. 2008, at 90, 92 (defining "griefer" as "an online version of the spoilsport-someone who takes pleasure in shattering the world of play itself).
-
(2008)
Wired
, pp. 90
-
-
Dibbell, J.1
-
378
-
-
77953599694
-
-
See Cancel FAQ, Part 2/4, supra note 252, at V. D listing "rogue cancellers of various skill, competence, and intelligence". Notable examples include Ellisd, who tried on moral grounds to cancel all messages posted to alt.sex, and the so-called CancelBunny, which tried to cancel posts containing the scriptures of Scientology
-
See Cancel FAQ, Part 2/4, supra note 252, at V. D (listing "rogue cancellers of various skill, competence, and intelligence"). Notable examples include Ellisd, who tried on moral grounds to cancel all messages posted to alt.sex, and the so-called CancelBunny, which tried to cancel posts containing the scriptures of Scientology.
-
-
-
-
379
-
-
77953565373
-
-
Id
-
Id.
-
-
-
-
380
-
-
77953585350
-
-
supra note 212
-
Froomkin, supra note 212, at 829.
-
-
-
Froomkin1
-
381
-
-
77953605411
-
-
See id, at, discussing attempt by "Internet vigilantes" to coordinate their efforts through the news.admin. net-abuse newsgroup and impose collective punishments on servers deemed to be excessively spam-friendly and discussing debates over legitimacy and existence of consensus to act against particular spammers
-
See id. at 828-31 (discussing attempt by "Internet vigilantes" to coordinate their efforts through the news.admin. net-abuse newsgroup and impose collective punishments on servers deemed to be excessively spam-friendly and discussing debates over legitimacy and existence of consensus to act against particular spammers).
-
-
-
-
382
-
-
77953604183
-
-
See id, at, discussing difficulty of coordinating process of selecting which newsgroups to carry
-
See id. at 823-25 (discussing difficulty of coordinating process of selecting which newsgroups to carry);
-
-
-
-
383
-
-
77953560107
-
-
supra note 219 discussing how dissatisfaction with decisions by administrators of "backbone cabal" systems not to carry newsgroups discussing sex or drugs, leading to creation of alternative hierarchy for distribution of news and abdication of previous coordinators of newsgroup-creation process
-
Hardy, supra note 219 (discussing how dissatisfaction with decisions by administrators of "backbone cabal" systems not to carry newsgroups discussing sex or drugs, leading to creation of alternative hierarchy for distribution of news and abdication of previous coordinators of newsgroup-creation process);
-
-
-
Hardy1
-
384
-
-
77953548660
-
-
Great Renaming FAQ: Part 4, last visited Apr. 10, discussing near "constitutional crisis" on Usenet, including forged votes, over whether to create a newsgroup devoted to discussion of aquaria
-
Lee S. Bumgarner, The Great Renaming FAQ: Part 4, http://www.linux.it/- md/usenet/gr4.htm (last visited Apr. 10, 2010) (discussing near "constitutional crisis" on Usenet, including forged votes, over whether to create a newsgroup devoted to discussion of aquaria);
-
(2010)
-
-
Bumgarner, L.S.1
-
385
-
-
77953588492
-
-
Great Renaming-Page 2, last visited Apr. 10, 2010 discussing controversy over Great Renaming and suspicion of the administrators who pushed it through
-
Giganews, 1987: The Great Renaming-Page 2, http://www.giganews.com/ usenet-history/renaming-2.html (last visited Apr. 10, 2010) (discussing controversy over Great Renaming and suspicion of the administrators who pushed it through).
-
(1987)
-
-
Giganews1
-
386
-
-
77953598386
-
-
See, supra note 212, at, noting that "backbone cabal" systems carried disproportionate share of Usenet traffic
-
See Froomkin, supra note 212, at 823 (noting that "backbone cabal" systems carried disproportionate share of Usenet traffic);
-
-
-
Froomkin1
-
387
-
-
77953547691
-
-
id, at, observing that "a large number, perhaps a majority, of sites had effectively delegated administration of the newsgroup creation process to one person" who was willing to "take the time to figure out what is a legitimate group... and what is a practical joke"
-
id. at 824-25 (observing that "a large number, perhaps a majority, of sites had effectively delegated administration of the newsgroup creation process to one person" who was willing to "take the time to figure out what is a legitimate group... and what is a practical joke").
-
-
-
-
388
-
-
77953564103
-
R. I. P. Usenet
-
See, e.g., July 31, "Service providers sensibly started to wonder why they should be reserving big chunks of their own disk space for pirated movies and repetitive pom."
-
See, e.g., Sascha Segan, R. I. P. Usenet, PC MAG. COM, July 31, 2008, http://www.pcmag.com/article2/0, 2817, 2326849, 00.asp ("[S]ervice providers sensibly started to wonder why they should be reserving big chunks of their own disk space for pirated movies and repetitive pom.").
-
(2008)
Pc Mag. Com
-
-
Segan, S.1
-
389
-
-
77954769317
-
N. Y. Attorney general forces isps to curb usenet access
-
See, e.g., June 10
-
See, e.g., Declan McCullagh, N. Y. Attorney General Forces ISPs To Curb Usenet Access, CNETNEWS, June 10, 2008, http://news.cnet.com/8301-13578-3- 9964895-38.html.
-
(2008)
Cnetnews
-
-
Mccullagh, D.1
-
390
-
-
77953584075
-
-
See Posting of Kevin Poulsen to Epicenter, Oct. 7, 2009, 12:34 PST
-
See Posting of Kevin Poulsen to Epicenter, http://www.wired.com/ epicenter/2009/10/usenet/(Oct. 7, 2009, 12:34 PST).
-
-
-
-
391
-
-
77953586488
-
-
Clay Shirky has written that "social software is stuff that gets spammed." Posting of Clay Shirky to Many2Many, Feb. 1
-
Clay Shirky has written that "[s]ocial software is stuff that gets spammed." Posting of Clay Shirky to Many2Many, http://many.corante.com/ archives/2005/02/01/tags-run-amok.php (Feb. 1, 2005).
-
(2005)
-
-
-
392
-
-
77953577348
-
-
As of this writing, Wikipedia discusses "e-mail spam... instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, and file sharing network spam." Spam electronic, Wikipedia, last visited Apr. 10, 2010. Just about anything worth using online is spammed
-
As of this writing, Wikipedia discusses "e-mail spam... instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, and file sharing network spam." Spam (electronic), Wikipedia, http://en. wikipedia.org/wiki/Spamming (last visited Apr. 10, 2010). Just about anything worth using online is spammed.
-
-
-
-
393
-
-
70149106104
-
Spamalytics: An empirical analysis of spam marketing conversion
-
See
-
See Chris Kanich et al., Spamalytics: An Empirical Analysis of Spam Marketing Conversion, 52 COMM. ACM 99 (2009).
-
(2009)
Comm. Acm
, vol.52
, pp. 99
-
-
Kanich, C.1
-
394
-
-
77953600967
-
-
See supra Part IV. B
-
See supra Part IV. B.
-
-
-
-
395
-
-
77953585662
-
-
See, last visited Apr. 10, "Usenet... is the precursor to the various Internet forums that are widely used today...."
-
See Usenet, Wikipedia, http://en. wikipedia.org/wiki/Usenet (last visited Apr. 10, 2010) ("Usenet... is the precursor to the various Internet forums that are widely used today....").
-
(2010)
-
-
Usenet1
Wikipedia2
-
396
-
-
77953578319
-
-
See, last visited Apr. 10, describing switch from UUCP to NNTP as being designed to take advantage of "cutting-edge networking concepts" including the "always-on" Internet. Without the always-on Internet, unless most users are willing to pay long-distance phone charges to connect, they need to have servers located near them
-
See Giganews, Usenet Newsgroups History, http://www.giganews.com/ usenethistory/index.html (last visited Apr. 10, 2010) (describing switch from UUCP to NNTP as being designed to take advantage of "cutting-edge networking concepts" including the "always-on" Internet). Without the always-on Internet, unless most users are willing to pay long-distance phone charges to connect, they need to have servers located near them.
-
(2010)
Usenet Newsgroups History
-
-
Giganews1
-
397
-
-
77953592748
-
-
writing in 1994, thought that e-mail and Usenet each deserved a chapter. Indeed, he gave the Web roughly the same amount of space he gave to Usenet, supra note 212, at, e-mail
-
Krol, writing in 1994, thought that e-mail and Usenet each deserved a chapter. Indeed, he gave the Web roughly the same amount of space he gave to Usenet. KROL, supra note 212, at 101-48 (e-mail);
-
-
-
Krol1
Krol2
-
398
-
-
77953592749
-
-
id, at, Usenet
-
id. at 151-87 (Usenet);
-
-
-
-
399
-
-
77953550298
-
-
id, at, Web
-
id. at 287-322 (Web).
-
-
-
-
400
-
-
77953572009
-
-
Usenet was born in 1979, supra note 178, at, modern SMTP-based e-mail in
-
Usenet was born in 1979, WALDROP, supra note 178, at 427-28, modern SMTP-based e-mail in 1983
-
(1983)
, pp. 427-28
-
-
Waldrop1
-
401
-
-
77953551976
-
-
id
-
id. at 465.
-
-
-
-
402
-
-
77953599695
-
-
See, e.g., RFC, § 3.4, "This message removes a newsgroup with the given name.... The newsgroup is removed from every site on the network...."
-
See, e.g., MARK R. HORTON, RFC 850, STANDARD FOR INTERCHANGE OF USENET MESSAGES § 3.4 (1983), http://tools.ietf.org/html/rfc850 ("This message removes a newsgroup with the given name.... [T]he newsgroup is removed from every site on the network....").
-
(1983)
Standard For Interchange of Usenet Messages
, vol.850
-
-
Mark, R.H.1
-
403
-
-
77953558339
-
-
See, e.g., RFC 821, supra note 145, § 3.2 discussing forwarding of message by intermediate relays, with no expectation that they will retain copies for themselves or transmit to other, unspecified recipients
-
See, e.g., RFC 821, supra note 145, § 3.2 (discussing forwarding of message by intermediate relays, with no expectation that they will retain copies for themselves or transmit to other, unspecified recipients).
-
-
-
-
404
-
-
77953584711
-
-
See generally, & 3d ed, describing configuration of e-mail servers
-
See generally BRYAN COSTALES & ERIC ALLMAN, SENDMAIL (3d ed. 2002) (describing configuration of e-mail servers).
-
(2002)
Sendmail
-
-
Bryan, C.1
Allman, E.2
-
405
-
-
77953554228
-
-
See, supra note 212, at, "We are exercising our right to refuse traffic from anyone we choose. We choose not to accept any traffic at all from networks who are friendly in any way to spammers. This is our right as it would be within anyone's rights to make the same choice or a different one, so long as only their own resources were affected by their choice." emphasis added quoting Paul Vixie, What Is an Open Relay?, last visited Apr. 10
-
See Froomkin, supra note 212, at 833 ("[W]e are exercising our right to refuse traffic from anyone we choose. We choose not to accept any traffic at all from networks who are friendly in any way to spammers. This is our right as it would be within anyone's rights to make the same choice (or a different one, so long as only their own resources were affected by their choice)." (emphasis added) (quoting Paul Vixie, What Is an Open Relay?, http://www.mail-archive.com/imail-forum@list.ipswitch.com/msgl 1527.html (last visited Apr. 10, 2010))).
-
(2010)
, pp. 833
-
-
Froomkin1
-
406
-
-
16444378830
-
-
See, e.g., proposing Bayesian filtering and explaining that the author had already implemented such a system on his own
-
See, e.g., PAUL GRAHAM, HACKERS AND PAINTERS: BIO IDEAS FROM THE COMPUTER AGE 121-29 (2004) (proposing Bayesian filtering and explaining that the author had already implemented such a system on his own).
-
(2004)
Hackers and Painters: Bio Ideas From the Computer Age
, pp. 121-29
-
-
Paul, G.1
-
407
-
-
77953575311
-
-
See Gmail Uses Google's Innovative Technology To Keep Spam Out of Your Inbox, last visited Apr. 10, using high-quality spam filtering as advertisement for Gmail
-
See Gmail Uses Google's Innovative Technology To Keep Spam Out of Your Inbox, http://mail.google.com/mail/help/fightspam/spamexplained.html (last visited Apr. 10, 2010) (using high-quality spam filtering as advertisement for Gmail).
-
(2010)
-
-
-
408
-
-
62749207268
-
-
Cf, arguing for coexistence of and collaboration between private and common forms in the law of intellectual property
-
Cf. LAWRENCE LESSIG, REMIX: MAKING ART AND COMMERCE THRIVE IN THE HYBRID ECONOMY (2008) (arguing for coexistence of and collaboration between private and common forms in the law of intellectual property);
-
(2008)
Remix: Making Art and Commerce Thrive in the Hybrid Economy
-
-
Lawrence, L.1
-
409
-
-
77953572640
-
-
supra note 141
-
Heverly, supra note 141, at 1184-85.
-
-
-
Heverly1
|