The Microsoft Case

Shortly after Microsoft was faced with federal antitrust charges, full-page newspaper ads supporting Microsoft's claim of innocence were run by the Independent Institute. The ads took the form of a letter signed by 240 academic experts and purported to be a scholarly, unbiased view of why the government had gone overboard in its case against the company. According to an article published in the New York Times, Microsoft had not paid for the ads, but was in fact the single largest donor to the Independent Institute, a conservative organization, that has been a leading defender of the company since it first came under fire from federal prosecutors.

TEXTBLOCK 1/2 // URL: http://world-information.org/wio/infostructure/100437611704/100438658281
 
Copyright Management and Control Systems: Metering

Metering systems allow copyright owners to ensure payment to or at the time of a consumer's use of the work. Those technologies include:

Hardware Devices

Those have to be acquired and installed by the user. For example under a debit card approach, the user purchases a debit card that is pre-loaded with a certain amount of value. After installation, the debit card is debited automatically as the user consumes copyrighted works.

Digital Certificates

Hereby a certification authority issues to a user an electronic file that identifies the user as the owner of a public key. Those digital certificates, besides information on the identity of the holder can also include rights associated with a particular person. Vendors can so control access system resources, including copyrighted files, by making them available only to users who can provide a digital certificate with specified rights (e.g. access, use, downloading).

Centralized Computing

Under this approach all of the executables remain at the server. Each time the executable is used, the user's computer must establish contact with the server, allowing the central computer to meter access.

Access Codes

Access code devices permit users to "unlock" protective mechanisms (e.g. date bombs or functional limitations) embedded in copyrighted works. Copyright owners can meter the usage of their works, either by unlocking the intellectual property for a one-time license fee or by requiring periodic procurement of access codes.

Copyright Clearinghouses

Under this approach copyright owners would commission "clearinghouses" with the ability to license the use of their works. A user would pay a license fee to obtain rights concerning the intellectual property.


TEXTBLOCK 2/2 // URL: http://world-information.org/wio/infostructure/100437611725/100438659615
 
David Kahn

David Kahn can be considered one of the most important historians on cryptography. His book The Codebreakers. The comprehensive history of secret Communication from Ancient Times to the Internet, written in 1996 is supposed to be the most important work on the history of cryptography.

INDEXCARD, 1/2
 
The Spot

http://www.thespot.com/

http://www.thespot.com/
INDEXCARD, 2/2