Conference Program Book

Total Page:16

File Type:pdf, Size:1020Kb

Conference Program Book CONFERENCE PROGRAM August 27–30, 2017 Clearwater Resort Suquamish, Washington SSAFR 2017 The OECD Co-operative Research Programme: Biological Resource Management for Sustainable Agricultural Systems Disclaimer: The opinions expressed and arguments employed in this publication are the sole responsibility of the authors and do not necessarily reflect those of the OECD or of the governments of its Member countries. The Symposium was sponsored by the OECD Co-operative Research Programme on Biological Resource Management for Sustainable Agricultural Systems, whose financial support made it possible for some of the invited speakers to participate in the Symposium. WELCOME WELCOME I am honored to welcome you to the beautiful Pacific Northwest for the 17th Symposium for Systems Analysis in Forest Resources. As the conference chair and on behalf of our sponsors, I would like to thank you for choosing our Symposium to be your late summer destination for professional exchange. We are proud to have over 100 participants from 23 countries. Every continent is represented except Antarctica! We are scheduled to have 5 keynote and 89 standard presentations arranged in 4 parallel sessions, plus a field trip to the Olympic Peninsula. Our special purpose with this Symposium is to connect remote sensing scientists with operations researchers where their respective research could complement and inform the other in a meaningful way. Forest and natural resources are under increasing pressure to provide a variety of services, some of which are in conflict. Operations research tools can optimize Sándor Tóth the join production of these services but the models are just as good as the Symposium Chair descriptive and predictive data that parameterize them. Can we benefit Precision Forestry Cooperative from learning about the questions the two groups investigate, the respective School of Environmental & assumptions they make and the techniques they employ? I believe we can. Forest Sciences Lastly, I would like to extend our special thanks to our sponsors, the Organisation University of Washington for Economic Cooperation & Development Co-operative Research Programme on Biological Resource Management for Sustainable Agricultural Systems, the European Union’s H2020 Research and Innovation Programme (SuFoRun), the Washington State of Department of Natural Resources and the US Bureau of Land Management. Finally, many thanks to the Scientific Committee for the abstract evaluations, we appreciate your work which shaped the wide-ranging and engaging scientific program at this meeting. We all look forward to seeing you and your work in Suquamish! It is my pleasure to welcome you all on behalf of the University of Washington’s School of Environmental and Forest Sciences and the Precision Forestry Cooperative. We are happy you can join us here in this place naturally striking and resource rich, at a time when revolutionary changes in geospatial technology, including remote sensing and geoinformatics are at the forefront of sustainable decision making. From daily high-resolution views of our world to unmanned aerial systems-based three dimensional models of our landscapes, and temporal snapshots of the globe going back decades we are data rich. Yet, we often lack the ability to extract optimal information from these data to parameterize our models and optimize forest and natural resource services. An L. Monika Moskal opportunity presents itself in front of us to address this issue by drawing on the Director, Precision Forestry best toolsets from our respective disciplines. Similarly, to the abundance of the Cooperative data we can now work with, we came to this meeting with diverse knowledge School of Environmental & and infinite ideas that will hopefully ignite purposeful and exciting collaborations Forest Sciences for many years to come. We wish you a productive meeting and look forward to University of Washington interacting with you and listening to your ideas. SSAFR 2017 | August 27-30, 2017 1 PROGRAM OVERVIEW SUNDAY, AUGUST 27 09:00–17:30 Olympic Peninsula Field Trip (Lunch on your own at Timberhouse Restaurant, Quilcene) 19:00–20:30 Registration and Welcome Reception MONDAY, AUGUST 28 TUESDAY, AUGUST 28 07:00 Registration | Continental Breakfast 07:45 Continental Breakfast 08:00 Welcome and Opening Remarks 08:40 Keynote: Woodam Chung 08:15 Andras Szekacs, OECD-CRP 09:40 Sessions 08:40 Keynote: Greg Arthaud 10:20 Coffee Break 09:40 Sessions 10:50 Sessions 10:20 Coffee Break 12:10 Lunch 10:50 Sessions 13:20 Keynote: Jordi Garcia Gonzalo & 12:10 Lunch Jose G. Borges 13:20 Sessions 14:20 Sessions 14:40 Coffee Break 15:40 Coffee Break 15:10 Keynote: Nicholas Coops 16:10 Keynote: Austin Phillips 16:00 Business Meetings 18:00 Pre-Banquet Social Hour Evening On your own 19:00 SSAFR 2017 Banquet WEDNESDAY, AUGUST 30 07:45 Continental Breakfast 08:40 Sessions 10:00 Coffee Break 10:30 Sessions 11:50 Closing Session / Lessons Learned 12:30 Box Lunches SSAFR 2017 | August 27-30, 2017 2 TABLE OF CONTENTS Welcome . 1. Program Overview . .2 General Information . 4. Schedule-at-a-Glance Sunday & Monday . 5. Tuesday . 6 Wednesday . .7 Keynote Speakers Greg Arthaud . 8 Nicholas Coops . 8 Woodam Chung . 9. Jordi Garcia-Gonzalo . 1. 0 José G. Borges . 11. Austin Phillips . .12 Scientific Committee . .13 Organizing Committee . .13 Keynote Abstracts . 14–17 Abstracts Monday . 18–42 Tuesday . 43–75 Wednesday . 76–93 List of Participants . 94–96 Conference Quesionnaire (please complete) . bac. k of book Venue Map . outside. back cover SSAFR 2017 | August 27-30, 2017 3 GENERAL INFORMATION SSAFR Meeting Rooms General sessions, breakouts, and refreshment breaks will take place in the Clearwater Tower building. Meeting rooms are located on the 4th floor. Lunches will take place in the lower Clearwater Resort building. SSAFR Registration Desk Please check in at the SSAFR Registration Desk. Staff are available to provide general information and to assist all symposium participants. Name Badges Please wear your name badge at all times. It is your ticket to sessions, meals, and breaks. Continental Breakfast Continental breakfast will be offered on Monday, Tuesday, and Wednesday. The continental breakfast buffet station will be set up in in the Canoe Foyer, outside of the meeting rooms. Lunch Buffets Buffet lunches will be served on Monday and Tuesday. Box lunches will be served on Wednesday. The Monday and Tuesday lunch buffet station will be set up near the Resort Lobby and seating will be outside on the event lawn (weather permitting). The Resort building is a short walk from the meeting space. Please refer to the map on the back cover of this program book. In the event of rain, lunch will be served inside the Kitsap Room. Sunday Evening Reception Sunday, August 27 Canoe Foyer, 4th Floor of Clearwater Tower 19:00–20:30 p.m. Please join us for complimentary appetizers and an enjoyable evening to network with your friends and colleagues. Business Meetings Monday, August 28 16:00–17:00 SSAFR Business Meeting: Deer B Room SuFoRun Business Meeting: Deer A Room Precision Forestry Coop Business Meeting: Salmon Room SSAFR Banquet Tuesday, August 29 18:00-19:00 Social Hour 19:00-21:00 Banquet Dinner The SSAFR 2017 banquet will be held on the event lawn of the Clearwater Resort. Tickets were included with your registration materials. If you purchased a guest banquet ticket, it was also included. SSAFR 2017 | August 27-30, 2017 4 SUNDAY SCHEDULE AT A GLANCE 09:00–17:30 SUNDAY FIELD TRIP Olympic Peninsula 19:00–20:30 REGISTRATION & WELCOME RECEPTION Canoe Foyer - Level 4 of Tower MONDAY SCHEDULE AT A GLANCE 07:00–07:50 CONTINENTAL BREAKFAST 08:00–8:35 OPENING SESSION Whale Room Welcome / Opening Remarks – Sándor F. Tóth, Symposium Chair Organisation for Economic Co-operation & Development Co-operative Research Program (OECD-CRP) – Andras Szekacs 08:40–9:30 KEYNOTE SESSION 1 GREG ARTHAUD Whale Room 09:40–10:20 BREAKOUT SESSIONS 1 Deer B Room Whale Room Salmon Room 1B. Modeling Uncertainty, 1C. Forest Sector Modeling, 1D. Remote Sensing I Hazard & Risk I Forest Economics & Policy Session Chair: Nick Coops Session Chair: Alan Murray Session Chair: Adriana Piazza 1. Monique Guignard-Spielberg 1. Adriana Piazza 1. Andrew T. Hudak 2. Alan Murray 2. Vesa-Pekka Parkatti 2. Chris Mulverhill 10:20–10:50 COFFEE BREAK 10:50–12:10 BREAKOUT SESSIONS 2 Deer B Room Whale Room Salmon Room 2B. Modeling Uncertainty, 2C. Forest Supply Chain 2D. Remote Sensing II Hazard & Risk II Modeling I Session Chair: Nick Coops Session Chair: Alan Murray Session Chair: G. Paradis 1. Jan Kašpar 1. Gregory Paradis 1. Douglas K. Bolton 2. David Martell 2. Taraneh Sowlati 2. Piotr Tompalski 3. Sushil Nepal 3. Mustapha Ouhimmou 3. Tristan Goodbody 4. Teodora Minkova 4. Christoph Kogler 4. Joseph Rakofsky 12:10–13:20 LUNCH 13:20–14:40 BREAKOUT SESSIONS 3 Deer A Room Deer B Room Whale Room Salmon Room 3A. Forest Supply Chain 3B. Modeling Uncertainty, 3C. Continuous Cover 3D. Remote Sensing III Modeling II Hazard & Risk III Forestry Session Chair: L. Monika Session Chair: D. Fjeld Session Chair: Jordi Garcia- Session Chair: Peter Moskal Gonzalo Lohmander 1. Christian Kanzian 1. Rasoul Yousefpour 1. Olli Tahvonen 1.Przemyslaw Tymkow 2. Dag Fjeld 2. Jordi Garcia-Gonzalo 2. Peter Lohmander 2. Caileigh Shoot 3. Dag Fjeld 3. Andrés Weintraub 3. Peter Lohmander 3. Meghan Halabisky 4. Seung-Yeon Byun 4. Alan Ager 4. L. Monika Moskal 14:40–15:10 COFFEE BREAK 15:10–16:00 KEYNOTE SESSION 2 NICHOLAS COOPS Whale Room 16:00–17:00 BUSINESS MEETINGS SSAFR Business Meeting: Deer B | SuFoRun Business Meeting: Deer A Precision Forestry Coop Business Meeting: Salmon Room SSAFR 2017 | August 27-30, 2017 5 TUESDAY SCHEDULE AT A GLANCE 7:45–8:30 CONTINENTAL BREAKFAST 8:40–9:30 KEYNOTE SESSION 3 WOODAM CHUNG Whale Room 9:40–10:20 BREAKOUT SESSIONS 4 Deer B Room Whale Room Salmon Room 4B.
Recommended publications
  • Access Control
    Security Engineering: A Guide to Building Dependable Distributed Systems CHAPTER 4 Access Control Going all the way back to early time-sharing systems, we systems people regarded the users, and any code they wrote, as the mortal enemies of us and each other. We were like the police force in a violent slum. —ROGER NEEDHAM Microsoft could have incorporated effective security measures as standard, but good sense prevailed. Security systems have a nasty habit of backfiring, and there is no doubt they would cause enormous problems. —RICK MAYBURY 4.1 Introduction Access control is the traditional center of gravity of computer security. It is where se- curity engineering meets computer science. Its function is to control which principals (persons, processes, machines, . .) have access to which resources in the sys- tem—which files they can read, which programs they can execute, how they share data with other principals, and so on. NOTE This chapter necessarily assumes more computer science background than previous chapters, but I try to keep it to a minimum. 51 Chapter 4: Access Controls Figure 4.1 Access controls at different levels in a system. Access control works at a number of levels, as shown in Figure 4.1, and described in the following: 1. The access control mechanisms, which the user sees at the application level, may express a very rich and complex security policy. A modern online busi- ness could assign staff to one of dozens of different roles, each of which could initiate some subset of several hundred possible transactions in the system. Some of these (such as credit card transactions with customers) might require online authorization from a third party while others (such as refunds) might require dual control.
    [Show full text]
  • Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian
    Northwestern Journal of Technology and Intellectual Property Volume 6 Article 3 Issue 1 Fall Fall 2007 Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian Recommended Citation Christopher Soghoian, Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them, 6 Nw. J. Tech. & Intell. Prop. 46 (2007). https://scholarlycommons.law.northwestern.edu/njtip/vol6/iss1/3 This Article is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of Technology and Intellectual Property by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. NORTHWESTERN JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian Fall 2007 VOL. 6, NO. 1 © 2007 by Northwestern University School of Law Northwestern Journal of Technology and Intellectual Property Copyright 2007 by Northwestern University School of Law Volume 6, Number 1 (Fall 2007) Northwestern Journal of Technology and Intellectual Property Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them By Christopher Soghoian* I. INTRODUCTION ¶1 This paper focuses on the subsidization of a technology-based durable good.1 It goes on to discuss the delicate dance between the producer trying to protect its profit, competitors trying to create and sell aftermarket goods,2 and those innovative customers who use the items in completely unplanned and unprofitable ways. ¶2 An age old, but increasingly popular business model involves the subsidization of a proprietary durable good by a manufacturer, such that the good is sold below cost.3 Due to careful design, technological, and legal restrictions, the producer creates a primary product that is only compatible with its own aftermarket goods.
    [Show full text]
  • The Basic Economics of Internet Infrastructure
    Journal of Economic Perspectives—Volume 34, Number 2—Spring 2020—Pages 192–214 The Basic Economics of Internet Infrastructure Shane Greenstein his internet barely existed in a commercial sense 25 years ago. In the mid- 1990s, when the data packets travelled to users over dial-up, the main internet T traffic consisted of email, file transfer, and a few web applications. For such content, users typically could tolerate delays. Of course, the internet today is a vast and interconnected system of software applications and computing devices, which society uses to exchange information and services to support business, shopping, and leisure. Not only does data traffic for streaming, video, and gaming applications comprise the majority of traffic for internet service providers and reach users primarily through broadband lines, but typically those users would not tolerate delays in these applica- tions (for usage statistics, see Nevo, Turner, and Williams 2016; McManus et al. 2018; Huston 2017). In recent years, the rise of smartphones and Wi-Fi access has supported growth of an enormous range of new businesses in the “sharing economy” (like, Uber, Lyft, and Airbnb), in mobile information services (like, social media, ticketing, and messaging), and in many other applications. More than 80 percent of US households own at least one smartphone, rising from virtually zero in 2007 (available at the Pew Research Center 2019 Mobile Fact Sheet). More than 86 percent of homes with access to broadband internet employ some form of Wi-Fi for accessing applications (Internet and Television Association 2018). It seems likely that standard procedures for GDP accounting underestimate the output of the internet, including the output affiliated with “free” goods and the restructuring of economic activity wrought by changes in the composition of firms who use advertising (for discussion, see Nakamura, Samuels, and Soloveichik ■ Shane Greenstein is the Martin Marshall Professor of Business Administration, Harvard Business School, Boston, Massachusetts.
    [Show full text]
  • Part 1: Practical Time Management Strategies. Tyler Hoffman // Digital Solutions Consultant the Vision
    Part 1: Practical Time Management Strategies. Tyler Hoffman // Digital Solutions Consultant The Vision. 2 The Vision: Essentialism. 3 The Vision: Essentialism. Removing “non-essentials”… • Non-essential tasks • Non-essential engagements • Non-essential information …to focus on what is essential: • “What can I and only I do, that if done well, will make a real difference?” 4 The Plan: Big Rocks First. 5 The Plan: Eat that Frog. Plan, Prioritize and Complete your most essential tasks first. “There is never enough time to do everything, but there is always enough time to do the most important thing. ” 6 The Tools. 7 Eat that Frog: Upgrade Your Key Skills “With practice , you can learn any behavior or develop any habit that you consider either desirable or necessary.” 8 Lynda.com Online, Self-Paced Learning • Video-based online learning for hundreds of topics • Free for CWRU faculty • Available for computer, smartphone and tablet → case.edu/utech/lynda 9 Unlocking CWRU Account. • help.case.edu à reset forgotten password • IT Service Desk à 216.368.HELP (4357) 10 Grammarly Improve Grammar and Spelling • Browser plug-in for checking grammar and spelling online • Improves document and email proofreading in Microsoft Office • Basic account is free → grammarly.com → Lynda.com training video 11 Grammarly Check Grammar and Spelling Online 12 Eat that Frog: Plan Every Day in Advance “The most sophisticated Outlook system , computer app, or time planner is based on the same principle . It is based on your sitting down and making a list of everything you have to do before you begin.” 13 Wunderlist Create a Better To-Do List • Create lists of tasks that sync across all of your devices • Set reminders and due dates • Create sub-tasks • Invite collaborators • “Add to Calendar” feature → wunderlist.com → Lynda.com training video 14 Wunderlist Create a Better To-Do List 15 Eat that Frog: Use the ABCDE Method A A task that will yield very positive or negative results if you fail to do it.
    [Show full text]
  • Agile Processes in Software Engineering and Extreme
    Juan Garbajosa · Xiaofeng Wang Ademar Aguiar (Eds.) Agile Processes in Software Engineering and Extreme Programming LNBIP 314 19th International Conference, XP 2018 Porto, Portugal, May 21–25, 2018 Proceedings Lecture Notes in Business Information Processing 314 Series Editors Wil M. P. van der Aalst RWTH Aachen University, Aachen, Germany John Mylopoulos University of Trento, Trento, Italy Michael Rosemann Queensland University of Technology, Brisbane, QLD, Australia Michael J. Shaw University of Illinois, Urbana-Champaign, IL, USA Clemens Szyperski Microsoft Research, Redmond, WA, USA More information about this series at http://www.springer.com/series/7911 Juan Garbajosa • Xiaofeng Wang Ademar Aguiar (Eds.) Agile Processes in Software Engineering and Extreme Programming 19th International Conference, XP 2018 Porto, Portugal, May 21–25, 2018 Proceedings Editors Juan Garbajosa Ademar Aguiar Technical University of Madrid University of Porto Madrid, Madrid Porto Spain Portugal Xiaofeng Wang Free University of Bozen-Bolzano Bolzano Italy ISSN 1865-1348 ISSN 1865-1356 (electronic) Lecture Notes in Business Information Processing ISBN 978-3-319-91601-9 ISBN 978-3-319-91602-6 (eBook) https://doi.org/10.1007/978-3-319-91602-6 Library of Congress Control Number: 2018944291 © The Editor(s) (if applicable) and The Author(s) 2018. This book is an open access publication. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
    [Show full text]
  • Before the Federal Communications Commission Washington, D.C. 20554
    Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) Implementation of Section 304 of the ) CS Docket No. 97-80 Telecommunications Act of 1996 ) ) Commercial Availability of Navigation Devices ) ) Compatibility Between Cable Systems and ) PS Docket No. 00-67 Consumer Electronics Equipment ) COMMENTS OF MICROSOFT CORPORATION Gerard J. Waldron Jodi M. Steiger Covington & Burling LLP 1201 Pennsylvania Avenue, N.W. Washington, DC 20004 (202) 662-6000 Its Counsel August 24, 2007 TABLE OF CONTENTS INTRODUCTION & SUMMARY ……………………………………………………………..1 I. MICROSOFT SUPPORTS THE GOALS OF SECTION 629 FOR ALL MVPDs........ 3 A. Rules Should Include the Personal Computer ............................................................... 4 B. Rules Should Attempt to Achieve Economic Viability for all Interested Parties ....... 5 II. THE COMMISSION’S RULES SHOULD PROMOTE RETAIL AVAILABILITY OF DEVICES BY PROMOTING NETWORK COMPETITION AND TAKING INTO ACCOUNT THE TECHNOLOGY BEING USED BY DIFFERENT MVPDs............................................................................................................................... 6 A. Network Competition Promotes Retail Availability...................................................... 6 B. The Commission’s Cable-Centric Navigation Device Rules Should Not Be Applied to Non-Cable MVPDs ....................................................................................................... 7 C. The CEA and NCTA Proposals Under Consideration Should Not Be Applied to IPTV................................................................................................................................
    [Show full text]
  • Internationaltropicaltim
    Distr. GENERAL PPR 65/01(M) ITTO Original: ENGLISH INTERNATIONALTROPICALTIMBER ORGANIZATION PRE-PROJECT REPORT A STUDYON THE MEDIUMAND LONG-TERM OUTLOOK FORTHE TROPICAL TIMBER MARKET [PPD 27/99 (M)] PREPARED FOR ITTO BY LTS INTERNATIONAL LTD. OCTOBER 2001 The Medium and Long-term Outlook forthe Tropical Timber Market I . EXECUTI VE SUMMARY ............................................................................................. I I . I MODELLING. ................................................................................................................. I. .. 1.2 DATA SOURCESAND VERIFICAnON .................................................................................... 2. I . 3 RESULTS .......,............................................................................................................. 2 .. 1.4 MAJOR FACTORS IN THE GLOBAL SUPPLY OF TROPICAL TIMBER PRODUCTS. ................................... 3 I . 5 TRENDS. ...................................................................................................................... 6 .. 1.6 SUMMARYFOR PRODUCER COUNTRIES. .......,....................................................................... 7. 1.7 SUMMARYFOR CONSUMER COUNTRIES. ............................................................................... 7. 1.8 GLOBAL DEMAND FOR TROPICAL TIMBER PRODUCTS. ......,........................................................ Z 1.9 MAIN SCENARIOS FOR SUPPLYAND DEMAND TRENDS. ............................................................. 7 2. BACKGROUND. ....................................................................................................
    [Show full text]
  • READS Training and Reference Manual 4
    W I S C O N S I N D E P A R T M E N T O F T R A N S P O R T A T I O N READS System Administrator: [email protected] (608) 266-9490 Updated December 11, 2019 READS is developed and maintained for WisDOT by BEM Systems Inc. http://bemsys.com/ Table of Contents READS New User Training READS Setup READS Launch Page 4 WAMS ID 5 READS Account Request 7 PC Settings 8 READS Email List 9 READS Overview Highlights 11 System Control and Conventions 12 Main Menu Overview 13 Project & Plat Basic Navigation 14 Assignments 17 Exercise 1 ‐ Projects, Plats, Assignments 19 Parcels, Participants & Interests Exercise 2 ‐ Parcels, Participants, Interests 24 Waiver of Appraisal and Offer Negotiation Diary 34 Legal Descriptions 36 Exercise 3 ‐ Nominal Valuation, Offer, Log 37 Appraisal and Offer Correctly Entering Remnants 42 Exercise 4 ‐ Appraisal Valuation, Offer 51 READS Log, Documents & Letters Electronic Records law 56 Save as PDF 58 READS Logs 60 Turn Off / On Word Document Protection 62 Documents and Letters 64 Exercise 5 ‐ Log 67 Payment Requests & E-Authorization 71 Exercise 6 ‐ Payment Request, E‐Authorization 73 Delegation Table 78 Relocation Relocation Documents and Letters 81 Adding Relocatees (residential, business, signs) 82 Assignments 88 Residential Owner Relocation Certificate of Legal Residency 89 90 Relocation Package Exercise 7 ‐ Residency Cert, Package Receipt, Letter 91 Comparables Exercise 8 ‐ Comparables, RHP, Comparison Chart, Summary 95 Relocation Assistance Diary 102 Relocation Claims Exercise 9 ‐ Relocation Claims 103 Individual Relocation Case Report 109 Exercise 10 ‐ Replacement, Case Report 111 Business Owner Relocation 118 Business Move Worksheet Reporting Reporting in READS 119 Exercise 11 ‐ Reporting 125 The READS Launch Page READS Only Works with Internet Explorer The READS Launch Page is here: https://wisconsindot.gov/Pages/doing-bus/eng-consultants/cnslt-rsrces/re/reads.aspx To find it on the Internet 1.
    [Show full text]
  • Sega Was Important in the IP-In-Interfaces Odyssey for at Least
    Draft as of August 21, 2008 Please do not cite, copy, or distribute without the author’s permission. Are Patents on Interfaces Impeding Interoperability? by Pamela Samuelson* Abstract: Many patents have issued for communications protocols and other interface designs for information and communications technologies (ICT). Commentators and policymakers have frequently expressed concern about the exclusionary potency of interface patents because they can confer on patentees power to block interoperability in socially harmful ways. This Article considers numerous policy options that have been proposed to respond to the dangers posed by interface patents, including exclusions of interfaces from patent protection, immunization of use of patented interfaces if necessary to achieve interoperability, withholding injunctive relief for infringement of interface patents, and treating refusals to license interface patents as abuses of intellectual property rights or violations of competition or antitrust laws. The Article observes that a great deal of interoperability is occurring notwithstanding the existence of interface patents, in part because private consortia have adopted policies in support of interoperability and in part because owners of such patents often have incentives to license them to facilitate interoperability. There is as yet insufficient evidence that interface patents are such serious impediments to interoperability as to justify adoption of strong measures, such as their exclusion from patent protection. INTRODUCTION Interoperability among information and communications technologies (ICT) is widely praised for promoting socially desirable goals, including fostering competition and innovation, enhancing consumer satisfaction, and promoting economic growth.1 ICT interoperability means “the ability to transfer and render useful data and other information across systems, applications, or components.”2 To achieve interoperability, firms must have access to and be able to use the precise information that defines the * Richard M.
    [Show full text]
  • Wintel: Cooperation Or Conflict
    #05-083 Wintel: Cooperation or Conflict Ramon Casadesus-Masanell David B. Yoffie Copyright © 2005 Working papers are in draft form. This working paper is distributed for purposes of comment and discussion only. It may not be reproduced without permission of the copyright holder. Copies of working papers are available from the author. Wintel: Cooperation or Conflict∗ Ramon Casadesus-Masanell† David B. Yoffie‡ April 13, 2005 Abstract We study the incentives of complementors (producers of complementary products) to cooperate vs. compete and how these interact. In a system of complements, like the PC, the value of the final product depends on how well the different components work together. This, in turn, depends on the firms’ investment in complementary R&D. We ask whether profit maximizing complementors will fully cooperate to make the final product as valuable as possible. Contrary to the popular view that two tight complements will generally have well aligned incentives, we demonstrate that natural conflicts emerge over pricing, the timing of investments, and who captures the greatest value at different phases of product generations. Preliminary draft ∗We thank Vicente Salas Fumás, Michal Pozarzycki, Ana Sotelo, and seminar participants at IESE’s ‘Brown Bag’ series for helpful comments. †Harvard Business School and IESE Business School ‡Harvard Business School 1 1 Introduction Intel and Microsoft are perhaps the best known pair of complementary firms in the world. More than 80% of the personal computers worldwide ship with an Intel microprocessor running Microsoft’s Windows operating system. Since 1980, when IBM chose both Intel and Microsoft as the core components of the first IBM PC, Intel and Microsoft have been joined at the hip.
    [Show full text]
  • Beyond Fair Use: the Right to Contract Around Copyright Protection of Reverse Engineering in the Software Industry
    Copyright © 2006, Chicago-Kent Journal of Intellectual Property BEYOND FAIR USE: THE RIGHT TO CONTRACT AROUND COPYRIGHT PROTECTION OF REVERSE ENGINEERING IN THE SOFTWARE INDUSTRY David N. Pruitt* Introduction The law should promote technological innovation in the computer software industry, but not at the cost of prohibiting private parties from entering into freely negotiated agreements for the proper handling of their intellectual property. This Note's position is that federal copyright law is not intended to prohibit private parties from freely negotiating the way privately owned intellectual property may be used in a licensing agreement, if the terms are not unconscionable and do not violate the antitrust laws. Specifically, the focus of this Note is on common software licensing terms that prohibit licensees from engaging in a process known as reverse engineering. To the extent that the innovation in the software industry is harmed by such restrictive provisions, a free-market approach that allows parties to freely enter into licensing agreements will rely on new software providers to inevitably enter the market and provide more favorable licensing terms if they can do so at a price that the market will bear. Reverse engineering is an important process used by computer programmers to build new software that is compatible with existing software. Although the process involves making copies of copyright-protected computer software, it falls under the Copyright Act's "fair use" exception.' The recently enacted Digital Millennium Copyright Act, which prohibits circumventing technological measures designed to protect access to a copyright-protected work, provides an exception for the limited purpose of reverse engineering to achieve compatibility between software products.
    [Show full text]
  • What Is Blended Learning?
    Horn flast1.tex V3 - 09/15/2014 10:43am Page xiv Horn f00.tex V3 - 09/15/2014 6:03pm Page i More Praise for Blended ‘‘The interest in leveraging technology in schools is growing at a rapid pace. That means district leadership is critical in order to harness these innovative tools as effectively as possible. This book provides superintendents with a blueprint to ensure that blending learning boosts student achievement.’’ —Daniel A. Domenech, executive director, American Association of School Administrators ‘‘Blended not only describes what various blended learning models look like, it carefully lays out a blueprint that school administrators, teachers, and parents can use to make blended learning a reality in their schools. As Horn and Staker clearly state in this book, what we need more than anything in education today is a culture of iteration and innovation to think through and take advantage of this dynamic shift in potential learning models. This important book is a tremendous resource for anyone who wants to take on the significant change we need to make in education. I am going to make sure everyone on my team reads it from cover to cover. Highly recommended!’’ —Jaime Casap, global education evangelist, Google ‘‘Our schools need to improve, and technology, if used smartly, can help them do that. This book, building on the authors’ previous groundbreaking work in Disrupting Class, provides a step-by-step guide for how to do blended learning right. It is a must-read for school officials and educators who want to get good results for their students.’’ —Joel Klein, CEO, Amplify; former chancellor, New York City Department of Education ‘‘This book takes the innovative work in Disrupting Class to the next level.
    [Show full text]