Charismatic Code, Social Norms, and the Emergence of Cooperation on the File-Sharing Networks

Total Page:16

File Type:pdf, Size:1020Kb

Charismatic Code, Social Norms, and the Emergence of Cooperation on the File-Sharing Networks University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 2003 Charismatic Code, Social Norms, and the Emergence of Cooperation on the File-Sharing Networks Lior Strahilevitz Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Lior Strahilevitz, "Charismatic Code, Social Norms, and the Emergence of Cooperation on the File-Sharing Networks," 89 Virginia Law Review 505 (2003). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. VIRGINIA LAW REVIEW VOLUME 89 MAY 2003 NUMBER 3 ARTICLE CHARISMATIC CODE, SOCIAL NORMS, AND THE EMERGENCE OF COOPERATION ON THE FILE- SWAPPING NETWORKS Lior Jacob Strahilevitz * INTROD U CTION ................................................................................... 507 I. AN INTRODUCTION TO NAPSTER, GNUTELLA, AND THE FILE-SWAPPING HYBRIDS ........................................... 510 A . Nap ster ................................................................................... 511 1. Napster in Brief ............................... 511 2. Napster's G rowth ............................................................. 512 3. The Napster Litigation and Its Fallout.......................... 513 B . G n utella .................................................................................. 515 1. G nutella's Structure......................................................... 516 2. G nutella's Growth ........................................................... 519 C. File-SwappingH ybrids ......................................................... 519 D. CooperativeBehavior on Napster, Gnutella, and the Hybrids .............. .......................... 521 Assistant Professor, University of Chicago Law School. Thanks are owed to Mi- chael Abramowicz, Anne Alstott, Theodore Angelis, Robert Ellickson, Dan Kahan, Doug Lichtman, Glynn Lunney, Mark Nadel, Leslie Pollner, Eric Posner, Eric Shum- sky, Cass Sunstein, Rebecca Tushnet, and Adrian Vermeule for their helpful com- ments and criticisms on earlier drafts, and Colin McNary for his valuable research as- sistance. In addition, conversations and exchanges with Amy Adler, Robert Axelrod, Vicki Been, Richard Brooks, Karol Brown, Leandra Lederman, Mark Lemley, Law- rence Lessig, Saul Levmore, Tracey Meares, Peter Menell, Tony Miles, Kimberly Mills, Randy Picker, Bill Stuntz, and Tamara Watts were instrumental in improving the Article. Finally, thanks to workshop participants at the University of Chicago, Yale, Stanford, Berkeley, NYU, Northwestern, Hastings, George Mason, and UCLA. 505 506 Virginia Law Review [Vol. 89:505 1. Files Are Shared in Sufficient Quantities...................... 523 2. Files Are Usually Accurately Labeled and of High Q uality .............................................................................. 529 3. A Failureof Cooperation: TransmissionDisruptions A re Frequent..................................................................... 532 II. FILE-SWAPPING NORMS .............................................................. 534 A. The Social Norms Framework: The Emergence of N o rms ..................................................................................... 537 B. How the Pro-File-SwappingNorms Emerged .................... 538 1. N orm Entrepreneurs....................................................... 538 2. Opinion L eaders.............................................................. 539 3. P olling D ata ..................................................................... 542 a. Norm Enforcement - Anti-File-Swapping.............. 544 b. Norm Enforcement - Pro-File-Swapping............... 545 III. CHARISMATIC CODE AND COOPERATIVE NORMS IN LOOSE-K NIT G ROUPS .................................................................. 547 A. CharismaticCode Defined.................................................... 548 B. The Distorted Im age .............................................................. 550 C. Reinforcing Reciprocity ........................................................ 554 D. The Norm of Reciprocity in Loose-Knit Groups ............... 557 1. File-Sharingas Guilt Alleviation ................................... 563 2. Reciprocity Cascades....................................................... 567 3. Holdouts ........................................................................... 571 4. Alternative Explanations................................................ 573 IV. UNDERSTANDING AND SHAPING THE FILE-SWAPPING M O VEM ENT ................................................................................... 576 A. Napster and the Failureof Law as an Expressivist Tool ...576 1. The Importance of the Injunction.................................. 577 2. The Porous Filter............................................................. 578 3. The Clearinghousefor Napster Alternatives................. 578 4. The Youth Vanguard ...................................................... 580 5. The Injunction in Retrospect.......................................... 582 B. The Self-Help Strategy........................................................... 582 1. Uploading Inferior or Incomplete Copies..................... 583 2. Mischievous Misidentification........................................ 585 3. PotentialD rawbacks ....................................................... 586 C. Taxing Uploading.................................................................. 587 D. The Power of Information and Un-CharismaticCode ...... 590 2003] Cooperationon the File-SwappingNetworks 507 E. Strengthening the File-Swapping Movement ...................... 593 C O N CLU SIO N ....................................................................................... 594 INTRODUCTION T HREE years ago, no one had heard of Napster or Gnutella. Over the past few years, however, Napster and Gnutella, along with their subsequent imitators, have grown into arguably the larg- est international networks of illegality in human history. At its peak Napster had approximately 70 million users,' the overwhelm- ing majority of whom used the service to obtain unlicensed copies of copyrighted sound recordings by swapping music files with other users.2 Although adverse court decisions eventually brought Nap- ster to its knees, file-swapping users have simply taken their "busi- ness" elsewhere, and a plethora of file-swapping networks, includ- ing Gnutella, have taken Napster's place. By 2002, another application, Kazaa, had twice as many users as Napster had at its peak.' According to a recent estimate, as many as 40 million Americans use a peer-to-peer network to obtain copyrighted con- tent every week.' There is something else happening with these networks besides the widespread copyright infringement they encourage, and it may be even more interesting. After all, there is little mystery as to why 'Matt Richtel, With Napster Down, Its Audience Fans Out, N.Y. Times, July 20, 2001, at Al; Kelly Zito, Online Music Firm Settles Lawsuit with Publishers, S.F. Chron., Sept. 25, 2001, at C1. 2A & M Records v. Napster, Inc., 114 F. Supp. 2d 896, 902-03 (N.D. Cal. 2000) ("The evidence shows that virtually all Napster users download or upload copyrighted files and that the vast majority of the music available on Napster is copyrighted."). 'Amy Harmon, Gazing into 2003: Economy Intrudes on Dreams of New Services- Music Attracting Consumers to the Online Jukebox, N.Y. Times, Dec. 30, 2002, at C3; see also Gwendolyn Mariano, Napster Rivals Winning Popularity Contest, ZDNet Austi., at http://www.zdnet.com.au/printfriendly?AT=2000024981-20261702 (Nov. 6, 2001) (on file with the Virginia Law Review Association) (noting that the Ka- zaa/Grokster network was predicted to have passed Napster in terms of number of simultaneous user; by November of 2001); Richard Menta, RIAA and MPAA Sue Morpheus, Grokster, and KaZaa, at http://www.mp3newswire.net/stories/2001/ sue-morpheus.html (Oct. 3, 2001) (on file with the Virginia Law Review Association) ("According to WebNoize, 3.05 billion files were downloaded in August via the lead- in Napster clones. At its peak last February Napster delivered 2.79 billion files."). Doug Bedell, Pay to Play? No Way: New Legislation, Record Labels Are Going After File-Sharing Networks, San Diego Union Trib., July 29, 2002, at E3 (citing a re- cent study by the San Francisco research firm Odyssey). 508 Virginia Law Review [Vol. 89:505 tens of millions of individuals have chosen to use these networks to download free, high-quality sound recordings. The more puzzling question is why tens of millions of individuals have chosen to up- load free, high-quality sound recordings to their fellow anonymous users. Downloading content from a peer-to-peer network depends entirely on another user's willingness to upload such content. While users of these networks have been free to download as much content as they want without ever having to share their content, a substantial number of users still elected to share. Seen in this light, the file-swapping networks are a triumph of cooperation, and a shining beacon of kindness to strangers. In this Article, I will provide an explanation for why so many Internet users make their unlicensed copies of copyrighted content available to perfect strangers despite the absence of obvious
Recommended publications
  • Privacy Vs. Piracy
    KATYAL: PRIVACY VS. PIRACY ARTICLE PRIVACY VS. PIRACY SONIA K. KATYAL* I. COMPETING FRAMEWORKS OF PRIVACY AND PROPERTY ...... 231 A. A SYMBIOTIC VIEW FROM REAL SPACE ........................... 233 B. A HIERARCHICAL VIEW FROM CYBERSPACE ................... 241 1. PLACE AND PANOPTICISM ......................................... 244 2. THE DIGITAL PERSONA AS PROPERTY ....................... 251 II. THE CONVERGENCE BETWEEN CONSUMER AND PIRACY SURVEILLANCE .................................................................... 263 A. ORIGINS OF PIRACY SURVEILLANCE ............................... 271 1. THE DIGITAL MILLENNIUM COPYRIGHT ACT AND PEER- TO-PEER JURISPRUDENCE ......................................... 271 2. THE LEGACY OF VERIZON ......................................... 281 B. SPECTERS OF PIRACY SURVEILLANCE ............................. 290 1. M ONITORING ............................................................ 293 2. M ANAGEM ENT .......................................................... 304 3. INTERFERENCE ......................................................... 311 III. TOWARDS A REGIME OF PANOPTIC PUBLICATION ................. 316 A. PRIVACY AND AUTONOMY ............................................... 319 B. DUE PROCESS AND FREEDOM OF EXPRESSION ............... 328 IV. BALANCING PRIVATE AND PUBLIC ENFORCEMENT .............. 335 V . C ON CLU SION ....................................................................... 345 This article was jointly reviewed and edited by YALE JOURNAL OF LAW & TECHNOLOGY and INTERNATIONAL JOURNAL
    [Show full text]
  • When Code Isn't Law
    Columbia Law School Scholarship Archive Faculty Scholarship Faculty Publications 2003 When Code Isn't Law Tim Wu Columbia Law School, [email protected] Follow this and additional works at: https://scholarship.law.columbia.edu/faculty_scholarship Part of the Intellectual Property Law Commons, and the Science and Technology Law Commons Recommended Citation Tim Wu, When Code Isn't Law, VIRGINIA LAW REVIEW, VOL. 89, P. 679, 2003; UNIVERSITY OF VIRGINIA SCHOOL OF LAW PUBLIC LAW & LEGAL THEORY RESEARCH WORKING PAPER NO. 03-10 (2003). Available at: https://scholarship.law.columbia.edu/faculty_scholarship/1290 This Working Paper is brought to you for free and open access by the Faculty Publications at Scholarship Archive. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Scholarship Archive. For more information, please contact [email protected]. UNIVERSITY OF VIRGINIA SCHOOL OF LAW 2003 SPRING PUBLIC LAW AND LEGAL THEORY RESEARCH PAPERS SERIES WHEN CODE ISN’T LAW TIM WU WORKING PAPER NO. 03-10 This Paper Can Be Downloaded Without Charge From The Social Science Research Network Electronic Paper Collection Http://Ssrn.Com/Abstract_Id=413201 101 102 Virginia Law Review Vol. 89:nnn 2003] Compliance & Code 103 VIRGINIA LAW REVIEW VOLUME 89 JUNE 2003 NUMBER 4 ARTICLE WHEN CODE ISN’T LAW Tim Wu* INTRODUCTION...................................................................................104 I. A THEORY OF CODE, CHANGE, AND AVOIDANCE ...........................110 A. Reactions to Law in General Theories of Regulation .............110 B. When Groups Get Sick of Complying.....................................112 1. Avoidance Mechanisms ...................................................112 2. Change Mechanisms........................................................116 3. Summary: The Change/Avoidance Choice .......................118 C.
    [Show full text]
  • Peer-To-Peer Distribution Systems: Will Napster, Gnutella, and Freenet Create a Copyright Nirvana Or Gehenna? Damien A
    William Mitchell Law Review Volume 27 | Issue 3 Article 1 2001 Peer-to-peer Distribution Systems: Will Napster, Gnutella, and Freenet Create a copyright Nirvana or Gehenna? Damien A. Riehl Follow this and additional works at: http://open.mitchellhamline.edu/wmlr Recommended Citation Riehl, Damien A. (2001) "Peer-to-peer Distribution Systems: Will Napster, Gnutella, and Freenet Create a copyright Nirvana or Gehenna?," William Mitchell Law Review: Vol. 27: Iss. 3, Article 1. Available at: http://open.mitchellhamline.edu/wmlr/vol27/iss3/1 This Article is brought to you for free and open access by the Law Reviews and Journals at Mitchell Hamline Open Access. It has been accepted for inclusion in William Mitchell Law Review by an authorized administrator of Mitchell Hamline Open Access. For more information, please contact [email protected]. © Mitchell Hamline School of Law Riehl: Peer-to-peer Distribution Systems: Will Napster, Gnutella, and Fr PEER-TO-PEER DISTRIBUTION SYSTEMS: WILL NAPSTER, GNUTELLA, AND FREENET CREATE A COPYRIGHT NIRVANA OR GEHENNA? Damien A. Riehl I. INTRODUCTION ....................................................................1762 II. DESCRIPTION OF PEER-TO-PEER SYSTEMS ............................1764 III. N APSTER ...............................................................................1766 A. Introduction .............................................................. 1766 B. Napster's Software Architecture ..................................... 1768 C. A & M Records, Inc. v. Napster, Inc ............................1768
    [Show full text]
  • JXTA Search: Distributed Search for Distributed Networks
    JXTA Search: Distributed Search for Distributed Networks Steve Waterhouse Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 USA 650 960-1300 Introduction JXTA Search started life in June 2000 when Gene Kan and Yaroslav Faybishenko of Infrasearch created a demo search engine which connected multiple Web servers together using a peer-to-peer protocol. This demo consisted of a Web front-end to a distributed set of servers, each running a node hardcoded to respond to certain types of queries. The founders of Infrasearch conceived the idea to distribute queries to network peers best capable of answering them. For example, the Infrasearch search engine responded intelligently to queries for: ¥ Text, by hitting a Moreover News database ¥ Stock quotes, by sending the query to Yahoo! Finance ¥ Pictures, by using OnlinePhoto Lab ¥ Arithmetic, by sending the query to a calculator Nearly a year later, the Infrasearch team is now part of Sun’s Project JXTA (http://jxta.org), but has the same missions and objectives to provide a common distributed query mechanism for devices from Web servers to small computers, effectively p2p-ing the Web via JXTA and Infrasearch s distributed search technology. In addition, the original Infrasearch demo has been extended to work not only on the Web, but also as part of the JXTA framework. Infrasearch now provides the default searching methodology for the JXTA framework in the form of JXTA Search. The JXTA Search Network Communication over the JXTA Search network is performed via an XML protocol called the Query Routing Protocol (QRP). The QRP defines mechanisms for sending and responding to queries in the JXTA Search network, as well as mechanisms for defining meta-data for nodes in the network.
    [Show full text]
  • Pvp.Boalt.Draft Katyal
    July 15, 2003 Draft-in-progress—Please do not quote, cite, or circulate without permission Privacy vs. Piracy Sonia K. Katyal* Introduction ...........................................................................................................................................................................1 Part I: A Dialectical Relationship Between Privacy and Property....................................................................................6 A. Real Space: Some Basic Points on the “Private” Nature of Property Ownership...............................................6 B. Rethinking Property in Cyberspace.......................................................................................................................11 C. Peer-to-Peer Panopticism .......................................................................................................................................16 Part II: Spectres of Piracy Surveillance ...........................................................................................................................23 A. Origins of Piracy Surveillance...............................................................................................................................24 B. Methods of Piracy Surveillance.............................................................................................................................32 1. Monitoring ..........................................................................................................................................................37
    [Show full text]
  • Peer to Peer.Pdf
    Peer to Peer: Harnessing the Power of Disruptive Technologies Andy Oram (editor) First Edition March 2001 ISBN: 0-596-00110-X, 448 pages This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found. The contributors are leading developers of well-known peer-to-peer systems, such as Gnutella, Freenet, Jabber, Popular Power, SETI@Home, Red Rover, Publius, Free Haven, Groove Networks, and Reputation Technologies. Topics include metadata, performance, trust, resource allocation, reputation, security, and gateways between systems. Table of Contents Preface 1 Andy Oram Part I. Context and Overview 1. A Network of Peers: Models Through the History of the Internet 8 Nelson Minar and Marc Hedlund 2. Listening to Napster 19 Clay Shirky 3. Remaking the Peer-to-Peer Meme 29 Tim O'Reilly 4. The Cornucopia of the Commons 41 Dan Bricklin Part II. Projects 5. SETI@home 45 David Anderson 6. Jabber: Conversational Technologies 51 Jeremie Miller 7. Mixmaster Remailers 59 Adam Langley 8. Gnutella 62 Gene Kan 9. Freenet 80 Adam Langley 10. Red Rover 86 Alan Brown 11. Publius 93 Marc Waldman, Lorrie Faith Cranor, and Avi Rubin 12. Free Haven 102 Roger Dingledine, Michael J. Freedman, and David Molnar Table of Contents (cont...) Part III. Technical Topics 13. Metadata 121 Rael Dornfest and Dan Brickley 14. Performance 128 Theodore Hong 15. Trust 153 Marc Waldman, Lorrie Faith Cranor, and Avi Rubin 16. Accountability 171 Roger Dingledine, Michael J. Freedman, and David Molnar 17. Reputation 214 Richard Lethin 18.
    [Show full text]
  • Napster, the Net Act, and the Criminal Prosecution of File-Sharing." American University Law Review 50, No.2 (2000): 473-532
    American University Law Review Volume 50 | Issue 2 Article 7 2000 COMMENT: A Nation of Felons?: Napster, the Net Act, and the Criminal Prosecution of File- Sharing Aaron M. Bailey American University Washington College of Law Follow this and additional works at: http://digitalcommons.wcl.american.edu/aulr Part of the Law Commons Recommended Citation Bailey, Aaron M. "COMMENT: A Nation of Felons?: Napster, the Net Act, and the Criminal Prosecution of File-Sharing." American University Law Review 50, no.2 (2000): 473-532. This Comment is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. COMMENT: A Nation of Felons?: Napster, the Net Act, and the Criminal Prosecution of File-Sharing This comment is available in American University Law Review: http://digitalcommons.wcl.american.edu/aulr/vol50/iss2/7 BAILEYPP.DOC 8/15/2001 11:40 AM COMMENT A NATION OF FELONS?: NAPSTER, THE NET ACT, AND THE CRIMINAL PROSECUTION OF FILE-SHARING ∗ AARON M. BAILEY TABLE OF CONTENTS Introduction.........................................................................................474 I. Background ...............................................................................478 A. The Fury Over MP3 “File-sharing”.....................................478
    [Show full text]
  • The New Surveillance
    Case Western Reserve Law Review Volume 54 Issue 2 Article 4 2003 The New Surveillance Sonia K. Katyal Follow this and additional works at: https://scholarlycommons.law.case.edu/caselrev Part of the Law Commons Recommended Citation Sonia K. Katyal, The New Surveillance, 54 Case W. Rsrv. L. Rev. 297 (2003) Available at: https://scholarlycommons.law.case.edu/caselrev/vol54/iss2/4 This Article is brought to you for free and open access by the Student Journals at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Case Western Reserve Law Review by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. THE NEW SURVEILLANCE Sonia K. Katyalt INTRODUCTION A few years ago, it was fanciful to imagine a world where in- tellectual property owners - such as record companies, software owners, and publishers - were capable of invading the most sacred areas of the home in order to track, deter, and control uses of their products. Yet, today, precisely that is taking place. Emboldened by courts and legislators, copyright owners now undertake a wid- ening degree of control over cultural products through the guise of piracy detection. As is now clear, the Internet is no longer a smooth-functioning patchwork of anonymous possibilities for peer-to-peer communication. Instead, lurking behind the faqade of such potential connections lies an increasing and subtle host of opportunities for legal accountability and detection, particularly where the use (or misuse) of intellectual property is concerned. In late July 2002, the Recording Industry Association of America ("RIAA") contacted Verizon, which provides Internet services for its customers, seeking the identity of a user of "a com- puter..
    [Show full text]
  • A Network of Peers: Models Through the History of the Internet 8 Nelson Minar and Marc Hedlund
    Peer to Peer: Harnessing the Power of Disruptive Technologies Andy Oram (editor) First Edition March 2001 ISBN: 0-596-00110-X, 448 pages This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found. The contributors are leading developers of well-known peer-to-peer systems, such as Gnutella, Freenet, Jabber, Popular Power, SETI@Home, Red Rover, Publius, Free Haven, Groove Networks, and Reputation Technologies. Topics include metadata, performance, trust, resource allocation, reputation, security, and gateways between systems. Table of Contents Preface 1 Andy Oram Part I. Context and Overview 1. A Network of Peers: Models Through the History of the Internet 8 Nelson Minar and Marc Hedlund 2. Listening to Napster 19 Clay Shirky 3. Remaking the Peer-to-Peer Meme 29 Tim O'Reilly 4. The Cornucopia of the Commons 41 Dan Bricklin Part II. Projects 5. SETI@home 45 David Anderson 6. Jabber: Conversational Technologies 51 Jeremie Miller 7. Mixmaster Remailers 59 Adam Langley 8. Gnutella 62 Gene Kan 9. Freenet 80 Adam Langley 10. Red Rover 86 Alan Brown 11. Publius 93 Marc Waldman, Lorrie Faith Cranor, and Avi Rubin 12. Free Haven 102 Roger Dingledine, Michael J. Freedman, and David Molnar Table of Contents (cont...) Part III. Technical Topics 13. Metadata 121 Rael Dornfest and Dan Brickley 14. Performance 128 Theodore Hong 15. Trust 153 Marc Waldman, Lorrie Faith Cranor, and Avi Rubin 16. Accountability 171 Roger Dingledine, Michael J. Freedman, and David Molnar 17. Reputation 214 Richard Lethin 18.
    [Show full text]
  • Music on the Internet: Is There an Upside to Downloading?
    S. HRG. 106–1060 MUSIC ON THE INTERNET: IS THERE AN UPSIDE TO DOWNLOADING? HEARING BEFORE THE COMMITTEE ON THE JUDICIARY UNITED STATES SENATE ONE HUNDRED SIXTH CONGRESS SECOND SESSION JULY 11, 2000 Serial No. J–106–96 Printed for the use of the Committee on the Judiciary ( U.S. GOVERNMENT PRINTING OFFICE 74–728 WASHINGTON : 2001 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 VerDate 11-MAY-2000 13:55 Oct 05, 2001 Jkt 074728 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 E:\HR\OC\B728.XXX pfrm07 PsN: B728 COMMITTEE ON THE JUDICIARY ORRIN G. HATCH, Utah, Chairman STROM THURMOND, South Carolina PATRICK J. LEAHY, Vermont CHARLES E. GRASSLEY, Iowa EDWARD M. KENNEDY, Massachusetts ARLEN SPECTER, Pennsylvania JOSEPH R. BIDEN, JR., Delaware JON KYL, Arizona HERBERT KOHL, Wisconsin MIKE DEWINE, Ohio DIANNE FEINSTEIN, California JOHN ASHCROFT, Missouri RUSSELL D. FEINGOLD, Wisconsin SPENCER ABRAHAM, Michigan ROBERT G. TORRICELLI, New Jersey JEFF SESSIONS, Alabama CHARLES E. SCHUMER, New York BOB SMITH, New Hampshire MANUS COONEY, Chief Counsel and Staff Director BRUCE A. COHEN, Minority Chief Counsel (II) VerDate 11-MAY-2000 13:55 Oct 05, 2001 Jkt 074728 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 E:\HR\OC\B728.XXX pfrm07 PsN: B728 C O N T E N T S STATEMENTS OF COMMITTEE MEMBERS Page Hatch, Hon. Orrin G., a U.S. Senator from the State of Utah ...........................
    [Show full text]
  • CI Capitol Hill Bulletin 7/13/00
    THE CALIFORNIA INSTITUTE FOR FEDERAL POLICY RESEARCH 419 New Jersey Avenue, SE, Washington, D.C. 20003 202-546-3700 Fax: 202-546-2390 E-mail:[email protected] Web:http://www.calinst.org California Capitol Hill Bulletin Volume 7, Bulletin 23 -- July 13, 2000 To expand communications between Washington and California, the California Institute provides periodic faxed bulletins regarding current activity on Capitol Hill which directly impacts our state. Bulletins are published weekly during sessions of Congress, and occasionally during other periods. The e-mail edition is made possible in part by in kind donations from Sun Microsystems and IBM Corp. SENATE PASSES EXPORT CONTROL REVIEW AMENDMENT On Wednesday, July 12, the Senate included in the Defense CONTENTS: Authorization bill (S. 2549) an amendment to shorten from 180 days to 60 days the period of time Congress has in which to act on the Senate Passes Export Control Review Amendment ...............1 Administration’s proposed changes to export controls on high performance computers. See, Bulletin Vol. 7, No. 17 (5/18/00). Under the 1998 Senate Subcommittee’s Up Energy & Water Bill Cuts DOE’s High National Defense Authorization Act, after the Administration increases the Energy Physics and Fusion ....1 processing capability (measured in millions of theoretical operations per second or MTOPS) of computers that may be exported, Congress has 180 Judiciary Subcommittee Examines Genome Patents ............2 days to review the change and legislatively preempt it if it chooses. Information technology companies have long argued that the 180 day Supplemental Sent to President ...3 review process is too extensive, given the rapid pace of changes in the Senate Includes Permanent R&D industry and global competition.
    [Show full text]
  • Governance in Namespaces
    Loyola of Los Angeles Law Review Volume 36 Number 3 Symposium: ICANN Governance Article 6 3-1-2003 Governance in Namespaces Stefan Bechtold Follow this and additional works at: https://digitalcommons.lmu.edu/llr Part of the Law Commons Recommended Citation Stefan Bechtold, Governance in Namespaces, 36 Loy. L.A. L. Rev. 1239 (2003). Available at: https://digitalcommons.lmu.edu/llr/vol36/iss3/6 This Symposium is brought to you for free and open access by the Law Reviews at Digital Commons @ Loyola Marymount University and Loyola Law School. It has been accepted for inclusion in Loyola of Los Angeles Law Review by an authorized administrator of Digital Commons@Loyola Marymount University and Loyola Law School. For more information, please contact [email protected]. GOVERNANCE IN NAMESPACES Stefan Bechtold* The assignment of numbers is also handled by Jon. If you are developing a protocol or application that will require the use of a link, socket, port, protocol, or network number please contact Jon to receive a number assignment.' Anyone can assign names. We each do that all the time.2 eBay reserves the right to modify, alter or suspend any User ID at any time (at our sole discretion and without notice)3 for any reason whatsoever. * Research Assistant, University of Tilbingen Law School, Germany; Fellow, 2002-2003, Center for Internet & Society, Stanford Law School; J.S.M., 2002, Stanford Law School; Dr. lur. (J.S.D.), 2001, University of Ttlbingen Law School, Germany; Referendar (J.D.), 1999, University of Tilbingen Law School, Germany. I would like to thank Peter Bechtold, Jonathan Greenberg, Jeff Gould, Brian Hemphill, Kurt Jaeger, Lawrence Lessig, Nelson Minar, Wernhard M.schel, Milton Mueller, Markus MOiler, Tomas Sander, and the participants who attended workshops and seminars at Stanford Law School and the University of Tobingen Law School, Germany, as well as the TPRC 2002 participants for their valuable comments and suggestions.
    [Show full text]