Downloaded in Jan 2004; "How Smartphones Work" Symbian Press and Wiley (2006); "Digerati Gliterati" John Wiley and Sons (2001)

Total Page:16

File Type:pdf, Size:1020Kb

Downloaded in Jan 2004; HOW OPEN SHOULD AN OPEN SYSTEM BE? Essays on Mobile Computing by Kevin J. Boudreau B.A.Sc., University of Waterloo M.A. Economics, University of Toronto Submitted to the Sloan School of Management in partial fulfillment of the requirements for the degree of MASSACHUBMMIBE OF TECHNOLOGY Doctor of Philosophy at the AUG 2 5 2006 MASSACHUSETTS INSTITUTE OF TECHNOLOGY LIBRARIES June 2006 @ 2006 Massachusetts Institute of Technology. All Rights Reserved. The author hereby grn Institute of Technology permission to and to distribute olo whole or in part. 1 Signature ot Author.. Sloan School of Management 3 May 2006 Certified by. .............................. ............................................ Rebecca Henderson Eastman Kodak LFM Professor of Management Thesis Supervisor Certified by ............. ................ .V . .-.. ' . ................ .... ...... Michael Cusumano Sloan Management Review Professor of Management Thesis Supervisor Certified by ................ Marc Rysman Assistant Professor of Economics, Boston University Thesis Supervisor A ccepted by ........................................... •: °/ Birger Wernerfelt J. C. Penney Professor of Management Science and Chair of PhD Committee ARCHIVES HOW OPEN SHOULD AN OPEN SYSTEM BE? Essays on Mobile Computing by Kevin J. Boudreau Submitted to the Sloan School of Management on 3 May 2006, in partial fulfillment of the requirements for the degree of Doctor of Philosophy Abstract "Systems" goods-such as computers, telecom networks, and automobiles-are made up of mul- tiple components. This dissertation comprises three esssays that study the decisions of system innovators in mobile computing to "open" development of their systems to outside suppliers and the implications of doing so. The first essay considers this issue from the perspective of which components are retained under the control of the original innovator to act as a "platform" in the system. Based on detailed review of leading systems in this industry in data spanning 1984-2004, I find that platform boundaries expand and contract over time as a means for platform suppliers to promote the adoption of the platform (by end-customers, downstream manufacturers, and suppliers of complements) and simultaneously to ensure the continuing innovation of the system. The second essay provides a systematic empirical investigation of how the extent of openness chosen by the platform supplier affected the rate of innovation of mobile computing devices. I measure openness in relation to both the boundaries of the platform and the extent to which actions were taken by platform suppliers to promote entry by hardware device manufacturers. I find regular relationships across multiple measures of innovation that suggest that the whether openness increases or decreases innovation depends on the nature of innovation and the intensity of competition between device makers. The third essay moves from device hardware to the applications software developer networks that form around opened platforms. I investigate the effect of platform suppliers' aggressive promotion of entry of software developers around their platforms. I find that while large devel- oper networks are associated with a wide selection of software titles, that very large developer networks in fact lead to less software output. I interpret this result as revealing the importance of maintaining investment incentives-even in a context with network effects. Thesis Supervisor: Rebecca Henderson Title: Eastman Kodak LFM Professor of Management Thesis Supervisor: Michael Cusumano Title: Sloan Management Review Professor of Management Thesis Supervisor: Marc Rysman Title: Assistant Professor of Economics, Boston University Contents Acknowledgments 9 1 Introduction 13 1.1 Open Questions on "Openness" ................... ........ 14 1.2 Dissertation Overview .................. .............. 16 2 The Boundaries of the Platform 21 2.1 Introduction ......... .. ... ........ ... ........ 21 2.2 Are Platform Boundaries Different from Firm Boundaries? . ............ 24 2.2.1 Platform Boundaries and Solving Coordination Problems . ........ 24 2.2.2 Setting Platform Boundaries to Allocate Investment Incentives ...... 26 2.2.3 Platform Boundaries and the "Power" to Regulate Other Suppliers . .. 27 2.2.4 Modular Systems, Specialization and "Best of Breed" Component Suppliers 29 2.2.5 "Opening" a System, Appropriability, and Interactions with Systems Competition .............. .................. 30 2.2.6 Summary .................. ................ 31 2.3 Empirical Context and Data . .................. .. ....... 32 2.4 Psion & Symbian ........ ........ .......... ........ 35 2.4.1 Integrated Development and Quantum Leaps in Design . ......... 37 2.4.2 Integration Extension of the System to New "Layers" ........... 40 2.4.3 Tapered Disintegration & Opening the System . .............. 41 2.4.4 Shared Control over the Platform . .................. .... 45 2.5 Palm ............ ......................... 47 2.5.1 Palm Pre-History: Failures in "Modular" Development .......... 2.5.2 Integrated Early Development-Despite Lack of Experience ......... 2.5.3 Tapered Disintegration & Opening the System ............... 2.5.4 The Separation of Platform from Hardware Businesses ........... 2.6 Microsoft ........................................ 2.6.1 Early Autonomous Innovation on a Small, Standard Operating System . 2.6.2 Failed Attempts to Adapt Existing Technologies to Ambitious Visions . 2.6.3 Integrated Development to Produce a Highly (Overly) Modularized System 2.6.4 Increasing Integration, Tightening Specifications and Increasingly Suc- cessful Products ................................ 2.7 MontaVista's Mobilinux ................................ 2.7.1 Serving Disparate Applications by Porting to Multiple Board-Level Plat- form s ......... ......... .... ... ....... .. 66 2.7.2 A Mobile Computing Platform Created with a Coalition of Specialized Partners ...................... 2.7.3 Creating Forbearance and Coordination Among Interdependent Suppliers 2.8 Discussion .. ... ... .... ... .. .... .... ... 73 2.9 Conclusions ............... .. ...... ... 76 2.10 Appendix . .... ...................... 83 3 The Effect of Openness on Innovation 85 3.1 Introduction ........... .. ........... .. .. .. 85 3.2 Conceptual Framework & Hypotheses Development .. ....... ....... 88 3.2.1 Diversity ....... .... ....... ...... ... 89 3.2.2 Investment Incentives ............... .... ... 89 3.2.3 Coordination and Governance . ......... ..... .... 91 3.3 Competition and Industry Dynamics in Handheld Com puters and Smartphones . 93 3.4 Data Set.............................. .. .. .. 97 3.4.1 Measuring Innovation . ...... ....... .. .... 97 3.4.2 Measuring Openness as Granting Access and Devolving Control .. ... 99 3.4.3 Other Data and Variables . .. .. ...................... .100 3.5 Empirical Strategy and Model ............................ S100 3.5.1 Identification Issues ....... ........ ............ .104 3.6 Analysis and Results . ...... .......... ................ S106 3.6.1 The Response of Low-Coordination Innovations to Openness ...... 106 3.6.2 The Response of High-Coordination Innovations to Openness ...... 110 3.7 Key Underlying Mechanisms ............................ 112 3.8 Summary and Conclusions .......... .................... .118 3.9 Appendix A: Reduced-Form Characterization of Response to Exogenous Changes in Openness .......................... .. ....... .129 3.10 Appendix B: Variables ................................ S131 4 Schumpeterian versus Network Effects in Systems Industries 135 4.1 Introduction ......... ... .. ............ ..... ...... 135 4.2 Why Promote the Entry of Component Suppliers to a System? .... ..... .139 4.3 "Networks" of Applications Software Developers in Mobile Computing ..... .142 4.4 D ata Set . ..... ... .. 147 4.5 Descriptive Analysis ............... ................ .148 4.5.1 An Industry Structure Conducive to Network Effects ........ ... 148 4.5.2 A Large Scope for Discretionary Investment Decisions in Determining Overall Software Selection .......................... 153 4.5.3 Do Larger Developer Networks Produce a Better Selection of Software? . 157 4.6 Discussion and Interpretation: The Role of Incentives in a Network of Comple- mentors ........ .. .. ... ....... .......... .164 4.7 Conclusion ....... ... .. ........ ....... .166 List of Figures 2-1 Trends in Market Size and Shares .......................... 33 2-2 Key Component Distinctions in Mobile Computing Systems . ......... 34 2-3 Vertical Integration Trends of Psion and Symbian ........ ......... 36 2-4 Vertical Integration Trends of Palm ................ .......... 48 2-5 Vertical Integration Trends of Microsoft (in Mobile Computing) ......... 58 2-6 Vertical Integration Trends of Montavista . ........... ......... 67 2-7 List of Interviewees .......... ...... .. ..... .......... 84 3-1 Industry Sales, Product Releases and Market Shares ...... ......... 93 3-2 Innovation of Products in the Leading Systems . ........ ......... 95 3-3 Variable Definitions and Descriptions . .............. .......... 101 3-4 Two Way Correlations Between Main Variables . ........ .......... 102 3-5 Restatement of Hypotheses in Terms of the Empirical Strategy .......... 103 3-6 Low-Coordination Innovations Regressd on Openness, System-Level Data . .. 111 3-7 High Coordination Innovations Regressed on Openness, System-Level Data . 113 3-8 Within-System Entry Regressed on System Openness . ........... ... 115 3-9 Individual Supplier
Recommended publications
  • A Survey on Architectures of Mobile Operating Systems: Challenges and Issues
    International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 3, March 2015, PP 73-76 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org A Survey on Architectures of Mobile Operating Systems: Challenges and Issues Prof. Y. K. Sundara Krishna1 HOD, Dept. of Computer Science, Krishna University Mr. G K Mohan Devarakonda2 Research Scholar, Krishna University Abstract: In the early years of mobile evolution, Discontinued Platforms Current mobile devices are enabled only with voice services Platforms that allow the users to communicate with each other. Symbian OS Android But now a days, the mobile technology undergone Palm OS IOS various changes to a great extent so that the devices Maemo OS Windows Phone allows the users not only to communicate but also to Meego OS Firefox OS attain a variety of services such as video calls, faster Black Berry OS browsing services,2d and 3d games, Camera, 2.1 Symbian OS: This Operating system was Banking Services, GPS services, File sharing developed by NOKIA. services, Tracking Services, M-Commerce and so many. The changes in mobile technology may be due Architecture: to Operating System or Hardware or Network or Memory. This paper presents a survey on evolutions SYMBIAN OS GUI Library in mobile developments especially on mobile operating system Architectures, challenges and Issues in various mobile operating Systems. Application Engines JAVA VM 1. INTRODUCTION Servers (Operating System Services) A Mobile operating system is a System Software that is specifically designed to run on handheld devices Symbian OS Base (File Server, Kernel) such as Mobile Phones, PDA’s.
    [Show full text]
  • Brain Science
    BRAIN SCIENCE with Ginger Campbell, MD Episode #139 Interview with Jeff Hawkins, Author of On Intelligence aired 11/28/17 [music] INTRODUCTION Welcome to Brain Science, the show for everyone who has a brain. I'm your host, Dr. Ginger Campbell, and this is Episode 139. Ever since I launched Brain Science back in 2006, my goal has been to explore how recent discoveries in neuroscience are helping unravel the mystery of how our brains make us human. I'm really excited about today's interview because, in some ways, it takes us back to the beginning. My guest today is Jeff Hawkins, author of On Intelligence, and founder of Numenta, a company that is dedicated to discovering how the human cortex works. Jeff's book actually inspired the first Brain Science podcast, and I interviewed him way back in Episode 38. Today he gives us an update on the last 15 years of his research. As always, episode show notes and transcripts are available at brainsciencepodcast.com. You can send me feedback at [email protected] or audio feedback via SpeakPipe at speakpipe.com/docartemis. I will be back after the interview to review the key !1 ideas and to share a few brief announcements, including a look forward to next month's episode. [music] INTERVIEW Dr. Campbell: Jeff, it is great to have you back on Brain Science. Mr. Hawkins: It's great to be back, Ginger. I always enjoy talking to you. Dr. Campbell: It's actually been over nine years since we last talked, so I thought we would start by asking you to just give my audience a little bit of background, and I'd like you to start by telling us just a little about your career before Numenta.
    [Show full text]
  • Tucker14.Pdf
    1 CONTENTS Title Page Copyright Dedication Introduction CHAPTER 1 Namazu the Earth Shaker CHAPTER 2 The Signal from Within CHAPTER 3 #sick CHAPTER 4 Fixing the Weather CHAPTER 5 Unities of Time and Space CHAPTER 6 The Spirit of the New CHAPTER 7 Relearning How to Learn CHAPTER 8 When Your Phone Says You’re in Love CHAPTER 9 Crime Prediction: The Where and the When CHAPTER 10 Crime: Predicting the Who CHAPTER 11 The World That Anticipates Your Every Move Acknowledgments Notes Index 2 INTRODUCTION IMAGINE waking up tomorrow to discover your new top-of-the-line smartphone, the device you use to coordinate all your calls and appointments, has sent you a text. It reads: Today is Monday and you are probably going to work. So have a great day at work today!—Sincerely, Phone. Would you be alarmed? Perhaps at first. But there would be no mystery where the data came from. It’s mostly information that you know you’ve given to your phone. Now consider how you would feel if you woke up tomorrow and your new phone predicted a much more seemingly random occurrence: Good morning! Today, as you leave work, you will run into your old girlfriend Vanessa (you dated her eleven years ago), and she is going to tell you that she is getting married. Do try to act surprised! What conclusion could you draw from this but that someone has been stalking your Facebook profile and knows you have an old girlfriend named Vanessa? And that this someone has probably been stalking her profile as well and spotted her engagement announcement.
    [Show full text]
  • Palm Security WP.Qxd
    Palm® Mobility Series: Security Smartphone and handheld security for mobile business. Mobile computing: Opportunities and risk By providing professionals with convenient mobile access to email, business applications, customer information and critical corporate data, businesses can become more productive, streamline business processes and enable better decision making. With the new ease of access to information comes a responsibility to protect the organization's data as well as the investment in mobile devices. In many ways, security risks for mobile computing are similar to those for other computing platforms. There are the usual concerns of protecting data, authenticating users, and shielding against viruses and other malicious Contents code. But because of their mobility and compact size, smartphones and handhelds present some additional challenges: Mobile computing: Opportunities and risk...................................................... 1 Know thy enemy: Security risks...................................................................... 2 • Smartphones and handhelds are more easily lost or stolen than Theft and loss ............................................................................................ 2 laptop or desktop computers. Password cracking .................................................................................... 2 Data interception ...................................................................................... 2 • Users often treat smartphones and handhelds as personal devices Malicious code
    [Show full text]
  • Programmability Configuration Guide, Cisco IOS XE Bengaluru 17.6.X
    Programmability Configuration Guide, Cisco IOS XE Bengaluru 17.6.x First Published: 2021-07-31 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Are We There Yet? }} 27 | INDEX Acer Recommends Windows 8
    thejournal.com April 2014 • Volume 41, No. 4 TRANSFORMING EDUCATION THROUGH IN THIS ISSUE TECHNOLOGY 9 | MAKERS IN CLASS A hands-on approach engages students, JOURNAL but how does project-based learning connect with standardized testing? 12 | ADAPTIVE LEARNING A tantalizing ed tech buzzword is moving closer to becoming a classroom reality. 17 | DIGITAL CITIZENSHIP The Digital Driver’s License is helping students prove that they can navigate the dangers of the Internet. 20 | HARDWARE CHOICES Despite the growth of mobile learning, desktops still play five important roles in the 21st century classroom. 23 | SPREADING STEM Private and public sector groups are joining the effort to steer students toward tech education and careers. DEPARTMENTS 3 | OUR SPACE Common Core’s numbers game Adaptive 4 | HERE & NOW Good news from PISA scores Learning: 7 | PRODUCT ROUNDUP New projectors and more 8 | INNOVATOR Joe Mazza, connected educator Are We There Yet? }} 27 | INDEX Acer recommends Windows 8. Explore More Sleeping Beauty. Beautiful and serene in appearance, Mount Fuji is actually considered an active volcano, last erupting in the early 1700s. Some apps sold separately; vary by market. Make learning possible everywhere. Give your students the Iconia W510 and the world becomes their classroom. It’s modern technology that’s nimble, powerful and easy to use. And with Educare, you’ll have peace of mind knowing Acer will be there for you with dedicated service you can depend on for years to come. www.exploremorewithacer.com ©2014. All rights reserved. Acer America Corporation. Information and prices are subject to change without notice. Acer and Iconia Tab are registered trademarks of Acer Inc.
    [Show full text]
  • Smartphones: Ask 4 Questions Before You Buy
    Vol. 5, No. 4 / April 2006 Smartphones: Ask 4 questions before you buy PDA/cell phone combinations let you surf the Internet, plan your schedule, and more. Which models are right for your practice? Richard A. Montgomery, MD Private practice, Sage Health Care, Boise, ID ‘Smartphones,’ hybrid cell phones and personal digital assistants (PDAs), are increasingly helping psychiatrists stay in touch on the road or manage multi-site practices. This article reviews the capabilities of most smartphone models (Table) and offers practical advice to help you choose the right device for your practice. WHAT YOU CAN DO WITH A SMARTPHONE Make phone calls. Most smartphones integrate high-end wireless phone features such as selective call screening, Bluetooth wireless device compatibility, moderate-resolution cameras, and voice recognition for hands-free dialing. Call quality varies by device but is generally above average as cell phones go. Smartphones cost between $100 and $500 depending on model (the more cutting-edge the smartphone, the higher the price) and whether a service activation discount is offered. A service provider’s area and coverage uniformity usually affects call quality. Some service plans include data service (ie, e-mail) with phone service, whereas others charge an extra monthly fee depending on volume of data to be transmitted. Send and receive e-mail. Smartphones include fully featured e-mail clients. While away from the office, you can save immeasurable time communicating with staff and colleagues via text instead of paging and waiting for callbacks. “Pop-ups” let you quickly view and respond to e-mails without disrupting workflow.
    [Show full text]
  • Linux Journal | January 2016 | Issue
    ™ AUTOMATE Full Disk Encryption Since 1994: The Original Magazine of the Linux Community JANUARY 2016 | ISSUE 261 | www.linuxjournal.com IMPROVE + Enhance File Transfer Client-Side Performance Security for Users Making Sense of Profiles and RC Scripts ABINIT for Computational Chemistry Research Leveraging Ad Blocking WATCH: ISSUE Audit Serial OVERVIEW Console Access V LJ261-January2016.indd 1 12/17/15 8:35 PM Improve Finding Your Business Way: Mapping Processes with Your Network Practical books an Enterprise to Improve Job Scheduler Manageability for the most technical Author: Author: Mike Diehl Bill Childers Sponsor: Sponsor: people on the planet. Skybot InterMapper DIY Combating Commerce Site Infrastructure Sprawl Author: Reuven M. Lerner Author: GEEK GUIDES Sponsor: GeoTrust Bill Childers Sponsor: Puppet Labs Get in the Take Control Fast Lane of Growing with NVMe Redis NoSQL Author: Server Clusters Mike Diehl Author: Sponsor: Reuven M. Lerner Silicon Mechanics Sponsor: IBM & Intel Download books for free with a Linux in Apache Web simple one-time registration. the Time Servers and of Malware SSL Encryption Author: Author: http://geekguide.linuxjournal.com Federico Kereki Reuven M. Lerner Sponsor: Sponsor: GeoTrust Bit9 + Carbon Black LJ261-January2016.indd 2 12/17/15 8:35 PM Improve Finding Your Business Way: Mapping Processes with Your Network Practical books an Enterprise to Improve Job Scheduler Manageability for the most technical Author: Author: Mike Diehl Bill Childers Sponsor: Sponsor: people on the planet. Skybot InterMapper DIY Combating Commerce Site Infrastructure Sprawl Author: Reuven M. Lerner Author: GEEK GUIDES Sponsor: GeoTrust Bill Childers Sponsor: Puppet Labs Get in the Take Control Fast Lane of Growing with NVMe Redis NoSQL Author: Server Clusters Mike Diehl Author: Sponsor: Reuven M.
    [Show full text]
  • Compusa Macintosh Products Guide Winter 1992.Pdf
    Over 800 Macintosh l1t·oducts at Super Everyday Low Prices! How To Load An Apple Macintosh LC II. GreatWorks Eight full-featured At CompUSA, getting the perfect Apple® applications in one easy-to-use program. Macintosh®comp uter, configured just Word processing, data­ base, spreadsheet, illus­ the way you want is just this easy! tration and more. Everything you need to build the perfect system is right within #220)14 your reach. And of course, our friendly, knowledgeable staffers are always close by to help you load up not onlyyo ur cart, but your new computer, too! Appte• Macintosh• 12" RGB Monitor Apple's lowest cost display. Bright, vibrant colors on a high-contrast screen . .28 mm dot pitch. #9002 14 It just doesn't get any easier than this. In fact, we make • 16MHz030 it easy to load a full line of Apple• Macintosh• Processor Apple Macintosh computers, LC 4/40 Computer • 4MBRA'-.i peripherals, accessories and TI1e most affordable • 40 MB Hard Drive software . Over 800 different Madntosh color system • 1.4 MB Apple Mac• products in all! And of features a slender, modular SuperDrive· course, they're all priced design so it's easy to set up • 1 Video, 2 Serial Ports Authorized Dealer super low every day. So load and easy to use. Exce ll ent choice for business or education. • Keyboard #WJ24·1 some today. At CompUSA! Apple, the Apple logo, Mac, and ~1 a cimosh are registcrt>d tradcmarlc; of Apple Computer, In c. Quadra and SuperDrive arc trmlemarlc; of Apple Computer, Inc. A range of desktop mtd notebook contputers for business, hotne mul educati ,..~ Macintosh PCs ..................
    [Show full text]
  • In the United States District Court for the Eastern District of Texas Tyler Division
    Case 6:10-cv-00329-LED Document 485 Filed 08/09/11 Page 1 of 41 PageID #: 3621 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS TYLER DIVISION ADJUSTACAM LLC PLAINTIFF, v. Civil Action No. 6:10-cv-329-LED AMAZON.COM, INC.; AUDITEK CORPORATION; BALTIC LATVIAN UNIVERSAL ELECTRONICS, LLC D/B/A BLUE MICROPHONES, LLC D/B/A BLUE MICROPHONE; BEST BUY CO., INC. D/B/A BEST BUY D/B/A ROCKETFISH; BEST BUY STORES, LP; BESTBUY.COM, LLC; BLUE MICROPHONES, LLC; CDW CORPORATION F/K/A CDW COMPUTER CENTERS, INC.; CDW, INC.; COMPUSA.COM, INC.; CREATIVE LABS, INC.; DELL, INC.; DIGITAL INNOVATIONS, LLC; FRY’S ELECTRONICS, INC.; GEAR HEAD, LLC; HEWLETT-PACKARD COMPANY; J&R ELECTRONICS, INC. D/B/A J&R; KOHL'S CORPORATION D/B/A KOHL'S; KOHL'S ILLINOIS, INC.; LIFEWORKS TECHNOLOGY GROUP, LLC; MACALLY PERIPHERALS, INC. D/B/A MACALLY U.S.A; MACE GROUP, INC.; MICRO ELECTRONICS, INC. D/B/A MICRO CENTER; NEW COMPUSA CORPORATION; NEWEGG, INC.; NEWEGG.COM, INC.; OFFICE DEPOT, INC.; OVERSTOCK.COM, INC.; RADIOSHACK CORPORATION; Case 6:10-cv-00329-LED Document 485 Filed 08/09/11 Page 2 of 41 PageID #: 3622 ROSEWILL INC.; SAKAR INTERNATIONAL, INC.; SYSTEMAX, INC. D/B/A COMPUSA; TARGET CORP.; TIGERDIRECT, INC.; AND WAL-MART STORES, INC. DEFENDANTS. JURY TRIAL DEMANDED THIRD AMENDED COMPLAINT FOR PATENT INFRINGEMENT Plaintiff AdjustaCam LLC files this Third Amended Complaint against the foregoing Defendants, namely AMAZON.COM, INC.; AUDITEK CORPORATION; BALTIC LATVIAN UNIVERSAL ELECTRONICS, LLC D/B/A BLUE MICROPHONES, LLC D/B/A BLUE MICROPHONE; BEST BUY CO., INC.
    [Show full text]
  • Transcript of Rick Rashid's Keynote Address
    TechFest 2013 Keynote Rick Rashid March 5, 2013 ANNOUNCER: Ladies and gentlemen, please welcome Microsoft Chief Research Officer, Rick Rashid. (Applause.) RICK RASHID: Hi there. Well, hopefully this will be a very fun day for all of you. For me, it's interesting. It feels like we've been doing TechFest for a really, long time, but it's actually only been since 2001. So, technically, I think, this is the 13th TechFest event for Microsoft Research. Of course, in the first TechFest, it wasn't nearly as big an event as this. It was just for employees. We didn't take up nearly as much space. And we didn't even know how many people would really show up. I was actually one of the strongest skeptics about this whole idea of creating this technology show for our employees, because I wasn't really sure how many people would show up. I kept saying, “Well, gosh, it seems like it's going to be a lot of work, and I'm not sure it's going to be really valuable and worthwhile, but if you guys really think you want to do it, okay.” Of course, what happened that year was we had, I think, about 4,000 of our Puget Sound employees come over a two-day period. And of course Microsoft was a much smaller company back then, so that was just a huge fraction of our Puget Sound workforce at that time. And everybody was really excited. I mean, the researchers came away from the event really excited about being able to talk to so many of our employees, be able to interact with them, and to sort of sell their ideas, and show off what they've been doing.
    [Show full text]
  • Microsoft Plays Hardball: Use of Exclusionary Pricing and Technical
    Antitrust Bulletin, XL:2, Summer 1995, 265-315 MICROSOFT PLAYS HARDBALL: The Use of Exclusionary Pricing and Technical Incompatibility to Maintain Monopoly Power in Markets for Operating System Software† by KENNETH C. BASEMAN* FREDERICK R. WARREN-BOULTON* and GLENN A. WOROCH** May 1995 ___________________ * Principals, MiCRA: Microeconomic Consulting and Research Associates, Inc., Washington, DC. ** University of California, Berkeley. † Forthcoming, Antitrust Bulletin, June 1995. We would like to express our appreciation for helpful comments and other assistance to Sturge Sobin, Linnet Harlan, Paul Dennis and the participants at the Columbia Business School's Institute for Tele-Information's Seminar on Sustaining Competition in Network Industries through Regulating and Pricing Access, especially Janusz Ordover and Bobby Willig. TABLE OF CONTENTS I. INTRODUCTION AND SUMMARY ................................... 1 II. BACKGROUND .................................................... 3 A. THE MARKET FOR PERSONAL COMPUTER OPERATING SYSTEMS ............................................................ 3 TABLE: NEW SHIPMENTS OF PERSONAL COMPUTER OPERATING SYSTEMS .............................................. 8 B. MICROSOFT'S PRACTICES ..................................... 9 III. FIRST-DEGREE PRICE DISCRIMINATION vs. INEFFICIENT SUBSTITUTION ................................................... 15 A. FIRST-DEGREE PRICE DISCRIMINATION ........................ 16 B. INEFFICIENT SUBSTITUTION ................................. 20 IV. ANTIFRAUD AND ANTIPIRACY
    [Show full text]