Accelerating Energy Innovation: Insights from Multiple Sectors

Total Page:16

File Type:pdf, Size:1020Kb

Accelerating Energy Innovation: Insights from Multiple Sectors This PDF is a selection from a published volume from the National Bureau of Economic Research Volume Title: Accelerating Energy Innovation: Insights from Multiple Sectors Volume Author/Editor: Rebecca M. Henderson and Richard G. Newell, editors Volume Publisher: University of Chicago Press Volume ISBN: 0-226-32683-7 ISBN13: 978-0-226-32683-2 Volume URL: http://www.nber.org/books/hend09-1 Conference Date: April 3, 2009 Publication Date: May 2011 Chapter Title: Nurturing the Accumulation of Innovations: Lessons from the Internet Chapter Authors: Shane Greenstein Chapter URL: http://www.nber.org/chapters/c11755 Chapter pages in book: (189 - 223) 6 Nurturing the Accumulation of Innovations Lessons from the Internet Shane Greenstein As the Internet diffused throughout the 1990s, it touched a wide breadth of economic activities. The diffusion transformed the use of information tech- nology throughout the economy. It led to improvements in products, lower prices, the development of new capabilities, and the development of many innovations that enabled productivity improvements among business users. It diffused to the majority of homes and businesses, altering the way people shop, research, play, and relate socially. The Internet began as a government sponsored operation in the 1970s and 1980s and grew into a commercial industry in the 1990s. At fi rst, the Internet lacked market- oriented focusing devices or economic inducement mechanisms typically associated with directing efforts toward the most valu- able innovative outcomes.1 There were contracts for carrier services between government buyers and commercial suppliers, for example, but no general market orientation toward the pricing of the exchange of traffic between car- riers. There also were a few providers of Internet equipment for government users but no waves of inventive entrepreneurial entry. There were managers who understood the specifi c needs of their niche user communities but no Shane Greenstein is the Elinor and Wendell Hobbs Professor of Management and Strategy at the Kellogg School of Management, Northwestern University, and a research associate of the National Bureau of Economic Research. I thank Guy Arie, Tim Bresnahan, David Clark, David Crocker, Rebecca Henderson, Franco Malerba, Richard Newell, Bonnie Nevel, John Quarterman, Craig Partridge, Richard Schmalensee, Alicia Shems, Scott Stern, and Stephen Wolff for extraordinarily useful con- versations and comments. This chapter is part of a larger project funded by the Kaufman Foundation, the Searle Center at Northwestern University, and the dean’s office at the Kellogg School of Management at Northwestern. I am grateful for the funding. I am responsible for all remaining errors. 1. For more on focusing devices in general, see, for example, Rosenberg (1977). 189 190 Shane Greenstein possibility for tailoring new products and services to every potential new set of users. How could an institutional setting that lacked market- orientation yield a set of innovations that supported the creation of massive market value only a few years later? This chapter helps explain the progression. The chapter divides the Internet’s development into a precommercial and commercial era. The precommercial period encompasses the 1970s and 1980s and some of the early 1990s, when the government controlled the research and devel- opment of the Internet and its components. The commercial period, which arose after the government opened control of the network to commercial interests, encompasses the mid- 1990s and onward to present day. These two eras illustrate two distinct models for accumulating innovations over the long haul. The precommercial era illustrates the operation of sev- eral useful nonmarket institutional arrangements. It also illustrates a poten- tial drawback to government sponsorship—in this instance, truncation of exploratory activity. The commercial era illustrates a rather different set of lessons. It highlights the extraordinary power of market- oriented and widely distributed investment and adoption, which illustrates the power of market experimentation to foster innovative activity. It also illustrates a few of the conditions necessary to unleash value creation from such accumulated les- sons, such as standards development and competition, and nurturing legal and regulatory policies. 6.1 The Precommercial Internet under DARPA It may be tempting to compare the Internet to historically archetypical big inventions sponsored by government, such as the Manhattan and the Apollo projects.2 However, these archetypes for developing technical breakthroughs are not good models for understanding what happened during the creation of the Internet. The Internet was not a single urgent project in a single lab devoted to engineering a single object. In fact, the early development of the Internet is rather less exciting than commonly assumed. The Internet began as a government- sponsored project with a restricted set of users and uses. It occurred at a time when theory pointed in a few promising directions, but nobody, not even the experts, knew where imple- mentation would lead. The project involved a vastly dispersed set of techni- cally adept participants with a shared interest in the project but otherwise heterogeneous needs and outlooks. The Internet developed slowly, and through a rather mundane process, accumulating capabilities over time from a vast number of contributors. The Internet’s early development fi t into an archetype called “collec- tive invention.” Collective invention is “a process in which improvements 2. Much of the material in this fi rst section summarizes Greenstein (2010a). Nurturing the Accumulation of Innovations 191 or experimental fi ndings about a production process or tool are regularly shared.”3 There was no single user who demanded a technology such as the Internet, nor any single inventor for it. Rather, fi ve partially overlap- ping groups played a role in shaping attributes that each valued, with an accumulation of innovative contributions over time. The fi rst two groups were the primary decision makers at funding agencies: the Department of Defense (DOD) and the National Science Foundation (NSF). The other three were programmers/ inventors, administrators, and application users. Many were funded by the government agencies and given considerable dis- cretion. Others became participants over time and added their own contri- butions within their own budgetary limitations. The U.S. military budget served as the fi rst source of funds for the precom- mercial Internet, while the NSF largely served as the source of funds from 1986 to the end of government involvement in 1995. At a very basic level, the U.S. government paid for much of the research and development (R&D) of the Internet during this period, and the government was the organization behind the early “demand” for the breakthrough technical achievements that became recognized as the Internet. This effort did not begin like a military procurement project, as if the Internet were a military rocket procured from several suppliers. In such a procurement process, a group of expert U.S. military personnel consider and deliberate at great length with great foresight about the needs of the gov- ernment, and then they issue a set of specifi cations for a product or service with a predetermined set of attributes. However, in the case of the Internet, the DOD’s Department of Advanced Research Projects Agency (DARPA) funded the core research and development work that led to the Internet— indeed, this work was but one of many DARPA projects on the frontiers of computer science.4 The project fi rst intended to build prototypes for a packet- switching data- communications network of networks, which pushed the boundaries of computing at the time. Both “packet- switching” and “a network of networks” were budding theoretic concepts. The Department of Advanced Research Project Agency’s administrators wanted innovations in the form of ideas, new designs, and new software. The administrators also desired all of these innovations be portable to military operations in the long run, as required under the Mansfi eld Amendment (stipulating that DOD funding be relevant to military’s mission). While the demand for these innovative solutions was quite general, the specifi cs were undetermined. The U.S. military faced issues with its own computing facilities and operations 3. See Allen (1983) for the introduction and illustration of the concept. The quote is from Meyer (2003, 4), who provides further extensions to modern examples. 4. This organization was originally founded as the Advanced Research Projects Agency (ARPA) and became DARPA in 1972. For the sake of simplicity, I use only the name DARPA throughout this chapter. See Norberg, O’Neill, and Freedman (1996) and Roland and Shiman (2002). 192 Shane Greenstein that justifi ed the R&D expense, even though its own managers could not concretely describe the object that would result.5 The military sought a robust design for a communications network, and its potential value was self- evident. Keeping communications functioning in spite of a blown/ cut line, for example, has military value in hostile battlefi eld conditions. Packet switching held the promise to achieve this attribute by allowing data to fl ow along multiple paths, unlike a circuit- switched tele- phone network in which calls follow a preset path programmed into central office telephone switches. In principle, an inexpensive packet switching net- work could also cover vast geographic
Recommended publications
  • TR-SBA-Research-0512-01: Fast and Efficient Browser Identification With
    Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting Technical Report TR-SBA-Research-0512-01 Martin Mulazzani∗, Philipp Reschl; Markus Huber∗, Manuel Leithner∗, Edgar Weippl∗ *SBA Research Favoritenstrasse 16 AT-1040 Vienna, Austria [email protected] Abstract. While web browsers are becoming more and more important in everyday life, the reliable detection of whether a client is using a specific browser is still a hard problem. So far, the UserAgent string is used, which is a self-reported string provided by the client. It is, however, not a security feature, and can be changed arbitrarily. In this paper, we propose a new method for identifying Web browsers, based on the underlying Javascript engine. We set up a Javascript confor- mance test and calculate a fingerprint that can reliably identify a given browser, and can be executed on the client within a fraction of a sec- ond. Our method is three orders of magnitude faster than previous work on browser fingerprinting, and can be implemented in just a few hun- dred lines of Javascript. Furthermore, we collected data for more than 150 browser and operating system combinations, and present algorithms to calculate minimal fingerprints for each of a given set of browsers to make fingerprinting as fast as possible. We evaluate the feasibility of our method with a survey and discuss the consequences for user privacy and security. This technique can be used to enhance state-of-the-art session management (with or without SSL), as it can make session hijacking considerably more difficult. 1 Introduction Today, the Web browser is a central component of almost every operating sys- tem.
    [Show full text]
  • The Artist's Emergent Journey the Metaphysics of Henri Bergson, and Also Those by Eric Voegelin Against Gnosticism2
    Vol 1 No 2 (Autumn 2020) Online: jps.library.utoronto.ca/index.php/nexj Visit our WebBlog: newexplorations.net The Artist’s Emergent Journey Clinton Ignatov—The McLuhan Institute—[email protected] To examine computers as a medium in the style of Marshall McLuhan, we must understand the origins of his own perceptions on the nature of media and his deep-seated religious impetus for their development. First we will uncover McLuhan’s reasoning in his description of the artist and the occult origins of his categories of hot and cool media. This will prepare us to recognize these categories when they are reformulated by cyberneticist Norbert Wiener and ethnographer Sherry Turkle. Then, as we consider the roles “black boxes” play in contemporary art and theory, many ways of bringing McLuhan’s insights on space perception and the role of the artist up to date for the work of defining and explaining cyberspace will be demonstrated. Through this work the paradoxical morality of McLuhan’s decision to not make moral value judgments will have been made clear. Introduction In order to bring Marshall McLuhan into the 21st century it is insufficient to retrieve his public persona. This particular character, performed in the ‘60s and ‘70s on the global theater’s world stage, was tailored to the audiences of its time. For our purposes today, we’ve no option but an audacious attempt to retrieve, as best we can, the whole man. To these ends, while examining the media of our time, we will strive to delicately reconstruct the human-scale McLuhan from what has been left in both his public and private written corpus.
    [Show full text]
  • Instrumentalizing the Sources of Attraction. How Russia Undermines Its Own Soft Power
    INSTRUMENTALIZING THE SOURCES OF ATTRACTION. HOW RUSSIA UNDERMINES ITS OWN SOFT POWER By Vasile Rotaru Abstract The 2011-2013 domestic protests and the 2013-2015 Ukraine crisis have brought to the Russian politics forefront an increasing preoccupation for the soft power. The concept started to be used in official discourses and documents and a series of measures have been taken both to avoid the ‘dangers’ of and to streamline Russia’s soft power. This dichotomous approach towards the ‘power of attraction’ have revealed the differences of perception of the soft power by Russian officials and the Western counterparts. The present paper will analyse Russia’s efforts to control and to instrumentalize the sources of soft power, trying to assess the effectiveness of such an approach. Keywords: Russian soft power, Russian foreign policy, public diplomacy, Russian mass media, Russian internet Introduction The use of term soft power is relatively new in the Russian political circles, however, it has become recently increasingly popular among the Russian analysts, policy makers and politicians. The term per se was used for the first time in Russian political discourse in February 2012 by Vladimir Putin. In the presidential election campaign, the then candidate Putin drew attention to the fact that soft power – “a set of tools and methods to achieve foreign policy goals without the use of arms but by exerting information and other levers of influence” is used frequently by “big countries, international blocks or corporations” “to develop and provoke extremist, separatist and nationalistic attitudes, to manipulate the public and to directly interfere in the domestic policy of sovereign countries” (Putin 2012).
    [Show full text]
  • Background Setup
    1.5.09 [email protected] Mechanical Turk/Browser Ballot Findings Background To compliment the testing and research done by Critical and Patrick Finch in Europe, I conducted a series of tests on Amazon’s Mechanical Turk to try out various aspects of the EC's Ballot design. The goal is to determine both how to design the ballot in the most neutral way possible, and for Mozilla to determine the most successful summary and image for the Firefox section of the ballot. I used MT because it’s a very fast and cheap way to get a design in front of many eyes. And the responses that came back were very good; users spent an average of 2.8 minutes on a five- minute test, and gave complete answers to free-form questions. A few drawbacks of the test were: • Users tended to be more highly-technical than average • Users tended to have heard of Firefox and already have a favorable opinion about it • MT did not provide a way to filter results by country, and many users were in North America as a result Because of the above problems, the MT tests are not the best sample of users that are similar to those seeing the ballot in Europe. However, their answers still provided some insight into why people use what browsers, what factors would make them switch, and what presentations of Firefox’s brand and motto would be most compelling. Setup The MT tests were given in three phases. In all of these test, various demographics questions such as what browser the user was running and where they live were asked.
    [Show full text]
  • HOLT Earth Science
    HOLT Earth Science Directed Reading Name Class Date Skills Worksheet Directed Reading Section: What Is Earth Science? 1. For thousands of years, people have looked at the world and wondered what shaped it. 2. How did cultures throughout history attempt to explain events such as vol- cano eruptions, earthquakes, and eclipses? 3. How does modern science attempt to understand Earth and its changing landscape? THE SCIENTIFIC STUDY OF EARTH ______ 4. Scientists in China began keeping records of earthquakes as early as a. 200 BCE. b. 480 BCE. c. 780 BCE. d. 1780 BCE. ______ 5. What kind of catalog did the ancient Greeks compile? a. a catalog of rocks and minerals b. a catalog of stars in the universe c. a catalog of gods and goddesses d. a catalog of fashion ______ 6. What did the Maya track in ancient times? a. the tides b. the movement of people and animals c. changes in rocks and minerals d. the movements of the sun, moon, and planets ______ 7. Based on their observations, the Maya created a. jewelry. b. calendars. c. books. d. pyramids. Copyright © by Holt, Rinehart and Winston. All rights reserved. Holt Earth Science 7 Introduction to Earth Science Name Class Date Directed Reading continued ______ 8. For a long time, scientific discoveries were limited to a. observations of phenomena that could be made with the help of scientific instruments. b. observations of phenomena that could not be seen, only imagined. c. myths and legends surrounding phenomena. d. observations of phenomena that could be seen with the unaided eye.
    [Show full text]
  • NREL Has Learned Over the Past 20 Years About Variouwcommunity-Based Learning Programs
    DOCUMENT RESUME ED 397 476 EA 027 711 TITLE School Improvemént Research Series: Series X, 1995-96. INSTITUTION Northwest Regional Educational Lab., Portland, Oreg. SPONS AGENCY Office of Educational Research and Improvement (ED), Washington, DC. PUB DATE 96 CONTRACT RP91002001 NOTE 103p. AVAILABLE FROMNorthwest Regional Educational Laboratory, 101 S.W. Main Street, Suite 500, Portland, OR 97204. PUB TYPE Collected Works General (020) -- Information Analyses (070) EDRS PRICE MF01/PC05 Plus Postage. DESCRIPTORS Academic Achievement; *Change Strategies; Citizenship Education; Cooperative Education; *Educational Improvement; Elementary Secondary Education; *Excellence in Education; *Experiential Learning; Integrated Services; Learning Experience; Learning Strategies; Organizational Climate; School Size ABSTRACT This packet contains seven research briefs in the Northwest Regional Educational Laboratory's (NWREL's) "School Improvement Research Series" for 1995-96. Topical Synthesis #8, "Community-Based Learning: A Foundation for Meaningful Educational Reform" (Thomas R. Owens and Changhua Wang) summarizes les..ons that NREL has learned over the past 20 years about variouwcommunity-based learning programs. Close-Up #19, "Educating for Citizenship" (Kathleen Cotton), describes issues concerning the content and processes of civic education. Close-Up #20, "School Size, School Climate, and Student Performance" (Kathleen Cotton), reviews research literature that examined the relationships among school size, school climate, and student performance. Snapshot 1/37, "Providing Integrated Services in an Inner-City School" (Joan Shaughnessy), relates how a small innAr-city public elementary school--the Family Academy, New York, New York--designed an approach that successfully integrated social services with academic learning. Snapshot #38, "Integrating Middle School Curriculum around Real-World Issues" (James W. Kushman) describes how Waldo Middle School in Salem, Oregon, integrated middle-school curriculum around real-world issues.
    [Show full text]
  • Computational Propaganda in Russia: the Origins of Digital Misinformation
    Working Paper No. 2017.3 Computational Propaganda in Russia: The Origins of Digital Misinformation Sergey Sanovich, New York University 1 Table of Contents Abstract ............................................................................................................................................................... 3 Introduction.......................................................................................................................................................... 3 Domestic Origins of Russian Foreign Digital Propaganda ......................................................................... 5 Identifying Russian Bots on Twitter .............................................................................................................. 13 Conclusion ......................................................................................................................................................... 15 Author Acknowledgements ............................................................................................................................ 17 About the Author ............................................................................................................................................. 17 References ........................................................................................................................................................ 18 Citation ............................................................................................................................................................
    [Show full text]
  • Webkit and Blink: Open Development Powering the HTML5 Revolution
    WebKit and Blink: Open Development Powering the HTML5 Revolution Juan J. Sánchez LinuxCon 2013, New Orleans Myself, Igalia and WebKit Co-founder, member of the WebKit/Blink/Browsers team Igalia is an open source consultancy founded in 2001 Igalia is Top 5 contributor to upstream WebKit/Blink Working with many industry actors: tablets, phones, smart tv, set-top boxes, IVI and home automation. WebKit and Blink Juan J. Sánchez Outline The WebKit technology: goals, features, architecture, code structure, ports, webkit2, ongoing work The WebKit community: contributors, committers, reviewers, tools, events How to contribute to WebKit: bugfixing, features, new ports Blink: history, motivations for the fork, differences, status and impact in the WebKit community WebKit and Blink Juan J. Sánchez WebKit: The technology WebKit and Blink Juan J. Sánchez The WebKit project Web rendering engine (HTML, JavaScript, CSS...) The engine is the product Started as a fork of KHTML and KJS in 2001 Open Source since 2005 Among other things, it’s useful for: Web browsers Using web technologies for UI development WebKit and Blink Juan J. Sánchez Goals of the project Web Content Engine: HTML, CSS, JavaScript, DOM Open Source: BSD-style and LGPL licenses Compatibility: regression testing Standards Compliance Stability Performance Security Portability: desktop, mobile, embedded... Usability Hackability WebKit and Blink Juan J. Sánchez Goals of the project NON-goals: “It’s an engine, not a browser” “It’s an engineering project not a science project” “It’s not a bundle of maximally general and reusable code” “It’s not the solution to every problem” http://www.webkit.org/projects/goals.html WebKit and Blink Juan J.
    [Show full text]
  • WORLD WAR C : Understanding Nation-State Motives Behind Today’S Advanced Cyber Attacks
    REPORT WORLD WAR C : Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks Authors: Kenneth Geers, Darien Kindlund, Ned Moran, Rob Rachwald SECURITY REIMAGINED World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks CONTENTS Executive Summary ............................................................................................................................................................................................................................................................................................................... 3 Introduction ............................................................................................................................................................................................................................................................................................................................................... 4 A Word of Warning ................................................................................................................................................................................................................................................................................................................. 5 The FireEye Perspective ...........................................................................................................................................................................................................................................................................................
    [Show full text]
  • Your Post Has Been Removed
    Frederik Stjernfelt & Anne Mette Lauritzen YOUR POST HAS BEEN REMOVED Tech Giants and Freedom of Speech Your Post has been Removed Frederik Stjernfelt Anne Mette Lauritzen Your Post has been Removed Tech Giants and Freedom of Speech Frederik Stjernfelt Anne Mette Lauritzen Humanomics Center, Center for Information and Communication/AAU Bubble Studies Aalborg University University of Copenhagen Copenhagen København S, København SV, København, Denmark København, Denmark ISBN 978-3-030-25967-9 ISBN 978-3-030-25968-6 (eBook) https://doi.org/10.1007/978-3-030-25968-6 © The Editor(s) (if applicable) and The Author(s) 2020. This book is an open access publication. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/ by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the book’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permit- ted use, you will need to obtain permission directly from the copyright holder. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
    [Show full text]
  • Webkit and Blink: Bridging the Gap Between the Kernel and the HTML5 Revolution
    WebKit and Blink: Bridging the Gap Between the Kernel and the HTML5 Revolution Juan J. Sánchez LinuxCon Japan 2014, Tokyo Myself, Igalia and WebKit Co-founder, member of the WebKit/Blink/Browsers team Igalia is an open source consultancy founded in 2001 Igalia is Top 5 contributor to upstream WebKit/Blink Working with many industry actors: tablets, phones, smart tv, set-top boxes, IVI and home automation. WebKit and Blink Juan J. Sánchez Outline 1 Why this all matters 2 2004-2013: WebKit, a historical perspective 2.1. The technology: goals, features, architecture, ports, webkit2, code, licenses 2.2. The community: kinds of contributors and contributions, tools, events 3 April 2013. The creation of Blink: history, motivations for the fork, differences and impact in the WebKit community 4 2013-2014: Current status of both projects, future perspectives and conclusions WebKit and Blink Juan J. Sánchez PART 1: Why this all matters WebKit and Blink Juan J. Sánchez Why this all matters Long time trying to use Web technologies to replace native totally or partially Challenge enabled by new HTML5 features and improved performance Open Source is key for innovation in the field Mozilla focusing on the browser WebKit and now Blink are key projects for those building platforms and/or browsers WebKit and Blink Juan J. Sánchez PART 2: 2004-2013 WebKit, a historical perspective WebKit and Blink Juan J. Sánchez PART 2.1 WebKit: the technology WebKit and Blink Juan J. Sánchez The WebKit project Web rendering engine (HTML, JavaScript, CSS...) The engine is the product Started as a fork of KHTML and KJS in 2001 Open Source since 2005 Among other things, it’s useful for: Web browsers Using web technologies for UI development WebKit and Blink Juan J.
    [Show full text]
  • Building a Browser for Automotive: Alternatives, Challenges and Recommendations
    Building a Browser for Automotive: Alternatives, Challenges and Recommendations Juan J. Sánchez Automotive Linux Summit 2015, Tokyo Myself, Igalia and Webkit/Chromium Co-founder of Igalia Open source consultancy founded in 2001 Igalia is Top 5 contributor to upstream WebKit/Chromium Working with many industry actors: automotive, tablets, phones, smart tv, set-top boxes, IVI and home automation Building a Browser for Automotive Juan J. Sánchez Outline 1 A browser for automotive: requirements and alternatives 2 WebKit and Chromium, a historical perspective 3 Selecting between WebKit and Chromium based alternatives Building a Browser for Automotive Juan J. Sánchez PART 1 A browser for automotive: requirements and alternatives Building a Browser for Automotive Juan J. Sánchez Requirements Different User Experiences UI modifications (flexibility) New ways of interacting: accessibility support Support of specific standards (mostly communication and interfaces) Portability: support of specific hardware boards (performance optimization) Functionality and completeness can be less demanding in some cases (for now) Provide both browser as an application and as a runtime Building a Browser for Automotive Juan J. Sánchez Available alternatives Option 1) Licensing a proprietary solution: might bring a reduced time-to-market but involves a cost per unit and lack of flexibility Option 2) Deriving a new browser from the main open source browser technologies: Firefox (Gecko) Chromium WebKit (Safari and others) Mozilla removed support in their engine for third
    [Show full text]