Cloud Computing a Practical Approach [2010]

Total Page:16

File Type:pdf, Size:1020Kb

Cloud Computing a Practical Approach [2010] Cloud Computing: A Practical Approach Anthony T. Velte Toby J. Velte, Ph.D. Robert Elsenpeter New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2010 by The McGraw-Hill Companies. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. ISBN: 978-0-07-162695-8 MHID: 0-07-162695-6 The material in this eBook also appears in the print version of this title: ISBN: 978-0-07-162694-1, MHID: 0-07-162694-8. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. To contact a representative please e-mail us at [email protected]. Information has been obtained by McGraw-Hill from sources believed to be reliable. However, because of the possibility of human or mechanical error by our sources, McGraw-Hill, or others, McGraw-Hill does not guarantee the accuracy, adequacy, or completeness of any information and is not responsible for any errors or omissions or the results obtained from the use of such information. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and to the work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works based upon, transmit, distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill’s prior consent. You may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your right to use the work may be terminated if you fail to comply with these terms. THE WORK IS PROVIDED “AS IS.” McGRAW-HILL AND ITS LICENSORS MAKE NO GUARANTEES OR WARRANTIES AS TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM USING THE WORK, INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK OR OTHERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MER- CHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. McGraw-Hill and its licensors do not warrant or guarantee that the functions contained in the work will meet your requirements or that its operation will be uninterrupted or error free. Neither McGraw-Hill nor its licensors shall be liable to you or anyone else for any inaccuracy, error or omission, regardless of cause, in the work or for any damages resulting therefrom. McGraw-Hill has no responsibility for the content of any information accessed through the work. Under no circumstances shall McGraw-Hill and/or its licensors be liable for any indirect, incidental, special, punitive, consequential or similar damages that result from the use of or inability to use the work, even if any of them has been advised of the possibility of such damages. This limitation of liability shall apply to any claim or cause whatsoever whether such claim or cause arises in contract, tort or otherwise. For Ava Holder—A girl so small who should not have to be so strong, but she is. —ATV For Dr. Jon Gottesman—A brilliant mind and great mentor who never loses sight of the big picture. —TJV For Bryan Reynolds—a fellow writer and great cousin. —RCE About the Authors Anthony T. Velte, CISSP, CISA, has spent over 20 years in the information systems industry. He is co-founder of Velte Publishing, Inc. and the co-author of more than a dozen books, including the award winning Green IT: Reduce Your Information System’s Environmental Impact While Adding to the Bottom Line and Microsoft Virtualization with Hyper-V. Mr. Velte also works for an industry-leading security software company. He consults with companies large and small, helping them optimize and protect their information systems infrastructures. He can be reached at [email protected]. Toby J. Velte, Ph.D., is an international best-selling author of business technology articles and books. He is co-founder of Velte Publishing, Inc. and the co-author of more than a dozen books, including the award winning Green IT: Reduce Your Information System’s Environmental Impact While Adding to the Bottom Line and Microsoft Virtualization with Hyper-V. Dr. Velte is currently part of Microsoft’s North Central practice focused on helping thriving companies with their technology-based initiatives. He works with large organizations to create IT roadmaps that are business focused and practically implemented. He can be reached at [email protected]. Robert Elsenpeter is an award-winning author and journalist, freelance writer, and author of more than a dozen technology books. He’s co-author of the award-winning book Green IT: Reduce Your Information System’s Environmental Impact While Adding to the Bottom Line. He has a bachelor’s degree in Information Technology. About the Technical Editor Charles Babcock is former technical editor of Computerworld and technology editor at Interactive Week. He is currently an editor-at-large at Information Week in San Francisco. He has spent 25 years covering various technologies and trends in the computer industry, and holds a bachelor’s degree in journalism from Syracuse University. Contents Acknowledgments . xiii Introduction . xiv Part I Getting Started 1 Cloud Computing Basics . 3 Cloud Computing Overview . 3 Disambiguation—Just What Is Cloud Computing? . 3 Cloud Components . 6 Infrastructure . 8 Services . 11 Applications . 16 Storage . 16 Database Services . 17 Intranets and the Cloud . 19 Components . 20 Hypervisor Applications . 20 First Movers in the Cloud . 21 Amazon . 21 Google . 22 Microsoft . 22 2 Your Organization and Cloud Computing . 23 When You Can Use Cloud Computing . 23 Scenarios . 23 When You Shouldn’t Use Cloud Computing . 25 Benefits . 29 Scalability . 30 Simplicity . 30 Knowledgeable Vendors . 30 More Internal Resources . 31 Security . 31 Limitations . 31 Your Sensitive Information . 31 Applications Not Ready . 33 Developing Your Own Applications . 34 v vi Cloud Computing: A Practical Approach Security Concerns . 35 Privacy Concerns with a Third Party . 35 Are They Doing Enough to Secure It? . 36 Security Benefits . 37 Regulatory Issues . 39 No Existing Regulation . 39 Government to the Rescue? . 39 3 Cloud Computing with the Titans . 41 Google . 41 Google App Engine . 42 Google Web Toolkit . 43 EMC . 45 Technologies . 45 VMware Acquisition . 46 NetApp . 46 Offerings . 46 Cisco Partnership . 47 Microsoft . 48 Azure Services Platform . 48 Windows Live . 49 Exchange Online . 51 SharePoint Services . 52 Microsoft Dynamics CRM . 53 Amazon . 54 Amazon Elastic Compute Cloud (Amazon EC2) . 54 Amazon SimpleDB . ..
Recommended publications
  • EPIC Google FTC Complaint
    Before the Federal Trade Commission Washington, DC 20580 In the Matter of ) ) Google, Inc. and ) Cloud Computing Services ) ________________________________ ) Complaint and Request for Injunction, Request for Investigation and for Other Relief SUMMARY OF COMPLAINT 1. This complaint concerns privacy and security risks associated with the provision of “Cloud Computing Services” by Google, Inc. to American consumers, businesses, and federal agencies of the United States government. Recent reports indicate that Google does not adequately safeguard the confidential information that it obtains. Given the previous opinions of the Federal Trade Commission regarding the obligation of service providers to ensure security, EPIC hereby petitions the Federal Trade Commission to open an investigation into Google’s Cloud Computing Services, to determine the adequacy of the privacy and security safeguards, to assess the representations made by the firm regarding these services, to determine whether the firm has engaged in unfair and/or deceptive trade practices, and to take any such measures as are necessary, including to enjoin Google from offering such services until safeguards are verifiably established. Such action by the Commission is necessary to ensure the safety and security of information submitted to Google by American consumers, American businesses, and American federal agencies. PARTIES 1. The Electronic Privacy Information Center (“EPIC”) is a public interest research organization incorporated in Washington, DC. EPIC’s activities include the review of government and private sector policies and practices to determine their impact on the privacy interests of the American public. Among its other activities, EPIC initiated the complaint to the FTC regarding Microsoft Passport in which the Commission subsequently required Microsoft to implement a comprehensive information security program for 1 Passport and similar services.1 EPIC also filed the complaint with the Commission regarding databroker ChoicePoint, Inc.
    [Show full text]
  • Android (Operating System) 1 Android (Operating System)
    Android (operating system) 1 Android (operating system) Android Home screen displayed by Samsung Nexus S with Google running Android 2.3 "Gingerbread" Company / developer Google Inc., Open Handset Alliance [1] Programmed in C (core), C++ (some third-party libraries), Java (UI) Working state Current [2] Source model Free and open source software (3.0 is currently in closed development) Initial release 21 October 2008 Latest stable release Tablets: [3] 3.0.1 (Honeycomb) Phones: [3] 2.3.3 (Gingerbread) / 24 February 2011 [4] Supported platforms ARM, MIPS, Power, x86 Kernel type Monolithic, modified Linux kernel Default user interface Graphical [5] License Apache 2.0, Linux kernel patches are under GPL v2 Official website [www.android.com www.android.com] Android is a software stack for mobile devices that includes an operating system, middleware and key applications.[6] [7] Google Inc. purchased the initial developer of the software, Android Inc., in 2005.[8] Android's mobile operating system is based on a modified version of the Linux kernel. Google and other members of the Open Handset Alliance collaborated on Android's development and release.[9] [10] The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Android.[11] The Android operating system is the world's best-selling Smartphone platform.[12] [13] Android has a large community of developers writing applications ("apps") that extend the functionality of the devices. There are currently over 150,000 apps available for Android.[14] [15] Android Market is the online app store run by Google, though apps can also be downloaded from third-party sites.
    [Show full text]
  • Why the Cloud for Collaboration? Sponsored By: Cisco Systems Inc
    WHITE PAPER Why the Cloud for Collaboration? Sponsored by: Cisco Systems Inc. Rich Costello Rohit Mehra July 2013 EXECUTIVE SUMMARY Cloud services have emerged as one of the prevailing IT trends as we move further into this decade. IDC sees cloud services as a key transformational technology for the business marketplace, providing greater levels of automation, orchestration, provisioning, and deployment. How important is the cloud? The trend of organizations leveraging technology in a way that optimizes the use of cloud services is gaining considerable traction. IDC research indicates that worldwide SaaS and cloud software revenue reached $29.4 billion in 2012, representing 28.1% year-over-year growth, and will grow to $67.2 billion in 2016. Today, organizations are considering cloud services for a range of technology applications — from computing, email, storage, payroll, HR, and CRM to voice, unified communications (UC), Web conferencing, collaboration, and video. For collaboration in particular, IDC sees cloud services as an enabler and accelerator of collaboration and business benefits. IDC estimates that the collaborative applications segment of the U.S. SaaS applications market grew 10.6% year over year in 2012 to over $2.6 billion in revenue. Current market research indicates that Web conferencing/videoconferencing and UC are at or near the top of the list of applications most likely to move to the cloud. Cloud collaboration services can help organizations become more nimble, reduce operating costs, collaborate more efficiently internally and across global borders and regions, significantly improve worker productivity, and better allocate their internal resources, among other important benefits. This IDC white paper discusses some of the strategic benefits and advantages associated with a migration to a cloud-based collaboration offering as well as the challenges that CIOs and decision makers face when making such a move.
    [Show full text]
  • Overtaking Google Desktop Leveraging XSS to Raise Havoc
    Overtaking Google Desktop Leveraging XSS to Raise Havoc Yair Amit Senior Security Researcher, Watchfire [email protected] 6th OWASP +972-9-9586077 ext 4039 AppSec Conference Copyright © 2007 - The OWASP Foundation Milan - May 2007 Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 2.5 License. To view this license, visit http://creativecommons.org/licenses/by-sa/2.5/ The OWASP Foundation http://www.owasp.org / Presentation Outline Background Google Desktop Overview Overtaking Google Desktop – Step by Step Impact What harm can a malicious attacker do? Attack characteristics Lessons learned Q&A 6th OWASP AppSec Conference – Milan – May 2007 2 Background XSS The most widespread web-application vulnerability WASC Web Application Security Statistics Project (http://www.webappsec.org/projects/statistics/ ) Used to be perceived as an identity theft attack XSS has so much more to offer. It has teeth! Change settings and steal data from attacked victim account Web worms (Samy) What we are about to see… Stealth attack Sensitive information theft from the local computer Command execution 6th OWASP AppSec Conference – Milan – May 2007 3 Google Desktop - Overview Purpose: provide an easily to use and powerful search capability on local and other personal content Some traits: Runs a local web-server for interaction (port 4664) Google.com like interface Uses a service to run the indexing User interface is almost purely web Preferences control what to index, and indexing can be broad Office documents, media files, web history cache, chat sessions, etc. Easily extendible Special integration with Google.com 6th OWASP AppSec Conference – Milan – May 2007 4 Google Desktop Security Mechanisms Web server only accessible from localhost Not available from network 6th OWASP AppSec Conference – Milan – May 2007 5 Google Desktop Protection Mechanism (cont.) The main threats are XSS and XSRF attacks.
    [Show full text]
  • Cloud Interoperability with the Opennebula Toolkit
    Cloud Computing: Interoperability and Data Portability Issues Microsoft, Brussels st 1 December 2009 Cloud Interoperability with the OpenNebula Toolkit Distributed Systems Architecture Research Group Universidad Complutense de Madrid 1/11 Cloud Computing in a Nutshell Cloud Interoperability with the OpenNebula Toolkit What Who Software as a Service On-demand End-user access to any (does not care about hw or sw) application Platform as a Service Platform for Developer building and (no managing of the delivering web underlying hw & swlayers) applications Infrastructure as a Raw computer System Administrator Serviceᄎ infrastructure (complete management of the computer infrastructure) Innovative open, flexible and scalable technology to build IaaS clouds Physical Infrastructure 2/11 What is OpenNebula? Cloud Interoperability with the OpenNebula Toolkit Innovations Designed to address the technology challenges in cloud computing management Open-source Toolkit OpenNebula v1.4 • Support to build new cloud interfaces • Open and flexible tool to fit into any datacenter and VM integrate with any ecosystem component VM • Private, public and hybrid clouds VM • Based on standards • Support federation of infrastructures • Efficient and scalable management of the cloud 3/11 A Toolkit for System Integrators Cloud Interoperability with the OpenNebula Toolkit One Size does not Fit All: Tailoring the Tool to Fit your Needs • Open, modular and extensible architecture • Easy to enhance and embed • Minimal installation requirements (distributed in Ubuntu) • Open Source – Apache 2 Virt. Virt. InterfacesVirt. SchedulersVirt. OpenNebula API Virtual and Physical Resource Management Driver API Virt. Virt. Virt. Virt. ComputeVirt. StorageVirt. NetworkVirt. CloudVirt. 4/11 Interoperability in the OpenNebula Toolkit Cloud Interoperability with the OpenNebula Toolkit Interoperation from Different Perspectives 1.
    [Show full text]
  • Python for Bioinformatics, Second Edition
    PYTHON FOR BIOINFORMATICS SECOND EDITION CHAPMAN & HALL/CRC Mathematical and Computational Biology Series Aims and scope: This series aims to capture new developments and summarize what is known over the entire spectrum of mathematical and computational biology and medicine. It seeks to encourage the integration of mathematical, statistical, and computational methods into biology by publishing a broad range of textbooks, reference works, and handbooks. The titles included in the series are meant to appeal to students, researchers, and professionals in the mathematical, statistical and computational sciences, fundamental biology and bioengineering, as well as interdisciplinary researchers involved in the field. The inclusion of concrete examples and applications, and programming techniques and examples, is highly encouraged. Series Editors N. F. Britton Department of Mathematical Sciences University of Bath Xihong Lin Department of Biostatistics Harvard University Nicola Mulder University of Cape Town South Africa Maria Victoria Schneider European Bioinformatics Institute Mona Singh Department of Computer Science Princeton University Anna Tramontano Department of Physics University of Rome La Sapienza Proposals for the series should be submitted to one of the series editors above or directly to: CRC Press, Taylor & Francis Group 3 Park Square, Milton Park Abingdon, Oxfordshire OX14 4RN UK Published Titles An Introduction to Systems Biology: Statistical Methods for QTL Mapping Design Principles of Biological Circuits Zehua Chen Uri Alon
    [Show full text]
  • IBM Websphere Application Server V8 Concepts, Planning, and Design Guide
    IBM® WebSphere® Front cover IBM WebSphere Application Server V8 Concepts, Planning, and Design Guide Includes details about end-to-end planning for WebSphere implementations Defines WebSphere concepts and preferred practices Addresses distributed and z/OS platforms Margaret Ticknor Alan Corcoran Balazs Csepregi-Horvath Addison Goering José Pablo Hernandez Julien Limodin Sergio Straessli Pinto ibm.com/redbooks International Technical Support Organization IBM WebSphere Application Server V8 Concepts, Planning, and Design Guide August 2011 SG24-7957-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xiii. First Edition (August 2011) This edition applies to Version 8.0 of IBM WebSphere Application Server. © Copyright International Business Machines Corporation 2011. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xiii Trademarks . xiv Preface . .xv The team who wrote this book . .xv Become a published author, too! . xvii Comments welcome. xvii Stay connected to IBM Redbooks publications . xviii Chapter 1. Introduction to WebSphere Application Server V8 . 1 1.1 Java Platform, Enterprise Edition . 2 1.2 Overview of WebSphere Application Server . 3 1.2.1 Application server purpose . 3 1.2.2 Evolving Java application development standards . 4 1.2.3 Enhanced management . 5 1.2.4 Broader integration . 7 1.2.5 Advanced tooling and extensions . 9 1.3 Packaging . 10 1.3.1 WebSphere Application Server - Express V8 . 11 1.3.2 WebSphere Application Server V8 . 11 1.3.3 WebSphere Application Server for Developers V8 . 12 1.3.4 WebSphere Application Server Network Deployment V8 .
    [Show full text]
  • Creating a Connected Workplace
    Creating a Connected Workplace Modern Workplace uk.insight.com Sharing is caring, caring So what exactly is collaboration? is performance The term collaboration itself literally means “working Collaboration is still a relatively new term in the together”. Where many projects fail is understanding boardroom for organisations. Performance used to that this means co-labouring as well as co-talking. be directly linked to an individual rather than a team A lot of people are happy to chip in when it comes or working group. However, recent breakthroughs in to talking, but often projects halt there. Collaborative technology platforms and collaborative tools have had technologies should create new ways for teammates a knock on effect in the way people work on projects. to take action at the end of a collaborative session. Providing the right tools can be quite a minefield for In order to perform effectively, people need access IT leaders as there are so many options available. to information around the clock, in real-time - with But no matter how many tools you enable access to, the accessibility to connect with teammates whether if the right training, tracking and behaviours aren’t or not they’re in the physical office. That’s why simultaneously adopted, it could be money down it’s crucial for organisations to use collaborative the drain. technologies that can facilitate: • Meetings whenever and wherever needed • Platforms to share all types of content from documents, to video and the capability to 86% of employees and executives annotate in real-time cite lack of collaboration or ineffective • Tracking and management of the projects communication for workplace failures.1 54% of businesses are investing in 2 easier-to-use collaboration solutions.
    [Show full text]
  • The Opennebula Standard-Based Open-Source Toolkit to Build Cloud Infrastructures
    Jornadas Técnicas de RedIRIS 2009 Santiago de Compostela 27th November 2009 The OpenNebula Standard-based Open -source Toolkit to Build Cloud Infrastructures Distributed Systems Architecture Research Group Universidad Complutense de Madrid 1/20 Cloud Computing in a Nutshell The OpenNebula Standard-based Open-source Toolkit to Build Cloud Infrastructures What Who Software as a Service On-demand End-user access to any (does not care about hw or sw) application Platform as a Service Platform for Developer building and (no managing of the delivering web underlying hw & swlayers) applications Infrastructure as a Raw computer System Administrator Serviceᄎ infrastructure (complete management of the computer infrastructure) Innovative open, flexible and scalable technology to build IaaS clouds Physical Infrastructure 2/20 From Public to Private Cloud Computing The OpenNebula Standard-based Open-source Toolkit to Build Cloud Infrastructures Public Cloud • Flexible and elastic capacity • Ubiquitous network access • On-demand access • Pay per use Service Cloud User/Service Provider User (Cloud Interface) Private Cloud • Centralized management VM • VM placement optimization VM • Dynamic resizing and partitioning VM of the infrastructure • Support for heterogeneous workloads 3/20 Contents The OpenNebula Standard-based Open-source Toolkit to Build Cloud Infrastructures Innovations Designed to address the technology challenges in cloud computing management Toolkit OpenNebula v1.4 Community Users, projects and ecosystem Open-source and Standardization
    [Show full text]
  • In the Common Pleas Court Delaware County, Ohio Civil Division
    IN THE COMMON PLEAS COURT DELAWARE COUNTY, OHIO CIVIL DIVISION STATE OF OHIO ex rel. DAVE YOST, OHIO ATTORNEY GENERAL, Case No. 21 CV H________________ 30 East Broad St. Columbus, OH 43215 Plaintiff, JUDGE ___________________ v. GOOGLE LLC 1600 Amphitheatre Parkway COMPLAINT FOR Mountain View, CA 94043 DECLARATORY JUDGMENT AND INJUNCTIVE RELIEF Also Serve: Google LLC c/o Corporation Service Co. 50 W. Broad St., Ste. 1330 Columbus OH 43215 Defendant. Plaintiff, the State of Ohio, by and through its Attorney General, Dave Yost, (hereinafter “Ohio” or “the State”), upon personal knowledge as to its own acts and beliefs, and upon information and belief as to all matters based upon the investigation by counsel, brings this action seeking declaratory and injunctive relief against Google LLC (“Google” or “Defendant”), alleges as follows: I. INTRODUCTION The vast majority of Ohioans use the internet. And nearly all of those who do use Google Search. Google is so ubiquitous that its name has become a verb. A person does not have to sign a contract, buy a specific device, or pay a fee to use Good Search. Google provides its CLERK OF COURTS - DELAWARE COUNTY, OH - COMMON PLEAS COURT 21 CV H 06 0274 - SCHUCK, JAMES P. FILED: 06/08/2021 09:05 AM search services indiscriminately to the public. To use Google Search, all you have to do is type, click and wait. Primarily, users seek “organic search results”, which, per Google’s website, “[a] free listing in Google Search that appears because it's relevant to someone’s search terms.” In lieu of charging a fee, Google collects user data, which it monetizes in various ways—primarily via selling targeted advertisements.
    [Show full text]
  • Speaker Biographies
    SPEAKER BIOGRAPHIES Speakers: Dr. Deborah Anderson, Researcher, Dept. of Linguistics, UC Berkeley Deborah (Debbie) Anderson is a Researcher in the Department of Linguistics at UC Berkeley. Since 2002, she has run the Script Encoding Initiative project, which helps get scripts and characters into the Unicode Standard. She also represents UC Berkeley in the Unicode Technical Committee meetings and is a member of the US National Body in ISO/IEC JTC1/SC2. In addition, she is a Unicode Technical Director. Zibi Braniecki, Mozilla, Sr. Staff Platform Engineer Zibi Braniecki is a Sr. Staff Platform Engineer at Mozilla working on internationalization and localization of Gecko and Firefox. Zibi represents Mozilla at TC39 committee and is championing multiple ECMA402 proposals. When not in front of the keyboard, he's captaining the Polish National Team in Ultimate Frisbee. Shane Carr, Senior Software Engineer, Internationalization, Google, Inc. Shane Carr is a Senior Software Engineer on Google's i18n Engineering team. He is chair of the ECMA 402 subcommittee for JavaScript i18n standards and is a core contributor to the International Components for Unicode (ICU) project. His work on ICU has focused on locale data, number formatting, and performance optimization. Shane has previously presented on Zawgyi and on ICU number formatting at the 41st and 42nd Internationalization & Unicode Conference (IUC). He has also presented at the 33rd International Conference on Machine Learning (ICML) and the 2015 Annual Meeting of the American Institute of Chemical Engineers (AIChE). He holds an MS and BS in Computer Science and BS in Chemical Engineering summa cum laude from Washington University in St.
    [Show full text]
  • Paper #5: Google Mobile
    Yale University Thurmantap Arnold Project Digital Platform Theories of Harm Paper Series: 5 Google’s Anticompetitive Practices in Mobile: Creating Monopolies to Sustain a Monopoly May 2020 David Bassali Adam Kinkley Katie Ning Jackson Skeen Table of Contents I. Introduction 3 II. The Vicious Circle: Google’s Creation and Maintenance of its Android Monopoly 5 A. The Relationship Between Android and Google Search 7 B. Contractual Restrictions to Android Usage 8 1. Anti-Fragmentation Agreements 8 2. Mobile Application Distribution Agreements 9 C. Google’s AFAs and MADAs Stifle Competition by Foreclosing Rivals 12 1. Tying Google Apps to GMS Android 14 2. Tying GMS Android and Google Apps to Google Search 18 3. Tying GMS Apps Together 20 III. Google Further Entrenches its Mobile Search Monopoly Through Exclusive Dealing22 A. Google’s Exclusive Dealing is Anticompetitive 25 IV. Google’s Acquisition of Waze Further Forecloses Competition 26 A. Google’s Acquisition of Waze is Anticompetitive 29 V. Google’s Anticompetitive Actions Harm Consumers 31 VI. Google’s Counterarguments are Inadequate 37 A. Google Android 37 B. Google’s Exclusive Contracts 39 C. Google’s Acquisition of Waze 40 VII. Legal Analysis 41 A. Google Android 41 1. Possession of Monopoly Power in a Relevant Market 42 2. Willful Acquisition or Maintenance of Monopoly Power 43 a) Tying 44 b) Bundling 46 B. Google’s Exclusive Dealing 46 1. Market Definition 47 2. Foreclosure of Competition 48 3. Duration and Terminability of the Agreement 49 4. Evidence of Anticompetitive Intent 50 5. Offsetting Procompetitive Justifications 51 C. Google’s Acquisition of Waze 52 1.
    [Show full text]