Advanced Copyright Issues on the Internet

Total Page:16

File Type:pdf, Size:1020Kb

Advanced Copyright Issues on the Internet ADVANCED COPYRIGHT ISSUES ON THE INTERNET * David L. Hayes, Esq. FENWICK & WEST LLP * Chairman of Intellectual Property Practice Group, Fenwick & West LLP, Mountain View & San Francisco, California. B.S.E.E. (Summa Cum Laude), Rice University (1978); M.S.E.E., Stanford University (1980); J.D. (Cum Laude), Harvard Law School (1984). An earlier version of this paper appeared in David L. Hayes, “Advanced Copyright Issues on the Internet,” 7 Tex. Intell. Prop. L.J. 1 (Fall 1998). The author expresses appreciation to Matthew Becker for significant contributions to Section III.E (“Streaming and Downloading”). © 1997-2013 David L. Hayes. All Rights Reserved. (Updated as of June 2013) TABLE OF CONTENTS I. INTRODUCTION 14 II. RIGHTS IMPLICATED BY TRANSMISSION AND USE OF WORKS ON THE INTERNET 15 A. The Right of Reproduction 15 1. The Ubiquitous Nature of “Copies” on the Internet 16 2. Whether Images of Data Stored in RAM Qualify as “Copies” 16 3. The WIPO Treaties & the European Copyright Directive Are Unclear With Respect to Interim “Copies” 23 (a) Introduction to the WIPO Treaties & the European Copyright Directive 23 (b) The WIPO Copyright Treaty 25 (c) The WIPO Performances and Phonograms Treaty 28 4. The Requirement of Volition for Direct Liability 30 (a) The Netcom Case 31 (b) The MAPHIA Case 33 (c) The Sabella Case 34 (d) The Frena Case 35 (e) The Webbworld Case 36 (f) The Sanfilippo Case 37 (g) The Free Republic Case 38 (h) The MP3.com Cases 40 (i) The CoStar Case 43 (j) The Ellison Case 44 (k) Perfect 10 v. Cybernet Ventures 44 (l) Field v. Google 45 (m) Parker v. Google 46 (n) The Cablevision Case 46 (o) Arista Records v. Usenet.com 49 (p) Quantum Systems v. Sprint Nextel 50 (q) Disney Enterprises v. Hotfile 51 (r) Perfect 10 v. Megaupload 52 (s) Wolk v. Kodak Imaging Network 53 (t) Fox Broadcasting v. Dish Network 53 (u) Perfect 10 v. Giganews 57 (v) Summary of Case Law 59 5. The Reproduction Right Under WIPO Implementing Legislation 60 (a) United States Legislation 60 (1) The Digital Millennium Copyright Act 60 (2) Legislation Not Adopted 60 (b) The European Copyright Directive 62 6. Peer-to-Peer File Sharing 67 - 2 - (a) BMG Music v. Gonzalez 67 (b) Columbia Pictures v. Bunnell 68 (c) Sony BMG Music Entertainment v. Tenenbaum 68 (d) Capitol Records v. Thomas-Rasset 73 7. The Immunity of the Audio Home Recording Act (AHRA) 76 (a) The Napster Cases 76 (b) The Aimster Case 77 (c) Atlantic Recording Corp. v. XM Satellite Radio 77 B. The Right of Public Performance 80 1. Isochronous Versus Asynchronous Transmissions 81 2. The Meaning of “Publicly” 82 3. Live Nation Motor Sports v. Davis 82 4. United States v. ASCAP 83 5. The Cablevision Case 85 6. Ringtones – In re Application of Cellco Partnership 86 7. Warner Bros. v. WTV Systems 88 8. Capitol Records v. MP3tunes 91 9. The Aereo Case 91 10. The BarryDriller Case 99 C. The Right of Public Display 101 1. The Frena, Marobie-FL, Hardenburgh and Webbworld Cases 101 2. Kelly v. Arriba Soft 103 3. Ticketmaster v. Tickets.com 106 4. Perfect 10 v. Google (aka Perfect 10 v. Amazon) 107 5. Healthcare Advocates, Inc. v. Harding, Earley, Follmer & Frailey 119 6. ICG-Internet Commerce Group, Inc. v. Wolf 120 D. The Right of Public Distribution 120 1. The Requirement of a “Copy” 120 (a) Cases Addressing Whether Mere Posting Is a Distribution 121 (1) Cases Holding That Mere Posting Is a Distribution 122 (2) Cases Holding That Mere Posting Is Not a Distribution 126 (3) Cases Refusing To Decide the Issue 135 2. The Requirement of a “Public” Distribution 135 3. The Requirement of a Rental or Transfer of Ownership 136 4. The Right of Distribution Under the WIPO Treaties 137 5. The Right of Distribution Under WIPO Implementing Legislation 138 (a) United States Legislation 138 (b) The European Copyright Directive 138 E. The Right of Importation 138 F. The New Right of Transmission and Access Under the WIPO Treaties 139 1. The Right of Communication to the Public in the WIPO Copyright Treaty 140 2. The Right of Making Available to the Public in the WIPO Performances and Phonograms Treaty 142 - 3 - 3. The Right of Transmission and Access Under WIPO Implementing Legislation 143 (a) United States Legislation 143 (b) The European Copyright Directive 144 G. New Rights and Provisions Under The Digital Millennium Copyright Act, the European Copyright Directive & Legislation That Did Not Pass 146 1. Circumvention of Technological Measures and Rights Management Information Under the DMCA 146 (a) Circumvention of Technological Protection Measures 147 (1) Prohibition on Conduct 147 (i) Exemptions Adopted by the Librarian of Congress 148 a. Scope of the Network Connection Exemption – The TracFone Cases 158 (ii) Epic Games v. Altmeyer 161 (iii) Facebook v. Power Ventures 161 (iv) Bose v. Zavala 162 (v) MGE UPS Systems v. GE 162 (vi) Granger v. One Call Lender Services 163 (2) Prohibition on Devices 163 (i) Sony Computer Entertainment America v. Gamemasters 164 (ii) The DirecTV Cases 165 a. DirecTV, Inc. v. Borow 165 b. DirecTV, Inc. v. Carrillo 165 (iii) Sony Computer Entertainment America v. Divineo 165 (iv) Ticketmaster L.L.C. v. RMG Technologies, Inc. 167 (v) The Tracfone Cases 167 (vi) Movida Communications, Inc. v. Haifa 168 (vii) Microsoft Corp. v. EEE Business Inc. 168 (viii) MDY Industries v. Blizzard Entertainment 169 (ix) Coupons, Inc. v. Stottlemire 174 (x) CoxCom, Inc. v. Chafee 175 (xi) The DISH Network Cases 175 a. Dish Network v. Sonicview 175 b. Dish Network v. SatFTA 176 c. Dish Network v. Dimarco 176 d. Dish Network v. Sonicview 177 e. Dish Network v. Alejandri 178 (xii) Realnetworks v. DVD Copy Control Association. 179 (xiii) Apple v. Psystar 180 (xiv) Blizzard Entertainment v. Reeves 183 (xv) The Craigslist Cases 183 a. Craigslist v. Naturemarket 183 b. Craigslist v. Mesiab 184 c. Craigslist v. Hubert 185 d. Craigslist v. Branley 185 - 4 - e. Craigslist v. Kerbel 185 (xvi) Echostar v. Viewtech 186 (xvii) Adobe Systems v. Feather 186 (3) What Constitutes an Effective Technological Measure 187 (i) Auto Inspection Services v. Flint Auto Auction 187 (ii) Healthcare Advocates, Inc. v. Harding, Earley, Follmer & Frailey 187 (iii) Apple v. Psystar 190 (4) No Requirements With Respect to Design of a Product 190 (5) Other Rights Not Affected 190 (6) Exemption for Nonprofit Organizations and Law Enforcement 191 (7) Reverse Engineering for Interoperability 192 (i) Universal City Studios Inc. v. Reimerdes 197 (ii) Storage Technology Corporation v. Custom Hardware Engineering & Consulting 198 (iii) Chamberlain Group, Inc. v. Skylink Technologies, Inc. 198 (iv) Lexmark International, Inc. v. Static Control Components, Inc. 199 (v) Davidson Assocs. v. Internet Gateway 199 (vi) Sony Computer Entertainment America v. Divineo 203 (8) Encryption Research 203 (9) Protection of Minors 204 (10) Protection of Personally Identifying Information 204 (11) Security Testing 204 (12) Copy Restrictions To Be Built Into VCRs and Camcorders 204 (13) Other Cases Filed Under the Anti-Circumvention Provisions 205 (i) Sony Computer Entertainment, Inc. v. Connectix, Inc. 205 (ii) RealNetworks, Inc. v. Streambox Inc. 206 (iii) Universal City Studios, Inc. v. Reimerdes 210 (iv) A Related DVD Case Involving Trade Secret Claims – DVD Copy Control Association, Inc. v. McLaughlin (the Bunner case) 215 (v) A Related DVD Case – Norwegian Prosecution of Jon Johansen 219 (vi) Another Challenge to the DMCA – The Felten Case. 219 (vii) Pearl Investments, LLC v. Standard I/O, Inc. 220 (viii) 321 Studios v. Metro Goldwyn Mayer Studios, Inc. 221 (ix) I.M.S. Inquiry Management Systems, Ltd. v. Berkshire Information Systems, Inc. 222 (x) Paramount Pictures Corp. v. 321 Studios. 223 (xi) Macrovision Corp. v. 321 Studios 223 (xii) Comcast of Illinois X v. Hightech Electronics, Inc. 223 (xiii) Davidson & Assocs. v. Internet Gateway 224 (xiv) Agfa Monotype Corp. v. Adobe Sys. 224 (xv) Egilman v. Keller & Heckman 227 - 5 - (xvi) Macrovision v. Sima Products Corp. 227 (xvii) Nordstrom Consulting, Inc. v. M&S Technologies, Inc. 228 (xviii) R.C. Olmstead v. CU Interface 229 (xix) Avaya v. Telecom Labs 229 (xx) Actuate v. IBM 230 (xxi) Navistar v. New Baltimore Garage 231 (xxii) Dice Corp. v. Bold Technologies 231 (14) Criminal Prosecutions Under the DMCA 232 (i) The Sklyarov/Elcomsoft Case 232 (ii) Other Criminal Prosecutions Under the DMCA 233 (15) Other Uses of the Anti-Circumvention Provisions as a Sword 234 (i) Lexmark International, Inc. v. Static Control Components, Inc. 234 (ii) Chamberlain Group, Inc. v. Skylink Technologies, Inc. 240 (iii) In re Certain Universal Transmitters for Garage Door Openers 246 (iv) Storage Technology Corporation v. Custom Hardware Engineering & Consulting 247 (b) Integrity of Copyright Management Information 252 (1) Definition of CMI 252 (i) Cases Requiring CMI to be Part of a Technological System or Process 252 a. The IQ Group, Ltd. v. Wiesner Publishing, LLC 252 b. Textile Secrets Int’l, Inc. v. Ya-Ya Brand Inc. 255 c. Jacobsen v. Katzer 256 d. Silver v. Lavadeira 257 (ii) Cases Not Requiring CMI to be Part of a Technological System or Process 257 a. McClatchey v. The Associated Press 257 b. Associated Press v. All Headline News Corp. 258 c. Fox v. Hildebrand 258 d. Faulkner Press v. Class Notes 259 e. Agence France Presse v. Morel 259 f. Murphy v. Millennium Radio 261 g. William Wade Waller Co. v. Nexstar Broadcasting 262 (2) Prohibitions on False CMI and Removal/Alteration of CMI 263 (i) Cases re Removal or Alteration of CMI 263 a. Kelly v. Arriba Soft Corp. 263 b. Thron v. Harper Collins Publishers 264 c.
Recommended publications
  • Application Development with Tocollege.Net
    CYAN YELLOW MAGENTA BLACK PANTONE 123 C BOOKS FOR PROFESSIONALS BY PROFESSIONALS® THE EXPERT’S VOICE® IN WEB DEVELOPMENT Companion eBook Available Covers Pro Web 2.0 Application GWT 1.5 Pro Development with GWT 2.0 Web Dear Reader, This book is for developers who are ready to move beyond small proof-of-concept Pro sample applications and want to look at the issues surrounding a real deploy- ment of GWT. If you want to see what the guts of a full-fledged GWT application look like, this is the book for you. GWT 1.5 is a game-changing technology, but it doesn’t exist in a bubble. Real deployments need to connect to your database, enforce authentication, protect against security threats, and allow good search engine optimization. To show you all this, we’ll look at the code behind a real, live web site called Application Development with ToCollege.net. This application specializes in helping students who are applying Web 2.0 to colleges; it allows them to manage their application processes and compare the rankings that they give to schools. It’s a slick application that’s ready for you to sign up for and use. Application Development This book will give you a walking tour of this modern Web 2.0 start-up’s code- base. The included source code will provide a functional demonstration of how to merge together the modern Java stack including Hibernate, Spring Security, Spring MVC 2.5, SiteMesh, and FreeMarker. This fully functioning application is better than treasure if you’re a developer trying to wire GWT into a Maven build environment who just wants to see some code that makes it work.
    [Show full text]
  • It's All About Visibility
    8 It’s All About Visibility This chapter looks at the critical tasks for getting your message found on the web. Now that we’ve discussed how to prepare a clear targeted message using the right words (Chapter 5, “The Audience Is Listening (What Will You Say?)”), we describe how online visibility depends on search engine optimization (SEO) “eat your broccoli” basics, such as lightweight and crawlable website code, targeted content with useful labels, and inlinks. In addition, you can raise the visibility of your website, products, and services online through online advertising such as paid search advertising, outreach through social websites, and display advertising. 178 Part II Building the Engine Who Sees What and How Two different tribes visit your website: people, and entities known as web spiders (or crawlers or robots). People will experience your website differently based on their own characteristics (their visual acuity or impairment), their browser (Internet Explorer, Chrome, Firefox, and so on), and the machine they’re using to view your website (a TV, a giant computer monitor, a laptop screen, or a mobile phone). Figure 8.1 shows a page on a website as it appears to website visitors through a browser. Figure 8.1 Screenshot of a story page on Model D, a web magazine about Detroit, Michigan, www.modeldmedia.com. What Search Engine Spiders See The web spiders are computer programs critical to your business because they help people who don’t know about your website through your marketing efforts find it through the search engines. The web spiders “crawl” through your website to learn about what it contains and carry information back to the gigantic servers behind the search engines, so that the search engine can provide relevant results to people searching for your product or service.
    [Show full text]
  • Google Cheat Sheets [.Pdf]
    GOOGLE | CHEAT SHEET Key for skill required Novice This two page Google Cheat Sheet lists all Google services and tools as to understand the Intermediate well as background information. The Cheat Sheet offers a great reference underlying concepts to grasp of basic to advance Google query building concepts and ideas. Expert CHEAT SHEET GOOGLE SERVICES Google domains google.co.kr Google Company Information google.ae google.kz Public (NASDAQ: GOOG) and google.com.af google.li (LSE: GGEA) Google AdSense https://www.google.com/adsense/ google.com.ag google.lk google.off.ai google.co.ls Founded Google AdWords https://adwords.google.com/ google.am google.lt Menlo Park, California (1998) Google Analytics http://google.com/analytics/ google.com.ar google.lu google.as google.lv Location Google Answers http://answers.google.com/ google.at google.com.ly Mountain View, California, USA Google Base http://base.google.com/ google.com.au google.mn google.az google.ms Key people Google Blog Search http://blogsearch.google.com/ google.ba google.com.mt Eric E. Schmidt Google Bookmarks http://www.google.com/bookmarks/ google.com.bd google.mu Sergey Brin google.be google.mw Larry E. Page Google Books Search http://books.google.com/ google.bg google.com.mx George Reyes Google Calendar http://google.com/calendar/ google.com.bh google.com.my google.bi google.com.na Revenue Google Catalogs http://catalogs.google.com/ google.com.bo google.com.nf $6.138 Billion USD (2005) Google Code http://code.google.com/ google.com.br google.com.ni google.bs google.nl Net Income Google Code Search http://www.google.com/codesearch/ google.co.bw google.no $1.465 Billion USD (2005) Google Deskbar http://deskbar.google.com/ google.com.bz google.com.np google.ca google.nr Employees Google Desktop http://desktop.google.com/ google.cd google.nu 5,680 (2005) Google Directory http://www.google.com/dirhp google.cg google.co.nz google.ch google.com.om Contact Address Google Earth http://earth.google.com/ google.ci google.com.pa 2400 E.
    [Show full text]
  • The Top 10 Ddos Attack Trends
    WHITE PAPER The Top 10 DDoS Attack Trends Discover the Latest DDoS Attacks and Their Implications Introduction The volume, size and sophistication of distributed denial of service (DDoS) attacks are increasing rapidly, which makes protecting against these threats an even bigger priority for all enterprises. In order to better prepare for DDoS attacks, it is important to understand how they work and examine some of the most widely-used tactics. What Are DDoS Attacks? A DDoS attack may sound complicated, but it is actually quite easy to understand. A common approach is to “swarm” a target server with thousands of communication requests originating from multiple machines. In this way the server is completely overwhelmed and cannot respond anymore to legitimate user requests. Another approach is to obstruct the network connections between users and the target server, thus blocking all communication between the two – much like clogging a pipe so that no water can flow through. Attacking machines are often geographically-distributed and use many different internet connections, thereby making it very difficult to control the attacks. This can have extremely negative consequences for businesses, especially those that rely heavily on its website; E-commerce or SaaS-based businesses come to mind. The Open Systems Interconnection (OSI) model defines seven conceptual layers in a communications network. DDoS attacks mainly exploit three of these layers: network (layer 3), transport (layer 4), and application (layer 7). Network (Layer 3/4) DDoS Attacks: The majority of DDoS attacks target the network and transport layers. Such attacks occur when the amount of data packets and other traffic overloads a network or server and consumes all of its available resources.
    [Show full text]
  • How Can I Get Deep App Screens Indexed for Google Search?
    HOW CAN I GET DEEP APP SCREENS INDEXED FOR GOOGLE SEARCH? Setting up app indexing for Android and iOS apps is pretty straightforward and well documented by Google. Conceptually, it is a three-part process: 1. Enable your app to handle deep links. 2. Add code to your corresponding Web pages that references deep links. 3. Optimize for private indexing. These steps can be taken out of order if the app is still in development, but the second step is crucial. Without it, your app will be set up with deep links but not set up for Google indexing, so the deep links will not show up in Google Search. NOTE: iOS app indexing is still in limited release with Google, so there is a special form submission and approval process even after you have added all the technical elements to your iOS app. That being said, the technical implementations take some time; by the time your company has finished, Google may have opened up indexing to all iOS apps, and this cumbersome approval process may be a thing of the past. Steps For Google Deep Link Indexing Step 1: Add Code To Your App That Establishes The Deep Links A. Pick A URL Scheme To Use When Referencing Deep Screens In Your App App URL schemes are simply a systematic way to reference the deep linked screens within an app, much like a Web URL references a specific page on a website. In iOS, developers are currently limited to using Custom URL Schemes, which are formatted in a way that is more natural for app design but different from Web.
    [Show full text]
  • Diseño De Sistemas Distribuidos: Google
    + Sistemas Distribuidos Diseño de Sistemas Distribuidos: Google Rodrigo Santamaría Diseño de Sistemas +Distribuidos • Introducción: Google como caso de estudio • Servicios • Plataforma • Middleware 2 + 3 Introducción Crear un sistema distribuido no es sencillo Objetivo: obtener un sistema consistente que cumpla con los requisitos identificados Escala, seguridad, disponibilidad, etc. Elección del modelo Tipo de fallos que asumimos Tipo de arquitectura Elección de la infraestructura Middleware (RMI, REST, Kademlia, etc.) Protocolos existentes (LDAP, HTTP, etc.) + 4 Introducción Google como caso de estudio Google es un ejemplo de un diseño distribuido exitoso Ofrece búsquedas en Internet y aplicaciones web Obtiene beneficios principalmente de la publicidad asociada Objetivo: “organizar la información mundial y hacerla universalmente accesible y útil” Nació a partir de un proyecto de investigación en la Universidad de Stanford, convirtiéndose en compañía con sede en California en 1998. Una parte de su éxito radica en el algoritmo de posicionamiento utilizado por su motor de búsqueda El resto, en un sistema distribuido eficiente y altamente escalable + 5 Introducción Requisitos Google se centra en cuatro desafíos Escalabilidad: un sistema distribuido con varios subsistemas, dando servicio a millones de usuarios Fiabilidad: el sistema debe funcionar en todo momento Rendimiento: cuanto más rápida sea la búsqueda, más búsquedas podrá hacer el usuario -> mayor exposición a la publicidad Transparencia: en cuanto a la capacidad
    [Show full text]
  • Applications: G
    Applications: G This chapter contains the following sections: • G4, on page 5 • GACP, on page 6 • Gaia Online, on page 7 • Game Center, on page 8 • Game Front, on page 9 • Game Informer, on page 10 • GamerCom, on page 11 • GAMERSKY, on page 12 • GameSpot, on page 13 • GameSpy, on page 14 • GameStop, on page 15 • GameTrailers, on page 16 • Ganglia, on page 17 • Ganji, on page 18 • Gantter, on page 19 • Garmin, on page 20 • Gateway, on page 21 • Gawker, on page 22 • Gazprom Media, on page 23 • Gbridge, on page 24 • gdomap, on page 25 • GDS DataBase, on page 26 • GearBest, on page 27 • Geewa, on page 28 • Geico, on page 29 • generic audio/video, on page 30 • Genesis PPP, on page 31 • Genie, on page 32 • Genieo, on page 33 • Genieo Web Filter, on page 34 • GENRAD, on page 35 • Gfycat, on page 36 Applications: G 1 Applications: G • GG, on page 37 • GG Media, on page 38 • GGP, on page 39 • Ghaneely, on page 40 • GIFSoup.com, on page 41 • giFT, on page 42 • Giganews, on page 43 • ginad, on page 44 • GIOP, on page 45 • GIPHY, on page 46 • GISMETEO, on page 47 • GIST, on page 48 • GitHub, on page 49 • Gizmodo, on page 50 • GKrellM, on page 51 • Glide, on page 52 • Globo, on page 53 • Glympse, on page 54 • Glype, on page 55 • Glype Proxy, on page 56 • Gmail, on page 57 • Gmail attachment, on page 58 • GMTP, on page 59 • GMX Mail, on page 60 • GNOME, on page 61 • GNU Generation Foundation NCP 678, on page 62 • GNU Project, on page 63 • Gnucleus, on page 64 • GnucleusLAN, on page 65 • Gnutella, on page 66 • Gnutella2, on page 67 • GO.com, on page
    [Show full text]
  • Field Vs. Google, Inc
    Case 2:04-cv-00413-RCJ-GWF Document 64 Filed 01/19/2006 Page 1 of 25 1 2 3 4 5 6 7 8 9 10 . 11 UNITED STATES DISTRICT COURT 12 DISTRICT OF NEVADA 13 14 BLAKE A. FIELD, ) NO. CV-S-04-0413-RCJ-LRL ) 15 Plaintiff, ) ) FINDINGS OF FACT AND 16 vs. ) CONCLUSIONS OF LAW ) 17 GOOGLE INC., ) & ) 18 Defendant. ) ) ORDER 19 ) ) 20 ) ) 21 AND RELATED COUNTERCLAIMS. ) ) 22 ) ) 23 ) ) 24 25 26 27 28 FINDINGS OF FACT AND CONCLUSIONS OF LAW Case 2:04-cv-00413-RCJ-GWF Document 64 Filed 01/19/2006 Page 2 of 25 1 FINDINGS OF FACT AND CONCLUSIONS OF LAW 2 This is an action for copyright infringement brought by plaintiff Blake Field (“Field”) 3 against Google Inc. (“Google”). Field contends that by allowing Internet users to access copies 4 of 51 of his copyrighted works stored by Google in an online repository, Google violated Field’s 5 exclusive rights to reproduce copies and distribute copies of those works. On December 19, 6 2005, the Court heard argument on the parties’ cross-motions for summary judgment. 7 Based upon the papers submitted by the parties and the arguments of counsel, the Court 8 finds that Google is entitled to judgment as a matter of law based on the undisputed facts. For 9 the reasons set forth below, the Court will grant Google’s motion for summary judgment: (1) that 10 it has not directly infringed the copyrighted works at issue; (2) that Google held an implied 11 license to reproduce and distribute copies of the copyrighted works at issue; (3) that Field is 12 estopped from asserting a copyright infringement claim against Google with respect to the works 13 at issue in this action; and (4) that Google’s use of the works is a fair use under 17 U.S.C.
    [Show full text]
  • The Web ICT Systems for Business Networking Vito Morreale
    ICT Systems for Business Networking Vito Morreale The Web ICT Systems for Business Networking Vito Morreale Note. The content of this document is mainly drawn from Wikipedia [www.wikipedia.org] and follows GNU Free Documentation License (GFDL), the license through which Wikipedia's articles are made available. The GNU Free Documentation License (GFDL) permits the redistribution, creation of derivative works, and commercial use of content provided its authors are attributed and this content remains available under the GFDL. Material on Wikipedia (and this document too) may thus be distributed multilingually to, or incorporated from, resources which also use this license. Table of contents 1 INTRODUCTION ................................................................................................................................................ 3 2 HOW THE WEB WORKS .................................................................................................................................. 4 2.1 PUBLISHING WEB PAGES ....................................................................................................................................... 4 2.2 SOCIOLOGICAL IMPLICATIONS ................................................................................................................................ 5 3 UNIFORM RESOURCE IDENTIFIER (URI) ................................................................................................. 5 4 HYPERTEXT TRANSFER PROTOCOL (HTTP) ........................................................................................
    [Show full text]
  • A Measurement Study of the Wuala On-Line Storage Service
    A Measurement Study of the Wuala On-line Storage Service Thomas Mager, Ernst Biersack, and Pietro Michiardi EURECOM Sophia Antipolis, France fmager,erbi,[email protected] Abstract—Wuala is a popular online backup and file sharing • Understand if and how coding techniques are used to system that has been successfully operated for several years. assure the availability and durability of the data in case Very little is known about the design and implementation of of node failures Wuala. We capture the network traffic exchanged between the machines participating in Wuala to reverse engineer the design • Determine the transport protocol used to move data and operation of Wuala. When Wuala was launched, it used between peers and servers a clever combination of centralized storage in data centers for • Describe the evolution Wuala has undergone between long-term backup with peer-assisted file caching of frequently 2010 and 2012. downloaded files. Large files are broken up into transmission blocks and additional transmission blocks are generated using Our findings indicate that Wuala uses a simple, yet clever a classical redundancy coding scheme. Multiple transmission system design. Data availability – i.e., making sure that files blocks are sent in parallel to different machines and reliability is are accessible at any time – and durability – that is ensuring assured via a simple Automatic Repeat Request protocol on top of that files are never lost – are achieved by relying on servers UDP. Recently, however, Wuala has adopted a pure client/server based architecture. Our findings and the underlying reasons are located in a data center, instead of using peers.
    [Show full text]
  • Appendix I: Search Quality and Economies of Scale
    Appendix I: search quality and economies of scale Introduction 1. This appendix presents some detailed evidence concerning how general search engines compete on quality. It also examines network effects, scale economies and other barriers to search engines competing effectively on quality and other dimensions of competition. 2. This appendix draws on academic literature, submissions and internal documents from market participants. Comparing quality across search engines 3. As set out in Chapter 3, the main way that search engines compete for consumers is through various dimensions of quality, including relevance of results, privacy and trust, and social purpose or rewards.1 Of these dimensions, the relevance of search results is generally considered to be the most important. 4. In this section, we present consumer research and other evidence regarding how search engines compare on the quality and relevance of search results. Evidence on quality from consumer research 5. We reviewed a range of consumer research produced or commissioned by Google or Bing, to understand how consumers perceive the quality of these and other search engines. The following evidence concerns consumers’ overall quality judgements and preferences for particular search engines: 6. Google submitted the results of its Information Satisfaction tests. Google’s Information Satisfaction tests are quality comparisons that it carries out in the normal course of its business. In these tests, human raters score unbranded search results from mobile devices for a random set of queries from Google’s search logs. • Google submitted the results of 98 tests from the US between 2017 and 2020. Google outscored Bing in each test; the gap stood at 8.1 percentage points in the most recent test and 7.3 percentage points on average over the period.
    [Show full text]
  • What Is Search Engine Optimization (SEO)?
    claninmarketing.com/workshops Public Relations Social Media Development + Management Search Engine Optimization Graphic Design Logo + Branding Design Website Design + Management Strategic Planning Marketing Audits Consulting Scott Clanin Owner & President Agenda What is SEO and why is it important? How Google Ranks Content How Search Algorithms work Ways to improve SEO Simple checklist My site isn’t showing up. Why? • The site isn't well connected from other sites on the web • You've just launched a new site and Google hasn't had time to crawl it yet • The design of the site makes it difficult for Google to crawl its content effectively • Google received an error when trying to crawl your site What is search engine optimization (SEO)? SEO is the practice of increasing the quantity and quality of traffic to your website through organic search engine results. Why is SEO important? Users are searching for what you have to offer. High SEO rankings will increase traffic to your website! Source: Google SEO Googlebot Search bot software that Google sends out to collect information about documents on the web to add to Google’s searchable index Crawling Process where the Googlebot goes around from website to website, finding new and updated information to report back to Google. The Googlebot finds what to crawl using links. Indexing The processing of the information gathered by the Googlebot from its crawling activities. Once documents are processed, they are added to Google’s searchable index if they are determined to be quality content. SEO Serving (and ranking) When a server types a query, Google tries to find the most relevant answer from its index based on many factors.
    [Show full text]