Articles the Host’S Dilemma: Strategic Forfeiture in Platform Markets for Informational Goods

Articles the Host’S Dilemma: Strategic Forfeiture in Platform Markets for Informational Goods

ARTICLES THE HOST’S DILEMMA: STRATEGIC FORFEITURE IN PLATFORM MARKETS FOR INFORMATIONAL GOODS Jonathan M. Barnett CONTENTS I. VOLUNTARY FORFEITURE: A TYPICAL PRACTICE ....................................................... 1869 A. Bell Labs: Open Licensing ................................................................................................ 1870 B. Microsoft: Application Programming Interfaces ........................................................... 1872 II. VOLUNTARY FORFEITURE: A RATIONAL PRACTICE .................................................. 1874 A. Some Economics of Platform Markets ............................................................................ 1875 B. The Double Commitment Problem .................................................................................. 1878 1. The Intertemporal Dilemma ........................................................................................ 1878 2. The Host’s Dilemma ..................................................................................................... 1879 (a) The Simple Case .................................................................................................... 1879 (b) The Complex Case ................................................................................................ 1881 C. Solutions to the Host’s Dilemma ..................................................................................... 1884 1. Contract ......................................................................................................................... 1884 2. Integration ..................................................................................................................... 1885 3. Forfeiture ....................................................................................................................... 1887 (a) Simple Forfeiture ................................................................................................... 1887 (b) Complex Forfeiture ............................................................................................... 1888 III. ORGANIZATIONAL CONVERGENCE IN OPERATING SYSTEMS MARKETS .......... 1890 A. Old Models ......................................................................................................................... 1891 1. The Unix Model: Software as a Mostly Open Platform .......................................... 1891 2. The Windows Model: Software as Semi-Closed Platform ....................................... 1892 B. New Models ....................................................................................................................... 1893 1. The Open Source Model: Software as Semi-Open Platform ................................... 1893 (a) Credible Commitment Through Controlled Forfeiture .................................... 1896 (i) Contractual Giveaways .................................................................................... 1896 (ii) Community Norms .......................................................................................... 1898 (iii) Foundation Entity .......................................................................................... 1899 (b) Funding Controlled Forfeiture (or, Is Linux a Subsidiary of IBM?).............. 1906 2. The Nokia/Google Model: Software as Semi-Open Platform .................................. 1913 (a) Nokia’s Gifts (and Regrets) .................................................................................. 1914 (b) Nonprofit Organization as Strategic Choice ...................................................... 1920 1861 1862 HARVARD LAW REVIEW [Vol. 124:1861 IV. IMPLICATIONS: WHAT’S SO GOOD ABOUT “FREE”? ................................................... 1925 A. The Indifference Baseline ................................................................................................. 1927 B. The Case for Closed Models ............................................................................................. 1929 C. The Case for Open Models ............................................................................................... 1932 CONCLUSION ............................................................................................................................... 1934 APPENDIX: FOUNDATION DOCUMENTS ............................................................................... 1936 THE HOST’S DILEMMA: STRATEGIC FORFEITURE IN PLATFORM MARKETS FOR INFORMATIONAL GOODS ∗ Jonathan M. Barnett Voluntary forfeiture of intellectual assets — often, exceptionally valuable assets — is surprisingly widespread in information technology markets. A simple economic rationale can account for these practices. By giving away access to core technologies, a platform holder commits against expropriating (and thereby induces) user investments that support platform value. To generate revenues that cover development and maintenance costs, the platform holder must regulate access to other goods and services within the total consumption bundle. The trade-off between forfeiting access (to induce adoption) and regulating access (to recover costs) anticipates the substantial convergence of open and closed innovation models. Organizational patterns in certain software and operating system markets are consistent with this hypothesis: open and closed structures substantially converge across a broad range of historical and contemporary settings and commercial and noncommercial environments. In particular, this Article shows that (i) contrary to standard characterizations in the legal literature, leading “open source” software projects are now primarily funded and substantially governed and staffed by corporate sponsors, and (ii) proprietary firms have formed nonprofit consortia and other cooperative arrangements and adopted “open source” licensing strategies in order to develop operating systems for the smartphone market. n June 2008, Nokia paid $410 million to buy out all other ownership Iinterests in the Symbian operating system,1 which was then the most widely used operating system in smartphone devices2 worldwide.3 That would be a fairly mundane corporate acquisition if it were not for the fact that Nokia immediately transferred responsibilities for managing, developing, and distributing the operating system to the ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– ∗ Associate Professor, University of Southern California Gould School of Law. I am grateful for comments from Peter Siegelman and other participants at a faculty workshop at the Universi- ty of Connecticut School of Law, the Colloquium on Innovation Policy at NYU School of Law, the 2010 Annual Intellectual Property Scholars Conference at the University of California, Berke- ley, School of Law, and the Law and Innovation Symposium at the University of Southern Cali- fornia Gould School of Law. Jinmin Chen, Daniel Fullerton, Blake Horn, Kawon Lee, and Ingrid Newquist provided excellent research assistance. This project was supported by a grant from the Southern California Innovation Project, which is funded by the Ewing Marion Kauffman Foun- dation. All errors are mine. 1 J. Nicholas Hoover & Paul McDougall, Nokia’s Symbian Deal Rewrites the Smartphone Rules, INFORMATIONWEEK, June 30, 2008, at 18, 18. 2 While there is no standard industry definition, a “smartphone” can be understood to refer to a mobile phone with advanced capabilities (such as email and internet access) that resemble some of the functions of a personal computer. 3 Until recently, Nokia’s Symbian system was the clear market leader in the smartphone op- erating system market, on a worldwide basis. As discussed subsequently, stiff competition, in par- ticular from Google’s Android system, has challenged its lead. For detailed information on mar- ket share, see infra Figure 3, p. 1918. 1863 1864 HARVARD LAW REVIEW [Vol. 124:1861 Symbian Foundation, a nonprofit entity.4 Even that transfer might be construed as a large but similarly unexceptional act of corporate lar- gesse if it were not for the fact that Nokia, the world’s leading handset maker,5 invited telecommunications providers, handset makers, and other firms that compete with it to serve on the Foundation’s board and other governing entities.6 To cap off what was an exceptional se- quence of events, the Foundation then spent two years clearing all third-party rights in the Symbian source code,7 which it made publicly available in February 2010 without charge under an “open source” li- cense.8 Even more surprisingly, however, this exceptional giveaway ultimately turns out to be fairly unexceptional. From the inception of the information and communication technology (ICT) industry, some of the most dominant firms have regularly ceded — that is, given away or distributed at nominal or below-market fees — some of their most valuable innovations to all interested parties, including customers and rivals. Examples include some of the industry’s most important inno- vations: to name just a few, AT&T’s forfeiture of transistor technology in the 1950s,9 Xerox’s forfeiture of Ethernet local area network tech- nology in 1979,10 and Intel’s release of the Universal Serial Bus (USB) standard in 1995.11 Dominant firms have developed some of the most fundamental building blocks of the digital economy at great cost and then have given away or distributed those innovations at a nominal or below-market fee, often accompanied by complementary support ser- vices and tools. The substantial incidence and magnitude of

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    78 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us