This piece in Forbes, written by ACI writer Alan Daley, describes the wasteful economic costs from patent trolls. The piece can be read at Forbes.
A few insightful studies of intellectual property abuses and patent infringement defenses have highlighted the role of patent trolls and patent pools. The litigation between patent holders and those accused of infringement is resolved in district courts where large, unproductive process costs and awards eventually hit consumers. Part of these problems seems to be fostered […]
Senators Hatch, Coons and Heller have introduced the LEADs Act in the Senate. The bill would establish a framework for how the U.S. government can access data stored abroad during the course of a criminal investigation. Alan Daley’s new piece, published in today’s Daily Caller, discusses why this bill is so important in protects U.S. economic interests abroad.
Actions by Facebook, Google and Apple have made it very difficult, perhaps impossible, for law enforcement and NSA to obtain the content of cell-phone calls and Facebook’s WhatsApp messaging. The moves were technically simple, but required a marketing decision that they would gain more in public approval for supporting privacy than they would lose through […]
Each month, the Bureau of Labor Statistics (BLS) reports on new jobs, unemployment and other measures about the labor force. At least 200,000 new jobs per month are needed to keep pace with labor force growth. But that paints an incomplete picture. The quality of jobs created and lost each month matters a lot. Well-paying […]
On January 27, the House Subcommittee on Commerce, Manufacturing and Trade will host a hearing to discuss solutions to the ever-growing problem of cybercrime. The Committee has recognized the need for a solution that could help alleviate the consequences consumers face in the event of a data breach. Chip and PIN technology is one such […]
There are persisting frictions among the public and policymakers regarding three privacy orientations: those who rank privacy above security, those who rank transparency of information above privacy, and those who rank security above privacy. These tribal orientations cannot be localized into “no go” neighborhoods, so we cannot “opt out” from the consequences of each orientation. The […]
The public was offended when NSA coopted RSA’s encryption products and we were disappointed when some social media firms shared their customer’s private data with government, other firms, and law enforcement. It’s not acceptable for government and industry to cooperate against the public at large, but when we face genuine national security threats, most of […]
In mobile wireless and Internet markets, consumers deserve the final say on which constructive innovations, new product features and infrastructure should survive. In those markets, consumers notice the rapid pace of change and while they may not use every innovation that comes along, they welcome the steady stream of appealing changes and increased value from […]