Author: Ed Felten

  • Net Neutrality: Strike While the Iron Is Hot?

    Bill Herman at the Public Knowledge blog has an interesting response to my net neutrality paper. As he notes, my paper was mostly about the technical details surrounding neutrality, with a short policy recommendation at the end. Here’s the last paragraph of my paper: There is a good policy argument in favor of doing nothing…

  • New Net Neutrality Paper

    I just released a new paper on net neutrality, called Nuts and Bolts of Network Neutrality. It’s based on several of my earlier blog posts, with some new material.

  • CleanFlicks Ruled an Infringer

    Joe Gratz writes, Judge Richard P. Matsch of the United States District Court for the District of Colorado [on] Wednesday filed this opinion granting partial summary judgment in favor of the movie studios, finding that CleanFlicks infringes copyright. This is not a terribly surprising result; CleanFlicks’ business involves selling edited DVD-Rs of Hollywood movies, buying…

  • University-Purchased Music Services a Bust

    When universities buy music service subscriptions for their students, few students use them, according to Nick Timiraos’s story in yesterday’s Wall Street Journal. Students tend to download music illegally, or buy it from iTunes instead. In explaining the popularity of Napster and other file-sharing systems, commentators have often overemphasized the price factor and underestimated convenience.…

  • Why Do Innovation Clusters Form?

    Recently I attended a very interesting conference about high-tech innovation and public policy, with experts in various fields. (Such a conference will be either boring or fascinating, depending on who exactly is invited. This one was great.) One topic of discussion was how innovation clusters form. “Innovation cluster” is the rather awkward term for a…

  • Does the Great Firewall Violate U.S. Law?

    Clayton, Murdoch, and Watson have an interesting new paper describing technical mechanisms that the Great Firewall of China uses to block online access to content the Chinese government doesn’t like. The Great Firewall works in two parts. One part inspects data packets that cross the border between China and the rest of the world, looking…

  • Long-Tail Innovation

    Recently I saw a great little talk by Cory Ondrejka on the long tail of innovation. (He followed up with a blog entry.) For those not in the know, “long tail” is one of the current buzzphrases of tech punditry. The term was coined by Chris Anderson in a famous Wired article. The idea is…

  • 21st Century Wiretapping: Risk of Abuse

    Today I’m returning, probably for the last time, to the public policy questions surrounding today’s wiretapping technology. Thus far in the series (1, 2, 3, 4, 5, 6, 7, 8) I have described how technology enables wiretapping based on automated recognition of certain features of a message (rather than individualized suspicion of a person), I…

  • Freeing the Xbox

    When Microsoft shipped its Xbox game console, Linux programmers salivated. The Xbox was a pretty nice computer, priced at $149. The Xbox had all the hardware needed to run Linux and its applications. Problem was, Microsoft had tried to lock down the Xbox hardware to prevent unauthorized programs – such as the Linux kernel –…

  • How I Spent My Summer Vacation

    Ah, summer, when a man’s thoughts turn to … ski jumping? On Sunday I had the chance to try ski jumping, at the Swiss national team’s training center at Einsiedeln. My companions and I – or at least the ones foolish enough to try, which of course included me – donned thick neoprene bodysuits, gloves,…