Writing in The New Yorker, Tim Wu calls for "total war on patent trolls" and lays out a roadmap for attacking the extortionists who are costing the US economy a reported $30B/year by extorting license fees for patents that never should have been issued and don't cover what the patent trolls say they cover.
There are good laws in place that could fight trolls, but they sit largely unused. First are the consumer-protection laws, which bar “unfair or deceptive acts and practices.” Some patent trolls, to better coerce settlement, purposely misrepresent matters such as the strength of their patents, the extent of other settlements, and their actual willingness to litigate. Second, there are plenty of remedies available under the unfair-competition laws. Some trolls work by aggregating an enormous number of patents, and then present the threat that one of their thousands of patents might actually be valid. The creation of these portfolios for trolling may be “agreements in restraint of trade” under Section 1 of the Sherman Antitrust Act, or they may “substantially lessen competition” under the Clayton Antitrust Act. More generally, the methods of the trolls are hardly what you would call ordinary methods of competition; they should be considered, rather, what the Federal Trade Commission calls “unfair methods of competition” under Section 5 of the F.T.C. Act. The Commission has the power to define and punish methods of business that are inherently harmful with few or no redeeming benefits, and that’s what trolling is. Finally, it is possible that the criminal laws barring larceny and schemes to defraud may cover the conduct of some trolls.
How to Make War on Patent Trolls
Redditor Vadermeer was in a local Goodwill Outlet and happened on a trove of files from Apple engineer Jack MacDonald from 1979-80, when he was manager of system software for the Apple II and ///.
Charles Duan from Public Knowledge sends us “a video we put together for Fair Use Week about copyright and fair use, to the tune of ‘Let It Go’ from Frozen, and full of clips of other fair use videos.”
An excellent excerpt from Aaron Perzanowski and Jason Schultz’s The End of Ownership: Personal Property in the Digital Economy on Motherboard explains how Section 1201 of the 1998 Digital Millennium Copyright Act — which bans tampering with or bypassing DRM, even for legal reasons — has allowed corporations to design their products so that using […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]