73.
See
74.
See Turner Broadcasting System, Inc. v Federal Communications Commission, 512 US 622, 637–38 (1997); see also Huber, Law and Disorder in Cyberspace.
75.
See National Broadcasting Company, Inc. v. Columbia Broadcasting System, 213.
76.
See Ronald H. Coase, 'The Federal Communications Commission,'
77.
Paul Starr,
78.
Yochai Benkler, 'Net Regulation: Taking Stock and Looking Forward,'
79.
See, for example, research at MIT to build viral mesh networks which increase in capacity as the number of users increases. Collaborative (Viral) Wireless Networks, available at http://web.media.mit.edu/~aggelos/viral.html (cached: http://www.webcitation.org/5J6nWkYbP).
80.
Ethernet effectively functions like this. Data on an Ethernet network are streamed into each machine on that network. Each machine sniffs the data and then pays attention to the data intended for it. This process creates an obvious security hole: 'sniffers' can be put on 'promiscuous mode' and read packets intended for other machines; see Loshin,
81.
See Yochai Benkler and Lawrence Lessig, 'Net Gains,'
82.
The founder of this argument must be Eli Noam; see 'Spectrum Auctions: Yesterday's Heresy, Today's Orthodoxy, Tomorrow's Anachronism — Taking the Next Step to Open Spectrum Access,'
Part IV Notes
Chapter Fourteen Notes
1.
Audio Tape: Interview with Philip Rosedale 2 (1/13/06) (transcript on file with author).
2.
Ibid., 4–6.
3.
Ibid., 5.
4.
Castronova,
5.
Ibid., 216.