business

1st book written to be filmed

From Claudia Roth Pierpont’s “Tough Guy: The mystery of Dashiell Hammett” (The New Yorker [11 February 2002]: 70):

In March, 1928, [Hammett] had written to his publisher, Blanche Knopf, about his plans to adapt the “stream-of-consciousness method” to a new detective novel. He was going to enter the detective’s mind, he told her, reveal his impressions and follow his thoughts … But a few days after sending the letter, Hammett received one himself, from the head of the Fox Film Corporation, asking to look at some of his stories. He promptly fired off a second letter to Knopf, informing her of an important change in his artistic plans: he would now be writing only in “objective and filmable forms.” In the finished novel, Spade is viewed from the outside only, … we are granted no access to his mind. “The Maltese Falcon” may have been the first book to be conceived as a movie before it was written.

1st book written to be filmed Read More »

It takes 10 years to develop expertise

From Peter Norvig’s “Teach Yourself Programming in Ten Years” (2001):

Researchers ([John R. Hayes, Complete Problem Solver (Lawrence Erlbaum) 1989.], [Benjamin Bloom (ed.), Developing Talent in Young People (Ballantine) 1985.]) have shown it takes about ten years to develop expertise in any of a wide variety of areas, including chess playing, music composition, painting, piano playing, swimming, tennis, and research in neuropsychology and topology. There appear to be no real shortcuts: even Mozart, who was a musical prodigy at age 4, took 13 more years before he began to produce world-class music. In another genre, the Beatles seemed to burst onto the scene with a string of #1 hits and an appearance on the Ed Sullivan show in 1964. But they had been playing small clubs in Liverpool and Hamburg since 1957, and while they had mass appeal early on, their first great critical success, Sgt. Peppers, was released in 1967. Samuel Johnson thought it took longer than ten years: “Excellence in any department can be attained only by the labor of a lifetime; it is not to be purchased at a lesser price.” And Chaucer complained “the lyf so short, the craft so long to lerne.”

It takes 10 years to develop expertise Read More »

A prison completely run by the inmates

From Mica Rosenberg’s “Guatemala forces end 10-year prisoner rule at jail” (The Washington Post: 25 September 2006):

Guatemalan security forces took over a jail run for over 10 years by inmates who built their own town on prison grounds complete with restaurants, churches and hard-drug laboratories.

Seven prisoners died when 3,000 police and soldiers firing automatic weapons stormed the Pavon prison just after dawn on Monday.

Corrupt guards would only patrol the prison’s perimeter and run the administration section while an “order committee” of hardened inmates controlled the rest. They smuggled in food, drink and luxury goods.

“The people who live here live better than all of us on the outside. They’ve even got pubs,” said soldier Tomas Hernandez, 25.

Pet dogs, including a whining puppy, roamed the deserted prison grounds after the raid. One inmate kept a spider monkey captive, national prison officials said.

But with army helicopters clattering overhead, police backed up by armored cars transferred Pavon’s 1,600 inhabitants to another prison, ending their lives of ease.

The inmates who died were killed in a shootout at the two-story wooden chalet of a convicted Colombian drug trafficker knows as “El Loco,” or “The Madman.”

Blood was splattered on the house’s walls and floor. The Colombian had a widescreen television and high-speed Internet.

Pavon was one of the worst prisons in Guatemala’s penitentiary system, where common criminals, rival “mara” street gangs and drug traffickers often battle for control.

Police had not been into Pavon, on the edge of the town of Fraijanes, since 1996.

It was originally built for 800 inmates as a farm prison where prisoners could grow their own food. But the prison population grew over time and inmates began to construct their own homes on the grounds.

Guards let prisoners bring in whatever they wanted and inmates set up laboratories to produce cocaine, crack and liquor inside Pavon. …

Inmates extorted and kidnapped victims on the outside by giving orders via cell phone. …

They also killed Luis Alfonso Zepeda, a convicted murderer who headed the “order committee.”

Zepeda earned around $25,000 a month from extortion, renting out prison grounds to other inmates and drug trafficking, police said.

His son Samuel lived illegally inside the prison to help run the crime empire, even though he was never sent there by a court. …

Inmates ran at least two churches, one Catholic and the other Evangelical, and restaurants serving typical fare like stews and tortillas.

Stores controlled by the prisoners sold soft drinks and potato chips brought in from the outside.

A prison completely run by the inmates Read More »

Types of open source licenses

From Eric Steven Raymond’s “Varieties of Open-Source Licensing” (The Art of Unix Programming: 19 September 2003):

MIT or X Consortium License

The loosest kind of free-software license is one that grants unrestricted rights to copy, use, modify, and redistribute modified copies as long as a copy of the copyright and license terms is retained in all modified versions. But when you accept this license you do give up the right to sue the maintainers. …

BSD Classic License

The next least restrictive kind of license grants unrestricted rights to copy, use, modify, and redistribute modified copies as long as a copy of the copyright and license terms is retained in all modified versions, and an acknowledgment is made in advertising or documentation associated with the package. Grantee has to give up the right to sue the maintainers. … Note that in mid-1999 the Office of Technology Transfer of the University of California rescinded the advertising clause in the BSD license. …

Artistic License

The next most restrictive kind of license grants unrestricted rights to copy, use, and locally modify. It allows redistribution of modified binaries, but restricts redistribution of modified sources in ways intended to protect the interests of the authors and the free-software community. …

General Public License

The GNU General Public License (and its derivative, the Library or “Lesser” GPL) is the single most widely used free-software license. Like the Artistic License, it allows redistribution of modified sources provided the modified files bear “prominent notice”.

The GPL requires that any program containing parts that are under GPL be wholly GPLed. (The exact circumstances that trigger this requirement are not perfectly clear to everybody.)

These extra requirements actually make the GPL more restrictive than any of the other commonly used licenses. …

Mozilla Public License

The Mozilla Public License supports software that is open source, but may be linked with closed-source modules or extensions. It requires that the distributed software (“Covered Code”) remain open, but permits add-ons called through a defined API to remain closed. …

Types of open source licenses Read More »

A coup in Equatorial Guinea for fun

From Laura Miller’s “Rent-a-coup” (Salon: 17 August 2006):

In March 2004, a group of men with a hired army of about 70 mercenary soldiers set out to topple the government of the tiny West African nation of Equatorial Guinea and install a new one. Ostensibly led by a political opposition leader but actually controlled by the white mercenary officers, this new regime would plunder the recently discovered oil wealth of Equatorial Guinea, enriching the coup’s architects by billions of dollars.

The Wonga Coup never came off, but not because of the kind of double-crossing anticipated in that early planning document. … One of the strangest aspects of the story is that the Wonga Coup nearly replicated an earlier failed attempt to take over Equatorial Guinea in 1973. And that coup had since been fictionalized in a bestselling book, popular with the mercenary crowd, by Frederick Forsyth, “The Dogs of War.” A case of life imitating art imitating life? The truth is even more bizarrely convoluted: Roberts has found evidence that Forsyth himself financed the 1973 coup. (And Forsyth has more or less admitted as much.)

The 2004 coup plotters made noises about installing a better leader, but their real motives were “wonga” — British slang for money — and something less tangible. “It’s fun,” said one observer. “Some of the guys did it for kicks, because life is boring.” …

Arrayed against rent-a-coup schemers like Mann is a breed that Roberts calls the “rag-and-bone intelligence dealer,” a kind of freelance spy who “darts about Africa with a laptop and satellite phone, lingering in hotel bars, picking up scraps of information where he can, selling them to willing buyers, whether corporate or government. The more sophisticated use electronic, online or other surveillance.”

A coup in Equatorial Guinea for fun Read More »

The airplane graveyard

From Patrick Smith’s “Ask the pilot” (Salon: 4 August 2006):

The wing is shorn off. It lies upside down in the dirt amid a cluster of desert bushes. The flaps and slats are ripped away, and a nest of pipes sprouts from the engine attachment pylon like the flailing innards of some immense dead beast. Several yards to the west, the center fuselage has come to rest inverted, the cabin cracked open like an eggshell. Inside, shattered rows of overhead bins are visible through a savage tangle of cables, wires, ducts and insulation. Seats are flung everywhere, still attached to one another in smashed-up units of two and three. I come to a pair of first-class chairs, crushed beneath the remains of a thousand-pound bulkhead. In the distance, the plane’s tail sits upright in a gesture of mutilated repose, twisted sharply to one side. High on the fin, the blue and white logo remains visible, save for a large vacant portion where the rudder used to be. …

I’m taking in one of the aviation world’s most curious and fascinating places, the “boneyard” at Mojave Airport in California, 70 miles north of Los Angeles.

The Mojave Desert is a barren place, a region of forbidding rocky hills and centuries-old Joshua trees. But it’s also an area with a rich aerospace history. Edwards Air Force Base and the U.S. Navy’s China Lake weapons station are both here, as well as the airport in Palmdale, where the Lockheed L-1011 was built. The Mojave Airport, officially known as the Mojave Airport and Civilian Aerospace Test Center, is the first FAA-licensed “spaceport” in the United States, home to a burgeoning commercial spacecraft industry. It’s a spot for ingenuity and innovation, you could say. But for hundreds of commercial jetliners, it is also the end of the road.

Of several aircraft scrap yards and storage facilities, including others in Arizona, Oklahoma and elsewhere in California, Mojave is arguably the most famous. …

There are upward of 200 planes at Mojave, though the number rises and falls as hulls are destroyed — or returned to service. Not all of the inventory is permanently grounded or slated for destruction. Neither are the planes necessarily old. Aircraft are taken out of service for a host of reasons, and age, strictly speaking, isn’t always one of them. The west side of the airport is where most of the newer examples are parked. MD-80s, Fokker 100s and an assortment of later-model 737s line the sunbaked apron in a state of semiretirement, waiting for potential buyers. They wear the standard uniform of prolonged storage: liveries blotted out, intakes and sensor probes wrapped and covered to protect them from the ravages of climate — and from the thousands of desert jackrabbits that make their homes here. A few of the ships are literally brand new, flown straight to Mojave from the assembly line to await reassignment after a customer changed its plans. …

The scrap value of a carcass is anywhere from $15,000 to $30,000.

“New arrivals, as it were, tend to come in bunches,” explains Mike Potter, one of several Mojave proprietors. …

Before they’re broken up, jets are scavenged for any useful or valuable parts. Control surfaces — ailerons, rudders, slats and elevators — have been carefully removed. Radomes — the nose-cone assemblies that conceal a plane’s radar — are another item noticeable by their absence. And, almost without exception, engines have been carted away for use elsewhere, in whole or in part. Potter has a point about being careful out here, for the boneyard floor is an obstacle course of random, twisted, dangerously sharp detritus. Curiously, I notice hundreds of discarded oxygen masks, their plastic face cups bearing the gnaw marks of jackrabbits. Some of the jets are almost fully skeletonized, and much of what used to rest inside is now scattered across the ground. …

Near the eastern perimeter sits a mostly intact Continental Airlines 747. This is one of Potter’s birds, deposited here in 1999. A hundred-million-dollar plane, ultimately worth about 25 grand for the recyclers. …

The airplane graveyard Read More »

Info about the Internet Archive

From The Internet Archive’s “Orphan Works Reply Comments” (9 May 2005):

The Internet Archive stores over 500 terabytes of ephemeral web pages, book and moving images, adding an additional twenty-five terabytes each month. The short life span and immense quantity of these works prompts a solution that provides immediate and efficient preservation and access to orphaned ephemeral works. For instance, the average lifespan of a webpage is 100 days before it undergoes alteration or permanent deletion, and there are an average of fifteen links on a webpage.

Info about the Internet Archive Read More »

The real solution to identity theft: bank liability

From Bruce Schneier’s “Mitigating Identity Theft” (Crypto-Gram: 15 April 2005):

The very term “identity theft” is an oxymoron. Identity is not a possession that can be acquired or lost; it’s not a thing at all. …

The real crime here is fraud; more specifically, impersonation leading to fraud. Impersonation is an ancient crime, but the rise of information-based credentials gives it a modern spin. A criminal impersonates a victim online and steals money from his account. He impersonates a victim in order to deceive financial institutions into granting credit to the criminal in the victim’s name. …

The crime involves two very separate issues. The first is the privacy of personal data. Personal privacy is important for many reasons, one of which is impersonation and fraud. As more information about us is collected, correlated, and sold, it becomes easier for criminals to get their hands on the data they need to commit fraud. …

The second issue is the ease with which a criminal can use personal data to commit fraud. …

Proposed fixes tend to concentrate on the first issue — making personal data harder to steal — whereas the real problem is the second. If we’re ever going to manage the risks and effects of electronic impersonation, we must concentrate on preventing and detecting fraudulent transactions.

… That leaves only one reasonable answer: financial institutions need to be liable for fraudulent transactions. They need to be liable for sending erroneous information to credit bureaus based on fraudulent transactions.

… The bank must be made responsible, regardless of what the user does.

If you think this won’t work, look at credit cards. Credit card companies are liable for all but the first $50 of fraudulent transactions. They’re not hurting for business; and they’re not drowning in fraud, either. They’ve developed and fielded an array of security technologies designed to detect and prevent fraudulent transactions.

The real solution to identity theft: bank liability Read More »

The HOLLYWOOD sign as multi-user access-control system

From Bruce Schneier’s “Hollywood Sign Security” (Crypto-Gram: 15 January 2005):

In Los Angeles, the “HOLLYWOOD” sign is protected by a fence and a locked gate. Because several different agencies need access to the sign for various purposes, the chain locking the gate is formed by several locks linked together. Each of the agencies has the key to its own lock, and not the key to any of the others. Of course, anyone who can open one of the locks can open the gate.

This is a nice example of a multiple-user access-control system. It’s simple, and it works. You can also make it as complicated as you want, with different locks in parallel and in series.

The HOLLYWOOD sign as multi-user access-control system Read More »

When people feel secure, they’re easier targets

From Bruce Schneier’s “Burglars and “Feeling Secure” (Crypto-Gram: 15 January 2005):

This quote is from “Confessions of a Master Jewel Thief,” by Bill Mason (Villard, 2003): “Nothing works more in a thief’s favor than people feeling secure. That’s why places that are heavily alarmed and guarded can sometimes be the easiest targets. The single most important factor in security — more than locks, alarms, sensors, or armed guards — is attitude. A building protected by nothing more than a cheap combination lock but inhabited by people who are alert and risk-aware is much safer than one with the world’s most sophisticated alarm system whose tenants assume they’re living in an impregnable fortress.”

The author, a burglar, found that luxury condos were an excellent target. Although they had much more security technology than other buildings, they were vulnerable because no one believed a thief could get through the lobby.

When people feel secure, they’re easier targets Read More »

Word of the day: creative destruction

From Wikipedia’s “Creative destruction” (13 July 2006):

Creative destruction, introduced by the economist Joseph Schumpeter, describes the process of industrial transformation that accompanies radical innovation. In Schumpeter’s vision of capitalism, innovative entry by entrepreneurs was the force that sustained long-term economic growth, even as it destroyed the value of established companies that enjoyed some degree of monopoly power. …

There are numerous types of innovation generating creative destruction in an industry:

New markets or products
New equipment
New sources of labor and raw materials
New methods of organization or management
New methods of inventory management
New methods of transportation
New methods of communication (e.g., the Internet)
New methods of advertising and marketing
New financial instruments
New ways to lobby politicians or new legal strategies

Word of the day: creative destruction Read More »

Why the US toppled Iran’s government

From Robert Sherrill’s “100 (Plus) Years of Regime Change” (The Texas Observer: 14 July 2006):

In 1953 the brutal, venal shah of Iran, Mohammad Reza Pahlavi, was pushed into exile by Mohammad Mossadegh, the democratically elected prime minister. …

Iranians loved Mossadegh. He made clear that his two ambitions were to set up a lasting democracy and to strengthen nationalism – by which he meant get rid of the Anglo-Iranian Oil Co., which had been robbing Iran for half a century. Indeed, the British company had been earning each year as much as all the royalties it paid Iran over 50 years. Mossadegh intended to recapture those riches to rebuild Iran.

In a scheme to get rid of Mossadegh, the British enlisted Secretary of State [John Foster] Dulles; he in turn enlisted his brother, CIA Director Allen Dulles, and what ensued was a truly masterful piece of skullduggery. … The CIA plotters ousted Mossadegh and restored the shah to his Peacock Throne.

For Secretary of State Dulles and his old law clients – including Gulf Oil Corp., Standard Oil Co. of New Jersey, Texaco Inc., and Mobil Corp., who were subsequently allowed to take 40 percent of Iran’s oil supply – the shah’s return was a happy and very lucrative event.

Why the US toppled Iran’s government Read More »

Uses of botnets

From The Honeynet Project & Research Alliance’s “Know your Enemy: Tracking Botnets” (13 March 2005):

“A botnet is comparable to compulsory military service for windows boxes” – Stromberg

… Based on the data we captured, the possibilities to use botnets can be categorized as listed below. …

  1. Distributed Denial-of-Service Attacks

    Most commonly implemented and also very often used are TCP SYN and UDP flood attacks. Script kiddies apparently consider DDoS an appropriate solution to every social problem. … run commercial DDoS attacks against competing corporations … DDoS attacks are not limited to web servers, virtually any service available on the Internet can be the target of such an attack. … very specific attacks, such as running exhausting search queries on bulletin boards or recursive HTTP-floods on the victim’s website.

  2. Spamming

    open a SOCKS v4/v5 proxy … send massive amounts of bulk email … harvest email-addresses … phishing-mails

  3. Sniffing Traffic

    use a packet sniffer to watch for interesting clear-text data passing by a compromised machine. … If a machine is compromised more than once and also a member of more than one botnet, the packet sniffing allows to gather the key information of the other botnet. Thus it is possible to “steal” another botnet.

  4. Keylogging
  5. Spreading new malware

    In most cases, botnets are used to spread new bots. … spreading an email virus using a botnet is a very nice idea

  6. Installing Advertisement Addons and Browser Helper Objects (BHOs)

    setting up a fake website with some advertisements … these clicks can be “automated” so that instantly a few thousand bots click on the pop-ups. … hijacks the start-page of a compromised machine so that the “clicks” are executed each time the victim uses the browser.

  7. Google AdSense abuse

    … leveraging his botnet to click on these advertisements in an automated fashion and thus artificially increments the click counter.

  8. Attacking IRC Chat Networks

    attacks against Internet Relay Chat (IRC) networks. … so called “clone attack”: In this kind of attack, the controller orders each bot to connect a large number of clones to the victim IRC network.

  9. Manipulating online polls/games

    Online polls/games are getting more and more attention and it is rather easy to manipulate them with botnets.

  10. Mass identity theft

    Bogus emails (“phishing mails”) … also host multiple fake websites pretending to be Ebay, PayPal, or a bank …

Uses of botnets Read More »

Who runs botnets?

From The Honeynet Project & Research Alliance’s “Know your Enemy: Tracking Botnets” (13 March 2005):

An event that is not that unusual is that somebody steals a botnet from someone else. … bots are often “secured” by some sensitive information, e.g. channel name or server password. If one is able to obtain all this information, he is able to update the bots within another botnet to another bot binary, thus stealing the bots from another botnet. …

Something which is interesting, but rarely seen, is botnet owners discussing issues in their bot channel. …

Our observations showed that often botnets are run by young males with surprisingly limited programming skills. … we also observed some more advanced attackers: these persons join the control channel only seldom. They use only 1 character nicks, issue a command and leave afterwards. The updates of the bots they run are very professional. Probably these people use the botnets for commercial usage and “sell” the services. A low percentage use their botnets for financial gain. …

Another possibility is to install special software to steal information. We had one very interesting case in which attackers stole Diablo 2 items from the compromised computers and sold them on eBay. … Some botnets are used to send spam: you can rent a botnet. The operators give you a SOCKS v4 server list with the IP addresses of the hosts and the ports their proxy runs on. …

… some attackers are highly skilled and organized, potentially belonging to well organized crime structures. Leveraging the power of several thousand bots, it is viable to take down almost any website or network instantly. Even in unskilled hands, it should be obvious that botnets are a loaded and powerful weapon.

Who runs botnets? Read More »

Prescription drug spending has vastly increased in 25 years

From Clifton Leaf’s “The Law of Unintended Consequences” (Fortune: 19 September 2005):

Whatever the answer, it’s clear who pays for it. You do. You pay in the form of vastly higher drug prices and health-care insurance. Americans spent $179 billion on prescription drugs in 2003. That’s up from … wait for it … $12 billion in 1980 [when the Bayh-Dole Act was passed]. That’s a 13% hike, year after year, for two decades. Of course, what you don’t pay as a patient you pay as a taxpayer. The U.S. government picks up the tab for one in three Americans by way of Medicare, Medicaid, the military, and other programs. According to the provisions of Bayh-Dole, the government gets a royalty-free use, forever, of its funded inventions. It has never tried to collect. You might say the taxpayers pay for the hat–and have it handed to them.

Prescription drug spending has vastly increased in 25 years Read More »

What patents on life has wrought

From Clifton Leaf’s “The Law of Unintended Consequences” (Fortune: 19 September 2005):

The Supreme Court’s decision in 1980 to allow for the patenting of living organisms opened the spigots to individual claims of ownership over everything from genes and protein receptors to biochemical pathways and processes. Soon, research scientists were swooping into patent offices around the world with “invention” disclosures that weren’t so much products or processes as they were simply knowledge–or research tools to further knowledge.

The problem is, once it became clear that individuals could own little parcels of biology or chemistry, the common domain of scientific exchange–that dynamic place where theories are introduced, then challenged, and ultimately improved–begins to shrink. What’s more, as the number of claims grows, so do the overlapping claims and legal challenges. …

In October 1990 a researcher named Mary-Claire King at the University of California at Berkeley told the world that there was a breast-cancer susceptibility gene–and that it was on chromosome 17. Several other groups, sifting through 30 million base pairs of nucleotides to find the precise location of the gene, helped narrow the search with each new discovery. Then, in the spring of 1994, a team led by Mark Skolnick at the University of Utah beat everyone to the punch–identifying a gene with 5,592 base pairs and codes for a protein that was nearly 1,900 amino acids long. Skolnick’s team rushed to file a patent application and was issued title to the discovery three years later.

By all accounts the science was a collective effort. The NIH had funded scores of investigative teams around the country and given nearly 1,200 separate research grants to learn everything there was to learn about the genetics of breast cancer.

The patent, however, is licensed to one company–Skolnick’s. Myriad Genetics, a company the researcher founded in 1991, now insists on doing all U.S. testing for the presence of unknown mutation in the two related genes, BRCA1 and BRCA2. Those who have a mutation in either gene have as high as an 86% chance of getting cancer, say experts. The cost for the complete two-gene analysis: $2,975.

Critics say that Myriad’s ultrarestrictive licensing of the technology–one funded not only by federal dollars but also aided by the prior discoveries of hundreds of other scientists–is keeping the price of the test artificially high. Skolnick, 59, claims that the price is justified by his company’s careful analysis of thousands of base pairs of DNA, each of which is prone to a mutation or deletion, and by its educational outreach programs.

What patents on life has wrought Read More »

1980 Bayh-Dole Act created the biotech industry … & turned universities into businesses

From Clifton Leaf’s “The Law of Unintended Consequences” (Fortune: 19 September 2005):

For a century or more, the white-hot core of American innovation has been basic science. And the foundation of basic science has been the fluid exchange of ideas at the nation’s research universities. It has always been a surprisingly simple equation: Let scientists do their thing and share their work–and industry picks up the spoils. Academics win awards, companies make products, Americans benefit from an ever-rising standard of living.

That equation still holds, with the conspicuous exception of medical research. In this one area, something alarming has been happening over the past 25 years: Universities have evolved from public trusts into something closer to venture capital firms. What used to be a scientific community of free and open debate now often seems like a litigious scrum of data-hoarding and suspicion. And what’s more, Americans are paying for it through the nose. …

From 1992 to September 2003, pharmaceutical companies tied up the federal courts with 494 patent suits. That’s more than the number filed in the computer hardware, aerospace, defense, and chemical industries combined. Those legal expenses are part of a giant, hidden “drug tax”–a tax that has to be paid by someone. And that someone, as you’ll see below, is you. You don’t get the tab all at once, of course. It shows up in higher drug costs, higher tuition bills, higher taxes–and tragically, fewer medical miracles.

So how did we get to this sorry place? It was one piece of federal legislation that you’ve probably never heard of–a 1980 tweak to the U.S. patent and trademark law known as the Bayh-Dole Act. That single law, named for its sponsors, Senators Birch Bayh and Bob Dole, in essence transferred the title of all discoveries made with the help of federal research grants to the universities and small businesses where they were made.

Prior to the law’s enactment, inventors could always petition the government for the patent rights to their own work, though the rules were different at each federal agency; some 20 different statutes governed patent policy. The law simplified the “technology transfer” process and, more important, changed the legal presumption about who ought to own and develop new ideas–private enterprise as opposed to Uncle Sam. The new provisions encouraged academic institutions to seek out the clever ideas hiding in the backs of their research cupboards and to pursue licenses with business. And it told them to share some of the take with the actual inventors.

On the face of it, Bayh-Dole makes sense. Indeed, supporters say the law helped create the $43-billion-a-year biotech industry and has brought valuable drugs to market that otherwise would never have seen the light of day. What’s more, say many scholars, the law has created megaclusters of entrepreneurial companies–each an engine for high-paying, high-skilled jobs–all across the land.

That all sounds wonderful. Except that Bayh-Dole’s impact wasn’t so much in the industry it helped create, but rather in its unintended consequence–a legal frenzy that’s diverting scientists from doing science. …

A 1979 audit of government-held patents showed that fewer than 5% of some 28,000 discoveries–all of them made with the help of taxpayer money–had been developed, because no company was willing to risk the capital to commercialize them without owning title. …

A dozen schools–notably MIT, Stanford, the University of California, Johns Hopkins, and the University of Wisconsin–already had campus offices to work out licensing arrangements with government agencies and industry. But within a few years Technology Licensing Offices (or TLOs) were sprouting up everywhere. In 1979, American universities received 264 patents. By 1991, when a new organization, the Association of University Technology Managers, began compiling data, North American institutions (including colleges, research institutes, and hospitals) had filed 1,584 new U.S. patent applications and negotiated 1,229 licenses with industry–netting $218 million in royalties. By 2003 such institutions had filed five times as many new patent applications; they’d done 4,516 licensing deals and raked in over $1.3 billion in income. And on top of all that, 374 brand-new companies had sprouted from the wells of university research. That meant jobs pouring back into the community …

The anecdotal reports, fun “discovery stories” in alumni magazines, and numbers from the yearly AUTM surveys suggested that the academic productivity marvel had spread far and wide. But that’s hardly the case. Roughly a third of the new discoveries and more than half of all university licensing income in 2003 derived from just ten schools–MIT, Stanford, the usual suspects. They are, for the most part, the institutions that were pursuing “technology transfer” long before Bayh-Dole. …

Court dockets are now clogged with university patent claims. In 2002, North American academic institutions spent over $200 million in litigation (though some of that was returned in judgments)–more than five times the amount spent in 1991. Stanford Law School professor emeritus John Barton notes, in a 2000 study published in Science, that the indicator that correlates most perfectly with the rise in university patents is the number of intellectual-property lawyers. (Universities also spent $142 million on lobbying over the past six years.) …

So what do universities do with all their cash? That depends. Apart from the general guidelines provided by Bayh-Dole, which indicate the proceeds must be used for “scientific research or education,” there are no instructions. “These are unrestricted dollars that they can use, and so they’re worth a lot more than other dollars,” says University of Michigan law professor Rebecca Eisenberg, who has written extensively about the legislation. The one thing no school seems to use the money for is tuition–which apparently has little to do with “scientific research or education.” Meanwhile, the cost of university tuition has soared at a rate more than twice as high as inflation from 1980 to 2005.

1980 Bayh-Dole Act created the biotech industry … & turned universities into businesses Read More »

What is serious news reporting?

From Tom Stites’s “Guest Posting: Is Media Performance Democracy’s Critical Issue?” (Center for Citizen Media: Blog: 3 July 2006):

Serious reporting is based in verified fact passed through mature professional judgment. It has integrity. It engages readers – there’s that word again, readers – with compelling stories and it appeals to their human capacity for reason. This is the information that people need so they can make good life decisions and good citizenship decisions. Serious reporting is far from grim and solemn and off-putting. It is accessible and relevant to its readers. And the best serious reporting is a joy to read.

Serious reporting emanates largely from responsible local dailies and national and foreign reporting by big news organizations, print and broadcast. But the reporting all these institutions do is diminishing. With fewer reporters chasing the news, there is less and less variety in the stories citizens see and hear. The media that are booming, especially cable news and blogs, do precious little serious reporting. Or they do it for specialized audiences.

What is serious news reporting? Read More »

“Have you ever been admitted to a mental institution?”

From Tom Stites’s “Guest Posting: Is Media Performance Democracy’s Critical Issue?” (Center for Citizen Media: Blog: 3 July 2006):

And then there were [Walter] Annenberg’s political shenanigans – he shamelessly used his news columns [in The Philadelphia Inquirer] to embarrass candidates who dared to run against his favorites. One day in 1966 a Democrat named Milton Shapp held a press conference while running for governor and Annenberg’s hand-picked political reporter asked him only one question. The question was, “Mr. Shapp, have you ever been admitted to a mental institution?” “Why no,” Shapp responded, and went away scratching his head about this odd question. The next morning he didn’t need to scratch his head any more. A five-column front page Inquirer headline read, “Shapp Denies Mental Institution Stay.” I’m not making this up. I’ve seen the clipping – a friend used to have a framed copy above his desk. Those were not the good old days.

“Have you ever been admitted to a mental institution?” Read More »