Stories by Scott Bradner

  • Apple vs. Samsung: innovation vs. clones

    There has been a lot of speculation as to how a jury could have come up with such a one-sided verdict in as complicated and long a case as Apple vs. Samsung. I doubt anyone directly involved in the case would have predicted an outcome that looked remotely like this. But, I will leave speculation on that to others; instead I'd like to look at whether the verdict is good for us, and I think it is.

  • Opinion: Rewriting Internet history

    Rewriting history for political purposes used to be a favorite pastime in the old Soviet Union. In a neat turn of events we now see the Wall Street Journal doing the same thing.

  • Apple: Great new products, but secrecy as a religion

    Apple CEO Tim Cook, along with a few friends, Monday performed the annual Apple Worldwide Developers Conference keynote. The show must go on, even without Steve Jobs, and it sure did go on -- two well-packed hours of Apple mantra and mania. They did not talk about what I was watching for, but it turned out OK anyway.

  • SMS a killer app at 20; irrelevant at 25?

    The first SMS-capable mobile phones were approved for sale in Europe 20 years ago this month. By any measure, SMS has become a huge success, at least for the telephone companies, with more than 6 trillion SMS messages sent worldwide in 2010, generating more than $110 billion in revenue. But the future may not be anywhere near as bright because of increasing use of "free" Internet-based services such as Facebook, Apple's iMessage and

  • Analysis: Is Apple destroying the Internet?

    When The Guardian recently interviewed Google co-founder Sergey Brin as a teaser for its weeklong series of articles about the Battle for the Internet, the publication got a good headline out of it: "Google's Brin: threats to Web freedom 'greater then ever'"

  • Are Facebook passwords fair game for employers?

    The Associated Press in late March reported on the issue of employers asking job applicants for their Facebook passwords, citing new and old incidents. The story apparently hit a sore point because it was all over the press within a day or so and in short order politicians were posturing and reaching for the limelight by introducing legislation to ban the practice and sending letters to enforcement agencies demanding action. Based on the comments since the story broke, it is clear that the specific practice of demanding an applicant's password to a social media site is not common but that there is a common worry that it might become so.

  • Abusive websites and customer retention

     Why is it that companies that should know better embark on programs of customer abuse when they should stop and think like a customer, at least for a few seconds? This is a small tale of a company getting it right, then making three all-too-common mistakes. These are not the only ways a company can abuse its customers, but is an example of the kind of non-thinking that should be avoided.

  • Apple's "new iPad": Too late to be corporate game changer

    It's been a hard few years for we-control-everything corporate IT departments as well as for the "Microsoft is the answer, what was your question?" approach to corporate computing. It has also been a while since corporate IT departments have had to deal with a new reality that completely changed how they interact with their users.

  • Apple's Gatekeeper: A low cost for partial security

    Out of the blue, <a href="">Apple</a> just announced <a href="">Mountain Lion</a>, the next generation of its OS X operating system. By the time Mountain Lion ships sometime next summer, Apple says it will have lots of <a href="">new features</a>, some transported from its iOS environment of the <a href="">iPhone</a>, <a href="">iPad</a> and iPod Touch world. This column will examine just one of the new features, one that, while good, has not yet included all the functions of its iOS prototype.

  • Science, technology and politicians

    What is it about politicians that makes them believe that they, with a few minutes' cursory review, know better than people who have studied in an area for decades? Whatever the case, it far from a rare condition. The most recent example of this attitude is the copyright protection proposals currently in front of Congress.

  • Is vulnerability an objective?

    I ended last year with a <a href="">death-of-the-Internet column</a>, and I'm starting off the new year with a death-via-the-Internet one.

  • The Internet has escaped the ax, at least in the US, at least for now

    A year ago <a href="">I wrote</a> that 2011 would be a year in which the Internet would "be under a multi-pronged attack that threatens to change it irrevocably in ways that may destroy much of the Internet's potential." Well, 2011 has come and mostly gone, and it turned out that my pessimism may have been misplaced but not invalid.

  • GPS on the run?

    The Supreme Court earlier this month heard arguments on a relatively common drug case, but there is a chance for this case to set the groundwork, for good or ill, on <a href="">resolving most of the issues I discussed</a> recently regarding the murky state of privacy protections from the government in the United States.

  • The UN, copyright extremism and you

    In September representatives from India, Brazil and South Africa (IBSA) got together to talk about the Internet. <a href="">Their conclusion</a>: The 'Net needed help from the United Nations in the areas of developing policies, technical standards, operation, dispute resolution and crises management.