Digital Competition Law in Europe


Book Description

‘Digital competition’, a term and concept that has risen to the forefront of competition law, may be viewed as both promising and cautionary: on the one hand, it brings the promises of increased speed, efficiency and objectivity, and, on the other, it entails potential pitfalls such as hard-to-identify pathways to unfair pricing, dominant positions and their potential abuse, restriction of choice and abuse of personal data. Accordingly, jurisdictions around the world are taking measures to deal with the phenomenon. In this concise but thoroughly researched book – both informative and practical – lawyers from two prominent firms with specialised digital competition teams take stock and examine the state of digital competition in the enforcement practices of six competition authorities in Europe, most of these forerunners in the field of digital competition policy and enforcement. The competition authorities surveyed are those of the European Union, the United Kingdom, France, Germany, the Netherlands and Belgium. For each, an overview, spanning the period from 2012 to mid-2022 but including as many landmark cases as possible up to and including December 2022, includes not only landmark cases in which digital technologies have had a significant impact on the competition law outcome but also guidance documents such as speeches, policy statements, industry surveys and research reports. Activities and enforcement practices of the various authorities include the following and more: degree of activity; focus of the activity; enforcement styles; enforcement instruments; visible effectiveness of enforcement; and important insights and outlooks. Each overview contains separate chapters on cartel prohibition, the prohibition of abuse of a dominant position and merger control. Additional chapters – partially written by guest authors (who are all without a doubt true thought leaders: Tristan Byrne, Giuseppe Colangelo, Ai Deng, Teodora Groza, Daniel Mândrescu, Wolf Sauter, Thibault Schrépel, and Gareth Shier) – evaluate the similarities and differences in the enforcement practices and the positive and negative effects of digital competition in the jurisdictions investigated, the economic context, the most important game changers, and a concluding chapter offers recommendations. An indispensable guide to quickly and accessibly acquiring in-depth knowledge of competition law in the digital sector, this matchless volume is a must-read for any practitioner or academic who encounters competition law related to digital markets. The dilemmas and challenges of the new competition law reality – which is here already, like it or not – are clearly explained here for the benefit of regulators, academics, policymakers, judges, in-house counsel and lawyers specialising in competition law and intellectual property law.




The Almanac of American Employers: The Only Guide to America's Hottest, Fastest-Growing Major Corporations


Book Description

Market research guide to American employers. Includes hard-to-find information such as benefit plans, stock plans, salaries, hiring and recruiting plans, training and corporate culture, growth plans. Several indexes and tables, as well as a job market trends analysis and 7 Keys For Research for job openings. This massive reference book features our proprietary profiles of the 500 best, largest, and fastest-growing corporate employers in America--includes addresses, phone numbers, and Internet addresses.







Advancing Embedded Systems and Real-Time Communications with Emerging Technologies


Book Description

Embedded systems and real-time computing can be useful tools for a variety of applications. Further research developments in this field can assist in promoting the future development of these technologies for various applications. Advancing Embedded Systems and Real-Time Communications with Emerging Technologies discusses embedded systems, communication system engineering, and real-time systems in an integrated manner. This research book includes advancements in the fields of computer science, computer engineering, and telecommunication engineering in regard to how they are used in embedded and real-time systems for communications purposes. With its practical and theoretical research, this book is an essential reference for academicians, students, researchers, practitioners, and IT professionals.




Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID


Book Description

"This book highlights new research regarding wireless identification and sensing platform (WISP) tags, security, and applications, serving as a reference on WISP technology and presenting recent advances in this field"--Provided by publisher.




Mobile Computing and Wireless Networks: Concepts, Methodologies, Tools, and Applications


Book Description

We live in a wireless society, one where convenience and accessibility determine the efficacy of the latest electronic gadgets and mobile devices. Making the most of these technologies—and ensuring their security against potential attackers—requires increased diligence in mobile technology research and development. Mobile Computing and Wireless Networks: Concepts, Methodologies, Tools, and Applications brings together a comprehensive range of voices and research in the area of mobile and wireless technologies, exploring the successes and failures, advantages and drawbacks, and benefits and limitations of the technology. With applications in a plethora of different research and topic areas, this multi-volume reference work benefits researchers, service providers, end-users, and information technology professionals. This four-volume reference work includes a diverse array of chapters and authors covering topics such as m-commerce, network ethics, mobile agent systems, mobile learning, communications infrastructure, and applications in fields such as business, healthcare, government, tourism, and more.




Antitrust and Upstream Platform Power Plays


Book Description

In recent years, large digital platforms have been in the doghouse of antitrust decision-makers worldwide. Antitrust regulators agree, urgent intervention is needed. Interestingly, it is the plight of victimized suppliers—of merchants, app developers, publishers, platform labourers, and the like, who are upstream in the value chain—that has topped the policy agenda, prompting scrutiny of an almost unprecedented intensity. Amid such anxieties, Antitrust and Upstream Platform Power Plays asks a somewhat provocative question: are upstream platform power plays really 'competition problems', and ones for antitrust, at that? The obvious answer—'yes'—is deceptively simple for a number of reasons. First, it contradicts contemporary antitrust's single-minded focus on consumers, which has all but erased supplier exploitation in the brick-and-mortar economy from the policy's radar. Second, the wider antitrust community remains bitterly divided when it comes to judging platform practices. In addition, if any consensus could be had, it would almost certainly confirm the long-standing tenet that antitrust cannot be about supplier welfare, as such. These paradoxes call for a policy introspection—precisely what this book provides. The analysis offered in Antitrust and Upstream Platform Power Plays is altogether normative, theoretical, and practical. Normative because it engages in a supplier-mindful soul-searching exercise, which advances our understanding of antitrust's foundations; theoretical as it sheds multidisciplinary insights on upstream effects in the platform economy and develops new frameworks for rationalizing them; and practical since it takes a deep dive into the complex antitrust machinery while staying attuned to other available levers of public action. Answering a compelling question with an equally compelling answer, this work will appeal to scholars and policymakers worldwide with a particular interest in platform regulation, antitrust, and powerful digital platforms.




Improving Security, Privacy, and Trust in Cloud Computing


Book Description

Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike.




A Comprehensive Guide for Web3 Security


Book Description

With the recent debacle of cryptocurrency exchange FTX and the crypto trading company Alameda Research, the importance of comprehending the security and regulations of Web3, cryptocurrency, and blockchain projects has been magnified. To avoid similar economic and security failures in future Web3 projects, the book provides an essential guide that offers a comprehensive and systematic approach to addressing security concerns. Written by experts in tech and finance, it provides an objective, professional, and in-depth analysis of security and privacy issues associated with Web3 and blockchain projects. This book highlights the security related to foundational Web3 building blocks such as blockchain, crypto wallets, smart contracts, and token economics, and describes recommended security processes and procedures for Web3 application development such as DevSecOps, data analytics, and data authenticity via the oracle. Moreover, the book discusses the legal and regulatory aspects of Web3 and the reasons behind the failures of well-known Web3 projects. It also contains detailed case studies of web3 projects, analyses of the reasons for their failures, and some pending legal cases. This book is an excellent resource for a diverse range of readers, with particular appeal to web3 developers, architects, project owners, and cybersecurity professionals seeking to deepen their knowledge of Web3 security.




Plunkett's InfoTech Industry Almanac


Book Description

Plunkett's InfoTech Industry Almanac presents a complete analysis of the technology business, including the convergence of hardware, software, entertainment and telecommunications. This market research tool includes our analysis of the major trends affecting the industry, from the rebound of the global PC and server market, to consumer and enterprise software, to super computers, open systems such as Linux, web services and network equipment. In addition, we provide major statistical tables covering the industry, from computer sector revenues to broadband subscribers to semiconductor industry production. No other source provides this book's easy-to-understand comparisons of growth, expenditures, technologies, imports/exports, corporations, research and other vital subjects. The corporate profile section provides in-depth, one-page profiles on each of the top 500 InfoTech companies. We have used our massive databases to provide you with unique, objective analysis of the largest and most exciting companies in: Computer Hardware, Computer Software, Internet Services, E-Commerce, Networking, Semiconductors, Memory, Storage, Information Management and Data Processing. We've been working harder than ever to gather data on all the latest trends in information technology. Our research effort includes an exhaustive study of new technologies and discussions with experts at dozens of innovative tech companies. Purchasers of the printed book or PDF version may receive a free CD-ROM database of the corporate profiles, enabling export of vital corporate data for mail merge and other uses.