Posted:


Nearly three years ago, Nick Budidharma, an 18­ year­ old game developer, drove with his parents from Hilton Head, S.C., to live in a “hacker home” that’s connected to the Google Fiber network. Synthia Payne relocated from Denver to launch a startup that aims to let musicians play together in real­-time online. Kansas City -- America’s first Google Fiber city -- has been transformed.

Today, Google Fiber continues to make the Internet faster and more accessible to more people across the country. Michael Slinger, Director of Google Fiber Cities, will testify today before the House Energy and Commerce Subcommittee on Communications and Technology to urge policymakers to play a more active role in expanding nationwide broadband abundance.

Today’s hearing will highlight the expansion of broadband deployment, recent infrastructure developments, and policies that will encourage investment in broadband expansion. Michael will share our experience building out Google Fiber to present ideas for how policymakers can support greater broadband abundance:

“Policymakers’ top broadband goal should be achieving broadband abundance — which requires reducing the cost of network buildout and removing barriers that limit providers’ ability to reach consumers. The key is to focus on competition, investment, and adoption.”

When lawmakers successfully support broadband infrastructure and development, Americans will have more choices at higher speeds, small businesses will have the opportunity to expand, and local economies will grow. Post content

Posted:


Cross-posted on the Google Online Security Blog

As the usage and complexity of software grows, the importance of security research has grown with it. It’s through diligent research that we uncover and fix bugs — like Heartbleed and POODLE — that can cause serious security issues for web users around the world.

The time and effort it takes to uncover bugs is significant, and the marketplace for these vulnerabilities is competitive. That’s why we provide cash rewards for quality security research that identifies problems in our own products or proactive improvements to open-source products. We’ve paid more than $4 million to researchers from all around the world - our current Hall of Fame includes researchers from Germany, the U.S., Japan, Brazil, and more than 30 other countries.

Problematic new export controls 

With the benefits of security research in mind, there has been some public head scratching and analysis around proposed export control rules put forth by the U.S. Department of Commerce that would negatively affect vulnerability research.

The Commerce Department's proposed rules stem from U.S. membership in the Wassenaar Arrangement, a multilateral export control association. Members of the Wassenaar Arrangement have agreed to control a wide range of goods, software, and information, including technologies relating to "intrusion software" (as they've defined that term).

We believe that these proposed rules, as currently written, would have a significant negative impact on the open security research community. They would also hamper our ability to defend ourselves, our users, and make the web safer. It would be a disastrous outcome if an export regulation intended to make people more secure resulted in billions of users across the globe becoming persistently less secure.

Google comments on proposed rules 

Earlier today, we formally submitted comments on the proposed rules to the United States Commerce Department’s Bureau of Industry and Security (BIS). Our comments are lengthy, but we wanted to share some of the main concerns and questions that we have officially expressed to the U.S. government today:

  • Rules are dangerously broad and vague. The proposed rules are not feasible and would require Google to request thousands - maybe even tens of thousands - of export licenses. Since Google operates in many different countries, the controls could cover our communications about software vulnerabilities, including: emails, code review systems, bug tracking systems, instant messages - even some in-person conversations! BIS’ own FAQ states that information about a vulnerability, including its causes, wouldn’t be controlled, but we believe that it sometimes actually could be controlled information. 
  • You should never need a license when you report a bug to get it fixed. There should be standing license exceptions for everyone when controlled information is reported back to manufacturers for the purposes of fixing a vulnerability. This would provide protection for security researchers that report vulnerabilities, exploits, or other controlled information to any manufacturer or their agent. 
  • Global companies should be able to share information globally. If we have information about intrusion software, we should be able to share that with our engineers, no matter where they physically sit. 
  • Clarity is crucial. We acknowledge that we have a team of lawyers here to help us out, but navigating these controls shouldn’t be that complex and confusing. If BIS is going to implement the proposed controls, we recommend providing a simple, visual flowchart for everyone to easily understand when they need a license. 
  • These controls should be changed ASAP. The only way to fix the scope of the intrusion software controls is to do it at the annual meeting of Wassenaar Arrangement members in December 2015. 
We’re committed to working with BIS to make sure that both white hat security researchers’ interests and Google users’ interests are front of mind. The proposed BIS rule for public comment is available here, and comments can also be sent directly to [email protected]. If BIS publishes another proposed rule on intrusion software, we’ll make sure to come back and update this blog post with details.

Posted:
Good patents support innovation while bad patents hinder it. Bad patents drive up costs for innovative companies that must choose between paying undeserved license fees or staggering litigation costs. That’s why today we are excited to launch a new version of Google Patents, which has the power to improve patent quality by helping experts and the public find the most relevant references for judging whether a patent is valid.

The ability to search for the most relevant references--the best prior art--is more important today than ever. Patent filings have steadily increased with 600,000 applications filed and 300,000 patents issued in 2014 alone. At the same time, litigation rates are continuing their dramatic climb, with patent trolls bringing the majority of cases, hitting companies of every size in industries from high-tech to main street. 

Traditional searches often focus on other patents. But the best prior art might be a harder-to-find book, article, or manual. That was true in the “shopping cart” patent case. After many companies paid out millions in settlements, a court finally struck down the patent in light of two books that were not found by the examiner who issued the patent.

The new Google Patents helps users find non-patent prior art by cataloguing it, using the same scheme that applies to patents. We’ve trained a machine classification model to classify everything found in Google Scholar using Cooperative Patent Classification codes. Now users can search for “autonomous vehicles” or “email encryption” and find prior art across patents, technical journals, scientific books, and more.

We’ve also simplified the interface, giving users one location for all patent-related searching and intuitive search fields. And thanks to Google Translate, users can search for foreign patent documents using English keywords. As we said in our May 2015 comments on the PTO’s Patent Quality Initiative, we hope this tool will make patent examination more efficient and help stop bad patents from issuing which would be good for innovation and benefit the public.

Posted by Allen Lo, Deputy General Counsel for Patents and Ian Wetherbee, Software Engineer for Google Patents