1/32
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
How is intellectual property protected
patents
copyrights
trade secrets
trademarks
How much traffic is copyright-infringing material
1/4
History
1790 first copyright law passed
1909 unauthorized copy is something that can be seen or read
1976-1980 include software and databases in authorship
1982 high volume copying is illegal
1992 copies for commercial advantage are illegal
Fair use
legal doctrine promoting freedom of expression by permitting unlicensed used of copyright-protected works in certain occasions
limited used of copyrighted material without permission from copyright owner
Intellectual SIMILAR to physical
ownership
transferability
protection (both)
value
Intellectual DIFFERENT than physical
tangibility
own rights
duration of rights
Sony v Universal City Studios
making copies of tv shows are not copyright infringement, it is fair use
Reverse engineering
reverse engineering does not violate copyright if new work is unique to og work
Look and feel
court decisions do not use copyright protection for look and feel
DeCSS
software program that bypasses Content Scrambling System, get to access copyrighted material
Creative Commons
enables an author to explicitly specify permissions
Commercial software, aka proprietary software
sold in object code, code run by computer, not legible to people
Free software advantages
more people can use and benefit
a lot of programmers can quickly fix issues
programs can be adapted and improved by other users/programmers
Copyleft
developer copyrights program, lets other developers use the program ONLY if they apply the same agreement to the new work. CANNOT add restrictions
Patent trolls
companies creating lots of patents but do not make any products, they sell patents to other companies
Induced infringement
a person encourages another person to directly infringe on a patent
How long do copyrights last
lifetime of author + 75 years
movie: 95 years
How long do patents last
before 2015: 14 years
after 2015: 15 years
How long do patent plants lasat
20 years
Hacking
intentional unauthorized access to computer systems
White hat hacker
hacker to expose vulnerabilities and improve security
Black hat hacker
hacker to induce harm on person/organization
Gray hat hacker
hacker uses skills to find vulnerabilities, publishes findings before telling owner
Responsibility to prevent access
publishers must PREVENT material from being accessed in countries where they are illegal
Authority to prevent entry
government A will act on their rules in terms of illegal material, but cannot enforce people to not use material in government B if it’s legal there
Why do companies work in teams?
greater intellect
broader experience
diverse education
different successes & failures
Questions to ask w.r.t. working in teams
who should be in team
what should skill mix be
what should skill level be
team training?
should everyone stay
how to facilitate
what’s the right size?
Fundamental teamworking skills
participate ethically, dignity & respect
communicate
collaborate
negotiate
problem solve
Listening vs. Talking
listen > talk
Verification and Validation
procedures to check if system meets requirements/specifications
Validation
assurance system meets needs of customer
Verification
evaluation of whether system complies with specifications
Reliability
metric measuring degree to which system is validated