Tuesday, February 5, 2008

Lutos vs. Borland

Questions:

1. Go to your school's computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, and Lotus 1-2-3 spreadsheets programs. Write a brief paragraph summarizing the similarities and differences in the "look and feel" of these two programs.

Answer: For me the different in Excel from Borland is that, all the problems, procedures and formula needed to compute for large quantity of amount can be very easy, because it provides complete instruction for every formula and it is in its quality. I like Excel most especially that I can be able to run an Visual Basic application in Macro. But the only reason why the Borland Excel was being successful, because they just infringing the structure, commands, codes and all those stuffs according to survey, that's the reason they can gather some ideas on how to build same application more quality than the other.

2. the courts took several years to reverse their initial decision and rule in favor of Borland. What impact did this delay have on the software industry? How might things have been different if Borland had received an initial favorable ruling?

Answer: In this accident will result into unfavorable court, for allowing Borland product for several years to the public without knowing its infringement.

3. Assume that you are the manager of Borland's software development. With the benefit of hindsight, what different decisions would you have made about Quattro?

Answer: : If ever I will be the manager of the Quattro and i already know that it is illegal, I will directly resign my employment even if I have my big income every month. because from time to time that the company that you were working on will be facing an invistagetion in court you are assuredly obliged to face the court as a managerin your company and aside to face the court you will be put in prison..

Sunday, February 3, 2008

REALNETWORKS vs. APPLE

WHAT WOULD YOU DO?
Question:
Your friend has emailed you the URL of a new Web site that permits free music downloading. The site maintain a central databases of thousands of the most current and popular music issued thousands of subpoenas to Internet service providers across the United States in attempt to get the names of people offering music on file-sharing networks, such as KaZaA and Grokster, But this is different, isn't it? You are simply downloading from a central database; you're not sharing your music with others. Are there any legal or ethical issues that would keep you from accessing this Web site?

Answer: In this case there is no unethical issue if the condition are meet. The Central Databases that permits users to record and access there web without issuing subpoenas to there users, and there rules is that, after a user finish downloading, sharing and recording is being prohibited. No unethical issues will be acted if it is being follow, but today we can't deny, that some will be againts the law.

Questions:
1. Research the Internet on the status of the Real Networks vs. Apple dispute. Write a one-page summary of your findings.

Answer: Apple Vs. RealNetworks: A Lawyer\'s Perspective, Posted 08-04-2004, 08:37 AM Quote By Jim Dalrymple of MacCentralWill Apple Computer Inc.'s dispute with RealNetworks Inc. over RealNetworks' new Harmony technology have to be settled in court? One lawyer said that Apple has available several legal avenues, each with potential risks for Apple and the burgeoning digital music market.RealNetworks last week introduced Harmony, a technology that allows users of the Real Music Store to download their files onto an Apple iPod, a space Apple has strongly defended for its own music store files. Apple responded, saying that Real's efforts were the "tactics and ethics of a hacker."Apple also cautioned Real that they were investigating the ramifications of the software under the Digital Millennium Copyright Act (DMCA), legislation enacted in 1998 that extended American copyright law to cover digital content. Real claims that they did not violate any laws under the DMCA and said, "consumers, and not Apple, should be the ones choosing what music goes on their iPod.""What they [RealNetworks] are doing is a huge risk, there is no doubt about that," Scott Culpepper, a partner at Atlanta-based law firm Thomas, Kayden, Horstemeyer & Risley, told MacCentral. "I would suspect Apple will file some type of legal action against them -- I'd be very surprised if they don't."It depends on what [RealNetworks] did -- there are several avenues that Apple may have," said Culpepper. The DMCA, general copyright law, and Apple's own license for iTunes all come into play.Read the rest of Mr. Dalrymple's article here.

2. Under what conditions might a court find that RealNetworks violated the DMCA and must stop selling its harmony software products?

Answer: For the Real Network, they violated the Law of DMCA for translating the digital rights of Apple Company, for which the goal is to preserved there products and avoiding copiers to copy there finish products.

3. Under what conditions might a court find that, Real networks did not violate the DMCA and can continue to sell and distribute its Harmony products?

Answer: During the long investigation of the DMCA group surveillance, they found out that the software called Harmony which is being developed from Real Network Company was not designed to disable or remove any digital rights management system. For additional information RealNetwork press release, “Harmony follows in a well-established tradition of fully legal, independent, developed paths to achieve compatibility.

4. Do you think the DMCA should be changed? If so, how should it be changed? If not, why not?

Answer: They must changed there rules, like what was happen to Apple company vs. Real Network. The real network company publish a site called harmony and acted as legal, because they didn't changed the settings of the music they just made the harmony to permit the user to play the music in any music devices..

Wednesday, January 23, 2008

Discussion Question

Question:
A friend contacts you about joining his company, Anonymously Remailers Anonymous. He would like you to lead the technical staff at a 25 percent increase in salary and benefits over your current position. Your initial project would be to increase protection for users of the company's anonymous remailer service. In discussing the opportunity with your friend, you learn that some of the firm's customers are criminal types and purveyors of pornography and hate mail. Although your friend cannot be sure, he admits it is possible that terrorist may use his firm's services. Would you accept the generous job offer?

answer: for me I will not join, because if I join I can't regret to accept any request and if I also join I will be part of there environment. So my choice is only to advise him about the things happening in His firm.

U.S Companies Aid and Abet Chinese Internet Censorship

Questions:

1. The Chinese government frequently emphasizes that its online censorship prevents citizens from accessing pornographic sites, deemphasizing its political censorship. How do you think these two types of censorship differ?

answer: For chinese they do not value political censorship but instead they believed that online censorship or banning prevents citizens from accessing pronographic sites. While Political censorship exists when a government conceals information from its citizens. but basically they reduce the importance of Political censorship.

2. Why have human rights groups critized Cisco and Yahoo! more than other companies that comply with the demands of the Chinese government?

answer: This two IT giant company are critized more than the other companies, because they regulated the human rights groups for reconstructing search engine in order to access to websites that the communist government consider as lust and some other reasons.

3. If U.S companies do not comply with the demands of China's communist government, they may lose business to their competitors. What do you think these companies should do?

answer: They must have to fight and debate. They implemented a comprehensive human rights policy with respect to China and other countries that engage in Internet censorship.

Employee Blogs Raise Freedom-of-Expression Issues

Questions:

1. Do you believe Mark Jen's first Amendment rights were violated by Google? Why or why not?
answer: On his first amendment the google didn't infringe his rights. Why? because at first while he was working in searching the Google's corporate Intranet, which to his surprise was very disorganized. So he made some arrangement and comments, and began advertising it. This is not an offense if he will not include those sensitive information about the Google's company.

2. Employee bloggers sometimes use pseudonyms. Under what conditions the blogging
service might be forced to provide the real identity of the blogger?

answer: From the reading I read, the bogging service employees, are going to provide the real identity of the blogger every time they provide or make. Because providing fake identities of your blog may cause lie to your self, in your company or whatever.

3. Following Mark Jens's dismissal, Google made it clear that it allows employee to maintain blogs and even to post information about problems with Google's blogging services. What reasons might Google have for releasing this information to the public?

answer: Upon releasing some information from the company to the public including problems, advertisement, news etc., will make consumers entirely trustworthy in your services.

Tuesday, December 18, 2007

Echelon--Top-Secret Intelligence System


Questions:

1. Are you for or againts the use of Echelon for eavesdropping on electronic communications? Why or Why not? Is your opinion affected by the terrorist attacks of September 11?

answer: For me I'm not against the use of Echelon, because this eavesdropping project will be an effective tool in trapping enormous crimes that happens in the world. But I'm not infavor aside from the illegal use of this Echelon, because this function is intended only for criminals not for divulging any confidential information.

2. Develop a set of plausible conditions under which the directors of Echelon would authorize using the system to listen to specific electronic communications.

answer: a. It must be use only in trapping crime communications.
b. Only allowed to conject some reports that is with a evidence.
c. Must not be use for some illegal sharing of Information.

3. What sort of expanded or new capabilities might Echelon develop in the next 10 years as information technology continues to improve? What additional privacy issues might be raised by these new capabilities?

answer: To the next future ten years echelon can already handle laguages such as Arabic and Chinese, because from now on they are enhancing the echelon to handle and understand different languages.

Privacy Concerns Curtain Crime-Solving Database

Questions:

1. Matrix uses information that has already been collected and is being used for marketing and other purposes. Why did privacy advocates suddenly sound the alarm when the same data used by marketing groups was accessed by law enforcement officials?

answer: They fear, that this powerful program will create false positives; because bad data or program errors can make innocent person guilty.


2. How have the freedom of Informaion Act and the Privacy Act affected the development and use of Matrix?

answer: The Matrix Intelligence is sophistacated in the part of the public, because public will not be as good public as you have expected without any enforcement that would take part of catching terrorist threats. And by this system soppurters like Matrix, assuredly the terrorist will be decreasing.

3. What Kind of oversight and security, if any, could make Matrix a viable crime prevention tool?

answer: If this could be happen, this problem is considered as recklessness or inattention security without being comitted to work and duty. Also consedered as traitor security without being acknowlegde the importance of Patent.