Skip to main content

Home/ GC_CSC350_SP08/ Group items tagged computing

Rss Feed Group items tagged

Danny Thorne

US CODE: Title 17,101. Definitions - 0 views

  • A “computer program” is a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result.
  • “Copies” are material objects, other than phonorecords, in which a work is fixed by any method now known or later developed, and from which the work can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device. The term “copies” includes the material object, other than a phonorecord, in which the work is first fixed.
  • “Copyright owner”, with respect to any one of the exclusive rights comprised in a copyright, refers to the owner of that particular right.
  • ...3 more annotations...
  • A work is “created” when it is fixed in a copy or phonorecord for the first time; where a work is prepared over a period of time, the portion of it that has been fixed at any particular time constitutes the work as of that time, and where the work has been prepared in different versions, each version constitutes a separate work.
  • “Literary works” are works, other than audiovisual works, expressed in words, numbers, or other verbal or numerical symbols or indicia, regardless of the nature of the material objects, such as books, periodicals, manuscripts, phonorecords, film, tapes, disks, or cards, in which they are embodied.
  • “Publication” is the distribution of copies or phonorecords of a work to the public by sale or other transfer of ownership, or by rental, lease, or lending. The offering to distribute copies or phonorecords to a group of persons for purposes of further distribution, public performance, or public display, constitutes publication. A public performance or display of a work does not of itself constitute publication.
Danny Thorne

Anti-copyright - Wikipedia, the free encyclopedia - 0 views

  • Enforcement mechanisms such as digital rights management endanger existing consumer rights like fair use, and can be used to further tie creators to the corporate entities that control this technology since even a use which may be legally considered fair use may be hampered or rendered impossible by the technological restrictions. "Trusted computing" platforms may refuse to play, display or execute content that is not properly "certified" by central authorities.
  • Article 8 of the Berne Convention may have a chilling effect on freedom of speech
  • without copyright, it would be possible to use DRM without limitations, and fair use and copyleft would be impossible.
Erika Foreman

Digital rights management - Wikipedia, the free encyclopedia - 0 views

  • access control technologies used by publishers and copyright holders to limit usage of digital media or devices
  • Advocates argue it is necessary for copyright holders to prevent unauthorized duplication of their work to ensure continued revenue streams.
  • Some observers claim that certain DRM technologies enable publishers to enforce access policies that not only prevent copyright violations, but also prevent legal fair use.
  • ...3 more annotations...
  • Many online music stores, such as Apple's iTunes Store, as well as certain e-book publishers, have adopted various DRM strategies.
  • Windows Vista contains a DRM system called the Protected Media Path, which contains the Protected Video Path (PVP). PVP tries to stop DRM-restricted content from playing while unsigned software is running in order to prevent the unsigned software from accessing the content.
  • In 2002, Bertelsmann (comprising BMG, Arista, and RCA) was the first corporation to use DRM on audio CDs. This was initially done on promotional CDs, but all CDs from these companies would eventually include at least some DRM.[citation needed] It should be noted that discs with DRM installed are not legitimately standards-compliant Compact Discs (CDs) but rather CD-ROM media, therefore they all lack the CD logotype found on discs which follow the standard (known as Red Book). However, these CDs could not be played on all CD players. Many consumers could also no longer play purchased CDs on their computers. PCs running Microsoft Windows would sometimes even crash when attempting to play the CDs.
nagareochiru

Science Fiction Writer Robert J. Sawyer: Y3K: Artificial Intelligence - 0 views

  • Within a century, it will be possible to scan a human mind and reproduce it inside a machine. Regardless of whether our minds are just very sophisticated analog computers, or whether they have a quantum-mechanical element (as Roger Penrose proposes), we will nonetheless be able to duplicate them artificially.
  • Already, at the close of the second millennium, a transhumanist movement has begun; Christopher Dewdney is the principal Canadian spokesperson for it. This movement holds that uploading our consciousness into machines is desirable, since that will free us from biological aging and death. On the other hand (a decidedly biological metaphor), there is more to being human than just the networks of synapses in our brains; clearly, much of what we are is tied in intimately with our bodies. We may find that uploaded humans are not happy — indeed, are incapable of happiness or any emotion.
  • Just as laws today are moving toward recognizing a woman's right to control her body and any separate sentience that may be contained within it, so too will the laws of the future recognize the right of humans to upload their consciousness and then dispose of the original biological versions of themselves; such eliminations will not be seen as suicides or murders, but rather as a natural, perfectly legal step, eliminating a no-longer-needed biological container and preserving the uniqueness of the individual.
  • ...2 more annotations...
  • It may, in fact, be dangerous to build conscious machines that are more intelligent than we are; just as intelligence may be an emergent property of sufficiently complex systems, so too may ambition and desire be emergent properties of sufficiently intelligent systems.
  • Although we used to consider the mastery of chess to be the pinnacle of human intellectual achievement, we've had to concede that it is simply a mathematical problem, and even today's primitive computers can do it better than the most skilled human. But there are other realms — including art, philosophy, and scientific theorizing — that, because of their intuitive, nonlinear nature, we may always be better at than any machine. Our AI servants may free humanity at the dawn of the fourth millennium to concentrate on these areas.
Danny Thorne

Computational Science and Engineering Education Survey Paper - 0 views

  • This paper surveys undergraduate computational science and engineering (CSE) programs at universities in the United States.
  • also available as a single document (PDF format)
  • Undergraduate Programs
Danny Thorne

BitTorrent (protocol) - Wikipedia, the free encyclopedia - 0 views

  • a typical BitTorrent download will gradually rise to very high speeds, and then slowly fall back down toward the end of the download. This contrasts with an HTTP server that, while more vulnerable to overload and abuse, rises to full speed very quickly and maintains this speed throughout.
  • To share a file or group of files, a peer first creates a "torrent." This small file contains metadata about the files to be shared and about the tracker, the computer that coordinates the file distribution. Peers that want to download the file first obtain a torrent file for it, and connect to the specified tracker, which tells them from which other peers to download the pieces of the file.
Danny Thorne

DMCA | Electronic Frontier Foundation - 0 views

  • In practice, the DMCA and DRM have done nothing to stop "Internet piracy." Yet the DMCA has become a serious threat that jeopardizes fair use, impedes competition and innovation, chills free expression and scientific research, and interferes with computer intrusion laws. If you circumvent DRM locks for noninfringing fair uses or create the tools to do so, you might be on the receiving end of a lawsuit.
Danny Thorne

Unintended Consequences: Seven Years under the DMCA | Electronic Frontier Foundation - 0 views

  • The DMCA Chills Free Expression and Scientific Research.
  • The DMCA Jeopardizes Fair Use.
  • The DMCA Impedes Competition and Innovation.
  • ...1 more annotation...
  • The DMCA Interferes with Computer Intrusion Laws.
Danny Thorne

Perfect 10, Inc. v. Amazon.com, Inc., et al. - Internet Library of Law and Court Decisions - 0 views

  • transformative nature of the thumbnails Google created, which, by facilitating the public’s ability to search the web for images, serve a different purpose than the original images, which are designed to entertain.
  • Google does not store the images contained on such third party web pages in its cache.  Rather, all that these cached copies contain are html instructions setting forth the location on the internet where the image can be found
  • the Copyright Act, unlike the Trademark Act, does not protect a copyright holder against acts that cause consumer confusion.
  • ...6 more annotations...
  • Perfect 10 claimed that by assisting users in locating and obtaining access to third party sites that themselves contained infringing images, Google was guilty of contributory infringement.
  • Said the Ninth Circuit:  “Google’s failure to change it operations to avoid assisting websites to distribute their infringing content may constitute contributory liability …”.
  • The District Court was also directed to determine whether Google was immunized from liability for such contributory infringement claims by operation of the Digital Millennium Copyright Act (“DMCA”).  The DMCA immunizes Service Providers such as Google from liability “for infringement [including contributory infringement] of copyright by reason of the provider referring or linking users to an online location containing infringing material or infringing activity, by using information location tools, including a directory, index, reference, pointer or hypertext link,” if the service provider meets certain specified criteria.  The parties disputed whether Google in fact met such criteria, and qualified for the protections of the DMCA.  This issue was left to the District Court on remand.
  • Google had no contractual or other right to cause such third party websites to stop displaying infringing content.  As such, the Ninth Circuit held, Perfect 10’s vicarious copyright infringement claims were likely to fail.
  • only delivered html instructions – to wit in-line links – to its users, and not the actual images themselves
  • a user’s act of “caching” copies of infringing images in his computer as part of his review of such infringing materials was a fair use protected from claims of copyright infringement.
Danny Thorne

A Gift of Fire: Instructor's Manual - 0 views

  • Student presentation and class discussion topics
Erika Foreman

Print is Dead: Books in Our Digital Age - 0 views

  • Yesterday the world’s third largest record company, EMI, announced that it would begin selling music from its artists as digital downloads without any kind of Digital Rights Management (DRM) or copy restrictions. The songs will have a higher sound quality than your typical iTunes download, but will cost $1.29 instead of the usual $.99. The company made the decision after hearing numerous complaints from its consumers that they preferred having format-less music that could be listened to on any computer or any device, using a multitude of programs.
1 - 12 of 12
Showing 20 items per page