2 December 2013. Deliverables check list  Documentation: updated Functional spec Design doc User manuals Test plan  Code Commented source and how I.

Slides:



Advertisements
Similar presentations
Intellectual Property Image: William J. Wynn.
Advertisements

Intellectual Property (Unit III) 1.  1996, major conference in Geneva to devise a comprehensive international copyright treaty  Record companies, book.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
How to blog your career without breaking your budgets Bill Sodeman billso.com
8 December Logistics  Sitterson 014 at 8 am Tuesday, Dec 14  Inviting all clients  Schedule will depend on client constraints ( once booked)
COMP 381.  Ownership and property  Rights of ownership: Blackstonian Bundle Exclude anyone from the property Use it as sees fit Receive income from.
Copyright Infringement
Social and Ethical Issues Piracy & Copyright. Piracy.
Ownership of Computer Software Ethical Questions and Concerns.
Feb. 2, 2004CS WPI1 CS 509 Design of Software Systems Lecture #3 Monday, Feb. 2, 2004.
ISMT 520 Lecture #6: Protecting Technical and Business Process Innovations Dr. Theodore H. K. Clark Associate Professor and Academic Director of MSc Programs.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Computer Engineering 294 IP R.Smith 5/ Intellectual Property What is it? Why is it important? – What is it designed to do? What are its basic forms?
COMP 381.  Copyright Term author + 70, corporate 95  DRM enabling copying is criminal constrains who can use tracks who is viewing Copyright and DRM.
Applied Software Project Management 1 Introduction Dr. Mengxia Zhu Computer Science Department Southern Illinois University Carbondale.
CS 501: Software Engineering Fall 2000 Lecture 7 Management II Business and Legal Aspects of Software Engineering.
Melanie R. Barber EDUC Dr. D. Wilson October 18, 2010 Copyright Infringement Tutorial.
Cheng-yu yu.  Assign two People every part of Project  Review every line of code  Require codes sign off  Route good code examples for interview 
ACM Code of Ethics and Professionalism (Excerpt)  GENERAL MORAL IMPERATIVES Contribute to society and human well-being Avoid harm to others Be honest.
A Case Study in Success Online How to generate revenue through content marketing.
 Copyright is a form of protection given to authors/creators of original works.  This property right can be sold or transferred to others.
B284 ENTREPRENEURSHIP Unit 2 Notes. Entrepreneurship Today  Knowledge of economics contributes to an understanding of how entrepreneurs and customers.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
INTELLECTUAL PROPERTY COPYRIGHTS, PATENTS AND TRADE MARKS.
7/3/08 Created by Mae Thomas Property Rights There can be consequences if you violate others' intellectual property rights. (That is, if you copy something.
Intellectual property Week 19 Tom Underhill. Intellectual property Patents Registered designs/design rights Case study/Questions/update (DA). Details:
What is Intellectual Property ? Patents- protection of technology Trademarks- protection of domain names and product identity Copyrights- protection of.
COMP 523 DIANE POZEFSKY 20 August AGENDA Introductions Logistics Software Engineering Overview Selecting a project Working with a client.
Conditions and Terms of Use
Introduction to IP Ellen Monson Director Intellectual Property Office University of Cincinnati.
COPYRIGHT in Public Schools © 2007 Amy Hopkins. When you create a unique work, you have created… INTELLECTUAL PROPERTY That is - something you created.
26-Oct-2005cse ip © 2005 University of Washington1 Intellectual Property INFO/CSE 100, Autumn 2005 Fluency in Information Technology
COMP 523 DIANE POZEFSKY 19 August CHAOS REIGNS.
Don’t be an Internet Pirate! A Lesson in Digital Ethics By Mrs. Grann.
21 August Agenda  Introductions  Logistics  Selecting a project  Working with a client.
13 Intellectual Property 1 Aaron Schiff ECON Reading: Cabral p , Deak p
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
The Legal Environment What laws and regulation apply to businesses?
© 2004 West Legal Studies in Business, a Division of Thomson Learning 13.1 Chapter 13 Intellectual Property and Technology.
Class Seven: Intellectual Property Patents, Trademarks and Copyrights.
Copyright and Fair Use. Topics Intellectual Property What is Copyright? What is Fair Use? Common Violations Guidelines TEACH Act 2002.
Intellectual Property (Quinn Chapter 4) CS4001 Kristin Marsicano.
Intellectual Property A brief explanation. Intellectual Property is a name used for material, or something that is intangible. You may not be able to.
The Freedom of Information Act (FOIA) is a law that gives you the right to access information from the federal government. It is often described as the.
AOF Entrepreneurship Unit 3, Lesson 10 Intellectual Property Protections Copyright © 2009–2012 National Academy Foundation. All rights reserved.
1 Ethics of Computing MONT 113G, Spring 2012 Session 32 Software as Intellectual Property.
17 April Reverse Engineering Ethics Privacy Introduction.
21 April  Ownership and property  Rights of ownership: Blackstonian Bundle ◦ Exclude anyone from the property ◦ Use it as sees fit ◦ Receive income.
1104B – Dr. Jackie.  Papers were great!  Everyone hit the mark  Remember to contact me ◦ ◦ On AIM at
HSC: All My Own Work What is copyright and what does it protect? How does it relate to me?
Legal and Ethical Issues in Computer Security Csilla Farkas
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Chapter 18 The Legal Aspects of Sport Marketing. Objectives To introduce the key legal concepts and issues that affect the marketing of the sport product.
Intellectual Property Rights TrademarksTrademarks: protects novel marks & designs used in marketing & advertising for an indefinite period as long as in.
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Entrepreneurship CHAPTER 8 SECTION 1.  When you develop a new product or service, you create an asset that must be protected.  Intellectual property.
Copyright Quiz How Well Do You Know Copyright?. Copyright Quiz: True or False Only materials with a copyright symbol,©, are protected. If it doesn’t have.
Copyright Uppsala 12/ Katarzyna Płaneta-Björnskär Department of Informatics and Media.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
Copyright in the Classroom
ETHICS INTELLECTUAL PROPERTY
COMP 523 Diane pozefsky 24 August 2016.
A Gift of Fire Third edition Sara Baase
Chapter 9 Internet Law and Intellectual Property
Property in Cyberspace
Presentations.
Copyright & Fair Use.
Presentation transcript:

2 December 2013

Deliverables check list  Documentation: updated Functional spec Design doc User manuals Test plan  Code Commented source and how I get to it Running code and instructions (where, what I need installed, any ids needed)  Evaluations Team – You have an INC without this!

Logistics  SN011 at 12 pm Monday, Dec 9  Will invite all clients. Schedule will be posted and ed to clients and you.  15 minute presentations  Lunch (pizza) will be served  Attendance is mandatory

What is Expected  Overview of your project Review what you did and why Briefly explain how you did it ○ Architecture ○ Technologies  Lessons learned Development Process Technologies  Demo

The Basics  Speak loudly and clearly  Speak, don’t read: you ARE the experts  Set up and test demos on Sunday Last minute “fixes” are often disasters  Script your demos  Send me an if you need adapters or other equipment. Do NOT assume that I will remember.

Presentations Hints  Cover all topics, but they don’t need equal time!  Focus on what’s special and interesting about your project  Don’t try to cover too much  Keep it light  Give the audience something to look at

Remember  You’re speaking for 15 minutes  Everyone is listening for 180 minutes

Death by PowerPoint  Google it and you can waste many hours  One that I like…  PowerPoint is Evil (Edward Tufte) PowerPoint is Evil Do not let the media become the message

 Ownership and property  Rights of ownership: Blackstonian Bundle Exclude anyone from the property Use it as sees fit Receive income from Transfer property to someone else  Intellectual property: intellectual objects What is Intellectual Property?

 Physical objects Zero-sum gain: one user at a time Significant cost in both development and replication  Intellectual objects Used by many at once Significant cost in development, marginal cost in replication Intellectual Property v. Real Property

Need for Protection  need to recover the development costs  knowledge of future ownership is incentive to increase value

 Free flow of ideas  First amendment freedom of speech  Creative ideas build on society and culture  Pay what you want Music Textbooks Games Books Software Arguments against IP

 Copyright  Patent  Trademark Legal Protection

 1790: 14 + renew  1909: 28 + renew  1976 : author + 50, corporate 75  1998: author + 70, corporate 95 Copyright: How Long?

 Enabling copying is criminal Preclude through architecture  Problems Constrains who can use ○ Exceptions will be too constrained for someone Tracks who is viewing Digital Rights Management

Digital Millenium Copyright Act (‘66)  Illegal to … bypass technical measures used to protect access manufacture or distribute technologies primarily designed or produced to circumvent technical measures remove or alter copyright management information  Universal City Studios, Inc. v. Reimerdes (Aug ‘00) 8 studios sued 2600 Magazine ○ posting DeCSS bypasses Content Scrambling System (CSS) -commercially distributed DVD

 Responsibility of those enabling it Software Network providers  Cases: software Napster Grockster Bit Torrent  Cases: network providers Verizon Six Strikes Copying copyrighted materials

APIs: Oracle v Google  Issue: Android APIs are very Java-like  Android VM was built in a “cleanroom environment”  Oracle sued over the APIs  Ruling: not copyrightable Ruling: not copyrightable

 Physical objects Process, machine or composition of matter NOT laws of nature, scientific principles, algorithms  Criteria Novel Not previously described Non-obvious Useful Patents

 Hardware, software, processes NOT laws of nature, scientific principles, algorithms  Can patent new applications or combinations  Criteria Novel Not previously described Non-obvious Useful Patents A man "has a right to use his knife to cut his meat, a fork to hold it; may a patentee take from him the right to combine their use on the same subject?" -- Thomas Jefferson

 Processes vs. algorithms  What is non-obvious?  Examples Name Your Price (Priceline) One-click (Amazon)  Opinions Marco Arment (inherently problematic) Marco Arment Paul Graham (patents === software patents) Paul Graham Software & Business Process Patents

Recent Activity  German legislature: resolution calling for cessation  New Zealand considering outright ban  US courts appear to be backing off Bilski v Kappos (Supreme, 2010) ○ Hedging the risk of commodities fluctuation ○ Claims denied CLS v Alice (Circuit, 2013) ○ Trading platform to assure that neither side renigs ○ Claims denied

 Word, phrase or symbol  “Pithily” identifies  Infringement: used by someone else  Dilutions Blurring – dissimilar products Tarnishment – negative or compromising  Has been applied to domain names Cybersquatting Parody or criticism Trademarks

 Cybersquatting.net,.org,.com, … Punctuation (hyphenation, etc.) Phrases, nicknames  Parody, criticism, complaint (cybergriping) Property rights vs. free speech Bringing people to the site under false pretenses Including the name in the url vs. appearing to be the site Domain Names

 Responsibility to users Making it clear that its another site Protection from inappropriate material  Responsibility to other site owners Bypassing advertisements ○ Ticketmaster and Microsoft Hyperlinks

 What are they? Invisible content used for searching and advertising  Geting more leverage Search engines Banner ads  Techniques Multiple tags to get more leverage Tags that are unrelated Metatags

The Process Customer Described Lead Understood Customer Needed Programmer Built Analyst Designed

Patterns of Success  Solutions need to evolve from user specs AND user specs need to evolve from viable solutions.  Process and instrumentation rigor evolves from light to heavy.  Healthy projects display a sequence of progressions and digressions.  Testing needs to be a first class, full lifecycle activity.

Intellectual Honesty McConnell, Code Complete  Refusing to pretend you’re an expert when you’re not  Readily admitting your mistakes  Trying to understand a compiler warning rather than suppressing the message  Clearly understanding your program – not compiling it to see if it works  Providing realistic status reports  Providing realistic schedule estimates & holding your ground when mgmt asks you to adjust

Are all projects worth doing?  Intended misuse  Potential misuse  Unexpected consequences Google glasses

Work  You do well what you enjoy  Smile on your way to work  A job or a career?  Life-long learning exponential times  5 pm: Poornima Vijayashanker Mint.com, 2 more startups