You need to go to a better university (in that regards) if it keeps your copyright/patents/etc. Not all do, by any means.
I'm about to finish my senior capstone, in CS, and the university will be publishing it (to be bound in the library because I'm in the Honors program), and I have to give a copy of the code I wrote (to verify that I wrote it). But, I retain the copyright on work itself. It just has to be public, for peer review, etc.
Adobe functionality itself is not the key to winning this "war" the real war is Adobe Plug-ins, I know a t-shirt printing company that has 4 different mac & PCs all in a row so the designer can toggle between something like 10 different versions of adobe photoshop.
And that is because the plugins don't work in other versions, and the designer wants it to work "THIS WAY"... the same way it works in old versions of the plugin/photoshop
also... just to irk Adobe. "I'll photoshop that picture" ;)
Whats the options? I can only see two possibilities, because with the way Corporate America operates now a days... If it isn't illegal they do it, even then... but I digress...
What we would have if this wasn't illegal:
If your EVER speak out against anything your company does, or ever imply in ANY way that you aren't the happiest person ever at their job, that the company should be LEGALLY allowed to fire you?
I know for a fact that our cable company offered Disney channel for free at one point for 3 months to all basic cable subscribers, and then they switched to 3 months free of HBO unless you called in to cancel it (which you could have done with disney... but 'ehh')
You know what happened... I know a lot of people started buying disney after that, b/c they learned to like the channel...
Maybe the real issue here is what the one the dissenting judges are showing us, but not realizing that they are. Hence, the "Truth behind the Truth" statement, it might be the truth that this case of potential fraudulent evidence was handled differently than other cases because this case had additional easy(and obvious) steps to take to validate the evidence. However, The "Truth" behind that one, is that perhaps the normal way of allowing jurors to see potentially fraudulent evidence is lacking.
I don't have the answer to how to fix this, but maybe this is a sign there is an issue somewhere else, at a lower level, within our legal framework. Not, that I'd know where to start to fix it... I'd unfortunately have to leave that up to lawyers... (that could get messy)
I Actually don't think this is entirely "Unintended". I believe they want to make it known to "All"(those with influence) to what level patents have become twisted and corrupted away from their intended purpose(if they were ever actually fulfilling that purpose).
Umm... actually I don't think you understand the point of "evaluating and measuring Android's Dalvik Virtual Machine's efficiency..." I never said one was "Winning" over the other, just that DEX code running in a Dalvik VM is faster than the equivalent c/native code in many cases. (which even google admits "The NDK will not benefit most applications." ( http://developer.android.com/sdk/ndk/overview.html )
I'm not declaring war on the Android NDK or anything. The purpose of my research has been to try and compare these two different tools, and to give guidance on when would be a good point to use native code. As the saying goes: right tool for the job.
Heuristics that only compute bound processes should be put into native code through the NDK, is nice and all, but being able to back it up with facts and statistics of when the breaking-even point is...(for runtime efficiency, ignoring code complexity at this point) thats much better.
Perhaps Programming gods like you don't need academic research, but mere flesh and blood mortals like me can't match your level. So, we'll have to settle on having facts and data to help us make our decisions, not just your omniscience.
I'm currently doing my capstone on evaluating and measuring Android's Dalvik Virtual Machine's efficiency compared to native compiled c code (on the same target device).
Android's DEX code is faster in many cases(obviously not all, process bound are the most ideal for native assembly). This has to due with the nature of a register based virtual machine versus that of a stack based one. Plus, who knows how many optimizations DX and Dalvik use, let alone the just-in-time compiler of the Android platform since 2.2.
From a purely operating system level view of security, Android wins almost every comparison to iOS(but still thats my {educated} opinion on the matter) (Not saying there isn't room for Android's improvement. Namely a major area that can be improved is allowing applications to be installed if they request a certain functionality, such as Internet access, even if you don't wish to give that functionality to the App. Then, blocking that App's ability to access that resource,the Internet in this example)
The folks at CyanogenMod ( http://review.cyanogenmod.com/#change,4055 ) have been discussing and working on this topic and have a potential solution under review currently.
Another potential Issue to address is having a finer grain permission for Internet access. Instead of [android.permission.INTERNET] for any and all Internet access, [ android.permission.INTERNET_ADVERTISEMENTS_AD_MOBI_DOT_COM ] etc. This would allow ad-driven sites to still access updated advertisements, but not to send data to other locations (while still being fully legit {ignoring tunneling information through the advertiser}).
Also... Android VS iPhone... wow... just a flame war waiting to start, but with the new "phones tracking you" news going around, it is worth mentioning that Android only keeps a temporary cache file, that stores approximately the last two days worth of information(This information needs to be cached for a short while, to determine geo-location, direction, speed, etc. for Applications which you want to allow to track you. Such as jogging apps, gps-navigation, etc). Unlike Apple's which never stops collecting information. (and personally that has to add up... months/years of GPS locations isn't going to be small).
Sorry for the rambling. Hope this helps someone make an informed: decision or built opinion. (And yes I am biased also, though I try to remove that from my objective decision making)
I Half wonder if Mike knows who this Anonymous Coward really is.
Are you getting so desperate in your attempts to shoot the messenger (the one trying to help you)
The way "you" sounds in there (twice) sounds to me that Mike is directing it to a single known person, but "ehh".
It would probably be better for plausible deniability if he doesn't admit to that ;) .
(also I think you meant "you're now resorting" instead of the "not" you have in there)
I remember the reviews of Transformers 2 telling me that I'd waste my money if I went, and I enjoyed that movie (other than the two ghetto robots) more than I had enjoyed most other movies I have gone to see in a theater in years.
WHY? : Because I was the target audience. I grew up with Transformers toys, I know that Starscream's original toy was a Veritech repainted, I had an original Optimus Prime, etc.
OHH.. And there were giant robots (that I had known since childhood) fighting on a giant screen... GIANT ROBOTS I TELL YOU , lol
I dunno... I'm already getting sick and tired of "3D" in movies
I purposely went out of my way to go see Gnomeo & Juliet in non-3D, and I was thrilled I did, I enjoyed it more than the 3D films I've watched recently.
Afterwards I thought about it and I came up with these reasons:
1) I didn't have to fumble with the 3D glasses over my real glasses. (hassle before the movie/during)
2) My enjoyment of the storytelling wasn't broken by the fact that I had to "think" about the 3D to see it.
So... Basically 3D has come to be a Rtn(not)B for me
I wonder if Anonymous will decide to target this judge... (I'm not in favor of it actually happening, but... it would be funny to watch{as long as you aren't the one who pissed them off in the first place})
US has had a similar practice for a long time. (you're kinda just expected to use some of your grant money to file for a patent, publish a paper, publish a book, etc. And then you have to have one/many of those to get Tenure here)
The only difference I can see is that they are given money to Specifically go towards Patents and that it is "worth" 3 papers. Look at the CV of a prof here in the US and you'll probably see a few patents on there also (or there were attempts that didn't get approval(Science-related profs, not English/etc)).
I'll give a potential counter-measure to this, for Computer Science at least. Judge profs by how many projects they put into the public domain.
Now, let's play a thought experiment... How many pins are active on the p1? lets say 145 pins(for the sake of nice numbers) that over half of the pins aren't used for logic , and that only 128 pins are used for any type of logic/flow control.
Now.. It would take 2^(128) possible input combinations to test all possible inputs.
Now.. Remember that ICs have memory in them... (let alone complex sequential logic sequential logic)
Now.. 2^(128) different combinations to test... hmm sounds like cryptographically secure to me
Now.. You have to try hundreds.. if not thousands.. of tests for each possible combination of each of these 2^(128) possible inputs...
I'm not sure this is the way to try and test this... (Especially if they put DRM in the chip to stop you from figuring this out, which would mean you are trying to break copyright...{yeah yeah... gov't can do that, but you get my point})
If you know how to do this, in some kinda of way that isn't exponential time... Then please let me know. Normal means to test for fault tolerances in IC isn't going to work b/c we aren't looking for "bad" data, where we know how the chip is designed, we are looking for backdoor access... which can be deeply buried in non-obvious logic areas.
OHHH and do this for every chip on every device every time you buy a device.
Perhaps I'm completely wrong... and the idea that "DRM"-like hardware being inserted into ICs but I don't think so.
I have friends who live in China, I am not attacking China, hence the "evil" in my comment, sorry for omission of -sark-mark- *sigh...*
And about the question of "Hell, do you think that we don't do that with companies in the United States to make sure that there are not any backdoors?" ... Um... Have we done this for MS Windows? Have we done this for... Sony Music CDs? Have we done this for...
I somehow doubt that this is S.O.P. for electronics (NSA/DoD... MIGHT be the exception, but I doubt it)
My original point was that we shouldn't trust production of system critical infrastructure to foreigners (no matter what country they come from). Due to it being too easy to inject some extra little "logic code" into ICs.(that doesn't even have to be on every device, one in a hundred is good enough for "bad" purposes)
US: "We don't trust that you aren't installing backdoor access into your hardware that you are selling us."
China: "Trust us!!"
US:(in an uncommonly wise decision)"Umm... No... We asked security people and they ALL said it was a bad idea."
China:"Then come check us out... see how we don't do anything bad"
China to themselves:"Thats right... check us out once... and approve our hardware for your system critical infrastructure... which the Internet has now become.. then we'll insert backdoors into hardware we sell you later that we can use to spy, sabotage, etc. on you..."
As an aside... All they would have to do is use DRM techniques to hide "code"(instructions, but ehh...) in the hardware, and then have it start 'calling home' in 2 years. Not to equate all DRM with "Evil" China... But still imagine a hardware version of the Sony Root-kit on all the networkings switches installed at banks... or power pants...
Where your hardware is manufactured is an important issue. iPhones are only made in China... They are not approved by DoD use.. but Android phones are... Ever wonder why?
Actually You have no Idea what you are talking about, He is planning to HACK the lawyer's computer by targeting his wife/children.(or at least saying he 'could' plan to do that)... Actually we can only assume that HACKING A LAWYER's computer was _the most legal_ thing they were going to do. 'Implied' blackmail, just telling the guy: it would be a shame if lots of attention was drawn to your family... like how you and your wife(do whatever)... and your kids go to a public school (you wouldn't want their names/pictures getting out all over the internet)... etc.
Personally the potential of exploiting the children is the greatest, and most (i'm kinda hesitant to use this term, because it is over used) but _evil_ thing you can do to a parent.
I dare you to try and do this to a Federal Judge, Congressman... and see what happens to you. (Hell I would say someone from Anon... but we know what happens then)
On the post: Portuguese Politicians Want To Make Creative Commons Illegal
Which University
I'm about to finish my senior capstone, in CS, and the university will be publishing it (to be bound in the library because I'm in the Honors program), and I have to give a copy of the code I wrote (to verify that I wrote it). But, I retain the copyright on work itself. It just has to be public, for peer review, etc.
On the post: How Adobe Drives Infringement Of Its Products Through Incompatibility
Re: Re: Adobe is now...
And that is because the plugins don't work in other versions, and the designer wants it to work "THIS WAY"... the same way it works in old versions of the plugin/photoshop
also... just to irk Adobe. "I'll photoshop that picture" ;)
On the post: Labor Board Continues To Warn Companies Not To Fire People Based On Tweets
So What should be the options?
What we would have if this wasn't illegal:
If your EVER speak out against anything your company does, or ever imply in ANY way that you aren't the happiest person ever at their job, that the company should be LEGALLY allowed to fire you?
On the post: Disney Claims It's Copyright Infringement For Dish To Offer Starz To Non-Premium Subscribers
The stupid now a days makes my head hurt...
You know what happened... I know a lot of people started buying disney after that, b/c they learned to like the channel...
The stupid now a days makes my head hurt...
On the post: Court Says Prosecutors Can't Just Assume A MySpace Profile Is Legit
the "Truth behind the Truth" here...
I don't have the answer to how to fix this, but maybe this is a sign there is an issue somewhere else, at a lower level, within our legal framework. Not, that I'd know where to start to fix it... I'd unfortunately have to leave that up to lawyers... (that could get messy)
On the post: Unintended Consequences Of Google's $900 Million Nortel Patent Bid: Creating New Patent Trolls
So?
On the post: Analyst: Motorola's Best Play Is To Become A Patent Troll & Destroy Android Ecosystem With Patent Lawsuits
Re: Code (not really a) smackdown
I'm not declaring war on the Android NDK or anything. The purpose of my research has been to try and compare these two different tools, and to give guidance on when would be a good point to use native code. As the saying goes: right tool for the job.
Heuristics that only compute bound processes should be put into native code through the NDK, is nice and all, but being able to back it up with facts and statistics of when the breaking-even point is...(for runtime efficiency, ignoring code complexity at this point) thats much better.
Perhaps Programming gods like you don't need academic research, but mere flesh and blood mortals like me can't match your level. So, we'll have to settle on having facts and data to help us make our decisions, not just your omniscience.
On the post: Analyst: Motorola's Best Play Is To Become A Patent Troll & Destroy Android Ecosystem With Patent Lawsuits
Umm... Wow... so biased, and uninformed.
Android's DEX code is faster in many cases(obviously not all, process bound are the most ideal for native assembly). This has to due with the nature of a register based virtual machine versus that of a stack based one. Plus, who knows how many optimizations DX and Dalvik use, let alone the just-in-time compiler of the Android platform since 2.2.
From a purely operating system level view of security, Android wins almost every comparison to iOS(but still thats my {educated} opinion on the matter) (Not saying there isn't room for Android's improvement. Namely a major area that can be improved is allowing applications to be installed if they request a certain functionality, such as Internet access, even if you don't wish to give that functionality to the App. Then, blocking that App's ability to access that resource,the Internet in this example)
The folks at CyanogenMod ( http://review.cyanogenmod.com/#change,4055 ) have been discussing and working on this topic and have a potential solution under review currently.
Another potential Issue to address is having a finer grain permission for Internet access. Instead of [android.permission.INTERNET] for any and all Internet access, [ android.permission.INTERNET_ADVERTISEMENTS_AD_MOBI_DOT_COM ] etc. This would allow ad-driven sites to still access updated advertisements, but not to send data to other locations (while still being fully legit {ignoring tunneling information through the advertiser}).
Also... Android VS iPhone... wow... just a flame war waiting to start, but with the new "phones tracking you" news going around, it is worth mentioning that Android only keeps a temporary cache file, that stores approximately the last two days worth of information(This information needs to be cached for a short while, to determine geo-location, direction, speed, etc. for Applications which you want to allow to track you. Such as jogging apps, gps-navigation, etc). Unlike Apple's which never stops collecting information. (and personally that has to add up... months/years of GPS locations isn't going to be small).
Sorry for the rambling. Hope this helps someone make an informed: decision or built opinion. (And yes I am biased also, though I try to remove that from my objective decision making)
-MAW
On the post: Deconstructing Reasons To Buy
Re: Re:
It would probably be better for plausible deniability if he doesn't admit to that ;) .
(also I think you meant "you're now resorting" instead of the "not" you have in there)
On the post: Google Misreads Complaint From MLB, Blocks Wrong Site
Re: Re: Re:
On the post: Atlas Shrugged Movie Leaves Hollywood Scratching Its Head, Because It's Succeeding Without Them
Transforms 2 Syndrome
WHY? : Because I was the target audience. I grew up with Transformers toys, I know that Starscream's original toy was a Veritech repainted, I had an original Optimus Prime, etc.
OHH.. And there were giant robots (that I had known since childhood) fighting on a giant screen... GIANT ROBOTS I TELL YOU , lol
On the post: Next Generation 'Piracy': Piracy Goes 3D
Tired of 3D already
I purposely went out of my way to go see Gnomeo & Juliet in non-3D, and I was thrilled I did, I enjoyed it more than the 3D films I've watched recently.
Afterwards I thought about it and I came up with these reasons:
1) I didn't have to fumble with the 3D glasses over my real glasses. (hassle before the movie/during)
2) My enjoyment of the storytelling wasn't broken by the fact that I had to "think" about the 3D to see it.
So... Basically 3D has come to be a Rtn(not)B for me
On the post: Judge Says No Anonymity For Anyone Who Visited GeoHot's PS3 Hacking Website Or Watched YouTube Video
Anon will not be pleased
As they say... "It's all for the Lulz"
On the post: The First Rule Of Being A Juror For Barry Bonds' Perjury Case Is You Don't Talk About Being A Juror For Barry Bonds' Perjury Case
Correction?
On the post: How China Is Boosting Patents: Make Professors File Free Patent Applications To Get Tenure
So?
The only difference I can see is that they are given money to Specifically go towards Patents and that it is "worth" 3 papers. Look at the CV of a prof here in the US and you'll probably see a few patents on there also (or there were attempts that didn't get approval(Science-related profs, not English/etc)).
I'll give a potential counter-measure to this, for Computer Science at least. Judge profs by how many projects they put into the public domain.
On the post: Programmer Faces 15 Years In Jail For Planting Virus That Automatically Broke Whac-A-Mole Games
well duh...
On the post: Huawei To US Government: Please Investigate Us
Re: Re: Re:
but Let's examine the Pentium 1 CPU Some Facts
- 273 pins
- 3.1 million transistors
Now, let's play a thought experiment...
How many pins are active on the p1? lets say 145 pins(for the sake of nice numbers) that over half of the pins aren't used for logic , and that only 128 pins are used for any type of logic/flow control.
Now.. It would take 2^(128) possible input combinations to test all possible inputs.
Now.. Remember that ICs have memory in them... (let alone complex sequential logic sequential logic)
Now.. 2^(128) different combinations to test... hmm sounds like cryptographically secure to me
Now.. You have to try hundreds.. if not thousands.. of tests for each possible combination of each of these 2^(128) possible inputs...
I'm not sure this is the way to try and test this... (Especially if they put DRM in the chip to stop you from figuring this out, which would mean you are trying to break copyright...{yeah yeah... gov't can do that, but you get my point})
If you know how to do this, in some kinda of way that isn't exponential time... Then please let me know. Normal means to test for fault tolerances in IC isn't going to work b/c we aren't looking for "bad" data, where we know how the chip is designed, we are looking for backdoor access... which can be deeply buried in non-obvious logic areas.
OHHH and do this for every chip on every device every time you buy a device.
Perhaps I'm completely wrong... and the idea that "DRM"-like hardware being inserted into ICs but I don't think so.
I have friends who live in China, I am not attacking China, hence the "evil" in my comment, sorry for omission of -sark-mark- *sigh...*
And about the question of "Hell, do you think that we don't do that with companies in the United States to make sure that there are not any backdoors?" ... Um... Have we done this for MS Windows? Have we done this for... Sony Music CDs? Have we done this for...
I somehow doubt that this is S.O.P. for electronics (NSA/DoD... MIGHT be the exception, but I doubt it)
My original point was that we shouldn't trust production of system critical infrastructure to foreigners (no matter what country they come from). Due to it being too easy to inject some extra little "logic code" into ICs.(that doesn't even have to be on every device, one in a hundred is good enough for "bad" purposes)
On the post: Huawei To US Government: Please Investigate Us
Re:
On the post: Huawei To US Government: Please Investigate Us
China: "Trust us!!"
US:(in an uncommonly wise decision)"Umm... No... We asked security people and they ALL said it was a bad idea."
China:"Then come check us out... see how we don't do anything bad"
China to themselves:"Thats right... check us out once... and approve our hardware for your system critical infrastructure... which the Internet has now become.. then we'll insert backdoors into hardware we sell you later that we can use to spy, sabotage, etc. on you..."
As an aside... All they would have to do is use DRM techniques to hide "code"(instructions, but ehh...) in the hardware, and then have it start 'calling home' in 2 years. Not to equate all DRM with "Evil" China... But still imagine a hardware version of the Sony Root-kit on all the networkings switches installed at banks... or power pants...
Where your hardware is manufactured is an important issue. iPhones are only made in China... They are not approved by DoD use.. but Android phones are... Ever wonder why?
On the post: HBGary Federal Spied On Families And Children Of US Chamber Of Commerce Opponents
Re: Spying?
Personally the potential of exploiting the children is the greatest, and most (i'm kinda hesitant to use this term, because it is over used) but _evil_ thing you can do to a parent.
I dare you to try and do this to a Federal Judge, Congressman... and see what happens to you. (Hell I would say someone from Anon... but we know what happens then)
Next >>