Copyrighted Software: Separating the Protected Expression from Unprotected Ideas, a Starting Point J Dianne Brinson

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Software: Separating the Protected Expression from Unprotected Ideas, a Starting Point J Dianne Brinson Boston College Law Review Volume 29 Article 2 Issue 5 Number 5 9-1-1988 Copyrighted Software: Separating the Protected Expression from Unprotected Ideas, A Starting Point J Dianne Brinson Follow this and additional works at: http://lawdigitalcommons.bc.edu/bclr Part of the Intellectual Property Law Commons Recommended Citation J D. Brinson, Copyrighted Software: Separating the Protected Expression from Unprotected Ideas, A Starting Point, 29 B.C.L. Rev. 803 (1988), http://lawdigitalcommons.bc.edu/bclr/vol29/iss5/2 This Article is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College Law Review by an authorized editor of Digital Commons @ Boston College Law School. For more information, please contact [email protected]. COPYRIGHTED SOFTWARE: SEPARATING THE PROTECTED EXPRESSION FROM UNPROTECTED IDEAS, A STARTING POINT' J. DIANNE BRINSON * Copyright protects only an author's expression of ideas, not the ideas themselves. Now that it is clear that copyright protects computer programs, courts must do for computer programs what courts have found difficult to do for literary and artistic works — separate ideas from expression. This article offers two principles or suggestions for beginning the process of separating a computer program's unprotected ideas from its protected expression; (I) do not confuse protected expression with program code; and (2) do not confuse a program's unprotected ideas with its function. L INTRODUCTION If we want a computer to solve a particular problem, we must give the computer a "recipe" that spells out the exact steps which the computer must execute to reach that problem's solution.' The recipe must be written so precisely that the computer can follow the instructions, and it must be written in a form of notation (code) that the computer can mechanically comprehend. 2 The recipe that instructs the computer is called a pro- gram. 5 Programs commonly are referred to as "computer software."' A computer can do only what it is instructed to do. A person must write the program that instructs the computer. In the United States, authors of computer programs may claim copyright protection for their works. 5 The exclusive rights of copyright give the creator of a computer program valuable protection against unauthorized copying and t Copyright © Boston College Law School. * Associate Professor of Law, Georgia State University College of Law, Atlanta, Georgia; J.D., Yale Law School (1976); B.A., Duke (1973); admitted to the bar in Georgia and California. 1 S. ALAcac & M. ARRAS, THE DESIGN or WE1,1.-STRUCTURED AND CORRECT PROGRAMS 1 (1978). Id, Although a computer cannot think, it can execute correctly written instructions faster than a human could. See R. SAI:I'MAN, COPYRIGHT IN COMVUTER-READABLE WORKS 59 (1977). 3 S. Ai,, etc & M. AMR, 1- 14plil note 1, at 1. "Software", in its broadest sense, includes everything in a computer system that is not "hard- ware," the physical components of the computer that actually perform operations. This broader definition of software includes, in addition to programs, such related material as documentation, Ilow charts, and user manuals. Note, Defining the Scope of Copyright Protection for Computer Software, 38 S'I'AN. L. RE\'. 497, 500 (1986). For a more detailed discussion of the term "software" sec Keplinger, Computer' Software — Its Nature and Rs Protection, 30 EMORY L.J. 483, 484-88 (1981). ' See, e.g., Whelan Assocs. v. Jaslow Dental Laboratory, Inc., 797 F,2,1 1222, 1223 (3d Cir. 1986), cert. denied, 107 S. Ct. 877 (1987); Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240, 1247 (3d Cir. 1983). See generally I M. NIMMER, NIMMER ON COPYRIGHT § 2.04[C] (1987). There is also an international trend toward i;opyright protection for software. Oman, Software As Seen by the U.S. Copyright Office, 28.IDEA 29, 33 (1987). The work Intellectual Properly Rights in an Age of Electronics and Informaiiim (1986) [hereinafter OTA Report], prepared by the Office of Tech- nology Assessment (OTA), "examines the impact of ... advances in communication technologies on [our) intellectual property system." Id. at iii. 803 804 BOSTON COLLEGE LAW REVIEW [Vol. 29:803 use of the work.° Copyright protection extends, however, only to the author's "expres- sion" of ideas, and not to the underlying ideas used by that author. Ideas are open to everyone, and others are free to study a copyrighted work and take its ideas.' Now that it is dear that software is protected by copyright, software producers are bringing copyright infringement suits to stop the unauthorized sale of alleged clones of their copyrighted programs. The defendant's position in such a case is likely to be that the defendant took merely unprotected ideas from the plaintiff's work." Such a defense requires the court to separate a program's protected expression from its unprotected ideas. In literature and drama, the more traditional areas of copyright, courts have, for years, had trouble separating expression from ideas." Courts now must distinguish between ideas and expression for computer programs, works written in technical code language for the purpose of instructing computers. The dividing line between idea and expression, elusive in literature, cannot easily be drawn for programs. As one federal district court judge noted recently, "computer programming ... [isj not readily compre- hended by the uninitiated. The challenge of counsel to make comprehensible for the court the esoterica of bytes and modules is daunting." 1 ° The purpose of this article is to suggest a starting point for separating a program's ideas from its expression. This starting point consists of two principles. First, do not confuse protected expression with the program code. A program's protected expression is not limited to the literal code of the program. Second, do not confuse a program's unprotected ideas with its function. A program, whatever its function, contains many unprotected ideas. These two principles, drawn from non-software copyright cases, discussed in Part 11 of this article, and from program design concepts, discussed in Part 111 of this article, are the focus of Part IV of this article. The Third Circuit's recent decision in Whelan Associates v. faslota Dental Laboratory, I ac., 1 one of the cases discussed in Part I V, recognizes the first principle but not the second principle. Part V hypothesizes that if courts 'I Software is easily duplicated within the computer in a process that resembles the audio taping of a record. Piracy here and abroad is a major problem for the U.S. software industry. See OFFICE. OE COMPUTERS AND BUSINESS EQUIPMENT, U.S. DEPARTMENT or CommEncal, A COMPETITIVE AssEss- str.n•r OE THE U.S. SOFFWARE INDusTkv 51-52 (1984) [hereinafter REPORT]. With the appearance of the microcomputer and personal computers in the late 1970s, the software market increased dramatically, The distribution of mass-marketed programs for such microcomputers as the IBM l'C has become a multibillion dollar industry. Note, Copyright Protection of Computer Software, 5 COMPUTER LAW J. 413, 416 ii.10 (1985). 'The distinction between the protected expression and the unprotected ideas originated in Baker v. Selden, 101 U.S. 99 (1879). The present version of the federal copyright statute codifies the idea/expression dichotomy, stating in part that "in no case does copyright protection ... extend to any idea ...." 17 U.S.C. 102(h) (1982). See generally 3 M. NIMMER, NIMMER ON COPYRIGITF § 13.03[A] (1987); infra notes 52-63 and accompanying text. " E.g., Whelan Assocs. v. Jaslow Dental Laboratory, Inc., 797 F.2d 1222 (3d Cir. 1986), cert. denied, 107 S. Ct. 877 (1987). See infra Section IV for other cases analyzing this defense. See infra Section 11 D. Q-Co Indus. v. Hoffman, 625 F. Stipp. 608, 610 (S.D.N.Y. 1985). 11 797 F.2(1 1222 (3d Cir. 1986), cert. denied, 107 S. Ct. 877 (1987). Whelan is the subject of a special forum issue of the journal of Law and Technology. That issue contains lour commentaries on Whelan: Ladd & Joseph, Expanding Computer Software Protection by Limiting the Idea, 2 J.L. & TEcu. 25 (1987); Goldhammer, Computer Programs and Technological Innovation: Testing the Copyright Law, 2 J.L. & TEcii. 17 (1987); Karam, Countervailing Considerations, 2 J.L. & Tam. 25 (1987); and ‘Vessel, Substantial Similarity, 2 J.L. & TECH. 35 (1987). September 1988] COPYRIGHTED SOFTWARE 805 perpetuate the Whelan court's error of extending copyright protection beyond program code, without recognizing that a program contains many unprotected ideas, the result will be that courts will over-protect early developers of software at the expense of later developers. Finally, after discussing the potential impact of the Whelan error, Part V of this article proposes that courts avoid the overprotection problem by recognizing this article's second principle that there are many unprotected ideas subsumed in a computer program's function and by using copyright's traditional "levels of abstraction" analysis. II. THE LAW OF COPYRIGHT A. Copyrightability Copyright law in this country is governed by a federal statute, the Copyright Act of 1976. 12 Copyright protection arises automatically when an author fixes an original work in any tangible medium of expression." Under the statute the owner of a copyright may register his or her copyright claim with the Copyright Office, but no registration is required to create the rights of copyright." Registration is, however, a prerequisite to initiating an action for copyright infringement." Although copyright protects only original works, an author meets the originality requirement by simply creating the work. Originality requires neither novelty nor uniqueness.'" To be original, a work need only be created independently by the author Pub.
Recommended publications
  • CRAY X-MP Series of Computer Systems
    For close to a decade, Cray Research has been the industry leader in large-scale computer systems. Today, about 70 percent of all supercomputers installed worldwide are Cray systems. They are used in advanced scientific and research Eaboratories around the world and have gained strong acceptance in diverse industrial environments. No other manufacturer has Cray Research's breadth of success and experience in supercomputer development. The company's initial product, the CRAY-I Computer System, was first installed in 1976and quickly became the standard for large-scale scientific computers -and the first commercially successful vector processor. For some time previously, the potential advantages of vector processing had been understood, but effective practical implementation had eluded computer architects. The CRAY-1 broke that barrier, and today vectorization techniques are used commonly by scientists and engineers in a wide variety of disciplines. The field-proven GRAY X-MP Computer Systems now offer significantly more power tosolve new and bigger problems while providing better value than any other systems available. Large memory size options allow a wider range of problems to be solved, while innovative multiprocessor design provides practical opportunities to exploit multitasking, the next dimension of parallel processing beyond vectorization. Once again, Cray Research, has moved supercomputing forward, offering new levels of hardware performance and software techniques to serve the needs of scientists and engineers today and in the future. Introducing the CRAY X-MP Series of Computer Systems Announcing expanded capabilities to serve the needs of a broadening marketplace: the CRAY X-MP Series of Computer Systems. The CRAY X-MP Series now comprises nine models, ranging from a uniprocessor version with one million words of central memory to a top-end system with four processors and a 16-million-word memory.
    [Show full text]
  • UC ONLINE* Berkeley's Multiloop Computer Control Program
    ti Na classroom UC ONLINE* Berkeley's Multiloop Computer Control Program ALAN S. FOSS course, my colleagues, because there is seldom a sec­ University of California ond. Not everyone will agree with that of course, and Berkeley, CA 94720 those that do will ask, "How?" ULTILOOPS ABOUND. They are all around us. HERE'S HOW We invent these intricate control systems and M Imagine that you have a computer program that apply them to distillation columns, fired heaters, reac­ permits the user to configure any multiloop control tors, steam systems. They are the "brains" and "nerv­ system he desires for a particular process, say the ous system" of chemical processes. Processes need system shown in Figure 1 for a distillation column. them to operate and to operate safely. And suppose such a control system accepts process That's news? Not at all. Everyone has known it for "measurements" from a dynamic simulation of the col­ generations. Everyone, that is, except the students in umn and delivers its "commands" to that same simula­ our process control courses here in the States.** tion. With the keyboard command That's got to change! And the change has to be made in the first course in process control-the first YC, KP = 10, KI = 20, FREQ = 5 the user sets the proportional- and integral-gain pa- Reflux, L Feed Z,F,Q Author Alan Foss writes that "ofter a quarter of a century of search­ ing for ways to tell Californians about process control, I om still search­ ing. The article published here reports one of the 'finds' along the way.
    [Show full text]
  • Defense Data Network (DDN) Comply with the Official Dod Military Standard (MIL-STD) Protocols
    LIBRARY KB:~50002 RESEARCH REPORTS DIVISION NAVAL POSTGRADUATE SCHOOL MONTEREY, CALfFORNIA 93940 DEFENSE COMMUNICATIONS AGENCY // <2--«y" ^DN PROTOCOL IMPLEMENTATIONS AND VENDORS GUIDE AUGUST 1987 [M^ V. 7 i-" ^n^^^^^TK. DEFENSE COMMUNICATIONS AGENCY DDN PROTOCOL IMPLEMENTATIONS AND VENDORS GUIDE AUGUST 1987 Editor Francine Perillo Additional copies of this document may be obtained from the DDN Network Information Center, SRI International, 333 Ravenswood Avenue, Room EJ291, Menio Park, CA 94025. Price is $30.00 domestic, $35 overseas. Copies may also be obtained from the Defense Technical Information Center (OTIC), Cameron Station, Alexandria, VA 22314. It is the intent of the DDN Network Information Center (NIC) to make the DDN Protocol Implementations and Vendors Guide widely available to subscribers of the DDN. The Guide may be obtained in hardcopy or machine-readable form. Hardcopy is available from the NIC for $30.00 ($35.00 overseas) to cover the costs of reproduction and handling. Send check or purchase order to the DDN Network Information Center, SRI International, Room EJ291, 333 Ravenswood Avenue, Menlo Park, CA 94025. Copies are available online to DDN users who have access to the file transfer services, FTP or KERMIT, using pathname NETINFO:VENDORS-GUIDE.DOC. The online file is updated on a continual basis. The hardcopy version is published twice a year in February and August. DDN Protocol Implementations and Vendors Guide. Printed and bound in the United States of America. Published by the DDN Network Information Center, SRI International, Menlo Park, CA 94025. Date: August, 1987 u NOTICE The DDN Protocol Implementation and Vendors Guide is for informational purposes only.
    [Show full text]
  • DDN (Defense Data Network) Protocol Implementations and Vendors Guide
    D-RI92 196 DON (DEFENSE DATA NETUORK) PROTOCOL IMPLEMENTATIONS AND 1/'4 VENDORS OIJIDE(U) SRI INTERNATIONAL MENLO PARK CA DON NETUORK INFORMATION CENTER D J OAKLEY ET AL. FEB ES F/ 25/ L NIC- 2 C2ES-S?-C-20 W U:CLAS SIFIED smmhhomhhhhhm smmhmmhhhhhhhu mhhhmmhhhhmhh ! -11, R""-F, "'lP TEST CHART - U" " . I-".. " -"-" '..-G ,-" ,,-.-,-.- --.-- ".:- " " ""I'" "".-" -6 *, .-. ,,, ,.- 'L, . ,•,.. " ,. p . UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAG REPORT DOCUMENTATION PAGE I&. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 12a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/AVAILABIUTY OF REPORTb _____________________________________ Distribution Statement A. 2b. DECLASSIFICATION I DOWNGRADING SCHEDULE Approved for public release. Distribution unlimited. 4. PERFORMING ORGANIZATION REPORT NUMBER(S) 5. MONITORING ORGANIZATION REPORT NJUMBER(S) NIC 50002 Ea. NAME OF PERFORMING ORGANIZATION 6b. OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION SRI International (If applicable) Defense Data Network DDN Network Information CentIr Defense CommunicationF Svstem 6c. ADDRESS (City, State, and ZIP Code) 7b. ADDRESS (City,' State, "n ZIP Code) Menlo Park, CA 94025 McLean,VA 22102 Ba. NAME OF FUNDING /SPONSORING 8b. OFFICE SYMBOL 9. PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATIONI (ifapplicable) 8c. ADDRESS (CIty. State, and ZIP Code) 10. SOURCE OF FUNDING NUMBERS ELEMENT NO. NO. NO. IACCESSION NO. 11. TITLE (Include Security Classificati on) DDN Protocol Implementations and Vendors Guide .. ,,--. 12. PERSONAL. AUTHOR(S) Oakley, Daniel; Perillo, Francine, eds. __________________ 13a. TYPE OF REPORT 13b. TIME COVERED 14. DATE OF REPORT (Year, Month, Day) S. PAGE COUNT FROM _____TO ____ 880200 20 16. SUPPLEMENTARY NOTATION . FIELD GROUP SUB-GROUP Transmission Control Protocol/ Internet Protocol; TCP/IP; 17. COSATCODESVe18. sC TERMS;(CI impleeencsaiond; DeensebokNetwer) Dat ; DDN; DDN protocol suite.
    [Show full text]
  • Republica Del Peru Ministerio De Energia Y Minas Direccion General De Electricidad
    REPUBLICA DEL PERU MINISTERIO DE ENERGIA Y MINAS DIRECCION GENERAL DE ELECTRICIDAD EVALUACION DEL POTENCIAL HIDROELECTRICO NACIONAL VOLUMEN 11 METODOLOGIA y RESULTADOS REPUBLlCA FEDERAL DE ALEMANIA SOCIEr)AD ALEMANA DE COOPERACION TECNICA, GTZ CONSORCIO LAHMEYER -SALZGITTER, LIS EVAlUACION DEL POTENCIAL HIDROElECTRICO NACIONAL VOLUMEN 11: METODOlOGIA y RESULTADOS 1. DESCRIPCION DEL PAIS 1.1 DESCRIPCION GEOGRAFICA, HISTORICA y ADMINISTRA TIVA 1.1 1.1.1 Descripci6n Geográfica 1.1 1.1.2 Descripci6n Hist6rica y Administrativa 1.3 1.2 GEOLOGIA y SISMOLOGIA 1.5 1.2. 1 Geomorfología General del Perú 1.5 1.2.2 Problemas Geol6gicos Especificos del Perú 1.8 1.2.3 Sismología 1.9 1.3 CLIMA 1.11 1.4 HIDROGRAFIA 1. 12 2. INFORMACION SOBRE El SECTOR ELECTRICIDAD Y PRO YECTOS DE RECURSOS HIDRAUlICOS 2. 1 EL SECTOR ElECTRICO 2. 1 2.1.1 Breve Reseña Hist6rica de 1a Electricidad en el Perú 2. 1 2.1.2 Estructura Orgánica del Sector Eléctrico 2. 1 2.1.2.1 El Ministerio de Energía y Minas 2.2 2.1.2.2 Electroperú 2.2 2.1.2.3 Empresas Estatales Asociadas 2.4 2.2 INSTALACIONES HIDROElECTRICAS EXISTENTES y EN CONSTRUCCION 2.4 2.2.1 Capacidad Instalada 2.4 2.2.2 Sistemas Interconectados 2.4 2.2.2.1 Sistema Interconectado de la Regi6n Central 2.4 2.2.2.2 Sistema Interconectado de la Regi6n Norte 2.10 2.2.2.3 Sistema Interconectado de la Regi6n Sur-Oeste 2. 10 2.2.3 Autoproductores 2. 10 2.3 INVENTARIO DE PROYECTOS HIDROELECTRICOS 2.10 2.4 INSTALACIONES DE IRRIGACIONES EXISTENTES y EN CONSTRUCCION 2.11 3.
    [Show full text]
  • Renovate License Agreement
    TThhee UUsseerr''ss MMaannuuaall Copyright © 1984 – 2000 P. O. Box 3581 Boulder, Colorado 80307-3581 U.S.A. www.SimuLogics.com Notice SimuLogics, Inc. (SLI) has prepared this manual for use by its personnel, licensees and customers. The information existing herein contains valuable properties and trade secrets of SimuLogics embodying substantial creative efforts and confidential information, ideas and expressions, and shall not be reproduced in whole or in any part, in any form whatsoever, including electronic or magnetic, without SimuLogic 's express prior written permission. SLI reserves the right to make changes in specifications and other information contained in the document without prior notice. Use of this product is governed by a SLI Software License Agreement, and use of this product indicates acceptance of the terms of this agreement. The text of this agreement is reprinted in the first section of this manual. The terms and conditions set forth in this agreement constitute the sole agreement between SLI, its OEMs, VARs and/or the user. No representation, information or affirmation of fact contained in this document, including but not limited to statements concerning capacity, capability, performance, suitability for or performance of products described herein shall be deemed to be a warranty by SLI for any purpose, or give rise to any liability of SLI whatsoever. internal version - June, 1994 second version - May, 1998 third version – October, 1998 fourth version – February, 1999 fifth version – February, 2000 part number 200-404d Copyright ã 1984-2000 SimuLogics, Inc. All rights reserved worldwide phone: (303) 466-7717 fax: (303) 465-5780 www.SimuLogics.com VAX and VMS are trademarks of Digital Equipment Corporation.
    [Show full text]
  • OPERATING SYSTEM and APPLICATION SOFTWARE Unit – 1
    OPERATING SYSTEM AND APPLICATION SOFTWARE Unit – 1 Introduction to OS- Distinction Between DOS and Windows- DOS – Internal Commands - Partitioning and Formatting HDD- Introduction to file system- different types file system- and Practical Partitioning and Formatting HDD Drive- Introduction to OS- Types OS- Installation Operating System and Application Stware. Ms fice- Tally and WinZip- Winrar Unit – 2 Repairing windows Operating System Console repairing and graphical repairing and Removing Application Stware’s - MS fice- Tally and WinZip- Winrar -.-Introduction the Stware- Different types the Stware- Difference between Systems stware’s and Application Stware- Third Party Stware - System stware - Overview all system stware - Operating system - I-O Manager – Assembler – Compiler – Linker – Loader. XP Edition Intro- Introduction to XP Pressional and its new Features- Understanding Workgroup and Domain- Upgrading earlier version Windows to XP. Unit- 3 VIRUS- Major Areas VIRUS Attacks- Types Viruses- Anti-Virus and Various Types Antivirus Packages and Tools - Multitasking – Multiprogramming - Time sharing – buffering – spooling - Process and thread management - Concept process and threads - Process states - process management - context switching - Interaction between processes and OS - Multithreading Unit- 4 Process states - process management - context switching - Interaction between processes and OS - Memory management - Memory partitioning – Swapping - Paging - Segmentation - virtual memory - Concepts- Overlays- Demand paging- Performance demand – Paging - Page replacement algorithm - Allocation algorithms Unit 5 File Systems - File concept - File support - Access methods - Allocation methods - Directory systems - File Protection - Free Space management- Understanding User Accounts - The Computer Management Snap-in- Setting Properties User Account- Enabling and Disabling Guest Accounts. 1 | P a g e UNIT - 1 Introduction to OS An operating system is a layer of software which takes care of technical aspects of a computer's operation.
    [Show full text]
  • DDN (Defense Data Network) Protocol Implementations and Vendors Guide
    AND ill PROTOCOL IPLEENTTIONS VENDORS(DEFENSE GUIDE(U) DTA SRINETUORK) INTERNATIONRL MENLO PAIRKCA DDE 7D-AIL?3 66 NETUORKDON INFORNATION CENTER 0 JACOBSEN ET AL. AUG 6 UNCLSSIFIEDNIC-5 6C20C2-4 -C S /G 9/2 NL /: * '....." 1114I 'III a, 12.01.8 'v MICROCOPY RESOLUTION EST CHART NATIONAL BUREAU OF STANDARDS-]963-A ,, . , [0 32. 33-6 ., • . -.. .... , . .. • -., ...u ,, - - . .. , jz_* ", . v .', .. " ' _ .' .. ,' j . ._..'." _Il_.gi,_, -.' PN "7. .. 5.002 .NIC -\......-' DEFENSE COMMUNICATIONS AGENCY (0 DDN PROTOCOL IMPLEMENTATIONS AND VENDORS GUIDE AUGUST 1986 DTIC Sl SELECTE"OCT15 ,S 4D "o.- - '.-.',-7-% C 4* d .~~ ~~..*. ~ . .- ~ ~:.:*:.:.NT L 4. ,,-.,.'ATM;.2i2dj RiP2009 for public Memo, ~ ~ Si s"-ibu-o" Ulimitod 86 9 19 032 REPORT DOCUMENTATION PAGE la. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/ AVAILABILITY OF REPORT Distribution statement A 2b. DECLASSIFICATION /DOWNGRADING SCHEDULE Approved for public release Distribution unlimited I .'z- 4. PERFORMING ORGANIZATION REPORT NUMBER(S) S. MONITORING ORGANIZATION REPORT NUMBER(S) •-'-', NIC 50002 %. 6a. NAME OF PERFORMING ORGANIZATION 6b. OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION SRI International (If applicable) Defense Data Network DDN Network Info, Ctr- Program Management Office 6c. ADDRESS (City, State, and ZIP Code) 7b. ADDRESS (City, State, and ZIP Code) Menlo Park, CA 94025 McLean, VA 22102 Sa. NAME OF FUNDING /SPONSORING 8b. OFFICE SYMBOL 9. PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (fapplicable) 8c. ADDRESS(City, State, and ZIP Code) 10. SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. - 11. TITLE (Indude Security Classification) DDN Protocol Implementations and Vendors Guide (Unclassified) 12.
    [Show full text]
  • Product Specification DRAFT APR 1 31919 TABLE of CONTENTS
    Product Specification DRAFT APR 1 31919 TABLE OF CONTENTS Introducing GDS-II. 1 Database............................................................................................ 3 System Operation. 6 New Products ....................................................................................... 1 5 Background Functions ............................................................................... 19 Multiground R DOS .................................................................................. 24 Hardware. .. 29 Future Products. .. 38 INTRODUCING GDS-II In the intensely competitive semiconductor industry, • Three customized graphics stations for a rapid implementation of new technology means variety of IC applications. success. This demands a production graphic design system that works swiftly, correctly, and without • High-speed, dual-density magnetic tape interruption. GDS-II, CALMA's Graphic Design transport and 300 megabyte storage module System, meets these criteria. drive Standard GDS-II features and facilities include: General Description • Complete on-line design capabilities GOS-II provides the ideal interface between designer and computer. It augments the designer's talents by • A VLSI database capable of resolving fea­ conforming to his methods of thinking and working. tures to one part in 4 billion. Drawing from experience with GDS, (the IC industry leader for the past seven years), GDS-II is an on-line • Multiground, real time disk operating system design system that significantly enhances the design allowing
    [Show full text]
  • Software Lock-In and Antitrust Tying Arrangements: the Lessons of Data General, 5 Computer L.J
    The John Marshall Journal of Information Technology & Privacy Law Volume 5 Issue 3 Computer/Law Journal - Winter 1985 Article 2 Winter 1985 Software Lock-In and Antitrust Tying Arrangements: The Lessons of Data General, 5 Computer L.J. 329 (1984) Charles H. Helein Follow this and additional works at: https://repository.law.uic.edu/jitpl Part of the Antitrust and Trade Regulation Commons, Computer Law Commons, Intellectual Property Law Commons, Internet Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Charles H. Helein, Software Lock-In and Antitrust Tying Arrangements: The Lessons of Data General, 5 Computer L.J. 329 (1984) https://repository.law.uic.edu/jitpl/vol5/iss3/2 This Article is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in The John Marshall Journal of Information Technology & Privacy Law by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. SOFTWARE LOCK-IN AND ANTITRUST TYING ARRANGEMENTS: THE LESSONS OF DATA GENERAL by CHARLES H. HELEIN* TABLE OF CONTENTS I. THE DATA GENERAL CASE ................................ 330 A. FACTUAL BACKGROUND .................................. 330 B. PROCEDURAL BACKGROUND .............................. 331 C. TYING ARRANGEMENTS UNDER THE SHERMAN AND CLAY- TON A CTS ................................................. 333 D. GENERAL LEGAL ANALYSIS OF ECONOMIC POWER ........ 335 1. TraditionalMarket Share Analysis .................. 335 2. Uniqueness ........................................... 335 E. JUDICIAL ANALYSIS OF ECONOMIC POWER IN DATA GENERAL .................................................. 336 II. THE NATURE OF SOFTWARE ............................. 339 A. THE STRUCTURE OF OPERATING SYSTEMS ................ 340 B. APPLICATIONS SOFTWARE ................................ 342 III. SOFTWARE LOCK-IN AND THE VIRTUAL OPERATING SYSTEM ....................................................
    [Show full text]
  • Resume for Laird Hariu
    Resume for Laird Hariu Overview: • Authored econometric forecasting models for Chase Manhattan Bank. • Entrepreneur in mini-computer systems business. Had successful start-up. • Lead technologist for Marketing Research firm for over 20 years. Brought them from the mini-computer era to the Internet era. Integrated this firm with much larger international company when it was sold. • Wrote cross tabulation statistics package in C/C++ with over 100K lines, in use for over 20 years. • Wrote ERP package for process manufacturing. • Wrote integrated Order Entry, Billing, Job Cost and Inventory control system for job shop manufacturer. Was used over 20 years. • Wrote an Accounts Payable system for a Market Research firm. • Operating a successful Open Source oriented consulting firm. • Supporting large Learning Management System (Moodle) for thousands of users in the Southeastern PA area. Technical Skills: • Hardware systems: Univac 1108, IBM 370, Data General Nova Mini, Wang Mini, DEC VAX mini, IBM PCs, x86 tower and rack servers, integration, spec and assembly. • Operating Systems: Univac Exec 8, IBM VM370, Data General RDOS, Data General DMS 24, WANG VS-100, VAX VMS, MS-DOS, PC-DOS, SCO Unix, Linux 2.2, Linux 2.4, Linux 2.6, Liniux 3.x, Solaris, Open BSD, Debian, Ubuntu, Red Hat, Windows 95, 2000, 2003, XP, Vista, 7. Windows Server NT, 2000, 2003, 2008. Mac OS-X. • Programming Languages: Assembler, Fortran, RPG, FPG, COBOL, Pascal, C, xBase, Perl, PHP, JavaScript, Postscript, pgSQL, Visual C++, Visual Basic.net, nodeJS, Ruby on Rails, jQuery. • Networking: Active Directory, LDAP, WINS, DHCP, VPN, SSL, DNS, CSU /DSU's, terminal servers, Frame Relay, routers, IPchains firewalls, LAN/WAN, SNMP, Remote access, WWW, terminal emulators, Ethernet Switching, VLANS, VOIP, CIFS, SSH.
    [Show full text]
  • Resume for Laird Hariu
    Resume for Laird Hariu Overview: ● Authored econometric forecasting models for Chase Manhattan Bank. ● Entrepreneur in mini-computer systems business. Had successful start-up. ● Lead technologist for Marketing Research firm for over 20 years. Brought them from the mini-computer era to the Internet era. Integrated this firm with much larger international company when it was sold. ● Wrote cross tabulation statistics package in C/C++ with over 100K lines, in use for over 20 years. ● Wrote ERP package for process manufacturing. ● Wrote integrated Order Entry, Billing, Job Cost and Inventory control system for job shop manufacturer. Was used over 20 years. ● Wrote an Accounts Payable system for a Market Research firm. ● Operating a successful Open Source oriented consulting firm. ● Supporting large Learning Management System (Moodle) for thousands of ​ users in the Southeastern PA area. Technical Skills: ● Hardware systems: Univac 1108, IBM 370, Data General Nova Mini, Wang Mini, DEC VAX mini, IBM PCs, x86 tower and rack servers, integration, spec and assembly. ● Operating Systems: Univac Exec 8, IBM VM370, Data General RDOS, Data General DMS 24, WANG VS-100, VAX VMS, MS-DOS, PC-DOS, SCO Unix, Redhat Linux, Debian Linux, Ubuntu Linux, Solaris, Open BSD, Windows 95, 2000, 2003, XP, Vista, 7, 10. Windows Server NT, 2000, 2003, 2008. Mac OS-X. ● Programming Languages: Assembler, Fortran, RPG, FPG, COBOL, Pascal, C, xBase, Perl, PHP, JavaScript, Postscript, pgSQL, Visual C++, Visual Basic.net, nodeJS, Ruby on Rails, jQuery. ● Networking: Active Directory, LDAP, WINS, DHCP, VPN, SSL, DNS, CSU /DSU's, terminal servers, Frame Relay, routers, IPchains firewalls, LAN/WAN, SNMP, Remote access, WWW, terminal emulators, Ethernet Switching, ​ ​ VLANS, VOIP, CIFS, SSH.
    [Show full text]