Lotus Development Corp. V. Paperback Software Int'l

Total Page:16

File Type:pdf, Size:1020Kb

Lotus Development Corp. V. Paperback Software Int'l American University International Law Review Volume 7 | Issue 2 Article 3 1992 Lotus Development Corp. v. Paperback Software Int'l: Copyrightability for the User Interface of Computer Software in the United States and the International Realm Lionel M. Lavenue Follow this and additional works at: http://digitalcommons.wcl.american.edu/auilr Part of the International Law Commons Recommended Citation Lavenue, Lionel M. "Lotus Development Corp. v. Paperback Software Int'l: Copyrightability for the User Interface of Computer Software in the United States and the International Realm." American University International Law Review 7, no. 2 (1992): 289-343. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University International Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. NOTES & COMMENTS LOTUS DEVELOPMENT CORP. v. PAPERBACK SOFTWARE INT'L: COPYRIGHTABILITY FOR THE USER INTERFACE OF COMPUTER SOFTWARE IN THE UNITED STATES AND THE INTERNATIONAL REALM Lionel M. Lavenue* If I have seen further it is by standing on ye shoulders of Giants.' INTRODUCTION Just as computers 2 have become an integral element of the legal * J.D. Candidate, 1992, Washington College of Law, The American University. This Note was submitted to the American Intellectual Property Law Association (AIPLA) for the 1992 Robert C. Watson Award and to the American Society of Com- posers, Authors, and Publishers (ASCAP) for the 54th Annual (1992) Nathan Burhan Memorial Competition. 1. Sir Isaac Newton, Letter to Robert Hooke (February 5, 1675/1676), reprinted in R. MERTON, ON THE SHOULDERS OF GIANTs: A SHANDEAN PosTscRIPT 31 (1965) [hereinafter Newton]. 2. See Stern Elecs. Inc. v. Kaufman, 669 F.2d 852, 853-56 (2d Cir. 1981) (defining the term "computer" and explaining how the device works); Williams Elecs., Inc. v. Artic Int'l, Inc., 685 F.2d 870, 871-74 (3d Cir. 1982) (establishing the definition of an electronic computer). The electronic computer ("computer") performs mathematical and logical functions electronically. A computer consists of hardware and software. Hardware refers to the physically embodied parts of the computer, including the metal box, the circuits (e.g., the central processing unit (CPU)), the input devices (e.g., the keyboard and mouse), the output devices (e.g., the CRT or display screen and the printer or plotter), and the input/output devices (e.g., the internal memory, including random access memory (RAM) and read-only memory (ROM), and the external memory, including the inter- nal or external hard disk drive and 3 and or 5 and ,4 inch disk drives). Williams Elecs., Inc., 685 F.2d at 872. Software, on the other hand, refers to the written instruc- tions, prepared by a human operator, which operates the computer, also called the computer program. Id. 290 AM. U.J. INT'L L. & POL'Y [VOL. 7:289 profession, 3 so has the computer become an essential tool of modern life.' Accordingly, the men and women who make these electronic mar- vels run, these computer programmers, 5 increasingly seek greater pro- tection for the fruits of their labor. 6 Among the sources of intellectual 3. See generally Harrington, Use of LEXIS and WESTLAW Too Is Vital To Any Law Practice, NAT'L L.J., Oct. 12, 1987 at 18 (stating that "lawyers who do not know what LEXIS and WESTLAW offer are practicing law with blinders. They will suffer what they deserve."). 4. See Year of the Computer, TIME, Jan. 1, 1983, at 13 (deeming the computer "'Man' of the Year" and describing the increasing role of computers in modern life). 5. Computer programmers produce two types of computer software: operating sys- tem programs and application programs. Operating system programs-like DOS and OS/2-control the hardware and actually make the machine run. Application pro- grams instruct the computer to perform specific functions-such as word processing, data base management, spreadsheet calculations, or games. Programmers create com- puter programs through the use of a computer language. A machine language program, the lowest-level computer language or a language which the computer's CPU can un- derstand without translation, represents an object program or object code. An assembly language program represents the intermediate-level computer language. Typically, however, most programmers utilize a higher-level computer language which must be translated by a compiler into information that the computer's CPU can understand. A source program or source code, such as FORTRAN, COBOL, PASCAL, BASIC or C, affords the programmer easier access to the control of computer operations. See D. CURTIN & L. PORTER, MICROCOMPUTERS - SOFTWARE AND APPLICATIONS 36-78 (1986) (presenting the structure and mechanisms of the electronic computer); id. at 81-108 (explaining the types of computer software and how a computer program exe- cutes functions and operations on the electronic computer). 6. See Note, The Expansion of the Berne Convention and the Universal Copyright Convention to Protect Computer Software and Future Intellectual Property, 11 BROOKLYN J. INT'L L. 283, 285 (1985) [hereinafter Note, Future Intellectual Prop- erty] (describing the three means by which a programmer may seek protection of a computer program under the auspices of intellectual property: (1) patent law, (2) copy- right law, and (3) trade secret law); see also Schachter, Intellectual Property Takes Center Stage, ELECS., Aug. 1990, at 108 (addressing the development of patent and copyright protection issues for computer software). A patent generally extends a monopoly of limited duration to the inventor of the unique idea, process, or design. J. BAXTER, WORLD PATENT LAW AND PRACTICE 1 (1973). Although each nation's patent laws vary, the International Convention for the Protection of Industrial Property established a system of uniform international treat- ment (or "national treatment"). This Convention provides for reciprocal protection be- tween all signatory countries in that one country affords the same protection to all computer software marketed in another signatory country as that signatory grants to its own nationals. CONVENTION OF PARIS FOR THE PROTECTION OF INDUSTRIAL PROP- ERTY, Mar. 20, 1883, revised at Lisbon, Oct. 31, 1958, 13 U.S.T. 1, T.I.A.S. No. 4931, 828 U.N.T.S. 107. At present, however, only the United States recognizes the patenta- bility of certain types of software. Note, Future Intellectual Property, supra, at 290. See Diamond v. Diehr, 450 U.S. 175, 182-84 (1981) (first establishing the patentability of computer software for a computer program which controlled the curing of tire rubber). Trade secret laws usually encompass an implied contractual relationship between the proprietor and user of an idea, process, or design. 12 BUSINESS ORGANIZATIONS, MIL- GRAM ON TRADE SECRETS § 2.01 (1984). The advantage of trade secret law is theoriti- cal uniformity, in that most nations provide some sort of trade secret protection. Note, Future Intellectual Property, supra, at 296. For mass-marketed computer software, 1992] LOTUS DEV. CORP. property protection, copyright law represents the primary means of se- curing an author's rights in computer software.7 Hence, programmers have turned to the sources of both national and international copyright law in protecting the basic computer program (the literal manifesta- tions of the programmer's work) as well as the programmer's unique expressions of creativity and originality within the work (the nonliteral manifestations of the computer program) . Internationally, copyright law represents a complex system of inter- related agreements through which member-nations honor the copyright laws of other member-nations.9 Because each nation maintains different copyright laws, however, the term "international copyright" presents a somewhat misleading concept. 10 In resolving an international copyright law conflict, the parties look not to some finite body of law known as however, trade secret law fails to provide adequate legal protection, even when the software contains a licensing agreement. Id. at 298-99 (citing M. EPsrEIN, MODERN INTELLECTUAL PROPERTY 217 (1984)). This failure results from the very essence of trade secret law-the secrecy-because trade secret directly contrasts with the re- quired public disclosure of mass-marketed software information. See M. Scorr, Co'- PUTER LAW § 4-25 (1984) (addressing the secrecy requirement of trade secret law); see also T. HARRIS, THE LEGAL GUIDE TO COMPUTER SOFTWARE PROTECTION: A PRACTICAL HANDBOOK ON COPYRIGHTS, TRADEMARKS, PUBLISHING, AND TRADE SECRETS 135 (1985) (addressing the unavailability of trade secret protection after disclosure). A copyright grants the exclusive rights of reproduction, distribution, adaptation, per- formance, and display to the owner for the life of the author plus fifty years. In the case of a corporate author, the protection exists for 75 years after the date of first publication or 100 years after the date of creation, whichever expires first. See J. HEL- LER & S. WIANT, COPYRIGHT HANDBOOK 7 (1984) (describing the general rights of the copyright owner and the term of copyright protection). 7. Note, Future Intellectual Property, supra note 6, at 283. 8. The "nonliteral manifestations of a computer program" include all components
Recommended publications
  • Rights Reserved. Permission to Make Digital Or Hard Copies of All Or Part Of
    Copyright © 1994, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 ELECTRONICS RESEARCH LABORATORY College ofEngineering University ofCalifornia, Berkeley 94720 MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 ELECTRONICS RESEARCH LABORATORY College ofEngineering University ofCalifornia, Berkeley 94720 Microsoft Windows NT And The Competition for Desktop Computing January 1994 Department ofElectrical Engineering and Computer Sciences University ofCalifornia Berkeley, California 94720 Abstract This report contains two papers, An Introduction to Microsoft Windows NT And Its Competitors, and The Status ofWindows NT and Its Competitors At The End of1993. The first paper, written in April 1993,presents an overview of the technology of Windows NT, and analyzes the competitors and competitive factors in the desktop operating system race.
    [Show full text]
  • How Well-Insulated Are Software Developers from Copying of Their Programs' Visual Displays
    Missouri Law Review Volume 61 Issue 1 Winter 1996 Article 14 Winter 1996 Thermal Windows: How Well-Insulated Are Software Developers from Copying of Their Programs' Visual Displays Doug Neville Follow this and additional works at: https://scholarship.law.missouri.edu/mlr Part of the Law Commons Recommended Citation Doug Neville, Thermal Windows: How Well-Insulated Are Software Developers from Copying of Their Programs' Visual Displays, 61 MO. L. REV. (1996) Available at: https://scholarship.law.missouri.edu/mlr/vol61/iss1/14 This Note is brought to you for free and open access by the Law Journals at University of Missouri School of Law Scholarship Repository. It has been accepted for inclusion in Missouri Law Review by an authorized editor of University of Missouri School of Law Scholarship Repository. For more information, please contact [email protected]. Neville: Neville: Thermal Windows: Thermal Windows: How Well-Insulated Are Software Developers from Copying of Their Programs' Visual Displays? Apple Computer, Inc. v. Microsoft Corp.' I. INTRODUCTION Throughout the relatively short history of the computer industry, many disputes have arisen over unauthorized copying of computer programs.2 However, in most of the earlier cases, the disputed copyright protected the actual program code as a literary work rather than the visual display of the program as an artistic work. In Apple Computer, Inc. v. Microsoft Corp., the Ninth Circuit Court of Appeals confronted an alleged copyright violation resulting from copied visual displays Because the disputed copyright protected the displays as artistic works rather than the program code as a literary work, the court was forced to apply established principles in copyright law to an area in which the law is not completely clear.
    [Show full text]
  • The Library for System Solutions End User Interface Reference
    The Library for System Solutions End User Interface Reference Document Number GG24-4107-00 July 1994 International Technical Support Organization Boca Raton Center Take Note! Before using this information and the product it supports, be sure to read the general information under “Special Notices” on page xi. First Edition (July 1994) This edition applies to IBM and non-IBM products for End User Interface development. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address given below. An ITSO Technical Bulletin Evaluation Form for reader′s feedback appears facing Chapter 1. If the form has been removed, comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. 91J Building 235-2 Internal Zip 4423 901 NW 51st Street Boca Raton, Florida 33431-1328 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1994. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Abstract This document is part of the Library for Systems Solutions, which is intended for professionals involved in defining solutions in the heterogeneous computing environments. The library consists of three types of documents: • Computing Technology • Function Reference • Technology Reference This document is the Function Reference book regarding End User Interface. The book consists of two parts.
    [Show full text]
  • Computer Associates V. Altai and Apple V. Microsoft: Two Steps Back from Whelan? Audrey F
    Santa Clara High Technology Law Journal Volume 9 | Issue 1 Article 10 January 1993 Computer Associates v. Altai and Apple v. Microsoft: Two Steps Back from Whelan? Audrey F. Dickey Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Law Commons Recommended Citation Audrey F. Dickey, Computer Associates v. Altai and Apple v. Microsoft: wT o Steps Back from Whelan?, 9 Santa Clara High Tech. L.J. 379 (1993). Available at: http://digitalcommons.law.scu.edu/chtlj/vol9/iss1/10 This Case Note is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. CASE NOTES Computer Associates v. Altai and Apple v. Microsoft: Two Steps Back From Whelan? Computer Associates International,Inc. v. Altai, Inc., 23 U.S.P.Q.2d (BNA) 1241, (2d Cir. 1992). Apple Computer, Inc. v. Microsoft Corp., 799 F.Supp. 1006, (N.D. Cal. 1992). Audrey F. Dickey* In 1986, the Third Circuit, in Whelan Associates v. Jaslow Den- tal Laboratory,1 defined a test f6r copyright infringement of com- puter programs that went beyond simply looking for literal copying of the elements. The court laid the foundation for what has become known as the "look and feel" analysis to determine substantial simi- larity by comparing not only the literal elements, but the sequence, structure and organization of a program.
    [Show full text]
  • A History of the Personal Computer Index/11
    A History of the Personal Computer 6100 CPU. See Intersil Index 6501 and 6502 microprocessor. See MOS Legend: Chap.#/Page# of Chap. 6502 BASIC. See Microsoft/Prog. Languages -- Numerals -- 7000 copier. See Xerox/Misc. 3 E-Z Pieces software, 13/20 8000 microprocessors. See 3-Plus-1 software. See Intel/Microprocessors Commodore 8010 “Star” Information 3Com Corporation, 12/15, System. See Xerox/Comp. 12/27, 16/17, 17/18, 17/20 8080 and 8086 BASIC. See 3M company, 17/5, 17/22 Microsoft/Prog. Languages 3P+S board. See Processor 8514/A standard, 20/6 Technology 9700 laser printing system. 4K BASIC. See Microsoft/Prog. See Xerox/Misc. Languages 16032 and 32032 micro/p. See 4th Dimension. See ACI National Semiconductor 8/16 magazine, 18/5 65802 and 65816 micro/p. See 8/16-Central, 18/5 Western Design Center 8K BASIC. See Microsoft/Prog. 68000 series of micro/p. See Languages Motorola 20SC hard drive. See Apple 80000 series of micro/p. See Computer/Accessories Intel/Microprocessors 64 computer. See Commodore 88000 micro/p. See Motorola 80 Microcomputing magazine, 18/4 --A-- 80-103A modem. See Hayes A Programming lang. See APL 86-DOS. See Seattle Computer A+ magazine, 18/5 128EX/2 computer. See Video A.P.P.L.E. (Apple Pugetsound Technology Program Library Exchange) 386i personal computer. See user group, 18/4, 19/17 Sun Microsystems Call-A.P.P.L.E. magazine, 432 microprocessor. See 18/4 Intel/Microprocessors A2-Central newsletter, 18/5 603/4 Electronic Multiplier. Abacus magazine, 18/8 See IBM/Computer (mainframe) ABC (Atanasoff-Berry 660 computer.
    [Show full text]
  • Graphical User Interface (GUI) Development for an Optical Communication Simulator
    Minnesota State University, Mankato Cornerstone: A Collection of Scholarly and Creative Works for Minnesota State University, Mankato All Graduate Theses, Dissertations, and Other Graduate Theses, Dissertations, and Other Capstone Projects Capstone Projects 2017 Graphical User Interface (GUI) Development for an Optical Communication Simulator Sratsav Ram Shrestha Minnesota State University, Mankato Follow this and additional works at: https://cornerstone.lib.mnsu.edu/etds Part of the Electrical and Computer Engineering Commons Recommended Citation Shrestha, S. R. (2017). Graphical User Interface (GUI) Development for an Optical Communication Simulator [Master’s thesis, Minnesota State University, Mankato]. Cornerstone: A Collection of Scholarly and Creative Works for Minnesota State University, Mankato. https://cornerstone.lib.mnsu.edu/etds/749/ This Thesis is brought to you for free and open access by the Graduate Theses, Dissertations, and Other Capstone Projects at Cornerstone: A Collection of Scholarly and Creative Works for Minnesota State University, Mankato. It has been accepted for inclusion in All Graduate Theses, Dissertations, and Other Capstone Projects by an authorized administrator of Cornerstone: A Collection of Scholarly and Creative Works for Minnesota State University, Mankato. Graphical User Interface (GUI) Development for an Optical Communication Simulator By Sratsav Ram Shrestha A Thesis Submitted in Partial Fulfillment of the Requirements for Master of Science In Electrical Engineering Minnesota State University Mankato, Minnesota November 2017 Date: 11/9/2017 Title: Graphical User Interface (GUI) Development for an Optical Communication Simulator Student’s Name: Sratsav Ram Shrestha This thesis has been examined and approved by the following members of the student’s committee. Dr. Qun Zhang (Chairperson) Dr. Nannan He Dr.
    [Show full text]
  • A Software Framework for Component-Based Operating System Kernels
    THINK: A Software Framework for Component-based Operating System Kernels Jean-Philippe Fassino Jean-Bernard Stefani Julia Lawall Gilles Muller France Tel´ ecom´ R&D INRIA DIKU INRIA∗ [email protected] [email protected] [email protected] [email protected] Abstract are scarce. Third, new hardware and software appear at a rapid rate to satisfy emerging needs. Finally, systems have to be flexible to support unanticipated needs such Building a flexible kernel from components is a promis- as monitoring and tuning. ing solution for supporting various embedded systems. The use of components encourages code re-use and re- Implementing an operating system kernel for such sys- duces development time. Flexibility permits the system tems raises several constraints. Development time to be configured at various stages of the design, up to run should be as short as possible; this encourages system- time. In this paper, we propose a software framework, atic code re-use and implementation of the kernel by as- called THINK, for implementing operating system ker- sembling existing components. Kernel size should be nels from components of arbitrary sizes. A unique fea- minimal; only services and concepts required by the ap- ture of THINK is that it provides a uniform and highly plications for which the kernel is targeted should be em- flexible binding model to help OS architects assemble bbeded within the kernel. Efficiency should be targeted; operating system components in varied ways. An OS no specific hardware feature or low-level kernel func- architect can build an OS kernel from components us- tionality should be masked to the application.
    [Show full text]
  • Creating User Interfaces Using Web-Based Technologies to Support Rapid Prototyping in a Desktop Astrovisualization Software Klas Eskilson
    LiU-ITN-TEK-A--17/062--SE Creating User Interfaces Using Web-based Technologies to Support Rapid Prototyping in a Desktop Astrovisualization Software Klas Eskilson 2017-11-28 Department of Science and Technology Institutionen för teknik och naturvetenskap Linköping University Linköpings universitet nedewS ,gnipökrroN 47 106-ES 47 ,gnipökrroN nedewS 106 47 gnipökrroN LiU-ITN-TEK-A--17/062--SE Creating User Interfaces Using Web-based Technologies to Support Rapid Prototyping in a Desktop Astrovisualization Software Examensarbete utfört i Datateknik vid Tekniska högskolan vid Linköpings universitet Klas Eskilson Handledare Emil Axelsson Examinator Anders Ynnerman Norrköping 2017-11-28 Upphovsrätt Detta dokument hålls tillgängligt på Internet – eller dess framtida ersättare – under en längre tid från publiceringsdatum under förutsättning att inga extra- ordinära omständigheter uppstår. Tillgång till dokumentet innebär tillstånd för var och en att läsa, ladda ner, skriva ut enstaka kopior för enskilt bruk och att använda det oförändrat för ickekommersiell forskning och för undervisning. Överföring av upphovsrätten vid en senare tidpunkt kan inte upphäva detta tillstånd. All annan användning av dokumentet kräver upphovsmannens medgivande. För att garantera äktheten, säkerheten och tillgängligheten finns det lösningar av teknisk och administrativ art. Upphovsmannens ideella rätt innefattar rätt att bli nämnd som upphovsman i den omfattning som god sed kräver vid användning av dokumentet på ovan beskrivna sätt samt skydd mot att dokumentet ändras eller presenteras i sådan form eller i sådant sammanhang som är kränkande för upphovsmannens litterära eller konstnärliga anseende eller egenart. För ytterligare information om Linköping University Electronic Press se förlagets hemsida http://www.ep.liu.se/ Copyright The publishers will keep this document online on the Internet - or its possible replacement - for a considerable time from the date of publication barring exceptional circumstances.
    [Show full text]
  • RSA DLP Support Matrix
    RSA DLP 9.6.2.2 Support Matrix N/A RSA DLP 9.6.2.2 Support Matrix RSA Data Loss Prevention (DLP) consists of three products - RSA DLP Datacenter, RSA DLP Network, and RSA DLP Endpoint. This document helps you to understand the product requirements and the required release compatibility for third party components for all three DLP products. Contents: RSA DLP 9.6.2.2 Product Capabilities ................................................. 1 Policy Templates and Expert Content Blades .................................. 1 DLP Endpoint Capabilities ................................................................ 2 DLP Network Capabilities ................................................................. 2 DLP Datacenter Capabilities ............................................................. 3 RSA DLP 9.6.2.2 Requirements ........................................................... 3 RSA DLP Hardware Requirements .................................................. 3 Enterprise Manager Hardware Requirements ............................ 4 Endpoint Hardware Requirements ............................................. 5 Datacenter Hardware Requirements .......................................... 5 Network Hardware Requirements .............................................. 6 RSA DLP Software Requirements .................................................... 6 Operating System ...................................................................... 6 .NET Framework ........................................................................ 8 Database ...................................................................................
    [Show full text]
  • The Objective-C Programming Language
    Inside Mac OS X The Objective-C Programming Language February 2003 Apple Computer, Inc. Even though Apple has reviewed this © 2002 Apple Computer, Inc. manual, APPLE MAKES NO All rights reserved. WARRANTY OR REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH No part of this publication may be RESPECT TO THIS MANUAL, ITS reproduced, stored in a retrieval QUALITY, ACCURACY, system, or transmitted, in any form or MERCHANTABILITY, OR FITNESS by any means, mechanical, electronic, FOR A PARTICULAR PURPOSE. AS A photocopying, recording, or RESULT, THIS MANUAL IS SOLD “AS otherwise, without prior written IS,” AND YOU, THE PURCHASER, ARE permission of Apple Computer, Inc., ASSUMING THE ENTIRE RISK AS TO with the following exceptions: Any ITS QUALITY AND ACCURACY. person is hereby authorized to store documentation on a single computer IN NO EVENT WILL APPLE BE LIABLE for personal use only and to print FOR DIRECT, INDIRECT, SPECIAL, copies of documentation for personal INCIDENTAL, OR CONSEQUENTIAL use provided that the documentation DAMAGES RESULTING FROM ANY contains Apple’s copyright notice. DEFECT OR INACCURACY IN THIS The Apple logo is a trademark of MANUAL, even if advised of the Apple Computer, Inc. possibility of such damages. Use of the “keyboard” Apple logo THE WARRANTY AND REMEDIES SET (Option-Shift-K) for commercial FORTH ABOVE ARE EXCLUSIVE AND purposes without the prior written IN LIEU OF ALL OTHERS, ORAL OR consent of Apple may constitute WRITTEN, EXPRESS OR IMPLIED. No trademark infringement and unfair Apple dealer, agent, or employee is competition in violation of federal authorized to make any modification, and state laws.
    [Show full text]
  • CPM 2.2 Alteration Guide
    Post Office Box 579, Pacific Grove, California 93950, (408) 649-3896 CP/M 2.2 ALTERATION GUIDE Copyright (c) 1979 DIGITAL RESEARCH Copyright Copyright (c) 1979 by Digital Research. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a· retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of Digital Research, Post Office Box 579, Pacific Grove, California 93950. Disclaimer Digital Research makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any parti­ cular purpose. Further, Digita] Research reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Digital Research to notify any person of such revision or changes. Trademarks CP/M is a registered trademark of Digital Research. IVIP/M, MAC, and SID are trademarks of Digital Research. CP/M 2.2 ALTERATION GUIDE Copyright (c) 1979 Digital Research, Box 579 Pacific Grove" California 1. In t r odu c t ion . 1 2. First Level System Regeneration. 2 3. Second Level System Generation 6 4. Sample Getsys and Putsys Programs • 10 5. Diskette Organization . 12 6. The BIOS Entry Points 14 7 • A Sample BIOS 21 8. A Sample Cold Start Loader 22 9. Reserved Locations in Page Zero. 23 10. Disk Parameter Tables 25 11. The DISKDEF Macro Library • . 30 12. Sector Blocking and Deblocking .
    [Show full text]
  • Document Conversion Add-On the Document Conversion Add-On Allows High Throughput and Conversion of Files Submitted for Server-Side Rendering
    Zetafax Document Conversion add-on The Document Conversion add-on allows high throughput and conversion of files submitted for server-side rendering. Overview Enhancements Using the Document Conversion add-on, the With this add-on, Zetafax is enhanced in the Benefits Zetafax Server can convert over 225 files types, following areas: Extends the list of file types which can be sent including word processing, spreadsheet, presentation, graphics and database files, to Web Client Improves rendering speed, resulting in fax TIFF format without having to install the Users of the Web Client are able to attach files higher throughput. authoring application on the Zetafax Server. of any of the supported file types to new outbound messages. Zetafax converts most regularly used document types, such as word processing documents, Zetafax Automation Toolkit spreadsheets and PDFs, into TIFF format so that Users of the Automation Toolkit can fax file they can be faxed as attachments. The Zetafax attachments of any of the supported file types Client will also convert files in the following from third party applications, because Zetafax formats to faxes: ASCII, BMP, DCX, EPS will render them into TIFF format documents. bitmaps, Epson FX and LQ series spool output, Without the add-on, only text and graphics files GIF, JPEG, PCX, PICT, Targa, TIFF and others. Any can be sent via the web client and the other file format can be sent as a fax by printing Automation Toolkit. to the Zetafax printer driver from the application that created it. Email Gateway The Zetafax Email Gateway supports Microsoft The conversion of files attached to messages Office and PDF attachment files as standard.
    [Show full text]