Microsoft's Accusations of Reverse Engineering
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main reason Ally Financial filed a lawsuit against the man?

  • For not partnering in a new banking venture
  • For redirecting customers to ChaseBank
  • For stealing their trade secrets
  • For registering similar domain names (correct)
  • What was the man's initial response to Ally's complaint about the domain names?

  • He demanded to work with Ally in a new venture (correct)
  • He changed the domain names to avoid confusion
  • He ignored their complaint
  • He offered to return the domain names
  • What is the maximum amount of damages Ally is seeking per domain name?

  • $100,000 (correct)
  • $500,000
  • $50,000
  • $200,000
  • What is the name of the law under which Ally filed the lawsuit?

    <p>Anticybersquatting Consumer Protection Act</p> Signup and view all the answers

    Where were Ally customers initially redirected to?

    <p>VeteransNationalBank.us</p> Signup and view all the answers

    What is an example of intellectual property?

    <p>A computer program</p> Signup and view all the answers

    What type of law protects authored works?

    <p>Copyright law</p> Signup and view all the answers

    What type of law protects inventions?

    <p>Patent law</p> Signup and view all the answers

    Can software be protected under both copyright and patent law?

    <p>Yes, under both copyright and patent law</p> Signup and view all the answers

    What type of infringement can result in triple damages?

    <p>All of the above</p> Signup and view all the answers

    Study Notes

    Reverse Engineering

    • Microsoft has been accused of reverse engineering products, including Apple's Macintosh user interface and operating system utility features.
    • Reverse engineering is used to modify an application to run on a different vendor's database, avoiding the need to rewrite existing applications.
    • This process involves recovering the design of the information system application and using code-generation tools to produce code in the new database programming language.

    Competitive Intelligence

    • Almost all data needed for competitive intelligence can be collected from published information, interviews, and online sources.
    • Sources include 10-K or annual reports, press releases, promotional materials, web sites, and patent filings.
    • Analytical tools and industry expertise are used to make deductions and gain significant information.

    Software Applications for Competitive Intelligence

    • Rapportive provides rich contact profiles to help build rapport quickly.
    • Crunchbase is a free database of over 110,000 companies, people, and investors.
    • CORI is a database of contract documents available online using a full-text search and retrieval system.
    • ThomasNet.com is a source for identifying suppliers and sources for products.
    • WhoGotFunded.com provides data about organizations that have received funding and for what purposes.

    Cybersquatting

    • Cybersquatting involves registering domain names for famous trademarks or company names to sell them to the rightful owner.
    • Organizations can protect their trademarks by registering numerous domain names and variations as soon as they know they want to develop a Web presence.
    • ICANN (Internet Corporation for Assigned Names and Numbers) is a nonprofit corporation responsible for managing the Internet's domain name system.
    • The Anticybersquatting Consumer Protection Act can be used to file lawsuits against cybersquatters.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Learn about the allegations of Microsoft's reverse engineering practices, including copying features from Apple and Google. Test your knowledge on the history of software development and industry rivalries.

    More Like This

    Mastering Reverse Engineering
    10 questions
    Reverse Engineering Paduk Time Importance
    6 questions
    Microsoft's Accusations of Reverse Engineering
    10 questions
    Reverse Engineering von Tischkickern
    48 questions
    Use Quizgecko on...
    Browser
    Browser