Podcast
Questions and Answers
What is the main reason Ally Financial filed a lawsuit against the man?
What is the main reason Ally Financial filed a lawsuit against the man?
What was the man's initial response to Ally's complaint about the domain names?
What was the man's initial response to Ally's complaint about the domain names?
What is the maximum amount of damages Ally is seeking per domain name?
What is the maximum amount of damages Ally is seeking per domain name?
What is the name of the law under which Ally filed the lawsuit?
What is the name of the law under which Ally filed the lawsuit?
Signup and view all the answers
Where were Ally customers initially redirected to?
Where were Ally customers initially redirected to?
Signup and view all the answers
What is an example of intellectual property?
What is an example of intellectual property?
Signup and view all the answers
What type of law protects authored works?
What type of law protects authored works?
Signup and view all the answers
What type of law protects inventions?
What type of law protects inventions?
Signup and view all the answers
Can software be protected under both copyright and patent law?
Can software be protected under both copyright and patent law?
Signup and view all the answers
What type of infringement can result in triple damages?
What type of infringement can result in triple damages?
Signup and view all the answers
Study Notes
Reverse Engineering
- Microsoft has been accused of reverse engineering products, including Apple's Macintosh user interface and operating system utility features.
- Reverse engineering is used to modify an application to run on a different vendor's database, avoiding the need to rewrite existing applications.
- This process involves recovering the design of the information system application and using code-generation tools to produce code in the new database programming language.
Competitive Intelligence
- Almost all data needed for competitive intelligence can be collected from published information, interviews, and online sources.
- Sources include 10-K or annual reports, press releases, promotional materials, web sites, and patent filings.
- Analytical tools and industry expertise are used to make deductions and gain significant information.
Software Applications for Competitive Intelligence
- Rapportive provides rich contact profiles to help build rapport quickly.
- Crunchbase is a free database of over 110,000 companies, people, and investors.
- CORI is a database of contract documents available online using a full-text search and retrieval system.
- ThomasNet.com is a source for identifying suppliers and sources for products.
- WhoGotFunded.com provides data about organizations that have received funding and for what purposes.
Cybersquatting
- Cybersquatting involves registering domain names for famous trademarks or company names to sell them to the rightful owner.
- Organizations can protect their trademarks by registering numerous domain names and variations as soon as they know they want to develop a Web presence.
- ICANN (Internet Corporation for Assigned Names and Numbers) is a nonprofit corporation responsible for managing the Internet's domain name system.
- The Anticybersquatting Consumer Protection Act can be used to file lawsuits against cybersquatters.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Learn about the allegations of Microsoft's reverse engineering practices, including copying features from Apple and Google. Test your knowledge on the history of software development and industry rivalries.