In a great romance, each person plays a part the other really likes. - Elizabeth Ashley
Many a man owes his success to his first wife and his second wife to his success. - Jim Backus
No man should marry until he has studied anatomy and dissected at least one woman. - Honore de Balzac
Honeymoon: A short period of doting between dating and debting. - Ray Bandy
Marriage is low down, but you spend the rest of your life paying for it. - Baskins
I feel like Zsa Zsa Gabor's sixth husband. I know what I'm supposed to do, but I don't know how to make it interesting. - Milton Berle, when called to the microphone at the 2nd Annual Comedians Hall of Fame Inductions
Love: a temporary insanity often curable by marriage. - Ambrose Bierce
The world has suffered more from the ravages of ill-advised marriages than from virginity. - Ambrose Bierce
I recently read that love is entirely a matter of chemistry. That must be why my wife treats me like toxic waste. - David Bissonette
Ah Mozart! He was happily married - but his wife wasn't. - Borge
In the blithe days of honeymoon, With Kate's allurements smitten, I lov'd her late, I lov'd her soon, And call'd her dearest kitten.
But now my kitten's grown a cat, And cross like other wives. O! By my soul my honest Mat, I fear she has nine lives. - James Boswell "Life of Johnson"
A sweetheart is a bottle of wine, a wife is a wine bottle. - Boudelaire
For a male and female to live continuously together is...biologically speaking, an extremely unnatural condition. - Robert Briffault
My mother-in-law broke up my marriage. My wife came home from work one day and found me in bed with her. - Lenny Bruce
Never tell. Not if you love your wife... In fact, if your old lady walks in on you, deny it. Yeah. Just flat out and she'll believe it: "I'm tellin' ya." This chick came downstairs with a sign around her neck 'Lay on Top of Me Or I'll Die.' I didn't know what I was gonna do..." - Lenny Bruce
Insurance is like marriage. You pay, pay, pay, and you never get anything back. - Al Bundy
Nothing says lovin' like marrying your cousin! - Al Bundy
Once a boy becomes a man, he's a man all his life, but a woman is only sexy until she becomes your wife. - Al Bundy
If you are afraid of loneliness, don't marry. - Chekhov
Marriage is an adventure, like going to war. - G. K. Chesterton
An archaeologist is the best husband a woman can have; the older she gets the more interested he is in her. - Agatha Christie
The most happy marriage I can imagine to myself would be the union of a deaf man to a blind woman. - S. T. Coleridge
Like all great travellers, I have seen more than I remember, and remember more than I have seen. ~Benjamin Disraeli
Thursday, February 02, 2006
Wednesday, January 11, 2006
MoDuLe 13
1. Are you in favor of the enactment and enforcement of laws that will regulate and control the use of computer technology? Explain your answer.
I would definitely agree to regulate and control the use of computer technology. It is because crimes unknowingly are done in large-scale values. A very good example is the piracy of copyrighted information. Here in the Philippines, people think that piracy is just okay because it’s an accepted norm. They think that piracy is not a crime. But if we enact and enforce laws that will regulate and control computer technology use, people will become aware that what they are doing is not good and is punishable as a crime. I think that this is a very good step in stopping computer-related crimes. The only problem that we will meet I think is the way they enforce and implement these laws because the general trend in implementing laws is that they are good only in the first few months of implementation. After awhile, the way they enforce is no longer that tight and so people comes back to committing those crimes again. Another thing is that some government officials can be bribed so laws created or enacted became useless. As my final word, it is not about what laws we enact or enforce, it is about how we implement these laws that matter.
2. If you were to decide the case of Landmark Hacking, what will be your judgment? Support your answer (use jural and non-laws or ethical principles)
I find the defendant guilty of the crimes she has been tried in this honorable court. I would find the defendant guilty as charged. If the defendant was morally right, even if she was given the user account and password, she should have not proceeded in the illegal entry to the system. Even if she says that she has no bad intentions in hacking the system she cannot justify her actions because the fact that she entered the system illegally would definitely incriminate her. It was also found out that she and the other person possessed classified documents that belong to the school which were not supposedly possessed by employees. Because of this, it can be concluded that she stole instructional material that are important part of the school business. Stealing of valuable documents using computers is clearly a computer crime. I think she is really guilty of the charges.
I would definitely agree to regulate and control the use of computer technology. It is because crimes unknowingly are done in large-scale values. A very good example is the piracy of copyrighted information. Here in the Philippines, people think that piracy is just okay because it’s an accepted norm. They think that piracy is not a crime. But if we enact and enforce laws that will regulate and control computer technology use, people will become aware that what they are doing is not good and is punishable as a crime. I think that this is a very good step in stopping computer-related crimes. The only problem that we will meet I think is the way they enforce and implement these laws because the general trend in implementing laws is that they are good only in the first few months of implementation. After awhile, the way they enforce is no longer that tight and so people comes back to committing those crimes again. Another thing is that some government officials can be bribed so laws created or enacted became useless. As my final word, it is not about what laws we enact or enforce, it is about how we implement these laws that matter.
2. If you were to decide the case of Landmark Hacking, what will be your judgment? Support your answer (use jural and non-laws or ethical principles)
I find the defendant guilty of the crimes she has been tried in this honorable court. I would find the defendant guilty as charged. If the defendant was morally right, even if she was given the user account and password, she should have not proceeded in the illegal entry to the system. Even if she says that she has no bad intentions in hacking the system she cannot justify her actions because the fact that she entered the system illegally would definitely incriminate her. It was also found out that she and the other person possessed classified documents that belong to the school which were not supposedly possessed by employees. Because of this, it can be concluded that she stole instructional material that are important part of the school business. Stealing of valuable documents using computers is clearly a computer crime. I think she is really guilty of the charges.
Sunday, January 08, 2006
MoDuLe 12
From http://www.thefreedictionary.com/:
computer crime
n.
Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data.
A computer crime is generally described as any crime accomplished through special knowledge of computer technology (Grolier Encyclopedia of Knowledge). It cannot be denied that even the use of computers has extended to becoming instruments of crime. Funny to think that due to technology advancement even crimes are done using computers. Crimes that were supposedly done by criminals before have been perpetrated by the use of computers. Because of these crimes, it won’t take long before a computer becomes a murder weapon. Computers have simply become objects of crime.
Computers are objects of crime when they are used to destroy, damage, or disturb other computers. Another, computers become instruments of crime when they are used to plan or control such criminal acts as complex embezzlements over long periods of time or when a person uses a computer to steal personal and valuable information.
Computer crimes include fraud, theft, larceny, embezzlement and felony. A very good example of these crimes is the credit card fraud wherein stealing of personal information and fraud are clearly committed by the perpetrator. Impairment of computer services, delaying of computer services and illegal use of other computers’ resources are also considered computer crimes. The release of the Melissa virus, which caused substantial interruption of the Internet and overloading of mail servers, is a concrete example of these kinds of crimes.
With the advent of personal computers to manipulate information and vandalism by telephone (Grolier Encyclopedia of Knowledge) or though the internet, increasing number of crimes-mostly simple but costly electronic trespassing, piracy of copyrighted or classified information-have been done by computer hobbyists, known as “hackers”, who use their technical expertise in stealing or destroying valuable information. The hacking of USA’s security agencies is a very good example of this.
Still other crimes are called white-collar crimes, because these involve crimes conducted in company offices, and were mostly done by trusted computer users within the businesses. Stealing company information, abuse of company resources and theft of company properties and assets through the use of computers. The stock fraud in Cisco Systems, Inc. would very much belong to these kinds of crime.
As a student, I hope that people would stop using computers as objects of crime or better yet to stop committing these crimes because the creation of computers was not to destroy or embarrass other persons’ lives because just like other machines, computers were created to aid man in his work.
computer crime
n.
Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data.
A computer crime is generally described as any crime accomplished through special knowledge of computer technology (Grolier Encyclopedia of Knowledge). It cannot be denied that even the use of computers has extended to becoming instruments of crime. Funny to think that due to technology advancement even crimes are done using computers. Crimes that were supposedly done by criminals before have been perpetrated by the use of computers. Because of these crimes, it won’t take long before a computer becomes a murder weapon. Computers have simply become objects of crime.
Computers are objects of crime when they are used to destroy, damage, or disturb other computers. Another, computers become instruments of crime when they are used to plan or control such criminal acts as complex embezzlements over long periods of time or when a person uses a computer to steal personal and valuable information.
Computer crimes include fraud, theft, larceny, embezzlement and felony. A very good example of these crimes is the credit card fraud wherein stealing of personal information and fraud are clearly committed by the perpetrator. Impairment of computer services, delaying of computer services and illegal use of other computers’ resources are also considered computer crimes. The release of the Melissa virus, which caused substantial interruption of the Internet and overloading of mail servers, is a concrete example of these kinds of crimes.
With the advent of personal computers to manipulate information and vandalism by telephone (Grolier Encyclopedia of Knowledge) or though the internet, increasing number of crimes-mostly simple but costly electronic trespassing, piracy of copyrighted or classified information-have been done by computer hobbyists, known as “hackers”, who use their technical expertise in stealing or destroying valuable information. The hacking of USA’s security agencies is a very good example of this.
Still other crimes are called white-collar crimes, because these involve crimes conducted in company offices, and were mostly done by trusted computer users within the businesses. Stealing company information, abuse of company resources and theft of company properties and assets through the use of computers. The stock fraud in Cisco Systems, Inc. would very much belong to these kinds of crime.
As a student, I hope that people would stop using computers as objects of crime or better yet to stop committing these crimes because the creation of computers was not to destroy or embarrass other persons’ lives because just like other machines, computers were created to aid man in his work.
Wednesday, January 04, 2006
MoDuLe 11
First Case: WHELAN VS. JASLOW
If we look at these case based on previous theories discussed, I think what Whelan Associates, Inc. did was not wrong. You see we cannot conclusively say that Whelan is copying Jaslow's software when in fact it was not exactly the same program. It is unfair to Whelan if we immediately conclude that they plagerized Jaslow's work. Although based on the court findings, Whelan spent a lot of time studying Jaslow's program, the possibility that Whelan was only basing its program on Jaslow's cannot be eliminated. Maybe Whelan was studying Jaslow's because it wants to find out Jaslow's strengths and weaknesses, make a seperate program, and apply the necessary improvements. But the fact that Whelan was basing his program on other's work will immediately make Whelan guilty no matter what Whelan's true motivations are. As I was saying, we can only base our arguments on certain speculations because we did not experience the case first-hand.
Second Case: COMPUTER ASSOCIATES VS. ALTAI
I would definitely agree to the court's decision in this case because unlike the first case, we can clearly see that the direct possible perpetrator of copying Computer's program was no longer involved in the second version of Altai's program. Even if we take the first version of Altai's program, we cannot also say that Altai copied Computer's work because it was not the whole program that was copied. The programmer of Altai was only basing his work on his former employer's codes. So I think the court was right.
Based on this two cases, we can learn something that we, future programmers, ought to do. First, as much as possible, we should create ORIGINAL programs so as to avoid future conflicts in the future. Although we can base on other's work proper credits must be taken into account, or we must not copy other's work in totality. Second, if we get fired from a company, it is a proper protocol that what we did in the company we must leave it on the company. Although we made programs in the company who have fired us, it is not right to own and use the codes we made and use it on purposes beyond the company's area. Although you are already fired, you must be responsible enough in keeping the company's properties intact.
Third Case: APPLE VS. MICROSOFT
This case is a classic example betwen the clash of being "similar" and "identical".
From http://www.thefreedictionary.com :
i·den·ti·cal
If we look at these case based on previous theories discussed, I think what Whelan Associates, Inc. did was not wrong. You see we cannot conclusively say that Whelan is copying Jaslow's software when in fact it was not exactly the same program. It is unfair to Whelan if we immediately conclude that they plagerized Jaslow's work. Although based on the court findings, Whelan spent a lot of time studying Jaslow's program, the possibility that Whelan was only basing its program on Jaslow's cannot be eliminated. Maybe Whelan was studying Jaslow's because it wants to find out Jaslow's strengths and weaknesses, make a seperate program, and apply the necessary improvements. But the fact that Whelan was basing his program on other's work will immediately make Whelan guilty no matter what Whelan's true motivations are. As I was saying, we can only base our arguments on certain speculations because we did not experience the case first-hand.
Second Case: COMPUTER ASSOCIATES VS. ALTAI
I would definitely agree to the court's decision in this case because unlike the first case, we can clearly see that the direct possible perpetrator of copying Computer's program was no longer involved in the second version of Altai's program. Even if we take the first version of Altai's program, we cannot also say that Altai copied Computer's work because it was not the whole program that was copied. The programmer of Altai was only basing his work on his former employer's codes. So I think the court was right.
Based on this two cases, we can learn something that we, future programmers, ought to do. First, as much as possible, we should create ORIGINAL programs so as to avoid future conflicts in the future. Although we can base on other's work proper credits must be taken into account, or we must not copy other's work in totality. Second, if we get fired from a company, it is a proper protocol that what we did in the company we must leave it on the company. Although we made programs in the company who have fired us, it is not right to own and use the codes we made and use it on purposes beyond the company's area. Although you are already fired, you must be responsible enough in keeping the company's properties intact.
Third Case: APPLE VS. MICROSOFT
This case is a classic example betwen the clash of being "similar" and "identical".
From http://www.thefreedictionary.com :
i·den·ti·cal
adj.
1. Being the same: another orator who used the senator's identical words.
2. Exactly equal and alike.
3. Having such a close similarity or resemblance as to be essentially equal or interchangeable.
4. Biology Of or relating to a twin or twins developed from the same fertilized ovum and having the same genetic makeup and closely similar appearance; monozygotic.
sim·i·lar
So based on these definitions, we can clearly see that Micosoft did not commit any crime on mere basis ofsubstancial similarity. We could think that Microsoft could never come up with Windows if not for Apple's work but Microsoft was able to come up with its implementation which is original and is not based on existing ones. I agree with the court's decision.
Case Four: LOTUS LOOK AND FEEL
This is similar to the third case however this case is unique because it looks at certain specifics. In the third case, what Apple was fighting for was the GUI interface as a whole which of course failed. In this case, Lotus sued other companies for a specific item which is the menu structure or the arrangement of commands in the menu hierarchy. This cannot be argued because this menu can be seen and therefore cannot be denied. Although there is no code copying, the menu itself can be copyrighted. If I were the companies sued, they should have not copied exactly the items on the menu and instead come up with a similar menu by either renaming the items or excluding old items and adding new ones. This should have been done by the companies in order not to stir copyright controversy.
sim·i·lar
adj.
1. Related in appearance or nature; alike though not identical.
2. Mathematics Having corresponding angles equal and corresponding line segments proportional. Used of geometric figures: similar triangles.
So based on these definitions, we can clearly see that Micosoft did not commit any crime on mere basis ofsubstancial similarity. We could think that Microsoft could never come up with Windows if not for Apple's work but Microsoft was able to come up with its implementation which is original and is not based on existing ones. I agree with the court's decision.
Case Four: LOTUS LOOK AND FEEL
This is similar to the third case however this case is unique because it looks at certain specifics. In the third case, what Apple was fighting for was the GUI interface as a whole which of course failed. In this case, Lotus sued other companies for a specific item which is the menu structure or the arrangement of commands in the menu hierarchy. This cannot be argued because this menu can be seen and therefore cannot be denied. Although there is no code copying, the menu itself can be copyrighted. If I were the companies sued, they should have not copied exactly the items on the menu and instead come up with a similar menu by either renaming the items or excluding old items and adding new ones. This should have been done by the companies in order not to stir copyright controversy.
Subscribe to:
Posts (Atom)