In the lawsuit filed in the Court of Federal Claims, Zeidman Technologies alleges that the U.S. government gave three conflicting and contradictory explanations as to why Zeidman’s proposal for the SBIR request was denied, despite the fact that Zeidman owns patented technology that specifically met the requirements of the request. These rejection explanations also allegedly relied on criteria that were not explicitly stated in the SBIR request for proposals, resulting in what Zeidman argues was an arbitrary decision.
We have a new edition to our annual article series, which looking backward with reflections on the biggest moments of the year that has passed and which offers wishes for the year ahead. This year we also asked industry leaders if they would care to take a stab at predicting the future. Of course, if I’m going to ask others…
I would love to see patent eligibility reform in Congress that would overrule Mayo, Myriad and Alice. I would also love to see meaningful copyright reforms and/or real Internet industry cooperation that recognizes the important rights of content creators, both large and small. I would also like to see federal trade secret legislation, which is critically important given the erosion of patent rights over the last several years. Until Congress realizes just how damaging the Supreme Court has been over the last decade more innovators will need to rely on trade secret protection, and having one regime rather than 51 regimes (i.e., 50 states plus the District of Columbia) makes no sense given the national and international scope of business in today’s global economy.
It is one again time to take a moment to look back on the year that was, reflecting on the biggest, most impactful moments of the year. For us that means looking backward at the most impactful events in the world of intellectual property. Unlike in years past where we would get a variety of different perspectives from industry insiders, there…
Readers did point out some issues in our article that we would like to correct. First, we made some statements regarding copyright that are not completely accurate. A work can be jointly owned by two or more copyright holders who then have the right to individually assign nonexclusive rights without the permission of the other copyright holders. This is not typically done by companies developing code, because it effectively gives away the copyrights. It is more typically done when a company accepts code developed by an outside entity. In fact, as was pointed out by one reader, Sun has an agreement called the Sun Contributor Agreement (SCA) that specifies that any person who contributes code to a Sun-managed project gives Sun joint copyright in the code. This is an interesting way for Sun to ensure that code contributed to any of its projects can be used without restriction by Sun without copyright issues.
We decided to pursue these questions using the advanced tools for detecting copyright infringement created by our sister company, Software Analysis and Forensic Engineering (SAFE Corporation) and the thorough processes that we have developed. What started off as simple curiosity turned into an interesting research and analysis project to determine if we could uncover evidence of copyright infringement that Oracle’s experts had missed. Our two-week effort turned up some very surprising results–significant amounts of apparently copied code that was not brought up at the trial.
Mr. Kessler believes that Mr. Madison did not understand what he was doing or, at best, did not foresee the expense that patent litigation would involve in the 21st century. In fact, the founding fathers knew exactly what they were doing when writing the intellectual property clause into the U.S. Constitution. They were protecting the individual from the overwhelming power of large entities. They were enacting the very principles of American society for which we fought the Revolutionary War. Since 1790 the U.S. patent system has contributed to America becoming the most innovative society in the history of the world. Fundamentally changing the system in the ways suggested by Mr. Kessler would stifle that innovation.
We must find reasonable ways to stop infringement of intellectual property on the Internet. Such a solution must be fair to the victim of the infringement. It must uphold the principles of the Constitution of the United States. And it must not break the Internet. SOPA and PIPA may not be perfect implementations of such protection, but they meet all of these requirements. There may be better strategies that can be reached through measured and thoughtful debate, but not through excessive hyperbole and misrepresentation.
Over the years IPWatchdog.com has continued to try and add additional perspectives from a wide variety of guest contributors, ranging from well respected practicing attorneys and agents to high profile academics to inventors and pro-patent lobbyists. It is hard to imagine providing such depth of analysis on such an array of topics without having truly wonderful guest authors. So we take this moment to say a very special thank you and to shine the spotlight on them. Each deserve to share in any recognition of IPWatchdog.com. Without further ado, here are the guest contributors in alphabetical order, along with their contributions for 2011.
When copying has occurred, much of the code may have changed by the time it’s examined due to the normal development process or to disguise the copying. For example identifiers may have been renamed, code reordered, instructions replaced with similar instructions, and so forth. However, perhaps one comment remains the same and it’s an unusual comment. Or a small sequence of critical instructions is identical. Correlation is designed to produce a relatively high value based on that comment or that sequence, to direct the detective toward that similarity. If correlation were simply a percentage of copied lines, the number could be small and thus missed entirely among the noise of normal similarities that occur in all programs.