[SIGCIS-Members] History of intellectual property in computing?

Allan Olley allan.olley at utoronto.ca
Thu Oct 27 20:12:13 PDT 2016


Hi,
 	It is perhaps more of a curiosity and I can't say there is much 
elaboration, but I noted in a blog post some time ago that the practice 
of putting fake entries or mistakes in reference works, maps and so on as 
a potential basis to identify and discourage copying was an issue in 
table making in the mid-twentieth century and this is now an issue for 
the various on-line map services that are being put together and guiding 
us around. 
http://www.ithistory.org/blog/its-trap

-- 
Yours Truly,
Allan Olley, PhD

http://individual.utoronto.ca/fofound/

On Thu, 27 Oct 2016, McMillan, William W wrote:

> Thanks so much, everyone!  Extremely helpful... I look forward to many happy hours looking into these resources.
>
> - Bill
>
> ________________________________
> From: Annette Vee [annettevee at gmail.com]
> Sent: Thursday, October 27, 2016 2:31 PM
> To: Evan Koblentz
> Cc: Hansen Hsu; McMillan, William W; Sigcis
> Subject: Re: [SIGCIS-Members] History of intellectual property in computing?
>
> Along the lines of the work that Nathan Ensmenger recommends (humanist/sociology/rhetoric/history), I'd also suggest Gabriella Coleman's work on hacker's code and speech (particularly an article in Cultural Anthropology, "Code is Speech"). I have an article in Computational Culture on the metaphors used to describe code in the law, "Text, Speech, Machine": http://computationalculture.net/article/text-speech-machine-metaphors-for-computer-code-in-the-law .
>
> There's of course a huge body of work on this in law journals, particularly by Pamela Samuelson, Michael Madison, Greg Lastowka, Robert Merges, Mark Lemley, Julie Cohen, Dan Burk, and even a great write-up on copyright feasibility for computer programs by Justice Breyer in the Harvard Law Review in 1970.
>
> Annette Vee
> Assistant Professor of English
> University of Pittsburgh
>
> On Thu, Oct 27, 2016 at 2:18 PM, Evan Koblentz <evan at snarc.net<mailto:evan at snarc.net>> wrote:
> Another IP issue is hardware cloning. There were many Apple II clones and even some Macintosh clones -- some made with Apple's permission, others not. This continues today with the "Hackintosh" trend and, on the software side, the issue of jailbreaking and mobile app permissions.
>
> _______________________________________________
> This email is relayed from members at sigcis.org<http://sigcis.org>, the email discussion list of SHOT SIGCIS. Opinions expressed here are those of the member posting and are not reviewed, edited, or endorsed by SIGCIS. The list archives are at http://lists.sigcis.org/pipermail/members-sigcis.org/ and you can change your subscription options at http://lists.sigcis.org/listinfo.cgi/members-sigcis.org
>
> _______________________________________________
> This email is relayed from members at sigcis.org, the email discussion list of SHOT SIGCIS. Opinions expressed here are those of the member posting and are not reviewed, edited, or endorsed by SIGCIS. The list archives are at http://lists.sigcis.org/pipermail/members-sigcis.org/ and you can change your subscription options at http://lists.sigcis.org/listinfo.cgi/members-sigcis.org
>



More information about the Members mailing list