Welcome to elreno.org
Patent and copyright law
Understanding Patent and Copyright Law
Patent and copyright law gives the inventor the exclusive rights to the invention. No one else can produce the invention for a set period of time under patent and copyright law. Patent and copyright law is set up to protect inventors. The law on patents can be found in the United States Constitution, Article 1, Section 8 and in Title 35 of the United States Code.
The agency that is in charge of patent laws is a Federal Agency known as the Patent and Trademark Office. Anyone who applies for a patent will have their application reviewed by an examiner. The examiner will decide if a patent should be granted to the inventor. Individuals who have their patent application turned down can appeal it to the Patents Office Board of Appeals.
Just because someone has a patent does not mean that they have the right to use, make or sell the invention. For instance, if a drug company comes up with a new drug, they can get a patent on it. However, it would not be available to be sold to the general public until the drug becomes approved by other regulatory bodies. Likewise, someone may invent an improvement to an existing product, yet they will not be allowed to produce or sell the item until they obtain a license to do so from the owner of the original patent holder.
For someone to receive a patent, as stated, they must fill out an application on their invention. The application will entail the details of the invention and how it is made. In addition, the person applying for a patent must make claims that point to what the applicant deems or regards as his or her invention. A patent may have many claims with it. The claims protect the patent owner and notify the public exactly what the individual has patented or owns.
If someone infringes upon patent and copyright law, it is usually enforced in a civil court setting. The owner of the patent will generally bring a civil lawsuit against the person who has infringed upon their patent and ask for monetary compensation. In addition, the patent owner can seek an injunction which would prohibit the violator from continuing to engage in any acts that would infringe upon their patent in the future.
Many patent owners will make licensing agreements (or contracts) with others. These agreements allow another person or company to use someone’s patented invention in return for royalties. In addition, some patent holders who are competitors may agree to license their patents to each other to expand both of their profits.
Most everything we use in our day to day life was invented by someone. That person had to seek out a patent for their invention. Patent and copyright law protects inventors from having their ideas and inventions stolen out from under them. This makes the playing field more level for individuals. Without these laws, the marketplace would be out of control and the small guy would probably be eaten alive by big business
Web Hosting - Redundancy and Failover Among the more useful innovations in computing, actually invented decades ago, are the twin ideas of redundancy and failover. These fancy words name very common sense concepts. When one computer (or part) fails, switch to another. Doing that seamlessly and quickly versus slowly with disruption defines one difference between good hosting and bad. Network redundancy is the most widely used example. The Internet is just that, an inter-connected set of networks. Between and within networks are paths that make possible page requests, file transfers and data movement from one spot (called a 'node') to the next. If you have two or more paths between a user's computer and the server, one becoming unavailable is not much of a problem. Closing one street is not so bad, if you can drive down another just as easily. Of course, there's the catch: 'just as easily'. When one path fails, the total load (the amount of data requested and by how many within what time frame) doesn't change. Now the same number of 'cars' are using fewer 'roads'. That can lead to traffic jams. A very different, but related, phenomenon occurs when there suddenly become more 'cars', as happens in a massively widespread virus attack, for example. Then, a large number of useless and destructive programs are running around flooding the network. Making the situation worse, at a certain point, parts of the networks may shut down to prevent further spread, producing more 'cars' on now-fewer 'roads'. A related form of redundancy and failover can be carried out with servers, which are in essence the 'end-nodes' of a network path. Servers can fail because of a hard drive failure, motherboard overheating, memory malfunction, operating system bug, web server software overload or any of a hundred other causes. Whatever the cause, when two or more servers are configured so that another can take up the slack from one that's failed, that is redundancy. That is more difficult to achieve than network redundancy, but it is still very common. Not as common as it should be, since many times a failed server is just re-booted or replaced or repaired with another piece of hardware. But, more sophisticated web hosting companies will have such redundancy in place. And that's one lesson for anyone considering which web hosting company may offer superior service over another (similarly priced) company. Look at which company can offer competent assistance when things fail, as they always do sooner or later. One company may have a habit of simply re-booting. Others may have redundant disk arrays. Hardware containing multiple disk drives to which the server has access allows for one or more drives to fail without bringing the system down. The failed drive is replaced and no one but the administrator is even aware there was a problem. Still other companies may have still more sophisticated systems in place. Failover servers that take up the load of a crashed computer, without the end-user seeing anything are possible. In fact, in better installations, they're the norm. When they're in place, the user has at most only to refresh his or her browser and, bingo, everything is fine. The more a web site owner knows about redundancy and failover, the better he or she can understand why things go wrong, and what options are available when they do. That knowledge can lead to better choices for a better web site experience. Cruise for Free Stuff Anonymously with a Free Privacy Service The World Wide Web is full of freebie offers, but many of these require you to give websites personal information and data. If you don't want your personal information floating around the World Wide Web (and who does want this?), there are some precautions you can take. Do you want to cruise for free stuff without having to worry about giving up your privacy? Here are a few privacy services that can help you cruise the web for freebies without having to worry about giving up any of your personal information. Why Should You Protect Your Privacy? Why should you even bother to use privacy services to cruise the web? There are many reasons why you would want to keep your personal data from being leaked into the World Wide Web. Every time that you are asked to provide personal information, you are at risk for infecting your computer with some kind of virus or spyware. In fact, it is estimated that the majority of all computer systems are infected by spyware. There are many programs that can actually track your keystrokes. This allows hackers and other cyber criminals to gain access to your passwords, bank account numbers and other private information. This puts you at high risk of computer identity theft. You can avoid having to enter personal information by using privacy programs to surf the web. Surf Easy with Anonymizer.com This is a program that allows you to surf the web anonymously. What does this program do? This program protects you by keeping your IP address secure. This means that online tracking software will be unable to track the sites you visit and keep a profile on your online activities. This program allows your connection to be redirected through their own secure servers, thus keeping your online identity hidden and protected. This program uses 128-bit Secure Sockets Layer technology. The program also provides protections against pharming, phishing and spyware websites that seek to invade your computer. Keep Your Privacy with Enonymous What is Enonymous.com, and what can it do to protect your privacy? Enonymous.com offers web surfers the ability to cruise confidently with its own host of free privacy software. This privacy software was created as a way to protect web surfers and consumers right to privacy. The program offers users with privacy policy statements and ratings. The software also helps users choose what kind of personal information they want to divulge before making web purchases. If you are concerned about giving away your name, phone number, email and other personal data, not to mention credit card and bank account numbers, then you will appreciate this software program. For Fast, Free and Totally Private Email, Turn to Hushmail Are you looking for fast, free and private email? If so, Hushmail.com is what you are looking for. This email uses industry standard algorithms that are optimized for the highest level of privacy, authenticity and security. This is one of the best of the free email services if you are concerned about protecting your privacy. All you need to do is to create your own passphrase. The program creates a transparent decryption and encryption system. It is also very user-friendly that allows for easy encryption and decryption of data, and for fast retrieval of a public/private key. ZoneAlarm for the Best in Firewall Protection If you are looking for the best in firewall protection, consider using ZoneAlarm for protecting your PC from invading viruses and spyware. This award-winning program helps shield your computer from incoming attackers, and helps banish already-present invaders. Surf the World Wide Web with confidence with the help of ZoneAlarm. |