Personal computers spur drive to keep control over copyright
نویسندگان
چکیده
منابع مشابه
Personal Computers: A Gateway to Personal Computing
This article is a personal journey, from the early days of batch processing to the modern personal computing era. The journey begins in the early 1970s and starts with the punch cards at the computer centre of the University of Jyväskylä. The use of minicomputers (HP 2100 series) gave a different view – how to collect and process data with a computer. Honeywell timesharing systems made it possi...
متن کاملJudicial Review and the Quest to Keep Copyright Pure
American copyright law is under pressure. The history of copyright in the United States is a story of repeated success by copyright owners in obtaining from Congress expansions in both the scope and duration of copyright. For instance, in response to lobbying by copyright owners, Congress has expanded the term of copyright from a maximum of 28 years in 1790 to the life of the author plus sevent...
متن کاملPersonal access to sequence databases on personal computers
A comprehensive package of software has been developed to access nucleic acid and protein sequence databases on stand-alone IBM personal computers. The software combines keyword search on the annotation fields of the data with pattern matching algorithms on the biological sequences. Sequences containing complex sites like promoters or kink sites can be identified as well as sequences that are s...
متن کاملKeep primary health care personal!
In the fifties and sixties a rebirth for primary health care (PHC) took place in the United Kingdom and The Netherlands. New scientific journals started: the Journal of the College of GP's (now the British Journal of General Practice) in the UK and Huisarts en Wetenschap in The Netherlands. In 1966 in both countries reforms took place to reinforce General Practitioners within the health care sy...
متن کاملLockbox: Helping Computers Keep Your Secrets
The realization that modern architectures lack sufficient security features is not a new one. Many grand visions of “trusted computing” remain unfilled. After millions of dollars of research money, huge expenditures on the part of industry and rarely seen levels of cooperation between hardware vendors, users remain without substantial security features in their systems. Those features that do e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1998
ISSN: 0028-0836,1476-4687
DOI: 10.1038/24433