*BSD News Article 10758


Return to BSD News archive

Received: by minnie.vk1xwt.ampr.org with NNTP
	id AA627 ; Sat, 06 Feb 93 07:00:22 EST
Newsgroups: alt.suit.att-bsdi,comp.unix.bsd
Path: sserve!manuel.anu.edu.au!munnari.oz.au!sgiblab!zaphod.mps.ohio-state.edu!cs.utexas.edu!geraldo.cc.utexas.edu!portal.austin.ibm.com!awdprime.austin.ibm.com!guyd
From: guyd@austin.ibm.com (Guy Dawson Tel 512 838 2095)
Subject: Re: George William Herbert's Challenge - Part 2 (opening arguments)
Originator: guyd@doody.austin.ibm.com
Sender: news@austin.ibm.com (News id)
Message-ID: <C1wCM7.1s7o@austin.ibm.com>
Date: Wed, 3 Feb 1993 23:44:30 GMT
References: <106742@netnews.upenn.edu> <1993Jan27.215738.12384@igor.tamri.com> <1kbtpf$e9h@agate.berkeley.edu> <1993Feb3.002534.5637@igor.tamri.com>
Organization: IBM Austin
Lines: 186



Sorry for the length of this reply :-(


In article <1993Feb3.002534.5637@igor.tamri.com>, jbass@igor.tamri.com (John Bass) writes:
> In article <1kbtpf$e9h@agate.berkeley.edu> gwh@soda.berkeley.edu (George William Herbert) writes:
> >Note that "general form" wont' cut it, under any interpretation
> >of copyright law as I understand it.  I want to see procedures
> >that are the exact same, or just have had variable names altered,
> >or something similar.  Or a damn good argument as to why two
> >pieces of code that do the same thing, but are written from scratch
> >by two seperate people at different places, are covered under one
> >copyright, and examples thereof.
> 
> A number of people have taken this stand, and they clearly fail to
> understand what the copyright law and corresponding case law do and
> don't protect.  Presenting this in it's entirety would take many
> hundreds of pages ... the summary that follows is to my best
> understanding accurate:
> 
> Taken from "Numerical recipes in C", copyright Cambridge University Press
> 1988, preface page xv, which is a book of algorithms and they address the
> issue of use carefully:
> 
> 	"Like artistic or literary compositions, computer programs can be
> 	protected by copyright.  Generally it is an infringement for you
> 	to copy into your computer a program from a copyrighted source. It
> 	is also not a friendly thing to do, since it deprives the program's
> 	author of compensation for his or her creative effort.  Although
> 	this book and its programs are copyrighted, we specifically authorize
> 	you, a reader of the book, to make one machine-readable copy of each
> 	program for your own use.  You may wish to consider purchasing this
> 	book's collected programs in one of the machine-readable formats that
> 	are available (see front of book). Distribution of the machine-readable
> 	programs (either as copied by you or as purchased) to any other person
> 	is not authorized.
> 
> 	"Copyright does not protect ideas, but only the expression of those
> 	ideas in a particular form. In the case of a computer program, the
> 	ideas consist of the programs's methodology and algorithm, including
> 	the sequence of processes adopted by the programmer. The expression
> 	ideas is the program source code and it's derived object code.
> 
> 	"If you analyze the ideas contained in a program, and then express
> 	those ideas in your own distinct implementation, then that new program
> 	implementation belongs to you. ...
> 
> 	"The fact that ideas are legally "free as air" in no way supersedes
> 	ethical requirement that ideas be credited to their known originators.
> 	... "
> 
> Sentence one accurately reflects a framework for "fair-use" of material
> presented any book.
> 
> Sentence two accurately represents "ownership" under current case law,
> "methodology, algorithms, and sequence of processes". To translate the
> methodology, algorithms, and sequence of processes into any other form
> does not change the ownership.  This means between puesdo code, english,
> C, or any other languague - human or machine readable.
> 
> Sentence three represents **part** of the requirements to distinguish
> ownership. Additional case law imparts more requirements for reverse
> engineering of major works ... those works that extend beyond a simple
> collection of ideas.
> 
> Sentence four imparts the ethical requirements that go beyond case law,
> and that nearly every research community strictly requires. This is
> the simple protection from plagiarizm.
> 
> I will later show that Net-2 and 386BSD release by UCB violates the
> AT&T ownership by maintaining the same "methodology, algorithms and
> sequence of processes" in nearly all of the code cloned from both
> UNIX source and Bach puedocode.
> 

#### Start on new text ####

BUT HANG ON. The quote from 'Numerical recipes in C' says :-

	"Copyright does not protect ideas, but only the expression of those
         ideas in a particular from. In the case of a computer program, the
         ideas consist of the program's methodology and algorithm, including
         the sequence of processes adopted by the programmer."

There for what do you prove by showing UCB maintained the same "methodology,
algorithms ans sequence of processes" other than the fact that UCB has used
the same ideas. Remember "Copyright does not protect ideas"!

#### End of new text ####


> In turn, this will show that UCB both violates the AT&T Source License
> agreement and the Bach copyright, including any possible fair-use. In
> addition it will be shown that UCB directly used the AT&T design, both
> source code and Bach, without crediting the source of the "methodology,
> algorithms, and sequence of processes" - which is blatantly simple
> plagiarizm by any definition in the research community.
> 
> *** In the mean time, I urge readers to review the above, find your own
> copy of Bach and examine the clock, tty and bio code in 386BSD. ****
> 
> 
> 
> .... now as an aside, I will respond to a couple more jabs ....
> 
> Every CS faculty member should fully understand the above, as well
> as standards for plagiarism ... long before they managed to get their
> PhD. Every CS student should understand this as well prior to entering
> the work place. This is not a minor issue to ignore ... and the
> general tone of the postings up to this point (including rebuttals to
> my postings) show a lack of understanding of software ownership.
> 
> In article <1kbtpf$e9h@agate.berkeley.edu> gwh@soda.berkeley.edu (George William Herbert) writes:
> >Even more annoying is your insistance that UCB computer science
> >graduates might be "tainted" by the "blatant CSRG copyright violations",
> >especially since you at the same time are insisting that holding
> >USL employees to task for what we believe are wrongdoings of their
> >company is morally wrong.  I smell a significant morality
> >bias here, and I don't like it.
> 
> First of all, I made no such claim that "graduates might be `tainted'".
> What I did say was:
> 
> 	"I think hiring managers should be boycot hiring UCB grads until
> 	they clean up their act on plagiarism and require all existing
> 	students to attend a class on intelectual property rights.
> 
> 	"I also think that all faculty, staff, and student assistants that
> 	participated and/or condoned this piracy should be removed or
> 	severely disciplined."
> 
> Since UCB faculty and staff are attempting to ignore their plagiarism,
> then it's time to enforce what are considered to be acceptable limits,
> and make sure the students that take their side "as the truth" are
> properly "informed" in what the rest of the research community and
> commercial work places EXPECT. Given both your response, and those
> from a number of other UCB students (as well as students from other
> campus sites), it is clear that many of you have views which are
> counter to either Law or Practice.  As stated by one recient graduate:
> 
> 	"I just wanted to thank you for your recent posting to
> 	alt.suit.att-bsdi.  As a fairly recent CS grad I had a
> 	very distorted (biased) view of the BSD<->ATT relationship.
> 	While I disagree with some of what you said, and want to
> 	disagree with more you have, however, painted a fairly clear
> 	picture of the facts.
> 
> 	...
> 
> 	"An ethics class would be a good idea in any CS curriculum,
> 	CS majors seem to play a little fast and loose with other
> 	people's work (just a personal observation)."
> 
> 
> 
> People boycot the products and services of organizations ALL THE TIME
> to provide social and economic presure on the org. This causes employees
> to loose their jobs/raises all the time ... and is one of the desired
> personal costs to make life difficult for management inside the org.
> Unions take this one step farther and directly hasle other union workers
> that cross the picket line. To boycot UCB, is to boycot it's products
> -- graduates -- making students directly aware and involved in the
> process will not only reduce it's admission applications, but place
> presure on the administration to stop stalling and resolve the dispute.
> It also sends the clear message that plagiarism is not acceptable in
> either school or industry.
>  
> Management under current business law can and are held directly
> responsible for their actions in a vast number of crimes.
> Unfortunately, this same access is missing go after to government
> management. In this case individuals broke the law, with forethought,
> knowing that at worst they would loose their job. Had the same occured
> in business, the corporate exec's and middle management could have
> been held directly responsible -- that gives them the urge to
> CYA and keep tabs on things below. In this case, no one can be, just
> the State of Calif/UCB -- leads to selective blindness and I didn't
> knows.
> 
> In naming UCB in the BSDI suit, USL did not ask for damages from
> UCB, just a simple acknowledgement that UCB violated AT&T/USL rights.
> AT&T/USL could have, and may yet, get mad enough at UCB to ask
> for damages.
> 
> John Bass
> DMS Design