Tuesday, February 25, 2020

Case Study Research Paper Example | Topics and Well Written Essays - 500 words - 5

Case Study - Research Paper Example According to this company, their peanuts butter and jelly pockets are enclosed using crimping method and they do not include the outer hard part of the bread. However, the U.S. Patent and Trademark office rejected the company’s request by claiming that the same method was being for making pie crust, which has been use since 1980s. The Smucker’s argument is unjustifiable because they bought the idea from other people and other producers of similar products had already established their companies in the same industry. According to Greenhalgh & Rogers, (2010), since the company already has an exclusive authority to produce peanut butter and Jelly sandwich, it would be unfair for them to protect the method they use to produce their own products. The U.S. patent system claims that granting Smucker company absolute right to process and sell the Uncrustables will disadvantage the buyers because it will create monopoly in the sale of those products (Matthew, 2011). This is true because these are essential commodities and Smucker already has patent for production of peanut butter and jelly sandwich. By limiting the processes used in manufacturing will discourage other interested investors from exploiting the available opportunities in the market. According to those who were in favor of Smucker idea to acquire protection against duplication of the production of Uncrustables, excusive right encourages inventions and economic advancement. This is because it offers incentives to those people with unique ideas. However, the patenting department f United States claimed that most of the ideas are not inventive but just modifications of the existing ideas (Matthew, 2011). It is obvious that even the J.M. Smucker had purchased the idea from Len Kretchman and David Geske who were the initial owners of the invention. Therefore, this argument is somewhat invalid because such a move will limit economic advancement. According to

Sunday, February 9, 2020

Phenomena of Piracy and Copyright Laws Essay Example | Topics and Well Written Essays - 1000 words

Phenomena of Piracy and Copyright Laws - Essay Example The Anthill infrastructure proposes an idea in which nesting becomes a vital component. Nest implementation consists of three components which consist of document storage, ant manager, and a gateway agent. In this particular framework, five nests work together as a storage component for these networks and use algorithms. The current model of Anthill enables users engaged in the P2P system to use genetic algorithms that may simplify tasking of specifying the parameters for a query. One of the aspects that were explored with Anthill was to program it in Java since Java is portable is secured. Since Ants are generated by nests in response to requests, each and tries to fulfill the request for which needs to be generated. Anthill is special because it takes care of all low-level details such as communication, security, and scheduling. Developers wishing to experiment with new P2P protocols can concentrate on developing suitable and algorithms using the framework. Bit Torrent is a file distribution system that is heavily used by users for sharing information through bits and pieces. When a file is available using HTTP, the upload costs are atoned by the hosting machine. However, with the advent of a Bit Torrent, multiple users that are downloading a similar file can share that file with each other. This is highly effective as it reduces not only the cost but the lag time in downloading. A unique feature of Bit Torrent interface is the fact that it is very simple to use. Users can easily navigate and launch Bit Torrent using the â€Å"Save As† button. One of the key aspects regarding Bit Torrent is the issue of deployment. Users who want to initiate deployment of a specific torrent by using the extension .torrent on an ordinary web server. The whole essence of Bit Torrent is to enhance the functions of peer sharing.Â