Monday, February 24, 2020

Internet Piracy - Preventing the Distribution and Downloading of Essay

Internet Piracy - Preventing the Distribution and Downloading of Copyrighted Material - Essay Example Internet piracy is considered unethical and is said to be no different from stealing. Information should not be free and sharing of copyrighted material is illegal as stipulated in rules and regulations regarding freedom of information. Basing on the ethical argument and the negative economic repercussions of internet piracy, companies and all other entities handling copyrighted information should put in place measures to prevent the distribution and downloading of copyrighted material. Copyright A copyright generally refers to a collection of rights granted by an authority to an innovator of an original piece of work for a specific period of time and in return their work will be disclosed to the general public inclusive of the right to duplicate or adapt their work of art. Usually copyright owners do not have to be registered. They have the absolute right to control copying and other manipulation of their piece of art for a limited duration after which the particular piece of work g oes into the public domain. Copyright owners are however getting themselves in trouble in the modern world because of the beast that has been manifested through internet piracy (Sheri 68). The essay discusses some of the methods that can be used by companies to protect data against internet piracy. Copy protect This is among the most commonly used methods by film, music, video game and software companies. Copy protect is an exceptional application that majorly prevents illegal distribution (New Softwares. net, Inc). It is distinct data copy protection software that inhibits the replication of information i.e. copyrighted CDs/DVDs. It can be described simply as a technology that prevents duplication and sharing of copyrighted material. It is important to protect pictures, documents, videos, software, story scripts, designs and audios as they can be easily shared. It has been noted that companies that use copy protection to make higher profits. Although implementation of the copy prot ection is expensive, it is countered by increased profits which are gained by preventing piracy of copyrighted files. This application has strong copy protection for documents, videos, audios, software, video games and information. Additionally, they are user-friendly with navigate user interface that does not require added programming skills. Companies can safely distribute their songs, software, films, video games and graphical designs using distribution media such as CDs, DVDs, Blu- ray disc and many others (New Softwares. net, Inc.). This application has been modified to fit the needs of different customers. It also eliminates the need to set up the application on the other end that opens the copy protected documents. Finally, the application prevents internet piracy, file sharing and illegal distribution. A joint venture that seeks to prevent the illegal download of copyrighted material: Two global companies: ContentX Technologies and Cybermesh International Corp. have worked h and in hand to help companies deal with the problem of illegal downloading of copyrighted materials (Bokdawalla). ContentX deals in internet security, monetization and security applications that will be valuable in venture. On the other hand, Cybermesh International Corp. develops technologies that are used in the online distribution in the media, entertainment and telecommunication

Saturday, February 8, 2020

Processors Essay Example | Topics and Well Written Essays - 2250 words

Processors - Essay Example PowerPC is largely based on IBM's earlier POWER architecture, and retains a high level of compatibility with it; the architectures have remained close enough that the same programs and Operating Systems will run on both if some care is taken in preparation; newer chips in the POWER series implement the full PowerPC instruction set. The original POWER microprocessor, one of the first superscalar RISC implementations, was a high performance, multi-chip design. IBM soon realized that they would need a single-chip microprocessor and to eliminate some POWER processor instructions to scale their RS/6000 line from lower-end to high-end machines, and work on a single-chip POWER microprocessor, called the RSC (stands for RISC Single Chip) began. In early 1991 IBM realized that their design could potentially become a high-volume microprocessor used across the industry. IBM approached Apple with the goal of collaborating on the development of a family of single-chip microprocessors based on the POWER architecture. Soon after, Apple, as one of Motorola's largest customers of desktop class microprocessors, asked Motorola o join the discussions because of their long relationship, their more extensive experience with manufacturing high-volume microprocessors than IBM and to serve as a second source for the microprocessors. This three way collaboration became known as AIM alliance, for Apple, IBM, Motorola. In 1991, the PowerPC was just one facet of a larger alliance between these three companies. On the other side was the growing dominance of Microsoft and Windows in personal computing and of Intel processors. At the time, most of the Personal Computer industry was shipping systems based on Intel 80386 and 80486 chips, which had CISC architecture and development of the Pentium Processor was well underway. The PowerPC chips was one of several joint vent ures involving the three, in their efforts to counter the growing Microsoft-Intel dominance of personal computing. The PowerPC is designed along RISC principles, and allows for a superscalar implementation. Versions of the design exist in both 32-bit and 64-bit implementations. Starting with the basic POWER specifications, the PowerPC added some features, including: Support for operation in both big-endian and little-endian modes - the PowerPC can switch from one mode to the other at runtime. This feature is not supported in the PowerPC G5. Single-precision forms of some floating point instructions, in addition to only double-precision forms. Additional floating point instructions at the behest of Apple. A complete 64-bit specification, which is backward compatible with the 32-bit mode. Removal of some of the more esoteric POWER instructions, some of which could be emulated by the Operating Systems, if necessary. A paged memory management architecture which is used extensively in server and PC systems. Addition of a new memory management architecture called Book-E, replacing the conventional paged memory management architecture for embedded applications. Book-E is application software compatible with existing PowerPC implementations, but requires minor changes to the Operating Systems. Operating Systems that work on the PowerPC architecture are generally divided into those which are oriented towards general-purpose PowerPC systems, and those oriented towards the embedded PowerPC systems. A 64-bit PowerPC application