January 09, 2013

English Article :The Great Language Land Grab

Be The First To Comment


When tech companies engage in legal squabbles about who gets to use our everyday words, what are ordinary speakers of the language to make of it all?



Related



Microsoft is suing Apple, and Apple is suing Amazon, all over the right to use a simple two-word phrase: “app store.” Apple got there first, introducing its App Store in July 2008 as a marketplace for mobile applications. In January, Microsoft disputed Apple’s trademark claim, arguing that “app store” had already become a generic expression. And last week, Amazon announced its own “Appstore” for Google’s Android devices, prompting an infringement suit from Apple.

It’s not the first time the tech industry has claimed commonplace language as its own.

Facebook has been notorious in this regard, filing trademarks on an array of common four-letter words: “like,” “wall,” “poke” and, naturally,“face” and “book.” Last year, two small Internet start-ups, the travel site Placebook and the educational site Teachbook, learned the danger of using “book” for online services when Facebook’s lawyers came calling. (Placebook renamed itself, while Teachbook continues to fight it out.)

Microsoft, of course, has long been playing this game by fiercely upholding prosaic brand names like Windows, Office and Word. The Linux-based operating system Lindows, for instance, agreed to change its name (to Linspire) in 2004 after years of wrangling over whether “Windows” was generic. Now, in the “app store” dispute, the shoe is on the other foot, with Microsoft taking the role of language loosener.

According to Christopher Johnson, a branding expert who runs the Web site the Name Inspector, “there’s a land grab going on” in the information economy, as “companies are trying to snatch up pieces of our cultural commons.” He lays much of the blame on the increasing scarcity of available names, whether for trademarks, domain names or Twitter handles.

Laurel Sutton, co-founder of the branding company Catchword, said she believed that the United States Patent and Trademark Office is “about five Internet years behind the times” in its willingness to allow companies like Apple to stake claims to generic words and phrases. “All kinds of stuff gets approved that probably shouldn’t have,” Ms. Sutton said. If Apple’s trademark is upheld, she reasons, it won’t harm the bottom lines of Microsoft and Amazon — but smaller companies could be hurt. “This type of appropriation of language is only going to continue unless the U.S.P.T.O. realizes the potential for damage,” she warned.

For what it’s worth, the facts in the “app store” cases don’t look terribly promising for Steve Jobs and his fellow Cupertino visionaries. “App” has been used by the computing crowd since at least 1985 as a short form of “application.” And as Microsoft lawyers were happy to point out in the January filing, Mr. Jobs himself has used “app store” in a generic manner. In a conference call with analysts last October, he was quoted as saying that “Amazon, Verizon and Vodafone have all announced that they are creating their own app stores for Android.” Blithely pluralizing “app store” like that is no way to protect a trademark that is supposed to be distinctive.

Though I don’t have a dog in this fight, Microsoft also quoted me in its brief, since as chairman of the American Dialect Society’s new-words committee I was responsible for making the announcement that “app” had been selected as the society’s 2010 word of the year. That ended up being another quiver in Microsoft’s bow, demonstrating how widespread the terms “app” and “app store” have become.

No matter the outcome of this dispute, you don’t have to worry that Apple’s lawyers will pound on your door with a cease-and-desist order if you mention that you want to download Angry Birds from an “app store” lacking the Apple seal of approval. “This is not something that the general public needs to get bent out of shape about,” said Jessica Stone Levy, a Denver-based trademark lawyer. “This is really corporate maneuvering.”

The greater concern among Silicon Valley observers is the vast amount of time and money that these companies are spending in trademark proceedings that may amount to little more than gamesmanship. Rather than fighting over little words, the innovators of the Information Age could be busy, well, innovating.

January 03, 2013

OSHO

Be The First To Comment
The great silence
Silence usually is understood to be something negative, something empty, an absence of sound, of noises. This misunderstanding is prevalent because few people have ever experienced silence. All that they have experienced in the name of silence is noiselessness. But silence is a totally different phenomenon. It is utterly positive. It is existential, it is not empty. It is overflowing with a music that you have never heard before, with a fragrance that is unfamiliar to you, with a light that can only be seen with your inner eyes. It is not something fictitious; it is a reality, and a reality which is already present in everyone-just we never look in. Your inner world has a taste of its own, has its own fragrance, has its own light. And it is utterly silent, immensely silent, eternally silent.

When you are not doing anything at all – bodily, mentally, on no level – when all activity has ceased & you simply are, just being, that’s what meditation is.

December 28, 2012

Children during the Holocaust

Be The First To Comment
Children were especially vulnerable in the era of the Holocaust. The Nazis advocated killing children of “unwanted” or “dangerous” groups in accordance with their ideological views, either as part of the “racial struggle” or as a measure of preventative security. The Germans and their collaborators killed children both for these ideological reasons and in retaliation for real or alleged partisan attacks.
The Germans and their collaborators killed as many as 1.5 million children, including over a million Jewish children and tens of thousands of Romani (Gypsy) children, German children with physical and mental disabilities living in institutions, Polish children, and children residing in the occupied Soviet Union. The chances for survival for Jewish and some non-Jewish adolescents (13-18 years old) were greater, as they could be deployed at forced labor.

December 27, 2012

Avast Internet Security 2013 New With Keys

Be The First To Comment


 

 

 

 

 

 

 

 

To run avast! Internet Security, your PC must meet the following criteria:
Operating Systems Supported
Windows 7 (any Edition, 32-bit or 64-bit)
Windows Vista (any Edition excl. Starter Edition, 32-bit or 64-bit)
Windows XP Service Pack 2 or higher (any Edition, 32-bit or 64-bit)
Minimum Hardware Requirements
Pentium 3 Processor
256 MB RAM

AVG.Internet Security .2013.13.0.2667

Be The First To Comment


 

AVG Internet Security 2013 - a set of programs to protect your PC from dangerous objects and network threats. The program includes an extensive set of features: antivirus, anti-rootkit, firewall, email protection and personal data, scanner web links. Blocks viruses, Trojans, worms, spyware, and firewall to protect against network attacks. When using AVG Internet Security 2013 you will not have to worry about identity theft, spam or viruses.

Size:261.63 MB

Panda Antivirus Pro 2012 v11.00.00

Be The First To Comment


















Description
Protect your online world with the new Panda Antivirus Pro 2012.
Essential protection but more than a simple antivirus. The new Panda Antivirus Pro 2012 offers protection easier and more intuitive to use for your computer. Install it and forget about viruses, spyware, rootkits, hackers and online fraud.

Kaspersky Internet Security ©2013 v13.0.1.4190 + One Year License Key

Be The First To Comment

 


Kaspersky Internet Security has always provided protection for online transactions... and, in the latest version, whenever you attempt to log on to an online bank, a payment system website or an e-commerce site, our unique, new Safe Money feature will:

Compare the websiteΓÇÖs URL with a database of secure sites
Check the certificate used to set up the secure connection ΓÇô to avoid any behind-the-scenes transition from your intended site to a ΓÇÿfakeΓÇÖ site
 

© 2011 Youbook - Designed by Mukund | ToS | Privacy Policy | Sitemap

About Us | Contact Us | Write For Us