Legend in rivers and lakes
-- Who should I catch?
I didn't want to be overwhelmed by the storm, but I had to worry about it. Recently, there were several drops of waves that showed me the coral worm event.
The incident itself has already been clearly handled by the local public security authorities and produced a TV program. However, the discussion on the Internet has come one after another, and some people may even initiate a website of solidarity with the author of coral reef, I will not talk about both sides here. I just want to talk about my thoughts.
Thought 1: Will intellectual property rights be captured?
First of all, under the existing legal and ethical standards, I do not think that the infringement of intellectual property rights is legal.
Secondly, with my common sense, the official announcement of the official Chinese official forum rate is just a few hundred thousand. Most of the more than 20% computer users may be unauthorized users, do we need to treat the existence of a large number of infringers in our country in the form of Chen shoufu, the author of coral reef worm? In this way, we treat Chen shoufu with "a good start? We should treat all non-authorized users in China like Chen shoufu in a way that would result in no infringement in China? Or should we use the wisdom of the ancient Chinese Water Governance to help these hundreds of millions of unauthorized users solve the problem? I firmly believe that wisdom comes from the people, and our nation will never bear the charges of pirated countries. I also firmly believe that our judicial organs have no place to host these hundreds of millions of illegal authorized users, think twice.
Therefore, this case is a case and is not universal, but why does it happen to the author of cordenia? Let's continue our thinking!
Thinking 2: Why do hundreds of thousands of rogue software capture a disseminator?
There are a lot of people working on rogue software. I have never heard of which rogue software author should be brought to justice. How can I solve the issue of spreading rogue software? Of course, the spread of rogue software is also illegal, but said that the spread of rogue software will not be the author of the Cortana, right? How can we spread the spread of rogue software? In my opinion, China Telecom should also bear the joint agency responsibility. Which rogue software is not installed in the end user's computer through the communication infrastructure of various telecommunications companies? The bamboo who caught the spread of rogue software should be knocked down by a ship. Why is the author of the coral reef of the spread of rogue software and the creation of rogue software alone in the water? Is it a precise and guided beheaded action! It's a fear of killing chickens and monkeys!
Internet users who have a history of surfing the internet know that there is no Internet in the world, and there was an internet in the later part of the last century. There was no instant messaging software in the world, and the instant messaging software ICQ was naturally available on the Internet; there is no QQ in the world, and ICQ naturally has a Chinese youth imitating ICQ In the predicament to make a thing called QICQ. As a result, ICQ has been sued for infringement and has to be renamed "QQ "; there is no coral worm QQ in the world, and someone has QQ as a coral worm. Therefore, Buddha said: "If there is a reason in this world, there will be a result!
When I browsed the online information, I saw that the Cortana author invaded QQ's right at school, and the defendant issued a letter of guarantee. However, the Cortana author later retried the technology and infringed QQ again, this QQ manufacturer is just as sincere as it is, although it is not as tough as Zhuge Wuhou, but it is also the first to give up. The author of your coral worm is not entitled to "Fu, Yi, and Shou" for teaching at a famous university. What kind of IT are you doing! In the past few years, even domestic portal Websites sued each other and sued the other party for plagiarizing themselves. Even international IT giants have been fighting for dozens of years. How can one of your educators understand this?
Think 3: What kind of moles do I have to be alone?
I want to see readers who have read the report on coral worms already know what else to be fascinated by Chen fushou, the word "money ", this word turns the Teacher Chen fushou from the university lecture hall into a prisoner "sinking Beast ". However, Chen fushou cannot be arrested because of infringement or rogue software! This leads to another thought.
Thinking 4: Why do we focus on Chen fushou?
In a word, Chen fushou is confused by money and blocks others' financial paths, which naturally affects others' "happiness and life ". More than two thousand years ago, the taishi Gong said: "The world is busy, and the world is busy ". Who will believe that our honorable public security police officers will capture a small "coral worm" in thousands of miles from the North to the South? I advise programmers to have more time to read books like "Historical Records", but the program can be well written, the code algorithm can be better, and the rules of the rivers and lakes cannot be understood.
We hope that the next time we stir up the IT world, we will be nothing more than a worm.
This is exactly: "pandatv is burning for thousands of years,
Coral worms live for a summer;
There are new people in the ten generations of jianghu,
The program has a strong life !"
This is an age of courtesy, heartless, and reasonable money! That's it.
Wang open-source
2007,10, 24
Trackback: http://tb.blog.csdn.net/TrackBack.aspx? PostId = 1842057