35
Applications of Writing, Hacking, and Intellectual Property Brian Ballentine West Virginia University @bdballentine [email protected] Gribben Lecture Series Oct. 24, 2014

Applications of Writing, Hacking, and Intellectual Property Brian Ballentine West Virginia University @bdballentine [email protected] Gribben

Embed Size (px)

Citation preview

  • Applications of Writing, Hacking, and Intellectual PropertyBrian BallentineWest Virginia [email protected]@mail.wvu.eduGribben Lecture SeriesOct. 24, 2014

  • Software Product Brochure*

  • Design Docs & Requirement Specs*

  • Epistemic Writing & Rhetoric*Design DocumentationRequirement SpecificationsMaterial Good/Product

  • Epistemic Writing & Rhetoric*Design DocumentationRequirement SpecificationsCOPYRIGHTMaterial Good/ProductCOPYRIGHT

  • Epistemic Writing & Rhetoric*Design DocumentationRequirement SpecificationsCOPYRIGHTMaterial Good/ProductCOPYRIGHT TRADEMARK PATENT

  • Writing, Rhetoric, & Patents*

  • Writing, Rhetoric, & Patents*

  • Amazons 1-Click*

  • Amazons 1-ClickA method and system for placing an order to purchase an item via the Internet. The order is placed by a purchaser at a client system and received by a server system. The server system receives purchaser information including identification of the purchaser, payment information, and shipment information from the client system. The server system then assigns a client identifier to the client system and associates the assigned client identifier with the received purchaser information. The server system sends to the client system the assigned client identifier and an HTML document identifying the item and including an order button. The client system receives and stores the assigned client identifier and receives and displays the HTML document. In response to the selection of the order button, the client system sends to the server system a request to purchase the identified item. The server system receives the request and combines the purchaser information associated with the client identifier of the client system to generate an order to purchase the item in accordance with the billing and shipment information whereby the purchaser effects the ordering of the product by selection of the order button.*

  • Engineering Journals*

  • Interface Trademarks*

  • Interface Trademarks*

  • Software Patents*

  • Within the virtual space represented by these interfaces, and elsewhere within computer systems, the values of our culture ideological, political, economic, educational are mapped both implicitly and explicitly, constituting a complex set of material relations among culture, technology, and technology users.- Selfe & Selfe, The Politics of the Interface, 1994*Contributing to the Codewith Writing

  • Contributing to the Codewith Writing

    Interface design is often considered to be a technical rather than a rhetorical endeavor, but I contendthat interface design problems are more like writing than programming problems and that although all projects have technical aspects, mathematical and scientific formalisms are inadequate in design situations that involve social concerns and interactions. - Selber, Multiliteracies for a Digital Age, 2004*

  • Contributing to the Codewith WritingTechnical communicators seek greater influence in designing interfaces because they see it as a fundamentally rhetorical domain, and therefore more appropriately in our control than in the hands of programmers.- Savage, Toward Professional Status in Technical Communication, 2003

    *

  • Contributing to the Codewith Writing*

  • Contributing to the Codewith Writing*

  • Contributing to the Codewith Writing*

  • Contributing to the Codewith Writing*

  • Contributing to the Codewith Writing*

  • Contributing to the Codewith Writing*

  • Contributing to the Codewith WritingWhy is this important?Composing detailed narratives within the requirements specifications can produce flexible interfaces that allow for complex problem solving. Writing is understood as facilitating the development of a software applications functionality, design, and even code. Writing may produce breakthroughs in code production, i.e., be shown to have an epistemic function.Writing can be traced directly to IP.

    *

  • Epistemic Writing & Rhetoric*Design DocumentationRequirement SpecificationsCOPYRIGHTMaterial Good/ProductCOPYRIGHT TRADEMARK PATENT

  • IP & the Incentive ModelArticle 1, Section 8, Clause 8 of the U.S. Constitution reads, The Congress shall have PowerTo promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.

  • Hacker EthicHacking is the dedication to an activity that is intrinsically interesting, inspiring, and joyous.

  • Epistemic Rhetoric & Writingbut no IPIn 1932, a group of American fashion manufacturers found themselves beset by a proliferation of cheap knockoffs. Designs, then as now, were not protected by patents or copyrights, so the manufacturers decided to take direct action to stop the copying. They set up the Fashion Originators Guild of America to monitor retailers and keep track of original designs; if you look at vintage dresses from the thirties, you can find labels reading A registered original design with Fashion Originators Guild. Retailers selling knockoffs were red-carded, and guild members wouldnt sell their merchandise to red-carded stores. This was unpopular with the retailers, but it seems to have put a damper on the copying. The only hitch in the plan was that it was illegal: in 1941, the Supreme Court ruled that the manufacturers arrangement violated antitrust law, and the knockoff artists stayed in business.

    *

  • Epistemic Rhetoric & Writingbut no IP*Fashion Sketches COPYRIGHTMaterial Good/Product NO PATENT NO COPYRIGHT TRADEMARK (limited)

  • Trademark Protection*

  • Costs & Incentives*$250.00$1500.00$198.00

  • Epistemic Rhetoric & Writingbut no IP*Fashion Sketches COPYRIGHTMaterial Good/Product NO PATENT NO COPYRIGHT TRADEMARK (limited)

  • Session 3 PromptAccording to legal scholar Jonathan Barnett (2005), the counterfeits may actually flip the standard incentive thesis underpinning IP law (that is, more IP protection means more incentive to invent). His argument is in two parts. 1) Introduction of imperfect counterfeits may enable producers to charge an enhanced snob premium to elite consumers eager to distinguish themselves from the non-elite consumers who visibly settle for the fakes. 2) Sales by counterfeiters advertise, and even exaggerate, the popularity of the relevant item, thereby arguably leading some non-elite consumers to adjust upward their estimate of the expected status benefits to be gained by visibly owning the original (1384-5).

    *

  • Counterfeits*

  • Thank you!Brian BallentineWest Virginia [email protected]@mail.wvu.edu

    And we have known this about interface design weve known about the issues Cooper brings up and more. *Particularly in the field of professional and technical communication academics and practitioners have recognized and to a certain extent capitalized on this space. Butthe space is crowded. In his introduction to the collection, Power and Legitimacy in Technical Communication, volume I, Gerald Savage notes: *This presentation and my forthcoming/in development presentation at Cs stem from the ideas of this article now a year old. *