On 7/29/10 7:56 AM, Bruno Wolff III wrote:
On Wed, Jul 28, 2010 at 23:48:57 -0400, Paul Allen Newellpnewell@cs.cmu.edu wrote:
If doing a "black-box" only job of "reverse engineering" requires one to load memory with a trademark, how does this fall into the realm of acceptable?
There was a court case where a company was using a copyrighted phrase for access control. A competitor won when they also used the same phrase for access control purposes.
That was a long time ago and people seemed to feel that when a customer bought something, they owned it. In today's environment that case might have gone differently.
Bruno:
Thank you for the additional background ... especially the "long time ago" qualification.
Paul