Wednesday, November 27, 2019

junk food essays

junk food essays There is something wrong when salsa passes as a vegetable in the school cafeteria and students can buy soda and candy from vending machines on campus. With this in mind we can only begin to wonder what the future holds for todays adolescents. When students are exposed to a life of poor nutrition, the result can be obesity and regrets. For countless Canadian children breakfast or lunch drops out of a vending machine at school. This can be a can of soda, perhaps washing down a chocolate bar followed by a bag of potato chips. Students may be junk food junkies but the schools are hooked as well and have become increasingly dependent on the revenue that soda and candy machines bring in each year. While soda sales may help supplement the schools bottom line health experts are increasingly worried that soft drinks are contributing to a students poor health. It was concluded that teen-aged boys soda consumption has tripled in the last 20 years and doubled for girls (Winter). Teens now drink twice as much soda as milk (Brasher). Conversely, children are taught in the classroom about good nutrition and the value of healthy food choices but are surrounded by vending machines, school stores and fund raisers offering low nutrient density options. They receive the message that good nutrition is merely an academic exercise. I n a similar way pizza and candy are the highest reward used for good behaviours, attendance and academic achievement (Brasher). Children spend a lot of time in schools and are afforded a great deal of freedom in selecting snack foods. Schools can and should provide an environment that exemplifies a healthier relationship with food. The rising obesity rates in children are shocking but considering that kids live in a junk food, couch- potato culture that is not surprising. A recent research report from the University of Kentucky showed that 84 percent of fo ...

Saturday, November 23, 2019

Ownership, Originality, Copying and Infringement of Software Copyright Background The WritePass Journal

Ownership, Originality, Copying and Infringement of Software Copyright Background Abstract Ownership, Originality, Copying and Infringement of Software Copyright Background : 143). However, Arnold J stated that because of the uncertainty surrounding software programs a referral to the ECJ was required. On being referred by the High Court, the ECJ held that the copyright available to computer programs under the Software Directive does not protect the functionality of a computer program, its programming language or the format of data files used in it. In January 2013, the High Court applied the ECJs ruling, yet the High Courts decision was upheld by the Court of Appeal in November 2013. In accordance with this it is likely to prove very difficult for FTS to establish a claim in copyright and even if this can be ascertained, they will still have to demonstrate additional copyright requirements, such as ownership. Accordingly, software cases also give rise to ownership issues since there will often be more than one author due to the complexity and size of computer codes generally. Nevertheless, section 9 (1) CDPA makes it clear that the owner of a work is the person that has created it. As this is a computer-generated work, it will thus be the person who arranged for the creation of the work (section 9 (3)) unless he has created the work within the course of employment. If it is found that Bill created the work, FTS will still be the owner as the ownership of copyright remains vested in an employer if the creation was made during the course of employment (section 11 CDPA). Nevertheless, as evidenced in (1) Laurence John Wrenn (2) Integrated Multi-Media Solutions v Ste phen Landamore [2007] EWHC 1833 (Ch) each case will be decided on its own facts. Here, it was held by the court that since there was a written agreement between the parties, an exclusive license could be implied. Regardless of these difficulties, however, software can still be afforded copyright protection and the most common act of infringement that occurs in relation to source or object codes is unauthorised copying. Here, a distinction needs to be made between literal and non-literal copying. Literal copying occurs when an identical copy is made, whereas non-literal copying occurs when the structure, appearance or manner of the code has been copied (Pila, 2010: 229). In the case of literal copying, it will generally be easier to establish a claim of copyright since it will merely have to be shown that a substantial part of the code has been copied, which will be based upon the skill, labour and judgment that has been expended; Cantor Fitzgerald International and Another v Tradition (UK) Limited and Other [2000] RPC 95. In the event that there has been a non-literal copying of the works, it will be a lot more complex to establish. This is because it is often the case that two completely dif ferent programs will produce the same results. Therefore, although it might appear on the face of it that the program has been copied; this may not actually be the case. In Thrustcode Ltd v WW Computing Ltd [1983] FSR 502 it was noted by the Court that; the results produced by operating the program must not be confused with the program in which copyright in claimed. Another consideration FTS will need to think about is if the codes were originally created by a third party. This is because if a third party has been commissioned to create the copyrighted work, ownership of that work will remain vested in the third party unless there has been an express agreement to the contrary (Lyons, 2005: 3). If no such agreement has been made, the court may imply an assignment or licence so that FTS can use the software, although the scope of an assignment or licence will depend entirely upon the facts of the case. In Robin Ray v Classic FM Plc [1998] FSR 622 it was held by the Court that both parties had accepted the law in relation to the implication of terms as to ownership and the licensing of copyright. Arguably, it is evident that whilst FTS may have a claim against Bill for copyright infringement, it will be very difficult to prove because of the complex nature of software copyright. Conclusion Overall, given the long process that is involved with software development, it is likely that FTSs legal advisers will have to overcome a number of obstacles before they can establish a claim in copyright. Consequently, they will first need to establish that they are the author of the products code and that it was an original creation. Once this has been ascertained they will then need to show that their product has actually been infringed by Bill, which may prove extremely difficult given the complexity of software programs. References Campbell, D. and Cotter, S. (1998) Copyright Infringement, Kluwer Law International. Lyons, T. (2005) Warning All Software Users, Electronic Business Law, Volume 7, Issue 9. Morton, T. (2013) Emerging Technologies and Continuity, Tolleys Practical Audit Accounting, Volume 24, Issue 12. Pila, J. (2010) Copyright and Its Categories of Original Works, Oxford Journal of Legal Studies, Volume 30, Issue 2. Reed, C. and Angel, J. (2003) Computer Law, 5th Edition, OUP Oxford. Case Law BezpeÄ nostnà ­ softwarov asociace – Svaz softwarovà © ochrany v Ministerstvo kultury, Case C-393/09, 22 December 2010 Cantor Fitzgerald International and Another v Tradition (UK) Limited and Other [2000] RPC 95 Infopaq International A/S v Danske Dagblades Forening [2009] EUECJ C-5/08 (16 July 2009) (1) Laurence John Wrenn (2) Integrated Multi-Media Solutions v Stephen Landamore [2007] EWHC 1833 (Ch) Navitaire Inc v Easyjet Airline Co Anor [2004] EWHC 1725 (Ch) Robin Ray v Classic FM Plc [1998] FSR 622 SAS Institute v World Programming Ltd [2010] EWHC 1829 (Ch) Thrustcode Ltd v WW Computing Ltd [1983] FSR 502

Thursday, November 21, 2019

Pakistan's international conflict between secularism and Islamic Essay

Pakistan's international conflict between secularism and Islamic militancy - Essay Example However, the Indian population had its own cultural characteristics with the original Hindu majority interspersed with a large population of Muslims, a remnant of the country’s bygone Mughal era. The Muslim population feared dominance in a vastly Hindu populated region and this fear prompted its leaders to suggest a separate state for the Muslims. The British rulers, who had handled such issues in their two centuries old reign in the region, recognized this factionalism in Indian society and with the perception that the demand was reasonable, acceded to the creation of a separate country for the Muslims. With the Muslim higher intensity of Muslim population in the Northern region of Punjab and the Eastern state of Bengal, it was decided that East and West Pakistan were two entities that would suit the purpose. Accordingly, the Sub-Continent was carved into two states, the independent republic of India and Pakistan, the latter with its two landmasses separated from each other. West Pakistan lay in the north west of the subcontinent with majority population being Punjabis, and East Pakistan at the extreme east of the subcontinent, the majority population being Bengalis. ... The remaining Pakistan in the West was the only surviving Muslim dominated region in the Indian sub-continent which has been driven by hatred for its neighbours, India and Afghanistan, rather than being an independent, progressive state as was envisaged by its creators. The country has been through numerous coups, alternating with short periods of a semblance of democracy, the latter being throttled ruthlessly by military rulers through assassinations, murder and mayhem. The Cold War era saw attempts of domination in the region by the then two superpowers, the United States and the former USSR (Union of Soviet Socialist Republics). Afghanistan had its own internal problems and remained occupied by Soviet forces for almost ten years during the Cold War. This prompted the United States to pump in economic and arms aid to Pakistan, which gleefully accepted the alms to fuel its hatred and threat to India. Although claiming to be a Muslim country, the Pakistani rulers did not hesitate to ally with China, an atheist state, taking advantage of its border dispute with India. The United States assisted Pakistan to form the Taliban, a radical Muslim organization, with an aim to cripple the USSR presence in Afghanistan, which it did with some degree of success. However, after designs of the west and internal economic and political unrest forced the dismantling of USSR, it lost interest in Afghanistan. The Taliban was left without any purpose, or the need for its existence as an entity. But the large number of youth who were recruited into the organization rebelled and trained their guns on the very creators of their organization, the United States of America. Muslim radical organizations like the now famous Al Qaida grew from West Asia and expanded into the Muslim