From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.3 required=5.0 tests=BAYES_00,INVALID_MSGID autolearn=no autolearn_force=no version=3.4.4 X-Google-Language: ENGLISH,ASCII-7-bit X-Google-Thread: 103376,12f4d07c572005e3 X-Google-Attributes: gid103376,public X-Google-Thread: ff6c8,12f4d07c572005e3 X-Google-Attributes: gidff6c8,public X-Google-Thread: 1108a1,12f4d07c572005e3 X-Google-Attributes: gid1108a1,public X-Google-Thread: 10db24,12f4d07c572005e3 X-Google-Attributes: gid10db24,public X-Google-Thread: f43e6,12f4d07c572005e3 X-Google-Attributes: gidf43e6,public From: adaworks@netcom.com (AdaWorks) Subject: Re: Ada News Brief - 96-05-24.txt [1/1] Date: 1996/06/01 Message-ID: #1/1 X-Deja-AN: 157870145 sender: adaworks@netcom10.netcom.com references: <4o56db$p66@ns1.sw-eng.falls-church.va.us> followup-to: comp.lang.ada,comp.sw.components,comp.object,comp.software-eng,comp.edu organization: NETCOM On-line Communication Services (408 261-4700 guest) newsgroups: comp.lang.ada,comp.sw.components,comp.object,comp.software-eng,comp.edu Date: 1996-06-01T00:00:00+00:00 List-Id: Robert Dewar (dewar@cs.nyu.edu) wrote: : Richard Riehle (rriehle@nunic.nu.edu) wrote: : > Java's democratic nature is a blessing for open exhange of ideas. It : > would not lend itself easily to the protection of ideas. When we want : > to minimize the risk of sacrificing our intellectual property through : > too easy public access, nothing does the job as well as Ada. : That's a very strange viewpoint. Of course we are not talking languages : here, as someone has pointed out, but rather typical environments. : In many ways you can see Java *precisely* as a means of protecting : intellectual property and aiding software hoarding. Suppose you want : to distribute a program that will run on all systems. In the past, : the easiest, indeed the only really practical way, to do this was : to distribute sources. Now with the universal availability of Java : byte code interpretors, you can distribute JBC, and avoid distributing : the source. Robert, I re-read the above paragraph, and appreciate the logic of your statement. Perhaps the JBC is sufficient protection for those who are ordinary users. My concern is for those who specialize in purloining industrial secrets. Will JBC be secure enough to prevent someone from using it to reverse engineer my software product? Richard Riehle -- richard@adaworks.com AdaWorks Software Engineering Suite 27 2555 Park Boulevard Palo Alto, CA 94306 (415) 328-1815 FAX 328-1112