Apple pirates can be as clever as they are greedy. They have contrived sly schemes to trick Customs. Duplicators change the physical design and name. Moreover, disassembled or partially assembled bogus computers have been importedlegallybecause, if they are not accompanied by semiconductor chips containing copyrighted Apple software, they are allowed to enter the US. Once past Customs, it is smooth sailing to add the infringing chips. One pirate included a separate mini-program that scrambled the pirated Apple program so the theft couldnt be spotted by Customs!
What Is Behind the Commercial Piracy?
This mess was created by a Customs decision not to detain computers unless they also contained patented chips. According to a 1984 report by the House Subcommittee on Oversight and Investigations, Unfair Foreign Trade Practice: Stealing American Intellectual Property: Imitation Is Not Flattery.
This decision has created a hole in the regulations large enough to drive a truck full of counterfeit computers through. Piratical computer importers also vary their ports of entry. After one company had 10 to 15 computers seized in San Francisco, it tried elsewhere... It is not known if shipment to other, less vigilant ports went undetected.
Osborne, IBM, and Radio Shack computers are being copied as well.
Furthermore, according to the Subcommittee Report, this contributes to our balance of payments deficit.
【英语六级阅读备考:快速阅读练习(3)】相关文章:
最新
2016-10-18
2016-10-11
2016-10-11
2016-10-08
2016-09-30
2016-09-30