Suchergebnisse
Filter
Format
Medientyp
Sprache
Weitere Sprachen
Jahre
12934 Ergebnisse
Sortierung:
COMPUTER ASSISTED LANGUAGE LEARNING ; ИЗУЧЕНИЕ ИНОСТРАННЫХ ЯЗЫКОВ С ПОМОЩЬЮ КОМПЬЮТЕРНЫХ ТЕХНОЛОГИЙ
The article presents a general overview of the teaching and learning of foreign languages through multimedia and computer technology. Since its introduction, this practice has undergone significant changes in the content, approaches and methods of implementation on its development path. It has gone through several stages, which were determined by the level of computerization, the development of technologies in the field of communication and the emergence of new software products. This provision, in turn, has enabled the development of a significant number of types and kynds of tasks. The variety of these exercises and their functional capabilities is increasing along with the development of computer technology. At the present stage, practitioners working in the field of teaching foreign languages with the help of multimedia and computer technologies, are facing a number of tasks. They were developed as a result of a study commissioned by the educational unit of the European Union and formulated in a number of documents published in the early 2000s. As a result, task forces were established to develop recommendations and training programs at different regional levels and stages of teaching. The creation of relevant Internet sites has enabled specialists to become aware of the ongoing innovation processes. This experience should be studied and adopted by domestic specialists. The article presents a general overview of the teaching and learning of foreign languages through multimedia and computer technology. Since its introduction, this practice has undergone significant changes in the content, approaches and methods of implementation on its development path. It has gone through several stages, which were determined by the level of computerization, the development of technologies in the field of communication and the emergence of new software products. This provision, in turn, has enabled the development of a significant number of types and kynds of tasks. The variety of these exercises and their functional capabilities is increasing along with the development of computer technology. At the present stage, practitioners working in the field of teaching foreign languages with the help of multimedia and computer technologies, are facing a number of tasks. They were developed as a result of a study commissioned by the educational unit of the European Union and formulated in a number of documents published in the early 2000s. As a result, task forces were established to develop recommendations and training programs at different regional levels and stages of teaching. The creation of relevant Internet sites has enabled specialists to become aware of the ongoing innovation processes. This experience should be studied and adopted by domestic specialists. ; Статья представляет собой общий обзор процесса преподавания и изучения иностранных языков с помощью мультимедийных средств и компьютерных технологий. С момента своего появления эта практика на пути своего развития претерпела значительные изменения в содержании, подходах и методах реализации. Она прошла несколько этапов, которые обусловливались уровнем компьютеризации, развитием технологий в сфере коммуникации и появлением новых программных продуктов. Это обеспечение, в свою очередь, дало возможность разработки значительного количества типов и видов заданий. Многообразие этих упражнений и их функциональные возможности увеличиваются по мере развития компьютерных технологий. На современном этапе перед специалистами-практиками, работающими в сфере преподавания иностранных языков с помощью мультимедийных средств и компьютерных технологий, стоит ряд задач. Они были разработаны в результате исследования, проведенного по заказу образовательного подразделения Евросоюза и сформулированные в ряде документов, опубликованных в начале 2000-х гг. В результате были созданы целевые группы для разработки рекомендаций и программ обучения на разных региональных уровнях и этапах преподавания. Создание соответствующих интернет-сайтов дало возможность специалистам быть в курсе происходящих инновационных процессов. Этот опыт должен быть изучен и использован отечественными специалистами.
BASE
Law Protection of Computer Programs in the State of Israel
In: Tirosh. Jewish, Slavic & Oriental Studies, Band 18, S. 206-218
Nowadays IT sphere all over the world experiences rapid growth. This situation also refers to the State of Israel that is considered to be one of the leaders in IT-startups and IT sphere in all. The development of IT has a great influence on economy of Israel and its economic development. Application software is usually defined as a main unit in information technologies. Therefore, legal protection of software becomes one of the most important issues regarding IT sphere. Intellectual property law in Israel is mostly based on British intellectual property law. International legislation concerning intellectual property also influences Israeli IP law. As in the majority of countries, in Israel software is considered as an object of copyright law and it is protected in compliance with its provisions. Copyright law is regulated by the Copyright Act passed the Knesset in 2007. The term of protection granted by this Act shall be the life of the author and seventy years after his death. In accordance with the main principle of copyright law, software has been protected since the moment the software was created. That means that software in Israel does not subject to registration or any other procedure of its kind. It is also possible to register a logo and a unique name of software as a trademark, and this can become a substantial addition to the law protection.
КОМП'ЮТЕРНІ ПРОГРАМИ ЯК ОБ'ЄКТ БУХГАЛТЕРСЬКОГО ОБЛІКУ ; Computer programs as accounting object
Розглянуто існуючі підходи до регулювання бухгалтерського обліку комп'ютерних програм як одного з видів нематеріальних активів підприємства. Проаналізовано особливості розвитку і сучасний стан правової охорони комп'ютерних програм. Виявлено причини необхідності застосування патентного права як засобу правової охорони окремих елементів комп'ютерних програм. Проаналізовано вплив правових аспектів використання комп'ютерних програм за вітчизняним законодавством на їх бухгалтерське відображення. Проаналізовано можливі варіанти передачі прав від суб'єктів авторського права на комп'ютерні програми, що слід враховувати при побудові системи обліку комп'ютерних програм на підприємстві. Виділено і проаналізовано характеристики комп'ютерної програми як нематеріального активу згідно з чинним законодавством. Обґгрунтовано загальноекономічні характеристики комп'ютерних програм як одного з видів нематеріальних активів. Виділено основні відмінні риси комп'ютерних програм, порівняно з іншими видами інтелектуальної власності. ; Existing approaches to the regulation of accounting software as one of the types of intangible assets have been considered. The features and current state of the legal protection of computer programs have been analyzed. The reasons for the need to use patent law as a means of legal protection of individual elements of computer programs have been discovered. The influence of the legal aspects of the use of computer programs for national legislation to their accounting reflection has been analyzed. The possible options for the transfer of rights from computer programs copyright owners have been analyzed that should be considered during creation of software accounting system at the enterprise. Identified and analyzed the characteristics of computer software as an intangible asset under the current law. General economic characteristics of computer programs as one of the types of intangible assets have been grounded. The main distinguishing features of software compared to other types of intellectual property have been all ocated.
BASE
Copyright protection for computer programs ; Защита авторского права на компьютерные программы ; ЗАХИСТ АВТОРСЬКОГО ПРАВА НА КОМП'ЮТЕРНІ ПРОГРАМИ
Zerov K. Copyright protection for computer programs. The article discusses the main approaches to the legal protection of software, particularly computer programs, in accordance with the current legislation of Ukraine and foreign practices. It is concluded that copyright allows to adequately protect the forms of expression of a computer program: object and source codes of the program. It is noted that a computer program shall be protected if it is original in the sense that it is the author's own intellectual creation, and no other criteria shall be applied to determine its eligibility for protection in Ukraine. Like any other copyright object, a computer program has «legally indifferent» and «legally significant» elements of the form of expression. The legally indifferent elements of a computer program should include a) elements dictated by the efficiency of a computer program; (b) elements that are dictated by external factors; and (c) elements that the original programmer had taken from the public domain. The main approaches to the use (copying) of the source or object code of computer programs as part of other computer programs are given: «literal copying» and «non-literal copying.» It is concluded that «non-literal copying» of a computer program cannot violate the copyright law in Ukraine since the ideas and principles on which any element of a computer program is based are not protected by copyright. It is assumed that the modification of a computer program by eliminating technical means of protection and further use of computer programgives grounds to qualify such actions as two separate types of copyright infringement: infringement of the copyright holder's property rights and deliberately circumventing technical means of copyright protection. It is noted that in some scenarios, theuse of works under the limitation of copyright without circumvention of technical means may be impossible. The proposal to legislatively provide for the possibility of a person who has the right to freely use work to contact the copyright holder with a request to remove technical means solely for such use, as well as cases of permissible circumvention of technical means, has been made.Keywords: computer program, copyright, literal copying, non-literal copying ; Ключові слова: комп'ютерна програма, авторське право, дослівне копіювання, недослівне копіювання У статті розглянуто основні підходи до правової охорони комп'ютерних програм. Наголошено, що комп'ютерна програма має «юридично байдужі» та «юридично значущі» елементи форми вираження. Наведено основні підходи до використання (копіювання) коду комп'ютерних програм у складі інших комп'ютерних програм. Зроблено висновок, що «недослівне копіювання» комп'ютерної програми не може визнаватися порушенням авторського права в Україні, а модифікація комп'ютерної програми шляхом усунення технічних засобів захисту програми та її подальше використання дає підстави кваліфікувати такі дії як два окремі види порушення авторського права. Посилання 1. Андрощук Г. О., Петренко С. А. Правова охорона програмного забезпечення (комп'ютерних програм і баз даних). Київ : НДІ ІВ НАПрНУ, 2013. 300 с. 2. Про авторське право і суміжні права : Закон України № 3792-XII від 23.12.1993 р. Відомості Верховної Ради України. 1994. № 13. Ст. 64. (зі змінами). 3. Кашанин А. В. Творческий характер как условие охраноспособности произведения в российском и иностранном авторском праве. URL :https://publications.hse.ru/articles/72339313. 4. Directive 2009/24/EC of the European Parliament and of the Council of 23 April 2009 on the legal protection of computer programs (Codified version). URL: http://eur-lex.europa.eu/legal-content/EN/ALL/ ?uri=CELEX%3A32009L0024. 5. Association Agreement between the European Union and its Member States, of the one part, and Ukraine, of the other part URL: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2014:161:FULL&from=EN. 6. Про деякі питання практики вирішення спорів, пов'язаних із захистом прав інтелектуальної власності : постанова Пленуму Вищого господарського суду України № 12 від 17.10.2012. URL: http://zakon5.rada.gov.ua/laws/show/v0012600-12/print1446498314299733. 7. Угода про торговельні аспекти прав інтелектуальної власності. URL: http://zakon2.rada.gov.ua/laws/show/981. 8. Початковий код. Матеріал з Вікіпедії — вільної енциклопедії. URL: https://uk.wikipedia.org/w/index.php?title=Початковий_код&oldid=29322372. 9. Object code. From Wikipedia, the free encyclopedia. URL: https://en.wikipedia.org/wiki/Object_code 10. IT-патенты для российских разработчиков софта: польза, проблемы, подводные камни. URL: https://habr.com/ru/post/527484. 11. Ионас В. Я. Произведения творчества в гражданском праве. Москва : Юридическая литература. 1972. 168 с. 12. Computer Associates v. Altai (BitLaw). 982 F.2d 693. URL: https://www.bitlaw.com/source/cases/copyright/altai.html. 13. Raysman R. Copyright Infringement of Computer Software and the 'Altai' Test / R. Raysman, P. Brown. URL: http://euro.ecom.cmu.edu/program/law/08-732/Copyright/CopyrightInfringementOfSoftware.pdf. 14. Nova Productions Ltd v Mazooma Games Ltd & Ors [2007] EWCA Civ 219 (14 March 2007). URL: http://www.bailii.org/ew/cases/EWCA/Civ/2007/219.html 15. Navitaire Inc v Easyjet Airline Co. & Anor [2004] EWHC 1725 (Ch) (30 July 2004). URL: http://www.bailii.org/ew/cases/EWHC/Ch/2004/1725.html. 16. Judgment of the Court (Grand Chamber), 2 May 2012 SAS Institute Inc. v World Programming Ltd. Case C‑406/10. ECLI:EU:C:2012:259. URL: http://curia.europa.eu/juris/liste.jsf?num=C-406/10. 17. U.S. Code. Title 17. Chapter 12. § 1201- Circumvention of copyright protection systems. URL:https://www.law.cornell.edu/uscode/text/17/1201. ============================================== 1. Androshchuk H. O., Petrenko S. A. Pravova okhorona prohramnoho zabezpechennia (kompiuternykh prohram i baz danykh). Kyiv : NDI IV NAPrNU, 2013. 300 s. 2. Pro avtorske pravo i sumizhni prava : Zakon Ukrainy № 3792-XII vid 23.12.1993 r. Vidomosti Verkhovnoi Rady Ukrainy. 1994. № 13. St. 64. (zi zminamy). 3. Kashanyn A. V. Tvorcheskyi kharakter kak uslovye okhranosposobnosty proyzvedenyia v rossyiskom y ynostrannom avtorskom prave. URL :https://publications.hse.ru/articles/72339313. 4. Directive 2009/24/EC of the European Parliament and of the Council of 23 April 2009 on the legal protection of computer programs (Codified version). URL: http://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX%3A32009L0024. 5. Association Agreement between the European Union and its Member States, of the one part, and Ukraine, of the other part URL: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2014:161:FULL&from=EN. 6. Pro deiaki pytannia praktyky vyrishennia sporiv, poviazanykh iz zakhystom prav intelektualnoi vlasnosti : postanova Plenumu Vyshchoho hospodarskoho sudu Ukrainy № 12 vid 17.10.2012. URL: http://zakon5.rada.gov.ua/ laws/show/v0012600-12/print1446498314299733. 7. Uhoda pro torhovelni aspekty prav intelektualnoi vlasnosti. URL: http://zakon2.rada.gov.ua/laws/show/981. 8. Pochatkovyi kod. Material z Vikipedii — vilnoi entsyklopedii. URL: https://uk.wikipedia.org/w/index.php?title=Pochatkovyi_kod&oldid=29322372. 9. Object code. From Wikipedia, the free encyclopedia. URL: https://en.wikipedia.org/wiki/Object_code. 10. IT-patentы dlia rossyiskykh razrabotchykov softa: polza, problemы, podvodnыe kamny. URL: https://habr.com/ru/post/527484. 11. Yonas V. Ya. Proyzvedenyia tvorchestva v hrazhdanskom prave. Moskva : Yurydycheskaia lyteratura. 1972. 168 s. 12. Computer Associates v. Altai (BitLaw). 982 F.2d 693. URL: https://www.bitlaw.com/source/cases/copyright/altai.html. 13. Raysman R. Copyright Infringement of Computer Software and the Altai Test / R. Raysman, P. Brown. URL: http://euro.ecom.cmu.edu/program/law/08-732/Copyright/CopyrightInfringementOfSoftware.pdf. 14. Nova Productions Ltd v Mazooma Games Ltd & Ors [2007] EWCA Civ 219 (14 March 2007). URL: http://www.bailii.org/ew/cases/EWCA/Civ/2007/219.html. 15. Navitaire Inc v Easyjet Airline Co. & Anor [2004] EWHC 1725 (Ch) (30 July 2004). URL: http://www.bailii.org/ew/cases/EWHC/Ch/2004/1725.html. 16. Judgment of the Court (Grand Chamber), 2 May 2012 SAS Institute Inc. v World Programming Ltd. Case C‑406/10. ECLI:EU:C:2012:259. URL: http://curia.europa.eu/juris/liste.jsf?num=C-406/10. 17. U.S. Code. Title 17. Chapter 12. § 1201- Circumvention of copyright protection systems. URL:https://www.law.cornell.edu/uscode/text/17/1201.
BASE
Copyright protection for computer programs ; Защита авторского права на компьютерные программы ; ЗАХИСТ АВТОРСЬКОГО ПРАВА НА КОМП'ЮТЕРНІ ПРОГРАМИ
Zerov K. Copyright protection for computer programs. The article discusses the main approaches to the legal protection of software, particularly computer programs, in accordance with the current legislation of Ukraine and foreign practices. It is concluded that copyright allows to adequately protect the forms of expression of a computer program: object and source codes of the program. It is noted that a computer program shall be protected if it is original in the sense that it is the author's own intellectual creation, and no other criteria shall be applied to determine its eligibility for protection in Ukraine. Like any other copyright object, a computer program has «legally indifferent» and «legally significant» elements of the form of expression. The legally indifferent elements of a computer program should include a) elements dictated by the efficiency of a computer program; (b) elements that are dictated by external factors; and (c) elements that the original programmer had taken from the public domain. The main approaches to the use (copying) of the source or object code of computer programs as part of other computer programs are given: «literal copying» and «non-literal copying.» It is concluded that «non-literal copying» of a computer program cannot violate the copyright law in Ukraine since the ideas and principles on which any element of a computer program is based are not protected by copyright. It is assumed that the modification of a computer program by eliminating technical means of protection and further use of computer programgives grounds to qualify such actions as two separate types of copyright infringement: infringement of the copyright holder's property rights and deliberately circumventing technical means of copyright protection. It is noted that in some scenarios, theuse of works under the limitation of copyright without circumvention of technical means may be impossible. The proposal to legislatively provide for the possibility of a person who has the right to freely use work to contact the copyright holder with a request to remove technical means solely for such use, as well as cases of permissible circumvention of technical means, has been made.Keywords: computer program, copyright, literal copying, non-literal copying ; Ключові слова: комп'ютерна програма, авторське право, дослівне копіювання, недослівне копіювання У статті розглянуто основні підходи до правової охорони комп'ютерних програм. Наголошено, що комп'ютерна програма має «юридично байдужі» та «юридично значущі» елементи форми вираження. Наведено основні підходи до використання (копіювання) коду комп'ютерних програм у складі інших комп'ютерних програм. Зроблено висновок, що «недослівне копіювання» комп'ютерної програми не може визнаватися порушенням авторського права в Україні, а модифікація комп'ютерної програми шляхом усунення технічних засобів захисту програми та її подальше використання дає підстави кваліфікувати такі дії як два окремі види порушення авторського права. Посилання 1. Андрощук Г. О., Петренко С. А. Правова охорона програмного забезпечення (комп'ютерних програм і баз даних). Київ : НДІ ІВ НАПрНУ, 2013. 300 с. 2. Про авторське право і суміжні права : Закон України № 3792-XII від 23.12.1993 р. Відомості Верховної Ради України. 1994. № 13. Ст. 64. (зі змінами). 3. Кашанин А. В. Творческий характер как условие охраноспособности произведения в российском и иностранном авторском праве. URL :https://publications.hse.ru/articles/72339313. 4. Directive 2009/24/EC of the European Parliament and of the Council of 23 April 2009 on the legal protection of computer programs (Codified version). URL: http://eur-lex.europa.eu/legal-content/EN/ALL/ ?uri=CELEX%3A32009L0024. 5. Association Agreement between the European Union and its Member States, of the one part, and Ukraine, of the other part URL: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2014:161:FULL&from=EN. 6. Про деякі питання практики вирішення спорів, пов'язаних із захистом прав інтелектуальної власності : постанова Пленуму Вищого господарського суду України № 12 від 17.10.2012. URL: http://zakon5.rada.gov.ua/laws/show/v0012600-12/print1446498314299733. 7. Угода про торговельні аспекти прав інтелектуальної власності. URL: http://zakon2.rada.gov.ua/laws/show/981. 8. Початковий код. Матеріал з Вікіпедії — вільної енциклопедії. URL: https://uk.wikipedia.org/w/index.php?title=Початковий_код&oldid=29322372. 9. Object code. From Wikipedia, the free encyclopedia. URL: https://en.wikipedia.org/wiki/Object_code 10. IT-патенты для российских разработчиков софта: польза, проблемы, подводные камни. URL: https://habr.com/ru/post/527484. 11. Ионас В. Я. Произведения творчества в гражданском праве. Москва : Юридическая литература. 1972. 168 с. 12. Computer Associates v. Altai (BitLaw). 982 F.2d 693. URL: https://www.bitlaw.com/source/cases/copyright/altai.html. 13. Raysman R. Copyright Infringement of Computer Software and the 'Altai' Test / R. Raysman, P. Brown. URL: http://euro.ecom.cmu.edu/program/law/08-732/Copyright/CopyrightInfringementOfSoftware.pdf. 14. Nova Productions Ltd v Mazooma Games Ltd & Ors [2007] EWCA Civ 219 (14 March 2007). URL: http://www.bailii.org/ew/cases/EWCA/Civ/2007/219.html 15. Navitaire Inc v Easyjet Airline Co. & Anor [2004] EWHC 1725 (Ch) (30 July 2004). URL: http://www.bailii.org/ew/cases/EWHC/Ch/2004/1725.html. 16. Judgment of the Court (Grand Chamber), 2 May 2012 SAS Institute Inc. v World Programming Ltd. Case C‑406/10. ECLI:EU:C:2012:259. URL: http://curia.europa.eu/juris/liste.jsf?num=C-406/10. 17. U.S. Code. Title 17. Chapter 12. § 1201- Circumvention of copyright protection systems. URL:https://www.law.cornell.edu/uscode/text/17/1201. ============================================== 1. Androshchuk H. O., Petrenko S. A. Pravova okhorona prohramnoho zabezpechennia (kompiuternykh prohram i baz danykh). Kyiv : NDI IV NAPrNU, 2013. 300 s. 2. Pro avtorske pravo i sumizhni prava : Zakon Ukrainy № 3792-XII vid 23.12.1993 r. Vidomosti Verkhovnoi Rady Ukrainy. 1994. № 13. St. 64. (zi zminamy). 3. Kashanyn A. V. Tvorcheskyi kharakter kak uslovye okhranosposobnosty proyzvedenyia v rossyiskom y ynostrannom avtorskom prave. URL :https://publications.hse.ru/articles/72339313. 4. Directive 2009/24/EC of the European Parliament and of the Council of 23 April 2009 on the legal protection of computer programs (Codified version). URL: http://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX%3A32009L0024. 5. Association Agreement between the European Union and its Member States, of the one part, and Ukraine, of the other part URL: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2014:161:FULL&from=EN. 6. Pro deiaki pytannia praktyky vyrishennia sporiv, poviazanykh iz zakhystom prav intelektualnoi vlasnosti : postanova Plenumu Vyshchoho hospodarskoho sudu Ukrainy № 12 vid 17.10.2012. URL: http://zakon5.rada.gov.ua/ laws/show/v0012600-12/print1446498314299733. 7. Uhoda pro torhovelni aspekty prav intelektualnoi vlasnosti. URL: http://zakon2.rada.gov.ua/laws/show/981. 8. Pochatkovyi kod. Material z Vikipedii — vilnoi entsyklopedii. URL: https://uk.wikipedia.org/w/index.php?title=Pochatkovyi_kod&oldid=29322372. 9. Object code. From Wikipedia, the free encyclopedia. URL: https://en.wikipedia.org/wiki/Object_code. 10. IT-patentы dlia rossyiskykh razrabotchykov softa: polza, problemы, podvodnыe kamny. URL: https://habr.com/ru/post/527484. 11. Yonas V. Ya. Proyzvedenyia tvorchestva v hrazhdanskom prave. Moskva : Yurydycheskaia lyteratura. 1972. 168 s. 12. Computer Associates v. Altai (BitLaw). 982 F.2d 693. URL: https://www.bitlaw.com/source/cases/copyright/altai.html. 13. Raysman R. Copyright Infringement of Computer Software and the Altai Test / R. Raysman, P. Brown. URL: http://euro.ecom.cmu.edu/program/law/08-732/Copyright/CopyrightInfringementOfSoftware.pdf. 14. Nova Productions Ltd v Mazooma Games Ltd & Ors [2007] EWCA Civ 219 (14 March 2007). URL: http://www.bailii.org/ew/cases/EWCA/Civ/2007/219.html. 15. Navitaire Inc v Easyjet Airline Co. & Anor [2004] EWHC 1725 (Ch) (30 July 2004). URL: http://www.bailii.org/ew/cases/EWHC/Ch/2004/1725.html. 16. Judgment of the Court (Grand Chamber), 2 May 2012 SAS Institute Inc. v World Programming Ltd. Case C‑406/10. ECLI:EU:C:2012:259. URL: http://curia.europa.eu/juris/liste.jsf?num=C-406/10. 17. U.S. Code. Title 17. Chapter 12. § 1201- Circumvention of copyright protection systems. URL:https://www.law.cornell.edu/uscode/text/17/1201.
BASE
Kulturchronik. R, Novosti kul'tury iz Federativnoj Respubliki Germanija
ISSN: 0943-2140
ГОСУДАРСТВЕННАЯ РЕГИСТРАЦИЯ ПРОГРАММ ДЛЯ ЭЛЕКТРОННЫХ ВЫЧИСЛИТЕЛЬНЫХ МАШИН ИЛИ БАЗ ДАННЫХ ; STATE REGISTER FOR THE COMPUTER PROGRAMS OR DATABASE
В данной статье охарактеризованы причины и способы защиты программного обеспечения, освещена история развития патентного и авторского права в данной области. Анализируется «Административный регламент исполнения Федеральной службой по интеллектуальной собственности, патентам и товарным знакам государственной функции по организации приёма заявок на изобретение и их рассмотрения, экспертизы и выдачи в установленном порядке патентов Российской Федерации на изобретение». Также обсуждается применение законодательства и анализируются положительные стороны, порождаемые государственной регистрацией программных продуктов. В частности, приводится системный анализ механизмов регистрации программ для ЭВМ и баз данных. ; This article briefly talked about software and what you need to protect it, covered the history of patent and copyright in the software. We analyze the «Administrative Regulations of the Federal Service for Intellectual Property, Patents and Trademarks of the state function for receiving applications for the invention and their consideration, examination and issuance of patents of Russian Federation for the invention». Conclusions and comments on the application of the legislation, as well as analyzed the positive aspects generated by the state registration of software products. In particular, it provides a systematic analysis of the mechanisms for registration of computer programs and databases.
BASE
Чтение на иностранном языке и его роль в учебном процессе в неязыковом вузе
In: Koncept (Kirov): Scientific and Methodological e-magazine, Heft 13
The article discusses the role of reading as a form of speech deyatetelnosti in teaching foreign language in not language high school. Much attention is paid to the main types of reading, their classification and a brief description. The article emphasizes the importance of building students' reading skills with the help of the flexible use of modern computer technology.
Комп'ютерна програма педагогічного тестування для самодіагностики курсантів з навчальних дисциплін ; Computer program for diagnostic pedagogical testing of cadets in various academic disciplines
Розглянуто питання щодо застосування комп'ютерного тестування курсантів на стадії їхньої самодіагностики рівня знань. Визначено, що комп'ютерне самотестування курсантів має сприяти виявленню прогалин у їхніх знаннях з точки зору якісної підготовки до контрольних навчальних заходів з навчальних дисциплін та подальшої їх ліквідації у процесі самостійної підготовки. На основі аналізу існуючих комп'ютерних програм педагогічного тестування наведено критерії, яким має відповідати комп'ютерний програмний продукт самотестування та представлено характеристику створеного комп'ютерного програмного продукту "Сократ" для самодіагностики якості засвоєння майбутніми військовими фахівцями навчальних дисциплін, а також висвітлено результати його практичної реалізації. ; The question of using computer-based testing of cadets on the stage of their self-assessment was raised. It was determined that computer-based self-assessment of cadets will contribute to revealing gaps in their knowledge from the point of view of the quality preparation for formal assessment in different subjects and to eliminating these gaps in the process of self-instruction. Based on the analysis of the existing computer programs of pedagogical testing the criteria were suggested for creating a new computer program for self-assessment and the characteristics of the developed program "SOKRAT" were given. This program is for self-assessment of the quality of apprehension by future military specialists of subject matters and the results of its practical use are provided.
BASE
Intellectual computer technologies in designing vehicles
Problem. Today, the scientific and technological sphere has become the main arena of competition of states in the world, and the possession of so-called "critical technologies" (CT) is used as one of the important instruments of geopolitics. Such technologies are crucial for expanding the possibilities of the state defense and achieving the goals of national security, primarily military, military-economic and scientific as well as technological security. Selection of CT is used to determine the priorities of scientific and technological development of states and military-technical policy and are crucial for the process of creating promising weapons and military equipment. Goal. The purpose of the article is to analyze the main trends and approaches to the concept of vehicle development based on the convergence of intellectual critical technologies. Methodology. For the effective development of vehicles it is necessary to use the technology of virtual reality, synergistic approach, evolutionary methods of modeling, methods of deep learning of artificial multilayer neural networks. Results. Advanced technology allows us to reduce the cost of developing new models by cutting the number of real prototypes, each of which is created individually and requires significant costs. Originality. Despite all the disadvantages, improved methods of deep learning open up new opportunities for an effective analysis of large volumes of unstructured data. Companies that use deep training in their tasks will be able to get more accurate analytics results without having to spend a lot of time learning the system. The main tendencies and approaches to the concept of the development of vehicles on the basis of convergence of intellectual critical technologies are analyzed. Practical value. National CTs are of key importance for expanding resources of Ukraine and achieving the goals of national security, in particular, scientific and technological security
BASE
Intellectual computer technologies in designing vehicles
Problem. Today, the scientific and technological sphere has become the main arena of competition of states in the world, and the possession of so-called "critical technologies" (CT) is used as one of the important instruments of geopolitics. Such technologies are crucial for expanding the possibilities of the state defense and achieving the goals of national security, primarily military, military-economic and scientific as well as technological security. Selection of CT is used to determine the priorities of scientific and technological development of states and military-technical policy and are crucial for the process of creating promising weapons and military equipment. Goal. The purpose of the article is to analyze the main trends and approaches to the concept of vehicle development based on the convergence of intellectual critical technologies. Methodology. For the effective development of vehicles it is necessary to use the technology of virtual reality, synergistic approach, evolutionary methods of modeling, methods of deep learning of artificial multilayer neural networks. Results. Advanced technology allows us to reduce the cost of developing new models by cutting the number of real prototypes, each of which is created individually and requires significant costs. Originality. Despite all the disadvantages, improved methods of deep learning open up new opportunities for an effective analysis of large volumes of unstructured data. Companies that use deep training in their tasks will be able to get more accurate analytics results without having to spend a lot of time learning the system. The main tendencies and approaches to the concept of the development of vehicles on the basis of convergence of intellectual critical technologies are analyzed. Practical value. National CTs are of key importance for expanding resources of Ukraine and achieving the goals of national security, in particular, scientific and technological security
BASE
Code-switching in the computer-mediated communication ; Переключение кодов в компьютерно-опосредованной коммуникации
Most authors admit that code-switching is the process of switching different languages, their varieties, speaking styles, etc. Today, the majority of people in the world are multilingual and often mix languages in different ways, which makes code-switching a quite common global phenomenon. Code-switching incorporates government, cultural, religious and network contexts, and the frequency of code-switching in such multilingual conversations is an indicator of the global dominance of multilingualism. Online communication fosters social communicative practices consisting of code- switching and marks the development of verbal behaviour of multilingual communities. Code-switching also affects language visuality, its images are tools for the social construction of reality. The developed verbal practices support effective communication and affect the expression of new meanings. The article aims at presenting the features of code-switching in digital communication with 8 examples of different length, topic and author, in which the native Lithuanians code-switched to English and used elements of the Internet language. These examples were taken from the social networks Instagram, YouTube, Facebook and Twitter, and the authors analyzed the grammar, spelling and punctuation of both Lithuanian and the English words, the type and use of the code-switched English elements, special characters, abbreviations, emoji and other features of the Internet language. The results show that online communication is not entirely textual, with various means of text composition communicators make their code-switched English elements more visible and alter the appearance of messages. Such practices correspond to the features of social networks and seem to follow the popular Internet culture trends.
BASE
Code-switching in the computer-mediated communication ; Переключение кодов в компьютерно-опосредованной коммуникации
Most authors admit that code-switching is the process of switching different languages, their varieties, speaking styles, etc. Today, the majority of people in the world are multilingual and often mix languages in different ways, which makes code-switching a quite common global phenomenon. Code-switching incorporates government, cultural, religious and network contexts, and the frequency of code-switching in such multilingual conversations is an indicator of the global dominance of multilingualism. Online communication fosters social communicative practices consisting of code- switching and marks the development of verbal behaviour of multilingual communities. Code-switching also affects language visuality, its images are tools for the social construction of reality. The developed verbal practices support effective communication and affect the expression of new meanings. The article aims at presenting the features of code-switching in digital communication with 8 examples of different length, topic and author, in which the native Lithuanians code-switched to English and used elements of the Internet language. These examples were taken from the social networks Instagram, YouTube, Facebook and Twitter, and the authors analyzed the grammar, spelling and punctuation of both Lithuanian and the English words, the type and use of the code-switched English elements, special characters, abbreviations, emoji and other features of the Internet language. The results show that online communication is not entirely textual, with various means of text composition communicators make their code-switched English elements more visible and alter the appearance of messages. Such practices correspond to the features of social networks and seem to follow the popular Internet culture trends.
BASE
Code-switching in the computer-mediated communication ; Переключение кодов в компьютерно-опосредованной коммуникации
Most authors admit that code-switching is the process of switching different languages, their varieties, speaking styles, etc. Today, the majority of people in the world are multilingual and often mix languages in different ways, which makes code-switching a quite common global phenomenon. Code-switching incorporates government, cultural, religious and network contexts, and the frequency of code-switching in such multilingual conversations is an indicator of the global dominance of multilingualism. Online communication fosters social communicative practices consisting of code- switching and marks the development of verbal behaviour of multilingual communities. Code-switching also affects language visuality, its images are tools for the social construction of reality. The developed verbal practices support effective communication and affect the expression of new meanings. The article aims at presenting the features of code-switching in digital communication with 8 examples of different length, topic and author, in which the native Lithuanians code-switched to English and used elements of the Internet language. These examples were taken from the social networks Instagram, YouTube, Facebook and Twitter, and the authors analyzed the grammar, spelling and punctuation of both Lithuanian and the English words, the type and use of the code-switched English elements, special characters, abbreviations, emoji and other features of the Internet language. The results show that online communication is not entirely textual, with various means of text composition communicators make their code-switched English elements more visible and alter the appearance of messages. Such practices correspond to the features of social networks and seem to follow the popular Internet culture trends.
BASE