ip   24964

« earlier    

s32x/ipdata: An IP lookup system utilizing open datasets
:computer: An IP lookup system utilizing open datasets - s32x/ipdata
golang  ip 
2 days ago by geetarista
High Tech is the Real China Threat
The welcome news emerging from the G20 meeting in Argentina this month was that China and the United States had agreed to a truce in the escalating trade war the two sides have been fighting for the last year.

Yet a more worrisome question is what will become of the longer-term economic rivalry between the two. For the United States, the trend lines are troubling, particularly as China works methodically to become the world’s technology leader. China’s rise as a technological powerhouse isn’t just a threat to U.S. national pride or jobs—it is becoming a big concern as well for the U.S. military. In some critical industries, the battle for technological dominance is a battle the United States is already losing.

“Say you’re making the latest generation of a helicopter, and you want flat-panel displays for the cockpit. Where do they come from? From Asia. They all come from two time zones in Asia,” says Willy Shih, a Harvard economist who studies technology and manufacturing. “I’d say 70 percent of the world’s semiconductor foundry capacity is in three science parks in Taiwan. All of the small optical sensors come from Asia. Touchscreens—from Asia. Camera components, optical components—Asia.”

Additionally, the Defense report found that there are other areas that are threatened, including machine tools, composite materials, and printed circuit boards. About 90 percent of the world’s printed circuit boards are made in Asia, with more than half made in China—while the “U.S. printed circuit board sub-sector is aging, constricting, and failing to maintain the state of the art.”

Chinese dominance in making high-tech equipment doesn’t necessarily constitute a national security crisis. But the fear is that if tensions with China were to escalate, China could cut off the supply of critical U.S. military components. Recent sparring between the United States and China over technology equipment companies such as Huawei and ZTE reflects U.S. worries that China could try to gain a military advantage by designing electrical components that it secretly controls. In 2010, the U.S. Navy bought 59,000 computer chips destined for helicopters that were discovered to be counterfeits containing a “Trojan horse” or “kill switch” flaw that would have allowed an enemy to render the helicopter’s weapons inoperable. In October of this year, Bloomberg Businessweek reported that the Chinese military had secretly inserted microchips the size of a grain of rice on server motherboards made in China that wound up in the mainframes of nearly 30 companies, including Apple, for the purpose of conducting industrial espionage.

Deng Xiaoping once famously counseled his countrymen to “hide our capacities and bide our time”—a nod to playing the long game for which China is famous. For the last few decades, China has followed Deng’s advice, ramping up its manufacturing capacity with the help of state subsidies, foreign investment, and cheap labor. For years, China was thought of as the world’s factory floor, exporting cheap sneakers, T-shirts, and plastic toys around the globe. Lately, though, China has set its sights on higher-tech industries. Its “Made in China 2025” plan calls for rapid development in 10 high-tech fields including robotics, artificial intelligence, telecommunications, and aerospace engineering.
China  WeeklyStandard  IP  HighTech  Manufacturing  Defense 
4 days ago by richardwinter
The Cost of Obtaining a Patent in the US - IPWatchdog.com | Patents & Patent Law
Very detailed rundown of patenting and associated costs, also factors in complexity of the idea. Covers searches (although there is a separate page on that) and provisional patents.
ESB6  MGT421  MGT621  IP  intellectualproperty  Legal  ch17  patent  patents  patentslegal 
6 days ago by jeromekatz
Allocating Equity in New Ventures: Teaching Materials/References for Karl Ulrich
Talks about the funding process, valuing sweat equity, valuing intellectual property, estimating tasks/effort/allocation among founders, the mechanics of granting equity to individuals, what to do when people don't do what they committed to do, various forms of preference, compensating advisors/directors, and contribution of intangibles.
ESB6  MGT421  MGT621  equity  valuation  IP  intellectualproperty  shares  allocations  sweatequity 
6 days ago by jeromekatz

« earlier    

related tags

+write  14.04  37  38  aa  abuse  address  addresses  addressing  advertising  allocations  amazon  api  apple  articles  automation  aws  azure  bind  blocklist  blogs  books  bridge  business  by:garrett-lisi  cadburys  calculator  canada  ch17  checkjetaal.com  china  cisco  cli  client  comparison  copyright  corporation  creativecommons  data  database  datacenter  db  defense  del-dup?  dhcp  dirty-tricks  dmca  dns  drugs  dynamic  eclipse  email  equity  esb6  eu  europe  evan-wallace  excellent  exception  free  gatesfoundation  gear  general  geo  geolocate  geolocation  gist  gitbabel  github  global  gmap  go  golang  good  google  government  graph-layout  graph-viz  great  grub  guide  hack  hardware  heatmap  heatmaps  hickory  hightech  home-server  hosted  hostname  hotel  http  http3  https  huawei  identifier  ifconfig  intellectual  intellectualproperty  internet  intersect  interviewing  ip-scanner  ipaddress.com  ipam  ipv4  ipv6  java  javascript  jie-qi  korea  lang:en  legal  linux  list  local  location  lookup  management  manufacturing  map  media  medialab  medicine  mgt421  mgt621  mit  ml  monitor  motel  name  net  netmgr  network-eng  network  networkandtelecoms  networking  newsy  nginx  nic  nm  nmcli  nmtui  number  office365  oled  online  openaccess  opensource  optimization  orms  ottt  ownership  paper  patbase  patent  patents  patentslegal  pb  performance  phone  plans  port  portal  posters  prin  prior  privacy  property  protocols  proximity  publishers  publishing  qemu  qualcomm  quic  radius  range  real  realtime  removal  reputation  retailing  reuse  reviews  rfkill  router  routing  samsung  scam  scanner  search  searching  sector  security  server  service  sfdp  shares  smartphone  smtp  so_linger  so_reuseaddr  socket  software-patents  software  space  spam  status  streetwear  stupidity  subnet  supreme  sweatequity  sysadmin  table  tcp  tcp_nodelay  tcp_nopush  telephone  telephonie  theft  time  time_wait  tips  tool  tools  topology  totwitter  trace  trade_secret  transactional  trendmicro  tricks  tunnel  ubuntu  unblock  url  us  usa  util  utile  uw  valuation  vanish  visualization  vpn  web-site  web  webcam  webgl  weeklystandard  whitelist  whois  wifi  wireless 

Copy this bookmark:



description:


tags: