| Products > Test Equipment |
| DIY scan card for Keysight 34970A |
| << < (7/13) > >> |
| strawberry:
copyright is for exact binary copy? does it apply for communication protocol as well. considering limitations it is possible to come up with same code or even better |
| free_electron:
--- Quote from: voltsandjolts on June 02, 2022, 08:29:54 am --- --- Quote from: free_electron on June 01, 2022, 11:23:47 pm --- --- Quote from: voltsandjolts on June 01, 2022, 08:04:19 pm ---I've never tried, but the Chinese clone 34901A uses their own firmware, so I'd bet the original is locked and unreadable. Anyway, I don't want to fraudulently use their copyrighted firmware. Honest open firmware is better, even if it has some foibles. --- End quote --- you don't have to use it. simply decompile it. it's 4kilobyte... --- End quote --- Sure, but then you are 'tainted' having seen the proprietary code, and you can no longer be part of any 'cleanroom' open source firmware effort. Whereas, observing the functionality of the device is legal. --- End quote --- you've seen assembly for an 8051. study the protocol and then rewrite it in different language for a different micro. |
| voltsandjolts:
Erm, I'm pretty sure that still referred to as 'copying'. |
| free_electron:
--- Quote from: voltsandjolts on June 02, 2022, 04:54:14 pm ---Erm, I'm pretty sure that still referred to as 'copying'. --- End quote --- you are not copying code. you looked at the code to derive the protocol. that protocol is then translated into a new program that's how they did the IBM PC Bios. one group disassembled it , created a document detailing the API , tossed that document over the wall to another group of people that re implemented the API group 2 had never seen disassembly, only protocol spec. |
| razvan784:
--- Quote from: free_electron on June 03, 2022, 06:40:25 pm ---that's how they did the IBM PC Bios. one group disassembled it , created a document detailing the API , tossed that document over the wall to another group of people that re implemented the API group 2 had never seen disassembly, only protocol spec. --- End quote --- Yeah, that's the whole point, two different teams. To eliminate any reasonable suspicion of copying, it cannot be done by the same person. The procedure goes by the name "clean room reverse engineering". |
| Navigation |
| Message Index |
| Next page |
| Previous page |