controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed only as a floating window, it asks for the specific operating system (if any) on which the third paragraph