Well, I got my ThinkBook 15 Gen2 ITS laptop back from the Lenovo repair center in Texas yesterday.
Unfortunately, it seems they either wiped the SSD or replaced it. Sometimes they solder everything in and have to replace everything, and the dumb thing about this is that the whole thing happened over a USB port failing.
So I get the thing back and set it up and then realize that the BIOS has been reverted to the 1.05 release that shipped with the ThinkBook 15 Gen2 ITL back in November of last year, so I updated it to the 1.12 BIOS that Lenovo recommends, which includes many bug fixes, not the least of which is to mitigate some RowHammer exploits, which are rather nasty and yet another one of the lulz that malware writers are exploiting now.
With operating systems in general tending to become more secure, they’ll take what they can get, and such attacks are no longer theoretical. People really need to mitigate before the damage happens. Once you’re actively exploited, it’s too late.
Unfortunately, the same BIOS version that updated the older motherboard just fine bricked Windows 10 with an “Inaccessible Boot Drive” Blue Screen of Death. Since the repair center returned it to me without any of my data on it anyway, I booted off a recovery stick and told it to “Reset This PC” from the built-in recovery partition (although I could have used the stick too since I always back up system files and make a new stick image whenever there’s a major new Windows update out.
I don’t feel that we should be running into issues like this with supported BIOS updates and the supported OS, but that’s Microsoft and Lenovo for you. Just, thank God nothing important got messed up. If you are going to update the BIOS on these things, do it while you still have a warranty and preferably before you do anything else with the PC, and be prepared to recover the OS.
[...]
Microsoft claims to have stringent “Windows Hardware Quality Labs” standards for drivers that end up in Windows Update, and to be fair, unless you are having a problem or know what you’re doing, you might be best off leaving it alone, but in reality it gives you the driver that time forgot, sometimes it’s not even important (my backup hard drive works fine without the SES driver), and under no circumstances should old drivers interfere with important security features.
Tech geeks often tout Linux as the most secure operating system, especially compared to the mainstream proprietary ones like Windows and macOS. While that’s true for the most part, Linux doesn’t offer you a secure environment by default.
Linux server's security largely depends on what methods you adhere to and the tools you have deployed on your system to help it withstand viruses, malware, and other malicious attacks.
Nothing’s invincible; for this very reason, it is practical to secure your Linux server with the best open-source security tools in the market.
joycon fixing, audacity, star wars
Dave Taht is one of the Internet's unsung (but singing) heroes, and is doing more than anyone today to rescue your Internet connection from something you haven't heard of, but should: bufferbloat. On FLOSS Weekly, Doc Searls and Jonathan Bennett spend an information-packed hour with Dave, digging deep into bloated network buffers, bureaucracies, corporate failings, and slow but real progress against all of those, much of it with Dave's leadership.
People occasionally ask me about my Linux rice and I really don't know what to say, Tiling Window Managers have basically been perfected and they all look the same, sure color schemes will be different but the general design is all the same.
Landing into "hwmon-next" just after the Linux 5.14-rc1 tagging that marks the formal end to feature work for the current cycle was the k10temp driver adding support for AMD Zen 3 APU temperature monitoring under Linux.
The k10temp driver already has support for Zen 3 desktop CPUs and even Zen 3 SP3/Threadripper CPUs with the necessary model IDs in place, but unfortunately the Zen 3 Ryzen APU model ID was missing until the commit on late Sunday.
The change is rather trivial and namely just adding the Family 19h Model 50 bits in place for allowing this k10temp thermal driver to work for Zen 3 APUs.
What's clear is that in general, a modern x86 machine's physical memory ranges are quite complicated. There are historical bits and pieces, ACPI and other data that is in RAM but must be preserved, PCI(e) windows, and other things.
I recently used Spamassassin to get ride of the spam I started to receive but it proved to be quite useless against some kind of spam so I decided to give rspamd a try and write about it.
rspamd can filter spam but also sign outgoing messages with DKIM, I will only care about the anti spam aspect.
Netstat is a Linux tool that system admins use for analyzing network stats. It comes in handy when you’re trying to take a deeper look at your Linux machine and how it is handling networking. In this guide, we’ll show you how to install Netstat on your Linux PC.
With Smartphone camera quality increasing, thousands of photo files live spread in our hard drives, sometime without a unified organization.
LEMP is a popular stack that comprises open-source software that is collectively used to host and serve web applications, whether in production or any stage along the development cycle.
The terminology LEMP is an acronym for Linux, Nginx (pronounced as Engine X, hence the E) which is a web browser, MariaDB or MySQL – database, and PHP for processing dynamic content). LEMP stack is popularly used for hosting high-traffic and highly scalable web applications and websites.
Mono is the OpenSource implementation of the Microsoft .NET software stack. It is based on ECMA/ISO standards and implements the C# programming language and the Common Language Runtime. To find out more about Mono, have a look at the Mono project website.
Are you looking to change hostname in Linux? That is a good idea. But do you know “What is hostname? Why do you want to change hostname? or How to change hostname in Ubuntu or other Linux Operating System.
In simple word, the hostname is a computer name of your laptop of desktop or other devices have Linux OS.
If you remember, you set the hostname/computer name at a time when you were installing Ubuntu.
But now, You don’t like that hostname by any reason and want to change it without restarting Ubuntu system. Yes you can change hostname easily by using the command line as well as using GUI (Graphical Interface)
This article completely for beginners, because I cover how to change hostname by using GUI and What to do after changing the hostname.
Cloud storage stands for a virtualized pool of network storage most commonly hosted by third parties. Cloud storage is a network-based service that physically does not exist but remains somewhere in the cloud. To be more clear, cloud storage means sharing data over a network, rather than having local servers or personal devices.
Cloud storage is all around us in our smartphones, on desktops and servers, etc. The Dropbox application which is now available on smartphones is nothing but a cloud storage application. Google Drive is another cloud storage application that lets you store and access your stored data from anywhere and anytime.
Nmap is a very popular free and open-source network security tool and port scanner. It designed to perform security scans and discover hosts on a network by sending different packets to them and then analyzing their responses.
Nmap was named “Security Product of the Year” by Linux Journal, Info World, LinuxQuestions.Org, and Codetalker Digest. featured in twelve movies, including The Matrix Reloaded, Die Hard 4, Girl With the Dragon Tattoo, and The Bourne Ultimatum.
Minio is an Amazon s3 compatible high-performance object storage service. It is an open-source application released under Apache License v2.0 that supports unstructured data such as images, videos, backup, etc. written in GO that uses buckets to organize the object.A bucket is similar to a folder or directory in a filesystem, where each bucket can hold an arbitrary number of objects
We will install and configure self-hosted Minio object storage in Linux. For a demonstration of the example in the article, I have used Ubuntu 21.04.
This tutorial is going to show you how to set up Postfix SMTP relay with Sendinblue on Debian. Postfix is a popular open-source SMTP server. Previously I wrote an article on how to easily set up a full-blown email server on Debian with iRedMail, which helped a lot of readers run their own email servers.
However, some readers told me that port 25 is blocked by hosting provider/ISP as a way to control email spam, so they couldn’t send emails. Vultr would unblock port 25 if you ask them to, and ScalaHosting doesn’t block port 25 at all, so I recommend using ScalaHosting VPS. Some other hosting providers/ISPs like DigitalOcean would refuse to unblock port 25.
Incognito mode is an online privacy feature that prevents your browsing history from being stored. While the feature is effective for browsing without leaving a trace, it can sometimes limit the experience. For example, you are not allowed to take screenshots in Incognito mode.
The latest version of Ubuntu 20.04 has been launched on 23 April 2020. If you are still using the old version please dist upgrade now.
A Long year back, I started to use Ubuntu version 6.04. It was really hard to update ubuntu.
Slowly -2 latest versions were launched in the market one by one with new features. And Today Ubuntu has version 20.04 LTS with very attractive features. So Updating Ubuntu and its software become very easy and simple.
You can update ubuntu by command line as well as using a GUI interface. This really makes users happy and satisfied. I will cover this topic of how to ubuntu update and dist upgrade process work. what is the difference between ubuntu update and ubuntu dist upgrade?
You must check the current version of ubuntu before moving to the next step. If you know the current version then it will be better to update Ubuntu in the latest version.
Don’t you want to see the screen of your Linux machine? Either you don’t work anymore? Then you can shutdown machine like Windows operating system.
But, It is a little bit painful for the new user if he/she doesn’t have access to GUI. He/she can’t run commands randomly, that is the weakest point in Linux. You will have to run command in the proper way.
So before to bring your system down, you must know about shutdown command in Linux.
The shutdown command in Linux is used to down system securely. At the time of shutdown all logged in users and processes are notified that the system is going down, and nobody is allowed to log in.
By shutdown command in Linux you can down system immediately or you can schedule process.
Netcat is one of the most versatile networking tools for system administrators – it is called the Swiss army knife of Networking.
This tool can be used for creating any connections over TCP or UDP protocol which makes it an excellent debugging tool. It helps the user investigate connections directly by connecting to them.
Netcat can also perform port scanning, file transfer, and sometimes it might be used by the hackers or penetration testers for creating a backdoor into a system.
In this tutorial, we’ll be covering the Netcat utility or nc command in detail.
Netcat was developed back in 1995. Despite its usefulness and popularity, it was not maintained. Many other versions of it have been developed since then. One of the most prominent among them is called Ncat, developed by the Nmap project.
In this video, we are looking at how to install Atom Text Editor on Linux Lite 5.4.
This series shows how I solved a real-life performance problem by gathering metrics from Red Hat OpenShift in the Developer Sandbox for Red Hat OpenShift. Part 1 laid out the development environment and requirements. Now, in Part 2, we will set up the test environment and I will introduce two different test scenarios.
In this article we will show you how to add a user to a group in Linux system. We will also learn how to view the groups and group ID of any user account.
Linux user and group is an essential part of Linux security. As you know, Linux is a multi-user operating system. Adding users to group is a task worth learning. Groups allow certain user permissions to be available for group members.
The primary purpose of groups is to define a set of privileges such as reading, writing, or executing permission for a given resource that can be shared among the users within the group. Instead of managing permissions for each user account, you can simply add a user to a group in Linux to grant the appropriate permissions.
Chess is a recreational and competitive board game played between two players. It is a very popular game, played by millions across the world, in clubs, online, by correspondence, and in tournaments.
Chess has the virtue of being suitable for people of all ages. It has many positive attributes such as to help individuals develop their memory, improve and enhance their concentration, as well as logical thinking. It also promotes and improves imagination and creativity. Chess is one of those games that takes a few days to learn and the rest of your life to master, with the game being a never ending learning process, even for the top players.
The game is played on a square chessboard with 64 squares arranged in an eight-by-eight grid. Each player controls 16 pieces, and the object of the game is to checkmate the opponent’s king.
Not only is Netflix a huge force in series, films, anime and plenty more they're also now getting into video games. Coming from a report on Bloomberg, it certainly looks like we're going to see one of the biggest streaming players enter the cloud gaming / game streaming market.
In the report it mentions that Netflix has now hired Mike Verdu, a former VP at Facebook Reality Labs who also worked with EA prior to that. Verdu will be vice president of game development at Netflix. Sounds like we will see games on Netflix within a year if it all goes well, with games being sat in their own category just like everything else on the service.
Before joining Netflix, Verdu was the V.P. of content for Facebook Reality Labs where he oversaw Oculus Studios and the teams bringing second- and third-party virtual reality games and other apps to Oculus VR headsets, such as Oculus Quest and Quest 2. Verdu also previously served as the senior V.P. of Mobile for Electronic Arts, where he was responsible for the mobile game studios that operated “SimCIty BuildIt,” “Plants vs. Zombies 2,” “Real Racing 3,” “The Sims Freeplay,” “The Simpsons: Tapped Out” and Star Wars: Galaxy of Heroes,” among others.
Netflix is expanding into video games and has hired Mike Verdu, a former Facebook and Electronic Arts executive, as its new vice president of game development, a Netflix spokesperson told The Hollywood Reporter on Wednesday.
It is possible for Haiku WebKit updates to be issued post-release, however it is a priority of the Haiku Project to ensure that the browsing experience in Haiku is as best as it can be, especially considering that the web browsers are an important part of any operating system and that WebPositive is a major focus point for reviewers.
The Opera Browser based on google chromium code and highly customized has been updated to version 77.0.4054.254 and shipped to go to the software repository.
Mozilla Thunderbird has been updated to the latest version. Thunderbird is a standalone mail and newsgroup client.
Evince is a Document viewer. It supports PDF, PostScript and other formats. To view .dvi files as produced by TeX in evince, install the evince-dvi package.
Brave, the best looking chromium based browser has been updated to stable release version 1.26.74 and shipped to the software repository for easy installation convenience.
Canonical is cock-a-hoop after Ubuntu snatched first place for OpenStack deployment from the CentOS Linux distribution – but according to some the victory might ring hollow.
The finding came from the 2020 OpenStack User Survey, organised by the Open Infrastructure Foundation, which queries respondents on a variety of topics, including the main operating system used for their OpenStack cloud deployments.
The 2020 survey kicked off after IBM's $34bn purchase of Red Hat, and closed before Red Hat confirmed the community build of Red Hat Enterprise Linux (RHEL), known as CentOS, would morph into CentOS Stream. The change to something perceived as not fit for a production environment left the knickers of many developers ever so twisted.
Last June, Qualcomm introduced several industrial IoT solutions that we did not cover at the time with Qualcomm QCM2290/QCS2290 IoT chip for camera applications, industrial handhelds, retail and tracking, Qualcomm QCS8250 WiFI 6 & 5G SoC for connected healthcare, digital signage, retail, and video collaboration, Qualcomm QCS6490/QCM6490 WiFI 6E & 5G SoC for connected healthcare, logistics management, retail, transportation, and warehousing, and Qualcomm QCS4290/ QCM4290 designed for cameras, industrial handhelds, and security panels with 4G LTE and WiFi 6 connectivity.
Data is beautiful. As a #CitizenScientist, I enjoy gathering data and trying to make sense of the world around me. At work, we use Prometheus to gather metric data from our clusters, and at home, I use Prometheus to gather data from my hobbies. This article explores how to take an application—a Python script that gathers temperature and humidity data from a sensor—and instrument it to provide data in a model that Prometheus can gather. I'll also create a systemd service to start and manage the application.
Prometheus is an open source monitoring and alerting system that gathers metrics and provides a powerful query language for exploring data. I've written about setting up Prometheus locally at home. Prometheus is frequently used to gather data from container orchestration clusters such as Kubernetes and OpenShift.
The HTTPS-First Mode will be available starting with Chrome 94, according to Google. Currently, that release is set for September 21st. And HTTP connections will still be supported, the company says.
As we approach an HTTPS-first future, we're also re-examining the lock icon that browsers typically show when a site loads over HTTPS. In particular, our research indicates that users often associate this icon with a site being trustworthy, when in fact it's only the connection that's secure. In a recent study, we found that only 11% of participants could correctly identify the meaning of the lock icon. To try and reduce this confusion, Chrome will run an experiment in M93 that replaces the lock in the address bar with a more neutral entry point to Page Info (example below). We hope that this experiment will improve the discoverability of critical privacy and security information and controls provided in Page Info, such as site permissions. Importantly, a "Not Secure" indicator will continue to show on sites without HTTPS support, and the experiment includes an enterprise policy in case organizations want to opt-out. In all cases, we'll provide advance notice if we decide to move ahead with a full launch.
There are numerous smaller enhancements that make system administration and operations (DevOps) friendlier, and easier to automate. For example, %PEEKBYNAME() has an option to query global directory segments without opening the corresponding database files, orphaned relinkctl files are automatically cleaned up, and the --octo option of ydbinstall / ydbinstall.sh installs Octo such that octo --version reports the git commit hash of the build.
This isn't just a matter of some constant programmer overhead, like SQL queries taking 20% longer to write. The fact that these issues exist in our dominant model for accessing data has dramatic downstream effects for the entire industry:
Complexity is a massive drag on quality and innovation in runtime and tooling
The need for an application layer with hand-written coordination between database and client renders useless most of the best features of relational databases
The core message that I want people to take away is that there is potentially a huge amount of value to be unlocked by replacing SQL, and more generally in rethinking where and how we draw the lines between databases, query languages and programming languages.
Back in April we started a series of workshops that focused on helping you master embedded machine learning all from the comfort of your own home! We partnered with our friends at HiMax and Nordic to help incorporate imaging and weather sensors, as well as our growing MicroMod product line, to learn how to collect data, build your first models, test and deploy them, and more! Both workshops filled up completely (to the point that we needed to increase the cap on one) so we wanted to share them with you in case you didn't have a chance to get in, or if you did attend but wanted to re-watch the VOD. Keep in mind for those of you that are going to be learning along with the workshops, each have their own, unique kit to pick up. Make sure to click the links below to visit each workshop page to find all the materials you need!
I really liked A Philosophy of Software Design by John Ousterhout. It is compact and short, only 170 pages, so it is a quick read, but it contains many good ideas. The focus is on how to structure systems to make them easy to understand and work with. The author is a professor of Computer Science at Stanford, but he has also spent 14 years developing commercial software.
In our use, a hacker is a member of an international subculture of computer programmers, hardware designers and others who subscribe to a certain aesthetic, people who understand to appreciate a certain kind of beauty.
The word is also often used by us to signify a very gifted computer expert who programs for enjoyment, not necessarily for payment or other rewards, but being a hacker is not limited to programmers or even hardware designers. One might be a molecular biology hacker, for example.
A report on the wellbeing of UK software engineers (developers and DevOps professionals) found 83 per cent suffering from some degree of burnout, with most agreeing that COVID-19 was partly to blame.
This survey [PDF] was conducted in June 2021 by pollsters Survation, on behalf of DevOps company Haystack, and although the number of participants was small (just over 250) it was conducted by interviews, rather than online forms which are vulnerable to low-quality responses.
Ever wanted to build your own app but not exactly sure where to start or what programs to use? Android Studio could be an option for you.
Python has made a name for itself in the world of programming for being easy to learn, easy to read, and reasonably easy to debug. It's seen as a good starting language because it can usually resolve complex concepts such as data types on the programmer's behalf. It's considered easy to read because its syntax is simple and it enforces predictable formatting. And it's easy to debug because not only does it catch many errors on its own, it also integrates with advanced tools like GNU Debugger (gdb.) And that was its reputation before Python 3.
Like everything else in life, change is inevitable for programming languages. Python must iterate and develop because computers are forever improving, and people's expectations of what a "simple" programming language does for them change over time. Additionally, other languages sometimes come up with really good ideas that get adapted into Python. Python 2.x was outrageously popular, so when Python 3 began to loom on the horizon, there was a considerable amount of anxiety mixed in with the excitement. Everyone wanted to know how Python could possibly get any better, but there was also the obligatory fear of change, the potential loss of important libraries that wouldn't upgrade, and the uncertainty of what workload would be required to adapt existing codebases.
Hello and welcome to another issue of This Week in Rust! Rust is a programming language empowering everyone to build reliable and efficient software. This is a weekly summary of its progress and community. Want something mentioned? Tweet us at @ThisWeekInRust or send us a pull request. Want to get involved? We love contributions.
The plot failed but the victim was kidnapped, beaten and robbed several weeks later without Yasin's involvement.
A group of more than 500 researchers from 45 different countries — from France, the US, and Japan to Indonesia, Ghana, and Ethiopia — has come together to work towards tackling some of these problems. The project, which the authors of this article are all involved in, is called Big Science, and our goal is to improve the scientific understanding of the capabilities and limitations of large-scale neural network models in NLP and to create a diverse and multilingual dataset and a large-scale language model as research artifacts, open to the scientific community.
Now, in a scientific milestone, researchers have tapped into the speech areas of his brain — allowing him to produce comprehensible words and sentences simply by trying to say them. When the man, known by his nickname, Pancho, tries to speak, electrodes implanted in his brain transmit signals to a computer that displays them on the screen.
I'm a parent with two children in public schools in Christchurch, NZ. I'm also a software developer with an interest in education. I'm writing this post to make members of NZ school boards of trustees aware of a significant risks they face, but which I believe few if any school boards in NZ recognise, much less attempt to mitigate.
These risks are created by the software adopted by nearly every school in NZ. This software is provided via national-level agreements made by the Ministry of Education with their vendors, who are mostly US-based multinational technology corporations. Increasingly, school curriculums completely depend on this software.
Today, nearly every school in NZ is either a 'Microsoft Office 365' or a 'Google Classroom' school. Many schools also embed products like SeeSaw and StoryPark into their student assessment process and depend on them for parental engagement.
My goal here is to explain the liabilities lurking within this status quo, and how the Ministry of Education has divested responsibility for these liabilities onto individual school board members.
Research finds young people are signing away their rights in legal documents they don't understand [...]
Similarly, the end result for Intel of focusing on the stock price instead of the product was: [...]
We've repeatedly noted how the "right to repair" movement has been gaining a full head of steam as consumers, independent repair shops, schools, farmers, and countless others grow tired of corporations' attempts to monopolize repair. Whether it's Sony and Microsoft creating repair monopolies for their game consoles, Apple bullying independent repair shops, or John Deere making it a costly hassle just to fix a tractor, the more companies restrict access to cheap repair, parts, tools, and documentation, the more this movement seems to grow.
This draft report was released on 11 June 2021. It assesses the case for a right to repair in Australia, with a focus on whether consumers face any unnecessary barriers to repair that require a government policy response.
The final report is expected to be handed to the Australian Government by 29 October 2021.
Last week the British prime minister Boris “BoJo” Johnson put Bolsonaro on notice: the latter would now have a serious rival when it comes to death-dealing standards and ways where Covid is concerned.
BoJo said he planned€ to lift almost all remaining restrictions in England on July 19 — a day dubbed “Freedom Day” by the idiot pro-Tory tabloids.
Since May the EU has largely sorted out its supply system. As a result, some 45% of adults in the EU are fully vaccinated and another 19% of adults have had the first of two doses. Thierry Breton, the European commissioner in charge of vaccines, said on July 10th that there are now enough doses to get 70% of adults fully vaccinated but that the limiting factor was now hesitancy.
The EU Digital COVID Certificate, which is available in the My Kanta Pages, will also include a test certificate and a certificate of recovery as of 14 July. The EU COVID-19 vaccination certificate has been available in the My Kanta Pages since 22 June.
Overdose deaths soared to a record 93,000 last year in the midst of the COVID-19 pandemic, the U.S. government reported Wednesday.
That estimate far eclipses the high of about 72,000 drug overdose deaths reached the previous year and amounts to a 29% increase.
Drug overdose deaths rose nearly 30 percent in 2020 to a record 93,000, according to preliminary statistics released Wednesday by the Centers for Disease Control and Prevention. The deaths rose in every state but two, South Dakota and New Hampshire, with pronounced increases in the South and West.
[...]
In recent years, annual drug overdose deaths had already eclipsed the peak yearly deaths from car crashes, gun violence or the AIDS epidemic.
Covid 19 surge creating havoc across Asia with human health and market supply chains
A new international task force has used its first meeting to call for more access to COVID-19 vaccines and therapies in developing countries, and the World Bank and other finance institutions are putting money into South African firm Aspen Pharmacare to boost the production of vaccines.
The UK REACT-1 study has shown a threefold reduction in COVID-19 infections in double-vaccinated adults.
Threat actors in nearly half (47%) of Kroll’s ransomware cases leveraged open remote desktop protocol (RDP) and Microsoft’s proprietary network communications protocol and more than a quarter (26%) cases were traced back to a phishing email. Vulnerability exploits (17%), including but not limited to Citrix NetScaler CVE-2019-19781 and Pulse VPN CVE-2019-11510, and account takeovers (10%) rounded out the primary ransomware precursors (Figure 2).
DPReview just published Apple still hasn't made a truly “Pro” M1 Mac – so what’s the holdup? Following on the good performance and awesome power efficiency of the Apple M1, there’s a hungry background rumble in Mac-land along the lines of “Since the M1 is an entry-level chip, the next CPU is gonna blow everyone’s mind!” But it’s been eight months since the M1 shipped and we haven’t heard from Apple. I have a good guess what’s going on: It’s proving really hard to make a CPU (or SoC) that’s perceptibly faster than the M1. Here’s why.
The "dark web" page of the group known as REvil disappeared some two weeks after an attack which crippled networks of hundreds of companies worldwide and prompted a ransom demand of $70 million.
The biggest share of detected malicious links between December 2020 and May were sent via WhatsApp (89.6 per cent), followed by Telegram (5.6 per cent), according to data shared by Kaspersky Internet Security for Android, part of the cyber security firm Kaspersky Lab.
Messaging app Viber was in third place with a share of 4.7 per cent and Hangouts had less than one per cent share.
When we developed the Linux Foundation Certified IT Associate (LFCA) exam, we wanted to create a certification that would help folks get started in an IT career by demonstrating to employers they possess knowledge of the most important and widely used modern infrastructure technologies. Our goal was to make an IT career more accessible, and also close the skills gap that is making it difficult for employers to find enough talented candidates.
But the CrowdTangle story is important, because it illustrates the way that Facebook’s obsession with managing its reputation often gets in the way of its attempts to clean up its platform. And it gets to the heart of one of the central tensions confronting Facebook in the post-Trump era. The company, blamed for everything from election interference to vaccine hesitancy, badly wants to rebuild trust with a skeptical public. But the more it shares about what happens on its platform, the more it risks exposing uncomfortable truths that could further damage its image.
Facebook tells Axios that Zuckerberg instructed leaders they’d have to be more decisive, and would need to move forward even when there wasn't a clear consensus. His view was that it was like wartime, and he needed to run the company as a wartime CEO.
For the past week, the country had been reeling from the violence in Washington, and with each passing day, reporters were uncovering more of the footprint left behind by the rioters on social media.
Speaking to the cameras rolling in her sun-filled Menlo Park, Calif., garden, Ms. Sandberg confronted this question, one she’d prepared for: Could Facebook have acted sooner to help prevent this?
The Suez Canal and the Brink of War
Less than two weeks before the U.S. presidential election in 1956, Israel invaded Egypt in order to set the stage for the British-French invasion.€ With Western preoccupation in the Middle East, the Soviet Union threatened to intervene on behalf of the Arabs and stepped up the bloody suppression of the Hungarian Revolution.€ President Dwight D. Eisenhower’s opposition to the invasion allowed the United Nations to negotiate a cease-fire in Egypt.€ In the aftermath of the Suez crisis, the United States effectively replaced Britain as the guarantor of stability in the Middle East, creating a commitment that remains the underlying premise of U.S. policy in the region.€ The Middle East has become America’s briar patch, and the discontinuity in the region in the wake of the U.S. invasion of Iraq points to the need for reassessing our commitment.
A new look at current and former members of the U.S. military linked to extremist plots finds the numbers have tripled, due in large part to a series of recent events such as the January 6 riot at the U.S. Capitol, which helped mobilize extremists in general.
The analysis by the University of Maryland’s National Consortium for the Study of Terrorism and Responses to Terrorism (START), released Wednesday, looked at 354 individuals with military backgrounds charged or convicted of criminal acts linked to extremist ideology.
The current campaign includes masquerading as British scholars; engaging in dialogue with targets; and linking to the website of a legitimate, world-class, already compromised academic institution in order to harvest credentials.
Iranian [attacker] with links to the country's Islamic Revolutionary Guard Corps impersonated two academics in an attempt to hack journalists, think tank analysts, and other academics, according to a new report.
Police in the German state of Hesse searched multiple locations in connection with investigations involving suspected "Islamic State" extremists, local authorities said Wednesday morning.
Ten search warrants were executed across the state “on suspicion of terrorist financing and the preparation of a serious, state-endangering act of violence” early Wednesday.
An official, speaking on condition of anonymity, told the Reuters news agency that the initial evacuation will include about 2,500 people who are likely to be housed in military facilities, either in the US or a third country, while their visa applications are processed.
The Special Immigrant Visa program is offered to those who worked with the US government or the American-led military force during the Afghanistan war that began in 2001.
What can you even say about claims so disconnected from reality? Here's a brief fact check of eight of them.
Work conducted on July 12 and 13 went well, with no equipment failures, while weather conditions were good.
The teams used side scan sonar and a multibeam sonar belonging to Stockholm University on the vessel Electra, which, BNS reports, give an excellent overview of the wreck of the Estonia and the seabed surrounding the wreck.
More light being shed on geological picture
Arikas said the seabed was also explored using a profiler, which allows a user to view the seabed substrate to a depth of 50 meters.
This will provide the survey group with an answer as to the geological state of the seabed, meaning where there are rocks, moraine, clay and sand, he said.
The decision, confirmed at a meeting of Prime Minister Mario Draghi's cabinet, comes just days before a meeting of the UN's cultural organisation UNESCO, which had proposed to add Venice to its list of endangered heritage sites.
"The decree adopted today represents an important step for the protection of the Venetian lagoon system," Draghi said in a statement.
In a greenhouse world, humans’ size could shrink. And there is a hint of hazard to thinking capacity as well.
The Environmental Protection Agency (EPA) is advising the Army Corps of Engineers not to grant a federal water permit to the Mountain Valley Pipeline due to “substantial concerns” about the project’s impact on streams and rivers. The warning is another regulatory hurdle for a pipeline that is already delayed and over budget.
The EPA’s advice brings hope to opponents of the pipeline who are growing increasingly confident that the 303-mile natural gas pipeline, which has been under construction for over three years, will never come online.
Stay up to date with DeSmog news and alerts
Which? compared the carbon footprint of flying vs taking the train on 10 UK routes between 3 and 8 August, including to many popular holiday destinations such as Bournemouth and Newquay.
However, travellers who want to reduce their carbon footprint by taking the train face an expensive bill for doing so. Eight of the 10 routes we looked at were cheaper by plane, and significantly so – train fares were 49% more expensive than the same route by plane on average.
A graphic on the organisation’s website counts in real time the number of people alive on earth. The counter steadily ticks upwards. “We’re already at 7.8 billion. It’s already too much. We should hit 8 billion by 2022 or 2023,” says Garnier.
World Population Day is observed on July 11each year. This day was established by the United Nations and is dedicated to focusing on the importance of the population issues. This year the theme is, “Rights and Choices are the answer: Whether baby boom or bust, the solution to shifting fertility rates lies in prioritising the reproductive health and rights of all people.” Many scientists think estimating all available resources, the earth has a maximum carrying capacity of 9-10 billion population. The current population of the world is about 7.8 billion and if it is not controlled then by the end of the century it is estimated to rise to 10.8 billion.
There are many causes of overpopulation like high birth rate, low death rate, better medical facilities, rise in the number of immigrants, agricultural and industrial revolution and lack of family planning facilities, especially in rural areas. India has all these factors which result in overpopulation thereby causing other problems like exhaustion of natural resources, climate change, pollution, overcrowding, unemployment and many others. I will confine myself to the issue of unemployment.
Florida’s population continues to grow rapidly. It’s not just caused by local births. It’s also caused by people from both local and international lands, moving into the state. While it can be a good idea to have a lot of people supporting the economy, too much of one thing can be bad too.
This is bizarre, because people who read the news section of the NYT would know that workers have more bargaining power in the economy right now than at any point since at least the late 1990s. The quit rate hit a record level in April, and even with a drop in May, it is still at a 20-year peak. Workers, especially at the bottom end of the wage ladder, are seeing substantial wage gains.
The pandemic payments have also allowed many families to pay down debt, leaving their finances in much better shape than before the recession. Also, the expanded subsidies in the health care exchanges have allowed many people to get health care insurance who could not previously afford it. The NYT had a very good column earlier this month by Julia Coronado laying out many of the measures showing the improved economic plight of low and middle class families.
The following was originally published at Ongoing History of Protest Music. Punk rock has a long history of “fuck Nazi/fascists” type songs. The latest release by The Muslims, aqueer, Black, and Brown Muslim punk band hailing from North Carolina, upholds that tradition.The Muslims formed in 2017. Since then, they have released three albums and one EP. They unapologetically use their music to challenge racism, political corruption, and white supremacy. Their newest single “Fuck These Fuckin Fascists” is direct, scathing, and representative of the kind of music they create.“I started writing this song during Donald Trump’s first impeachment trial and finished it during theattempted coup,” stated vocalist QADR. “What a time to be alive. As a person who fits the description ofa so-called ‘Black Identity Extremist,’ I find it funny that our music and message, calling out racistviolence, makes people more uncomfortable than actual racist violence. At least we’re cute, tender, andfunny AF.”QADR added, “Artists are the truth-tellers throughout history, and we’re just speaking our truth.Fascism was never wiped out, it just got more polite and calls itself a Richard Spencer now, whateverthat is. We’re going to speak truth to power and have a damn good time doing it.”Trump may no longer be president of the United States, but fascist ideologies live on. Raise your voice and join The Muslims in telling fascists to “fuck off!”Listen to The Muslims’ “Fuck These Fuckin Fascists”:
A New Zealand academic says Twitter temporarily restricted her account after she mocked Chinese President Xi Jinping.
University of Canterbury Professor Anne-Marie Brady is an expert on China’s attempts to exert political influence around the world and has been an outspoken critic of its ruling Communist Party. Last week, she sent tweets poking fun at the party’s 100th anniversary celebrations.
In its transparency report published on Wednesday, Twitter said verified accounts of 199 journalists and news outlets on its platform faced 361 legal demands from governments to remove content in the second half of 2020, up 26 percent from the first half of the year.
The biannual report on Twitter’s enforcement of policy rules and the information and removal requests it receives comes as social media companies including Facebook and Alphabet's YouTube face government scrutiny worldwide over the content allowed on their platforms.
Tech experts in China who find a weakness in co mputer security would be required to tell the government and couldn’t sell that knowledge under rules further tightening the Communist Party’s control over information.
Facebook is asking for the recusal of Federal Trade Commission Chairwoman Lina Khan from the agency’s antitrust cases against the company, following Amazon’s call.
The European Court of Human Rights (ECHR) on Tuesday revised a ruling sanctioning Finland for the supposed death of a refused asylum seeker returned to Iraq, based on evidence his death had been faked.
Hawkins Blasts Biden’s Failure to Call for Filibuster Reform in Voting Rights Speech Calls for Expanded Pro-Democracy Movement Howie Hawkins, the 2020 Green Party presidential candidate, blasted President Joe Biden today for failing to call for filibuster reform in order to get voting rights legislation through the U.S Senate. “Biden’s voting rights speech in Philadelphia was a white flag of surrender by the feckless Democrats to the ruthless Republicans. The Democrats have the power to pass federal voting rights laws that can stop the Republican assault voting rights and impartial elections in the states. Biden’s failure to take on the filibuster makes the Democrats complicit in Republican voter suppression,” Hawkins said. “The Democrats have enough Senate members to reform the filibuster and pass federal voting rights legislation. Instead Biden spoke about voting rights as a 2022 mid-term election issue. By then it will be too late. The Republicans are positioning themselves with new state election laws to take control the House and Senate by partisan gerrymandering, voter suppression, and meddling with election results,” Hawkins said. Hawkins called for a new pro-democracy movement that is independent of both major parties with an expanded agenda of pro-democracy demands.
He’s right, but in pretty much the opposite of the way he intends. When the mainstream “right” and “left” agree on anything, that’s almost always a blazing neon sign warning us that our freedoms are under threat.
Catron (and Trump and Sanders) want the US government to seize control of social media platforms and dictate which users those platforms must accept and what kind of content those platforms must permit publication of. They don’t put it quite that baldly, of course, but who would? Their cause is implicit in their criticisms of “Big Tech” as a “monopoly,” which requires government regulation to promote competition in the “marketplace of ideas.”
Judge Roy Moore -- former Senate hopeful and twice-removed-for-misconduct Alabama Supreme Court justice -- has lost his lawsuit against satirist Sacha Baron Cohen. Having agreed to be on the receiving end of some satire (albeit not knowingly), Roy Moore sued Cohen after falling victim to a prank in which Cohen (performing as his character General Erran Morad) waved an electric wand he claimed could detect sexual predators. The wand beeped while close to Roy Moore.
Back in April, we wrote about how Steven Biss, who has become infamous for his flurry of frivolous defamation lawsuits -- many of which are on behalf of Congressional Representative Devin Nunes as well as an odd collection of wacky people in Nunes' orbit -- had lost yet another case, but that the court had rejected sanctioning Biss. That didn't last long. That ruling was in the 4th Circuit appeals court in the case Biss brought on behalf of Russian-born academic Svetlana Lokhova against a Cambridge academic, Stefan Halper, and a variety of media organizations. I'm not going to recount all the details of the case again. You can read those in our original post. Just know that it seemed to be a pretty obvious SLAPP suit. Much of it was filed after the statute of limitations had passed, on statements that were clearly not defamatory, and, in at least one case, appearing to sue the wrong party. However, the District Court judge and the Appeals Court both found that while Biss had a long history of bad behavior in court, they didn't want to take the further step of sanctioning him. Yet. Though both courts made it clear that further shenanigans could change that.
A man accused of blasphemy was injured after the brother of the complainant allegedly opened fire on him while he was going to attend the hearing of the case lodged against him.
As per police, the man, a resident of Chah Loharanwala in Mauza Jhok Lashkarpur, was going to attend the hearing of a blasphemy case lodged against him with the Makhdoom Rasheed police.
Some of the residents had explained that the youths dragged the victim, Talle Mia Ruwa from a police post in the community where he was initially kept, overpowered the police personnel and dragged the middle-aged man to the community square where they killed him.
SaharaReporters reported that irate youths, supported by leaders in Sade community in the Darazo LGA, burnt Talle Mai Ruwa for allegedly insulting Prophet Muhammad.
This is exactly the problem. Why have 5000 friends and 2800 followers if they never see your posts? It’s like pouring water into a bucket with a big hole in the bottom. It’s become a farce.
A total of 77 female journalists around the world experienced rights violations in June, with 36 of those cases recorded in Turkey, the CFWIJ report revealed.
A U.S. magistrate has denied a request from several media outlets that sought audio linked to the case against a man accused of attempting to kidnap Michigan Gov. Gretchen Whitmer.
As the UK High Court grants limited permission for the US government to pursue its appeal against the decision opposing the extradition of Wikileaks publisher Julian Assange, Reporters Without Borders (RSF) reiterates the call for Assange’s immediate release and for the case against him to be dropped.
In an urgent resolution adopted on 8th of July, the European Parliament condemned the forced closure of Apple Daily newspaper and urged for the immediate release of all detained journalists in Hong Kong. Reporters Without Borders (RSF) commends this much-needed resolution addressing the escalating crackdown on press freedom in the territory.
Iran has previously been successful in attracting other critics of the nation to countries outside the U.S. or Iran. Once away from home, intelligence officers detained the dissidents and took them forcibly back to Tehran, where they met jail sentences or death. These dissidents are native Iranians who have already fled their home country out of fear for their safety.
In a video message recorded Tuesday, Iranian American journalist Masih Alinejad said Federal Bureau of Investigation agents told her that Iran’s Islamist rulers “not only wanted to make sure that I physically didn’t exist anymore, they also wanted to destroy my Instagram, Facebook, Telegram and WhatsApp channels.”
But there’s nothing inevitable about working eight hours a day, five days a week (or more). This schedule only became a part of American labor law in the 1930s, after decades of striking by labor activists who were tired of working the 14-hour days demanded by some employers. Indeed, one of the biggest goals of the American labor movement beginning in the 19th century was “an attempt to gain time back,” Erik Loomis, a history professor at the University of Rhode Island, told Vox.
And now, more than 15 months into the pandemic, there’s a growing conversation about how American workers can take back more of their time. The trauma and disruption of the last year and a half have a lot of Americans reevaluating their relationships to work, whether it’s restaurant servers tired of risking their safety for poverty-level wages or office workers quitting rather than giving up remote work. And part of that reevaluation is about the workweek, which many say is due for a reboot.
”They were arrested on suspicion of being part of a group on social media that shared images and documents, and encouraged the reciting of Tibetan prayers on the birthday of His Holiness the Dalai Lama,” Golog Jigme said, citing sources in the region.
The Penelakut Tribe says more than 160 undocumented and unmarked graves have been found on the site of the former Kuper Island Indian Industrial School.
“Security cameras at Minneapolis-St. Paul International Airport play an important role in maintaining the safety of people using the facility,” airport spokesman Patrick Hogan said in an emailed statement. “Footage from those cameras is subject to state data practices laws, which prohibit unauthorized acquisition or distribution of protected data. Misuse of the data can violate individuals’ rights to privacy and in some cases compromise the security of the airport and of the millions of people who use it. Any individual who violates the law is subject to criminal prosecution.”
Several residents of Balkh, a district in northern Balkh province that is located 20 kilometers north of the provincial capital, Mazar-e Sharif, confirmed to VOA that the Taliban have distributed leaflets, ordering locals to follow strict rules that are similar to those they imposed on Afghans when they last governed the country from 1996 to 2001.
Hisbah Commander-General, Ustaz Harun Muhammad Sani Ibn-Sina declared that the use of mannequins to display clothes is unIslamic and contravenes the provision of Islamic injunctions hence the decision to ban the use of the object by tailors, supermarkets, boutique owners and others in the state.
On Thursday July 8, Mourad D. was found guilty of assault and racial insult. In a video posted on social media on May 30, the man could clearly be heard racially insulting a woman who was recording him after a violent attack: “You nigger, you dirty black bitch”, or “we Algerians have sold you like cattle for 800 years”. A few minutes earlier, he had not hesitated to hit an Uber Eats delivery man. The events had taken place outside the restaurant “Le Brasco” in Cergy, in the Val-d’Oise.
The Hindus were compelled to recite the Kalimas (Islamic oath of allegiance) in front of municipal chairperson Abdul Rauf Nizamani.
I've found three options for DRM-free audiobooks for any book or text (e.g. long-form articles): find the audiobook on YouTube and download the audio track (using for example Invidious or youtube-dl); use an ebook reader app such as Librera/FBReader to read the book using text-to-speech; or create an audiobook using a text-to-speech service. The real-time text-to-speech option (using an app) has downsides: it either needs a constant [Internet] connection to use a web service to perform the TTS, or else it's an offline version but the quality of TTS is usually pretty bad. I decided that I'd much prefer good quality offline audiobooks that I can listen to anytime, anywhere.
To create my audiobook, I follow this process: convert the article/book to text, clean up the text if necessary, generate an audio file using text-to-speech, and post-process the audio file if necessary.
The timing of a patent filing is critical to the patent's validity. The earlier a patent is filed, the lower the risk of disclosures before the priority date destroying novelty and inventive step. Yet, the later a patent application is filed, the more time there is to obtain data and satisfy the requirement that the invention is sufficiently supported and disclosed. The recent Board of Appeal decision in T 0966/18 is an example of a case in which pre-clinical data, together with common general knowledge, was deemed as plausibly demonstrating a claimed therapeutic method. In fact, the data provided in the patent in question was surprisingly light. The patentee was able to compensate for this by reference to a strong body of supporting evidence from the prior art. However, this strategy may come back to bite the patentee when the question of inventive step is considered.
Legal Background: Plausibility at the EPO
It is established case law of the Boards of Appeal that clinical data is not absolutely necessary to demonstrate the plausibility of a claimed invention (T 0609/02, Case Law of the Boards of Appeal, II.C.7.2, see also Warner-Lambert v Actavis [2018] UKSC 56 (IPKat)). Indeed, at the time a patent application is filed for the new therapeutic effect of a drug, clinical trial data are often not available. Even if the inventors are pursuing the drug candidate in clinical trials, the patent application may be filed well before any read-out of results from the trial. Early filing is often necessary to avoid the clinical trial summary and protocol becoming prior art, particularly in jurisdictions other than Europe (IPKat).
[...]
The Board of Appeal decision in T 966/18 appears to confirm a relatively low bar for establishing the plausibility of a medical use claim. To this Kat, the Board of Appeal in this case were surprisingly lenient with regards to the quality of the data needed to support a medical use claim. Quantitative pre-clinical data, without evidence of statistical significance, was enough to satisfy the sufficiency requirement for a relatively ambitious therapeutic effect, at a standard below what might be expected for peer-reviewed publication. It is of course possible that the Board of Appeal was inadvertently influenced by the post-filed positive clinical trial results that the patentee was able to provide. In view of these data, a negative decision on sufficiency might have appeared unreasonable.
However, whether or not the Board was in fact swayed by the post-filed data, a large factor in the Board's decision was undoubtedly the strong body of evidence from the prior art that there was a link between the target and disease pathology. The prior art effectively lowered the bar for the quality of pre-clinical data that was required in the patent. However, the question of inventive step of the claims has not yet been considered, either by the Board of Appeal or the Opposition Division. It will thus be interesting to see whether the patent holds up at Opposition in view of the Board of Appeal's observation that the skilled person would have been aware of a body of evidence linking the target and disease, and prior art suggesting the use of anti-ñ-SN in a vaccine strategy for Parkinson's Disease. Whilst the patent has successfully jumped the sufficiency hurdle, the potentially larger hurdle of inventive step remains.
Lawyers from the telecoms, pharma and chemical industries reveal their plans for using the UPC, and send a warning to UK firms
Last week we examined the ‘unclear essential parameter trap’ where an application including a parameter that does not meet EPO standards may be refused, regardless of its substantive merit. This week we explore the various ways in which a parameter may be deemed unclear.
Strict EPO practice is nothing new – the legal framework around the ‘unclear essential parameter trap’ is long established, although changes made to the EPO Guidelines in 2019 made this even more stringent. The changes essentially merged two sub-sections of the previous guidelines, incorporating the comments on measurement methods from previous F-IV, 4.18 into current F-IV, 4.11. Although in principle nothing much has changed, anecdotally, there are reports of more clarity objections to usual parameters than before. One can find reasons for this perceived stricter practice in subtle changes to guideline’s wording. Previous F-IV, 4.18 stated “In principle the method of measurement is necessary for the unambiguous definition of the parameter” (emphasis added). The term ‘in principle’ perhaps suggesting some flexibility in how the rule should be applied. In contrast, current F-IV, 4.11 states unequivocally “the method for measuring a parameter (or at least a reference thereto) must appear completely in the claim itself” (emphasis added)”. Moreover, the EPO has categorised the changes to the guidelines as part of “major amendments”, which had “substantially rewritten sub-sections on the practice regarding the use of parameters in claims”, implying a shift in practice.
Counsel from Siemens, Hologic and three other companies explain how they make the most of interviews to get past rejections
Once upon a time, there was a federal judicial district to the east of Dallas that every defendant to a patent infringement case sought to leave. Today, that district still exists, and remains pretty important. But the number one hotspot is the Western District of Texas (specifically, its Waco division).
Judge Alan Albright is his lawsuits' keeper, at least when we're talking about patent cases. Not only does he take a long time to rule on venue transfer motions but from time to time he denies venue transfers even though the arguments made by plaintiffs against a transfer are outrageous, such as in a case in which a shell company was set up just to game the system. Unsurprisingly, the exit route from the Western District of Texas quite often passes through the DC-based Federal Circuit.
The Federal Circuit made an interesting--not spectacular, but definitely instructive--decision (PDF) that practicioners should keep in mind. There's a case in which a Canadian company named NCS Multistage is suing a Norwegian company named TCO in the Western District of Texas. The defendant would have preferred to litigate in the Southern District of Texas. But the Federal Circuit found that Judge Albright had not clearly abused his discretion.
The Enlarged Board of Appeal of the European Patent Office recently issued decision G 4/19. The Enlarged Board held that a European patent application can be refused if it claims the same subject-matter as an existing European patent (i.e. not just a co-pending EP application) which has been granted to the same applicant and has the same effective date.
This site provides useful information for applicants that wish to take advantage of the electronic priority document exchange (PDX) program. Use of PDX avoids the fee associated with ordering a certified priority document for each office of subsequent filing and the costs of transmitting those certified copies to foreign associates or foreign intellectual property (IP) offices. The United States Patent and Trademark Office (USPTO) transmits certain U.S. priority applications as-filed to any foreign IP office that participates in the priority document exchange program (participating office) and retrieves/accesses certain foreign priority applications as-filed from the participating offices. The priority document exchange program includes two modes of exchange: Direct Bilateral Exchange and World Intellectual Property Organization Digital Access Service (WIPO DAS) Exchange.
The China National Intellectual Property Administration (CNIPA) recently released data indicating that 2021 year-to-date invention patent grants totaled 269,706 invention patents, a 62.4% increase in cumulative grants from January through May 2020. The percentage of patents granted to foreign patentees dropped from 19.5% to 15.7% although the absolute number of patents to foreign patentees increased from 32,389 to 42,286. However, this may overstate the total number of patents granted to true foreigners as some Chinese entities file in the name of a foreign holding company – for example, the top foreign patentee in 2020 was Alibaba Group of Hangzhou, China according to CNIPA’s annual report for 2020...
Today, the UK High Court handed down a judgment invalidating four patents belonging to tobacco product manufacturer Philip Morris (case no: HP-2020-000011). The decision is yet another twist in the high-stakes global dispute between the rivals BAT and Philip Morris. All current battles between the two giants concern lucrative technology for heat-not-burn cigarettes.
BAT and Philip Morris showdown
In the same proceedings, Philip Morris defended the validity of its four patents while counterclaiming for infringement by BAT’s heat-not-burn glo product. However, given that the court found all four patents invalid, the judge dismissed the counterclaim.
A spokesperson for BAT says, “BAT is pleased that the UK High Court has found these four Philip Morris patents invalid. BAT commenced this legal action to protect our innovations and product portfolio in the Tobacco Heated Products space. We will continue to protect our valuable proprietary technology.”
A spokesperson for Philip Morris says, “We respectfully disagree with the decision of the court and are evaluating the decision and assessing our options. The patents in question form part of PMI’s extensive portfolio of patents for smoke-free innovations reflecting our commitment to and progress towards a smoke-free future and our considerable investment in smoke-free technologies over more than a decade.”
“We intend to continue to vigorously protect our intellectual property.”
In the face of existing and new scholarship, uncritical assumptions that proponents have not considered the operational challenges of a waiver is unhelpful. You will find nuance and detail to our plea here to see the waiver as a proportionate and necessary masthead from which a number of actions need to flow.
As Trebilcock and Poliwoda argue, here, even for those who take the view (as they do) that a sweeping waiver of IP rights, by itself, is unlikely to have any dramatic effect on expanding vaccine output, especially over the near term - it is important to explore alternative or complementary strategies. With this background, we respond to Reddy and Pai’s post and address those who ask “what’s the point of a TRIPS waiver?”
‘Simply put, there is no shortage of voluntary licensing agreements for COVID vaccines, for countries that have the capacity to manufacture vaccines’, say Reddy and Pai and from this deduce that IPRs are not barriers to production. Yes, licenses have been granted to Indian companies but it is also true that there is considerable underuse of capacity because other facilities do not have licenses. If IP restrictions were lifted and pharmaceutical companies were willing to share more of their know-how, how much more vaccine could be made worldwide? It is hard to know.
As part of its drive to maximize global access to coronavirus vaccines, the Medicines Patent Pool has developed a publicly accessible resource giving information on the patent status of approved and candidate vaccines.
Unified is pleased to announce the release of its report over the estimate of the aggregate FRAND royalty burden for the SEPs covering the video codec standard H.266, also called Versatile Video Coding (VVC). The report is a part of Unified’s Video Codec Zone whose goal is to provide objective, independent evidence refuting unsubstantiated Standard Essential Patents (SEP) licensing demands.
VVC (H.266) constitutes the latest installment in a series of video codec standards released by the ITU and ISO/IEC and is regarded as the direct successor to HEVC (also H.265). The fragmented licensing landscape for HEVC with three different patent pools has resulted in a significant degree of uncertainty about HEVC’s licensing terms and very high aggregate royalties. The issues revolving around its licensing have not only significantly hampered HEVC’s adoption but also likely have further boosted the significant momentum around royalty free video codecs like AV1. Against this background, the future uptake of VVC will strongly depend on whether the VVC SEP holders will be able to set clear and transparent licensing terms and royalties that are not excessive, but FRAND. VVC’s estimated FRAND royalty rates range from $0.05 for cellular devices to $0.17 for streaming devices.
Development in medical technology (MedTech) has seen steady growth for at least the past decade. This growth has been driven in part by the ageing population and the need for technical solutions to ease the pressure on struggling healthcare systems around the world. Healthcare, health monitoring and treatment are now moving away from traditional realms where a patient is seen by a medical professional. Instead, new, innovative and cost-effective solutions are needed to supplement the more traditional solutions in order to meet the growing demand.
...Decision to Grant European Patent No. EP3111689 (Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication), which is being published today in the European Patent Bulletin of July 14, 2021. In addition, the UK Intellectual Property Office issued Intention to Grant letters for Applications GB1608573.0 and GB2100530.1 (both entitled Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure). The UK applications are expected to be granted shortly after July 9, 2021 and August 9, 2021, respectively. The claims in these granted foreign applications are generally directed towards authentication of a module including an embedded universal integrated circuit card (eUICC) with a mobile network and supporting secure communication between the module and the mobile network.
Can the shape of a lipstick case function as an indicator of commercial origin? The answer is yes when such case is the iconic and immediately recognizable (at least to lipstick lovers!) one of Rouge G de Guerlain...
[...]
In 2018, Guerlain applied to register the 3D sign represented above (left-hand side) for “lipsticks” in Class 3.
The EUIPO examiner rejected the application considering that the sign would lack distinctive character, in accordance with Article 7(1)(b) EUTMR. The subsidiary claim of the applicant under Article 7(3) EUTMR (acquired distinctiveness) could be examined once the decision became final.
Cloud hosting and DDoS protection company Sharktech has asked a Colorado federal court to dismiss a 'frivolous' piracy liability complaint. Through a lawsuit, several independent film companies hold Sharktech liable for the infringing activities of the subscribers of some customers that offer VPN services.
Spotify has reportedly blocked the accounts of several customers after they "improperly" downloaded tracks from the service using a third-party software tool. Audials Music exploits Spotify to stream music to users at breakneck speed while recording tracks locally as MP3 files. This was noticed at Spotify and has resulted in users being suspended from the service for abuse.