EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.22.15

Techrights to Increase Coverage of EPO Scandals and the Unitary Patent

Posted in Europe, Patents, Site News at 5:49 am by Dr. Roy Schestowitz

The EPO’s management wants war

EPO backdrop

Summary: A statement of intent to delve even deeper into EPO affairs, in an effort to expose what has become large-scale and systemic abuse far too great to ignore

AS regular readers may have noticed, we have begun improving our EPO Wiki (still work in progress) and we intend to cover the abuses of the EPO’s management a lot more frequently than in past months. There are clearly institutional abuses there. It needs to change and it is possible the in this process some heads will roll, whereupon they will attempt to shoot the messengers (even engaging in legal bullying).

“We hereby invite people to kindly provide us with information they are aware of that merits publication.”As the chronology shows quite clearly, our original opposition to the EPO’s position was mainly about software patents. Software developers just simply don’t want them and don’t need them. The President of the FFII, a programmer and an opponent of the UPC (because it can usher into Europe software patents) wrote this tweet yesterday, taking note of the horrible thing which is being shoved — undemocratically as a matter of fact — down the throats of all Europeans:

EPO says on its automated translation website of patents that it should not be used for important commercial decisions. #epo #fail #unipat

This is all about maximising the scope of injunctions, the scope of patents and so on. It’s all about globalists and multinational corporations that are drunk on power and continue their power grab behind closed doors (e.g. the TPP).

In the US, by contract, software patents may now be on their way out. Seyfarth Shaw LLP, like many software patents-centric lawyers these days, does not want the public to know about it. They are cherry-picking incidents that are the exception to the norm, namely that Alice eliminates software patents in various US courts.

Given that the United States, the original home of software patents, is moving away from software patents, why would Europe ever consider phasing them in, if not due to corruption and aggressive lobbying?

Expect Techrights to dedicate more space to these issues in the near and distant future. We hereby invite people to kindly provide us with information they are aware of that merits publication. We have a perfect record of never letting down sources (this site will soon turn 9). Anonymity is more important than encryption for this purpose (we are working on a secure drop-box to better facilitate this). If the EPO’s management wants war, which it evidently does (as we shall explain next month), then it will need to mount an ugly war on whistleblowers, then face the consequences in the European or even international media.

“Staff at the European Patent Office went on strike accusing the organization of corruption: specifically, stretching the standards for patents in order to make more money.

“One of the ways that the EPO has done this is by issuing software patents in defiance of the treaty that set it up.”

Richard Stallman

10.20.15

Brute Force Cracking Attempts Against Techrights

Posted in Site News at 4:55 am by Dr. Roy Schestowitz

Target: Manchester

Manchester

Summary: An aggressive effort to infiltrate our servers (125,000 times in one day, peaking at particular hours) considerably slowed down the Web site, in spite of overzealous filtering

Negative publicity is something that EPO (as in its management) simply cannot tolerate. Remember how negative paragraphs got removed from news articles after payments from the EPO.

Techrights has, a few times over the years*, come under attacks from numerous entities but at no point in its entire history has it come under the same sorts of attack it must deal with whilst writing about EPO abuses. We suspect there may be a strong correlation between the covered subjects and the willingness to silence the coverage. Almost 80% of our articles are about patents nowadays.

“In our eyes, it was always likely to have been someone connected to the EPO or someone who works there.”Yesterday, as some people with special interest in the EPO told us, the site became unavailable. The volume of attacks on Techrights had gone up at around 11AM (G.M.T.) and at some point it doubled to around 50% of all traffic (it was around 25% of the traffic at 11AM). Brute force was being used to overcome our increasingly sophisticated filters, computationally trained and improved after previous such attacks.

Media articles coming from Germany correctly accuse the EPO of all sorts of things (and they cite Techrights), but all of them fail to mention that the EPO banned the whole site (for the first time ever). This in its own right is quite a scandalous thing. This kind of censorship we know about for sure, but we cannot confirm EPO role in the cyber-attacks. Some legitimate visitors (IP addresses) may accidentally get banned (barred from accessing Techrights) because the server is aggressively filtering traffic right now, in an effort to block the cracking attempts. We may have managed to drive away the attacker/s.

Of relevance to this issue are a few older article. Recall when SUEPO came under DDOS attacks (after and before SUEPO E-mails got altogether censored, meaning that a silencing campaign against unions was already well under way). Recall that Techrights came under DDOS attacks at around the same time (an especially sensitive time), leading to reasonable speculations. In our eyes, it was always likely to have been somebody connected to the EPO or someone who works there. For reasons explained here before, without legal action which compels law enforcement to check routers and zombie PCs (botnets), it is hard to know with high enough degree of certainty who commanders and orchestrates all this (the botmaster or script kiddie).

Let us assume that it’s a deterrence tactic (against the author/Webmaster/system administrator), or an effort to make it harder for people to access the Web site. Looking back at this nuisance, which started late last year, first was potentially an attack on the Web site (to no avail because my daytime job involves dealing with exactly these types of scenarios and we patiently fought back by filtering any attacks), then blocking the entire site (Office-wide), which makes one wonder what can come next, given that EPO staff can still access the site (off duty).

It has been extremely hard to report abuse about the source of yesterday’s attacks on Techrights because the hosting is provided by rogue domain with rogue SSL certificates (or none). It’s incredibly hard to obtain contact details. This was a European cluster that attacked the site. Most of the cracking attempts against Techrights come from this same cluster of machines (with IP pool in Spain); we are talking about exceptionally frequent cracking attempts against the CMS (many hundreds of times per minute) and this bypasses caches and other basic defenses. If Techrights was ever forced into a CDN for supposed protection, no doubt there would be no true privacy for visitors. Without filtering, about one quarter of the traffic in Techrights would be cracking attempts, slowing the site down or taking it down for considerably long periods of time (not just seconds). Wonder who’s doing it? We sure wonder, but as people who do this for a living can tell, it’s a hard question to answer, especially without access to servers and probably a warrant to legally delve into them.

If these attacks ultimately just try to hijack and deface the site (or obtain a list of visitors), then they aren’t doing a very professional job. These must be just brute force login attempts — many attempts at cracking, perhaps with a common passwords dictionary. Because it’s done with brute force (as long as the server can still respond), it induces very high load, as a side effect; hence the server issues. This is similar to what SUEPO reported earlier this year, whereupon it filed a complaint with the authorities.
___
* The first time it happened we lost our Web host and the site was left orphaned, because the Web host was unable and unwilling to help us cope with a DDOS attack on a shared server.

09.23.15

Changes at Techrights

Posted in Site News at 3:46 pm by Dr. Roy Schestowitz

Manchester eye

Summary: A few short notes on how we are going to re-align the site with disruptive trends, notably patents-related

ONCE in a few years, as longtime readers probably know by now, we take the time to write a post or two about strategic changes. Once upon a time we focused a great deal on Novell, about which we wrote literally thousands of posts. Novell is no more. It’s not functioning anymore. Later on Microsoft started to increase its patent attacks on GNU/Linux and then on Android, whereupon we turned our attention to Microsoft and then we wrote about patents, for reasons we repeatedly explained. Patents are one of the subjects that we are unique at tackling. Groklaw used to do that too, but the site has been inactive for years.

“Once upon a time we focused a great deal on Novell, about which we wrote literally thousands of posts.”In order to make better use of time and focus on topics that matter and are relevant to the field of interest, we are going to change priorities and better align our strategy with current strands, such as the EPO, the UPC, and software patents in general (in various parts of the world). To make room, time, capacity etc. for this we are going to post less political stuff and less news pertaining to international affairs (mostly in daily links these days, having taken up dozens of hours of research every month). If anyone among our readers opposes such changes, we would be glad to hear and reconsider accordingly.

07.06.15

There is No ‘New Microsoft’: Under Nadella, Patent Extortion Against Linux/Android Carries on

Posted in Site News at 5:53 am by Dr. Roy Schestowitz

Kyocera

Summary: Kyocera is again being targeted by Microsoft, using patent aggression, with a secret settlement being reached whose negative impact on Android remains to be seen

AS LONGTIME readers may recall, back in 2007 Microsoft picked Kyocera for its anti-Linux patent campaign, leading us to years of research and protests, even when Kyocera adopted Android, only to be sued by Microsoft earlier this year (with ‘partners’ like these, who needs enemies?). Kyocera is not “just peanuts”; despite not being so well known in Western nations, this is a company with 68,185 employees (not much smaller than Microsoft, which is still on the process of shrinking based on what I privately get told by Microsoft staff).

“Kyocera is not allowed to speak about what Microsoft did to it, for that might damage Microsoft’s reputation or harm Microsoft’s future efforts to blackmail other companies using patents.”US News has this new article titled “Microsoft Seeks a Comeback – But Is It Too Late?” The article alleges that Microsoft is falling way behind Google/Android/Linux. No wonder Microsoft is has been in layoffs mode for half a decade or so, with pace of layoffs increasing over time. Microsoft is now relying more and more on patents; Kyocera is a victim again, as this time it actually fought in court (unlike that time in 2007 where it just bent over).

According to Tech Times, there has just been a secret settlement with all details unknown. Kyocera is not allowed to speak about what Microsoft did to it, for that might damage Microsoft’s reputation or harm Microsoft’s future efforts to blackmail other companies using patents.

“A few months ago,” Tech Times wrote, “Microsoft filed a lawsuit against Kyocera, claiming that three Android smartphones from the Japanese company violated seven Microsoft patents. The smartphones in question were the Duraforce (pictured), Brigadier and Hydro. The patents, meanwhile, cover a wide range of mobile technologies that Microsoft alleged the Android devices violated.

“Microsoft has dozens of licensing agreements in place with Android OEMs, including Samsung, but it will not back out of a litigation if it doesn’t reach an amicable agreement. Microsoft went after Kyocera in March, asking a Seattle court for a U.S. sales ban on the three phones that infringed its patents.”

Microsoft is euphemistically calling racketeering “Technology Sharing Agreement” in its short press release. To quote the Microsoft press release: “In addition to strengthening the partnership between the two companies, it also resolves a patent-infringement lawsuit brought earlier this year in U.S. District Court. The remaining details of the agreement are confidential.”

The words “strengthening the partnership” serve to insinuate that Microsoft uses patent pressure (and rising litigation costs) to coerce Kyocera into becoming Microsoft’s vassal, just as Microsoft did to Samsung shortly before suing Kyocera (March 2015).

The Samsung settlement had conditions from Microsoft, essentially turning Samsung’s Android devices into “Microsoft Android” devices (this has actually been confirmed since the settlement, after mere speculations and rumours). So, there is nothing peaceful about it. This is blackmail. The loaded gun of the Mafia in this case is a pile of patents, usually software patents.

Tech Times does not cover any of this, but the report concludes with: “It remains unclear, however, just how much Kyocera will pay to use Microsoft’s patents.”

So it is possible that Microsoft got Kyocera to pay Microsoft for Android and also preinstall Microsoft malware on future Kyocera handsets. How nice of Microsoft… what a peaceful company.

Looking for any additional takes on this, we only found a proponent of software patents (“AmeriKat”) commenting poorly in a lawyers’ blog. Remarking on these attacks on Android, he wrote that “Kyocera follows Barnes and Noble, Foxconn, Invetec and Samsung in the line of companies that have recently settled with Microsoft.”

“It’s about Microsoft forcing companies to turn to Windows or “Microsoft Android”, making malware with surveillance (spyware) mandatory installed apps.”It’s hardly a settlement. It’s extortion. Microsoft essentially killed Barnes and Noble by tilting it in Windows’ direction in exchange for a so-called ‘settlement’ (we wrote a lot about this) and Samsung did this in exchange for becoming courier of Microsoft rather than an Android company. Kyocera may turn out to be just more of the same. It’s about Microsoft forcing companies to turn to Windows or “Microsoft Android”, making malware with surveillance (spyware) mandatory installed apps.

Curiously enough, in China (where many Microsoft bits of software are now officially banned for use by government agencies) Samsung is now facing a lawsuit over installed apps. We may safely assume that since Samsung agreed to preinstall Microsoft malware on many of its devices (after patent extortion) the Chinese government won’t be too happy. To quote the Shanghai Daily, “Shanghai Consumer Rights Protection Commission yesterday formally announced it has taken legal action against manufacturers Samsung and Oppo over their practice of pre-installing apps on their smartphones.

“The Shanghai No. 1 Intermediate People’s Court said on Wednesday it had accepted separate cases against Tianjin Samsung Telecommunications Technology Co Ltd and Guangdong Oppo Mobile Telecommunications Co Ltd.

“We may safely assume that since Samsung agreed to preinstall Microsoft malware on many of its devices, the Chinese government won’t be too happy.”“Tao Ailian, secretary-general of the commission, said it filed the public interest lawsuits after investigating complaints from the public about unwanted apps.

“In a study of 20 smartphones, the commission found several that were sold with apps already installed, many of which could not be removed. It also claimed that some phones “stole” cellular data.”

For many users of Galaxy devices, Microsoft malware is clearly “unwanted apps”, so maybe the Shanghai Consumer Rights Protection Commission should also go after Microsoft, both for racketeering, for bundling, and maybe also for mass surveillance, for which it is most notorious (far worse than Google).

06.28.15

DDOS Attacks Against Techrights

Posted in Site News at 9:03 pm by Dr. Roy Schestowitz

Knocking the site over intentionally

Chess board

Summary: Information about some of the most recent DDOS attacks against this Web site and the steps to be taken next

THERE is a long history of DDOS attacks against Techrights, going back to 2008 or thereabouts. There were also press articles about DDOS attacks against the site (based on evidence provided to journalists upon request). Pinpointing who’s to blame for an attack is a lot harder than combating an attack (one way or another) and holding someone accountable is virtually impossible. People don’t just give themselves away so willing.

Over the past week there was a new pattern of DDOS attacks and they came from AWS servers, so I was able to file abuse reports and pursue this complaint (still work in progress). At this stage I am still hoping to see who or what group (or company) is behind it. This is clearly malicious.

Over the past few months I lost a lot of time (maybe hundreds of hours) due to DDOS attacks. It’s financially damaging and emotionally exhausting. I have been privately advised to file a report with the Dutch authorities over various DDOS attacks, which some told me might be connected to the EPO (or particular high-level staff at the EPO). Nonetheless, these efforts are usually a waste of time (I last tried around 8 years ago), so I did not bother. It’s a patience-draining experience that usually yields no results at all. It’s mostly symbolic. I did plan to write about this at some later stage and I even told one person that I might write more about intricate details of the attacks one day, maybe after the storm is settled at the EPO (giving too much information away usually helps the attacker). Today I would like to share some information about recent DDOS attacks and patterns that were noticed. This is information that won’t help the attacker; rather, it might discourage the attacker.

Referring to our DDOS complaints (IP addresses of the EPO hammering on our server quite heavily) and my recent “tweet”, one person told me that “The EPO IU is based in Munich but that doesn’t really tell you anything about what IP addresses are going to appear on traffic from the EPO.

“As far as [I'm] informed much of the EPO’s IT infrastructure is located in the Hague (Rijswijk) office. So even Internet traffic from Munich may be routed through a proxy in the Hague and appear with a Netherlands IP address. In any case the IU (in Munich) could presumably delegate tasks to an IT department (which could be based in the Hague).

“But the fact that you seem to be identifying IP addresses assigned to the EPO is in itself revealing.

“A lot of EPO addresses begin with 145.64 [...] You can find many of the address blocks in the db-ip.com database. For example: https://db-ip.com/all/145.64.0

“But it’s important to note that the geographical location nominally associated with the EPO IP address (e.g. Rijswijk/Hague) doesn’t really tell you where the user of the IP address is physically located (e.g. whether in Munich or the Hague).”

More technical information about the nature of the DDOS-induced strain can be published when the storm at the EPO is over. I can only speculate about who’s behind the attacks and weigh the probabilities. There is no ‘smoking gun’ just yet.

Some things, like the nature of attacks on this site, can be published upon key events, such as key facts about SIPO/Željko Topić corruption being published after a defamation trial reveals that allegations have merit and are most likely true. It would be safer for Techrights to limit sharing of information temporarily and to do so (against accusations or retaliatory tactics) only until perceived foes are powerless and widely scrutinised.

“You could try filing a criminal complaint with the Dutch authorities,” one person told me. “It seems that they have take action against DDOS attacks in the past.

“The EPO will probably try to hide behind its “immunity” but that should not protect it in this case as DDOS is not part of its official functions.”

DDOS attacks are very hard to analyse for original sources, speaking as a system administrator here. As far back as pre-2010 I have tried complaining to British authorities and it never led to the slightest of actions. They don’t even know what DDOS means, until or unless it attacks some major business or a governmental institution. Experience teaches that it’s a waste of time to even initiate action and I already have a big battle with BT (since March) and another one brewing with Amazon (over the latest DDOS against Techrights). Amazon will hopefully unmask (perhaps under increasing pressure) the identity of the account behind it all. This needs to happen soon, maybe this week.

“You may be right,” wrote to us another person with some background in this area. “It’s probably easier just to block the addresses.” Well, it’s not always possible, not with AWS anyway (far too many IP addresses).

Speaking again with one who is familiar with the EPO’s network, I begin to consider filing a complaint directly with the EPO. “As mentioned previously,” wrote to us one person, “as far as we can determine, most officially registered EPO addresses begin with 145.64.

“See here: http://bgp.he.net/AS28756#_prefixes

“Also here: https://ipinfo.io/AS28756

The E-mail addresses listed for the Network Administrators at the EPO under the second link above are rather clear.

ywoue@epo.org and wherler@epo.org (that’s Wolfgang Herler) will soon be contacted.

We found two further E-mail addresses here: jbielsa@epo.org and nderuiter@epo.org (that’s Niek de Ruiter).

There is also an “impersonal” E-mail address for Network Administration: admin_network@epo.org

Once I get to the bottom of the DDOS attacks from Amazon AWS I may also make time to file a detailed complaint to the above addresses, complete with a list of offending EPO IP addresses (which automatically got banned by our security software/defences, based on their erratic behaviour).

Williamson v. Citrix Online (at CAFC) Reinforces Alice v. CLS Bank (at SCOTUS) in Crushing Software Patents

Posted in Site News at 3:22 am by Dr. Roy Schestowitz

Another checkmate against software patents in the United States

Chess pieces

Summary: More patent news from the United States, again serving to indicate that software patents over there are getting weak (harder to defend in court or acquire from the patent office)

The fall of software patents is very much real. It’s all sorts of patents that are affected by the Alice ruling (software patents and business methods being the primary examples), but we wish to focus on software because there is something unique to it, patents being abstract, software being infinitely copyable (copies of copies), and software being reducible to mathematics, making some patents impossible to work around. The other day we saw this effort to re-examine patents. “US Patent and Trademark Office will issue reexamination certificates rejecting all claims in US patents 7,138,061, 7,381,327 and 7,410,571.” Biotage is fighting against patents that have been used against it, so there is certainly some eagerness to challenge US patents right now. Many do, in fact, get invalidated at the end. Patents are therefore declining in terms of their value, as we shall show tomorrow in a separate article.

Recently, just around the middle of this month, the Court of Appeals for the Federal Circuit (CAFC) “Tightened [it] Squeeze on Software Patents,” to quote The Recorder. This invalidation of a software patents quickly made it into the press, with even corporate media coverage, which is rare. Here is the EFF’s response and some views from a rather subjective site, Patently-O. There is analysis from a Law Professor at the University of Iowa College of Law and another professor, Kevin Emerson Collins from Washington University Law School.

“There is much to celebrate here.”As always, one can immediately tell how nervous the parasites are becoming based on lawyers’ firms with their responses or ‘damage control’. It’s all over the place, especially in lawyers’ news and analysis sites, e.g. [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11].

The National Law Journal went with the headline “It’s a ‘Scary’ Post-’Alice’ World for Software Patents”. To quote a key paragraph: “In the year since the seminal U.S. Supreme Court ruling in Alice v. CLS Bank International, courts and the U.S. Patent and Trademark Office increasingly have nullified inventions involving computers or the Internet. Robert Sachs, a San Francisco intellectual property partner in Fenwick & West, has studied the trend.”

“Another Software Patent Falls to ‘Alice’,” said another headline from The Recorder.

The Williamson/Citrix case, or “Williamson v. Citrix Online” as some might refer to it in the future, is quite important, albeit not as important as the Alice case (Alice Corp. v. CLS Bank) because it’s not a SCOTUS ruling.

Check out the headline from patent maximalists: “The trend is clear in the US, says leading observer: software patent protection is diminishing – and fast” (faster than we could ever dream of).

When the worst patent maximalists, IAM, publish “software patent protection is diminishing – and fast”, it really does mean something.

There is much to celebrate here. It is truly another barrier for software patents in the US and as Fenwick & West LLP put it, “Federal Circuit Creates New (Non-Alice) Hurdle For Software Patents”. These patent lawyers (Fenwick & West LLP) also wrote that the “Supreme Court rebukes Federal Circuit on patent inducement”.

Other patent lawyers’ sites took a ‘hopeful’ approach, going with headlines such as “Hope for Computer-Related Patents”. This is another law firm with selective reporting and cherry-picking, designed to shift attention to cases that are favourable to their agenda.

They quote Justice Kimberly Moore, U.S. Court of Appeals for the Federal Circuit, as saying: “Let’s be clear: if all of these claims, including the system claims, are not patent-eligible, this case is the death of hundreds of thousands of patents, including all business method, financial system, and software patents as well as many computer implemented and telecommunications patents.”

Yes, indeed. So where is the hope for lawyers?

Alice was recently cited in this high-profile case which makes a headline again. It says that a “group of computer-based technology patent holders told the U.S. Supreme Court to hear Ultramercial Inc.’s appeal of a decision that invalidated its online advertising patent as an abstract idea, saying the high court must clarify the standards for analyzing whether an idea qualifies as abstract.”

This isn’t actually about computer scientists; rather, these are “computer-based technology patent holders,” which basically means a bunch of folks defending their own wealth.

Regarding business methods, an article titled “The status of business method patents” was recently published, saying that “Alice v. CLS Bank dealt a blow to business method patents.”

“Business method patents have a checkered history,” they claim. “They were once very much in vogue—numerous such patents issued, and many of them were litigated. Then, about two years ago, Congress enacted a special procedure that made it easier to challenge business method patents in the U.S. Patent and Trademark Office (USPTO). Then, in June 2014, the Supreme Court case Alice v. CLS Bank dealt a blow to business method patents.”

Patent boosters keep complaining about Alice. They are distracted and they acknowledge that “the IP licensing market slowed down in 2014″.

Quoting the opening bits from patent maximalists: “This uncertainty is due to a number of well publicized factors. The industry spent the first half of 2014 awaiting the Supreme Court’s decision in the controversial Alice v. CLS Bank decision. Once the Court announced its decision in June 2014, the industry spent the second half of the year analyzing its impact, particularly its impact to the Inter Partes Review process. Although the IPR provision in the America Invents Act admirably intended to increase efficiency by weeding out patents that shouldn’t have been issued, it has instead dramatically decreased efficiency and disrupted the objective patent valuation methods historically used throughout the industry.”

Well, that surely is a good thing, unless one is a patent lawyers like the majority of the voices above. At least they too are admitting that there is considerable impact after Alice. When even the biggest patent maximalists are willing to admit that software patents are in trouble, then surely software patents are in trouble.

IAM Biased: How IAM ‘Magazine’ Glorifies Patent Stockpiling

Posted in Site News at 2:51 am by Dr. Roy Schestowitz

IAM logo

Summary: A look at the bias of one of the most overzealous sites for and by patent lawyers

THE bias of patent lawyers can be amusing at times. Over at IAM ‘magazine’, a notorious maximalist of patents (we have fished out some truly ridiculous articles from there over the years; search this site for “iam” to find many dozens of examples), it is being said: “It’s not just Google whose US patent grants rates have soared – it’s been a similar story for Apple & Qualcomm too.”

“Sadly, it is them who write in corporate media or (mis)inform authors in corporate media.”These are very large companies that dominate the mobile market and want to guard their domination using patents. It’s monopolisation and it’s not based on merit. Apple and Qualcomm are both exceptionally notorious as patent aggressors. In this so-called ‘magazine’ (glorified name), one of the maximalists, Joff Wild, uses the word “superpowers” to describe patent stockpiling. IAM’s intention is of course to glorify such a practice.

Over at India, where software patents are generally not allowed, IAM hopes that software and pharmaceutical patents will become possible. To quote the relevant part: “The proposed Trans-Pacific Partnership (TPP) has grabbed its fair share of headlines in both Asia and the Americas after the US House of Representatives’ dramatic rejection of a key part of the package. But although intellectual property features prominently in the deal, it may not have much of an impact on Asia’s overall IP climate even if it is passed. That’s because China and India ­– commonly cited as two of the most important (and problematic) markets in the region – are not party to the TPP. They are, however, both participating in negotiations for another trade agreement, the Regional Comprehensive Economic Partnership (RCEP), and recently leaked documents show that India’s policies on software and pharmaceutical patents are firmly on the agenda.”

TPP is a massive scam and those who oppose the TPP are often lied to, a common propaganda being that we need TPP to compete with China. In reality, TPP is mostly about corporate power over everything, enhancing the already-excessive protections that super-rich people have enjoyed for decades.

IAM is not alone, but it is one of the worst offenders, as we have pointed out over the past 7 or so year. Watch Reuters using phrases like “create patents”, as seen in this new article [1, 2]. It says that ‘U.S. researchers to create patents ranging from new software,” but people don’t create patents, people create something and can then apply for a monopoly on it (if eligible in their country). Treating patents like objects is not unusual; IAM stands for “Intellectual Asset Management”, so they treat patents like an “assets”.

Don’t ever expect to get an objective account in patents lawyers’ press. Sadly, it is them who write in corporate media or (mis)inform authors in corporate media.

06.26.15

Operating Systems Usage Based on Technical Site Statistics

Posted in Site News at 8:12 pm by Dr. Roy Schestowitz

Summary: Some numbers to show what goes on in sites that do not share information about their visitors (unlike Windows-centric sites which target non-technical audiences)

THE common perception of GNU/Linux is that it is scarcely used, based on statistics gathered from privacy-hostile Web sites that share (or sell) access log data, embed spyware in all of their pages, and so on. Our sites are inherently different because of a reasonable — if not sometimes fanatic — appreciation of privacy at both ends (server and client). People who read technical sites know how to block ads, impede spurious scripts etc. These sites also actively avoid anything which is privacy-infringing, such as interactive ‘social’ media buttons (these let third parties spy on all visitors in all pages).

Techrights and Tux Machines attract the lion’s share our traffic (and server capacity). They both have dedicated servers. These are truly popular and some of the leaders in their respective areas. Techrights deals with threats to software freedom, whereas Tux Machines is about real-time news discovery and organisation (pertaining to Free software and GNU/Linux).

The Varnish layer, which protects both of these large sites (nearly 100,000 pages in each, necessitating a very large cache pool), handles somewhere between a gigabyte to 2.5 gigabytes of data per hour (depending on the time of day, usually somewhere in the middle of this range, on average).

The Apache layer, which now boasts 32 GB of RAM and sports many CPU cores, handled 1,324,232 hits for Techrights (ranked 6636th for traffic in Netcraft) in this past week and 1,065,606 for Tux Machines (ranked 6214th for traffic in Netcraft).

Based on VISITORS Web Log Analyzer, this is what we’ve had in Techrights:

Windows: (36.2%)
Linux: (31.8%)
Unknown: (e.g. bots/spiders): (23.0%)
Macintosh: (8.8%)
FreeBSD: (0.1%)

As a graph (charted with LibreOffice):

Techrights stats

Tux Machines reveals a somewhat different pattern. Based on grepping/filtering the of past month’s log at the Apache back end (not Varnish, which would have been a more sensible but harder thing to do), presenting the top 3 only:

Tuxmachines stats

One month is as far as retention goes, so it’s not possible to show long-term trends (as before, based on Susan’s summary of data). Logs older than that are automatically deleted, as promised, for both sites — forever! We just need a small tail of data (temporarily) for DDOS prevention.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts