Bonum Certa Men Certa

Links 25/7/2021: MyGNUHealth 1.0.3 and Lots About Patents



  • GNU/Linux

    • Desktop/Laptop

      • The History of Various Linux Distros

        Linux has been around for 30 years, beginning back in 1991. Yes, it’s that old, and it did make history. If you are interested in the history of some of the major Linux distros, here it is in a nutshell – the history of various Linux distros, like Ubuntu, Fedora, REHL, Linux Mint, Slackware, etc. Finally learn more about why they were created and what makes each different.

        Note: As there are plenty of distros out there, we are only focusing on a few major distros.

      • Google fixes 'Chromebork' one-character code typo that prevented Chrome OS logins

        Google has fixed a bug in Chrome OS version 91.0.4472.165 that surfaced on Monday and prevented some users from being able to login to their systems.

        Chrome OS downloads updates automatically but doesn't apply them until reboot, so only those who restarted their Chromebooks to ingest the force-fed broken update were affected.

        Earlier this week, the internet titan on its Google Workplace status page said, "Our engineering team has identified an issue on Chrome OS 91.0.4472.165. The rollout of this version was halted."

        As a workaround for those bitten by the bug, Google advised users: to "powerwash" their Chrome OS devices back to factory settings; to rollback the Chrome OS device to a previous version via USB; or to remove the affected account and add the account back to the device. All three mitigations, however, clear local data on the device.

    • Audiocasts/Shows

    • Benchmarks

      • Ubuntu vs. Arch Linux On The ASUS ROG Strix G15 / Ryzen 9 5900HX

        This past week were the initial Linux benchmarks of the Ryzen 9 5900HX with the ASUS ROG Strix G15 laptop. Ubuntu was used as the default test platform as usual given its popularity and arguably the most relevant Linux distribution to use given that it's the most common Linux distribution at the moment for preloads on laptops by multiple vendors. In any case, as usual many users were quick to say "but Arch Linux!" as if it was going to make a dramatic difference in my findings. Well, here are some Ubuntu 21.04 versus Arch Linux benchmarks on that AMD Advantage laptop.

    • Instructionals/Technical

      • systemd on Linux 3: Targets

        Learn how systemd targets work in Linux.

      • How to Use AutoKey to Automate Repetitive Tasks on Linux

        AutoKey is a scripting application for Linux. It lets you automate repetitive and trivial operations on your computer so you can perform them quickly and efficiently.

        Some of the tasks where AutoKey serves well include text expansion, correcting typos, launching programs, and inserting boilerplate texts. Besides, you can also use it to run custom scripts to automate complex system actions on your machine.

        That said, though, AutoKey can be intimidating to its first-time users. To this end, here's a guide to help you install, set up, and use AutoKey on Linux.

      • Run an Ansible playbook in a chroot



        Running a playbook in a chroot or container is not supported by Ansible, but I have invented a good workaround to do it anyway.

        The first step is to install Mitogen for Ansible (ansible-mitogen in Debian) and then configure ansible.cfg to use it...

      • Using Pacman on Arch and Manjaro - Linux Nightly

        When trying out a new Linux distribution, one of the first things you need to familiarize yourself with is the system’s package manager. Arch Linux and other Arch-based distros, like Manjaro, use pacman to install or update packages, remove software, and keep the system up to date. Pacman isn’t related to the classic video game, rather just an acronym of package manager.

        In this guide, you’ll learn how to use pacman on Arch Linux, Manjaro, and other distros based on Arch. It works the same across any of them. Read on to master pacman with commands to install packages, remove packages, update the system, etc.

      • Learn Tar Command in Linux with Practical Examples

        Tar command in Linux is used to archive files and folder into a single archived compressed file. Linux admins use tar command to perform day to day backup and restoration tasks. In other words, we can say that tar command is a command line utility which is used to archive important files and folders of a Linux system and later we can extract files and folders from that archive for restoration purpose.

      • How to Restore Git to Previous State: Guide to Restore, Reset, Revert and Rebase – Linux Hint

        If you have a development background, then you must be aware of many development tools. When you individually develop a project through any programming language, you’re either comfortable with a command-line interface (terminal) or GUI tools. But what if you’re working with the team members, it is hard to send chunks of programs to all team members individually. There is also a size limit of files on different platforms that don’t allow the user to send more than the described size.

        It is hard to collaborate when the project is too large and needs modification all the time. For this, you need a distributed version control system that helps you collaborate with team members worldwide. It is good to use a distributed version control system for small and large software projects. Each of the team members will get full access to the complete repository on the local system, and they can work offline.

      • How To Install RabbitMQ on AlmaLinux 8 - idroot

        In this tutorial, we will show you how to install RabbitMQ on AlmaLinux 8. For those of you who didn’t know, RabbitMQ is open-source message-broker software built around Advanced Message Queuing Protocol (AMQP) protocol. RabbitMQ can be easily deployed in a distributed and federated configurations to meet high-scale, high-availability requirements.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the RabbitMQ on AlmaLinux 8. You can follow the same instructions for Rocky Linux.

      • How to play Observer on Linux

        Observer is a cyberpunk horror game developed by Bloober Team and published by Aspyr. It was released on Windows, PS4, and Xbox in 2017, and later on, it came to Linux. In this guide, we’ll show you how to play it on Linux.

      • How to play Orwell on Linux

        Orwell is a simulation video game by Osmotic Studios. In the game, the player assumes the role of an operative and monitors security cameras for national security threats. Here’s how to play it on Linux.

      • How to install Reveal.js on Ubuntu - Unixcop

        reveal.js is an open-source HTML presentation framework. It’s a tool that enables anyone with a web browser to create fully-featured and beautiful presentations for free.

        Presentations made with reveal.js are built on open web technologies. That means anything you can do on the web, you can do in your presentation. Change styles with CSS, include an external web page using an <iframe> or add your own custom behavior using our JavaScript API.

        So in these times of pandemic, this tool can be quite useful for many students and teachers.

      • How to Automatically Set New Wallpapers Using Styli.sh on Linux

        Linux is widely known among enthusiasts for the productivity and the control it offers to its users. However, one of the things that often goes unnoticed is its flexibility in terms of customizations.

        Speaking of customizations, the wallpaper is a simple yet fundamental aspect of the Linux desktop that can make or break its aesthetics. Finding the perfect wallpaper manually can be tough. So why not let a simple script take the pain away? Let's find out more about this script in detail.

      • Sed Command to Delete a Line – Linux Hint

        Sed is a built-in Linux tool for text manipulation. The term sed stands for “stream editor”. Despite the name, sed isn’t a text editor by itself. Rather, it takes text as input, performs various text modifications according to instructions, and prints the output.

        This guide will demonstrate how to use sed to delete a line from a text.

      • Network OSI Layers Explained – Linux Hint

        The Open System Interconnection (OSI) model conceptually illustrates seven abstraction layers of communication framework that devices use for interoperability over the network. In the 1980s, the model was a globally accepted standard framework for network communication.

        The model defines a set of rules and regulations required to render interoperability between different software and devices.

        It was introduced by the Internet Organisation of Standards in 1984 when computer networking was only becoming a new concept. Even though the internet these days is based on a simpler networking model, TCP/IP. The OSI 7-layer model is still used to visualize the basic essential networking architecture and troubleshoot problems.

      • kubectl – How to Restart the Pod – Linux Hint

        A pod can also have one or more containers, one of which is the application container, and the others are the init container, which halts after it completes a job or the application container is ready to perform its function, and the sidecar container, which is affixed to the primary application container. A container or pod will not always leave due to an application failure. In scenarios like this, you will need to restart your Kubernetes Pod explicitly. In this guide, you will explore how to force pods in a deployment to restart using several ways.

    • Proposed Reflink Support Would Provide Big Space Savings For Wine

      When sticking to Wine recommendations of maintaining separate prefixes per-application, a lot of system files get duplicated for each game/application and in turn leading to significant bloat. With the current state of Wine it can mean hundreds of megabytes per prefix in duplicated files. But proposed reflink patches for Wine are aiming to cut down on this severe bloat.

      Developer Alex Xu sent out a set of patches today that would implement Reflink support within Wine. Alex explained, " With a MinGW build of Wine without Mono or Gecko, new 32-bit prefixes are over 150 MB, and new 64-bit prefixes are over 300 MB. The vast majority of these files are byte-for-byte identical to Wine's central DLL copies...When reflink is supported by the underlying filesystem, new Wine prefix sizes with Mono and Gecko disabled are reduced to less than 1 MB. The resulting Wine prefix is byte-for-byte identical to one created without reflink, but occupies less space on disk. "

  • Games

    • Play Control Ultimate Edition on Linux (How To)

      Control Ultimate Edition is an adventurous game packed with actions and thrillers. The developers of the game “Remedy Entertainment” successfully marked the title of the game in gaming publications and were nominated for numerous video game awards. Control Ultimate Edition is available on the platform across Ps4/5, Xbox Series X/One, Epic Games Stores, Pc, and Steam.

      #gnu #linux not falling behind. https://www.gadgetheadline.com/play-control-ultimate-edition-on-linux-how-to/

  • Devices/Embedded

  • Free, Libre, and Open Source Software

    • Productivity Software/LibreOffice/Calligra

      • Hamsters QA team are trying to decrease a number of unconfirmed bug reports in LibreOffice's Bugzilla right now

        I found an interesting Russian site and Telegram channel where newbies QA try to get some experience in QA process for free. Its name is Хомячки (Hamsters). You can ask admins to create a group for testing of anything and if someone want they will test your software (mobile, web, desktop or something) for you. I asked there if someone want to test LibreOffice and many people said yes. So, today we have the group of Russian newbies QA who are triaging bug reports in our Bugzilla. We have a goal - to have minimal number of unconfirmed bug reports in end of August 2021 as possibly.

    • FSF

      • GNU Projects

        • health @ Savannah: Release of MyGNUHealth 1.0.3

          I am happy to announce that the release 1.0.3 of the GNU Health Personal Health Record (PHR) component, MyGNUHealth.

          This release updates the medical genetics domain, with the latest human natural variant dataset based on UniProt Consortium (release 2021_03 of June 02 2021).

    • Programming/Development

      • Dirk Eddelbuettel: littler 0.3.13: Moar Goodies

        The fourteenth release of littler as a CRAN package just landed, following in the now fifteen year history (!!) as a package started by Jeff in 2006, and joined by me a few weeks later.

        littler is the first command-line interface for R as it predates Rscript. It allows for piping as well for shebang scripting via #!, uses command-line arguments more consistently and still starts faster. It also always loaded the methods package which Rscript only started to do in recent years.

        littler lives on Linux and Unix, has its difficulties on macOS due to yet-another-braindeadedness there (who ever thought case-insensitive filesystems as a default were a good idea?) and simply does not exist on Windows (yet – the build system could be extended – see RInside for an existence proof, and volunteers are welcome!). See the FAQ vignette on how to add it to your PATH.

      • Python

        • Python Increment by 1 – Linux Hint

          When you’re acquainted with Python, you’re probably aware that the Increment and Decrement expressions (both before and after) aren’t supported. Python was created to be understandable and consistent. In linguistics having ++ and — expressions, a beginner programmer frequently makes the mistake of confusing the distinctions among increment/decrement expressions, post and pre (both in priority and return value). In comparison to many other programming languages, basic increment and decrement expressions are not quite as necessary. In this tutorial, we will learn about the increment by 1 operator in Python code. Make sure you must have a python tool installed and configured on your system. Hence, we have installed the Spyder Python tool on our system.

        • Python Not Equal Operator – Linux Hint

          While contrasting variables, it’s important to examine both the contents and respective datatypes. Whenever the values of the two inputs differ, the statement is satisfied. Throughout Python, we may use “!=” or “is not” to do not equal operations. Whenever the values of any two Python variables or operands supplied on either side of the not equal operator are not equal, it must return true, else false. Many structured query languages might grumble about matching various types since Python is flexibly yet tightly typed. The not equal operator must return “True” whenever the values provided in two variables are the same; however, they are of various types. Let’s have some examples to see the working of python Not equal operator. First of all, you must ensure that your system has a python tool installed and configured. Launch your installed python tool to start working. At the time of implementing this article, we have been working on the Spyder Python tool.

      • Shell/Bash/Zsh/Ksh

        • Bash for Loop in One Line

          In any programming or scripting language, the loop is a quintessential feature. Loops are generally to perform a repetitive task until a certain condition is met. Bash is a powerful scripting language that supports all the major features of a scripting language (including loops).

          This guide demonstrates one-line for loops in Bash.

      • C

        • Strstr in C – Linux Hint

          Strstr() in the C language is a built-in function. The functionality of strstr can be understandable through the manual present in the Ubuntu terminal if you are working on Ubuntu. Then the terminal will show you the guide of strstr and how it works.

        • Strtok C – Linux Hint

          The C language of programming has a facility to split a string using the function strtok. This is done through a delimiter. It is an easy task that uses a pointer token. A string that is taken as input is divided into small strings called tokens. ‘S’ is the name that indicates that in “strtok”, str stands for the string, and “tok” stands for the token. So this function splits the string into tons of tokens. We have highlighted some examples in this tutorial that will help you out understand this concept.

      • C++

        • String Concatenation in C++

          The way to merge two or more strings is called string concatenation. It is a very common task for any programming language. Some programming languages use a specific operator, some programming languages use the built-in function, and some programming languages use both operator and built-in function to combine string values. The string concatenation can be done by using the ‘+’ operator and different types of built-in functions in C++. The uses of the ‘+’ operator and different built-in functions to combine strings in C++ have been explained in this tutorial.

        • Passing an Array to a Function C++

          An array is a group of elements of the same data type. Many functions are performed on arrays either in the main program or outside it, in the functions. In C++, in the case of functions, we need to pass them. This is done via parameters as arguments. These arguments can be of different ways, either sizeable arrays or through the pointer array. In this tutorial, we will cover some major aspects of array transfer using different parameters of the functions.

        • How to use substr() function in C++

          The way to cut any portion from a string is called a sub-string. The substr() function exists in C++ to generate a new string by cutting a particular portion from a string. The string.h library file is required to include to use this function. This function has two arguments. The first argument contains the starting position of the new string, and the second argument contains the length of the string. The way to use the substr() function in C++ has been explained in this tutorial.

        • How to use find_first_of() function in C++

          Different built-in functions exist in C++ to work with the string data. The find_first_of() function is used to find the location of the first occurrence of the specified character. This function returns the position of the first occurrence of the string that will be given as the argument value of this function. Different uses of this function for searching the string in C++ have been explained in this tutorial.

  • Leftovers

    • Hardware

      • Xiaomi's road to Internet-of-Things dominance

        Xiaomi entered the competitive Chinese mobile phone market in 2010 with MIUI, an Android-based smartphone software product which it offered for free. By 2017, it had achieved global recognition as a leading smartphone manufacturer and reached US$15 billion in revenue. Today, Xiaomi is the world’s largest Internet-of-Things (IoT) firm and by the end of 2020 had revenues exceeding US$37 billion.

    • Health/Nutrition

      • These 20 startups are impacting the livelihood of farmers and the future of food in Latin America

        The Visa Foundation and Village Capital - the world's largest organization supporting early-stage startups - announced the 20 startups selected for their Future of Food in Latin America 2021 program .

        The call sought entrepreneurs who are building high-growth projects in the agritech and foodtech sectors and received 117 applications from 15 countries in the region such as: Argentina, Bolivia, Brazil, Chile, Colombia, Costa Rica, Ecuador, El Salvador, Guatemala , Mexico, Panama, Paraguay, Peru, Saint Lucia and Uruguay.

        These are the selected ventures:

    • Integrity/Availability

      • Proprietary

        • Pseudo-Open Source

          • Privatisation/Privateering

            • Who Owns the Beach? Battle for Israeli Paradise Heats Up

              Uri Schor, a resident of Zichron Yaakov, is a family man, software developer, surfer and mountain biker. In recent years he has been devoting a considerable amount of his time to an issue that upsets him: public access to the beach at Kibbutz Ma’agan Michael. Schor is the beach’s freedom fighter. A one-man guerilla unit.

              He is incredibly organized. He has every document needed to prove the injustice he says is being committed there. He has a mountain of correspondence with the authorities, government ministries and law enforcement agencies. The paperwork could probably cover Israel’s more than 190 kilometers of shoreline. But while there still is no solution, Schor has endless patience. He smiles and explains why all the agencies involved have failed to protect the beach and allow free access to the public.

        • Security

          • Smurf Attack

            A Smurf attack is a type of Denial-of-Service Attack (DOS) where an attacker exploits internet control message protocol (ICMP) packets. The attack surfaces when an attacker sends a massive flood of spoofed ICMP echo_request packets to the target victim.

            This article will learn about how a Smurf attack is executed and how much damage a Smurf attack can cause to a network. The article will also describe preventive measures against a Smurf attack.

          • MAC Flooding Attack

            A data link layer acts as a medium for communication between two directly connected hosts. At the sending front, it transforms the data stream into signals bit by bit and transfers it to the hardware. On the contrary, as a receiver, it receives data in the shape of electrical signals and transforms them into an identifiable frame.

            MAC can be classified as a sublayer of the data link layer that is accountable for physical addressing. MAC address is a unique address for a network adapter allocated by the manufactures for transmitting data to the destination host. If a device has several network adapters i.e., Ethernet, Wi-Fi, Bluetooth, etc., there would be different MAC addresses for each standard.

            In this article, you’ll learn how this sublayer gets manipulated to execute the MAC flooding attack and how we can prevent the attack from happening.

          • "LemonDuck": New crypto malware targeting Windows, Linux systems [Ed: Media that acts as if Microsoft is an authority in security rather than provocateur working for NSA]

            Microsoft has warned customers about a new crypto mining malware that can steal credentials, remove security controls, spread via emails and ultimately drop more tools for human-operated activity.

          • BLAKE3 v1.0 Released - Faster & More Secure Than SHA-1, Etc - Phoronix

            The BLAKE3 cryotpgraphic hash function that was announced last year and based on its predecessor BLAKE2 has now reached version 1.0 for its official/reference software implementation. BLAKE3 continues to be much faster than BLAKE2 while also being much faster than the likes of SHA-1/SHA--2/SHA-3 and even MD5 while being more secure.

          • Privacy/Surveillance

            • Synthetic data – A new solution solving historic healthcare privacy challenges

              We have become all too accustomed – even desensitized – to reading stories of data breaches, misuse and evocative privacy debates. Malicious cyberattacks with the goal of harvesting information are now par for the course. According to the HIPAA Journal, 62 healthcare-focused data breaches occurred in April of this year alone, exposing the contents of 2.5 million medical records – a number that is historically high but unfortunately eye level with prior months. Combined with the observable and frightening rise in ransomware attacks targeting the sector, the risk to patient data is at an all-time high and healthcare organizations are chronically ill-prepared to combat it. So, it is easy to appreciate the legitimate paranoia that data custodians have towards data management and, along with the restrictions imposed by legislation, the self-imposed restrictive governance severely limiting access to production data.

    • Defence/Aggression

    • Environment

      • Energy

        • Solar, efficiency money trickles into damaged Minneapolis neighborhoods

          The future of Minneapolis’ Lake Street will be powered in part by solar.

          As business and building owners rebuild in the wake of last year’s civil unrest after the police killing of George Floyd, dozens are seeking public funding for solar projects, including some designed to incorporate racial equity goals.

          Thirty-four property owners have been awarded money for solar installations through the city’s Green Cost Share program. Another dozen program applicants are receiving money for energy efficiency upgrades.

    • Civil Rights/Policing

    • Monopolies

      • Patents

        • [Older] Forum Shopping: How A Retailer’s Patent-Related Communications May Impact Jurisdiction

          In a recent case, Trimble Inc. v. PerDiemCo LLC, No. 2019-2164 (May 12, 2021), the Federal Circuit found that, sometimes, threatening a patent infringement action, or entering extensive patent license negotiations prior to filing suit, with a company having a presence in a particular state could subject you to jurisdiction in that state, even if you are located elsewhere.

          On one hand, this could provide a retailer with the ability to obtain declaratory judgment jurisdiction in a preferred home forum when the retailer is on the receiving end of infringement threats from a patent owner. On the other hand, this means that retailers should be aware of their communications regarding their own patents, and take care not to inadvertently subject themselves to a suit by a target alleging non-infringement in an unwanted jurisdiction.

        • Arguing Obviousness: Teaching Away versus an Alternative Approach [Ed: More fake patents that should never have been granted in the first place]

          Chemours is a 2015 spin-off from Du Pont. Its patents at issues here relate to a polymer having a high melt flow to allow high-speed extrusion to cover electrical wires. U.S. Patent Nos. 7,122,609 and 8,076,431. The claims require a standardized melt flow rate range: 30€±3 g/10 min along with other physical properties.

          Daikin petitioned for inter partes review, and the PTAB agreed that the claims were invalid as obvious based upon a single prior art reference, U.S. Patent No. 6,541,588 (“Kaulbach”). Judge Dyk’s dissenting opinion in this case explains that “[t]he only material difference between [Chemours] claim 1 and Kaulbach is that Kaulbach discloses (in Sample A11) a melt flow rate of 24 g/10 min, slightly lower than 27 g/10 min, the lower bound of the 30 €± 3 g/10 min rate claimed in claim 1 of the ’609 patent.” Actually, Kaulbach goes even further and expreslly discloses a melt flow rate of “15 g/10 min or greater” and includes the example of 24 g/10 min MFR.

          [...]

          Market Share vs Sales Numbers: The Board also held that market share evidence (rather than merely sales numbers) is required for a showing of commercial success. The Federal Circuit disagreed. “[M]arket share data, though potentially useful, is not required to show commercial success.”

          Blocking Patents: Still on Commercial Success, the Board also rejected the commercial success argument after finding that Chemours patents at issue blocked market competition — so that any commercial success would be due to the patent’s existence rather than the innovation’s marketability. On appeal, the Federal Circuit rejected this conclusion also as contrary to law, finding that the Board totally misapplied the blocking patent doctrine.

        • English courts will thrive in life sciences patent litigation alongside the UPC [Ed: Incredibly laughable nonsense from EPO propaganda mill IAM, pretending that UPC is about to happen ("even when the UPC is up and running"). Not gonna happen, but they think if they keep lying it'll sell services.]

          The UK will remain a key venue for biopharma patent litigants even when the UPC is up and running, argues IAM life sciences editor Adam Houldsworth. In fact, the English courts may acquire a new strategic significance working in parallel with the new system

        • Volpara Health Technologies (ASX:VHT) expands European patent portfolio [Ed: Volpara should know that European Patents aren't good anymore, based on EPO examiners]

          The patent covers the company's improved breast cancer screening analysis and is effective across 25 European countries

        • [Older] Form versus Function – Protecting Products with Design and Utility Patents [Ed: No, patents on design should never even exist; designs are covered by other laws. This is misuse of patent law, enabled by aggressive lobbying and corruption of the system.]

          If you think patents are all about protecting something “technical” or something only a scientist or engineer could appreciate, you are mistaken. Patents can protect how things look as well as how they work. If you want to protect how something works, you need a Utility Patent. If you want to protect how something looks, you need a Design Patent.

          [...]

          In deciding which type of patent is right for you, be sure to work with a patent attorney who has written, prosecuted, and litigated both types, so you too can independently assess the benefits/downsides of both.

        • Biden’s stance on patents – what we know six months in [Ed: In the propaganda mill of nihilistic patent extremists (who would rather see millions die than accept a much-needed patent waiver) Patrick Wingrove uses a veiled attack on Biden's patent stance. How do they sleep at night? On a pillow of cash from patent trolls' loot.]

          The US president’s executive order on antitrust law and support for a COVID IP waiver don’t inspire confidence, but a USPTO head nomination will reveal more

        • IP Forecast: Verizon To Face Texas Jury In Wireless Row

          A Texas jury next week is set to consider whether Verizon's LTE network services infringe a wireless patent developed by a University of Florida professor.

          Nearly four years after Mobility Workx LLC filed suit, Verizon Communications Inc. and its affiliates will tell the jury on Monday that its cellular networks do not infringe a 2007 patent registered to UF professor Sumi Helal and an engineer, both of whom run Mobility Workx.

          The patent, covering a method of imitating mobile communications in networks, is the sole patent remaining out of the three Mobility Workx accused Verizon of infringing. One was dropped after...

        • High-level online meetings enhance user engagement at the EPO [Ed: The criminals who run the EPO pretend to be "engaging"... but only with thugs whom they collude with, against the public and even against EPO workers]

          As part of the EPO's continuous dialogue with users and user associations across all sectors, the latest in a series of high-level meetings with top applicants, small and medium sized enterprises (SMEs) and high-growth firms (HGFs) took place online on Wednesday 21 July. To date, ten meetings have taken place with key applicants from Asia, Europe and the US, including four of the top ten applicants at the EPO and three SMEs. Several of the meetings were hosted by EPO President António Campinos and further meetings are planned in the course of the year, including with user associations.

          [...]

          Finally, applicants expressed an interest in technical follow-up meetings as well as holding high-level meetings on an annual basis. The meetings, which are set to take place frequently with applicants from all sectors, supplement the Office's comprehensive outreach programme, which includes further regular exchanges with user groups such as epi, Business Europe, SACEPO and AIPPI, among others. The widespread use of online meeting platforms and tools has allowed the EPO to increase its dialogue with its stakeholders, and the Office will explore how to capitalise on the advantages of hybrid meeting environments further as it heads towards a new normal.

        • Guest Post: The Quality and Attributes of Patents as Property

          Over the past decade, Congress and the courts have made changes that have improved the patent system and encouraged American leadership in innovation. With our nation in a period of economic recovery, now is not the time to threaten that important progress.

          Expansionists who claim that the U.S. needs more and stronger intellectual property are fond of arguing that patents convey constitutionally protected property that must receive treatment equal to that of tangible property. This has become a favorite talking point in their efforts to undo the positive changes made over the last decade by Congress and the Supreme Court. However, patents are not of the same quality and don’t have the same attributes as traditional property.

          Adherents of this view equate patents with the deeds that convey ownership of real property. Just as a deed describes the boundaries of a parcel of land and transfers rights to the landowner, they argue that a patent defines the metes and bounds of an invention and grants ownership rights to the inventor or the inventor’s assignee. This “property equivalence” argument has been at the heart of dozens of petitions to the Supreme Court seeking to challenge the inter partes review (IPR) process, which allows the Patent Office to review patents to determine whether they should have been issued. The expansionist view is that patent rights should be held inviolate and that – like landowners – patent holders deserve to enjoy “quiet title” to their inventions.

          [...]

          To ensure clear boundaries, the written description requirement would need to be strictly enforced by USPTO. To prevent patentees from redrawing the boundaries of their property, patent prosecution would also need to be reformed to limit continuation practice and to bring a reliable, finite end point to the patenting process.

          Patent quality would also need to be substantially improved. An effective property regime doesn’t require that every grant of rights be valid, but it does require a vastly lower invalidity rate than that of the current system. This would require increasing fees, devoting substantially more than 19 hours for examination, and applying significantly more stringent standards to ensure the boundary lines are clear.

          There would also be a need to create an effective means of identifying ownership interests – similar to the recordation system for real property – that requires assignments and perhaps FRAND licensing obligations (which are like liens) to be recorded and made publicly available. A host of other real property doctrines – from nuisance to adverse possession to trespass by necessity – would also need to be incorporated into this system.

          The resulting regime is what treating patents “like real property” would actually look like. I suspect that patent expansionists would find such a regime highly disadvantageous and supremely objectionable, but I’d be happy to be proved wrong. Either way, if they want their arguments to hold any water, those who claim patents should be treated like real property should be championing reforms to make the patent system work a lot more like a property system – and right now, they aren’t.

        • BRAIN Biotech AG: Novel Genome Editing Tool: Filing of International Patent Application
        • How much data is needed for biotech applications at the EPO?

          As a trainee patent attorney Claire has worked with a range of clients in the biotechnology and pharmaceutical areas, on applications related to a broad range of technologies, including antibodies, industrial biotechnology, gene therapies, RNA therapies, new chemical entities and drug repurposing.

          “How much data do I need to file a patent application?” This is a question we get asked by many clients in the biotechnology and pharmaceutical field. In particular, this has been a more pressing concern during the pandemic as many companies had to restrict the number of scientists working in laboratories to allow social distancing. Some projects progressed a little slower than planned, delaying data read- outs.

          Supporting an invention with sufficient data is however critical when applying for a patent at the European Patent Office (EPO), specifically in the biotech field and in the pharmaceutical field. This is particularly important when complying with the requirements for inventive step and sufficiency under European practice. An Examiner will assess whether it is plausible that the invention performs as claimed and whether the technical problem that the invention is said to solve, is actually solved. The invention must be rendered plausible at the priority date of the application, and in the life sciences field, data is usually required to demonstrate this.

        • Neurim Takes Second Shot At Pulling Generic Insomnia Drug

          Neurim Pharmaceuticals has launched a second round of litigation against two Viatris Inc. subsidiaries to try and pull a generic version of its insomnia medication off the market, despite a ruling from the European Patent Office last year that revoked the company's parent patent.

          The High Court claim, which became newly public on July 15, focuses on a so-called divisional patent of the parent, for a melatonin-based insomnia drug. While the parent patent was revoked by the EPO back in 2019, the descendant patent is still in force, according to the new claim.

        • Software Patents

          • Targeted Advertising Still Patent Ineligible Subject Matter

            The US Court of Appeals for the Federal Circuit found that targeted advertising is still an abstract idea and that a system providing targeted advertising must utilize something more than generic features and routine functions to be eligible for patent protection. Free Stream Media Corp. v. Alphonso Inc., Case No. 19-1506 (Fed. Cir. May 11, 2021) (Reyna, J.)

            Free Stream Media, d.b.a. Samba, owns a patent directed to “a system providing a mobile phone user with targeted information (i.e., advertisements) that is deemed relevant to the user based on data gathered from the user’s television.” The system has three main components: (1) a networked device (e.g., a smart TV) that collects primary data, including program information, location, weather information or identification information; (2) a client device (e.g., a mobile device) on which applications run and advertisements may be shown; and (3) a relevancy-matching server that uses the primary data to select advertisement or other targeted data based on a relevancy factor associated with the user. Specifically, the relevancy-matching server “may also be configured to render the targeted data to the user through the networked device and/or the sandboxed application of the client device.”



Recent Techrights' Posts

At BetaNews, "Most Commented Story" Is Not a Story But LLM Slop! (Readers Talking to Bots)
They make fake stories with provocative headlines and then boast that these get many comments
[Meme] Swiss Lawyers/Attorneys Who Fake Qualifications and Rob People
Switzerland mostly guards its reputation by censorship of media
Just How Slow Has the News Industry Become?
We're drowning in garbage from fake publishers
BetaNews is Beta-Testing the Site as LLM Slop With Microsoft Propaganda Thrown In
Many of the people there are Microsoft boosters and they use slop as "filler" (for marketing)
Gemini Links 13/11/2024: Phasing Out 3G, Brian Kernighan Books, Tcl/Tk, Time to Ditch x86
Links for the day
BetaNews, Inc. Became a Spam Operation/Web Site, LLM Spew (Slop) for SEO Disguised as "Articles"
Published 5 minutes ago by Brian Fagioli...
WordPress is for the 'Old Web'; the New Web Necessitates Static Pages
There are purely practical reasons to move away from WordPress and the likes of it
Biggest Debt Leap in Years, More Than Half a Trillion Dollars in Just One Month
We remind people (almost every year) that it's also "buynothingday"
 
More Than 3 Years After Vista 11's Release More Chinese Computer Users Still Use Vista 7 (Than "11")
it was "officially" released October 5, 2021
In Switzerland, GNU/Linux Reaches Record Highs, But What About the Corruption?
Pocock is a disappointed citizen of Switzerland
Things That Still Work OK (But We're Being Shamed for Using)
Using old stuff is nothing to be shamed of (or afraid to do)
Free Software is About Collaboration
WordPress limits it
Even the Managing Editor of BetaNews is Doing Slop and Spam
A Fish Rots From The Head Down
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, November 12, 2024
IRC logs for Tuesday, November 12, 2024
PERA Bill in US Senate Strives to Crush Caselaw, Making Patents on Mathematics and Algorithms 'Great Again'
Follow the money
Evolution of euthanasia & WIPO UDRP similarities exposed by W. Scott Blackmer
Reprinted with permission from Daniel Pocock
Links 12/11/2024: A Lot of Censorship and SWNS at 50
Links for the day
Gemini Links 12/11/2024: Invidious Down and YouTube Addiction
Links for the day
Links 12/11/2024: Hey Hi (AI) Failures and COP29 Fakers
Links for the day
Latest Rumours of Red Hat Layoffs
Rumours or gossip is how almost everything starts
Windows Falling to All-Time Lows and Microsoft Has Nothing to Replace It With
It's mostly Android (Linux) replacing Windows
Cybershow Has a New 81-Minute Episode on Digital Sovereignty and International Cyber-Relations
it is a high-quality show
Activism in the Digital Realm Can Never (and Must Never) Rely on GAFAM
This simply means that tech activists must completely abandon any hopes of finding allies in Google or IBM or whatever...
Golden Dawn(ald) and What GAFAM Means to Liberal Techies
In one single screenshot
IBM CEO Says Donald Trump as President-Elect is Good for IBM in New Interview With CNBC
most unprincipled CEO ever?
GNU/Linux Up to 6.1% in Finland (Almost 9% If One Counts ChromeOS Too)
Home of Linux (the kernel)
BetaNews Has Become a SPAM/Slop Factory, Brian Fagioli Publishes Fake 'Articles'
everything is now suspect in BetaNews
It's Morbid to Talk About Living People as If They're Dead
What happens to LLM slop when Brian Fagioli dies?
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, November 11, 2024
IRC logs for Monday, November 11, 2024
Free Software and Love of Nature
It's not a coincidence that many Free software activists are also lovers of nature
Silicon Valley and GAFAM Were Never Liberal
spineless CEOs and founders aren't against Trump
Windows and 'The Desktop' Floundering
Microsoft should be extremely worried
WordPress is Bad for the Planet (Even If Many Still Use It)
the costs nobody wishes to talk about
Gemini Links 11/11/2024: Closed Systems and Verify You Are Human To Continue
Links for the day
Running Twitter at a Loss and Then Profiting From Trumpism
How very liberal of Jack Dorsey, the greedy "Liberal" who only prioritised money
Microsoft, Which Benefits From Donald Trump, is Normalising Donald Trump
Some people still wrongly believe that Microsoft is left-leaning
ChromeOS and GNU/Linux Growing in Spain (Almost 10% Now)
Whether this persists next month and next year will certainly matter
When You Upload Talks of Richard Stallman to Proprietary YouTube
Also: notice they work to abolish the word "whitelisted"
Free Software is Probably a Lot Healthier for You
Does Free software help people live longer and/or live better for longer?
Sweden: ChromeOS + GNU/Linux at 17%, an All-Time High
According to statCounter
Windows Collapsed to Only 12% of the Operating Systems Market in India, Says statCounter
Windows falls to 64% on desktops/laptops in India, dips to 12% overall
Links 11/11/2024: Mastodon Year 2 in Review, Freshworks Laying Off 13% of Staff
Links for the day
[Video] Daniel Pocock Warning About Someone Like Elon Musk Buying and Misusing Twitter Almost 7 Years Ago
Daniel Pocock spoke about Facebook and Twitter while attending the UN Forum on Business and Human Rights in Geneva, Switzerland
[Meme] It Takes Only Words to Destroy Malicious People and Pathological Liars
Trying to silence us is foolish. Boasting about this in public is worse than foolish; it's a legal liability.
Dead Blog ('Hoisted By His Own Petard')
The saying "people who live in glass houses shouldn't throw stones" is also applicable here
Debian Voters Clearly Supportive of Richard Stallman (Founder of GNU/Linux), But Debian Leaders Keep Giving Voting Rights to Microsoft Staff
It can be seen that the pro-Stallman positions are dominant
WordPress is Unfit for Purpose in 2024
The Web itself changed a lot and the majority of Web traffic is pure junk
[Meme] Remember That Microsoft and Trump Already Have a "Targets List"
Microsoft loves Trump bailouts
Service Notice: IRC Downtimes RESOLVED
We believe we've solved this entirely (or hope so), but it may take another week to know for sure
Linux 'Not Inclusive' 6.12 (Trumpism Inside Linux Foundation Affirmed)
They can make a codename for this release: Linux 'Not Inclusive' 6.12
The Open Source Initiative (OSI) is Dead. Cause of Death: Microsoft Bribes.
At the core, Linux Foundation and OSI adopted lies as a business model
Joan Meyer correctly linked Gideon Cody raid on Marion County Record to Kristallnacht
Reprinted with permission from Daniel Pocock
Trans People Misused to Attack a Project or Developer Who Has Nothing to Do With Them
And why that truly hurts all trans people
Our 18+ Years of Freedom-Fighting
We always fight back
Gemini Links 11/11/2024: Men Losing Grip and "You're Relaxing Wrong"
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, November 10, 2024
IRC logs for Sunday, November 10, 2024
Nobody Knows What's in Our Fridge! Wow, Spooky!
Freedom means you can also purchase things anonymously
Freedom Must Always Be Fought For (All the Time)
Ridicule of "freedom fighters" in the digital realm is typically orchestrated by dictators or wannabes.