EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.27.15

In the United States, USPTO Helps Create Trolls, Whereas in Europe, the EPO Itself is the Troll

Posted in Europe, Patents at 7:08 pm by Dr. Roy Schestowitz

The EPO is acting like a troll now

Troll school
By Gregory F. Maxwell; GNU Free Documentation License, Version 1.2

Summary: Software patents are, based on hard evidence, the armament of choice of patent trolls, but what happens when the patent office itself trolls the population?

WE SOMETIMES envy the freedom of speech in the United States, where criticising David Kappos is possible (he is a public figure after all) and where famous proponents of software patents are the subject of online ridicule.

As critics of the EPO ought to know by now, the EPO bullies its critics. Yes, it does. Not only its own staff. The EPO is trying hard to derail and mentally abuse its critics. Just look around and see who became quiet and inactive lately. The EPO It tries to silence them. It doesn’t tolerate scepticism and definitely not criticism. It’s just terrible, so there is plenty of work to be done. It’s like a Chinese element has been allowed to operate at the very heart of Europe. There is control through terror, imposed by those in positions of power. This will be the subject of next month’s coverage.

Some patent systems like the USPTO breed patent trolls, but in Europe it’s the EPO doing the trolling itself (e.g. trademark-trolling). When “right to be forgotten”-type censorship doesn’t work (censorship at the search engine level), there’s complete site blocking and when all else fails there are even more horrible tricks. Europe’s proud claim of free speech is somewhat of a sham, let aside net neutrality.

Speaking of trolls, watch this new report about patent trolls in the US:

Why one software CEO agreed to meet a patent troll—and then fought it to the end

When the business software company Pegasystems got sued in 2013 by a mysterious shell company called “YYZ LLC,” Pegasystems’ head of IP licensing, Ayaz Hameed, got ready to tell his boss that they had been hit by a patent troll.

Hameed looked at the two patents in the complaint (PDF), numbered 7,062,749 and 7,603,674, and read their examination histories. The patent focused on creating “monitoring messages” and storing them into a central database using what’s called a “message broker.”

Incidentally, now there are patent trolls in Europe as well. They are often the direct outcome of permitting software patents to be granted, as we have been arguing for years. Congratulations, EPO, for welcoming patent trolls into Europe.

Tomorrow we intend to publish an article about the Investigate Unit (internally known as "gestapo") and Control Risks Group, which overlaps the gestapo. There are some truly important articles on their way and they will help expose the EPO for what it really is: an organised crime-like ‘gang’ whose aspiration for total domination would never tolerate any resistance, especially not from the European public from which it purports to derive its power and unprecedented immunity.

SourceClear: Yet Another Microsoft-Connected (Coming From Microsoft) FOSS FUD Firm

Posted in Free/Libre Software, FUD, Microsoft, Security, Vista 10 at 6:33 pm by Dr. Roy Schestowitz

SourceClearAnother Black Duck in the making? Security FUD from a firm established by champions of back doors.

Summary: Another company whose business model is monetising (and thus often enhancing) fear, uncertainty and doubt (FUD) over Free/Open Source software (FOSS) and this one too comes from Microsoft

THIS trend has grown rather tiresome. Every now and then we see Microsoft’s tentacles reaching out for areas in FOSS where there is an opportunity to badmouth FOSS. They turn Microsoft’s anti-FOSS rhetoric into their business model. They institutionalise it.

“Another Microsoft guy creates a company that says Free software is not secure and needs some proprietary software ‘medicine’.”Based on a new press release in its various forms/variations [1, 2, 3], we may have yet another OpenLogic or Black Duck in our hands. Another Microsoft guy creates a company that says Free software is not secure and needs some proprietary software ‘medicine’.

SourceClear is not even known (we never heard of it, it seemingly came out of nowhere), it’s a very young firm, and immediately it receives a lot of money and even promotional coverage from the News Corp.-owned Wall Street Journal, which is a Microsoft-friendly publication. The first sentence provides the background one needs to be aware of:

Mark Curphey worked to stamp out software bugs for about a decade as head of the security tools team at Microsoft Corp. and in several other jobs before he realized that the problem was getting worse instead of better.

To quote Gordon B-P: ‘”Worked at MS bugs for a decade” – didn’t do a very good job there then. What makes him think he’ll be able to “secure” OSS?’

Jordan Novet, who is a promoter of Microsoft as we noted the other day, covered this as well, using bug branding such as "Heartbleed", coined by a company which is strongly connected to Microsoft. “It turns out that lots of other [FOSS] libraries have exactly the same issues but have not been reported,” Novet quotes Curphey, whom he describes as “previously a former principal group program manager inside Microsoft’s developer division. [...] SourceClear started in Seattle in 2013…”

“SourceClear started in Seattle in 2013…”
      –Jordan Novet
With OpenLogic, Black Duck, Codenomicon and various other Microsoft-connected (often created by Microsoft people and/or managed by Microsoft people) firms that badmouth FOSS we sure expect SourceClear to be no exception. They serve to distract from the built-in and intentional insecurities of proprietary software such as Windows, including quite famously Vista 10 where back doors are an understatement because everything is recorded and broadcast (total remote surveillance), even without a breach or an access through the back doors.

Microsoft cannot produce secure code because ‘national security’, i.e. many back doors, are a design goal. It helps Microsoft establish a ‘special relationship’ with the state and in fact it just got a contract from a highly notorious company, Taser [1].

Here we are in 2013 onwards — a time when simple bugs in FOSS (a defect affecting one line or two) get all the limelight and receive names, logos etc. whereas Microsoft’s critical zero-day flaws hardly make the headlines. There are many high-impact headlines that make a huge deal of fuss every time a security bug is found in Android (again, just in recent years). We suppose it’s part of a PR campaign in which Microsoft and its partners evidently participate. They are often the ones who come up with the names, logos, and much of the accompanying negative publicity.

Related/contextual items from the news:

  1. Microsoft Helping to Store Police Video From Taser Body Cameras

    Microsoft has joined forces with Taser to combine the Azure cloud platform with law enforcement management tools.

    [..]

    In order to ensure Taser maintains a monopoly on police body cameras, the corporation acquired contracts with police departments all across the nation for the purchase of body cameras through dubious ties to certain chiefs of police.

Links 27/10/2015: KDevelop 5.0.0 Beta 1, GParted 0.24

Posted in News Roundup at 5:24 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Stream It!

    An entertained home is a happy home, with the digital dream a real one, most homes have turned into a digital entertainment heaven. My home’s daily routine often revolves around keeping the tiny humans entertained streaming music, video and photos from a home Linux server (plus online services) around the home to a variety of devices. From the traditional TV with a Raspberry Pi media centre to Android tablets and Chromebooks, or through the Pi-powered projector for cinema-style fun.

  • A happy home

    As software improves we like to take advantage of new features. For a while we’ve been putting up with the closed-source Plex, but finally Emby has appeared and we’re basing our new home media heaven on this fully open source solution. So from a base Ubuntu server, you’ll be able to dish out transcoded video, music and photos around your home with the option of recorded TV without the hassle of MythTV. It’s a slick solution and one I’m sure you’ll love when you read about it.

  • Linux / Open Source on Churches

    I talked to church heads about this and open about open source alternative software getting their responses that they are not aware that there are available free open source sofware that they can use as an alternative to commercial software.

  • Solu Mini-PC Taps Linux for Organic Cloud UI

    A Finnish startup called Solu Machines is closing in on its Kickstarter funding for a smartphone-like mini-PC with a Linux-based, cloud-oriented operating system and a novel UI stack. Funding packages start at $388 for the Solu, which would join a fairly short list of mini-PCs with pre-installed Linux, and an even smaller group of ARM-based Linux mini-PCs. Solu is much more singular than that, however, in that it’s a battery-powered touchscreen device that can also drive a 4K display. It is not only replacing standard PC and phone paradigms with a fully cloud-based platform, but is also reinventing the user interface.

  • Desktop

    • Google Adds New “Chell” Chromebook & New Coreboot Graphics Library

      Google engineers have landed a bunch of new code this morning into Coreboot.

      Perhaps most interesting out of today’s Coreboot commits by Google is the addition of a Chell mainboard. Chell is based on the “Glados” Chromebook but with some minor changes. This “Chell” codenamed device will use an Intel Skylake SoC. Details beyond that are scarce at the moment.

    • Google’s CPUFreq “Interactive” Governor Looks To Go Mainline
    • Linux in the Office

      I work in an office which utilities many different devices and operating system, yet I only know of two places we use linux, and that’s not including embedded.

      When I started my current role as a PHP Developer, I was given a laptop and the general accessories, but was given the choice of what OS I wanted to use. From a linux background I wanted linux, but as the other developers used windows I went with windows.

    • Xiaomi Linux Laptop To Enter Production Early Next Year

      Xiaomi’s long-rumoured Linux laptop will enter production in the first part of 2016, a new report claims.

      Industry watcher Digitimes’ sources also reveal that China’s Xiaomi plans to launch two notebooks: one sporting a 12.5-inch display and another with a 13.3-inch display.

  • Server

    • rkt v0.10.0: With a New API Service and a Better Image Build Tool

      rkt v0.10.0 is here and marks another important milestone on our path to creating the most secure and composable container runtime. This release includes an improved user interface and a preview of the rkt service API, making it even easier to experiment with rkt in your microservices architectures.

    • Companies That Support Linux: Rausch Netzwerktechnik

      Rausch Netzwerktechnik is a distributor of individual and standard server and storage systems for the data center. The company is also developing one of the first solutions around the Kinetic Open Storage Project. We talked to Rausch Netzwerktechnik CEO Sebastian Nölting to learn more about the company and their involvement with open source.

    • Tales from the SRE trenches: Dev vs Ops

      Traditionally, Devs get frustrated when they want to release, but Ops won’t accept it. Ops thinks there will be problems, but it is difficult to back this feeling with hard data. This fuels resentment and distrust, and management is never pleased. Using error budgets based on already established SLAs means there is nobody to get upset at: SRE does not need to play bad cop, and SWE is free to innovate as much as they want, as long as things don’t break.

    • rkt 0.10.0 released. Comes with new API service and improved image build tool
  • Kernel Space

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Plasma 5 Powers KaOS Productivity

        KaOS has a few known issues, but these mostly affect specific hardware configurations. For example, to use a GUID Partition Table, or GPT, on a BIOS system, make sure you set it up following a guide available on the KaOS website. The installer’s partitioner can only handle GPT correctly for the Unified Extensible Firmware Interface.

      • Plasma 5 will be the default desktop environment in Chakra

        We are excited to announce that in a couple of days Chakra will be switching to Plasma 5 developed by KDE for the default desktop environment. The restructuring of the repositories is almost done, we just need to test it for a while before making it available to everyone.

      • KDevelop 5.0.0 Beta 1 available!

        Hello all,

        I’m very glad to finally announce the first beta of KDevelop 5.0.0, based on Qt 5, KF 5 and Clang: https://www.kdevelop.org/news/first-beta-release-kdevelop-500-available

        Like I’ve said previously, I’m very thankful of the tons of contributors that made this step possible. From the early testers, over the many new KDevelop contributors who helped a lot in porting our code base to Qt 5 and KF5, to the people that worked on improving kdev-clang and all the other areas. It’s a great feeling to finally release this beast. A year ago, just after we started in this process, I still wasn’t too sure we can pull it all off. Now, look where we are Smile “Just” a few more weeks of polishing and I’m positively sure KDevelop 5.0.0 will be a really good milestone.

        That said, I also want to express my thanks towards the KDE e.V. which graciously sponsored our recent KDevelop/Kate sprint in Berlin. We rented a flat for the 8 hackers that visited Berlin and had a productive five days directly after the Qt World Summit. Personally, I worked on kdev-clang and polished it a bit more in the preparation of the first beta release. One handy feature I added is the display of size information about classes and member variables, displayed in the image to the right.

        If you want to give back to the KDevelop community, please consider a donation to the KDE e.v., which is used for our yearly developer sprints and the Akademy conference.

      • KDE Pulled In Around $162k USD Last Year

        KDE e.V. yesterday released their last quarterly report to end out 2014, which offer a look at their finances for the past year. I’ve also taken the liberty to do a cursory comparison against the GNOME Foundation’s finances for 2014.

      • KDevelop 5.0 Enters Beta With Qt5/KF5 Port

        The first beta of KDevelop 5.0 is now available. This huge update comes after more than a year of hard work and its code-base has been ported over to using Qt5 and KDE Frameworks 5.

        Besides the big step-up in using Qt5 and KF5, KDevelop has replaced its legacy C++ parser and semantic analysis plug-in with a more powerful one derived from LLVM’s Clang compiler and its extensive code analysis tools.

    • GNOME Desktop/GTK

      • GParted 0.24 Adds ZFS & NVMe Detection

        For those using GParted as GUI-driven Linux disk partitioning, the GParted 0.24 release is now available with new features.

      • GUADEC 2016 to take place in Karlsruhe, Germany

        It is with pleasure that the GNOME Foundation is announcing that Karlsruhe, Germany, will host GUADEC in the summer of 2016.

      • Some ideas about this year’s Google Summer of Code

        After the GSoC, I’ve done some work related to the open source community in China. We have a organization called kaiyuanshe and they did some work to help promote open source. Last weekend they organized the Apache Roadshow in Beijing and I was one of the volunteers. Also, I gave a speech about my experience in GSoC on the conference. Although it’s not the GNOME community, but I think sometimes we should contribute to the open source world as a whole without caring which one it is. Hope our effort would enlarge the open source force in China.

  • Distributions

    • Arch Family

    • Ballnux/SUSE

    • Red Hat Family

      • Red Hat, Inc. (NYSE:RHT) Given $83.375 Consensus PT
      • Citrix Forms OpenStack Partnership with Red Hat
      • Fedora

        • Getting Started with Fedora – Update

          Some time ago, I announced the ‘Getting Started with Fedora’ handbook which we had published in Czech. I also announced the plan to translate it to English, so that it can be translated to other languages. I asked around who could help me with that, especially to figure out the whole system how to get a translated print PDF from a document written in English. A couple of native speakers offered that they would help with proof reading, thank them for that, but first we need to figure out the whole system.

        • Looking for a Community Lead for Project Atomic

          One of the most exciting projects I’m getting to work with these days is Project Atomic. It touches on the full stack–from OS development to storage, to networking, containers, application development, and pretty much everything in between. Red Hat is working hard on the tools to develop, deploy, and manage containerized applications.

        • Fedora 20 Through Fedora 23 Benchmarks

          For your viewing pleasure today are some fresh benchmarks comparing the out-of-the-box performance of Fedora 20, Fedora 21, Fedora 22, and Fedora 23 RC3 out-of-the-box on an Intel Xeon system with AMD R600g graphics. Here’s a look at the Fedora Linux performance and that of the upstream Linux kernel / Mesa / GCC over the past two years.

    • Debian Family

      • Derivatives

        • Is SteamOS Any Faster Than Ubuntu 15.10 Linux?

          Over the past few days have been a number of SteamOS Linux gaming benchmarks, namely published so far are the 22-Way Comparison Of NVIDIA & AMD Graphics Cards On SteamOS For Steam Linux Gaming and 4K AMD/NVIDIA High-End GPU Comparison On SteamOS Linux. When seeing all of those SteamOS results, you may have started wondering: is SteamOS any faster/slower than say Ubuntu Linux? In this article are some benchmarks comparing SteamOS to Ubuntu 15.10.

        • Canonical/Ubuntu

          • Ubuntu 16.04 LTS (Xenial Xerus) Development Has Started

            The Ubuntu developers have already started to work on the 16.04 LTS (Xenial Xerus), and the first packages are beginning to land. It’s a long way to go until the stable launch in April 2016, but this is how it starts.

          • Ubuntu Touch with a Mouse Cursor Is Interesting and Cool at the Same Time

            One of the latest updates for Ubuntu Touch has brought a most coveted feature that was still missing, the mouse cursor. This will most likely land with OTA-8, which is scheduled to arrive in about five weeks.

          • Meet the Ubuntu family

            There are 9 members of the ‘Ubuntu family’ that are recognized as official flavors (i.e., Linux distributions that use the same operating system base but feature different desktop environments).

          • Linux Based Ubuntu Phones: Aquaris E4.5 and E5 Now In Market

            Ubuntu, Linux operating system is now built to provide the Linux server to desktops, phones, tablets and TV operating systems. Demand of Ubuntu phones in India is already increase by Linux system fans.

            The new phones released last month, which based on Linux operating system. And now in India Aquaris E4.5 and Aquaris E5 are available to purchase. Costumer can buy it from online website like Snapdeal.

          • Unity 8 Features Available Now For Ubuntu Touch OS

            The Ubuntu Touch OTA-8 software update, slated for a November 18 release date, is only a few weeks away and Cononical’s Lukasz Zemczak promised it would bring with it lots of new features and changes especially when it comes to Unity 8.

          • Flavours and Variants

            • Resolving Tension

              A post on the Fridge today claims “both councils collaborated and resolved any tensions together”. The Ubuntu Community Council bullied me for asking questions that made Canonical feel uncomfortable and this is the only response to that. That bullying someone until they leave a project is the UCC way of resolving tensions leaves me speachless. That nobody else has commented in the Ubuntu project in public (I’ve had people in private tell me they’re wanting to leave Ubuntu and/or Canonical) confirms to me the project has a culture of fear.

  • Devices/Embedded

Free Software/Open Source

Leftovers

  • Hardware

    • Console wars: Predicting this holiday season’s gaming winner

      Earlier this month, Sony announced that it was dropping the price of its PlayStation 4 game console by $50 to $349.99. The move put the PlayStation 4’s price in line with Microsoft’s Xbox One. The decision made clear what the price cut was desired to do: get gamers who have not yet moved to the company’s latest console to take the plunge this holiday season.

  • Security

    • The Zone 9 Bloggers are Free: but Ethiopia Still Thinks Digital Security is Terrorism

      The last of the Zone 9 Bloggers are finally free from jail, after nearly 18 months of detention for simply speaking out online. All the bloggers were acquitted of terrorism charges by the Ethiopian courts; one blogger, Befeqadu Hailu was found guilty of a single charge of “inciting violence” as a result of a confession made during his detention. He was released on bail last Wednesday. Given the time he has already served, he is unlikely to return to jail.

    • TrueCrypt Travails Continue

      The credibility of the TrueCrypt encryption application is in tatters following the discovery of two serious flaws in the code.

      Its anonymous developers abandoned the open source TrueCrypt project in May 2014, and since then no updates to the code have been released. At the time the developers advised users to switch to an alternative encryption program such as Microsoft’s BitLocker. Although TrueCrypt is still available for download, the developers suggest it should only be used to migrate data off TrueCrypt encrypted drives.

    • W3C Sets Up Web Payments Standards Group to Improve Check-Out Security

      W3C (World Wide Web Consortium), the regulatory body that oversees the creation of Web standards, has announced plans to set up a special group tasked with the responsibility of putting together a standardized API that will simplify the payment and check-out process, but also improve its overall security.

  • PR/AstroTurf/Lobbying

    • NYT Claims Clinton ‘Emerging as Unrivaled Leader’ in Democratic Race

      Hmm. The “unrivaled leader” leads her closest rival, Bernie Sanders, by 7 percentage points in an average of recent polls in the first caucus state, Iowa. In the first primary state, New Hampshire, she trails Sanders by 2 points; it’s been two months since she had a clear lead over him there. (In an accompanying graphic, the Times ranks Clinton as No. 1 in New Hampshire polls—based on a different polling average that has her ahead by 0.2 percentage points.)

    • WSJ Misleadingly Hypes Obamacare Enrollment Numbers To Push GOP Health Care Plans

      The Wall Street Journal editorial board used sharply revised government estimates on the number of Americans expected to purchase health insurance through federal marketplaces to claim that Obamacare is failing and hype so-called Republican “alternatives” to the landmark health care reform legislation. The Journal’s fearmongering about the long-term viability of Obamacare failed to acknowledge that while enrollment via federal marketplaces is less than expected, millions of Americans are still gaining access to affordable health insurance coverage.

  • Censorship

    • Verizon’s Twisted Plan to Censor Your Internet

      Earlier this year, the Newseum Institute asked 1,000 Americans to name their rights under the First Amendment. A clear majority listed freedom of speech first — before freedom of religion, assembly, and other core civil liberties.

      And that makes sense. Protecting free speech is essential to the health of any functioning democracy.

      Free speech matters to the hundreds of millions of Internet users who exercise this right every time they connect with others online. But if you ask some of the lawyers working for the companies that sell you Internet access, they’ll insist that it’s more important to protect the free speech rights of phone and cable giants like AT&T, Comcast, and Verizon.

    • Twitter hints at unblocking Politwoops accounts

      Politwoops, the site that saved and republished tweets first published and later deleted by politicians, may get back its access to the Twitter API. After disabling Politwoops’ developer accounts this summer, Twitter CEO Jack Dorsey last week hinted that the company might restore access to the Twitter streams.

    • Anti-Israel Activism Criminalized in the Land of Charlie Hebdo and “Free Speech“

      The post-Charlie Hebdo “free speech” march in Paris was a fraud for multiple reasons, as I wrote at the time. It was led by dozens of world leaders, many of whom imprison or even kill people for expressing prohibited views. It was cheered by many Westerners who feign upset only when free speech abridgments are perpetrated by Muslims, but not — as is far more common — by their own governments against Muslims.

  • Privacy

    • Microsoft Helping to Store Police Video From Taser Body Cameras

      Microsoft has joined forces with Taser to combine the Azure cloud platform with law enforcement management tools.

      [..]

      In order to ensure Taser maintains a monopoly on police body cameras, the corporation acquired contracts with police departments all across the nation for the purchase of body cameras through dubious ties to certain chiefs of police.

  • Civil Rights

    • Garters in a Twist

      The British constitution is appallingly undemocratic. The fact that an undemocratic chamber has fended off a proposal from an undemocratic executive which gained the votes of only 34% of the voting electors, is not a blow struck for democracy. It is however a temporary victory for human decency in mitigating an attack on the poor.

    • “She Had No Respect”: CNN Analyst Blames Student Who Was Thrown To The Ground By The Police For The Officer’s Actions
    • Black Lives Matter movement

      This week’s program addresses the Black Lives Matter movement, and other efforts to challenge police brutality. Devonte Jackson, organizer with the Black Alliance for Just Immigration (BAJI) speaks about uniting Black communities against abuses by police and other agencies of government. Attorney Izaak Schwaiger summarizes a pending civil rights lawsuit on behalf of inmates at the Sonoma County, CA jail, who were subjected to a systematic beating by guards. Philosophy Professor Glen Martin of Radford University shares his ideas on how to build a world without police violence. And there’s a live call-in from police-brutality protestors in New York.

    • Obama officials at odds over Saudi airstrikes

      Saudi Arabia’s airstrikes in Yemen, conducted with U.S. assistance,
      are alleged to have killed at least 1,500 civilians, dividing members of the Obama administration over whether the U.S. risks being accused of abetting war crimes in a bombing campaign that could ultimately strengthen Islamist militants.

      Sources inside the administration say they are struggling to keep in check
      the opposing sides in Yemen, one of the clearest examples of the intensifying Saudi-Iran proxy war in the Middle East. But even as reports of civilian suffering and terrorist gains pile up, U.S. officials believe that reducing American support for the Saudis could make the situation even worse.

  • Internet/Net Neutrality

    • Tim Berners-Lee in plea to MEPs to protect net neutrality in Europe

      FATHER OF the World Wide Web Tim Berners-Lee has issued a stark warning to the European Union ahead of a crucial vote on net neutrality due to take place tomorrow.

      After the historic win for net neutrality supporters in the US earlier this year, tomorrow will see MEPs looking at plans for internet fast lanes in the UK and mainland Europe.

      Berners-Lee said in a blog post on the World Wide Web Foundation website: “When I designed the World Wide Web, I built it as an open platform to foster collaboration and innovation. The web evolved into a powerful and ubiquitous platform because I was able to build it on an open network that treated all packets of information equally. This principle of net neutrality has kept the internet a free and open space since its inception.”

    • Why Europe’s net neutrality plan is more controversial than US rules

      The European Parliament is scheduled to vote on net neutrality rules on Tuesday, and at first glance the proposed regulations appear very similar to ones already in place in the United States.

      Both the European proposal and the US rules prevent Internet service providers from blocking or throttling traffic, and they impose a ban on “paid prioritization.”

    • Game over for real net neutrality? European Parliament votes in favor of disappointingly weak rules

      Today, members of the European Parliament voted on a proposal (PDF) for rules affecting how Internet traffic is managed, following the European Commission’s release of a draft agreement for regulation back in June. And Europe’s lawmakers have decided Europe doesn’t need a truly open, free Internet.

    • Net neutrality: EU votes in favour of Internet fast lanes and slow lanes

      The European Parliament has passed the flawed compromise text on net neutrality without including any of the amendments that would have closed serious loopholes. The vote, with 500 in favour, and 163 against, took place in a plenary session a few hours after a rather lacklustre debate this morning, which was attended by only 50 MEPs out of the European Parliament’s total of 751, indicating little interest in this key topic among most European politicians. The Greens MEP Jan Philipp Albrecht called the final result a “dirty deal.”

    • European Parliament delivers neither Net Neutrality nor an End to Roaming

      “Today’s vote on the Telecoms Single Market package in the European Parliament constitutes a broken promise both on the end of roaming surcharges and the establishment of net neutrality”, says Julia Reda, Member of the European Parliament for the Pirate Party and shadow rapporteur for the Greens/EFA group in the Internal Market and Consumer Protection Committee.

      “The European Parliament’s first reading position in April 2014 proposed far-reaching provisions for the introduction of net neutrality in Europe. In the end, not even the words ‘net neutrality’ survived the closed-door negotiations with the Commission and the Council. The text leaves open critical loopholes. Today, the Parliament decided not to adopt opposition amendments that could have fixed these shortcomings.

    • The European Union’s New Net Neutrality ‘Protections’ Are A Joke

      After months of negotiations (read: ISP lawyer and lobbyist rewrites), the European Union has voted to approve new net neutrality rules (pdf) that for many nation states may be worse than having no net neutrality protections at all. As we’ve noted, the rules ignore zero rating, carve out massive loopholes for “specialized services,” “class-based discrimination,” and even include provisions allowing ISP throttling and discrimination provided it’s addressing phantom congestion that hasn’t even happened yet. In short, these rules effectively protect ISPs looking to creatively violate net neutrality, not European consumers.

      European Parliament members completely ignored last-minute suggested amendments that would have closed these loopholes. They also completely ignored opposition to the rules by the likes of BitTorrent, EyeEm, Foursquare, Kickstarter, WordPress, Netflix, Reddit, Transferwise, Vimeo, the EFF and Tim Berners-Lee (who penned a lengthy blog post outlining his opposition to the rules). Similarly, only 50 MEPs out of the European Parliament’s total of 751 could be bothered to even attend a superficial “debate” preceding the approval vote.

    • European Parliament rejects amendments protecting net neutrality

      The EU has rejected legal amendments that would firmly protect the concept of net neutrality in Europe. The European Parliament voted in favor of new regulations which proponents say establish an internet “without discrimination,” but advocates for net neutrality say the laws contain a number of loopholes which could lead to the creation of a tiered internet service. The legislation also includes an end to roaming charges in Europe, although some critics say those laws are also less robust than they appear.

    • Net Neutrality: Major Setback for Free and Open Internet

      Today, the European Parliament voted the Telecommunication Single Market regulation text by 500 votes against 163, hereby ending the negotiations on this matter. Despite numerous citizen’s calls, despite repeated international calls to support the amendments, including Tim Berners-Lee’s, this ambiguous text leaves important loopholes and cannot ensure Net Neutrality1. Worst, it allows commercial discrimination. It is a profound disillusion for all those who, throughout the years, battled to ensure Net Neutrality in Europe.

    • EU Parliament adopts highly ambiguous Net Neutrality legislation

      The European Parliament has voted to adopt the Telecoms Single Market (TSM) regulation. The regulation was supposed to guarantee net neutrality in Europe.

      Unfortunately, MEPs have created large loopholes and left ambiguity in much of the legislation. Net neutrality is the principle whereby Internet access providers treat internet traffic equally. Because of the vagueness of the new regulations, telecoms regulators in EU Member States will now have to decide whether telecoms companies in their country will be able to prioritise different categories of data.

    • The EU Tried to End Roaming Fees and Ended Net Neutrality Instead

      The internet is a global network. That means if one part of the world decides to start pulling the wrong levers, we could be dealing with the consequences. And the European parliament just pulled a very big lever by voting down amendments to net neutrality rules that include dangerous loopholes.

    • EU Parliament rejects amendments protecting net neutrality

      European Parliament has voted for a package of EU internet traffic regulations, rejecting all amendments on net neutrality. The move was slammed by activists and companies alike, who say it will allow some to have faster internet access than others.

  • DRM

    • Siri Reserves Some Answers for Apple Music Subscribers Only

      Siri, the digital assistant found on Apple’s iOS devices, has become a familiar presence for many, and a prompt (sometimes even mischievous) answer to questions you ask it has always been forthcoming. But it seems Siri is now holding back some answers, only providing certain information to those users who pay for Apple Music.

Board of Appeal Thwarts a Software Patent Application in the EPO, From Company Indirectly Connected to the EPO

Posted in Europe, Patents at 8:43 am by Dr. Roy Schestowitz

Baxter logoSummary: The story of an effort by a massive American (US) company to patent software in Europe, without success, owing to a Board of Appeal involvement

IN ITS reckless effort to maximise profit, as explained in our previous post, the European Patent Office (and by extension the organisation) tarnishes the reputation of European patent examiners and by extension Europe as a whole. The EPO abuses are already becoming an international embarrassment and they devalue Europe’s image as a scientific powerhouse. Even China or Russia do not have scandals of this severity or scale.

According to this post from last night, the “European Patent Office has announced the revised version of its Guidelines for Examination” and as we already know, the EPO’s management is basically racing to the bottom and even allowing patents on life these days (several more just days ago). Where does this end? This puts people’s lives at risk. And for what? For the bottom line of super-wealthy multi-national corporations?

“It’s about power, not science. It’s often about monopolies, too.”Then comes the issue of software patents, for which a loophole was created quite a while ago — one that the Enlarged Board of Appeal could not effectively thwart. Earlier this month we wrote about (or blew the lid off) Microsoft's special relationship with the EPO — a relationship that is bound to help Microsoft get some bogus software patents despite the rules being against that, whereupon Microsoft can use these patents to blackmail companies which use Linux (some are European, TomTom for example). Who does this help? Certainly not Europeans.

The EPO’s human ‘resources’ (that’s what they call educated people) department is in a very bad state right now. It reportedly lost a lot of staff, so it gets some under-qualified ‘interns’ with a very low salary and no rights (like temporary workforce). This is bound to lead to poor quality work and incorrect judgment. Does the EPO’s management even care? The EPO’s management seems to have been very busy trying to selfishly expand its scope of power to Moldova, Australia and various other places. It’s as if hand-shaking and back room deals are now viewed as a substitute for science and technology. It’s about power, not science. It’s often about monopolies, too.

“The EPO has become a political and corporate instrument of occupation against he vast majority of the public.”Watch what the EPO is doing regarding the unitary patent (UPC). The management is actively promoting this notorious thing in public, at taxpayers’ expense (the event and the resultant damage to the public). The UPC is still being ushered in by opportunistic patent lawyers who want to profit from it [1, 2], but what about the public? What about the collective interests of the overwhelming majority? This is symptomatic of class warfare and if the ruling class controls or is affiliated with EPO management, then the patent office becomes a tool of occupation, or large-scale passage of wealth.

The EPO has become a political and corporate instrument of occupation against he vast majority of the public. Can this be stopped? Well, one remaining ‘regulatory’ body remains in place, albeit Benoît Battistelli is trying hard to crush it, or push if not force it into exile. We are talking about the boards of appeal, which enjoy relative independence from the business-oriented EPO and its misguided ambitions of just increasing money flow. As long as EPO management is eager to just do anything for money (even favouritism to large clients, meaning applicants), it cannot be a public service. It is a self-serving business-like entity. It’s completely detached from its raison d’être and it gets only worse over time (indefinite pursuit of infinite power and wealth, i.e. the characteristics of a cancer).

Thankfully, for now at least, the boards of appeal serve to ‘moderate’ the EPO. Today’s case of point (potentially one of several to come) involves board 3.5.05. This board is in charge of fields G06F3 and H04L (see this table for reference), which according to the International patent classification relate, to put it roughly, to user I/O devices and data networks. This board would be typically in charge for these silly Apple or Samsung UI patents. These are, potentially, software patents by another name. The one below clearly looks like a software patent, and it is neither novel nor patent-eligible.

“It’s just a software patent, which friends of the EPO’s management probably wanted approved.”Below is one of the texts concerning a software application for monitoring healthcare facilities. It’s a software patent, but what makes it interesting is that Baxter (official site), the patent applicant, took over the Belgian company which used to manage the EPO’s health system. It’s hard to avoid the appearance of a conflict of interest. We wish to remind readers that Baxter is embroiled in many controversies, including tax dodging. To quote Wikipedia, Baxter was “spending $10.45 million on lobbying and not paying any taxes during 2008–2010, instead getting $66 million in tax rebates, despite making a profit of $926 million.”

This isn’t some benign or benevolent company saving people’s lives (as it really wants the public to think) but a rather selfish monopoliser with 61,500 employees and $25.9 billion in total assets (patents are infamously popular among giants of this kind). It’s not a European company; it’s based in the US, but USPTO patents are apparently not enough for them. They want protectionism in Europe too, or the ability to sue European rivals (or US rivals entering into Europe). It is, to put it quite crudely, part of a Turf War.

The preliminary opinion on the patent application was negative, and the examining division’s refusal was confirmed after oral proceedings.

One can see just how much effort this type of application involves, so the author is obviously a hard worker, as he cited many new documents in the appeal procedure.

As the board of appeal is directly involved here (not necessarily seeking to invite/welcome more such ‘business’, in the form of applications, from Baxter), this application was rightly rejected. It’s just a software patent, which friends of the EPO’s management probably wanted approved. I have personally read it twice from start to finish and I am happy to see that the board rejected the patent and fought against it. Baxter is trying to frame the software as tied to hardware, so as to exploit the loophole introduced back in the Brimelow days (software patents in Europe are only possible when one essentially tricks the examiner/s). For those who have patience, here is the full draft of the text, Dx (where x is some number) being a diagram which refers to an application to which we have no access at this stage (leaks would be appreciated).

European Patent Office
D-80298 MUNICH
GERMANY
Tel. +49 (0) 89 2399-0
Fax +49 (0)892399 4465

Appeal number: T1508/12-3.5.05

Communication of the Board of Appeal pursuant to Article 15(1) of the Rules of Procedure of the Boards of Appeal

The Rapporteur P. Corcoran

This document: 16 page(s) including this page

Annex(es):

D2: GB 2 343 334 A;
D3: US 5 396 230 B;
D4: EP 0 413 963 A;
D5: US 2002/0038392;
D6: G. Held, “Network Utility Tools”, The ABCs of IP Addressing, Chapter 9, pp. 163-183, Auerbach Publications, 2001, ISBN: 978-0-8493-1144-4;
D7: A. Berg, “Applets and Network Security: A Management Overview”, Network Design: Principles and Applications (ed. G. Held), Chapter 54, pp. 719-725, Auerbach Publications, 2000, ISBN: 978-0-8493-0859-8;
D8: A. J. Vincent, “JavaScript Developer’s Dictionary”, pp.1-5, 306-307, 326-327, 334-337, Sams Publishing, 2002, ISBN: 0-672-32201-3.

Communication text

A preliminary study of the appeal has been carried out as foreseen by Article 5(3) of the Rules of Procedure of the Boards of Appeal (RPBA), OJ 11/2007, pp . 536-547.

The observations which follow are provisional in nature and are made without prejudice to the board’s final decision.

I. The Impugned Decision

1. Refusal of the application

1.1 The decision under appeal is the decision of the examining division to refuse the application. The decision was delivered during oral proceedings held on 7 February 2012 with written reasons being dispatched on 20 February 2012.

1.2 The impugned decision was taken with respect to a main request and five auxiliary requests.

1.3 The decision cites the following prior art document:
D1: US 6406426 B.

1.4 In said decision the examining division found that the subject-matter of claim 1 of the main request did not involve an inventive step in the light of D1 . With respect to the auxiliary requests, the examining division found that substantially the same arguments as to lack of patentability applied to said requests.

II. The Appellant’s Requests

2. The appellant has requested that the decision under appeal be set aside and that a patent be granted on the basis of a main request filed with the written statement setting out the grounds of appeal or subsidiarily on the basis of one of five auxiliary requests likewise filed with said written statement.

3. Oral proceedings have been requested on a precautionary basis.

4. The further documents on which the appeal is based, i.e. the text of the description and the drawings, do not appear to have been specified despite the requirement of Article 12(2) RPBA that the statement setting out the grounds of appeal shall contain the appellant’s complete case. Unless the appellant indicates otherwise, the board will proceed on the assumption that said documents correspond to those on which the impugned decision was based, viz.:
Description, pages:

1, 7-12, 14, 18, 19, 21, 23-25, 27-36, 39, 40, 42-44, 46-52, 56-59, 62, 63, 66-71, 73, 74, 76, 83, 85, 89, 92-108, 111-114, 116, 117, 120-122, 124, 125, 127 as originally filed;
3-6, 13, 15-17, 20, 22, 26, 37, 38, 41, 45, 53-55, 60, 61, 64, 65, 72, 75, 77-82, 84, 86-88, 90, 91, 109, 110, 115, 118, 119, 123, 126 filed with entry into the regional phase before the EPO;
2, 128 filed with telefax on 19 December 2008.

Drawings, Sheets:
1-59 filed with entry into the regional phase
before the EPO.

4.1 Claim 1 of the main request reads as follows: “A system for reporting on integrity of a wireless communication link within a healthcare facility comprising:
a wireless remote device within the healthcare facility having a message indicator responsive to status information transmitted over wireless communication link, the status information representative of a signal generated by a medication treatment appliance device;
wherein the message indicator comprises at least one of an audible alarm and a visual display, software installed on the wireless remote device having a time-out output,
wherein the time-out output indicates loss of the wireless communication link; and
wherein the audible alarm produces an audible sound in response to the time-out output, and/or
wherein an icon responsive to the time-out output is provided on the visual display.”

III. The Appellant’s Submissions

5. Main request

5.1 The main request was refused on the grounds of lack of inventive step in the light of D1 . The appellant contests the assessment of inventive step by the examining division.

5.2 According to the appellant, the essence of the examining division’s objection was that it would have been obvious to the skilled person to modify the healthcare system of D1 to include software on the remote devices which would indicate loss of the wireless communication link.

5.3 The examining division asserted that the skilled person would be well aware of the signal strength indicators used on cell phones, which were available at the priority date of the application, and took the view that installation on remote devices of software to check the integrity links was a “common” measure in the field of wireless communication which would solve this problem.

5.4 The appellant, however, disputes that the Examining Division properly substantiated its assertions in this regard and contests the statement in the decision to the effect that documentary evidence is not required because the generic mobile phone was so notorious.

5.5 The appellant further contests the inventive step objection on the grounds that a core teaching of D1 is that of central management of data transmission throughout the healthcare system. The appellant submits that D1 refers to the central monitoring system as being responsible for managing the transmission of data and alerts, throughout the system, including sending data to the remote devices.

5.6 According to the appellant, the text bridging columns 14 and 15 of D1 mentions that the central monitoring system periodically queries the remote devices and one result of this periodic querying is that the central monitoring system can tell if a remote device is not acknowledging receipt of data, which could be for a variety of reasons including the fact that it may be out of range. In this situation, the appellant submits that the skilled person, taking the core teaching of D1 into consideration, would follow the indications, for example at column 4 lines 8 to 18 and column 14 lines 56 to 60 of D1 which indicate that the central monitoring system would send alerts to additional caregivers until one of them acknowledged receipt.

5.7 The appellant further submits that the claimed invention provides advantages over D1 because the remote device itself alerts the caregiver to the fact that the wireless communication link has been lost. The caregiver could then take whatever remedial action is necessary to re-establish contact with the healthcare system. According to the appellant, this contrasts with D1 where the caregiver may not be aware of the fact that they were no longer in communication with the healthcare system.

B. Auxiliary requests

6. The appellant submits that the auxiliary requests are inventive over the prior art.

7. With particular respect to the fifth auxiliary request, the appellant disputes that the use of pop-up windows was not common general knowledge in this technical field at the claimed priority date (1 February 2003) and notes that the examining division did not substantiate its allegations in this regard.

IV. Preliminary Opinion of the Board

A. Introductory observations

8. Basis for the claimed subject-matter

8.1 With respect to claim 1 of the main request, the board notes that the subject-matter of said claim appears to be based on the embodiments of the invention disclosed on p. 23 1.31 to p. 25 1.2 of the application as originally filed.

8.2 Claim 1 of the main request appears to comprise a combination of features from independent claim 1 and dependent claims 9, 10 and 11 as originally filed.

9. Documents cited pursuant to Article 114(1)EPC

9.1 In the observations which follow, the following additional documents are introduced into the proceedings pursuant to Article 114(1)EPC:

D2: GB 2
343 334
A;

D3: US 5
3 96 230
B;

D4: EP 0
413 963
A;

D5: US 2002/0038392;

D6: G. Held, “Network Utility Tools”, The ABCs of IP Addressing, Chapter 9, pp . 163-183, Auerbach Publications, 2001, ISBN: 978-0-8493-1144-4;

D7: A. Berg, “Applets and Network Security: A Management Overview”, Network Design: Principles and Applications (ed. G. Held), Chapter 54, pp. 719-725, Auerbach Publications, 2000, ISBN: 978-0-8493-0859-8;

D8: A. J. Vincent, “JavaScript Developer’s Dictionary”, pp . 1-5, 306-307, 326-327, 334-337,
Sams Publishing, 2002, ISBN: 0-672-32201-3.

9.2 D2, D3 and D4 are patent documents which relate to arrangements for indicating the probability of attaining successful communication between a remote device and a network and which, on this basis, appear to be of relevance to the claimed invention.

9.3 D5 is a document cited in the Search Report of the related European patent application 04 706 992.7 which appears to be of relevance with respect to the subject matter of the first auxiliary request.

9.4 D6, D7 and D8 are textbook extracts cited as evidence of common general knowledge which appears to be of relevance to the subject matter of the auxiliary requests.

B. Main request

10. Observations re D1

10.1 The appellant has referred to the text bridging columns 14 and 15 of D1 which mentions that the central monitoring system periodically queries the remote devices as a result of which the central monitoring system can tell if a remote device is not acknowledging receipt of data, which could be for a variety of reasons including the fact that it may be out of range. On this basis, the appellant submits that the skilled person would follow the indications of D1, e.g. at column 4 lines 8 to 18 and column 14 lines 56 to 60, which indicate that the central monitoring system would send alerts to additional caregivers until receipt is acknowledged.

10.2 The passage of D1 cited by the appellant appears to relate to aspects of the messaging functionality provided by the system of D1 according to which a central server may check whether messages have been correctly delivered to remote devices and, if not, determine an alternative delivery destination, e.g. a remote device associated with another clinician.

10.3 The aforementioned functionality of D1 appears to be substantially the same as that disclosed in the present application in relation to the transmission of notifications and messages (cf. originally filed application: section entitled “Messaging & Notifications, Including Alarm/Alert Notifications”, p. 84 1.17 et seq.). In particular, according to the embodiment disclosed on p. 88 1.9 to p. 89 1.8, alerts can be escalated by means of transmission to additional caregivers if a remote device is not acknowledging receipt of data, for example due to being out of range.

10.4 Claim 1, however, is essentially concerned with the provision of specific functionality on the client, i.e. the remote device, rather than the central server such that the user of the remote device can be informed if the wireless communication link between the device and the network is not operational. Insofar as D1 does not appear to disclose the provision of such functionality on the client devices, the claimed invention can be considered novel over D1.

11. Inventive step

11.1 The technical problem addressed by providing the aforementioned functionality on the client device is that of how to adapt the client device such that the user of the remote device can tell whether the wireless communication link between the device and the network is operational.

11.2 In the impugned decision, the examining division referred to the allegedly notorious installation on remote devices of software to check the integrity links in the field of wireless communication as exemplified by coverage indicators on mobile phones. Although the examining division did not provide any documentary evidence to support this assertion, the board is of the opinion that such functionality was indeed generally known at the claimed priority date as evidenced, for example, by D2 (cf. D2 : p.1 1.13-27).

11.3 The board is at present inclined to the view that the skilled person would have recognised the underlying technical problem on the basis of his general knowledge relating to mobile terminals and that he would have been prompted to modify the mobile terminal of D1 to include means for indicating the probability of attaining successful communication with the network.

11.4 More particularly, the board notes that the problem of providing such functionality in the context of remote devices used in wireless paging systems was known per se as evidenced by D3 and D4 . Particular reference is made to the following passages of said documents: D3: Abstract; col.1 1.6-30; col.2 1.58 – col.5 1.35. D4: Abstract; col. 1 1.3-18; col. 4 1.45 – col.13 1.3.

11.5 Having regard to the disclosure of D1 to the effect that the mobile terminal devices may inter alia be paging devices (cf. D1: col.4 1.8-22; col.9 1.16-33; col.11 1.11-19), the board is of the opinion that the skilled person would not require the exercise of inventive skill to combine the teaching of D1 with that of D3 or D4.

11.6 In view of the foregoing the board, is of the preliminary opinion that the provision of the aforementioned functionality on the client devices of D1, viz. means to indicate the probability of attaining successful communication with the network, would not require the exercise of inventive skill.

C. Auxiliary requests

12. First auxiliary request

12.1 Claim 1 of the first auxiliary request further specifies that the signal output generated by the medication device is a notification which comprises data relating to at least one of an alarm condition, an alert condition, an infusion volume rate and a time remaining before and infusion bag is emptied.

12.2 This additional specification appears to based on the embodiments disclosed on p. 27 1.32 – p. 28 1.21 of the originally filed application.

12.3 The board notes that said additional specification appears to relate primarily to the cognitive information context of the notification transmitted to the remote device and it is therefore questionable as to whether this additional specification makes any technical contribution to the claimed subject-matter.

12.4 To the extent that the additional specification provides any technical contribution, it would not appear to address the same technical problem underlying claim 1 of the main request but rather a further independent partial problem.

12.5 It is further noted in this regard that D1 appears to disclose the transmission of notifications relating to infusion pumps, (cf. for example D1: text bridging cols. 6 and 7; col.7 1.27-31) and similar subject-matter relating to the transmission of infusion pump notifications is likewise disclosed in D5 (cf. D5: in particular [0283] to [0323]).

12.6 In the given context, the additional feature of claim 1 of the first auxiliary request does not appear to make a non-obvious technical contribution to the claimed subject-matter.

13. Second auxiliary request

13.1 Claim 1 of the second auxiliary request additionally specifies that the medical treatment application device is a controller for an infusion pump.

13.2 Referring to the observations made above in relation to claim 1 of the preceding request, the specification of the medical treatment application device as a controller for an infusion pump appears to address a further independent partial problem.

13.3 Moreover, the choice of a controller for an infusion pump as the medical treatment application device appears to be disclosed or at least suggested by D1 (cf. for example D1: text bridging cols. 6 and 7; col.7 1.27-31). Reference is also made to the disclosure of D5 cf. observations under 12.6 above).

13.4 In the given context, the additional feature of claim 1 of the second auxiliary request does not appear to make a non-obvious technical contribution to the claimed subject-matter.

14. Third auxiliary request

14.1 Claim 1 of the third auxiliary request additionally specifies that loss of the wireless communication link is determined by periodic polling of the wireless communication link. This additional feature appears to be based on p. 24 1.1-9 of the originally found application which discloses a script that tests the integrity of the communication link by periodically polling, or monitoring communication, including notifications and messaging, from the central system or the access point.

14.2 The board notes in this regard that the checking of the communication link at pre-defined time intervals as disclosed in D3 and D4 would appear to be substantially similar to a form of “polling”.

14.3 Insofar as the appellant may succeed in establishing that D3 and D4 do not disclose a form of “polling”, the board further notes that utilities to check the availability of a remote network host were generally known per se at the claimed priority date. Particular reference is made in this regard to the generally known “ping” utility which can be invoked to determine the availability of a remote server or host and thus to determine the availability of the path to the destination. In support of this assertion, reference is made to D6 (cf. D6: in particular, p. 163 and 168).

14.4 Whereas the appellant has apparently argued to the effect that D1 teaches that the central monitoring system is solely responsible for managing the transmission of data and alerts throughout the system, including sending data to the remote devices, it is noted that column 4 lines 8 to 22 of D1 discloses that the remote access devices communicate bi-directionally with the central monitoring system. In the context of such bilateral communication, the use of a technique such as the aforementioned “ping” utility by a client device to determine the availability of the server would not appear to require the exercise of inventive skill.

14.5 In the given context, the additional feature of claim 1 of the third auxiliary request does not appear to make a non-obvious technical contribution to the claimed subject – matter.

14.6 The board further notes in this regard that the application as originally filed appears to disclose said “polling” as merely one of a number of possible design options freely available to the skilled person. The application does not appear to provide any further technical teaching with regard to how exactly said polling is to be implemented in technical terms nor is there any apparent disclosure of what particular technical advantages it is alleged to provide over other known methods for testing the communication link.

14.7 To the extent that the appellant disputes that the feature under discussion represents more than a mere design choice falling within the routine competence of the skilled person, the board notes that it may be necessary to give consideration to the question of sufficiency of disclosure under Article 83 and Rule 42(1)(e) EPC. Should this question require consideration the onus will be on the appellant to establish that the aforementioned feature has been sufficiently disclosed in the originally filed application documents.

15. Fourth auxiliary request

15.1 Claim 1 of the fourth auxiliary request additionally specifies that the software comprises a script automatically downloaded from the server to the wireless remote device.

15.2 This additional feature appears to be based on the embodiment of p. 23 1.34 – p. 24 1.1 and essentially relates to the form in which the software module or application is implemented, i.e. as a downloadable script. In this regard, the board notes that said feature appears to address a further independent partial problem, viz. how to implement the software module or application.

15.3 The proposed form for implementing said software module or application appears to be generally known and, in the board’s opinion, does not involve more than the application of conventional programming techniques. In support of the this assertion, reference is made to D7 which discloses relevant subject-matter relating to scripting techniques for providing programs (“applets”) that can be downloaded from a server for execution on a client device (cf. D7: in particular, p. 719).

15.4 In the given context, the additional feature of claim 1 of the fourth auxiliary request does not appear to make a non-obvious technical contribution to the claimed subject – matter.

16. Fifth auxiliary request

16.1 Claim 1 of the fifth auxiliary request additionally specifies that a pop-up window is provided on the visual display in response to the time-out output.

16.2 This additional feature group appears to be based on the embodiment disclosed on p. 24 1.9-12 of the originally filed application.

16.3 In this regard, the board notes that the use of pop-up windows appears to have been generally known at the claimed priority date as asserted by the examining division in the impugned decision. In view of the fact that the appellant has disputed the assertions made by the examining division in this regard, the board considers it appropriate to make reference to the textbook extract D8 which discloses the use of pop-up windows in the context of a known scripting language, i.e. JavaScript (cf. in particular D8 : “alert()” on pp. 306-307; “prompt()” on pp. 326-327; and entry relating to dialog windows on pp. 334-336).

16.4 In the given context, the additional feature of claim 1 of the fifth auxiliary request does not appear to make a non-obvious technical contribution to the claimed subject-matter.

17. In view of the foregoing, the board is not at present inclined to accept that the additional features specified in the independent claims of the auxiliary requests involve the exercise of inventive skill.

V. Concluding Remarks

18. Oral proceedings

18.1 During oral proceedings the board intends to focus the discussion on the question of compliance with the inventive step requirement of Article 52(1) EPC, in particular having regard to the observations set forth above (cf. in particular, items 10 to 17 above).

19. Amendments to the appellant’s case

19.1 Any further written submissions which the appellant may wish to make should be filed at the latest one month before the appointed date for oral proceedings.

19.2 The appellant’s attention is drawn to Article 13 RPBA, relating to amendments to a party’s case. The board has discretion not to admit amendments based on a variety of considerations, including the imminence of oral proceedings. In particular, amendments sought to be made after oral proceedings have been arranged shall not be admitted if they raise issues which the board cannot reasonably be expected to deal with without adjournment of the proceedings.

Where amendments to the appellant’s case are filed it will be necessary to discuss their admissibility and their compliance with the EPC, including Articles 123(2), 84 and 52(1). In the light of Article 15(3) RPBA, the board may consider these issues and announce a decision based on new objections arising from such newly submitted amendments even if the appellant chooses not to attend the scheduled oral proceedings.

Stay tuned as we have plenty more to come.

Links 27/10/2015: Tanglu 4.0, Simplicity Linux 15.10

Posted in News Roundup at 8:09 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • A Miracle Comes to Linux

    Morgan’s parents will not allow any personal identification to go forth in the legal or scientific community until Morgan is considered an adult. At that time, he can allow various communities and professionals to make his case public, or not. Morgan is strict about allowing access to him. Bianca and Morgan remain close friends to this day. And no…I did not have to help David at all with the use of his new Linux computer. His brother will be looking into becoming a kernel maintainer as soon as he finishes “looking the whole Linux thing over.”

  • Desktop

    • I’m an artist who loves Linux

      One day I got a new fancy machine and booted CentOS on it. Then, instead of going for commercial software, I started using open source applications to make art. I started using Blender for all my 3D animation work, and GIMP and Krita for my painting needs. Recently I’ve started using MyPaint and love it. In short, once I found out about all the open source alternatives to the commercial applications, I never looked back.

    • Xiamoi’s Linux laptop will be available in early 2016

      Good news for anyone looking to avoid the Microsoft tax: Chinese electronics behemoth Xiaomi is reportedly planning to launch an affordable Linux laptop in early 2016.

      Xiaomi has made supply chain orders for 750,000 laptops, according to industry site Digitimes is reporting. It would be the first laptop made by the Xiaomi, and could give desktop Linux a mainstream user base across the planet.

    • The seduction of the new

      I don’t know about the Windows or Mac users’ reactions, but the Linux user’s always makes me smile as I recognize an attitude I see regularly and to some extent share. Free software users are always ready to upgrade, although their obsession is only partly rational.

    • On Being Ripped Off

      Given I had paid a lot of money for the Kaspersky Crystal Pure protection quite recently (and I think it was on an automatic renewal) I feel pretty ripped off. Am I being reasonable, or is it my fault for changing the operating system?

  • Server

    • SGI Introduces the New UV 300RL With Oracle Linux

      SGI (NASDAQ: SGI), a global leader in high-performance solutions for compute, data analytics, and data management and Gold level member in Oracle PartnerNetwork (OPN), today introduced the SGI UV 300RL. A new model in the SGI UV server line certified and supported with Oracle Linux, SGI UV 300RL provides up to 32 sockets and 24 terabytes (TBs) of shared memory. The solution enables enterprises that have standardized on Intel-based servers to run Oracle Database In-Memory on a single system to help achieve real-time operations and accelerate data analytics at unprecedented scale.

    • Cambridge Technology Enterprises Nominated for Oracle Linux and Virtualization Partner Award at Oracle OpenWorld 2015

      Cambridge Technology Enterprises Ltd has been nominated for the first Annual Oracle Linux and Virtualization Partner Award at Oracle OpenWorld 2015. The award ceremony will take place at Oracle OpenWorld on October 26, 2015 and will recognize CTE’s work with Oracle Linux and Virtualization.

    • Oracle OpenWorld 2015: Ellison Disses IBM, SAP as ‘Nowhere in the Cloud’

      Oracle CTO Larry Ellison kicked off Oracle OpenWorld 2015 in true Ellison style—with both guns blazing, pointing squarely at Oracle’s biggest competitors in the cloud space.

      “Our two biggest competitors in last two decades have been IBM and SAP and we no longer pay any attention to either one,” Ellison said during his keynote event Oct. 25. “It’s quite a shock. SAP is nowhere in cloud, and only Oracle and Microsoft is in every level of the cloud—applications, platform and infrastructure.”

  • Shows

    • Inside SparkFun’s Fellowship of the Things video series

      The Fellowship of the Things video series was conceived out of our passion for the burgeoning world of Internet of Things and connected projects, and our desire to showcase some of the SparkFun tools and products that fit particularly well into them. We somehow got permission to build an Internet of Things-dedicated apartment inside SparkFun HQ to use as a demo area for the projects, and so far it’s been a huge success!

  • Kernel Space

    • Linux Foundation Scholarship Recipient: Anthony Hooper

      The Linux Foundation regularly awards scholarships as part of its Linux Training Scholarship Program. In the five years that the Linux Foundation has hosted this program, it has awarded a total of 34 scholarships totaling more than $100,000 in free training to students and professionals who may not otherwise have access to these opportunities. In this continuing series, we share the stories of recent scholarship recipients with the hope of inspiring others.

      Whiz Kid scholarship recipient Anthony Hooper (age 23, from Jamaica) has been interested in technology since junior high. He says learning more about Linux is important to his future so he will be able to do what he deems is meaningful work. What Anthony loves most about Linux is the “sheer magnitude of collaborative work poured into the kernel over the years by individuals all over the world and companies who are even rivals themselves.” He says that being able to learn about the system and make a contribution to it, even a small one, would be nothing short of amazing.

    • Linux Kernel 4.2.5 Has Been Released with Many AMD GPU Improvements

      After only four days from the release of Linux kernel 4.2.4, Greg Kroah-Hartman announced on the last hours of October 26, 2015, the immediate availability for download of the fifth maintenance release of Linux kernel 4.2.

    • Linux 4.1.12
    • Linux 3.14.56
    • Linux 3.10.92
    • Graphics Stack

      • X.Org Server 1.18 RC2 “Amontillado” Released
      • NVIDIA GPU Offloading Support For GCC Is Still Up & Coming

        It’s been nearly two years that there’s been work going on for OpenACC 2.0 with GPU offloading for GCC, primarily geared for NVIDIA GPUs. That work continues taking shape and hopefully for GCC 6 the support will be in better standing.

      • Is Upgrading To Mesa 11.1-devel Worthwhile For Radeon R600g Users?

        With last week’s release of Ubuntu 15.10, Mesa 11.0 is part of the open-source graphics stack. Unfortunate for those with an AMD GCN GPU that uses the RadeonSI Gallium3D driver, Mesa 11.0 on Ubuntu 15.10 is built against an older version of LLVM that doesn’t allow the OpenGL 4.1 support to be exposed. For RadeonSI users, I’d say switching to Mesa 11.1-devel + LLVM 3.8 SVN is almost a must once installing Ubuntu 15.10, but is it worthwhile for R600g users?

    • Benchmarks

      • 4K AMD/NVIDIA High-End GPU Comparison On SteamOS Linux

        Continuing on from Friday’s article that was a 22-way comparison of AMD and NVIDIA graphics cards on SteamOS for Steam Linux gaming, which tested the hardware at the common TV resolution of 1080p, here are results for the higher-end Radeon and GeForce graphics cards at 4K.

        This article is structured quite similarly to Friday’s article but rather than testing at 1080p, the Steam Linux game tests were at 4K (3840 x 2160). Due to the increased resolution, not all twenty-two graphics cards were used for this article but only the higher-end AMD and NVIDIA GPUs.

  • Applications

  • Desktop Environments/WMs

    • Cinnamon 2.8 and MATE 1.12 to Arrive In a Few Days, Says Clement Lefebvre

      Clement Lefebvre, the leader and maintainer of the popular Linux Mint operating system, as well as the Cinnamon and MATE desktop environments, sent his monthly report about the work done by the entire team.

    • K Desktop Environment/KDE SC/Qt

      • First Beta release of KDevelop 5.0.0 available

        We spent a lot of effort on keeping the porting bugs to a minimum, and our thanks go out to the many testers who have guided us in the process. Porting to KF5 and Qt 5 also cut down our dependencies, bringing us closer to a proper KDevelop on Windows and KDevelop on Mac OS X. If you want to see KDevelop 5 become a reality on these platforms, then please get in touch with us and help us iron out the last issues.

      • KDE e.V. Quarterly Report – 2014Q4

        The KDE e.V. report for the fourth quarter of 2014 is available (PDF). It features a compendium of all the activities and events carried out, supported and funded by KDE e.V. in that period, as well as the reporting of major events, conferences and mentoring programs that KDE has been involved in.

      • Add an “Archive” button in KMail

        I love the “archive” button in Thunderbird (which was adopted from GMail, I think…) and (so far) am enjoying KMail. However, I was missing the “read it, don’t need to do anything further with this email – so put it in my 2015 folder.”

      • Interview with Laura

        My name is Laura, and I currently live in Calgary, Alberta. Aside from 2D art, I model/sculpt with Blender, Maya, and ZBrush. I enjoy running and board sports, and I love science and cats!

      • My Wishion for KDE – Part 1 – Now

        KDE is mostly about people. We are a huge project with an almost 20 years old history. We’ve great infrastructure and values (Manifesto) and our software is targeted towards end-users and normal people. But do we really succeed and achieve what we want? Are there problems and what are they?

      • KDevelop 5.0 Open Source IDE Enters Beta, Ported to Qt 5 and KDE Frameworks 5

        After more than a year of hard work, Milian Wolff from the KDevelop project has had the great pleasure of announcing the immediate availability for download and testing of the first Beta build of KDevelop 5.0.0.

    • GNOME Desktop/GTK

      • GeoJSON in Maps

        For Maps 3.19.1 release we managed to land some support for showing a GeoJSON layer. This means that you can get a GeoJSON file from somewhere then open it with Maps.

  • Distributions

    • Learning Linux – Lesson Three: GNU/Linux Distributions

      While in the first lesson of our Learning Linux series you learned the basics of Linux and the difference between a GNU/Linux operating system and the Linux kernel, in the second one you found out how GNU/Linux OS works.

    • Happy Distrovus: 3 big Linux Distros released in 8 days

      Five days! We have just five tiny little days to fully feast upon Ubuntu 15.10 before we need to make room in our lives to take Fedora 23 for a full spin. Which, based on my testing of an earlier beta build, tells me that this is going to be a release worth paying some attention to.

      But those five days seem like an eternity compared to the mere THREE DAYS between the release of Fedora 23 and the Gold Master version of openSUSE Leap 42.1 on October 30th. Another gigantic release that is worthy of our attention.

    • Happy Distrovus, Kissing Kubuntu Kousins

      Today in Linux news, Brian Lunduke declared a new holiday to celebrate the autumn distribution release season. UnixMan Chris Jones reviewed Fedora 23 already, due for release November 3, and Jesse Smith reported on GhostBSD 10.1 in today’s Distrowatch Weekly. Bruce Byfield is still grumbling about his failed Debian upgrade and Canonical issued a statement today on their relationship with Kubuntu.

    • New Releases

    • Screenshots/Screencasts

    • Arch Family

    • Red Hat Family

      • Singapore’s First Liberal Arts College Taps Red Hat and Dell for OpenStack-based Software-defined Datacenter

        Yale-NUS College was established in 2011 as a collaboration between Yale University and the National University of Singapore (NUS) to provide a new model for liberal arts colleges in Asia.

      • Dualtec Cloud Builders Selects Red Hat to Deploy Brazil’s First OpenStack-based Cloud
      • SF Hosts AnsibleFest Nov. 19

        First, Red Hat acquires Ansible two weeks ago, which is both no small feat and a coup for the folks in Raleigh. The acquisition was a smart, yet expected, move: It marries Ansible’s ease of automation to the wide portfolio of Red Hat clientele, driving down the cost and complexity of deploying and managing both cloud-native and traditional applications across hybrid cloud environments. In short, by writing a check, Red Hat expanded its leadership in hybrid cloud management.

      • Open source software’s implications beyond software

        Jim Whitehurst, CEO of Red Hat, was sporting his awesome red shoes as he spoke to a crowded room at All Things Open last week. During his keynote on Day 1, he talked about how open source is a key part of the open organization, but what we’re all looking to achieve has implications far beyond software.

        Jim began his keynote by explaining why there is a need for the principles of open source in business. If we think of the world we come from and the world we are coming into we see that there is a long line of change. We have come from a world of mass manufacturing, where relatively uneducated people were typically doing rote tasks on assembly lines in a static environment where there was little sharing of information. Society has based a lot of our structure of managing businesses on this model, but if we think about how we live and work today things are much different.

      • Insider Selling: Red Hat CEO Sells $303,592.50 in Stock (RHT)

        Red Hat (NYSE:RHT) CEO James M. Whitehurst sold 3,930 shares of the firm’s stock in a transaction on Monday, October 19th. The shares were sold at an average price of $77.25, for a total value of $303,592.50. Following the sale, the chief executive officer now directly owns 372,478 shares of the company’s stock, valued at $28,773,925.50. The transaction was disclosed in a document filed with the SEC, which is available through this link.

      • FICO Chooses Red Hat to Deploy OpenStack, Management, and Storage Solutions for Agile Cloud Infrastructure

        Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced that FICO, the predictive analytics and decision management software company, has deployed Red Hat software, including Red Hat Enterprise Linux OpenStack Platform, Red Hat CloudForms, and Red Hat Ceph Storage, as the basis of its cloud infrastructure. Moving to an OpenStack and Ceph-based cloud has not only helped FICO reduce time to market by 50 percent and lower costs by 30 percent compared to previous infrastructure implementations, but it has helped transform FICO into a Software-as-Service (SaaS) company, driving added sales to new and existing customers in expanded markets.

      • Fedora

        • Mark command usecase

          In the early days of DNF development, the original members of the team decided that the cool feature called clean_requirements_on_remove should have been enabled by default . This is exactly that feature of DNF which prevents your system from overblooting by installed, but no longer needed dependencies of packages.

        • Year of the Linux Desktop: Flock 2015 Summary

          Flock to Fedora 2015 was a conference full of incredible people with incredible ideas, and it was a tough decision to decide which sessions to attend of all the good options. One that caught my eye was the “When is the year of the Linux desktop?” talk by Red Hat software engineering intern Levente Kurusa. Some of the key talking points of his session were evaluating why this statement always seems to be “next year” and why this awesome idea never seems to gain much ground. Are we doing something wrong? Can we improve somewhere? All of this, and more, Levente aimed to cover in his talk. I was fortunate enough to be in attendance of this talk!

        • Fedora – A peek into IRC meetings using meetbot data

          fedmsg has a few meetbot-related topics corresponding to meetbot commands using which I gather daily,weekly and monthly IRC meeting data. You can construct queries for a time period by specifying by the start and end parameters for the query.Use count variable from JSON data dump to get total number of messages pertaining to our query. (Check out the meetbot-related fedmsg topics here and documentation for constructing queries for Datagrepper here ). You can also use Datagrepper Charts API for some basic visualizations. (Check it out here).

        • Getting started with Fedora

          In this post I would like to tell you about the process of creation of a book cover. Some time ago Jiří Eischmann had an idea of creating a user guide for potential new Fedora users.

        • DNF 1.1.3 and DNF-PLUGINS-CORE 0.1.13 Released

          New release of DNF stack (dnf, dnf-plugins-core, dnf-plugins-extras, hawkey and libsolv) is going to Fedora 21, 22, 23 and rawhide. Most of the fixes happened under the hood in DNF libraries. The emphasis was on stability and making smooth system upgrades. For more information take a look at release notes.

        • Globalization test days report for Fedora 23

          Each Fedora release, developers add interesting features and changes. The Fedora QA group puts in extra effort to make sure these features work well. The Fedora QA group runs test days, together with our development teams. Test days usually happen between Alpha and Beta test releases. These events are essential to help us find critical flaws.

    • Debian Family

      • Debian Installer Stretch Alpha 4 Drops The CD Sets

        The Debian Installer Stretch Alpha 4 release has various hardware support improvements, accessibility support by default is now enabled for GTK2 applications and improved for Qt4/Qt5 applications, and various other changes took place.

      • Debian 9 “Stretch” Installer Alpha 4 Drops Support for CDs, Adds Improvements

        The Debian Project, through Cyril Brulebois, announced the release and immediate availability for download and testing of the fourth Alpha build of the Debian GNU/Linux 9.0 “Stretch” installer.

      • Derivatives

        • SteamOS Switches To Linux 4.1, Latest Graphics Drivers

          SteamOS Brewmaster now has the Linux 4.1 kernel, which is a big upgrade over their earlier Linux 3.18 kernel. SteamOS Brewmaster also switches to using the Catalyst 15.9 proprietary graphics driver and has upgraded the NVIDIA binary blob too.

        • Major SteamOS Update Brings Linux Kernel 4.1, Updates Nvidia and AMD Drivers

          Valve announced a few minutes ago that the Brewmaster branch of their Debian-based SteamOS Linux operating system received a major update, version 2.49, that was pushed to the Beta channel.

        • Canonical/Ubuntu

          • Ubuntu Avengers Is an Excellent Resource for Users Who Want to Report Ubuntu Touch Bugs

            If you’re one of the thousands of Ubuntu Phone users, and you have encountered a bug that needs reporting, you might want to check out this excellent Wiki page that directs users to the proper channels for most of the components of the operating system.

          • Ubuntu 15.10 offers new UI and enhanced developer tools

            Ubuntu 15.10 has been revealed, with a new UI and re-fashioned developer tools, including the ability to preview apps with a converged phone, desktop and tablet experience.

            For Ubuntu Phone users, the update will be automatically rolled out, apparently demonstrating the platform’s “famous flow of updates to this new ecosystem.”

          • Ubuntu MATE Tools Could Bring Xubuntu, Lubuntu, and Ubuntu Server to Raspberry Pi 2

            Ubuntu MATE developers have been working on some tools that allowed them to build the distribution for the Raspberry Pi 2 platform, and they are looking to share those tools and to name them so that other projects can use them, like Xubuntu or Lubuntu.

          • Mycroft AI on Ubuntu’s Unity 8 Hits a Bump in the Road the Size of Python 3

            The Mycroft AI home automation solution that managed to gather enough funds on Kickstarter just a few months ago also promised an Ubuntu implementation of its Mycroft AI. It looks like those plans have hit a bump in the road for Unity 8.

          • Canonical Promises Easy, Secure Containerized Apps for Ubuntu with LXD

            Turn on, tune in, drop out—without Docker! That—or, uh, something like it—is the container management experience Canonical hopes to deliver by bundling LXD, the open source containerized app framework, into the latest version of Ubuntu Linux, 15.10, which was released a few days ago.

          • Kubuntu and Ubuntu Councils Issue Joint Statement

            A joint statement from the Kubuntu Council and the Ubuntu Council has been published today in an attempt to alleviate the questions raised after the departure of the Kubuntu release manager, Jonathan Riddell.

          • The Ubuntu-Powered Erle-Spider Drone Now Available for Sale

            The Erle-Spider drone that’s powered by Ubuntu and based on ROS, the Robot Operating System, is now available for purchase, outside of the previous crowdfunding campaign.

          • Superb Ubuntu MATE Gold Edition Proposed by User – Video

            An Ubuntu MATE user put together a “Gold Edition” of the distribution and made some propositions for the leader of the project, Martin Wimpress. As it turns out, he’s going to make some of those things happen.

          • Ubuntu 15.10 offers new UI and enhanced developer tools

            Ubuntu 15.10 has been revealed, with a new UI and re-fashioned developer tools, including the ability to preview apps with a converged phone, desktop and tablet experience.

            For Ubuntu Phone users, the update will be automatically rolled out, apparently demonstrating the platform’s “famous flow of updates to this new ecosystem.”

          • Is Ubuntu 15.10 a Fearless Werewolf or a Boring One?

            I believe that every Linux and Ubuntu user out there knows that Ubuntu 15.10 (codename Wily Werewolf) has been released, and it aims to become a better replacement for the previous version, Ubuntu 15.04 (Vivid Vervet).

          • Unleashing the Werewolf

            Upgrading from Vivid to the latest version using the Update Manager was smooth and painless and took about two hours. The time required may vary depending on the speed of your Internet connection. When my PC rebooted after the upgrade, the only hint that I was using a new operating system was a watermark at the bottom of the startup screen. Then, I was taken back to the comfortable familiarity of my customized XFCE desktop so that I could resume where I had left off.

          • Here are the 9 New Ubuntu 15.10 Features You Should Know

            The stable edition of Ubuntu 15.10 wily werewolf is just released by canonical few days a ago and it now available to download and install on your computer. Lets take a look at the features that are implemented in the new release of ubuntu 15.10 and see what important packages have been updated.

          • System76 Users Can Now Upgrade to Ubuntu 15.10, Here’s How

            System76, the American hardware company behind those Ubuntu-powered laptops and desktop computers, announced earlier today, October 26, that all of their users can now upgrade to the recently released Ubuntu 15.10 (Wily Werewolf) operating system.

          • Ubuntu Linux Demonstrates New Cloud Application Store

            Ubuntu Linux founder Mark Shuttleworth announced new cloud application store capabilities at the OpenStack Tokyo Summit.

            TOKYO—In the OpenStack world, no operating system is more widely deployed than Ubuntu Linux. It’s a fact that Mark Shuttleworth, founder of Ubuntu Linux, emphasized during a presentation at the OpenStack Summit here, while detailing new features that he hopes will further extend his lead.

          • Snappy Ubuntu Core 15.04 Receives Basic Support for Store Channels, More

            On October 26, Canonical’s Michael Vogt was happy to announce the release and immediate availability for download of the ninth maintenance update of the Snappy Ubuntu Core 15.04 operating system.

          • Massive Unity 8 Convergence Goodness Now Available for All Ubuntu Phone Users
          • Ubuntu Touch with a Mouse Cursor Is Interesting and Cool at the Same Time
          • Ubuntu 15.10 Review: Less Exciting & Largely Unchanged

            From a technological point of view, according to the release notes, a lot of efforts have been made to smoothen the transition from the Upstart (init daemon — a core utility that manages boot-up services & applications that work in the background called ‘daemons’) to Systemd which was first initiated with the Ubuntu 15.04 release. There’s also a technological preview of the upcoming Unity 8 desktop as well. Previously it was also mentioned that ‘TLP’ (a handy power usage optimizer) will also be shipped by default, but it has not made its way to this release due to unknown reasons.

          • Flavours and Variants

            • Simplicity Linux 15.10 is now available to download!

              We are very pleased to announce the release of Simplicity Linux 15.10. Due to some issues users were finding with the 64 bit edition of Simplicity 15.7, we’ve decided to put our 64 bit releases on hiatus until we can resolve the issue.

              The two 32 bit bit editions of Simplicity 15.10 both feature the 4.1.1 Linux kernel and are based on the excellent LXPup. LXDE is used as the desktop, and wbar is used as a dock for preinstalled software and features.

              Netbook is our lightweight edition, which comes with fewer local apps and more cloud based applications. It’s a good starting point for anyone who might feel intimidated by Linux or people with older hardware.

            • Kubuntu 15.10 Gaming Impact With KDE Plasma 5 Compositing For R600 Gallium3D

              As mentioned in yesterday’s article with KDE Plasma 5 generally leading to a slower gaming experience than GNOME, Xfce, LXDE, and MATE, the issue comes down to KDE continuing to composite full-screen windows by default. This leads to a performance penalty as has been explained and tested in many articles before on Phoronix. For making things fair, it was a performance comparison of these Fedora 23 desktop environments out-of-the-box as representative what a new user would encounter and making the assumption the software vendor makes the best decisions regarding defaults. However, in the comments to yesterday’s article were several requests for running some fresh tests to show the impact of the full-screen window compositing versus when the compositing is suspended.

            • Simplicity Linux 15.10 Officially Released, Rebased on Linux Kernel 4.1.1 LTS

              The developers of the Simplicity Linux distribution have had the great pleasure of announcing the immediate availability for download of the final release of Simplicity Linux 15.10.

            • Joint statement: Kubuntu Council + Community Council

              Members of both the Kubuntu and Community Councils have been approached by community members and asked what the relationship is between the each other. Both councils would like to confirm that the relationship is strong, and mechanisms are in place to ensure a healthy and open relationship between both councils. We would all like to point out that both councils collaborated and resolved any tensions together. We are all part of this one Ubuntu community, many of us have known each other for years and we all believe that everyone’s contributions are important, no matter which part of the project they ultimately land in. The two council are actively working on a number of concrete issues together and have decided to increase the frequency of meetings to better track progress.

            • Ubuntu Community Council + Kubuntu Issue Joint Statement
  • Devices/Embedded

Free Software/Open Source

  • San Francisco could lead on open source voting

    Open source voting systems offer increased transparency by using nonproprietary software open to the public to review the source code, which counts the ballots and issues election results. Supporters say open source voting is needed to safeguard against election tampering.

  • An Experiment In Reviving Dead Open Source Projects

    Earlier this week I did a keynote at All Things Open. While the topic covered the opportunity of us building effective community collaboration and speeding up the development of Open Source and innovation, I also touched on some of the challenges.

    One of these challenges is sustainability. There are too many great Open Source projects out there that are dead.

    My view, although some may consider it rather romantic, is that there is a good maintainer out there for the vast majority of these projects, but the project and the new maintainer just haven’t met yet. So, this got me thinking…I wonder if this theory is actually true, and if it is, how do we connect these people and projects together?

    While on the flight home I started thinking of what this could look like. I then had an idea of how this could work and I have written a little code to play with it. This is almost certainly the wrong solution to this problem, but I figured it could be an interesting start to a wider discussion for how we solve the issue of dead projects.

  • Open source code isn’t a warranty

    So where does open source fit into this? Accidental bugs, sometimes significant, will continue to exist whether or not the source code is open. Heartbleed, ShellShock, and many other high-profile vulnerabilities in open source software tell us this is the case. Intentional misbehavior would become riskier in the open, but openness is only helpful to the degree we have some way of validating that the source code that has been provided is what’s actually running. This becomes increasingly important as cars become open systems, connected to our phones and to mobile Internet services.

  • LinkedIn open-sources PalDB, a key-value store for handling ‘side data’

    LinkedIn today announced that it is releasing a new key-value store — which is a category of database — under an open-source license. The software, which goes by the name PalDB, was designed to store what LinkedIn calls “side data” — essentially, data that’s needed for a certain very small piece of an entire application.

  • Events

  • Web Browsers

    • Mozilla

      • Mozilla props up its Open Source projects

        Open saucy browser maker Mozilla is spending a million dollars to make sure that the projects, upon which the company depends on do not collapse.

        One of the problems of Open Sauce software is that projects get dumped because they cannot find enough developers interested in maintaining them, or the money to keep them active. This is a problem for a big organisation like Mozilla which needs some projects to be kept going at all costs.

      • Mozilla Open Source Support Program

        The Mozilla Foundation has launched the Mozilla Open Source Support program with an initial allocation of $1million which will be shared between up to 10 projects that Mozilla relies on.

      • Mozilla pledges $1M in funds to open-source projects

        The Mozilla Foundation, the organisation behind open-source projects Firefox, Thunderbird, and others, has announced an initiative to give back to projects on which its own creations rely – and is beginning with an impressive $1 million in funding.

      • Mozilla Launches $1M Program for Open Source/Free Software Projects
  • SaaS/Big Data

  • Databases

    • Attunity Expands Big Data Management Platform to Support PostgeSQL

      Attunity Ltd., a provider of data management software solutions, has introduced the latest version of its data replication and loading solution. Designed to accelerate enterprise big data analytics initiatives, Attunity Replicate 5.0 automates big data movement to, from and between databases, data warehouses, Hadoop and the cloud, reducing the time and labor, and ultimately the cost of making big data analytics available in real time.

  • CMS

  • Business

  • BSD

    • GhostBSD 10.1: Ghost in the machine

      I like the GhostBSD project and its goal. I think, in the past, there has generally not been enough work done to make FreeBSD a good operating system for desktop use. FreeBSD works well in the role of a server operating system, it’s stable, fast and the project evolves in such a way that it is fairly easy to upgrade a FreeBSD system over time. However, FreeBSD (while it can be used as a desktop operating system) lacks many of the characteristics one might want on the desktop, such as a graphical installer, multimedia support, a graphical package manager and an attractive, pre-configured desktop environment. While these features can be added or enabled on FreeBSD, most users will want those tools to be in place and to just work right from the start.

  • Public Services/Government

  • Licensing

    • LLVM Developers Discuss Relicensing Code To Apache License

      However, shifting the license would break compatibility with the GPLv2 and could make this compiler less interesting to the BSD developers from contributing. LLVM Founder Chris Lattner issued the request for comments over possibly changing the license. The current licensing situation is also problematic for not being able to easily move code from LLVM to their Compiler-RT sub-project, since that’s licensed under both the UIUC and MIT licenses.

Leftovers

  • Hardware

    • Infrastructure Should Enable Not Block Business

      In the modern world, companies are decreasing their investment in commodities, whether it be software, hardware, or infrastructure. Jim Zemlin, executive director of the Linux Foundation explained in an interview. “Organizations have discovered that they want to shed what is essentially commodity R&D and software development that isn’t core to their customers and build all of that software in open source. The reason is there is simply too much software to be written for any single organization to do it themselves.”

  • Defence/Police/Secrecy/Aggression

    • US Has No Choice but to Coexist with Iran, CIA Director Said in 2007

      Iran “will be a major player on the world stage in the decades ahead” and the US has no choice but to “find a way to coexist” with the Islamic Republic, said CIA Director John Brennan in 2007, the WikiLeaks has revealed.

      According to a new revelation which the WikiLeaks posted Wednesday on its Twitter account, the organization claimed it had obtained a new document from an email account belonging to Brennan.

    • Washington Accuses Putin. Russian Airstrikes are Targeting “Our Guys” in Syria: CIA Operatives, Military Advisers, Mercenaries, Special Forces, … Instead of ISIS Terrorists

      The “Our Guys” category (“fighting for their lives”) not only includes bona fide “moderate terrorists” trained by the Western military alliance, it also includes countless Western military advisers, intelligence agents and mercenaries (often recruited by private security companies) operating on the ground inside Syria since March 2011.

    • US special forces and the CIA are using drones against al Qaeda and ISIS in Syria and Iraq

      The drone strikes – separate from the large air campaign run by U.S. Central Command – have significantly diminished the threat from the Khorasan Group, an al-Qaida cell in Syria that had planned attacks on American aviation, officials say.

    • Old hurdles and new haunt the Sept. 11 case at Guantanamo

      Colleen Kelly came to Guantanamo Bay with a sense of impatience, dismayed at the U.S. military’s floundering effort to try five detainees charged with roles in the Sept. 11 terrorist attack.

    • No mission creep: US troops wear ‘sneakers not boots’ on the ground in Iraq

      It is recognized that besides 35,000 US troops on the ground in Iraq, there are an unknown number of other Special Forces and CIA forces on the ground, says Phyllis Bennis, Director of the New Internationalism Project at IPS, Washington DC.

    • The New York Times Debunks Conservative Media’s “Vigilant Citizen” Concealed Carry Myth

      The New York Times editorial board debunked the prevalent conservative media myth that a “vigilant citizen packing a legally permitted concealed weapon” might “stop the next mass shooter.” To the contrary, the October 26 editorial cites a recent finding that individuals with concealed carry permits committed 579 shootings since 2007, claiming at least 763 lives, noting “the vast majority of these concealed-carry, licensed shooters killed themselves or others rather than taking down a perpetrator.”

    • Did Times Underplay Drone Program Leak?

      Using a cache of material from an intelligence source that some are calling a “new Snowden,” the start-up national security news site called The Intercept earlier this month published an ambitious investigative project, “The Drone Papers.”

      It exposes details about the inner workings of the American drone program, describing a bureaucratic “kill chain” that leads to the president. It also describes the shocking extent to which drones kill people who were not the intended targets in Yemen, Somalia and Afghanistan. (According to the documents, nearly 90 percent of the individuals killed in one five month period during an operation in Afghanistan were unintended targets.)

      The “Drone Papers” have been covered by many outlets around the world and in the United States since its publication. Among those that published stories on the project were NPR, CNN, PBS NewsHour, Newsweek, The Guardian and Quartz. The series was excerpted in the Huffington Post, which also ran a related story on the source.

  • Environment/Energy/Wildlife

    • ​Climate Change Is Already Costing Us Billions of Dollars Every Year

      Climate change has already begun to cost us, and it’s only going to get worse.

      Hurricanes, intensified in size and frequency by climate change, are taking a massive financial toll already, according to a new paper. The study, published in Nature Geoscience this week, found that an increase in property dollar amounts lost over the past several decades in a case study was due to hurricanes intensified by global warming.

      Conducted by researchers from the Universidad Nacional Autónoma in Mexico and VU University in the Netherlands, the researched used statistical models to estimate the economic losses from storms from 1900 to 2005, taking into account societal change and wealth gains over the years. The findings suggest that between 2 and 12 percent of losses during the year 2005, the year Hurricane Katrina struck New Orleans, could be attributed to global warming.

  • Privacy

    • Silicon Valley’s opposition to cybersecurity bill mounts as US Senate prepares to vote

      Which matters more to you: curbing the onslaught of daily cyberattacks or protecting your online privacy?

      That will be the crux of the debate Tuesday as the US Senate prepares to vote on the latest version of a controversial cybersecurity bill.

      The aim of the Cybersecurity Information Sharing Act (CISA) seems straightforward. The bill’s backers say it will create a system that lets companies share evidence of hackers’ footprints with one another and the US government, without the risk of being sued for breaking privacy-protection or antitrust laws.

    • Advertisers Should Take Responsibility for Annoying People and Driving Them to Use Ad Blockers

      The Interactive Advertising Bureau issued a remarkable mea culpa last week about the state of online advertising. In response to the rise of ad-blocking software, IAB VP Scott Cunningham said digital advertisers should take responsibility for annoying people and driving them to use ad blockers…

    • DOJ Claims Apple Should Be Forced To Decrypt iPhones Because Apple, Not Customers, ‘Own’ iOS

      The DOJ has filed its response to Apple’s claims that unlocking an iPhone 5 would be unduly burdensome. This ongoing dispute over an All Writs Act order (the act itself dates back to 1789) is also an ongoing dispute over the use of encryption-by-default on Apple phones running iOS 8 or higher.

      The argument started with one of the founding members of the “Magistrates’ Revolt” — Judge James Orenstein — who, back in 2005, challenged another All Writs order by the DOJ. A decade ago, Orenstein pointed out that the government’s use of these particular orders circumvented both the judicial system (by granting it powers Congress hadn’t) and the legislative system (which hadn’t created statutes specifically authorizing the actions the order demanded). Nothing has changed a decade later — not even the DOJ’s continued attempts to teach an old law new tricks.

    • While Most Of The Rest Of The Internet Industry Is Fighting Against CISA, Facebook Accused Of Secretly Lobbying For It

      However, the folks at Fight for the Future, who have been working hard to stop CISA, are now claiming that they have it on good authority that Facebook is one of the only internet companies secretly lobbying in favor of the bill and is asking people to sign its petition to convince Facebook to back down…

    • Two Intended Consequences CISA Supporters Will Be Responsible For

      Given that a majority in the Senate is preparing to vote for CISA, I wanted to lay out two intended consequences of CISA, so supporters will know what we will hold them responsible for when these intended consequences prove out:

      The government will lose power to crack down on providers who don’t take care of customers’ data.

    • Reading The Tea Leaves To Understand Why CISA Is A Surveillance Bill

      I’ve had a few conversations recently with people on Twitter who claim that CISA is “not a surveillance bill,” claiming that they’ve read the bill and there’s nothing about surveillance in it. It’s true that the bill positions itself as nothing more than a “cybersecurity” bill that clarifies a few things and then provides some immunity for companies who “voluntarily” share information. However, as I’ve said in response, in order to understand why it’s a surveillance bill, you have to look more closely at how CISA interacts with other laws and what the intelligence community is currently doing. Unfortunately, this isn’t always easy, because part of what the intelligence community is doing and how they’ve interpreted other laws remains secret. But, as you’ve probably heard, some of that has been leaking out over the past few years.

    • Clinton Private E-Mail Included CIA Source Identity: Yahoo

      Nothing indicates March, 2011 e-mail was marked classified when Clinton received it, though sensitive nature of it should have been red flag and it should not have been passed along, former CIA officer John Maguire tells Yahoo

    • CIA Steps Up Its Game in Cyberfight Against Hackers

      The CIA is making a great leap into the 21st century.

      As part of a broader reorganization, the clandestine agency this month launched its first new directorate in more than 50 years, designed to expand the agency’s cyber-espionage efforts and its fight against hackers. Director John Brennan called the move “a key milestone” in the CIA’s broader modernization efforts.

  • Civil Rights

    • CIA pulled officers from Beijing after breach of federal personnel records

      The CIA pulled a number of officers from the U.S. Embassy in Beijing as a precautionary measure in the wake of the massive cybertheft of the personal data of federal employees, current and former U.S. officials said.

    • CIA Use of Waterboarding Found to be More Extensive than Agency Admitted

      In these cases, men endured “water dousing” that, like waterboarding, could simulate a drowning sensation or chill a person’s body temperature through immersion in water, with or without the use of a board, causing them to suffer hypothermia.

    • Guantánamo war court grapples with how an ex-CIA ‘Black Site’ captive can be his own lawyer

      Lawyers and the judge at the Sept. 11 trial haggled over the mechanics on Tuesday of how a former CIA captive kept virtually incommunicado could defend himself at the five-man death-penalty trial.

      No date has been set for the trial of the alleged architect of the Sept. 11, 2001, terror attacks, Khalid Sheik Mohammed, and four alleged co-conspirators. The question arose Monday after an alleged plot deputy, Walid bin Attash, asked the judge how he would go about representing himself.

    • Former CIA interrogator forced to resign from college post following exposé

      A former CIA interrogator says he was asked to resign from his college teaching post in Erie, Pennsylvania after Newsweek magazine ran a feature article about him earlier this month.

      David Martine, 59, told local Fox affiliate WJET-TV in a story broadcast Friday that Gannon University “demanded his immediate resignation” last week after publication of the article, which explored his 26-year career as a CIA interrogator and security agent. He said his dismissal was so abrupt he was “not able to transition any of his classes, or say goodbye to his students,” the station reported.

      A spokesperson for Gannon, a private Catholic college founded in 1925, would not say why Martine was forced out, telling WJET-TV: “It is university policy not to comment on personnel matters.”

    • NYPD Continues to Confuse Itself with the CIA

      The New York Police Department has said it has ended its practice of using informants to snoop on Muslim organizations in New York and New Jersey without any actual definable suspicion of terrorist activity attached to the targets.

      Instead it could very well be using vans with X-ray-emitting equipment (costing more than $700,000 each) to snoop inside vehicles and buildings. We don’t know the extent to which this is happening, nor whether it’s creating health hazards for anybody caught up in it, because the New York Police Department is refusing to provide any information and fighting against a court order that they do.

    • Kevin McKenna: The UK establishment’s in-built prejudice is still with us 80 years on

      The PM’s sneers at Corbyn betray just how attitudes have not really changed

    • JFK Assassination Plot Mirrored in 1961 France: Part 1

      What the colonial powers have done in Muslim countries is well known. Less well known are the machinations of Allen Dulles and the CIA in one of these colonial powers, France.

    • Saudi Arabia attacks Jeremy Corbyn over lack of ‘respect’

      The Labour leader has urged the Government to scrap a £5.9m prison consultancy contract with the repressive Middle Eastern regime

    • BBC Protects U.K.’s Close Ally Saudi Arabia With Incredibly Dishonest and Biased Editing

      The BBC loves to boast about how “objective” and “neutral” it is. But a recent article, which it was forced to change, illustrates the lengths to which the British state-funded media outlet will go to protect one of the U.K. government’s closest allies, Saudi Arabia, which also happens to be one of the country’s largest arms purchasers (just this morning, the Saudi ambassador to the U.K. threatened in an op-ed that any further criticism of the Riyadh regime by Jeremy Corbyn could jeopardize the multi-layered U.K./Saudi alliance).

      Earlier this month, the BBC published an article describing the increase in weapons and money sent by Saudi Arabia and other Gulf regimes to anti-Assad fighters in Syria. All of that “reporting” was based on the claims of what the BBC called “a Saudi government official,” who — because he works for a government closely allied with the U.K. — was granted anonymity by the BBC and then had his claims mindlessly and uncritically presented as fact (it is the rare exception when the BBC reports adversarially on the Saudis). This anonymous “Saudi official” wasn’t whistleblowing or presenting information contrary to the interests of the regime; to the contrary, he was disseminating official information the regime wanted publicized.

      [...]

      So the Saudis, says the anonymous official, are only arming groups such as the “Army of Conquest,” but not the al Qaeda affiliate the Nusra Front. What’s the problem with this claim? It’s obvious, though the BBC would not be so impolite as to point it out: The Army of Conquest includes the Nusra Front as one of its most potent components.

      [...]

      In other words, the claim from the anonymous Saudi official that the BBC uncritically regurgitated — that the Saudis are only arming the Army of Conquest but no groups that “include” the Nusra Front — is self-negating. A BBC reader, Ricardo Vaz, brought this contradiction to the BBC’s attention. As he told The Intercept: “The problem is that the Nusra Front is the most important faction inside the Army of Conquest. So either the Saudi official expected the BBC journalist not to know this, or he expects us to believe they can deliver weapons to factions fighting side by side with an al Qaeda affiliate and that those weapons will not make their way into Nusra’s hands. In any case, this is very close to an official admission that the Saudis (along with Qataris and Turkish) are supplying weapons to an al Qaeda affiliate. This of course is not a secret to anyone who’s paying attention.”

      [...]

      But what this does highlight is just how ludicrous — how beyond parody — the 14-year-old war on terror has become, how little it has to do with its original ostensible justification. The regime with the greatest plausible proximity to the 9/11 attack — Saudi Arabia — is the closest U.S. ally in the region next to Israel. The country that had absolutely nothing to do with that attack, and which is at least as threatened as the U.S. by the religious ideology that spurred it — Iran — is the U.S.’s greatest war-on-terror adversary. Now we have a virtual admission from the Saudis that they are arming a group that centrally includes al Qaeda, while the U.S. itself has at least indirectly done the same (just as was true in Libya). And we’re actually at the point where western media outlets are vehemently denouncing Russia for bombing al Qaeda elements, which those outlets are manipulatively referring to as “non-ISIS groups.”

    • IMF: Saudi Arabia is in danger of running out of money within five years

      Saudi Arabia has about $650 billion in foreign reserves to help it withstand the slump in oil prices. But at the country’s current rate of spending, it won’t take long before the supply of reserves runs out.

      According to a recent IMF report, the drop in oil prices from around $100 per barrel in 2014 to $45 per barrel this summer has already cost oil exporters in the Middle East roughly $360 billion this year. Without drastic action, several countries are at risk of using up their cash reserves within five years.

    • Rape victims in the UAE facing imprisonment for having extramarital sex, claims documentary

      A significant number of migrant women working in the UAE face prosecution and sometimes jail after being raped, a new documentary claims.

      The Zina laws, based on Islamic Sharia law, makes extra material sex illegal in the country; this includes adultery, fornication and homosexuality.

      A BBC Arabic documentary, Pregnant and Chains — to be screened at the BBC Arabic Film Festival this week — found “hundreds” of women have been imprisoned under these laws, including women who have been raped and women who are pregnant.

  • Internet/Net Neutrality

    • MEPs Ready to Give in to Telcos

      Tomorrow, MEPs will vote during the plenary session the Telecom Single Market regulation which includes a part on Net Neutrality, more than a year after their very positive vote. On the pretext that the dispositions, to be voted tomorrow, are less harmful that the Council’s version, a large majority of the MEPs are ready to come back on the breakthroughs of the previous version by approving a text that has too many loopholes to be adopted without being amended as it will put at risk our fundamental rights and liberties.

    • Letter to MEPs: Net Neutrality, Will You Betray Yourselves?

      Tomorrow, MEPs will vote the the Telecom Single Market regulation text. If amendments to ensure Net neutrality are not adopted, then MEPs will have betrayed their own vote of April 2014 and the citizens who elected them.

    • The EU Prepares To Vote For Awful, Loophole-Filled Net Neutrality Rules

      On Tuesday, the European Union is expected to vote on new net neutrality rules, the end result of months of debate between the European Commission, European Parliament, and the EU Council. Of course just like here in the States, heavy lobbying pressure by ISPs has the lion’s share of politicians supporting loopholes that will let giant ISPs do pretty much everything they want. The rules at first glance look very similar to the flimsy, 2010 rules proposed in the U.S. back in 2010 — allowing ISPs to engage in anti-competitive shenanigans — provided the carrier vaguely insists it’s for the safety and security of the network.

    • Net Neutrality in Europe: A Statement From Sir Tim Berners-Lee

      Tomorrow, members of the European Parliament face a key vote on the future of the Internet. The proposed regulations in front of them are weak and confusing. To keep Europe innovative and competitive, it is essential that MEPs adopt amendments for stronger “network neutrality” (net neutrality).

      When I designed the World Wide Web, I built it as an open platform to foster collaboration and innovation. The Web evolved into a powerful and ubiquitous platform because I was able to build it on an open network that treated all packets of information equally. This principle of net neutrality has kept the Internet a free and open space since its inception.

      Since then, the Internet has become the central infrastructure of our time — every sector of our economy and democracy depends on it.

    • Net neutrality: Final countdown to keep the internet fair and equal

      The proposal before the Parliament has crucial loopholes. My colleagues and I are fighting until the last minute for an internet that is fair and equal.

    • The Gaps in Global Internet Governance Are Growing, According to New CFR Interactive

      With over 40 percent of the world’s population now online, the Internet has revolutionized the way the world communicates. But with fast evolving technology, a proliferation of actors with access to the Internet, and an absence of international consensus on what should be permissible, the gap between existing world arrangements and the challenges posed by the Internet is in fact widening, according to the latest addition to the Global Governance Monitor, a multimedia resource from the Council on Foreign Relations (CFR).

    • New top-level domains a money grab and a mistake: Paul Vixie

      DNS is what makes the internet relevant, says Vixie, with ICANN caving in to demands from the companies it’s meant to be regulating indicating corruption.

  • Intellectual Monopolies

    • Copyrights

      • Sony Filed a Copyright Claim Against the Stock Video I Licensed to Them

        For the past few years, people have been contending with more and more false copyright claims and ID matches on services such as YouTube. While these copyright claims often involve an audio match of copyrighted music, sometimes it is the visual content that is in question.

        Whether it’s still photography or motion imagery, your visual content can be flagged, blocked, or removed due to a copyright dispute. If you have original content on YouTube, this could happen to you.

      • Russian companies should block UDP traffic to fight piracy, says think tank

        A Russian Internet industry think tank has proposed making companies legally responsible for Internet traffic flowing on their networks if it uses the UDP protocol. Discouraging the use of UDP in this way is designed to stymie BitTorrent clients, most of which have switched from the more usual TCP protocol to the simpler, connectionless UDP, according to a report on the Cnews site (Google translation).

        The proposal forms part of a larger “media and information roadmap” (Russian PDF), which comes from the Internet Development Institute, set up earlier this year by organisations representing the main Internet, software, and media companies in Russia. The aims of the think tank are to create a forum for industry discussions, carry out research, and “dialogue with the authorities.”

      • Why can’t I fix my tractor?

        Down on the farm, there’s a controversy brewing, because farm equipment manufacturer John Deere doesn’t want farmers tinkering with the software on the farmers’ own tractors. Spark contributor Sean Prpick talks to Saskatchewan farmer Chris Herrnbock, who wants to see a more flexible and farmer-friendly policy rather than a copyright crackdown.

European Patent Organisation: Hallmark of a Corrupted (by Corporations) Entity

Posted in Europe, Patents at 5:24 am by Dr. Roy Schestowitz

NASCAR sponsorsWhose president is it anyway?

Summary: Assorted remarks on what has become of the EPO, which was once aligned with European people and is now, on the face of it, aligned with foreign megacorporations because it wants more money and power (just like a corporation with private shareholders)

THIS week will bring some important articles about the EPO, which is desperately trying to avoid negative publicity. Seeing what happened to FIFA and Volkswagen in Germany sure is a strong motivator.

We wish to warn everyone that the EPO will bring us software patents if it carries on in this current trajectory . Recent articles like the USPTO‘s “USPTO Advances Cooperation with Foreign IP Leaders” and the EPO’s “EPO and USPTO renew their commitment to joint classification scheme” show an ambition which we warned about on numerous occasions half a decade ago, aided by Wikileaks and relating to what was known at the time as Europe's patent "harmonisation" or Community Patent (now it’s known as UPC, as the names continue to change so as to evade negative publicity).

We are amused to have read the patent maximalists from IAM praising of the USPTO’s patent ‘quality’, knowing that the USPTO’s patent ‘quality’ is somewhat a joke (many examples to show for it). With a 92% "success" rate, just about everything someone submits to them (close to 19 out of 20 applications, including repeated attempts) will be deemed ‘innovative’ and ‘novel’. This is the ‘banana republic’ of patent systems. China’s patent system is also notorious in that regard (only cares about numbers), and Benoît Battistelli recently liaised with them too. It’s boasted about in the EPO’s Web site. Is China now Europe’s role model? Well, on human rights in the EPO it sure is…

Sadly, the EPO goes down the same path as the world’s most notorious systems. Under Battistelli’s regime it is happy season for the bogus ‘invnstors’. His regime, which only strives to maximise profit, made it implicitly clear that the EPO invites yet more crappy applications (pushing quality down), so more people submit applications and the regime celebrates this, as it this is a “success”.

Remember that this is the regime which is now willing to grant patents on life, just like the USPTO (see the article “EPO Backs Patents On Conventional Plants: Broccoli, Tomato Cases Decided”, composed by the Switzerland-based IP Watch).

“What we have right now is a Trojan horse right at the very heart of Europe, flagrantly breaking laws (because it claims immunity from them, like the Mafia) and serving large foreign corporations as a matter of priority.”If the EPO already follows USPTO when it comes to patenting life, then why not algorithms too? Or sandwich-making? Cui bono? Battistelli and the large corporations whom he evidently serves as a matter of priority, even if these corporations are not at all European.

Battistelli does not want to hear criticism, so he has launched a new, vicious war against the messengers. The “EPO [is] Still In Turmoil,” wrote IP Watch several days ago, “As Supervisory Body Backs Dismissal Of High-Level Staff” (those who 'dare' not to agree with Battistelli's horrible plan and poor vision for the EPO).

“Well over 1,000 EPO staff have been in revolt,” wrote IP Watch. These are the brave people who decided to attend in spite of threats from the management. Imagine how many people would have attended if it wasn’t for an atmosphere of terror, created by high-level management. “An article in the Techrights blog here details concerns and criticism of the EPO,” IP Watch added. “An article in the IPKat blog summarises various recent blog articles on the EPO.”

Earlier this year IP Watch published the article “European Patent Office Tapped Computers”. Yes, even China would be envious of such repressive measures.

How is the German political intervention into EPO abuses coming along? There was supposed to be a word about it at the end of September. No word though. What happened to the investigation? Was it politically thwarted? Will the police ever get involved? We quite frankly doubt it because people in power tend to protect other people in power. Actions must therefore come from below.

Europe would be far better off if the thugs who run the EPO were exiled to Sardinia or Corsica. What we have right now is a Trojan horse right at the very heart of Europe, flagrantly breaking laws (because it claims immunity from them, like the Mafia) and serving large foreign corporations as a matter of priority. This cannot be allowed to go on and even staff of the EPO knows this.

Expect the EPO’s management to become more fearful and therefore more aggressive.

“Patent monopolies are believed to drive innovation but they actually impede the pace of science and innovation, Stiglitz said. The current “patent thicket,” in which anyone who writes a successful software programme is sued for alleged patent infringement, highlights the current IP system’s failure to encourage innovation, he said.”

IP Watch on Professor Joseph Stiglitz

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts