Bonum Certa Men Certa

Links 25/7/2021: MyGNUHealth 1.0.3 and Lots About Patents



  • GNU/Linux

    • Desktop/Laptop

      • The History of Various Linux Distros

        Linux has been around for 30 years, beginning back in 1991. Yes, it’s that old, and it did make history. If you are interested in the history of some of the major Linux distros, here it is in a nutshell – the history of various Linux distros, like Ubuntu, Fedora, REHL, Linux Mint, Slackware, etc. Finally learn more about why they were created and what makes each different.

        Note: As there are plenty of distros out there, we are only focusing on a few major distros.

      • Google fixes 'Chromebork' one-character code typo that prevented Chrome OS logins

        Google has fixed a bug in Chrome OS version 91.0.4472.165 that surfaced on Monday and prevented some users from being able to login to their systems.

        Chrome OS downloads updates automatically but doesn't apply them until reboot, so only those who restarted their Chromebooks to ingest the force-fed broken update were affected.

        Earlier this week, the internet titan on its Google Workplace status page said, "Our engineering team has identified an issue on Chrome OS 91.0.4472.165. The rollout of this version was halted."

        As a workaround for those bitten by the bug, Google advised users: to "powerwash" their Chrome OS devices back to factory settings; to rollback the Chrome OS device to a previous version via USB; or to remove the affected account and add the account back to the device. All three mitigations, however, clear local data on the device.

    • Audiocasts/Shows

    • Benchmarks

      • Ubuntu vs. Arch Linux On The ASUS ROG Strix G15 / Ryzen 9 5900HX

        This past week were the initial Linux benchmarks of the Ryzen 9 5900HX with the ASUS ROG Strix G15 laptop. Ubuntu was used as the default test platform as usual given its popularity and arguably the most relevant Linux distribution to use given that it's the most common Linux distribution at the moment for preloads on laptops by multiple vendors. In any case, as usual many users were quick to say "but Arch Linux!" as if it was going to make a dramatic difference in my findings. Well, here are some Ubuntu 21.04 versus Arch Linux benchmarks on that AMD Advantage laptop.

    • Instructionals/Technical

      • systemd on Linux 3: Targets

        Learn how systemd targets work in Linux.

      • How to Use AutoKey to Automate Repetitive Tasks on Linux

        AutoKey is a scripting application for Linux. It lets you automate repetitive and trivial operations on your computer so you can perform them quickly and efficiently.

        Some of the tasks where AutoKey serves well include text expansion, correcting typos, launching programs, and inserting boilerplate texts. Besides, you can also use it to run custom scripts to automate complex system actions on your machine.

        That said, though, AutoKey can be intimidating to its first-time users. To this end, here's a guide to help you install, set up, and use AutoKey on Linux.

      • Run an Ansible playbook in a chroot



        Running a playbook in a chroot or container is not supported by Ansible, but I have invented a good workaround to do it anyway.

        The first step is to install Mitogen for Ansible (ansible-mitogen in Debian) and then configure ansible.cfg to use it...

      • Using Pacman on Arch and Manjaro - Linux Nightly

        When trying out a new Linux distribution, one of the first things you need to familiarize yourself with is the system’s package manager. Arch Linux and other Arch-based distros, like Manjaro, use pacman to install or update packages, remove software, and keep the system up to date. Pacman isn’t related to the classic video game, rather just an acronym of package manager.

        In this guide, you’ll learn how to use pacman on Arch Linux, Manjaro, and other distros based on Arch. It works the same across any of them. Read on to master pacman with commands to install packages, remove packages, update the system, etc.

      • Learn Tar Command in Linux with Practical Examples

        Tar command in Linux is used to archive files and folder into a single archived compressed file. Linux admins use tar command to perform day to day backup and restoration tasks. In other words, we can say that tar command is a command line utility which is used to archive important files and folders of a Linux system and later we can extract files and folders from that archive for restoration purpose.

      • How to Restore Git to Previous State: Guide to Restore, Reset, Revert and Rebase – Linux Hint

        If you have a development background, then you must be aware of many development tools. When you individually develop a project through any programming language, you’re either comfortable with a command-line interface (terminal) or GUI tools. But what if you’re working with the team members, it is hard to send chunks of programs to all team members individually. There is also a size limit of files on different platforms that don’t allow the user to send more than the described size.

        It is hard to collaborate when the project is too large and needs modification all the time. For this, you need a distributed version control system that helps you collaborate with team members worldwide. It is good to use a distributed version control system for small and large software projects. Each of the team members will get full access to the complete repository on the local system, and they can work offline.

      • How To Install RabbitMQ on AlmaLinux 8 - idroot

        In this tutorial, we will show you how to install RabbitMQ on AlmaLinux 8. For those of you who didn’t know, RabbitMQ is open-source message-broker software built around Advanced Message Queuing Protocol (AMQP) protocol. RabbitMQ can be easily deployed in a distributed and federated configurations to meet high-scale, high-availability requirements.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the RabbitMQ on AlmaLinux 8. You can follow the same instructions for Rocky Linux.

      • How to play Observer on Linux

        Observer is a cyberpunk horror game developed by Bloober Team and published by Aspyr. It was released on Windows, PS4, and Xbox in 2017, and later on, it came to Linux. In this guide, we’ll show you how to play it on Linux.

      • How to play Orwell on Linux

        Orwell is a simulation video game by Osmotic Studios. In the game, the player assumes the role of an operative and monitors security cameras for national security threats. Here’s how to play it on Linux.

      • How to install Reveal.js on Ubuntu - Unixcop

        reveal.js is an open-source HTML presentation framework. It’s a tool that enables anyone with a web browser to create fully-featured and beautiful presentations for free.

        Presentations made with reveal.js are built on open web technologies. That means anything you can do on the web, you can do in your presentation. Change styles with CSS, include an external web page using an <iframe> or add your own custom behavior using our JavaScript API.

        So in these times of pandemic, this tool can be quite useful for many students and teachers.

      • How to Automatically Set New Wallpapers Using Styli.sh on Linux

        Linux is widely known among enthusiasts for the productivity and the control it offers to its users. However, one of the things that often goes unnoticed is its flexibility in terms of customizations.

        Speaking of customizations, the wallpaper is a simple yet fundamental aspect of the Linux desktop that can make or break its aesthetics. Finding the perfect wallpaper manually can be tough. So why not let a simple script take the pain away? Let's find out more about this script in detail.

      • Sed Command to Delete a Line – Linux Hint

        Sed is a built-in Linux tool for text manipulation. The term sed stands for “stream editor”. Despite the name, sed isn’t a text editor by itself. Rather, it takes text as input, performs various text modifications according to instructions, and prints the output.

        This guide will demonstrate how to use sed to delete a line from a text.

      • Network OSI Layers Explained – Linux Hint

        The Open System Interconnection (OSI) model conceptually illustrates seven abstraction layers of communication framework that devices use for interoperability over the network. In the 1980s, the model was a globally accepted standard framework for network communication.

        The model defines a set of rules and regulations required to render interoperability between different software and devices.

        It was introduced by the Internet Organisation of Standards in 1984 when computer networking was only becoming a new concept. Even though the internet these days is based on a simpler networking model, TCP/IP. The OSI 7-layer model is still used to visualize the basic essential networking architecture and troubleshoot problems.

      • kubectl – How to Restart the Pod – Linux Hint

        A pod can also have one or more containers, one of which is the application container, and the others are the init container, which halts after it completes a job or the application container is ready to perform its function, and the sidecar container, which is affixed to the primary application container. A container or pod will not always leave due to an application failure. In scenarios like this, you will need to restart your Kubernetes Pod explicitly. In this guide, you will explore how to force pods in a deployment to restart using several ways.

    • Proposed Reflink Support Would Provide Big Space Savings For Wine

      When sticking to Wine recommendations of maintaining separate prefixes per-application, a lot of system files get duplicated for each game/application and in turn leading to significant bloat. With the current state of Wine it can mean hundreds of megabytes per prefix in duplicated files. But proposed reflink patches for Wine are aiming to cut down on this severe bloat.

      Developer Alex Xu sent out a set of patches today that would implement Reflink support within Wine. Alex explained, " With a MinGW build of Wine without Mono or Gecko, new 32-bit prefixes are over 150 MB, and new 64-bit prefixes are over 300 MB. The vast majority of these files are byte-for-byte identical to Wine's central DLL copies...When reflink is supported by the underlying filesystem, new Wine prefix sizes with Mono and Gecko disabled are reduced to less than 1 MB. The resulting Wine prefix is byte-for-byte identical to one created without reflink, but occupies less space on disk. "

  • Games

    • Play Control Ultimate Edition on Linux (How To)

      Control Ultimate Edition is an adventurous game packed with actions and thrillers. The developers of the game “Remedy Entertainment” successfully marked the title of the game in gaming publications and were nominated for numerous video game awards. Control Ultimate Edition is available on the platform across Ps4/5, Xbox Series X/One, Epic Games Stores, Pc, and Steam.

      #gnu #linux not falling behind. https://www.gadgetheadline.com/play-control-ultimate-edition-on-linux-how-to/

  • Devices/Embedded

  • Free, Libre, and Open Source Software

    • Productivity Software/LibreOffice/Calligra

      • Hamsters QA team are trying to decrease a number of unconfirmed bug reports in LibreOffice's Bugzilla right now

        I found an interesting Russian site and Telegram channel where newbies QA try to get some experience in QA process for free. Its name is Хомячки (Hamsters). You can ask admins to create a group for testing of anything and if someone want they will test your software (mobile, web, desktop or something) for you. I asked there if someone want to test LibreOffice and many people said yes. So, today we have the group of Russian newbies QA who are triaging bug reports in our Bugzilla. We have a goal - to have minimal number of unconfirmed bug reports in end of August 2021 as possibly.

    • FSF

      • GNU Projects

        • health @ Savannah: Release of MyGNUHealth 1.0.3

          I am happy to announce that the release 1.0.3 of the GNU Health Personal Health Record (PHR) component, MyGNUHealth.

          This release updates the medical genetics domain, with the latest human natural variant dataset based on UniProt Consortium (release 2021_03 of June 02 2021).

    • Programming/Development

      • Dirk Eddelbuettel: littler 0.3.13: Moar Goodies

        The fourteenth release of littler as a CRAN package just landed, following in the now fifteen year history (!!) as a package started by Jeff in 2006, and joined by me a few weeks later.

        littler is the first command-line interface for R as it predates Rscript. It allows for piping as well for shebang scripting via #!, uses command-line arguments more consistently and still starts faster. It also always loaded the methods package which Rscript only started to do in recent years.

        littler lives on Linux and Unix, has its difficulties on macOS due to yet-another-braindeadedness there (who ever thought case-insensitive filesystems as a default were a good idea?) and simply does not exist on Windows (yet – the build system could be extended – see RInside for an existence proof, and volunteers are welcome!). See the FAQ vignette on how to add it to your PATH.

      • Python

        • Python Increment by 1 – Linux Hint

          When you’re acquainted with Python, you’re probably aware that the Increment and Decrement expressions (both before and after) aren’t supported. Python was created to be understandable and consistent. In linguistics having ++ and — expressions, a beginner programmer frequently makes the mistake of confusing the distinctions among increment/decrement expressions, post and pre (both in priority and return value). In comparison to many other programming languages, basic increment and decrement expressions are not quite as necessary. In this tutorial, we will learn about the increment by 1 operator in Python code. Make sure you must have a python tool installed and configured on your system. Hence, we have installed the Spyder Python tool on our system.

        • Python Not Equal Operator – Linux Hint

          While contrasting variables, it’s important to examine both the contents and respective datatypes. Whenever the values of the two inputs differ, the statement is satisfied. Throughout Python, we may use “!=” or “is not” to do not equal operations. Whenever the values of any two Python variables or operands supplied on either side of the not equal operator are not equal, it must return true, else false. Many structured query languages might grumble about matching various types since Python is flexibly yet tightly typed. The not equal operator must return “True” whenever the values provided in two variables are the same; however, they are of various types. Let’s have some examples to see the working of python Not equal operator. First of all, you must ensure that your system has a python tool installed and configured. Launch your installed python tool to start working. At the time of implementing this article, we have been working on the Spyder Python tool.

      • Shell/Bash/Zsh/Ksh

        • Bash for Loop in One Line

          In any programming or scripting language, the loop is a quintessential feature. Loops are generally to perform a repetitive task until a certain condition is met. Bash is a powerful scripting language that supports all the major features of a scripting language (including loops).

          This guide demonstrates one-line for loops in Bash.

      • C

        • Strstr in C – Linux Hint

          Strstr() in the C language is a built-in function. The functionality of strstr can be understandable through the manual present in the Ubuntu terminal if you are working on Ubuntu. Then the terminal will show you the guide of strstr and how it works.

        • Strtok C – Linux Hint

          The C language of programming has a facility to split a string using the function strtok. This is done through a delimiter. It is an easy task that uses a pointer token. A string that is taken as input is divided into small strings called tokens. ‘S’ is the name that indicates that in “strtok”, str stands for the string, and “tok” stands for the token. So this function splits the string into tons of tokens. We have highlighted some examples in this tutorial that will help you out understand this concept.

      • C++

        • String Concatenation in C++

          The way to merge two or more strings is called string concatenation. It is a very common task for any programming language. Some programming languages use a specific operator, some programming languages use the built-in function, and some programming languages use both operator and built-in function to combine string values. The string concatenation can be done by using the ‘+’ operator and different types of built-in functions in C++. The uses of the ‘+’ operator and different built-in functions to combine strings in C++ have been explained in this tutorial.

        • Passing an Array to a Function C++

          An array is a group of elements of the same data type. Many functions are performed on arrays either in the main program or outside it, in the functions. In C++, in the case of functions, we need to pass them. This is done via parameters as arguments. These arguments can be of different ways, either sizeable arrays or through the pointer array. In this tutorial, we will cover some major aspects of array transfer using different parameters of the functions.

        • How to use substr() function in C++

          The way to cut any portion from a string is called a sub-string. The substr() function exists in C++ to generate a new string by cutting a particular portion from a string. The string.h library file is required to include to use this function. This function has two arguments. The first argument contains the starting position of the new string, and the second argument contains the length of the string. The way to use the substr() function in C++ has been explained in this tutorial.

        • How to use find_first_of() function in C++

          Different built-in functions exist in C++ to work with the string data. The find_first_of() function is used to find the location of the first occurrence of the specified character. This function returns the position of the first occurrence of the string that will be given as the argument value of this function. Different uses of this function for searching the string in C++ have been explained in this tutorial.

  • Leftovers

    • Hardware

      • Xiaomi's road to Internet-of-Things dominance

        Xiaomi entered the competitive Chinese mobile phone market in 2010 with MIUI, an Android-based smartphone software product which it offered for free. By 2017, it had achieved global recognition as a leading smartphone manufacturer and reached US$15 billion in revenue. Today, Xiaomi is the world’s largest Internet-of-Things (IoT) firm and by the end of 2020 had revenues exceeding US$37 billion.

    • Health/Nutrition

      • These 20 startups are impacting the livelihood of farmers and the future of food in Latin America

        The Visa Foundation and Village Capital - the world's largest organization supporting early-stage startups - announced the 20 startups selected for their Future of Food in Latin America 2021 program .

        The call sought entrepreneurs who are building high-growth projects in the agritech and foodtech sectors and received 117 applications from 15 countries in the region such as: Argentina, Bolivia, Brazil, Chile, Colombia, Costa Rica, Ecuador, El Salvador, Guatemala , Mexico, Panama, Paraguay, Peru, Saint Lucia and Uruguay.

        These are the selected ventures:

    • Integrity/Availability

      • Proprietary

        • Pseudo-Open Source

          • Privatisation/Privateering

            • Who Owns the Beach? Battle for Israeli Paradise Heats Up

              Uri Schor, a resident of Zichron Yaakov, is a family man, software developer, surfer and mountain biker. In recent years he has been devoting a considerable amount of his time to an issue that upsets him: public access to the beach at Kibbutz Ma’agan Michael. Schor is the beach’s freedom fighter. A one-man guerilla unit.

              He is incredibly organized. He has every document needed to prove the injustice he says is being committed there. He has a mountain of correspondence with the authorities, government ministries and law enforcement agencies. The paperwork could probably cover Israel’s more than 190 kilometers of shoreline. But while there still is no solution, Schor has endless patience. He smiles and explains why all the agencies involved have failed to protect the beach and allow free access to the public.

        • Security

          • Smurf Attack

            A Smurf attack is a type of Denial-of-Service Attack (DOS) where an attacker exploits internet control message protocol (ICMP) packets. The attack surfaces when an attacker sends a massive flood of spoofed ICMP echo_request packets to the target victim.

            This article will learn about how a Smurf attack is executed and how much damage a Smurf attack can cause to a network. The article will also describe preventive measures against a Smurf attack.

          • MAC Flooding Attack

            A data link layer acts as a medium for communication between two directly connected hosts. At the sending front, it transforms the data stream into signals bit by bit and transfers it to the hardware. On the contrary, as a receiver, it receives data in the shape of electrical signals and transforms them into an identifiable frame.

            MAC can be classified as a sublayer of the data link layer that is accountable for physical addressing. MAC address is a unique address for a network adapter allocated by the manufactures for transmitting data to the destination host. If a device has several network adapters i.e., Ethernet, Wi-Fi, Bluetooth, etc., there would be different MAC addresses for each standard.

            In this article, you’ll learn how this sublayer gets manipulated to execute the MAC flooding attack and how we can prevent the attack from happening.

          • "LemonDuck": New crypto malware targeting Windows, Linux systems [Ed: Media that acts as if Microsoft is an authority in security rather than provocateur working for NSA]

            Microsoft has warned customers about a new crypto mining malware that can steal credentials, remove security controls, spread via emails and ultimately drop more tools for human-operated activity.

          • BLAKE3 v1.0 Released - Faster & More Secure Than SHA-1, Etc - Phoronix

            The BLAKE3 cryotpgraphic hash function that was announced last year and based on its predecessor BLAKE2 has now reached version 1.0 for its official/reference software implementation. BLAKE3 continues to be much faster than BLAKE2 while also being much faster than the likes of SHA-1/SHA--2/SHA-3 and even MD5 while being more secure.

          • Privacy/Surveillance

            • Synthetic data – A new solution solving historic healthcare privacy challenges

              We have become all too accustomed – even desensitized – to reading stories of data breaches, misuse and evocative privacy debates. Malicious cyberattacks with the goal of harvesting information are now par for the course. According to the HIPAA Journal, 62 healthcare-focused data breaches occurred in April of this year alone, exposing the contents of 2.5 million medical records – a number that is historically high but unfortunately eye level with prior months. Combined with the observable and frightening rise in ransomware attacks targeting the sector, the risk to patient data is at an all-time high and healthcare organizations are chronically ill-prepared to combat it. So, it is easy to appreciate the legitimate paranoia that data custodians have towards data management and, along with the restrictions imposed by legislation, the self-imposed restrictive governance severely limiting access to production data.

    • Defence/Aggression

    • Environment

      • Energy

        • Solar, efficiency money trickles into damaged Minneapolis neighborhoods

          The future of Minneapolis’ Lake Street will be powered in part by solar.

          As business and building owners rebuild in the wake of last year’s civil unrest after the police killing of George Floyd, dozens are seeking public funding for solar projects, including some designed to incorporate racial equity goals.

          Thirty-four property owners have been awarded money for solar installations through the city’s Green Cost Share program. Another dozen program applicants are receiving money for energy efficiency upgrades.

    • Civil Rights/Policing

    • Monopolies

      • Patents

        • [Older] Forum Shopping: How A Retailer’s Patent-Related Communications May Impact Jurisdiction

          In a recent case, Trimble Inc. v. PerDiemCo LLC, No. 2019-2164 (May 12, 2021), the Federal Circuit found that, sometimes, threatening a patent infringement action, or entering extensive patent license negotiations prior to filing suit, with a company having a presence in a particular state could subject you to jurisdiction in that state, even if you are located elsewhere.

          On one hand, this could provide a retailer with the ability to obtain declaratory judgment jurisdiction in a preferred home forum when the retailer is on the receiving end of infringement threats from a patent owner. On the other hand, this means that retailers should be aware of their communications regarding their own patents, and take care not to inadvertently subject themselves to a suit by a target alleging non-infringement in an unwanted jurisdiction.

        • Arguing Obviousness: Teaching Away versus an Alternative Approach [Ed: More fake patents that should never have been granted in the first place]

          Chemours is a 2015 spin-off from Du Pont. Its patents at issues here relate to a polymer having a high melt flow to allow high-speed extrusion to cover electrical wires. U.S. Patent Nos. 7,122,609 and 8,076,431. The claims require a standardized melt flow rate range: 30€±3 g/10 min along with other physical properties.

          Daikin petitioned for inter partes review, and the PTAB agreed that the claims were invalid as obvious based upon a single prior art reference, U.S. Patent No. 6,541,588 (“Kaulbach”). Judge Dyk’s dissenting opinion in this case explains that “[t]he only material difference between [Chemours] claim 1 and Kaulbach is that Kaulbach discloses (in Sample A11) a melt flow rate of 24 g/10 min, slightly lower than 27 g/10 min, the lower bound of the 30 €± 3 g/10 min rate claimed in claim 1 of the ’609 patent.” Actually, Kaulbach goes even further and expreslly discloses a melt flow rate of “15 g/10 min or greater” and includes the example of 24 g/10 min MFR.

          [...]

          Market Share vs Sales Numbers: The Board also held that market share evidence (rather than merely sales numbers) is required for a showing of commercial success. The Federal Circuit disagreed. “[M]arket share data, though potentially useful, is not required to show commercial success.”

          Blocking Patents: Still on Commercial Success, the Board also rejected the commercial success argument after finding that Chemours patents at issue blocked market competition — so that any commercial success would be due to the patent’s existence rather than the innovation’s marketability. On appeal, the Federal Circuit rejected this conclusion also as contrary to law, finding that the Board totally misapplied the blocking patent doctrine.

        • English courts will thrive in life sciences patent litigation alongside the UPC [Ed: Incredibly laughable nonsense from EPO propaganda mill IAM, pretending that UPC is about to happen ("even when the UPC is up and running"). Not gonna happen, but they think if they keep lying it'll sell services.]

          The UK will remain a key venue for biopharma patent litigants even when the UPC is up and running, argues IAM life sciences editor Adam Houldsworth. In fact, the English courts may acquire a new strategic significance working in parallel with the new system

        • Volpara Health Technologies (ASX:VHT) expands European patent portfolio [Ed: Volpara should know that European Patents aren't good anymore, based on EPO examiners]

          The patent covers the company's improved breast cancer screening analysis and is effective across 25 European countries

        • [Older] Form versus Function – Protecting Products with Design and Utility Patents [Ed: No, patents on design should never even exist; designs are covered by other laws. This is misuse of patent law, enabled by aggressive lobbying and corruption of the system.]

          If you think patents are all about protecting something “technical” or something only a scientist or engineer could appreciate, you are mistaken. Patents can protect how things look as well as how they work. If you want to protect how something works, you need a Utility Patent. If you want to protect how something looks, you need a Design Patent.

          [...]

          In deciding which type of patent is right for you, be sure to work with a patent attorney who has written, prosecuted, and litigated both types, so you too can independently assess the benefits/downsides of both.

        • Biden’s stance on patents – what we know six months in [Ed: In the propaganda mill of nihilistic patent extremists (who would rather see millions die than accept a much-needed patent waiver) Patrick Wingrove uses a veiled attack on Biden's patent stance. How do they sleep at night? On a pillow of cash from patent trolls' loot.]

          The US president’s executive order on antitrust law and support for a COVID IP waiver don’t inspire confidence, but a USPTO head nomination will reveal more

        • IP Forecast: Verizon To Face Texas Jury In Wireless Row

          A Texas jury next week is set to consider whether Verizon's LTE network services infringe a wireless patent developed by a University of Florida professor.

          Nearly four years after Mobility Workx LLC filed suit, Verizon Communications Inc. and its affiliates will tell the jury on Monday that its cellular networks do not infringe a 2007 patent registered to UF professor Sumi Helal and an engineer, both of whom run Mobility Workx.

          The patent, covering a method of imitating mobile communications in networks, is the sole patent remaining out of the three Mobility Workx accused Verizon of infringing. One was dropped after...

        • High-level online meetings enhance user engagement at the EPO [Ed: The criminals who run the EPO pretend to be "engaging"... but only with thugs whom they collude with, against the public and even against EPO workers]

          As part of the EPO's continuous dialogue with users and user associations across all sectors, the latest in a series of high-level meetings with top applicants, small and medium sized enterprises (SMEs) and high-growth firms (HGFs) took place online on Wednesday 21 July. To date, ten meetings have taken place with key applicants from Asia, Europe and the US, including four of the top ten applicants at the EPO and three SMEs. Several of the meetings were hosted by EPO President António Campinos and further meetings are planned in the course of the year, including with user associations.

          [...]

          Finally, applicants expressed an interest in technical follow-up meetings as well as holding high-level meetings on an annual basis. The meetings, which are set to take place frequently with applicants from all sectors, supplement the Office's comprehensive outreach programme, which includes further regular exchanges with user groups such as epi, Business Europe, SACEPO and AIPPI, among others. The widespread use of online meeting platforms and tools has allowed the EPO to increase its dialogue with its stakeholders, and the Office will explore how to capitalise on the advantages of hybrid meeting environments further as it heads towards a new normal.

        • Guest Post: The Quality and Attributes of Patents as Property

          Over the past decade, Congress and the courts have made changes that have improved the patent system and encouraged American leadership in innovation. With our nation in a period of economic recovery, now is not the time to threaten that important progress.

          Expansionists who claim that the U.S. needs more and stronger intellectual property are fond of arguing that patents convey constitutionally protected property that must receive treatment equal to that of tangible property. This has become a favorite talking point in their efforts to undo the positive changes made over the last decade by Congress and the Supreme Court. However, patents are not of the same quality and don’t have the same attributes as traditional property.

          Adherents of this view equate patents with the deeds that convey ownership of real property. Just as a deed describes the boundaries of a parcel of land and transfers rights to the landowner, they argue that a patent defines the metes and bounds of an invention and grants ownership rights to the inventor or the inventor’s assignee. This “property equivalence” argument has been at the heart of dozens of petitions to the Supreme Court seeking to challenge the inter partes review (IPR) process, which allows the Patent Office to review patents to determine whether they should have been issued. The expansionist view is that patent rights should be held inviolate and that – like landowners – patent holders deserve to enjoy “quiet title” to their inventions.

          [...]

          To ensure clear boundaries, the written description requirement would need to be strictly enforced by USPTO. To prevent patentees from redrawing the boundaries of their property, patent prosecution would also need to be reformed to limit continuation practice and to bring a reliable, finite end point to the patenting process.

          Patent quality would also need to be substantially improved. An effective property regime doesn’t require that every grant of rights be valid, but it does require a vastly lower invalidity rate than that of the current system. This would require increasing fees, devoting substantially more than 19 hours for examination, and applying significantly more stringent standards to ensure the boundary lines are clear.

          There would also be a need to create an effective means of identifying ownership interests – similar to the recordation system for real property – that requires assignments and perhaps FRAND licensing obligations (which are like liens) to be recorded and made publicly available. A host of other real property doctrines – from nuisance to adverse possession to trespass by necessity – would also need to be incorporated into this system.

          The resulting regime is what treating patents “like real property” would actually look like. I suspect that patent expansionists would find such a regime highly disadvantageous and supremely objectionable, but I’d be happy to be proved wrong. Either way, if they want their arguments to hold any water, those who claim patents should be treated like real property should be championing reforms to make the patent system work a lot more like a property system – and right now, they aren’t.

        • BRAIN Biotech AG: Novel Genome Editing Tool: Filing of International Patent Application
        • How much data is needed for biotech applications at the EPO?

          As a trainee patent attorney Claire has worked with a range of clients in the biotechnology and pharmaceutical areas, on applications related to a broad range of technologies, including antibodies, industrial biotechnology, gene therapies, RNA therapies, new chemical entities and drug repurposing.

          “How much data do I need to file a patent application?” This is a question we get asked by many clients in the biotechnology and pharmaceutical field. In particular, this has been a more pressing concern during the pandemic as many companies had to restrict the number of scientists working in laboratories to allow social distancing. Some projects progressed a little slower than planned, delaying data read- outs.

          Supporting an invention with sufficient data is however critical when applying for a patent at the European Patent Office (EPO), specifically in the biotech field and in the pharmaceutical field. This is particularly important when complying with the requirements for inventive step and sufficiency under European practice. An Examiner will assess whether it is plausible that the invention performs as claimed and whether the technical problem that the invention is said to solve, is actually solved. The invention must be rendered plausible at the priority date of the application, and in the life sciences field, data is usually required to demonstrate this.

        • Neurim Takes Second Shot At Pulling Generic Insomnia Drug

          Neurim Pharmaceuticals has launched a second round of litigation against two Viatris Inc. subsidiaries to try and pull a generic version of its insomnia medication off the market, despite a ruling from the European Patent Office last year that revoked the company's parent patent.

          The High Court claim, which became newly public on July 15, focuses on a so-called divisional patent of the parent, for a melatonin-based insomnia drug. While the parent patent was revoked by the EPO back in 2019, the descendant patent is still in force, according to the new claim.

        • Software Patents

          • Targeted Advertising Still Patent Ineligible Subject Matter

            The US Court of Appeals for the Federal Circuit found that targeted advertising is still an abstract idea and that a system providing targeted advertising must utilize something more than generic features and routine functions to be eligible for patent protection. Free Stream Media Corp. v. Alphonso Inc., Case No. 19-1506 (Fed. Cir. May 11, 2021) (Reyna, J.)

            Free Stream Media, d.b.a. Samba, owns a patent directed to “a system providing a mobile phone user with targeted information (i.e., advertisements) that is deemed relevant to the user based on data gathered from the user’s television.” The system has three main components: (1) a networked device (e.g., a smart TV) that collects primary data, including program information, location, weather information or identification information; (2) a client device (e.g., a mobile device) on which applications run and advertisements may be shown; and (3) a relevancy-matching server that uses the primary data to select advertisement or other targeted data based on a relevancy factor associated with the user. Specifically, the relevancy-matching server “may also be configured to render the targeted data to the user through the networked device and/or the sandboxed application of the client device.”



Recent Techrights' Posts

Comparing U.E.F.I. to B.I.O.S. (Bloat and Insecurity to K.I.S.S.)
By Sami Tikkanen
New 'Slides' From Stallman Support (stallmansupport.org) Site
"In celebration of RMS's birthday, we've been playing a bit. We extracted some quotes from the various articles, comments, letters, writings, etc. and put them in the form of a slideshow in the home page."
Thailand: GNU/Linux Up to 6% of Desktops/Laptops, According to statCounter
Desktop Operating System Market Share Thailand
António Campinos is Still 'The Fucking President' (in His Own Words) After a Fake 'Election' in 2022 (He Bribed All the Voters to Keep His Seat)
António Campinos and the Administrative Council, whose delegates he clearly bribed with EPO budget in exchange for votes
Adrian von Bidder, homeworking & Debian unexplained deaths
Reprinted with permission from Daniel Pocock
 
Sainsbury's: It Takes Us Up to Two Days to Respond to Customers Upon Escalation (and Sometimes Even More Than Two Days)
It not only does groceries but also many other things, even banking
People Don't Just Kill Themselves (Same for Other Animals)
And recent reports about Boeing whistleblower John Barnett
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, March 18, 2024
IRC logs for Monday, March 18, 2024
Suicide Cluster Cover-up tactics & Debian exposed
Reprinted with permission from Daniel Pocock
Gemini Links 19/03/2024: A Society That Lost Focus and Abandoning Social Control Media
Links for the day
Matthias Kirschner, FSFE: Plagiarism & Child labour in YH4F
Reprinted with permission from Daniel Pocock
Linux Foundation Boasting About Being Connected to Bill Gates
Examples of boasting about the association
Alexandre Oliva's Article on Monstering Cults
"I'm told an earlier draft version of this post got published elsewhere. Please consider this IMHO improved version instead."
[Meme] 'Russian' Elections in Munich (Bavaria, Germany)
fake elections
Sainsbury's to Techrights: Yes, Our Web Site Broke Down, But We Cannot Say Which Part or Why
Windows TCO?
Plagiarism: Axel Beckert (ETH Zurich) & Debian Developer list hacking
Reprinted with permission from Daniel Pocock
Links 18/03/2024: Putin Cements Power
Links for the day
Flashback 2003: Debian has always had a toxic culture
Reprinted with permission from Daniel Pocock
Sainsbury’s Epic Downtime Seems to be Microsoft's Fault and Might Even Constitute a Data Breach (Legal Liability)
one of Britain's largest groceries (and beyond) chains
[Meme] You Know You're Winning the Argument When...
EPO management starts cursing at everybody (which is what's happening)
Catspaw With Attitude
The posts "they" complain about merely point out the facts about this harassment and doxing
'Clown Computing' Businesses Are Waning and the Same Will Happen to 'G.A.I.' Businesses (the 'Hey Hi' Fame)
decrease in "HEY HI" (AI) hype
Free Software Needs Watchdogs, Too
Gentle lapdogs prevent self-regulation and transparency
Matthias Kirschner, FSFE analogous to identity fraud
Reprinted with permission from Daniel Pocock
Gemini Links 18/03/2024: LLM Inference and Can We Survive Technology?
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, March 17, 2024
IRC logs for Sunday, March 17, 2024
Links 17/03/2024: Microsoft Windows Shoves Ads Into Third-Party Software, More Countries Explore TikTok Ban
Links for the day
Molly Russell suicide & Debian Frans Pop, Lucy Wayland, social media deaths
Reprinted with permission from Daniel Pocock
Our Plans for Spring
Later this year we turn 18 and a few months from now our IRC community turns 16
Open Invention Network (OIN) Fails to Explain If Linux is Safe From Microsoft's Software Patent Royalties (Charges)
Keith Bergelt has not replied to queries on this very important matter
RedHat.com, Brought to You by Microsoft Staff
This is totally normal, right?
USPTO Corruption: People Who Don't Use Microsoft Will Be Penalised ~$400 for Each Patent Filing
Not joking!
The Hobbyists of Mozilla, Where the CEO is a Bigger Liability Than All Liabilities Combined
the hobbyist in chief earns much more than colleagues, to say the least; the number quadrupled in a matter of years
Jim Zemlin Says Linux Foundation Should Combat Fraud Together With the Gates Foundation. Maybe They Should Start With Jim's Wife.
There's a class action lawsuit for securities fraud
Not About Linux at All!
nobody bothers with the site anymore; it's marketing, and now even Linux
Links 17/03/2024: Abuses Against Human Rights, Tesla Settlement (and Crash)
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, March 16, 2024
IRC logs for Saturday, March 16, 2024
Under Taliban, GNU/Linux Share Nearly Doubled in Afghanistan, Windows Sank From About 90% to 68.5%
Suffice to say, we're not meaning to imply Taliban is "good"
Debian aggression: woman asked about her profession
Reprinted with permission from Daniel Pocock
Gemini Links 17/03/2024: Winter Can't Hurt Us Anymore and Playstation Plus
Links for the day