Gemini version available ♊︎

Links 25/7/2021: MyGNUHealth 1.0.3 and Lots About Patents

Posted in News Roundup at 3:58 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • The History of Various Linux Distros

        Linux has been around for 30 years, beginning back in 1991. Yes, it’s that old, and it did make history. If you are interested in the history of some of the major Linux distros, here it is in a nutshell – the history of various Linux distros, like Ubuntu, Fedora, REHL, Linux Mint, Slackware, etc. Finally learn more about why they were created and what makes each different.

        Note: As there are plenty of distros out there, we are only focusing on a few major distros.

      • Google fixes ‘Chromebork’ one-character code typo that prevented Chrome OS logins

        Google has fixed a bug in Chrome OS version 91.0.4472.165 that surfaced on Monday and prevented some users from being able to login to their systems.

        Chrome OS downloads updates automatically but doesn’t apply them until reboot, so only those who restarted their Chromebooks to ingest the force-fed broken update were affected.

        Earlier this week, the internet titan on its Google Workplace status page said, “Our engineering team has identified an issue on Chrome OS 91.0.4472.165. The rollout of this version was halted.”

        As a workaround for those bitten by the bug, Google advised users: to “powerwash” their Chrome OS devices back to factory settings; to rollback the Chrome OS device to a previous version via USB; or to remove the affected account and add the account back to the device. All three mitigations, however, clear local data on the device.

    • Audiocasts/Shows

    • Benchmarks

      • Ubuntu vs. Arch Linux On The ASUS ROG Strix G15 / Ryzen 9 5900HX

        This past week were the initial Linux benchmarks of the Ryzen 9 5900HX with the ASUS ROG Strix G15 laptop. Ubuntu was used as the default test platform as usual given its popularity and arguably the most relevant Linux distribution to use given that it’s the most common Linux distribution at the moment for preloads on laptops by multiple vendors. In any case, as usual many users were quick to say “but Arch Linux!” as if it was going to make a dramatic difference in my findings. Well, here are some Ubuntu 21.04 versus Arch Linux benchmarks on that AMD Advantage laptop.

    • Instructionals/Technical

      • systemd on Linux 3: Targets

        Learn how systemd targets work in Linux.

      • How to Use AutoKey to Automate Repetitive Tasks on Linux

        AutoKey is a scripting application for Linux. It lets you automate repetitive and trivial operations on your computer so you can perform them quickly and efficiently.

        Some of the tasks where AutoKey serves well include text expansion, correcting typos, launching programs, and inserting boilerplate texts. Besides, you can also use it to run custom scripts to automate complex system actions on your machine.

        That said, though, AutoKey can be intimidating to its first-time users. To this end, here’s a guide to help you install, set up, and use AutoKey on Linux.

      • Run an Ansible playbook in a chroot

        Running a playbook in a chroot or container is not supported by Ansible, but I have invented a good workaround to do it anyway.

        The first step is to install Mitogen for Ansible (ansible-mitogen in Debian) and then configure ansible.cfg to use it…

      • Using Pacman on Arch and Manjaro – Linux Nightly

        When trying out a new Linux distribution, one of the first things you need to familiarize yourself with is the system’s package manager. Arch Linux and other Arch-based distros, like Manjaro, use pacman to install or update packages, remove software, and keep the system up to date. Pacman isn’t related to the classic video game, rather just an acronym of package manager.

        In this guide, you’ll learn how to use pacman on Arch Linux, Manjaro, and other distros based on Arch. It works the same across any of them. Read on to master pacman with commands to install packages, remove packages, update the system, etc.

      • Learn Tar Command in Linux with Practical Examples

        Tar command in Linux is used to archive files and folder into a single archived compressed file. Linux admins use tar command to perform day to day backup and restoration tasks. In other words, we can say that tar command is a command line utility which is used to archive important files and folders of a Linux system and later we can extract files and folders from that archive for restoration purpose.

      • How to Restore Git to Previous State: Guide to Restore, Reset, Revert and Rebase – Linux Hint

        If you have a development background, then you must be aware of many development tools. When you individually develop a project through any programming language, you’re either comfortable with a command-line interface (terminal) or GUI tools.
        But what if you’re working with the team members, it is hard to send chunks of programs to all team members individually. There is also a size limit of files on different platforms that don’t allow the user to send more than the described size.

        It is hard to collaborate when the project is too large and needs modification all the time. For this, you need a distributed version control system that helps you collaborate with team members worldwide. It is good to use a distributed version control system for small and large software projects. Each of the team members will get full access to the complete repository on the local system, and they can work offline.

      • How To Install RabbitMQ on AlmaLinux 8 – idroot

        In this tutorial, we will show you how to install RabbitMQ on AlmaLinux 8. For those of you who didn’t know, RabbitMQ is open-source message-broker software built around Advanced Message Queuing Protocol (AMQP) protocol. RabbitMQ can be easily deployed in a distributed and federated configurations to meet high-scale, high-availability requirements.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the RabbitMQ on AlmaLinux 8. You can follow the same instructions for Rocky Linux.

      • How to play Observer on Linux

        Observer is a cyberpunk horror game developed by Bloober Team and published by Aspyr. It was released on Windows, PS4, and Xbox in 2017, and later on, it came to Linux. In this guide, we’ll show you how to play it on Linux.

      • How to play Orwell on Linux

        Orwell is a simulation video game by Osmotic Studios. In the game, the player assumes the role of an operative and monitors security cameras for national security threats. Here’s how to play it on Linux.

      • How to install Reveal.js on Ubuntu – Unixcop

        reveal.js is an open-source HTML presentation framework. It’s a tool that enables anyone with a web browser to create fully-featured and beautiful presentations for free.

        Presentations made with reveal.js are built on open web technologies. That means anything you can do on the web, you can do in your presentation. Change styles with CSS, include an external web page using an <iframe> or add your own custom behavior using our JavaScript API.

        So in these times of pandemic, this tool can be quite useful for many students and teachers.

      • How to Automatically Set New Wallpapers Using Styli.sh on Linux

        Linux is widely known among enthusiasts for the productivity and the control it offers to its users. However, one of the things that often goes unnoticed is its flexibility in terms of customizations.

        Speaking of customizations, the wallpaper is a simple yet fundamental aspect of the Linux desktop that can make or break its aesthetics. Finding the perfect wallpaper manually can be tough. So why not let a simple script take the pain away? Let’s find out more about this script in detail.

      • Sed Command to Delete a Line – Linux Hint

        Sed is a built-in Linux tool for text manipulation. The term sed stands for “stream editor”. Despite the name, sed isn’t a text editor by itself. Rather, it takes text as input, performs various text modifications according to instructions, and prints the output.

        This guide will demonstrate how to use sed to delete a line from a text.

      • Network OSI Layers Explained – Linux Hint

        The Open System Interconnection (OSI) model conceptually illustrates seven abstraction layers of communication framework that devices use for interoperability over the network. In the 1980s, the model was a globally accepted standard framework for network communication.

        The model defines a set of rules and regulations required to render interoperability between different software and devices.

        It was introduced by the Internet Organisation of Standards in 1984 when computer networking was only becoming a new concept. Even though the internet these days is based on a simpler networking model, TCP/IP. The OSI 7-layer model is still used to visualize the basic essential networking architecture and troubleshoot problems.

      • kubectl – How to Restart the Pod – Linux Hint

        A pod can also have one or more containers, one of which is the application container, and the others are the init container, which halts after it completes a job or the application container is ready to perform its function, and the sidecar container, which is affixed to the primary application container. A container or pod will not always leave due to an application failure. In scenarios like this, you will need to restart your Kubernetes Pod explicitly. In this guide, you will explore how to force pods in a deployment to restart using several ways.

    • Proposed Reflink Support Would Provide Big Space Savings For Wine

      When sticking to Wine recommendations of maintaining separate prefixes per-application, a lot of system files get duplicated for each game/application and in turn leading to significant bloat. With the current state of Wine it can mean hundreds of megabytes per prefix in duplicated files. But proposed reflink patches for Wine are aiming to cut down on this severe bloat.

      Developer Alex Xu sent out a set of patches today that would implement Reflink support within Wine. Alex explained, ” With a MinGW build of Wine without Mono or Gecko, new 32-bit prefixes are over 150 MB, and new 64-bit prefixes are over 300 MB. The vast majority of these files are byte-for-byte identical to Wine’s central DLL copies…When reflink is supported by the underlying filesystem, new Wine prefix sizes with Mono and Gecko disabled are reduced to less than 1 MB. The resulting Wine prefix is byte-for-byte identical to one created without reflink, but occupies less space on disk. ”

  • Games

    • Play Control Ultimate Edition on Linux (How To)

      Control Ultimate Edition is an adventurous game packed with actions and thrillers. The developers of the game “Remedy Entertainment” successfully marked the title of the game in gaming publications and were nominated for numerous video game awards. Control Ultimate Edition is available on the platform across Ps4/5, Xbox Series X/One, Epic Games Stores, Pc, and Steam.

      #gnu #linux not falling behind. https://www.gadgetheadline.com/play-control-ultimate-edition-on-linux-how-to/

  • Devices/Embedded

  • Free, Libre, and Open Source Software

    • Productivity Software/LibreOffice/Calligra

      • Hamsters QA team are trying to decrease a number of unconfirmed bug reports in LibreOffice’s Bugzilla right now

        I found an interesting Russian site and Telegram channel where newbies QA try to get some experience in QA process for free. Its name is Хомячки (Hamsters). You can ask admins to create a group for testing of anything and if someone want they will test your software (mobile, web, desktop or something) for you.
        I asked there if someone want to test LibreOffice and many people said yes. So, today we have the group of Russian newbies QA who are triaging bug reports in our Bugzilla. We have a goal – to have minimal number of unconfirmed bug reports in end of August 2021 as possibly.

    • FSF

      • GNU Projects

        • health @ Savannah: Release of MyGNUHealth 1.0.3

          I am happy to announce that the release 1.0.3 of the GNU Health Personal Health Record (PHR) component, MyGNUHealth.

          This release updates the medical genetics domain, with the latest human natural variant dataset based on UniProt Consortium (release 2021_03 of June 02 2021).

    • Programming/Development

      • Dirk Eddelbuettel: littler 0.3.13: Moar Goodies

        The fourteenth release of littler as a CRAN package just landed, following in the now fifteen year history (!!) as a package started by Jeff in 2006, and joined by me a few weeks later.

        littler is the first command-line interface for R as it predates Rscript. It allows for piping as well for shebang scripting via #!, uses command-line arguments more consistently and still starts faster. It also always loaded the methods package which Rscript only started to do in recent years.

        littler lives on Linux and Unix, has its difficulties on macOS due to yet-another-braindeadedness there (who ever thought case-insensitive filesystems as a default were a good idea?) and simply does not exist on Windows (yet – the build system could be extended – see RInside for an existence proof, and volunteers are welcome!). See the FAQ vignette on how to add it to your PATH.

      • Python

        • Python Increment by 1 – Linux Hint

          When you’re acquainted with Python, you’re probably aware that the Increment and Decrement expressions (both before and after) aren’t supported. Python was created to be understandable and consistent. In linguistics having ++ and — expressions, a beginner programmer frequently makes the mistake of confusing the distinctions among increment/decrement expressions, post and pre (both in priority and return value). In comparison to many other programming languages, basic increment and decrement expressions are not quite as necessary. In this tutorial, we will learn about the increment by 1 operator in Python code. Make sure you must have a python tool installed and configured on your system. Hence, we have installed the Spyder Python tool on our system.

        • Python Not Equal Operator – Linux Hint

          While contrasting variables, it’s important to examine both the contents and respective datatypes. Whenever the values of the two inputs differ, the statement is satisfied. Throughout Python, we may use “!=” or “is not” to do not equal operations. Whenever the values of any two Python variables or operands supplied on either side of the not equal operator are not equal, it must return true, else false. Many structured query languages might grumble about matching various types since Python is flexibly yet tightly typed. The not equal operator must return “True” whenever the values provided in two variables are the same; however, they are of various types. Let’s have some examples to see the working of python Not equal operator. First of all, you must ensure that your system has a python tool installed and configured. Launch your installed python tool to start working. At the time of implementing this article, we have been working on the Spyder Python tool.

      • Shell/Bash/Zsh/Ksh

        • Bash for Loop in One Line

          In any programming or scripting language, the loop is a quintessential feature. Loops are generally to perform a repetitive task until a certain condition is met. Bash is a powerful scripting language that supports all the major features of a scripting language (including loops).

          This guide demonstrates one-line for loops in Bash.

      • C

        • Strstr in C – Linux Hint

          Strstr() in the C language is a built-in function. The functionality of strstr can be understandable through the manual present in the Ubuntu terminal if you are working on Ubuntu. Then the terminal will show you the guide of strstr and how it works.

        • Strtok C – Linux Hint

          The C language of programming has a facility to split a string using the function strtok. This is done through a delimiter. It is an easy task that uses a pointer token. A string that is taken as input is divided into small strings called tokens. ‘S’ is the name that indicates that in “strtok”, str stands for the string, and “tok” stands for the token. So this function splits the string into tons of tokens. We have highlighted some examples in this tutorial that will help you out understand this concept.

      • C++

        • String Concatenation in C++

          The way to merge two or more strings is called string concatenation. It is a very common task for any programming language. Some programming languages use a specific operator, some programming languages use the built-in function, and some programming languages use both operator and built-in function to combine string values. The string concatenation can be done by using the ‘+’ operator and different types of built-in functions in C++. The uses of the ‘+’ operator and different built-in functions to combine strings in C++ have been explained in this tutorial.

        • Passing an Array to a Function C++

          An array is a group of elements of the same data type. Many functions are performed on arrays either in the main program or outside it, in the functions. In C++, in the case of functions, we need to pass them. This is done via parameters as arguments. These arguments can be of different ways, either sizeable arrays or through the pointer array. In this tutorial, we will cover some major aspects of array transfer using different parameters of the functions.

        • How to use substr() function in C++

          The way to cut any portion from a string is called a sub-string. The substr() function exists in C++ to generate a new string by cutting a particular portion from a string. The string.h library file is required to include to use this function. This function has two arguments. The first argument contains the starting position of the new string, and the second argument contains the length of the string. The way to use the substr() function in C++ has been explained in this tutorial.

        • How to use find_first_of() function in C++

          Different built-in functions exist in C++ to work with the string data. The find_first_of() function is used to find the location of the first occurrence of the specified character. This function returns the position of the first occurrence of the string that will be given as the argument value of this function. Different uses of this function for searching the string in C++ have been explained in this tutorial.

  • Leftovers

    • Hardware

      • Xiaomi’s road to Internet-of-Things dominance

        Xiaomi entered the competitive Chinese mobile phone market in 2010 with MIUI, an Android-based smartphone software product which it offered for free. By 2017, it had achieved global recognition as a leading smartphone manufacturer and reached US$15 billion in revenue. Today, Xiaomi is the world’s largest Internet-of-Things (IoT) firm and by the end of 2020 had revenues exceeding US$37 billion.

    • Health/Nutrition

      • These 20 startups are impacting the livelihood of farmers and the future of food in Latin America

        The Visa Foundation and Village Capital – the world’s largest organization supporting early-stage startups – announced the 20 startups selected for their Future of Food in Latin America 2021 program .

        The call sought entrepreneurs who are building high-growth projects in the agritech and foodtech sectors and received 117 applications from 15 countries in the region such as: Argentina, Bolivia, Brazil, Chile, Colombia, Costa Rica, Ecuador, El Salvador, Guatemala , Mexico, Panama, Paraguay, Peru, Saint Lucia and Uruguay.

        These are the selected ventures:

    • Integrity/Availability

      • Proprietary

        • Pseudo-Open Source

          • Privatisation/Privateering

            • Who Owns the Beach? Battle for Israeli Paradise Heats Up

              Uri Schor, a resident of Zichron Yaakov, is a family man, software developer, surfer and mountain biker. In recent years he has been devoting a considerable amount of his time to an issue that upsets him: public access to the beach at Kibbutz Ma’agan Michael. Schor is the beach’s freedom fighter. A one-man guerilla unit.

              He is incredibly organized. He has every document needed to prove the injustice he says is being committed there. He has a mountain of correspondence with the authorities, government ministries and law enforcement agencies. The paperwork could probably cover Israel’s more than 190 kilometers of shoreline. But while there still is no solution, Schor has endless patience. He smiles and explains why all the agencies involved have failed to protect the beach and allow free access to the public.

        • Security

          • Smurf Attack

            A Smurf attack is a type of Denial-of-Service Attack (DOS) where an attacker exploits internet control message protocol (ICMP) packets. The attack surfaces when an attacker sends a massive flood of spoofed ICMP echo_request packets to the target victim.

            This article will learn about how a Smurf attack is executed and how much damage a Smurf attack can cause to a network. The article will also describe preventive measures against a Smurf attack.

          • MAC Flooding Attack

            A data link layer acts as a medium for communication between two directly connected hosts. At the sending front, it transforms the data stream into signals bit by bit and transfers it to the hardware. On the contrary, as a receiver, it receives data in the shape of electrical signals and transforms them into an identifiable frame.

            MAC can be classified as a sublayer of the data link layer that is accountable for physical addressing. MAC address is a unique address for a network adapter allocated by the manufactures for transmitting data to the destination host. If a device has several network adapters i.e., Ethernet, Wi-Fi, Bluetooth, etc., there would be different MAC addresses for each standard.

            In this article, you’ll learn how this sublayer gets manipulated to execute the MAC flooding attack and how we can prevent the attack from happening.

          • “LemonDuck”: New crypto malware targeting Windows, Linux systems [Ed: Media that acts as if Microsoft is an authority in security rather than provocateur working for NSA]

            Microsoft has warned customers about a new crypto mining malware that can steal credentials, remove security controls, spread via emails and ultimately drop more tools for human-operated activity.

          • BLAKE3 v1.0 Released – Faster & More Secure Than SHA-1, Etc – Phoronix

            The BLAKE3 cryotpgraphic hash function that was announced last year and based on its predecessor BLAKE2 has now reached version 1.0 for its official/reference software implementation. BLAKE3 continues to be much faster than BLAKE2 while also being much faster than the likes of SHA-1/SHA–2/SHA-3 and even MD5 while being more secure.

          • Privacy/Surveillance

            • Synthetic data – A new solution solving historic healthcare privacy challenges

              We have become all too accustomed – even desensitized – to reading stories of data breaches, misuse and evocative privacy debates. Malicious cyberattacks with the goal of harvesting information are now par for the course. According to the HIPAA Journal, 62 healthcare-focused data breaches occurred in April of this year alone, exposing the contents of 2.5 million medical records – a number that is historically high but unfortunately eye level with prior months. Combined with the observable and frightening rise in ransomware attacks targeting the sector, the risk to patient data is at an all-time high and healthcare organizations are chronically ill-prepared to combat it. So, it is easy to appreciate the legitimate paranoia that data custodians have towards data management and, along with the restrictions imposed by legislation, the self-imposed restrictive governance severely limiting access to production data.

    • Defence/Aggression

    • Environment

      • Energy

        • Solar, efficiency money trickles into damaged Minneapolis neighborhoods

          The future of Minneapolis’ Lake Street will be powered in part by solar.

          As business and building owners rebuild in the wake of last year’s civil unrest after the police killing of George Floyd, dozens are seeking public funding for solar projects, including some designed to incorporate racial equity goals.

          Thirty-four property owners have been awarded money for solar installations through the city’s Green Cost Share program. Another dozen program applicants are receiving money for energy efficiency upgrades.

    • Civil Rights/Policing

    • Monopolies

      • Patents

        • [Older] Forum Shopping: How A Retailer’s Patent-Related Communications May Impact Jurisdiction

          In a recent case, Trimble Inc. v. PerDiemCo LLC, No. 2019-2164 (May 12, 2021), the Federal Circuit found that, sometimes, threatening a patent infringement action, or entering extensive patent license negotiations prior to filing suit, with a company having a presence in a particular state could subject you to jurisdiction in that state, even if you are located elsewhere.

          On one hand, this could provide a retailer with the ability to obtain declaratory judgment jurisdiction in a preferred home forum when the retailer is on the receiving end of infringement threats from a patent owner. On the other hand, this means that retailers should be aware of their communications regarding their own patents, and take care not to inadvertently subject themselves to a suit by a target alleging non-infringement in an unwanted jurisdiction.

        • Arguing Obviousness: Teaching Away versus an Alternative Approach [Ed: More fake patents that should never have been granted in the first place]

          Chemours is a 2015 spin-off from Du Pont. Its patents at issues here relate to a polymer having a high melt flow to allow high-speed extrusion to cover electrical wires. U.S. Patent Nos. 7,122,609 and 8,076,431. The claims require a standardized melt flow rate range: 30±3 g/10 min along with other physical properties.

          Daikin petitioned for inter partes review, and the PTAB agreed that the claims were invalid as obvious based upon a single prior art reference, U.S. Patent No. 6,541,588 (“Kaulbach”). Judge Dyk’s dissenting opinion in this case explains that “[t]he only material difference between [Chemours] claim 1 and Kaulbach is that Kaulbach discloses (in Sample A11) a melt flow rate of 24 g/10 min, slightly lower than 27 g/10 min, the lower bound of the 30 ± 3 g/10 min rate claimed in claim 1 of the ’609 patent.” Actually, Kaulbach goes even further and expreslly discloses a melt flow rate of “15 g/10 min or greater” and includes the example of 24 g/10 min MFR.


          Market Share vs Sales Numbers: The Board also held that market share evidence (rather than merely sales numbers) is required for a showing of commercial success. The Federal Circuit disagreed. “[M]arket share data, though potentially useful, is not required to show commercial success.”

          Blocking Patents: Still on Commercial Success, the Board also rejected the commercial success argument after finding that Chemours patents at issue blocked market competition — so that any commercial success would be due to the patent’s existence rather than the innovation’s marketability. On appeal, the Federal Circuit rejected this conclusion also as contrary to law, finding that the Board totally misapplied the blocking patent doctrine.

        • English courts will thrive in life sciences patent litigation alongside the UPC [Ed: Incredibly laughable nonsense from EPO propaganda mill IAM, pretending that UPC is about to happen ("even when the UPC is up and running"). Not gonna happen, but they think if they keep lying it'll sell services.]

          The UK will remain a key venue for biopharma patent litigants even when the UPC is up and running, argues IAM life sciences editor Adam Houldsworth. In fact, the English courts may acquire a new strategic significance working in parallel with the new system

        • Volpara Health Technologies (ASX:VHT) expands European patent portfolio [Ed: Volpara should know that European Patents aren't good anymore, based on EPO examiners]

          The patent covers the company’s improved breast cancer screening analysis and is effective across 25 European countries

        • [Older] Form versus Function – Protecting Products with Design and Utility Patents [Ed: No, patents on design should never even exist; designs are covered by other laws. This is misuse of patent law, enabled by aggressive lobbying and corruption of the system.]

          If you think patents are all about protecting something “technical” or something only a scientist or engineer could appreciate, you are mistaken. Patents can protect how things look as well as how they work. If you want to protect how something works, you need a Utility Patent. If you want to protect how something looks, you need a Design Patent.


          In deciding which type of patent is right for you, be sure to work with a patent attorney who has written, prosecuted, and litigated both types, so you too can independently assess the benefits/downsides of both.

        • Biden’s stance on patents – what we know six months in [Ed: In the propaganda mill of nihilistic patent extremists (who would rather see millions die than accept a much-needed patent waiver) Patrick Wingrove uses a veiled attack on Biden's patent stance. How do they sleep at night? On a pillow of cash from patent trolls' loot.]

          The US president’s executive order on antitrust law and support for a COVID IP waiver don’t inspire confidence, but a USPTO head nomination will reveal more

        • IP Forecast: Verizon To Face Texas Jury In Wireless Row

          A Texas jury next week is set to consider whether Verizon’s LTE network services infringe a wireless patent developed by a University of Florida professor.

          Nearly four years after Mobility Workx LLC filed suit, Verizon Communications Inc. and its affiliates will tell the jury on Monday that its cellular networks do not infringe a 2007 patent registered to UF professor Sumi Helal and an engineer, both of whom run Mobility Workx.

          The patent, covering a method of imitating mobile communications in networks, is the sole patent remaining out of the three Mobility Workx accused Verizon of infringing. One was dropped after…

        • High-level online meetings enhance user engagement at the EPO [Ed: The criminals who run the EPO pretend to be “engaging”… but only with thugs whom they collude with, against the public and even against EPO workers]

          As part of the EPO’s continuous dialogue with users and user associations across all sectors, the latest in a series of high-level meetings with top applicants, small and medium sized enterprises (SMEs) and high-growth firms (HGFs) took place online on Wednesday 21 July. To date, ten meetings have taken place with key applicants from Asia, Europe and the US, including four of the top ten applicants at the EPO and three SMEs. Several of the meetings were hosted by EPO President António Campinos and further meetings are planned in the course of the year, including with user associations.


          Finally, applicants expressed an interest in technical follow-up meetings as well as holding high-level meetings on an annual basis. The meetings, which are set to take place frequently with applicants from all sectors, supplement the Office’s comprehensive outreach programme, which includes further regular exchanges with user groups such as epi, Business Europe, SACEPO and AIPPI, among others. The widespread use of online meeting platforms and tools has allowed the EPO to increase its dialogue with its stakeholders, and the Office will explore how to capitalise on the advantages of hybrid meeting environments further as it heads towards a new normal.

        • Guest Post: The Quality and Attributes of Patents as Property

          Over the past decade, Congress and the courts have made changes that have improved the patent system and encouraged American leadership in innovation. With our nation in a period of economic recovery, now is not the time to threaten that important progress.

          Expansionists who claim that the U.S. needs more and stronger intellectual property are fond of arguing that patents convey constitutionally protected property that must receive treatment equal to that of tangible property. This has become a favorite talking point in their efforts to undo the positive changes made over the last decade by Congress and the Supreme Court. However, patents are not of the same quality and don’t have the same attributes as traditional property.

          Adherents of this view equate patents with the deeds that convey ownership of real property. Just as a deed describes the boundaries of a parcel of land and transfers rights to the landowner, they argue that a patent defines the metes and bounds of an invention and grants ownership rights to the inventor or the inventor’s assignee. This “property equivalence” argument has been at the heart of dozens of petitions to the Supreme Court seeking to challenge the inter partes review (IPR) process, which allows the Patent Office to review patents to determine whether they should have been issued. The expansionist view is that patent rights should be held inviolate and that – like landowners – patent holders deserve to enjoy “quiet title” to their inventions.


          To ensure clear boundaries, the written description requirement would need to be strictly enforced by USPTO. To prevent patentees from redrawing the boundaries of their property, patent prosecution would also need to be reformed to limit continuation practice and to bring a reliable, finite end point to the patenting process.

          Patent quality would also need to be substantially improved. An effective property regime doesn’t require that every grant of rights be valid, but it does require a vastly lower invalidity rate than that of the current system. This would require increasing fees, devoting substantially more than 19 hours for examination, and applying significantly more stringent standards to ensure the boundary lines are clear.

          There would also be a need to create an effective means of identifying ownership interests – similar to the recordation system for real property – that requires assignments and perhaps FRAND licensing obligations (which are like liens) to be recorded and made publicly available. A host of other real property doctrines – from nuisance to adverse possession to trespass by necessity – would also need to be incorporated into this system.

          The resulting regime is what treating patents “like real property” would actually look like. I suspect that patent expansionists would find such a regime highly disadvantageous and supremely objectionable, but I’d be happy to be proved wrong. Either way, if they want their arguments to hold any water, those who claim patents should be treated like real property should be championing reforms to make the patent system work a lot more like a property system – and right now, they aren’t.

        • BRAIN Biotech AG: Novel Genome Editing Tool: Filing of International Patent Application
        • How much data is needed for biotech applications at the EPO?

          As a trainee patent attorney Claire has worked with a range of clients in the biotechnology and pharmaceutical areas, on applications related to a broad range of technologies, including antibodies, industrial biotechnology, gene therapies, RNA therapies, new chemical entities and drug repurposing.

          “How much data do I need to file a patent application?” This is a question we get asked by many clients in the biotechnology and pharmaceutical field. In particular, this has been a more pressing concern during the pandemic as many companies had to restrict the number of scientists working in laboratories to allow social distancing. Some projects progressed a little slower than planned, delaying data read- outs.

          Supporting an invention with sufficient data is however critical when applying for a patent at the European Patent Office (EPO), specifically in the biotech field and in the pharmaceutical field. This is particularly important when complying with the requirements for inventive step and sufficiency under European practice. An Examiner will assess whether it is plausible that the invention performs as claimed and whether the technical problem that the invention is said to solve, is actually solved. The invention must be rendered plausible at the priority date of the application, and in the life sciences field, data is usually required to demonstrate this.

        • Neurim Takes Second Shot At Pulling Generic Insomnia Drug

          Neurim Pharmaceuticals has launched a second round of litigation against two Viatris Inc. subsidiaries to try and pull a generic version of its insomnia medication off the market, despite a ruling from the European Patent Office last year that revoked the company’s parent patent.

          The High Court claim, which became newly public on July 15, focuses on a so-called divisional patent of the parent, for a melatonin-based insomnia drug. While the parent patent was revoked by the EPO back in 2019, the descendant patent is still in force, according to the new claim.

        • Software Patents

          • Targeted Advertising Still Patent Ineligible Subject Matter

            The US Court of Appeals for the Federal Circuit found that targeted advertising is still an abstract idea and that a system providing targeted advertising must utilize something more than generic features and routine functions to be eligible for patent protection. Free Stream Media Corp. v. Alphonso Inc., Case No. 19-1506 (Fed. Cir. May 11, 2021) (Reyna, J.)

            Free Stream Media, d.b.a. Samba, owns a patent directed to “a system providing a mobile phone user with targeted information (i.e., advertisements) that is deemed relevant to the user based on data gathered from the user’s television.” The system has three main components: (1) a networked device (e.g., a smart TV) that collects primary data, including program information, location, weather information or identification information; (2) a client device (e.g., a mobile device) on which applications run and advertisements may be shown; and (3) a relevancy-matching server that uses the primary data to select advertisement or other targeted data based on a relevancy factor associated with the user. Specifically, the relevancy-matching server “may also be configured to render the targeted data to the user through the networked device and/or the sandboxed application of the client device.”

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

DecorWhat Else is New

  1. Links 18/9/2021: GIMP 2.10.28 Released and Azure Remains Back Doored

    Links for the day

  2. IRC Proceedings: Friday, September 17, 2021

    IRC logs for Friday, September 17, 2021

  3. Links 17/9/2021: Ubuntu 18.04.6 LTS, Manjaro 21.1.3, “2021 is the Year of Linux on the Desktop”

    Links for the day

  4. Links 17/9/2021: WSL Considered Harmful

    Links for the day

  5. [Meme] Microsoft Loves Linux Bug/Back Doors

    Microsoft is just cementing its status as little but an NSA stooge

  6. Lagrange Makes It Easier for Anybody to Use Gemini and Even Edit Pages (With GUI)

    Gemini protocol and/or Gemini space are easy for anyone to get started with or fully involved in (writing and creating, not just reading); today we take a look at the new version of Lagrange (it was first introduced here back in March and covered again in April), which I installed earlier today because it contains a lot of improvements, including the installation process (now it’s just a click-to-run AppImage)

  7. IBM is Imploding But It Uses Microsoft-Type Methods to Hide the Demise (Splits, Buybacks, and Rebranding Stunts)

    A combination of brain drain (exodus) and layoffs (a lack of budget combined with inability to retain talent or attract the necessary staff with sufficiently competitive salaries) dooms IBM; but the media won't be mentioning it, partly because a lot of it is still directly sponsored by IBM

  8. IRC Proceedings: Thursday, September 16, 2021

    IRC logs for Thursday, September 16, 2021

  9. [Meme] 70 Days of Non-Compliance

    António Campinos would rather fall on his sword than correct the errors or work to undo the damage caused by Team Battistelli, which is still at the EPO

  10. EPO “Board 28” Meeting: Imaginary Dialogue Between EPO President Campinos and the Chair of the Administrative Council, Josef Kratochvíl

    The EPO‘s chaotic state, which persists after Benoît Battistelli‘s departure, is a state of lawlessness and cover-up

  11. Links 16/9/2021: Linux Mint Has New Web Site, LibreOffice 7.2.1, KDE Plasma 5.23 Beta, and Sailfish OS Verla

    Links for the day

  12. If Git Can be Done Over the Command Line and E-mail, It Can Also be Done Over Gemini (Instead of Bloated Web Browsers)

    In order to keep Git lean and mean whilst at the same time enabling mouse (mousing and clicking) navigation we encourage people everywhere to explore gemini://

  13. Techrights Examines a Wide Array/Range of Gemini Clients/Browsers

    After spending many months examining an array of different types of software for Gemini (including but not limited to clients/browsers) we take stock of what exists, what's supported (it varies a bit), and which one might be suitable for use by geeks and non-geeks

  14. Links 16/9/2021: KStars 3.5.5 and Chafa 1.8

    Links for the day

  15. Trusting Microsoft With Security is a Clown Show

    A quick and spontaneous video about this morning's post regarding a major new revelation that reaffirms a longstanding trend; Microsoft conflates national security (back doors) with security

  16. IRC Proceedings: Wednesday, September 15, 2021

    IRC logs for Wednesday, September 15, 2021

  17. Microsoft Azure and Back/Bug Doors in GNU/Linux: Fool Me Once (Shame on You) / Fool Me Twice (Shame on Me)

    "Fool me once, shame on you; fool me twice, shame on me," goes the old saying...

  18. Deleted Post: “LibreOffice is Becoming Dominated by a Bunch of Corporates, and Has no Place for the Enthusiastic Amateur.”

    Chris Sherlock, an insider of LibreOffice, cautions about the direction of this very important and widely used project

  19. Links 16/9/2021: Unifont 14.0.01, LibreOffice on ODF 1.3, Mozilla Pushing Ads (Sponsored 'Firefox Suggest'), and Microsoft Pushes Proprietary Direct3D via Mesa

    Links for the day

  20. Links 15/9/2021: Another Azure Catastrophe and Darktable 3.6.1

    Links for the day

  21. Open Invention Network (OIN) Recognises a Risk Posed to Cryptocurrencies (Danger From Software Patents), But OIN Still Proposes the Wrong Solutions

    Square is joining OIN, but it's another example of banking/financial institutions choosing to coexist with software patents instead of putting an end to them

  22. IRC Proceedings: Tuesday, September 14, 2021

    IRC logs for Tuesday, September 14, 2021

  23. (Super)Free Software As a Right – The Manifesto

    "Software text has long been recognized as “speech”, and is covered under the very same copyright laws as conventional printed matter."

  24. Links 15/9/2021: Java 17 / JDK 17 Released and ExpressVPN Sold

    Links for the day

  25. Latest Public Talk (Over BigBlueButton) by Richard Stallman is Now Online

    This video has been released; it starts with an old talk and then proceeds to a new discussion (14 minutes from the start)

  26. Richard Stallman Is Not Surrendering His Free Speech

    The homepage of Dr. Stallman looked like this on Saturday, 20 years since the September 11 attacks in the US, noting that “[t]oday we commemorate the September 11 attacks, which killed President Allende of Chile and installed Pinochet’s murderous military dictatorship. More than 3,000 dissidents were killed or “disappeared” by the Pinochet regime. The USA operated a destabilization campaign in Chile, and the September 11, 1973, attacks were part of that campaign.”

  27. Twitter -- Like Google's YouTube -- is 'Hiding' Tweets From People Who Follow You

    So-called 'entertainment' platforms disguised as 'social' aren't the future of media; they need to be rejected

  28. How to Track the Development or Construction of the Techrights Web Site and Gemini Capsule

    Following some busy publication schedule (heavy lifting for weeks) we're stopping a bit or slowing down for the purpose of site (or capsule) 'construction'; here's a status update

  29. Links 14/9/2021: Libinput 1.19, Kali Linux 2021.3, and ExTiX Deepin 21.9

    Links for the day

  30. [Meme] [Teaser] EPO Management, Always Right

    The only permissible and allowable/exercise-able “Right” at the EPO is “Shut up and work”; if you strike, the dictator du jour will authorise a drone strike

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts