Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:Patent title != patent protection (Score 4, Interesting) 67

I don't really have an opinion, as I was neither the prosecuting attorney nor the examiner in this application. Taking a quick look at the prosecution history, (https://patentcenter.uspto.gov/applications/17945472) adding the claim requirements "receive calls from the spreadsheet application that identify external functions named in non-native statements inside arguments of at least one native function named in cells of the spreadsheet, wherein the external functions comprise Python functions and are executable by the secure runtime environment and not by the spreadsheet application, and a name of the least one native function immediately follows an equal sign and comprises PY" were what got an allowance from the examiner. Prior to that, the examiner rejected the claims over Application No. 2020/0285694 (https://patents.google.com/patent/US20200285694A1/en?oq=US20200285694) in view of 2020/0278850 (https://patents.google.com/patent/US20200278850A1/en?oq=US20200278850). Again, I haven't evaluated the merits of the rejection or whether the amendment to add the limitations that resulted in allowance. I will say that, in order to make a rejection, an examiner must be able to point to publicly available documents (most typically published patent applications and patents, but can include so-called "non-patent literature" as frequently happens in software and the biological arts) that were public prior to the filing of the application to make the rejection. While I do not contest what you say as the "only thing that is unique" is python, the evidentiary burden for examiners is greater than conclusory statements, and it is frequently harder to find public documents disclosing what you think was publicly known than you might realize.

Comment Patent title != patent protection (Score 5, Informative) 67

Patent attorney here. The title of a patent can be used for providing the general gestalt of the invention a patent is directed to, but does NOT describe what is actually protected by the patent. There are three independent (base) claims (legally enforceable part of a patent) of the patent referenced in the article, as follows: 1. A computing apparatus comprising: one or more computer readable storage media; one or more processors operatively coupled with the one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media that, when executed by the one or more processors, direct the computing apparatus to at least: instantiate a secure runtime environment for a duration that a spreadsheet is open in a context of a spreadsheet application, wherein the secure runtime environment comprises a Python runtime environment and is external with respect to the context of the spreadsheet application; for the duration that the spreadsheet is open: receive calls from the spreadsheet application that identify external functions named in non-native statements inside arguments of at least one native function named in cells of the spreadsheet, wherein the external functions comprise Python functions and are executable by the secure runtime environment and not by the spreadsheet application, and a name of the least one native function immediately follows an equal sign and comprises PY; and execute the external functions in the secure runtime environment; and shutdown the secure runtime environment when the spreadsheet closes. 8. One or more computer readable storage media having program instructions stored thereon that, when executed by one or more processors of a computing device, direct the computing device to at least: instantiate a secure runtime environment for a duration that a spreadsheet is open in a context of a spreadsheet application, wherein the secure runtime environment comprises a Python runtime environment and is external with respect to the context of the spreadsheet application; for the duration that the spreadsheet is open: receive calls from the spreadsheet application that identify external functions named in non-native statements inside arguments of at least one native function named in cells of the spreadsheet, wherein the external functions comprise Python functions and are executable by the secure runtime environment and not by the spreadsheet application, and a name of the least one native function immediately follows an equal sign and comprises PY; and shutdown the secure runtime environment when the spreadsheet closes. 15. A method of operating a computing system, the method comprising: instantiating a secure runtime environment for a duration that a spreadsheet is open in a context of a spreadsheet application, wherein the secure runtime environment comprises a Python runtime environment and is external with respect to the context of the spreadsheet application; for the duration that the spreadsheet is open: receiving calls from the spreadsheet application that identify external functions named in non-native statements inside arguments of at least one native function named in cells of the spreadsheet, wherein the external functions comprise Python functions and are executable by the secure runtime environment and not by the spreadsheet application, and a name of the least one native function immediately follows an equal sign and comprises PY; and executing the external functions in the secure runtime environment; and shutting down the secure runtime environment when the spreadsheet closes. Now, is what's described in these claims truly novel and non-obvious? I cannot say, but everyone should understand it is the claims that are evaluated for patentability, not the title.

Comment Judge was unhappy (Score 1) 229

A pretty great excerpt from the first footnote: "I have spent an inordinate amount of time deciphering the record as the parties presented it in their dueling statements of material fact. Statements of material fact, responses and replies are supposed to focus the record so that the judge can tell what is truly disputed and what is not. Here, the dueling statements are so argumentative, lengthy, and full of qualifications, objections, and requests to strike that they are basically unusable. For the most part I have bypassed them..."
Security

Swedish Security Company Boss Declared 'Bankrupt' After Identity Stolen (bloomberg.com) 41

The man running Sweden's biggest security firm was declared bankrupt this week after his identity was hacked. Though the sub-optimal branding implications were hard to miss, Securitas AB was able to put the whole awkward incident behind it by the end of the day. From a report: Alf Goransson, the company's 59-year-old chief executive officer since 2007, won an appeal of the July 10 bankruptcy decision by the Stockholm District Court, according to a statement late Wednesday. The perpetrator used the CEO's identity to seek a loan of an undisclosed amount, after which a bankruptcy application was filed in his name. The identity theft took place in March. Goransson didn't know he'd been hacked until this week, the company said. The hack attack "has no effect on the company, other than that our CEO has been declared bankrupt," spokeswoman Gisela Lindstrand said. "And that will hopefully only last until later today, depending on how soon they can remove the decision."
Privacy

US Internet Company Refused To Participate In NSA Surveillance, Documents Reveal (zdnet.com) 95

Zack Whittaker reports via ZDNet: A U.S. company refused to comply with a top-secret order that compelled it to facilitate government surveillance, according to newly declassified documents. According to the document, the unnamed company's refusal to participate in the surveillance program was tied to an apparent expansion of the foreign surveillance law, details of which were redacted by the government prior to its release, as it likely remains classified. It's thought to be only the second instance of an American company refusing to comply with a government surveillance order. The first was Yahoo in 2008. It was threatened with hefty daily fines if it didn't hand over customer data to the National Security Agency. The law is widely known in national security circles as forming the legal basis authorizing the so-called PRISM surveillance program, which reportedly taps data from nine tech titans including Apple, Facebook, Google, Microsoft, and others. It also permits "upstream" collection from the internet fiber backbones of the internet. Any guesses as to which company it may be? The company was not named in the 2014-dated document, but it's thought to be an internet provider or a tech company.

Comment This doesn't work for patents (Score 2) 241

Clean room development is a good way to defend against copyright infringement, because you are able to demonstrate you did not have actual knowledge of the copyrighted material, and hence could not have copied it. With patents, it does not matter whether you copied it or not. If your product performs the same invention as described in the claims of a patent, you infringe, regardless of the absence of copying.
Robotics

Ask Slashdot: How To Begin Simple Robotics As a Hobby? 166

First time accepted submitter nedko.m writes "I would describe myself as more of a 'software guy' rather than somebody who likes to play with hardware much, but I've wanted to start doing basic robotics projects as a hobby for quite a while now. However, I was never sure where to start from and what the very first steps should be in order to get more familiar with the hardware aspects of robotics. For instance, I would like to start off with a simple soccer robot. Any suggestions on what low-budget parts should I obtain, which would provide me, subsequently, extensibility to a bit more elaborate projects?"

Slashdot Top Deals

The explanation requiring the fewest assumptions is the most likely to be correct. -- William of Occam

Working...