Sun.Sep 10, 2023

article thumbnail

Interpretation of G 2/21: Inventive step may be supported solely by post-published data (T 0116/18)

The IPKat

The minutes of oral proceedings have been published from the referring Board of Appeal case behind G 2/21 ( T 0116/18 ). The minutes are brief but confirm the Board of Appeal's decision to acknowledge the inventive step of the claimed invention and to dismiss the appeal. The inventive step of the claimed invention was acknowledged based on the post-published data submitted by the Patentee.

Invention 120
article thumbnail

Do UK ISPs Have Permission to Monitor IPTV Pirates & Share Their Data?

TorrentFreak

Anyone who uses the internet today should already be aware that privacy is all but non-existent. The quid pro quo for using any major online service, social networks in particular, is the surrender of extraordinary amounts of personal data. Even regular websites can deploy dozens of trackers and trying to surface those don’t, using a search engine perhaps, makes everything several times worse.

Privacy 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Schedule A (SAD Scheme) Plaintiff Sanctioned for “Fraud on the Court”–Xped v. Respect the Look

Technology & Marketing Law Blog

This is one of the thousands of “Schedule A” cases, a phenomenon I’ve labeled the “ SAD Scheme.” (Technically, the defendants in this case are enumerated on “Exhibit 1” instead of “Schedule A,” but same thing). The court describes the phenomenon: This case is one of many in the Northern District of Illinois’s “cottage industry” of “Schedule A” cases.

article thumbnail

Featuring XXXX

Art Law Journal

From hyperrealistic sculptures to ethical dilemmas in art, we've woven together content that resonates with the curious mind. Whether you're seeking fresh perspectives or looking to delve into the creative process, there's something here to spark your imagination.

Art 74
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Never Too late: If you missed the IPKat last week!

The IPKat

If you've been too busy to stay up-to-date this week, never fear, the recap of the latest IP news and analysis is here: International Law Eleonora Rosati outlined the context and findings of a recent study that she was commissioned to produce for WIPO. The report examines the issues with determining where an alleged IPR infringement has been committed, especially given the developments during the transition from Web 2.0 to Web 3.0.

article thumbnail

7th Circuit Remands Case (Again) to Apply Independent Economic Value Test to Individual Images in Copyrighted Compilations

LexBlog IP

Exhibit Q to the Complaint, Sullivan v. Flora, Inc. , No. 15-cv-00298 (W.D. Wisc. 2015), ECF No. 1-17.

article thumbnail

“A Republic We Should Keep” – Human Events

Likelihood of Confusion

We should reject calls to destroy the “anti-democratic” Electoral College and Senate. The post “A Republic We Should Keep” – Human Events appeared first on LIKELIHOOD OF CONFUSION™.

52