Re: I see another overly expensive failure on the horizon
Well spotted. Matt Warman spouted bollcocks [I like this accidental misspelling] during the passage of the #IPAct and used to review iPhones.
1232 posts • joined 3 Apr 2009
It is self-evident that individual Class members would have had very different experiences, and those experiences bear directly on whether (and if so how) they can claim to have suffered any loss at all.”
It is self-evident that in implementing the tracking Google should have taken into account the maximum amount of harm that could befall an individual user and act to mitigate that possible harm for all.
Click links to find meaningful expressions,
Ignore Google and go to https://worldwide.espacenet.com/patent/
Enter numbers. Look for either the Global Dossier link which will give you a trail of documents. Look through documents for things like non-final or final rejections or opinions etc. See if they contain mention of any prior art that might be resurrected in order to challenge.
Also look under the patent family list and do a similar search on the numbers that crop up.
Unfortunately a cursory look does not appear to show much meat however generally you find that where an application has attempted to file under WIPO or EPO the reports tend to be more comprehensive and the applicant, whilst they have a US patent, gives up trying to pursue them under WIPO/EPO
However in this case only US8243593B2 gives a WO (WIPO) application
It's not much but they are going to reject claims 1-40 on the basis of lack of novelty and lack of inventive step, Page 4) of the document, 1) Statement. They also give their reasons same page 2) Citations and Explanations.
"Claims 1-40 lack novelty under PCT Article 33(2) as being anticipated by ZIKAN et al. in US Patent No 6,310,881 B1, hereinafter referred to as ZIKAN."
Best I can do you.
MP were warned by their constituents that privacy of communications with members would be subject to interception. Naturally the MPs voted themselves through an exemption. At the time the service was via another third party provider. For the moment I can't remember who, it may have been symantec, however I was aware and made MPs I was in contact with aware that that service provider scanned e-mails and visited links within e-mails to documents hosted on my own web server. I could link to such a document within an e-mail and within seconds or minutes of sending the e-mail a copy of the document was requested by the third party provider both from EU and US located servers. None of it is secure.
All PCs were configured from the same image and just used basic Windows drivers irrespective of hardware installed. One user would continually complain that their computer was running slowly and being employed by a big wig instant action was always required because a power point was due for a meeting in five minutes. Every visit showed that they had maxed out the video ram because 'Keanu Reeves', in black and white, was their screen saver leaving barely enough system ram to run wordpad. This was on a 1024x768 display. Every time it was demonstrated to them Keanu looked just as nice with more sensible settings. and the Boss got to their meeting on time... until the next time.
As mentioned all the configurations were the same but one day I made the mistake of installing the proper drivers on someone's PC and this actually opened up the reasonable opportunity to increase colour depths. It made little to no difference to how general company software displayed but the browsing experience was much better. Word got around and as it turns out the general interest was more driven by the fact that company profile photos looked so much better. So requests came in and during quiet times I'd drop by and make adjustments. Everyone was happy apart from one user who did not like their 'new' profile image and asked for things to be set back to 'normal'. Yes folks the person with a black and white screen saver of Keanu Reeves who still caused panics when their Boss was due in a meeting.
Of course you might think the problem was Keanu Reeves related. No doubt in black and white the added colour depth made him look much worse than wacking up the amount of system ram assigned to video. However whilst the user was happy with their profile photo with the old settings they now noticed that it was 'wrong' on other people's computers where the change was still in place. Fortunately although a strongly worded request was put in to fix this by reverting the changes elsewhere everyone else got to keep their shiny new improved colour depths by changing the colour depth on the users profile photo.
Produced and Broadcast from Yorkshire Television in Leeds. My first student placement was in part spent grovelling around under the floor in the MCR, Master Control Room, tracing and ring colour-coding 75Ohm video cables... the old sticky labels had fallen off and the documentation needed, cough, updating. The supervising engineer had recently self eliminated himself via a political power struggle and was working notice sorting this stuff out. We finished things up in time and the evening of the day before broadcast he called me to the end of one of the racks to proudly show me a boot sized DC powered electro-mechanical RF relay bolted to the rack. "This is where our Channel 4 feed leaves the building." he said with a big grin on his face. The next evening the relay went *clunk* and Richard Twice Nightly and Carol Vorderman burst onto the airwaves in Countdown. https://www.youtube.com/watch?v=03c9vit5G4w 4:03
Given similar minimal wear in/out time anything with castors on acts like a shopping trolley. Dude you just paid $700 to turn your Mac Pro into a shopping trolley?
Anyway someone needs to leap on the iTray desk market and produce something similarly shiny that your Mac Pro with castors can sit on whilst maintaining the same desktop height of your Mac Pro without castors with added does not fall off the edge of your desk prevention.
Dude. You just paid $1400 for a baking tray?!?
Tah. Used: sudo apt install ocl-icd-opencl-dev
Not sure what is going on but now I show 1 GPU slot and 1 CPU slot running. I had to mess about in config, override -1 on some settings to get the GPU up. Again no idea as to what it did. The only indication that the GPU is doing something is the progress bar is moving and the temperature has gone up from 50C to 67C even though GPU utilisation is stuck down at 3% when I wiggle the mouse.
13:33:14: <!-- Client Control -->
13:33:14: <fold-anon v='true'/>
13:33:14: <!-- Folding Slot Configuration -->
13:33:14: <gpu v='false'/>
13:33:14: <!-- Network -->
13:33:14: <proxy v=':8080'/>
13:33:14: <!-- Slot Control -->
13:33:14: <power v='full'/>
13:33:14: <!-- User Information -->
13:33:14: <team v='250966'/>
13:33:14: <user v='Camilla_Smythe'/>
13:33:14: <!-- Folding Slots -->
13:33:14: <slot id='0' type='GPU'>
13:33:14: <cuda-index v='0'/>
13:33:14: <gpu-index v='0'/>
13:33:14: <opencl-index v='0'/>
13:33:14: <slot id='1' type='CPU'/>
13:33:37:WU00:FS01:0xa7:Completed 10000 out of 500000 steps (2%)
13:34:14:WU01:FS00:0xa7:Completed 240000 out of 500000 steps (48%)
OS Arch: AMD64
10:07:50: GPUs: 0
10:07:50:CUDA Device 0: Platform:0 Device:0 Bus:7 Slot:0 Compute:6.1 Driver:10.1
10:07:50: OpenCL: Not detected: Failed to open dynamic library 'libOpenCL.so':
10:07:50: libOpenCL.so: cannot open shared object file: No such file or
Ryzen 2700X 16 cores available. GEFORCE GTX1050
Linux Mint 19.3 How do I get the GPU on the case?
"Looking further ahead, we’ll integrate GitHub and npm to improve the security of the open source software supply chain, and enable you to trace a change from a GitHub pull request to the npm package version that fixed it," said Friedman in a blog post.
"Looking further ahead, we’ll integrate GitHub and npm to improve the security of the open source software supply chain, and enable you to trace a change from a GitHub pull request to the npm package version that broke it," said Friedman in a blog post.
Dear Home Secretary,
"Current UK home secretary Priti Patel is firmly anti-encryption, with
the social conservative having banged on about paedoterrorists shortly
after her appointment last summer."
I run Linux. It comes fully loaded with all sorts of encryption stuff
and I can apt-get even more of it should I really care.
For less hardcore paedoterrorists this sort of stuff is also available
on the Interwebs assuming you have the right #hashtags.
There is no need to use the encryption available from popular online
platforms and you do not gain much from asking them to cripple it.
No doubt any backdoors you care to introduce will rapidly fall into the
hands of undesirables.... such as the [HUGE COUGH] Israelis.
Don't mention this to Sir Andrew Parker. He used to work for MI5 and
apparently they don't trust you.
Why does Linux never spend more than 5 minutes updating itself and is happy to hold off on reboots on the extremely rare occasions one is required. I mean... last time I moved up a version number that only took 15 minutes and I didn't really notice any difference. What are they doing wrong?
So they set a counter that kills the drive at the equivalent of an overflow?
Personally I give zero stuffs about it being unsigned or not or for that matter how big it is. They have still installed a mechanism whereby the SSD will Auto-Bork at their imposed time limit irrespective of how much life there might be left in the drive.
I have been advised that one way of extending SSD life is to over provision the drive. 16GB, use 12GB leave 4GB spare. I know not how much additional life time that might gain but the exercise is rendered pointless if the manufacturer wades in and Auto-Borks the drive 5 years before it was due to gasp its last.
shutdown -h nowfor a second time: Mag editor fires parting shot at proprietary software
Uhm... I have an old e-mail address that daily receives at least 10 attempts to deliver spam. Each one gets a 450 client host rejected, recipient unknown or similar. All the associated IP addresses end up as xxx.xxx.xxx.0/24 in IPTables via a scripted cron job. You would think that they might eventually get the idea but.... no. They just move on to different IP addresses that get added to the list. Did I mention I still have an old e-mail address that daily receives at least 10 attempts to deliver spam. No doubt tomorrow I will still have an old e-mail address that daily receives at least 10 attempts to deliver spam.
Company ran one that allowed three concurrent users for the free version and was too tight to pay for a licence. Cue lone zombies walking about the place asking to use other logged in zombies computers or asking them to log out. Somehow one day the company discovers it has six concurrent users and non of them can log out or use the system even if they turn things off and on again. They end up still being logged in and the instances seem to be frozen. The real ones, all three, are running on a computer at the back of the stock room. The others are....
Explained to customer what problem was and how solution worked. Customer asks how sure I am so I say 50%. Customer expresses relief because all the other solutions that failed had been guaranteed to be 100%. Implements solution. Solution works. Other half of product goes up in smoke.
Fondle my plunger first.
OK... It is now Rubbery.
Please turn around and open your Cyber-Johns.
Your entry is too low. Please stand on your head.
Your entry is too high.
My Head Handles are in the way.
Remove your Head Handles.
I will lose my Wi-Fi connection. The Dabbs will connect.
The Dabbs does not have a Wi-Fi Connection! I have cum. How was it for you?
Caught you watching pron e-mails request that I copy and paste a bitcoin wallet address from a .jpg image because it is case sensitive. I assume everyone else has been getting the case sensitive part wrong so my new owners are trying to make stuff easier. I still haven't worked out how to copy and paste from a .jpg image. Any pointers? I seem to have already missed a number of deadlines so apologies to anyone who has received a collection of poorly focused images of me having a fap.
Specifically asking about its design or other technical details. For example...
Additionally, any documentation that details how the LiMA system is designed is exempt from
disclosure under section 43 (2) of the Freedom of Information Act 2000. This is because, in our
opinion, the disclosure of the information under the Act would, or would be likely to, prejudice
the commercial interests of both DWP and a third party licensee of DWP.
That's right folks. LIMA is a commercial and commercially sensitive product. AFAIK, don't quote me, it was developed in collaboration with ATOS and/or MAXIMUS and they will not tell you about it because of commercial sensitivity... e.g possible profit base. More likely the system is so hopelessly broken that it says people who are dead are fit for work.
Now they want to do what the article suggests but place their hooks more deeply into personally sensitive information and no doubt if they do get access the result will be a commercially sensitive product that you do not get to look at.
I would suggest that if they are not going to be completely transparent about what they are implementing and how they are implementing it then they should be invited to go fuck themselves.
Biting the hand that feeds IT © 1998–2021