Daily Archives: July 2, 2021

Heres how to beat Apple, Google and other giants in the recruiting game – KXAN.com

Posted: July 2, 2021 at 8:27 pm

by: Mike Cronin, Austin Business Journal Staff Writer

AUSTIN (KXAN) To find its next CEO, Austin-headquartered AppSumo is offering $100,000 to anyone who refers the person ultimately hired as chief executive.

Noah Kagan, founder of the company that offers daily deals for software programs, pointed out that paying that kind of finders fee for a CEO actually is really cheap.

How much would you pay for a great wife? Kagan asked rhetorically. Its the same thing with a great CEO, who will make the company millions.

Kagan hit on a truth that might escape other entrepreneurs: If you hire people in the traditional way, youre going to get traditional people. If you recruit exceptionally, youre going to get exceptional talent.

You can read more of this story on the Austin Business Journal website.

See the original post here:

Heres how to beat Apple, Google and other giants in the recruiting game - KXAN.com

Posted in Google | Comments Off on Heres how to beat Apple, Google and other giants in the recruiting game – KXAN.com

Google has second thoughts about cutting cookies, so serves up CHIPs – The Register

Posted: at 8:27 pm

Last week, third-party cookies received a stay of execution from Google that will allow them to survive until late 2023 almost two years beyond their previously declared decommission date. But the search-ads-and-apps biz is already planning a resurrection of sorts because third-party cookies are just too useful.

The Chocolate Factory envisions a lesser form of third-party cookie, one that in theory won't be used for tracking but will be able to support other more acceptable use cases. Google software engineer Dylan Cutler and engineering manager Kaustubha Govind call their confection "partitioned cookies" in a Web Platform Incubator Community Group proposal called "CHIPs."

Cookies are files that web applications can set in web browsers to store data. They have legitimate uses, like storing data related to the state of the application (e.g. whether you're logged in), and they can also be used for tracking people across websites.

Third-party cookies set by scripts that interact with third-party servers track people by storing a value on one website and then reading that value on another website that implements a similar third-party script. The third-party service in this case then knows all the websites running their script that were visited by the tracked individual.

That's the sort of privacy-invading behavior that led browser makers like Apple, Brave, Mozilla, and others to block third-party cookies by default. But doing so has created problems by interfering with applications that rely on third-party cookies to deliver services across domain contexts.

The browser security model is based on the distinction between first-party and third-party contexts. When an individual visits a specific web domain, that domain operates in a first party context; services available at other domains are considered third-party and face various limitations on what they can do.

Google's CHIPs proposal Cookies Having Independent Partitioned State calls for cookies that can be set by third-party service but only read within the context of the first-party site where they were initially set, as opposed to other sites also running the setter's third-party script.

For example, Cutler and Govind describe a scenario where the site retail.com wants to work with a third-party service support.chat.com to embed a support chat box on its site.

"Without the ability to set a cross-site cookie, support.chat.com could instead rely on retail.com passing along their first-party state (or some derived value of it)," the Googlers explain in their proposal. "However, if the users have not yet created an account and the support widget is helping them sign up, then retail.com would have no notion of identity to forward to support.chat.com."

There are other plausible uses too, like third-party content delivery networks that use cookies to serve access-controlled content, front-end frameworks that rely on remote hosting and remote procedure calls to interact with services, and embedded code designed to support software-as-a-service apps.

Firefox and Safari have each taken steps toward implementing their own versions of partitioned cookies, so Google's approach has conceptual support from other browser makers even if the implementations currently differ.

But privacy advocates have taken issue with Google's approach declaring intent to prototype the technology without much consultation.

"The tech has been talked about for awhile, it works when combined with other techniques to slightly reduce the harm from third-party cookies, but it's not the same as deprecating third-party cookies," said Zach Edwards, co-founder of web analytics biz Victory Medium, in a message to The Register.

"Google is proposing this shift without even acknowledging how it fits into larger plans, and thus making people guess and try to work out the calendar for upcoming Chrome additions and deprecations," he said. "It's an outrageously impossible task if the company making those decisions doesn't keep a running list of changes that impact global businesses, and also flippantly suggests new additions on non-Google websites and via a regularly rotating group of largely unknown Google developers, who when challenged about proposals often fall back on, 'All opinions are my own.'"

Such concern is widespread among those involved in ad tech and marketing because Google is in the midst of changing the rules by which online advertisers operate. The effort to phase out the third-party cookie is part of the company's ongoing Privacy Sandbox initiative, which aims to implement multiple technical specifications that change how online advertising works in the browser. And no one not Google, its allies, its competitors, regulators, or internet users is certain how these works-in-progress will eventually work and interoperate.

In January, the UKs Competition and Markets Authority (CMA) began poking around in Google's Privacy Sandbox to see whether the contemplated changes would disadvantage competitors. In response, Google made a set of commitments to be more forthcoming about its technologies and the viability of competing alternatives.

"The CMA seemingly told Google that they need to change their process and communicate more clearly how data supply changes are being made in Chrome and in Google's advertising systems," said Edwards.

"But if this new proposal is how Google perceives the CMA-mandate, then the folks in the UK should schedule a bit more tea time because they are spinning their wheels during office hours on demands that are being ignored."

Even seemingly minor proposals like CHIPs can be complicated because they don't exist in isolation. They have to be considered in the context of all the other technologies they may touch in deployment.

For example, Google has a proposal called First-Party Sets that would make different domains (e.g. apple.com and icloud.com) owned by the same company function as a single first-party domain for the purpose of cookies. Privacy researcher Lukasz Olejnik has expressed concern about how CHIPs might expand the tracking possibilities when used in conjunction with First-Party Sets.

What's more, the proposal itself acknowledges that partitioned cookies cannot currently be defended against Chrome extensions.

"Extensions' background contexts can query and store cookies across partitions, meaning they could store a cross-site identifier across partitions," explain Cutler and Govind. "Unfortunately, this type of attack is unavoidable due to the nature of extensions."

"Even if we block partitioned cookies (or even all cookies) from extensions' background contexts, an extension could still use content scripts to write cross-site identifiers to the DOM which the site's own script could copy to the site's partitioned cookie jar."

And there are other potential problems that need to be ironed out, like the risk of making sites more prone to cross-site scripting (XSS) attacks and increasing the risk of denial-of-service attacks through cookie proliferation that exceeds Chrome's 180-cookie-per-domain limit.

None of these issues are insurmountable. But perhaps Google's decision to treat the technical foundations of web advertising a business upon which it and so many companies depend as a set of experiments needs to be reconsidered in light of the company's market power. Moving fast and breaking things may work well for a nimble startup but when giants do so there's collateral damage.

Read more here:

Google has second thoughts about cutting cookies, so serves up CHIPs - The Register

Posted in Google | Comments Off on Google has second thoughts about cutting cookies, so serves up CHIPs – The Register

Google Cloud and Ericsson partner on 5G Edge – Ericsson

Posted: at 8:27 pm

Google Cloud and Ericsson (NASDAQ: ERIC) today announced a partnership to jointly develop 5G and edge cloud solutions to help communications service providers (CSPs) digitally transformand to unlock new enterprise and consumer use cases.

Globally, industries with edge presences - including communication service providers, retailers, manufacturers, transport businesses, healthcareand media/entertainment providers - face pressures to build more digitized businesses and new digital experiences for their customers.

To help businesses address this shift, Google Cloud and Ericsson are working together to develop new solutions at Ericssons Silicon Valley D-15 Labs, a state-of-the-art innovation center where advanced solutions and technologies can be developed and tested on a live, multi-layers 5G platform.

Ericsson and Google Cloud have already completed functional onboarding of Ericsson 5G on Anthos to enable telco edge and on-premise use cases for CSPs and enterprises.

As part of the partnership, Google Cloud and Ericsson are also piloting enterprise applications at the edge on a live network with TIM. The project, which will automate the functions of TIMs core 5G network and cloud-based applications, will use TIMs Telco Cloud infrastructure, Google Cloud solutionsand Ericssons 5G core network and orchestration technologies.

The joint offerings will help enterprises in the automotive, transportation, manufacturingand other sectors improve efficiencies and lower latency by bringing connectivity close to companies physical locations.

Thomas Kurian, CEO, Google Cloud, says: Organizations have a tremendous opportunity to digitally transform their businesses with 5G and cloud capabilities like artificial intelligence and machine learning at the edge. We are proud to partner with Ericsson to help build a foundation for communications service providers and enterprises alike to take advantage of cloud technology and cloud-native services, from telecom network core to the edge and enterprise premises.

Niklas Heuveldop, President and Head of Ericsson North America, says: 5G is a powerful innovation platform. Combined with edge cloud capabilities, 5G has the potential to accelerate the digital transformation of virtually any sector of industry or society. We are excited about our partnership with Google Cloud as we engage with our customers to leverage our combined capabilities to solve real-world business challenges for the benefit of consumers, enterprises and society at large.

Ericsson and Google previously formed a services partnership to enable the digital transformation of operator networks and application migration through cloud-native, container-based solutions.

To learn more about Google Clouds telecom strategy, click here.

Additional Resources:

About Google CloudGoogle Cloud accelerates organizations ability to digitally transform their business with the best infrastructure, platform, industry solutions and expertise. We deliver enterprise-grade solutions that leverage Googles cutting-edge technology all on the cleanest cloud in the industry. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.

About EricssonEricsson enables communications service providers to capture the full value of connectivity. The companys portfolio spans Networks, Digital Services, Managed Services, and Emerging Business. It is designed to help our customers go digital, increase efficiency and find new revenue streams. Ericssons innovation investments have delivered the benefits of mobility and mobile broadband to billions of people around the world. Ericsson stock is listed on Nasdaq Stockholm and on Nasdaq New York. http://www.ericsson.com

See more here:

Google Cloud and Ericsson partner on 5G Edge - Ericsson

Posted in Google | Comments Off on Google Cloud and Ericsson partner on 5G Edge – Ericsson

Google Stands Accused of Unfairly Limiting Data Access to Its Competitors – CMSWire

Posted: at 8:27 pm

The European Union has opened an antitrust investigation into whether Google is stifling competition in the highly profitable online advertising market. The probe follows cases in France and elsewhere in Europe questioning how the company runs its ad business. It is the first time the EU has investigated Googles online display advertising business, where it serves as an intermediary between advertisers and publishers to fill ad space on web pages and apps.

Google collects data to be used for targeted advertising purposes, it sells advertising space and acts as an online advertising intermediary. So, Google is present at almost all levels of the supply chain for online display advertising, the European Commissions competition chief Margrethe Vestager said in a statement.

We are concerned that Google has made it harder for rival online advertising services to compete in the so-called ad tech stack. The investigation will also touch upon Googles plans to phase out third-party cookies in Chrome as part of its Privacy Sandbox plans, as well as the upcoming changes to advertising IDs on Android. At the heart of this is the question as to whether Google is unfairly limiting access to user data to its competitors?

This follows on the heels of the recent case in France where the competition regulator there fined Google $267 million last week for favoring its own services for placing online ads at the expense of rivals. The competition authority ruled that Google gave preferential treatment to its own ad inventory marketplace AdX and to the Doubleclick Ad Exchange, its real-time platform for letting clients choose and sell ads.

More to the point, ...it is the first decision in the world to look into complex algorithmic auctions processes through which online display advertising works," the authority's president Isabelle de Silva said in a statement.

Related Article:Highlights From Google's Marketing Livestream

Aidan Fitzpatrick is the founder of UK-based Reincubate. He said that Google has a bunch of data and can monetize it, but that does not mean that others have the capability to do that too. The key is the scale and Google's move to deprecate cookies removes a scale of data from the competitive realm of the marketplace for most enterprises, he said.

As ingrained consumer behavior makes Google the default in search and therefore the default repository for consumer data removing access to this data does stringently limit competitor access. Unfairly so? he asks. Difficult question as it was Google, not the competitors, who endeavored to create a search ecosystem for consumers to operate in, and to monetize that ecosystem through the exchange of access for user data.

It raises the question, at what point does the Google market model become a monopoly of consumer data? If the large tech players effectively remove all data access from the marketplace, then it imperils free enterprise and is inherently unfair. If some tech leaders do it and others don't then what are the options for the competitive marketplace seeking data-fueled resources?

Facebook might be able to monetize some user behavior data, but it would not just need a single person's data it needs the whole graph of data and interactions. Could any other business without scale make use of that? Would the data be relevant? Would making them share it be useful? Or other large search entities such as Bing.

If not considered unfair practice today, I predict that if this present course of data firewalling under the banner of consumer privacy will indeed lead to unfair competitive practice, he said.

Of course, there is another, more significant issue, which this line of questioning opens: Who really owns this consumer data, anyway? Or are there staked portions to be considered?

You own the photo you post on Instagram, and the description you write. But if someone likes your photo, is that your data? Or theirs? Or both? Whose consent is required to transfer that? If you can answer that question, is the answer the same in the UK as it is in the U.S.? What about in India?

While Google's reported market share of the display market may appear lower you could argue Facebook and Google are servicing entirely different digital markets and customer needs. Google has a monopoly of the search market at 92% (2021). Facebook market share of the social media market is 71% (2021), also a monopoly, said Adam Clarke a corporate SEO expert and author.

Google's data is at the very core of maintaining their competitive position. Everything a user searched since they have signed up for a Gmail account, including where to study, financial research, relationship problems, family concerns, career, news and media preferences all saved in Google's servers," he added.

"This data is kept securely at Google, to keep their advertising services more relevant and targeted than competitors by a significant degree. This data, which is essentially a chronology of user's life and interests, is very valuable."

He pointed out that almost every website you visit has the Google Analytics tracking code, which feeds user information to Google's advertising software. The only way for other people to use this data is to become a customer of Google's display ad services.

Google Analytics move to phase out third party cookies is marked as a move to improve privacy, but is also likely (but unverified) to be part of a much larger initiative to slowly, but eventually phase out third party cookies in Chrome and the Google search results.

This will be replaced with Google's machine learning technology that is able to fingerprint users without the use of a third party cookie, by analysing the user's online behaviour patterns through machine learning software. This would force all websites that want any kind of targeted advertising to rely on Google's ad services and Facebook, as those are the only two services that will have any sufficient data.

Yes, it's fair to say Google's display services are a monopoly for the search engine market and the only way that someone can avail themselves of this data is to be a paying customers, and there's unlikely to be any valid competitors for targeted advertising anytime soon that will supplace Google and Facebook's monopolies of the search and social markets, respectively, or realistically become a competitor anytime in the future, he said.

Google is unfairly limiting access to user data to its competitors, Bill DeLisi, CEO of Chino, CA-based GOFBA, concludes. It is well known in the industry that Google requiring advertisers to use their own Ad Manager to display ads on YouTube, and favoring its own ad exchanges on YouTube and other sites, has presented an unfair advantage to Googles competitors, he said.

With Google eliminating 3rd party cookies in Chrome with their Privacy Sandbox plan (use this link for Privacy Sandbox: they will have control over some of the most drastic changes on the internet. By blocking third-party tracking cookies, Google is actually walling off a portion of the internet. This would be a major disadvantage to its ad competitors by pretty much eliminating their access to detailed information about consumer web behavior, he said.

Follow this link:

Google Stands Accused of Unfairly Limiting Data Access to Its Competitors - CMSWire

Posted in Google | Comments Off on Google Stands Accused of Unfairly Limiting Data Access to Its Competitors – CMSWire

Quitting Google Photos? How to Manage Your Photos With Microsoft OneDrive – PCMag

Posted: at 8:27 pm

Now that Google Photos no longer offers free unlimited photo storage, you may want to check out a different online service to store and manage your photos. If youre a PC user, Microsoft OneDrive may be worth considering because its built into Windows 10 and is seamless and easily accessible.

Though OneDrive isnt a dedicated photo manager like Google Photos, you can still use it to back up, sync, and share your photos from your PC, the mobile app, and on the web. It can also be used to view, manage, and search for photos, create special albums, view photos by location, and automatically upload any images taken on your mobile device.

The major downside with OneDrive is that it offers only 5GB of free storage. And that amount of space is for all of your files, not just your photos. Even Google Photos still gives you 15GB of free storage. However, if youre an Office 365 subscriber, you get a whopping 1TB of OneDrive space. Otherwise, you can score 100GB of storage for $1.99 a month.

Now, lets look at the ways to enlist OneDrive as your photo manager. For the steps here, well assume youre already using OneDrive for file backup and syncing.

To back up and sync files and photos in OneDrive, place them within the OneDrive folder in File Explorer or inside the Desktop, Documents, or Pictures folders. This means you can leave your default Pictures folder where it is, and the photos inside will be synced.

To set this up, right-click on the OneDrive icon in the Windows System Tray and select Settings. At the Settings window, click the Backup tab and click Manage backup.

Make sure that the Pictures entry is selected and then click the Start backup button. OneDrive tells you that its starting to back up your files. Click View sync progress to check on the status of the backup. After the backup is complete, you can view your synced photos from the Pictures folder in File Explorer.

By default, your photos (and other OneDrive files) are stored online and only downloaded to your PC when you open them. The idea here is to save space on your hard drive.However, this means you need to be connected to the internet to access your files. You can tell if a file or folder is being stored online only because it will display a cloud icon next to it.

To download a folder or file so that its always stored on your computer as well as in the cloud, right-click on it and select Always keep on this device. After the folder or file has been downloaded, a green check mark appears next to it.

To store all your synced photos and other files on your computer, right-click the OneDrive System Tray icon and select Settings. Click the Settings tab and uncheck the box next to Save space and download files as you use them, then click OK.

You can also automatically upload photos to OneDrive that you save on your computer. With the OneDrive Settings window open, click the Backup tab.

Check the box under Photos and Videos to automatically save photos and videos to OneDrive whenever you connect a camera, phone, or other device to your PC. You can also opt to automatically save screenshots to OneDrive. Click OK when done.

You can do one better if you use the mobile app for iOS and Android. Instead of connecting your phone to the computer in order to sync photos, the app can upload any photos and videos you take to OneDrive automatically.

To turn this on, open the app and tap the Photos icon in the toolbar. You should see a prompt at the top telling you that Camera upload is turned off. Tap the Turn On button, and any photos you take will automatically be saved to OneDrive.

You can share a photo in OneDrive from your computer. Right-click on the photo you want to share and select the Share command. In the pop-up window, choose whether you want the recipient to be able to edit the file or only view it.

Type the name or email address of that recipient, add a message if you wish, and then click the Send button to share the file.

There is more you can do with your photos by heading to your online OneDrive website. Right-click on the OneDrive icon in the System Tray and choose the View online option. At the left pane, click the Photos category to see all the photos stored in OneDrive organized by date.

By default, this view reveals all your photos stored in OneDrive. To narrow the scope to just photos stored in the Pictures folder, click the drop-down arrow next to Show photos and change it to Pictures folder. Squeeze more photos on the screen by displaying them as tiles. Click the drop-down arrow next to the square in the upper right and select Tiles.

Click a photo to open and view it full screen. From the top toolbar, you can share the photo, add it to an existing or new album, play a slideshow, rotate its orientation, or edit the image. Other options allow you to download it to your computer, delete it, open the files location in OneDrive, embed a link to the file for a website or blog, or view the images version history.

Use the Next and Previous buttons to cycle through images. To view information about the photo, click the Info icon, or click the X button to return to a view of all your photos.

If you wish to edit a photo, click the Edit button. From the editing screen, you can crop, flip, or rotate the image. The photos brightness, exposure, contrast, highlights, shadows, saturation, warmth, or tint can also be tweaked.

Click the Albums tab to view your photos within collected albums. If you want to create albums for your photos, OneDrive already suggests potential albums based on multiple photos from a specific date. Click one of the suggested albums and choose Add to your Albums to keep it or Discard album to get rid of it.

You can create your own album by clicking the Albums tab on the website. Click Create a new album, then name your album and select the photos you wish to add.Click on each photo individually or click the circle in front of a specific date to grab all photos for that date. Click Add album at the top and your new album appears.

You can also find photos based on location under the Places tab. On this page, you can click a specific place to find all photos geotagged with that location.

If you cant find a specific photo, you can search for it. Use the search box at the top of the OneDrive website to search by name or tag. Thanks to the artificial intelligence used in OneDrive, you can even search for an object or text in the photo.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.

See the rest here:

Quitting Google Photos? How to Manage Your Photos With Microsoft OneDrive - PCMag

Posted in Google | Comments Off on Quitting Google Photos? How to Manage Your Photos With Microsoft OneDrive – PCMag

Patent Issues Required Attention for Doing Business in China with the Improvement of the COVID-19 Pandemic Situation – Review on the fourth amendment…

Posted: at 8:26 pm

Background

The COVID-19 pandemic has been sweeping the world since the end of 2019, exerting a far-reaching impact on global economic and technological development. With the concerted efforts of countries around the world and the promotion of vaccines, the COVID-19 pandemic has been effectively controlled in most countries. China undoubtedly is outstanding in the fight against the pandemic. Despite having the world's largest population, China not only efficiently controlled the epidemic in a short time but also actively promoted technical and economic cooperation at home and abroad. The fourth amendment to the PRC Patent Law ("New Patent Law") in effect from 1 June 2021 demonstrates the determination of the Chinese government to improve the protection and enforcement of patent rights as well as promote the implementation and application of patented technologies, which is certainly a very good opportunity for domestic and foreign entities and individuals doing business in China.

1. Appropriate burden of proof required for claiming high damages for patent infringement

In patent infringement disputes, it would be very advantageous for patentees as a whole to fulfil the burden of proof. First, pursuant to the New Patent Law, the damages can be calculated based on the patentee's actual loss OR the infringer's profit from infringement, not IN SEQUENCE. Although the profit from infringement is mostly applied in practice, this change reflects the relaxation of legal requirements on the burden of proof on patentees. Moreover, the New Patent Law provides a substantial increase in the amount of statutory damages and the punitive damages up to five times the amount calculated according to the aforesaid method. However, in our opinion, the problem about calculating the profit from infringement, among others, are still there due to the practical difficulty in proof by patentees, especially in preservation of evidence related to the infringing B2B goods. Therefore, the actual effect of the amended provisions on infringement damages will depend on the subsequent implementation rules of the Patent Law as well as the specific provisions of other relevant judicial interpretations. The entities and individuals doing business in China now still need to bear a greater burden of proof in patent infringement disputes in order to prove the existence of infringement and the amount of profit from infringement.

2. More comprehensive and lasting patent protection conducive to maintaining a dominant position in the Chinese market

Design protection has always been favoured by leading companies, especially electronic instrument manufacturers, automobile manufacturers, and in the artificial intelligence field. The New Patent Law is a really good news for the manufacturers whose products rely on shape design. Take auto manufacturers as example. Automotive enthusiasts or consumers can tell an auto brand by observing only a partial structure of a car, such as the design of the front or rear bumper of a car or the car body, with no need to look at other parts. For automobile and the like, the shape design of some components itself constitutes the independent design that significantly contributes to the appearance of the whole product. Under the earlier patent law, the GUI patent applicant is required to combine the GUI design with a specific physical product for application as a whole. However, it is the GUI idea design, not the physical product, that really reflects the intellectual achievements of the applicant and is what the applicant originally intends to protect, especially in the field of artificial intelligence and communication devices. After the New Patent Law becomes effective, in China the companies involved can file the GUI patents applications for product appearance in which the local GUI design to be protected can be indicated with solid line and the physical product is indicated with dotted line. At the same time, a description is given in the abstract of design application that only the GUI design is under protection, so as to weaken the impact and limitation of the physical product on the GUI design and ultimately provide the real protection to the GUI design.

Invention patents and design patents granted in China will likely receive a longer term of protection. As for design patents, the New Patent Law extends the term of protection to 15 years, same as the Hague Agreement Concerning the International Deposit of Industrial Designs. As for invention patents, the New Patent Law provides the supplemental protection period for compensating the patent right duration due to unreasonable delay in the patent examination procedure, and also to the patents related to innovator drugs that have the marketing approval in China. Entities and individuals doing business in China can have the exclusive protective rights and interests, which are more comprehensive and lasting, by applying for invention patents and design patents. Even so, the "unreasonable delay" applicable to invention patents will be further specified in the subsequent implementation rules of the Patent Law and examination guidelines.

3. Pharmaceutical patent linkage system to promote innovation and development

The latest amendments to the Patent Law have a significant influence on pharmaceutical manufacturers. The establishment of pharmaceutical patent linkage, a.k.a., early settlement mechanism for drug patent disputes, greatly facilitated innovation and development of innovator drug manufacturers. Under the New Patent Law, an innovator drug manufacturer can have a patent infringement dispute resolved with court judgements, or administrative rulings from the National Intellectual Property Administration (CNIPA), before a generic drug is marketed, so that the marketing approval for such generic drug is negatively affected. The Patent Law is a superior legislation in absence of specific provisions. More details are yet to be separately set out by the National Medical Products Administration and the CNIPA together. As we all know, the research and development of a new medicine require a huge investment in money and time. In China where generic drugs are dominant, with the supplemental protection period mechanism and the pharmaceutical patent linkage system under the New Patent Law, innovator drug manufacturers may be more motivated to devote themselves to development and innovation, strengthen their patent portfolio, and promptly take relevant measures to defend their legitimate rights and interests to the greatest extent by means of drug patent registration and regular monitoring of the declaration information from generic drug manufacturers.

4. Further promotion to the exploitation of patented technologies

To promote the exploitation of patents, the New Patent Law introduces the open licensing system, grants employers the right to dispose of at their discretion the employee invention related patent rights and the right of patent applications, and encourages the employer to share profits with inventors in the form of stocks, options and dividends. In this way, patentees are encouraged to license their patents, so that the asymmetry of information related to patent licensing can be reduced or eliminated. The state-owned enterprises, colleges and universities, and scientific research institution are allowed to dispose of their own patents with more freedom. The various rewards and remunerations for employee inventions can also relieve monetary stress of enterprises and raise the enthusiasm of inventors. Foreign companies need to be careful about the compliance issues with respect to payment of the rewards and remunerations for employee inventions, such as, whether the remuneration should be paid to inventors and who should make payment to inventors when intellectual property rights are managed in a centralized manner within a group company.

With regard to the cross-border technology transfer concerned about by many foreign companies, the New Patent Law has no specific provision. The Chinese policies on mandatory technology transfer as deemed by some foreign companies were adjusted in the Regulations of the People's Republic of China on the Administration of Import and Export of Technologies amended in 2019. For example, the regulations deleted the infringement liability provisions and the mandatory provisions relating to the ownership of technological improvements. These changes increase the autonomy of contract parties and also adapt to the development of international technology transfer. The problem concerned about by transferors of technology that technical secrets may be disclosed during the process of transnational technology transfer is up to the parties to reach agreement in accordance with the Civil Code and relevant judicial interpretations, based on the natures of the fields involved. When doing business with Chinese companies, for example, in the form of technical cooperation or joint venture, foreign companies still need to design the strict contractual clauses in order to protect their legitimate rights and interests.

Outlook

At the time when the COVID-19 pandemic begins to improve and the global economy recovers as a whole, the New Patent Law comes into effect, like a powerful driving force for the current rapid technological and economic development of China. Generally speaking, the New Patent Law is favourable to patentees. In the situation of a full economic recovery, the introduction of punitive damages, patent term extension, and pharmaceutical patent linkage system may prompt more patentees to protect their legitimate rights and interests by means of litigation, and improve China's judicial environment for intellectual property protection.

The negative side is that an increase in the number of lawsuits may prolong the time period of adjudication of patent disputes, especially the foreign-related litigations for which the civil procedure law has no provision on the time limit of adjudication. In addition, the lengthy judicial appraisal procedures are usually required to resolve patent disputes. Therefore, foreign patentees doing business in China should be prepared for the long-term litigation proceedings for patent infringement and at the same time avoid submitting the disputes to the courts that have accepted many cases. This certainly needs comprehensive consideration and specific analysis case by case.

In addition, the implementation rules of the Patent Law as well as other relevant judicial interpretations and measures have not yet been promulgated. Some provisions of the New Patent Law need to be specified with reference to the subsequent regulations. Nonetheless, it is obviously worthwhile to safeguard your business by making the most of intellectual property.

Excerpt from:
Patent Issues Required Attention for Doing Business in China with the Improvement of the COVID-19 Pandemic Situation - Review on the fourth amendment...

Posted in Fourth Amendment | Comments Off on Patent Issues Required Attention for Doing Business in China with the Improvement of the COVID-19 Pandemic Situation – Review on the fourth amendment…

Policing Is Not ‘Public Safety’ – The Appeal

Posted: at 8:26 pm

Last week, a major federal court ruling on privacy rights highlighted the flawed, police-centric way that we typically talk about public safety. In a divided decision, the Fourth Circuit Court of Appeals barred Baltimore police from using a new aerial surveillance program to indiscriminately target and track peoples movements. Analyzing data collected through the so-called spy plane program, the court said, counts as a search under the Fourth Amendment, and therefore requires police to obtain a warrant, just as when searching a home. Its a cutting-edge decision that comes as courts increasingly grapple with how the Fourth Amendments protections against police intrusions apply to new surveillance technology.

But the case is also important for the debate it sparked among the courts judges. In dissent, Judge J. Harvey Wilkinson III, a Reagan appointee, said that restricting police surveillance will tie the citys hands against a serious public safety crisis. He accused the majority of ignoring Baltimores high murder rate and said the ruling leaves only hopelessness for the good people of Baltimore, especially our dispossessed communities where rates of gun violence are highest.

Judge Roger Gregory, the first Black judge to ever serve on the Fourth Circuit, was having none of it. In response, he explained how this critique depends upon a certain premise: Policing ameliorates violence, and restraining police authority exacerbates it. As surely as water is wet, as where there is smoke there is fire, the dissent takes for granted that policing is the antidote to killing. Thus, the dissent repeatedly evokes the grief and trauma of gun deaths only in the name of a familiar cause: police and prisons.

The dissents rhetoric matches that of police chiefs clamoring for bigger budgets, particularly amid a one-year national jump in shootings. But the same assumptions are standard fare in reporting on crime and politics. Last week, for example, the New York Times equated calls for funding the police with treating public safety as a central political concern and adopting themes of public safety. The framing both reduces the concept of safety to narrow criminogenic terms (safety depends entirely on crime rates) and elevates punitive responses to crime and violence (more police, more arrests, and more incarceration) over policies that would invest in communities and promote overall health.

In his concurrence, Judge Gregory emphasized that such a blinkered view misunderstands the structural causes of violence and the futility of policing in addressing them. I am skeptical that [the dissents] logic genuinely respects and represents the humanity, dignity, and lived experience of those the dissent ventures to speak for, he wrote. Segregation effectively plundered Baltimores Black neighborhoodstransferring wealth, public resources, and investment to their white counterpartsand the consequences persist today. . . . So it is no coincidence that gun violence mostly occurs in the portions of the city that never recovered from state-sanctioned expropriation. Absent reinvestment, cycles of poverty and crime have proliferated.

Rather than reinvesting in dispossessed communities, Gregory wrote, the city over-polices them: Baltimore spends more on policing, per capita, than virtually any other comparable city in America, and in 2017, for example, a greater proportion of its general operating fund spending was allocated to policing than to education, transportation, and housing combined.

Gregorys opinion aligns with public health experts who have been calling for a more accurate and equitable conception of public safety, one that includes overall health and well-being and considers the damage that our systems of punishment inflict. Last month, anthropologist and physician Eric Reinhart argued in Health Affairs that redefining public safety to account for the harms of policing and incarceration rather than continuing to cede this influential discourse to reductive criminological terms is key for ensuring health, security, equality, and positive freedom for all U.S. residents.

As law professor John Pfaff wrote in The New Republic last week, our criminal legal system produces tremendous harm and immiseration, even death, not just for [incarcerated people] but for their families and communities. In a damning indictment of our fundamental indifference to the lives of the millions who come in contact with this system, we have no idea what the criminal legal systems actual humanitarian costs are, but they are surely staggering.

Even with incomplete information, we know that police killings are a leading cause of death for young Black men, and that police violence sends tens of thousands of people to the emergency room every year. We also know, as Reinhart writes, that jails and prisons inflict increased rates of chronic diseases that impose long-term medical needs and cost and reduce life expectancy. Even pretrial detention without a conviction, enforces persistent economic hardships and drives high rates of unemployment, homelessness, and food insecurity.

Beyond that, a growing body of researchwhat Reinhart calls carceral-community epidemiologyshows that incarceration spreads disease and increases mortality rates in surrounding communities, that our world-leading proclivity for incarceration, while disproportionately harmful to nonwhite people and dispossessed communities, is killing us all. Given their often poor conditions and porous nature, with high turnover and the constant churn of staff and visitors, jails and prisons are not like Vegas: What happens there does not stay there. Carceral institutions worldwide have long functioned as disease multipliers and epidemiological pumps for surrounding communities in relation to HIV, tuberculosis, hepatitis C, influenza, and other infectious diseases, Reinhart wrote.

This reality has been of acute importance throughout the pandemic. In May, Reinhart co-authored a study concluding that cycling individuals through Cook County Jail in March 2020 alone accounted for 13 percent of all COVID-19 cases and 21 percent of racial COVID-19 disparities in Chicago as of early August. Their analysis also showed that jail cycling is the strongest predictor of COVID-19 rates, considerably exceeding poverty, race, and population density.

Other research shows that sending more people to county jails leads to higher rates of premature community death. In February, a retrospective, longitudinal study in The Lancet examined cause-specific mortality at the county level in the U.S. over a 30-year period. It found a short-term association between county jail incarceration and mortality, with mortality due to infectious disease, chronic lower respiratory disease, substance use, and suicide as the strongest drivers. The study put the problem explicitly in public health terms, noting the risks of community-level exposure to high incarceration rates, as though the county jail was polluted water or a toxic waste site.

One of the studys authors, Sandhya Kajeepeta, a doctoral student in the Department of Epidemiology at Columbia University, told me that research framing public safety more broadly to include public health and long-term well-being really challenges our reliance on jails and prisons to keep people safe.

For Reinhart, the effort to reclaim and redefine the influential rhetoric of public safety must make clear that collective safety is best improved not by policing and prisons but rather by building robust public systems of carethat is, of economic security, environmental protections, labor rights, and housing.

Thats also the view of Leaders of a Beautiful Struggle, the grassroots advocacy organization that challenged the Baltimore surveillance program. Lawrence Grandpre, the groups director of research, wrote that their opposition to more surveillance was neither anti-police, nor born of indifference to gun violence. Instead, he wrote, we believe that safety is not simply the absence of violence, but the creation of conditions for human flourishing. Thus, we refuse the false . . . choice between community instability created by violent crime, with the community instability caused by mass incarceration, unaccountable policing, and the slow starving of our community institutions to feed a [half] billion-dollar police budget deemed to be the only investment our community needs.

Policing Is Not Public Safety

Go here to see the original:
Policing Is Not 'Public Safety' - The Appeal

Posted in Fourth Amendment | Comments Off on Policing Is Not ‘Public Safety’ – The Appeal

Justice Thomas Takes Another Shot at Qualified Immunity – Reason

Posted: at 8:26 pm

In today's Orders List, the Supreme Court granted nine petitions for certiorari in cases that will be heard next term, added an original jurisdiction case to the docket, summarily reversed the grant of a habeas petition by the Eleventh Circuit, and resolved a few outstanding matters involving cases that had been put on hold due to the change in Presidential administration. The Court also rejected certiorari in a number of cases, several of which produced dissenting opinions on statements respecting the certiorari denial.

One such opinion I wanted to highlight was Justice Thomas' statement respecting the denial of certiorari inHoggard v. Rhodes, a qualified immunity case, albeit one that involves university administrators rather than cops.

Here's the Thomas opinion:

As I have noted before, our qualified immunity jurisprudence stands on shaky ground. Ziglar v. Abbasi, 582 U. S. ___, ___ (2017) (opinion concurring in part and concurring in judgment); Baxter v. Bracey, 590 U. S. ___ (2020) (opinion dissenting from denial of certiorari). Under this Court's precedent, executive officers who violate federal law are immune from money damages suits brought under Rev. Stat. 1979, 42 U. S. C. 1983, unless their conduct violates a "clearly established statutory or constitutional righ[t] of which a reasonable person would have known." Mullenix v. Luna, 577 U. S. 7, 11 (2015) (per curiam) (internal quotation marks omitted). But this test cannot be located in 1983's text and may have little basis in history. Baxter, 590 U. S., at ___, ___ (slip op., at 2, 4) (opinion of THOMAS, J.).

Aside from these problems, the one-size-fits-all doctrine is also an odd fit for many cases because the same test applies to officers who exercise a wide range of responsibilities and functions. Ziglar, 582 U. S., at ______ (opinion of THOMAS, J.) (slip op., at 45).* This petition illustrates that oddity: Petitioner alleges that university officials violated her First Amendment rights by prohibiting her from placing a small table on campus near the student union building to promote a student organization. According to the university, petitioner could engage with students only in a designated "Free Expression Area"the use of which required prior permission from the school. The Eighth Circuit concluded that this policy of restricting speech around the student union was unconstitutional as applied to petitioner. Turning Point USA at Ark. State Univ. v. Rhodes, 973 F. 3d 868, 879 (2020). Yet it granted immunity to the officials after determining that their actions, though unlawful, had not transgressed "'clearly established'" precedent. Id., at 881.

But why should university officers, who have time to make calculated choices about enacting or enforcing unconstitutional policies, receive the same protection as a police officer who makes a split-second decision to use force in a dangerous setting? We have never offered a satisfactory explanation to this question. See Ziglar, 582 U. S., at _____ (opinion of THOMAS, J.) (slip op., at 45).

This approach is even more concerning because "our analysis is [not] grounded in the common-law backdrop against which Congress enacted [1983]." Id., at ___ (slip op., at 5). It may be that the police officer would receive more protection than a university official at common law. See Oldham, Official Immunity at the Founding (manuscript, at 2223, available at https://ssrn.com/abstract=3824983) (suggesting that the "concept of unreasonableness [in the Fourth Amendment] could bring with it [common-law] official immunities"). Or maybe the opposite is true. Lee, The Curious Life of In Loco Parentis at American Universities, 8 Higher Ed. in Rev. 65, 67 (2011) (discussing how "[f]rom the mid-1800s to the 1960s" "constitutional rights stopped at the college gatesat both private and public institutions"). Whatever the history establishes, we at least ought to consider it. Instead, we have "substitute[d] our own policy preferences for the mandates of Congress" by conjuring up blanket immunity and then failed to justify our enacted policy. Ziglar, 582 U. S., at ___ (opinion of THOMAS, J.) (slip op., at 6).

The parties did not raise or brief these specific issues below. But in an appropriate case, we should reconsider either our one-size-fits-all test or the judicial doctrine of qualified immunity more generally.

I think it is only a matter of time before the Court revisits qualified immunity. The Court's liberals are clearly concerned the doctrine encourages impunity within law enforcement, and the Court's originalists and textualists are increasingly aware that the doctrine, at least as currently formulated, lacks a firm constitutional or statutory grounding.

Yet as this opinion indicates, the first crack in the QI edifice might not come in the law enforcement context. Rather, it is quite possible that the first cracks will appear in the public university setting. As Thomas notes, university administrators not faced with the need to make snap judgments under exigent circumstances. They often have university counsel at their side. Moreover, even where there are not Supreme Court cases directly on point, the requirements imposed by the First Amendment and Equal Protection Clause are sufficiently clear that university administrators could be considered to have sufficient notice of what sorts of conduct is or is not acceptable. Thusit would seem that prudential arguments for maintaining QI are less strong in the university setting than they might be in other contexts (even before one considers the question of what sorts of immunity did or did not apply to law enforcement historically).

Originally posted here:
Justice Thomas Takes Another Shot at Qualified Immunity - Reason

Posted in Fourth Amendment | Comments Off on Justice Thomas Takes Another Shot at Qualified Immunity – Reason

Department of Justice probing SpaceX for hiring discrimination – Yahoo News

Posted: at 8:26 pm

Elon Musk, founder and chief engineer of SpaceX speaks at the 2020 Satellite Conference and Exhibition March 9, 2020 in Washington, DC (Getty Images)

Elon Musk's SpaceX has been ordered by a US district judge to comply with a Department of Justice subpoena probing its hiring practices after the company was accused of discriminating against applicants based on their citizenship status.

CNBC reported that the subpoena was originally filed last October by the Immigrant and Employee Rights Section of the Department of Justice's Civil Rights Division.

Fabian Hutter, an applicant to SpaceX, claimed his application was denied because he is not American.

Mr Hutter has dual citizenship in Austria and Canada, but is a lawful permanent US resident.

"Specifically, the charge alleges that on or about March 10, 2020, during the Charging Partys interview for the position of technology strategy associate, SpaceX made inquiries about his citizenship status and ultimately failed to hire him for the position because he is not a US citizen or lawful permanent resident," DOJ attorney Lisa Sandoval wrote in a court filing in January.

A court order filed in December also revealed that the DOJ has requested documents relating to 3,000 other employees in its investigation into the alleged discriminatory hiring practices.

The DOJ plans to investigate whether the company has engaged in any other discriminatory hiring practices.

The company has been trying to fight the subpoena for months, but the latest ruling will force the company to comply within three weeks.

In April, SpaceX objected to the recommendation made by another federal judge suggesting the company be forced to comply with the subpoena.

That court recommended in March that there are "several" investigations into the company, according to CNBC. It rejected SpaceX's argument that the subpoena was "government overreach.

Lawyers for the company argued that the DOJ's investigation was overkill considering Mr Hutter's complaint.

No matter how generously relevance is construed in the context of administrative subpoenas, neither the statutory and regulatory authority IER relies on, nor the Fourth Amendment to the U.S. Constitution, permits IER to rifle through SpaceXs papers on a whim and absent reasonable justification, SpaceX said.

Story continues

The company argued that the investigation was "excessively overbroad, and that the IER's subpoena should be denied.

The company claimed that it currently employs "hundreds of non-US citizens" and said it did not hire Mr Hutter for the position because the company eliminated the position.

Under US International Traffic in Arms Regulations, SpaceX is allowed to hire noncitizens who have a green card.

Read More

Teen convicted in Slenderman stabbing granted conditional release

Rashad draws critics and dismissal calls for defending Cosby

Biden promises federal government will cover 100% of Miami rescue efforts costs for first month

Link:
Department of Justice probing SpaceX for hiring discrimination - Yahoo News

Posted in Fourth Amendment | Comments Off on Department of Justice probing SpaceX for hiring discrimination – Yahoo News

Professional Poker Player Banned For Deceiving Opponents By Knowingly Betting On Weak Hand – The Onion

Posted: at 8:25 pm

LAS VEGASFinding himself escorted from the premises as soon as his transgression came to light, professional poker player Curt Manginis was banned from The Venetian Casinos Texas hold em tournament Tuesday for deceiving his opponents by knowingly betting on a weak hand. Curt just kept raising and raising so we assumed he had a full house or something, but then when he flipped his cards over it was nothing but a pair of threes, and we were all just outraged, said fellow tournament-goer Pete Walton, expressing his fury that trickery of this nature had been allowed at a professional event. The rest of us folded in good faith, so to see that it was all nothing but a con is pretty unbelievable. We came here to play cards honorably at a high level, and its a shame to have it marred by such a blatant attempt at chicanery. At press time, an additional player had been banned for attempting to bamboozle and confuse opponents by spinning a poker chip on the table.

Go here to read the rest:

Professional Poker Player Banned For Deceiving Opponents By Knowingly Betting On Weak Hand - The Onion

Posted in Poker | Comments Off on Professional Poker Player Banned For Deceiving Opponents By Knowingly Betting On Weak Hand – The Onion