Wednesday, January 30, 2008

WHAT'S THE DIFFERENCE BETWEEN PERFUME AND COLOGNE?

officially: Perfume - is 25% or more of fragrant oils Eau de Parfum - is 15% to 18% fragrant oils Eau de Toilette - is 10% fragrant oils Eau de Cologne - is 5% to 8% fragrant oils Aftershave - is 3% fragrant oils

NEW BOOK: ALEX GRAHAM BELL STOLE IDEA FOR TELEPHONE

Newswires report that a new book has been published, "The Telephone Gambit: Chasing Alexander Graham Bell's Secret" by Seth Shulman, in which Shulman attempts to prove that Bell stole the key idea for his telephone. Shulman argues that up until the year 1876, Bell was unable to figure out how to transmit sound electromagnetically over a wire, as evidenced by reports of failure in his laboratory notebooks. Then, after a 12-day gap in 1876, when Bell went to Washington to discuss patent issues at the Patent Office - Bell began developing a new mechanism for voice transmission, which proved to be successful. Did Bell get a look at his competitor's patents, the patents of Elisha Gray? Shulman argues yes, by comparing the diagrams Bell made of his new transmitter to diagrams in Gray's earlier patent applications. Shulman argues the two sets of diagrams are substantially similar to conclude that Bell stole his key idea from Gray. Of course, nowadays, thanks to the security morons in USPTO management (no one in PTO management has any real experience with national security), all you have to do to steal some important new piece of technology is to find the name of the tele-working examiner who is handling the technology, easily break into his house one night when he is gone, and quickly make copies of technology nowhere else disclosed.

RIAA: PERSONAL COPYING IS ILLEGAL

The RIAA has exponentially insane passion for
defending its members' copyright interests.

   "In an Arizona case against a defendant who has no legal
   representation, Atlantic v. Howell, the RIAA is now arguing -
   contrary to its lawyers' statements to the United States Supreme
   Court in 2005 MGM v. Grokster - that the defendant's ripping of
   personal MP3 copies onto his computer is a copyright infringement.
   At page 15 of its brief (PDF) it states the following:  'It is
   undisputed that Defendant possessed unauthorized copies... Virtually
   all of the sound recordings... are in the ".mp3" format for his and
   his wife's use... Once Defendant converted Plaintiffs' recordings
   into the compressed .mp3 format and they are in his shared folder,
   they are no longer the authorized copies..."

The brief is at: www. ilrweb.com/

Tuesday, January 29, 2008

Movie Industry Admits Error in MPAA Statistics

This week's National Journal's Tech Daily news reports that: Movie Industry Admits Error On Downloading Study Hollywood laid much of the blame for illegal movie-downloading on college students in a study. But AP reports that now the industry says its math was wrong. In a 2005 study it commissioned, the Motion Picture Association of America claimed that 44 percent of the industry's domestic losses came from illegal downloading of movies by college students, who often have access to high-bandwidth networks on campus. The MPAA has used the study to pressure colleges to take tougher steps to prevent illegal file-sharing and to back legislation that would force them to do so. But now the MPAA has told education groups a "human error" in that survey caused it to get the number wrong. It now blames college students for about 15 percent of revenue loss.

Friday, January 18, 2008

Windows Annoyances, Practical Solutions and Humor

Windows XP has been a considerable improvement over its older
Microsoft sister versions, but it is still plagued with quirks that
make its users pull out heir hair. Windows XP was meant to be
flexible and highly customizable, but the typical default options are
not what most users would want. This and other annoyances are
comprehensively addressed by Windows Annoyances For Geeks and its
companion web site, annoyances.org

One of the best parts of the book is 100-plus pages meticulously addressing the problems with
Service Pack 2, which was meant to get Windows XP working smoothly. The
Service Pack 2 succeeds in doing so, but it changes innumerable
settings so that, for example, some of the network-dependent
applications
may afterwards refuse to work. Karp explains that the SP2,
having done its job, has also tightened the settings in Windows' own
firewall. He also provides tips and tweaks for getting the applications
back on-line again. The book is very structured and logical, and its
worth is in the actual applying of its simple, easy-to-follow advice.

www.Annoyances.org is similar to the books' logic, and is a relief for
anyone who is fed up with the insanely irritating Paperclip, which is
an animated assistant in MS Word, as well as with countless other bugs
and idiot messages in Windows applications.The site has a
wealth of resources, such as practical, working solutions, to bugs and
even little-known malfunctions which have been well-documented and are
available for all Microsoft products going back to Windows 95.
(From own article)

Wednesday, January 16, 2008

Google Desktop Exploitability

(As I published on Shvoong): It was a matter of time before someone
realized that Google Desktop has provided an opening into a PC through
which a hacker can get an easy entry. Mattan Gillon, an Israeli hacker,
performed an act of public service by exposing the flaw on his blog.

Exploiting a bug in Microsoft Internet Explorer's processing Cascading
Style Sheets (CSS). The CSS format is commonly used to give a Web
site page a consistent look and navigation properties, and attackers can
target the process by which IE
parses CSS while running Google Desktop. Gillon explains how browsers
usually turn off domain crossing. A specific web
page can direct a browser to another domain, though it may not retrieve
the contents of the page nor run any of its objects. This restriction
feature serves to preclude a site owner using JavaScript from spying on
a user. Additionally, if a user is already logged
on to a web service such as Yahoo, Hotmail or Gmail, a malicious web
page could be used to run a malicious operation in the user account.
This operation can be an opening of an email and the subsequent sending
it to a third party. In IE, these security features are easily broken
when the browser encounters a CSS import.

Mattan Gillon called this attack CSSXSS, or Cascading Style Sheets Cross-Site
Scripting. Using the IE browser's weakness of being fooled by curly
brackets strategically placed in a decoy site's code, and getting hold
of Google Desktop's key found in the application code, a hacker can
easily gain an entry into the target PC already running the Google
Desktop service.For this IE weakness to be
exploited, web surfers must first be tricked into visiting a malicious
Web site. They can protect themselves, however, if they turn off Active
Scripting in the IE's Internet Options menu, Gillon says.

Sunday, January 13, 2008

Free Patent Info

Free Patents Online (freepatentsonline.com) is probably the best one-stop patent research web site. Many patent search sites are built
around cumbersome Boolean search patent databases, where a user must know the correct search syntax and use it right the first time.
Moreover, these sites do not offer any extras, other than dry patenting policies and patenting news.

Free Patents Online, however, goes beyond the boring format and delivers what must be an entertaining form of patent searching.


For the experts who feel comfortable with Boolean searching, there is an option with intelligent word stemming feature, wherein the search also looks into the U. S. Patent Applications, and European Patent agency database.

For those who are intimidated by expert search option, there is an individual, example-driven field search.


Search results are the most user-friendly of all the search
services: the results are sorted into quick-loading hyperlink lists,
very often all on one page. Each hyperlink opens a plainly displayed
patent options: the abstract, the cited information, the claims, and
for viewing the actual published text or saving the patent on the
computer, there is an option to open an in-page Acrobat PDF view.


To make the visit truly enjoyable, the site has the Crazy Patents humor
section. There are, for example, patents on seemingly silly objects
such as a synthetic toys for animals, a religious meditation apparatus,
which is a birdhouse, a method of using a swing, a kissing shield, and
there are patents which might have been issued erroneously on the same
invention of the method for exercising a cat with a beam of light.


The site might be an entertainment even for those who never get to deal with patents or patent writing.
More info is on here

Monday, January 7, 2008

How To Use Patent And Patent Application

A patent is an exclusive right granted by a government to a person for a fixed period in exchange for a public disclosure of enabling details of a device, method, process or composition of matter, or substance, known as an invention that is new, inventive and useful, and enabling an average person to build the invention. The exclusive right granted an inventor is the right to prevent others from building and making a commercial use of the claimed invention, but does not preclude other individuals from a personal use of the device. Most countries have rigid requirements as to what must comprise a patent and its application. The patent application must be eloquent enough, but must not yet disclose the essentials of the invention, which are to be disclosed in the forthcoming parts of the patent. Another critical part of a patent application is the discussion of the prior art. The inventor must show the required usefulness by emphasizing the shortcomings of devices available heretofore, or the lack of devices or methods, which would alleviate or fulfill the commercial or public need. The prior art section must not prematurely disclose the invention, which is disclosed in the later sections. The next section is the summary of the invention, which is a plain language version of claims, which are written in a very legalese, strict language. The next section, the description of embodiments, fulfills the enabling requirement of the application. The section must narrate the construction, structure, the method of use, and functioning of the device, its components, subsystems, and discuss any possible variations in the shape, materials, critical dimensions, and any other unique features of the invention. The narrative must follow the numbering of a black-and-white drawing accompanying a patent, where all discussed parts must be clearly numbered. The claims section must be composed of nested claim groups centered on independent claims. For example, if an invention is a flashlight attachable to a car, and is also a flashlight permanently attached to another object, the claims would contain two independent claims, each describing a mode of the flashlight mounting. Similarly, if an invention contains an optional part, which is also uniquely inventive, the claims for the device will have at least two independent claims. In other words, each critical inventive aspect of an invention can be protected by an independent claim. Thereafter, dependent claims, written following an independent claim. The language of claims is unique and terse. A claim begins with a legally non-binding preamble, and is followed with the actual body of outlined claims. Very often, the preamble will contain as many words as possible needed to set up, or describe the device, on order to spare a patent writer to introduce too many words in a legally sensitive claim outline. Skilled use of technical synonyms, and, most importantly, indefinite and definite articles, will claim the maximum possible inventive territory for the patent. Both the strictness of the claim language and the fear of self-limiting often make the claims devoid of the either-or modes of an invention. Finally, the last part of a patent application is an abstract, which is a non-legal reiteration of the first independent claim written in a plain language.

Friday, January 4, 2008

Camille Paglia, the Persona

Whenever Camille Paglia's turns out another study of the Western
Culture, she succeeds in aggravating a wide spectrum of intellectuals.

Paglia's discovery that women's reproductive powers naturally bind them to men upsets feminist intellectuals.

She says that Ayn Rand-like capitalism has freed women from bondage to men, and she makes Leftists boil with indignation.

When she associates homosexual aestheticism with some of the
most despotic systems and shows that gay men's love of all things
masculine is idolatry, she is sure to ruin their day.

She crumples the most sacred institutions of Church and State
— because it is a male attempt to smother natural female forces, the
conservatives will grumble.

Paglia's claims that the great world we call Western Culture is
nothing more than social manifestations - through literature, art,
political and religious institutions - of men's phobia of mysteries
that lurk within women's vaginas and, consequently, of women's
emotional attempts to conquer their penises. By conquering nature, men
try to counter-conquer women, sex, and everything that resists being
bottled up by intellect.

Paglia points out that the penis, unlike the vagina, is external,
hence visual; it is linear, it can be measured, compared, formulated.
The vagina, on the other hand, is ambiguous, striking in color,
impossible to quantify or architecturally simulate.

Paglia holds that nature does not conform to the laws of man, of
culture. Man sees uncontainable nature in woman, in the liquids that
flow from her genitalia during sex and menstruation, from her breasts
after childbirth, and he is threatened, even while deeply drawn to that
very object which he lacks and finds fascinating. Man turns toward the
sky, toward Greek gods, and invests his faith in transcendental logic. The
male ego is a sexual persona that replicates itself in phallic
monuments and skyscrapers, stairways to the sky, to the sun, to heaven,
in religious doctrines that designate women as the servants of men, as
shrews are to be tamed. By controlling women, men are attempting to
control nature, the ultimate representation of power. Deep down they
know that, like their own penises that shrivel into a flaccid strands
of flesh once orgasm has been achieved, their own power is fleeting.
Therefore, they fight the futile war and wreck Western Culture further
into spectacular carnage.

Paglia's language is intellectually powerful and colorful, and
together with her uncanny, perfect grasp of art history proudly
saturates the book with all things that are Paglia.