Make Frozen French Fries That Are Even Better Than Store-Bought

Frozen, store-bought french fries are beyond convenient, but you can easily make your own. Not only are homemade freezer fries cheaper than their grocery store counterparts, but you know exactly what’s going into them, and they taste a little better.

Click the link below to get the full instructions from The Kitchn, but all you’ll need is potatoes, vegetable oil, and a pot of salty water. Cut the potatoes into french fry shapes (I’m confident you know what this looks like), boil ‘em for a couple of minutes, then transfer to an ice bath to stop the cooking process. Drain them, dry them off, toss with oil, and freeze in a single layer on a parchment-lined baking sheet overnight. Once they’re completely frozen, transfer to a plastic bag, and pop the whole thing in the freezer until you’re ready to chow down. (These frozen fries can be stored up to six months, but I doubt they’ll last that long.)

How To Freeze Your Own French Fries | The Kitchn

Photo by Jill Shih.

via Lifehacker
Make Frozen French Fries That Are Even Better Than Store-Bought

Due diligence is a responsibility for investors, an opportunity for startups

Many startup companies begin with either an idea or a proprietary technology. Sometimes this technology is straightforward and easily explained; other times, it is novel and revolutionary.

For some founders, the latter can be a double-edged sword, especially once they begin to seek outside financing. If your technology is new, it can be hard to explain and prove. But if it is potentially disruptive, it can attract significant attention from potential investors.

The latter is what happened with the disgraced healthcare startup Theranos. Founder Elizabeth Holmes raised massive rounds of financing on the promise of a new way to test blood that would transform medical testing for all of mankind. Investors threw money at Holmes and Theranos, leading to a valuation of $9 billion at a 2014 financing round.

As the media has recently reported though, it would appear that few of Theranos’ investors had any experience in the medical and biopharma industries. Rather, those with ties to the technology industry came from software backgrounds, and the others were strong political players in the U.S.

These investors most likely did not perform their due diligence on Theranos and its technology. Because of their backgrounds, it’s possible that they did not even know what to look for. Theranos was known to keep their cards close to their chest, and was secretive about their technology and data.

Regardless, investors kept coming and giving money to the company. Were they investing without doing their own homework on the technology, instead relying on earlier investors they believed had performed due diligence themselves? In a recent op-ed for Fortune Magazine, marketing professor Kent Grayson explained this phenomenon as trusting “credence goods”:

For Theranos, these kinds of endorsements were made by a number of high-profile investors, such as software giant, Larry Ellison, and a prestigious board, which included high-profile lawyer, David Boies, and former secretary of state, Henry Kissinger. When well-respected people buy into something, we often assume that they’ve done our homework for us. After all, would they risk their reputation without doing their own due diligence?

Some excuse Theranos’ secrecy as merely protecting their intellectual property and technology, in addition to desiring confidentiality for their company. Having worked in the biotechnology industry for many years, and having raised capital for a medical products startup, I can say that that argument does not hold water.

If you don’t trust these people to keep your secrets under a confidentiality agreement, then you shouldn’t be in business with them.

Founders must be open to the scrutiny of due diligence. If your potential investors are bringing in scientists and experts to audit your company, you must trust them as they analyze your technology and data, especially in the medical sector. There are confidentiality agreements as well as other protections that you can put in place during the due diligence process. If you don’t trust these people to keep your secrets under a confidentiality agreement, then you shouldn’t be in business with them. There’s no reason why you can’t share your data and have it externally validated.

In Theranos’ case, it’s possible that investors invested in a technology that may ultimately not deliver what was promised. Unfortunately, this scenario does happen. Companies may oversell their technology by overstating its capabilities, or they may fail to pursue rigorous scientific procedure with respect to the efficacy of their technology. Sometimes investors get caught up in the narrative of the company. Theranos, in particular, was a media darling before The Wall Street Journal’s groundbreaking report last year.

It’s worth noting that, for the most part, well-known investors in the biotechnology and life sciences spaces, especially in Silicon Valley, did not invest in Theranos. Because these investors often have the expertise and the experience in their fields, they knew what to look for. In this case, biotechnology investors thought that Theranos’ technology seemed too good to be true. Even as Theranos continued to raise money and announce new applications of their technology, they remained unwilling to share their data. This was a red flag that told savvy biotechnology investors to stay away.

For medical startup companies, being able to share your data (under proper confidentiality agreements), having your technology validated in clinical trials and peer-reviewed in medical journals should be a welcome. It is a good thing to be able to prove the effectiveness of your product. You want to be able to show investors that your product works and has valid applications.

Founders should always be open to third-party validation. We took the time to have our first product — a medical device for treatment of snoring and sleep apnea — undergo clinical testing and peer review. By the time we took the product to market, and as we raised capital later on, we had data to share that showed that our product was clinically proven and that the technology was scientifically sound.

At the same time, due diligence is the responsibility of investors. If they don’t perform their due diligence, and they’re simply relying on the credibility or the pedigree of the management team, they risk investing in products or technology that is ultimately proven unsound.

Featured Image: sergign/Shutterstock

via TechCrunch
Due diligence is a responsibility for investors, an opportunity for startups

Guccifer 2.0 Hacked Clinton Foundation

Many of you have been waiting for this, some even asked me to do it.

So, this is the moment. I hacked the Clinton Foundation server and downloaded hundreds of thousands of docs and donors’ databases.

Hillary Clinton and her staff don’t even bother about the information security. It was just a matter of time to gain access to the Clinton Foundation server.

Here’s the contents of one of the folders that I got from there

folder

As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?

Here are some docs for example

A small list of donors master-west-tracker-2-5k-1-1-2010-7-10-2015

master-west-tracker-2-5k-1-1-2010-7-10-2015

Financial corporations’ donations hfscmemberdonationsbyparty6101

hfscmemberdonationsbyparty6101

It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.

master-spreadsheet-pac-contributions

master-spreadsheet-pac-contributions

Here’s a link to some other docs:

https://ufile.io/ebd

The password is usual, the same as in my slideshow:

(GuCCif3r_2.0)

I can’t post all databases here for they’re too large. I’m looking for a better way to release them now.

Keep following…

P.S. I’m pleased to congratulate Wikileaks on their 10th anniversary!!!

Julian, you are really cool! Stay safe and sound!

via Guccifer 2.0
Guccifer 2.0 Hacked Clinton Foundation

What to Consider When Replacing Your Kitchen Sink

If you’re renovating your kitchen and want to replace the sink, there are tons of different types to choose from, each with their own pros and cons. When you pick out your next sink, here’s what you should think about to get the one that best fits your needs and budget.

Here are the pros and cons of four common kitchen sinks, and what you should consider before buying one of them:

  • Drop-In, also called top mount sinks, have an edge and can be dropped into a cutout for easy installation into almost any kind of counter. They’re usually less expensive, but the edge makes cleaning around them a bit of a hassle.
  • Undermount must be installed under the counter, which leaves the counter edges around the sink exposed so you can only install it in solid surface counters like marble. The joint between the counter and sink must be sealed well. Undermount sinks don’t have a raised edge, so sweeping crumbs directly into the sink is easy. Laying cutting boards or a sheet pan across it for additional counter space is easy, too.
  • Farmhouse sinks’ large basin makes it easy to fit large pots or pans for soaking and cleaning, but makes it hard to soak and rinse dishes at once. This style of sink typically has a protruding “apron” or lip at the front that extends past the cabinets, which can be either a pro or a con depending on your style preferences.
  • Integrals provide a seamless look, but are harder to switch out since you also have to replace the countertop. They are a bold choice because of the sink and surrounding countertop combination.

Whether you plan to do the installation yourself and what look is right for your kitchen help you decide which sink to pick. You should also think about how the sink will affect your cooking. For example, the undermount sink makes clean-up easier, but needs to be installed by a professional.

Pros & Cons to Consider When Choosing Your Next Kitchen Sink | Apartment Therapy

Image from rmommaerts.

via Lifehacker
What to Consider When Replacing Your Kitchen Sink

Google WiFi is a router that simplifies whole-home wireless

Those rumors of Google giving WiFi routers another shot? They’re true. Meet Google WiFi, a router designed entirely in-house… and with a few nice advantages over the OnHub line. Apart from being much smaller (no vase-like design here), its big trick is its ability to create an Eero-style mesh network. You only have to add additional units to your network to improve coverage — there’s a Network Assistant app that makes it easy to add more routers and improve your signal.

The companion software also lets you control the devices linked to the router, such as enabling or disabling their connections. You’ll have to wait until December to get Google WiFi (pre-orders start in November), but the pricing at least hits the sweet spot. Routers cost $129 each, and you can get a three-pack for $299 if you need to blanket your home.

Click here to catch all the latest news from Google’s fall event.

Source: Google WiFi

via Engadget
Google WiFi is a router that simplifies whole-home wireless

How to Stream Tonight’s Vice Presidential Debate Online, No Cable Required

How to Stream Tonight's Vice Presidential Debate Online, No Cable Required

Tonight, with a month left before the election, Vice Presidential candidates Tim Kaine (D) and Mike Pence (R) will square off in their first debate. Here’s how you can watch online, even if you don’t have cable.

The debate will begin at 9PM ET/6PM PT. The debate will take place in Longwood University, in Farmville, Va. CBS News’ Elaine Quijano will be moderating. The debate will be streamed from a wide variety of sources, but here are some of the easiest to watch:

You can also stream the debate over your set-top boxes or mobile devices with network apps including the following:

You can also listen to the debates, if you’d prefer, via NPR on its member stations, via NPR.org, on Facebook, or through the NPR One apps. If you can’t find a stream from a news outlet you like here, there are countless others. Unlike the primary debates, the presidential series of debates are pretty open which means you have a buffet of choices.


via Lifehacker
How to Stream Tonight’s Vice Presidential Debate Online, No Cable Required

Trump campaign snaps up ClintonKaine.com

The next step of the 2016 Presidential election? Apparently, domain squatting. Wired reports that after Hillary Clinton’s campaign declined to buy a domain consisting of her last name combined with that of her running mate, the owner sold it to her opponent. As noticed earlier today by a reporter for Politico, ClintonKaine.com hosts a Drudge Report-styled collection of negative headlines about its namesakes (and absolutely no bad news about its owner), with a small tag at the bottom indicating who owns the website.

The former owner snapped up the domain back in 2011 for $7.30, and USA Today reports he sold it for $15,000 after Clinton’s campaign offered $2,000. Of course, the strategy is not making its first appearance in this year’s race, as Donald Trump’s campaign previously obtained JebBush.com as a redirect to its official website. Unless it’s due to media coverage, it’s hard to see who will run across a website that the previous owner said was getting 50 hits a day, but we suppose you have to do what you can for SEO.

Source: USA Today

via Engadget
Trump campaign snaps up ClintonKaine.com

Death is Coming in the First Trailer for Pirates of the Caribbean: Dead Men Tell No Tales

Jack Sparrow is a no-show in the first trailer for Pirates of the Caribbean: Dead Men Tell No Tales, but he casts a large shadow.

The fifth film in Disney’s blockbuster franchise opens May 26 and it seems like Javier Bardem’s Captain Salazar will be hot on the tail of Sparrow, once again played by Johnny Depp. Here’s the teaser.

Directed by Joachim Rønning and Espen Sandberg, Dead Men Tell No Tales will bring back Orlando Bloom, Geoffrey Rush and others. Here are some stills from the trailer.

via Gizmodo
Death is Coming in the First Trailer for Pirates of the Caribbean: Dead Men Tell No Tales

First Amendment Finally Reaches Patent Law

The big news from Intellectual Ventures v. Symantec (Fed. Cir. 2016) is not that the court found IV’s content identification system patents invalid as claiming ineligible subject matter.  (Although that did happen). Rather, the big event is Judge Mayer’s concurring opinion that makes “make two points: (1) patents constricting the essential channels of online communication run afoul of the First Amendment; and (2) claims directed to software implemented on a generic computer are categorically not eligible for patent.”

Read Judge Mayer’s opinion in full:

MAYER, Circuit Judge, concurring.

I agree that all claims on appeal fall outside of 35 U.S.C. § 101. I write separately, however, to make two points: (1) patents constricting the essential channels of online communication run afoul of the First Amendment; and (2) claims directed to software implemented on a generic computer are categorically not eligible for patent.

I. “[T]he Constitution protects the right to receive information and ideas. … This right to receive information and ideas, regardless of their social worth, is fundamental to our free society.” Stanley v. Georgia, 394 U.S. 557, 564 (1969) (citations omitted). Patents, which function as government-sanctioned monopolies, invade core First Amendment rights when they are allowed to obstruct the essential channels of scientific, economic, and political discourse. See United States v. Playboy Entm’t Grp., Inc., 529 U.S. 803, 812 (2000) (“The distinction between laws burdening and laws banning speech is but a matter of degree.”); see also In re Tam, 808 F.3d 1321, 1340 (Fed. Cir. 2015) (en banc) (explaining that the government may impermissibly burden speech “even when it does so indirectly”).

Although the claims at issue here disclose no new technology, they have the potential to disrupt, or even derail, large swaths of online communication. U.S. Patent No. 6,460,050 (the “’050 patent”) purports to cover methods of “identifying characteristics of data files,” ‘050 patent, col. 8 l. 13, whereas U.S. Patent No. 6,073,142 (the “’142 patent”) broadly claims systems and methods which allow an organization to control internal email distribution, ‘142 patent, col. 1 ll. 15–34. U.S. Patent No. 5,987,610 (the “’610 patent”) describes, in sweeping terms, screening a communication for viruses or other harmful content at an intermediary location before delivering it to an addressee. See ‘610 patent, col. 14 ll. 34–47. The asserted claims speak in vague, functional language, giving them the elasticity to reach a significant slice of all email traffic. See Gottschalk v. Benson, 409 U.S. 63, 69 (1972) (“Benson”) (explaining that claims are patent eligible only if they contain limitations “sufficiently definite to confine the patent monopoly within rather definite bounds”). Indeed, the claims of the ‘610 patent could reasonably be read to cover most methods of screening for harmful content while data is being transmitted over a network. See ‘610 patent, col. 1 ll. 59–61 (describing “screen[ing] computer data for viruses within a telephone network before communicating the computer data to an end user”).
Suppression of free speech is no less pernicious because it occurs in the digital, rather than the physical, realm. “[W]hatever the challenges of applying the Constitution to ever-advancing technology, the basic principles of freedom of speech and the press, like the First Amendment’s command, do not vary when a new and different medium for communication appears.” Brown v. Entm’t Merchs. Ass’n, 564 U.S. 786, 790 (2011) (citations and internal quotation marks omitted). Essential First Amendment freedoms are abridged when the Patent and Trademark Office (“PTO”) is permitted to balkanize the Internet, granting patent owners the right to exact heavy taxes on widely-used conduits for online expression.

Like all congressional powers, the power to issue patents and copyrights is circumscribed by the First Amendment. See Golan v. Holder, 132 S. Ct. 873, 889–93 (2012); Eldred v. Ashcroft, 537 U.S. 186, 219–21 (2003). In the copyright context, the law has developed “built-in First Amendment accommodations.” Eldred, 537 U.S. at 219; see also Park ‘N Fly, Inc. v. Dollar Park & Fly, Inc., 469 U.S. 189, 201 (1985) (noting that the Lanham Act contains safeguards to prevent trademark protection from “tak[ing] from the public domain language that is merely descriptive”). Specifically, copyright law “distinguishes between ideas and expression and makes only the latter eligible for copyright protection.” Eldred, 537 U.S. at 219; see also Harper & Row Publishers, Inc. v. Nation Enters., 471 U.S. 539, 556 (1985) (explaining that “copyright’s idea/expression dichotomy” supplies “a definitional balance between the First Amendment and the Copyright Act by permitting free communication of facts while still protecting an author’s expression” (citations and internal quotation marks omitted)). It also applies a “fair use” defense, permitting members of “the public to use not only facts and ideas contained in a copyrighted work, but also expression itself in certain circumstances.” Eldred, 537 U.S. at 219; see 17 U.S.C. § 107 (“[T]he fair use of a copyrighted work, including such use by reproduction in copies … for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.”).

Just as the idea/expression dichotomy and the fair use defense serve to keep copyright protection from abridging free speech rights, restrictions on subject matter eligibility can be used to keep patent protection within constitutional bounds. Section 101 creates a “patent-free zone” and places within it the indispensable instruments of social, economic, and scientific endeavor. See Alice Corp. v. CLS Bank Int’l, 134 S. Ct. 2347, 2354 (2014) (emphasizing that the “building blocks of human ingenuity” are patent ineligible); Benson, 409 U.S. at 67 (stating that “mental processes … and abstract intellectual concepts are not patentable, as they are the basic tools of scientific and technological work”). Online communication has become a “basic tool[ ],” Benson, 409 U.S. at 67, of modern life, driving innovation and supplying a widely-used platform for political dialogue. See Ultramercial, Inc. v. Hulu, LLC, 772 F.3d 709, 716 (Fed. Cir. 2014) (noting that the Internet “is a ubiquitous information-transmitting medium”); see also U.S. Telecom Ass’n v. Fed. Commc’n Comm’n, 825 F.3d 674, 698 (D.C. Cir. 2016) (explaining that online communication “has transformed nearly every aspect of our lives, from profound actions like choosing a leader, building a career, and falling in love to more quotidian ones like hailing a cab and watching a movie”). Section 101, if properly applied, can preserve the Internet’s open architecture and weed out those patents that chill political expression and impermissibly obstruct the marketplace of ideas.

As both the Supreme Court and this court have recognized, section 101 imposes “a threshold test,” Bilski v. Kappos, 561 U.S. 593, 602 (2010), one that must be satisfied before a court can proceed to consider subordinate validity issues such as non-obviousness under 35 U.S.C. § 103 or adequate written description under 35 U.S.C. § 112. See Parker v. Flook, 437 U.S. 584, 593 (1978) (“Flook”) (“The obligation to determine what type of discovery is sought to be patented” so as to determine whether it falls within the ambit of section 101 “must precede the determination of whether that discovery is, in fact, new or obvious.”); In re Comiskey, 554 F.3d 967, 973 (Fed. Cir. 2009) (“Only if the requirements of § 101 are satisfied is the inventor allowed to pass through to the other requirements for patentability, such as novelty under § 102 and … non-obviousness under § 103.” (citations and internal quotation marks omitted)); State St. Bank & Trust Co. v. Signature Fin. Grp., Inc., 149 F.3d 1368, 1372 n.2 (Fed. Cir. 1998) (explaining that section 101 is “[t]he first door which must be opened on the difficult path to patentability” (citations and internal quotation marks omitted)). Indeed, if claimed subject matter is not even eligible for patent protection, any pronouncement on whether it is novel or adequately supported by the written description constitutes an impermissible advisory opinion. See, e.g., Golden v. Zwickler, 394 U.S. 103, 108 (1969) (emphasizing that Article III courts “do not render advisory opinions” (citations and internal quotation marks omitted)).

The public has a “paramount interest in seeing that patent monopolies … are kept within their legitimate scope.” Cuozzo Speed Techs., LLC v. Lee, 136 S. Ct. 2131, 2144 (2016) (citations and internal quotation marks omitted); see also Medtronic, Inc. v. Mirowski Family Ventures, LLC, 134 S. Ct. 843, 851 (2014). Nowhere is that interest more compelling than in the context of claims that threaten fundamental First Amendment freedoms. See Palko v. Connecticut, 302 U.S. 319, 326–27 (1937) (“[F]reedom of thought and speech … is the matrix, the indispensable condition, of nearly every other form of freedom.”). “As the most participatory form of mass speech yet developed, the Internet deserves the highest protection from governmental intrusion.” ACLU v. Reno, 929 F. Supp. 824, 883 (E.D. Pa. 1996), aff’d, 521 U.S. 844 (1997). A robust application of section 101 at the outset of litigation will ensure that the essential channels of online communication remain “free to all men and reserved exclusively to none,” Funk Brothers Seed Co. v. Kalo Inoculant Co., 333 U.S. 127, 130 (1948).

II. Most of the First Amendment concerns associated with patent protection could be avoided if this court were willing to acknowledge that Alice sounded the death knell for software patents. The claims at issue in Alice were directed to a computer-implemented system for mitigating settlement risk. 134 S. Ct. at 2352–53. Although the petitioners argued that their claims were patent eligible because they were tied to a computer and a computer is a tangible object, the Supreme Court unanimously and emphatically rejected this argument. Id. at 2358–60. The Court explained that the “mere recitation of a generic computer cannot transform a patent-ineligible abstract idea into a patent-eligible invention.” Id. at 2358. Accordingly, “[t]he fact that a computer necessarily exist[s] in the physical, rather than purely conceptual, realm is beside the point” in the section 101 calculus. Id. (citations and internal quotation marks omitted).

Software is a form of language—in essence, a set of instructions. See Microsoft Corp. v. AT&T Corp., 550 U.S. 437, 447 (2007) (explaining that “software” is “the set of instructions, known as code, that directs a computer to perform specified functions or operations” (citations and internal quotation marks omitted)); see also 17 U.S.C. § 101 (defining a “ ‘computer program,’ ” for purposes of the Copyright Act, as “a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result”). It is inherently abstract because it is merely “an idea without physical embodiment,” Microsoft, 550 U.S. at 449 (emphasis added). Given that an “idea” is not patentable, see, e.g., Benson, 409 U.S. at 67, and a generic computer is “beside the point” in the eligibility analysis, Alice, 134 S. Ct. at 2358, all software implemented on a standard computer should be deemed categorically outside the bounds of section 101.

The central problem with affording patent protection to generically-implemented software is that standard computers have long been ceded to the public domain. See Flook, 437 U.S. at 593 n.15 (“[I]n granting patent rights, the public must not be deprived of any rights that it theretofore freely enjoyed” (citations and internal quotation marks omitted)). Because generic computers are ubiquitous and indispensable, in effect the “basic tool [ ],” Benson, 409 U.S. at 67, of modern life, they are not subject to the patent monopoly. In the section 101 calculus, adding software (which is as abstract as language) to a conventional computer (which rightfully resides in the public domain) results in a patent eligibility score of zero. See Alice, 134 S. Ct. at 2358 (“Stating an abstract idea while adding the words ‘apply it with a computer’ simply combines those two steps, with the same deficient result.”).

Software lies in the antechamber of patentable invention. Because generically-implemented software is an “idea” insufficiently linked to any defining physical structure other than a standard computer, it is a precursor to technology rather than technology itself. See Mackay Radio & Tel. Co. v. Radio Corp., 306 U.S. 86, 94 (1939) (“While a scientific truth, or the mathematical expression of it, is not patentable invention, a novel and useful structure created with the aid of knowledge of scientific truth may be.”). It is well past time to return software to its historical dwelling place in the domain of copyright. See Benson, 409 U.S. at 72 (citing a report from a presidential commission explaining that copyright is available to protect software and that software development had “undergone substantial and satisfactory growth” even without patent protection (citations and internal quotation marks omitted)); Oracle Am., Inc. v. Google Inc., 750 F.3d 1339, 1380 (Fed. Cir. 2014) (noting that “several commentators” have “argue[d] that the complex and expensive patent system is a terrible fit for the fast-moving software industry” and that copyright provides “[a] perfectly adequate means of protecting and rewarding software developers for their ingenuity” (citations and internal quotation marks omitted)); Peter S. Menell, An Analysis of the Scope of Copyright Protection for Application Programs, 41 Stan. L. Rev. 1045, 1076 (1989) (explaining that patents were historically “not seen as a viable option for the protection of most application program code” and that many software programs “simply do not manifest sufficient novelty or nonobviousness to merit patent protection”).

Software development has flourished despite—not because of—the availability of expansive patent protection. See Brief of Amicus Curiae Elec. Frontier Found. in Support of Respondents, Alice, 134 S. Ct. 2347 (No. 13-298), 2014 WL 828047, at *6–7 (“EFF Brief”) (“The software market began its rapid increase in the early 1980s … more than a decade before the Federal Circuit concocted widespread software patents in 1994…. Obviously, no patents were needed for software to become a $60 billion/year industry by 1994.”); Mark A. Lemley, Software Patents and the Return of Functional Claiming, 2013 Wis. L. Rev. 905, 935 (2013) (“Software patents … have created a large number of problems for the industry, particularly for the most innovative and productive companies. … [T]he existence of a vibrant open source community suggests that innovation can flourish in software absent patent protection.” (footnote omitted)); Wendy Seltzer, Software Patents and/or Software Development, 78 Brook. L. Rev. 929, 930 (2013) (“Seltzer”) (“Present knowledge and experience now offer sufficient evidence that patents disserve software innovation.”); Arti K. Rai, John R. Allison, & Bhaven N. Sampat, University Software Ownership and Litigation: A First Examination, 87 N.C. L. Rev. 1519, 1555–56 (2009) (“While most small biotechnology firms that receive venture financing have patents, the available empirical evidence indicates that most software start-ups that receive venture financing, particularly in the first round, do not have patents.”).

From an eligibility perspective, software claims suffer from at least four insurmountable problems. First, their scope is generally vastly disproportionate to their technological disclosure. In assessing patent eligibility, “the underlying functional concern … is a relative one: how much future innovation is foreclosed relative to the contribution of the inventor.” Mayo Collaborative Servs. v. Prometheus Labs., Inc., 132 S. Ct. 1289, 1303 (2012); see also Motion Picture Patents Co. v. Universal Film Mfg. Co., 243 U.S. 502, 513 (1917) (“[T]he inventor [is entitled to] the exclusive use of just what his inventive genius has discovered. It is all that the statute provides shall be given to him and it is all that he should receive, for it is the fair as well as the statutory measure of his reward for his contribution to the public stock of knowledge.”). Software patents typically do not include any actual code developed by the patentee, but instead describe, in intentionally vague and broad language, a particular goal or objective. See Dan L. Burk & Mark A. Lemley, Is Patent Law Technology-Specific?, 17 Berkeley Tech. L. J. 1155, 1164–65 (2002) (“Unfortunately, the Federal Circuit’s peculiar direction in the software enablement cases has effectively nullified the disclosure requirement for software patents. And since source code is normally kept secret, software patentees generally disclose little or no detail about their programs to the public.” (footnote omitted)). Here, for example, the ‘610 patent discusses the objective of “screen[ing] computer data for viruses … before communicating the computer data to an end user,” ‘610 patent, col. 1 ll. 59–61, but fails to disclose any specific, inventive guidance for achieving that goal. In effect, the ‘610 patent, like most software patents, describes a desirable destination but neglects to provide any intelligible roadmap for getting there.

A second, and related, problem with software patents is that they provide incentives at the wrong time. Because they are typically obtained at the “idea” stage, before any real inventive work has been done, such patents are incapable of effectively incentivizing meaningful advances in science and technology. “A player focused on patenting can obtain numerous patents without developing any of the technologies to useful levels of deployment or disclosure, leaving a minefield of abstract patent claims for others who actually deploy software.” Seltzer, 78 Brook. L. Rev. at 931. Here, for example, it took no significant inventive effort to recognize that communications should be screened for harmful content before delivery. The hard work came later, when software developers created screening systems capable of preventing our email boxes from being overrun with spam or disabled by viruses. Granting patents on software “ideas”—before they have been actually reduced to practice—has created a perverse incentive scheme. Under our current regime, those who scamper to the PTO early, often equipped with little more than vague notions about using computers to automate well-known business and social practices, can reap hefty financial dividends. By contrast, those who actually create and deploy useful computer-centric products are “rewarded” with mammoth potential infringement liability. See id. at 972 (“In software … the long road from idea to implementation often snags on patents early in the course. Engineers can describe what they want software to do—in terms that have been sufficient for the PTO—well before they have made it work. Pressures to patent early produce a thicket of pre-implementation claims.”); EFF Brief, 2014 WL 828047, at *23 (describing a study which “found that between 2007 and 2011, 46 percent of patent lawsuits involved software patents, accounting for 89 percent of the increase in the number of patent defendants during this timeframe”).

Yet another intractable problem with software patents is their sheer number. See Brief Of Amici Curiae Checkpoint Software, Inc. et al. in Support of Respondents, Alice, 134 S. Ct. 2347 (No. 13-298), 2014 WL 828039, at *8 (“[B]ecause computer products—as opposed to patents—inevitably integrate complex, multicomponent technology, any given product is potentially subject to a large number of patents. … Some industry experts have estimated that 250,000 patents go into a modern smartphone.” (citations omitted)). Given the vast number of software patents—most of which are replete with broad, functional claims—it is virtually impossible to innovate in any technological field without being ensnared by the patent thicket. See id. (describing the “overwhelming set of overlapping patent rights that impede innovation”). Software patents impose a deadweight loss on the nation’s economy, erecting often insurmountable barriers to innovation and forcing companies to expend exorbitant sums defending against meritless infringement suits. See Shawn P. Miller, “Fuzzy” Software Patent Boundaries and High Claim Construction Reversal Rates, 17 Stan. Tech. L. Rev. 809, 810 (2014) (“Patent litigation is so expensive it has been described as the sport of kings. … These expenses, however, may be dwarfed by the social cost of patent litigation in reducing incentives for producers to bring innovative products to market.” (footnote and internal quotation marks omitted)).

Fourth, and most fundamentally, generically-implemented software invariably lacks the concrete borders the patent law demands. See, e.g., Digital Equip. Corp. v. AltaVista Tech., Inc., 960 F. Supp. 456, 462 (D. Mass. 1997) (“The Internet has no territorial boundaries. To paraphrase Gertrude Stein, as far as the Internet is concerned, not only is there perhaps ‘no there there,’ the ‘there’ is everywhere where there is Internet access.”). Patent protection is all about boundaries. An applicant has the right to obtain a patent only if he can describe, with reasonable clarity, the metes and bounds of his invention. See Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co., 535 U.S. 722, 730 (2002) (explaining that the patent “monopoly is a property right[ ] and like any property right, its boundaries should be clear”). A properly issued patent claim represents a line of demarcation, defining the territory over which the patentee can exercise the right to exclude. See Nautilus, Inc. v. Biosig Instruments, Inc., 134 S. Ct. 2120, 2129 (2014) (emphasizing that “a patent must be precise enough to afford clear notice of what is claimed, thereby appris[ing] the public of what is still open to them” (citations and internal quotation marks omitted)).

Software, however, is akin to a work of literature or a piece of music, undeniably important, but too unbounded, i.e., too “abstract,” to qualify as a patent-eligible invention. See Microsoft, 550 U.S. at 447–48 (explaining that software “instructions … detached from any medium” are analogous to “[t]he notes of Beethoven’s Ninth Symphony”). And, as discussed previously, given that generic computers are both omnipresent and indispensable, they are incapable of providing structure “sufficiently definite to confine the patent monopoly within rather definite bounds,” Benson, 409 U.S. at 69. In short, because directing that software should be applied via standard computer elements is little different than stating that it should be written down using pen and paper, generically-implemented software lacks the concrete contours required by section 101. See Alice, 134 S. Ct. at 2352 (emphasizing that “merely requiring generic computer implementation” does not remove claims from the realm of the abstract).

Declaring that software implemented on a generic computer falls outside of section 101 would provide much-needed clarity and consistency in our approach to patent eligibility. It would end the semantic gymnastics of trying to bootstrap software into the patent system by alleging it offers a “specific method of filtering Internet content,” see BASCOM Global Internet Servs., Inc. v. AT&T Mobility LLC, 827 F.3d 1341, 1350 (Fed. Cir. 2016), makes the computer faster, see Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1337–39 (Fed. Cir. 2016), or the Internet better, see DDR Holdings, LLC v. Hotels.com, L.P., 773 F.3d 1245, 1257 (Fed. Cir. 2014), just to snuggle up to a casual bit of dictum in Alice, 134 S. Ct. at 2359. Software runs computers and the Internet; improving them up to the current limits of technology is merely more of the same. The claims at issue in BASCOM, Enfish, and DDR, like those found patent ineligible in Alice, do “no more than require a generic computer to perform generic computer functions,” Alice, 134 S. Ct. at 2359. Eliminating generically-implemented software patents would clear the patent thicket, ensuring that patent protection promotes, rather than impedes, “the onward march of science,” O’Reilly v. Morse, 56 U.S. (15 How.) 62, 113 (1853), and allowing technological innovation to proceed apace.

 

via Patent Law Blog (Patently-O)
First Amendment Finally Reaches Patent Law