49,314 research outputs found

    Physicality in Australian patent law

    Get PDF
    It is generally understood that the patent system exists to encourage the conception and disclosure of new and useful inventions embodied in machines and other physical devices, along with new methods that physically transform matter from one state to another. What is not well understood is whether, and to what extent, the patent system is to encourage and protect the conception and disclosure of inventions that are non-physical methods – namely those that do not result in a physical transformation of matter. This issue was considered in Grant v Commissioner of Patents. In that case the Full Court of the Federal Court of Australia held that an invention must involve a physical effect or transformation to be patentable subject matter. In doing so, it introduced a physicality requirement into Australian law. What this article seeks to establish is whether the court’s decision is consistent with the case law on point. It does so by examining the key common law cases that followed the High Court’s watershed decision in National Research Development Corporation v Commissioner of Patents, the undisputed authoritative statement of principle in regard to the patentable subject matter standard in Australia. This is done with a view to determining whether there is anything in those cases that supports the view that the Australian patentable subject matter test contains a physicality requirement

    African Universities: Stories of Change

    Get PDF
    Profiles successful foundation initiatives in Ghana, Kenya, Mozambique, Nigeria, South Africa, Tanzania, and Uganda that are reforming the higher education landscape in Africa

    Body language, security and e-commerce

    Get PDF
    Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations

    Make it so! Jean-Luc Picard, Bart Simpson and the design of e-public services

    Get PDF
    In this paper, we report on a project applying participatory design methods to include people who have experience of social exclusion (in one form or another) in designing possible technologies for e-(local)-government services. The work was part of a project for the Office of the Deputy Prime Minister in the UK, and was concerned with ‘access tokens’ that can provide personal identification for individuals accessing public services, based on technologies such as multi-functional smartcards, flash memory sticks, mobile phone SIMs or similar devices. In particular we report on our experience using the ‘pastiche scenarios’ technique recently developed by Mark Blythe. Our findings indicate that the technique can be effective and engaging in helping people to create realistic scenarios of future technology use and highlight some possible pitfalls to consider when using this technique.</p

    Biometrics and Network Security

    Get PDF
    This paper examines the techniques used in the two categories of biometric techniques (physiological and behavioral) and considers some of the applications for biometric technologies. Common physiological biometrics include finger characteristics (fingertip [fingerprint], thumb, finger length or pattern), palm (print or topography), hand geometry, wrist vein, face, and eye (retina or iris). Behavioral biometrics include voiceprints, keystroke dynamics, and handwritten signatures

    The changing nature of the payments system: should new players mean new rules?

    Get PDF
    Traditional forms of payment, such as currency, coin, and paper checks, are quickly being eclipsed by electronic forms, such as payments made by ATM, credit card, or automated clearing house. More recently, smart cards, debit cards, and PC banking have joined this electronic army of new ways to make payments. A parallel development has been the entrance of many nonbank players into the payments arena. Nowadays, settlement and clearing can be done by entities that are not necessarily banks, the customary center of the U.S. payments system. As these new entrants grow in number and become more popular, concerns about regulating these newcomers have arisen. In this article, Loretta Mester documents changes in the use of various forms of retail payments and outlines some of the regulatory concerns as she considers the question, Should new players mean new rules?Payment systems

    Sources of business cycles in Korea and the United States

    Get PDF
    The authors estimate common and nation-specific components of technology shocks, real demand shocks, and combined (common and nation-specific) monetary shocks using quarterly data for Korea and the United States.Business cycles ; Korea
    corecore