Author Archive | Eric Waltmire

Test Marketing Your Invention

The Invent Blog linked to an article from the Wall Street Journal entitled Testing the Marketability Of Your Product Idea. The article suggests that you should test market your product or invention by soliciting feedback from (1) friends and family, (2) those who might understand your product’s industry or customers, (3) employees and customers in stores that sell similar items, and (4) online surveys.

What’s missing here? Google AdWords.

You can test market any idea in a short time using Google AdWords. Here’s how it works:

You create your ads
You create ads and choose keywords, which are words or phrases related to your business [or invention].

Your ads appear on Google
When people search on Google using one of your keywords, your ad may appear next

Continue Reading

Microsoft’s Patent vs. IL Eavesdropping Statute

The PTO recently granted Microsoft patent 7,231,019. It covers a method and system of identifying callers by (1) capturing the acoustic properties of the caller’s voice, (2) creating an acoustic model of the caller’s voice, and (3) comparing that model to stored models of prior callers. It also compares the caller’s words with language models compiled for previous callers to assist in caller identification.

Illinois has a relatively strict eavesdropping statute. So, I wondered whether a person could violate the eavesdropping statute by using this system.

Microsoft’s system is capable of identifying a caller from a single utterance. The system is able to identify a caller “without alerting the caller to the identification process.” The patent claims the system is useful for, among other things,(1) “easily filter[ing] unwanted calls …

Continue Reading

Patenting Software Security Fixes

The Register reports on a company called Intellectual Weapons, which offers to patent fixes for newly discovered security vulnerabilities, weaknesses, or technical flaws in software. Then the company will seek to license the fixes to vendors of the vulnerable products and other security providers.

Intellectual Weapons describes their process:

  1. You submit vulnerabilities you have discovered, without telling anyone else.
  2. If we accept them, we work together to develop a fix.
  3. We develop intellectual property relating to the fix, and license or enforce it
  4. You share in the profits

The company acknowledges enforcement may be tough:

Enforcing the IP may not be straightforward-we fully anticipate major battles. . . .We only want people who dare to play for high stakes.

Continue Reading

Now on the Web: IL Legislative Debates Back Through 1971

BookScanned text-searchable transcripts of the Illinois House and Senate floor debates going back to 1971 are now available on the legislature’s website. Before February 2007 the transcripts available online only went back to 1997. This is a significant development that will assist attorneys and other interested persons better understand the context that existed when a particular law was passed.

The Sixth Illinois Constitutional Convention held in 1969-70 drafted our current constitution. The legislature or some other institution should make available online the record of those proceedings, which are contained in seven volumes entitled “Record of Proceedings, Sixth Illinois Constitutional Convention.” A constitutional convention also drafted the 1870 Illinois Constitution. A record of those proceedings is available online here.

Continue Reading

Copy Protected General Assembly Transcripts?

Here you can access transcripts of the Illinois House and Senate floor debates going back to 1997 1971 (change noted here). The transcripts are in PDF format. On occasion I include an excerpt from a transcript in my work. But I can’t copy and paste from the PDFs because they are set to prohibit copying. Check it out for yourself. Why is the copy function blocked on the PDF transcript files?

NoCopy_GenAssmTrans2

Continue Reading

How to Proofread Perfectly

HeadphonesAnswer: Don’t read it… let the computer do it.

I find the best way to perfectly proofread a document, legal memo, or even an email is to have the computer read it back to me using a text-to-speech program while I follow along looking at the text. I currently use a free utility called “Ultra Hal Text-to-Speech Reader.” The voices in the reader are not the most human-like but it gets the job done.

ITConversations recently featured a talk by Kevin Lenzo who believes that the key speech technology is not speech recognition, but is text-to-speech (TTS). He presents “a long list of possible applications of TTS, including hands-free in-car navigation systems, location-based weather reporting, remote network monitoring, and just-in-time broadcasting.”…

Continue Reading

Broadband Breach

WifiCnet reports a spanish startup company called Whisher is trying to offer an easy way to share Wi-Fi Internet access. They hope that broadband consumers will share access to their connection with others via the consumer’s existing Wi-Fi router. If large numbers of broadband customers share their connection then a mesh Wi-Fi network will develop without municipal or commercial development.

The Cnet article stated the snag in this utopian view of free Wi-Fi for everyone is that “[i]n the U.S., it’s illegal.” Illegal? On July 8, 2005, Cnet ran an article titled “FAQ: Wi-Fi mooching and the law” indicating it is not clear whether or not sharing Wi-Fi is legal. The article stated, “It depends on the wording of your contract with your broadband provider.”

Law.com’s legal dictionary …

Continue Reading

Powered by WordPress. Designed by Woo Themes