Posts Tagged ‘Software’

Tyto announces latest version of Sahi Pro software

November 24th, 2014

Bangalore-based Tyto Software, creators of Sahi Open Source and Sahi Pro has announced major release Sahi Pro 6.0. This release enables non-technical QA team members optimize test performance of their various web applications, the company said in its statement. Sahi Open Source and Sahi Pro has around 200 enterprise customers across various industry verticals for testing their Web Applications, it said. Building on its robust web automation engine, Sahi Pro 6 improves tester productivity with a web based editor to easily author and manage automation scripts. The intuitive user interface also allows creation of suites and triggering parallel and multi machine playback with just a few clicks. Sahi Pro 6 provides better integration with Continuous Integration systems like Jenkins, reducing plumbing and maintenance effort. Image comparison APIs allow screenshots to be compared and native events have been added to navigate tricky automation areas. Reporting has been improved with better error logs and page level and element level screenshots. Improved querying and graphs help get more information for analysis of test runs. Overall Sahi Pro 6.0.0 enhances testing ROI and allows testers to just focus on business test cases while Sahi Pro takes care of everything else. “Sahi Pro 6 significantly enhances tester productivity and allows even the not-too-technical teams to adopt and reap good ROI from web test automation,” said V. Narayan Raman, Founder and CEO of Tyto Software. Sahi has been mentioned under Open Source as one of the most widely used tools in Gartner Magic Quadrant for Integrated Software Quality Suites-2014. Also, Sahi Pro and Sahi have been mentioned under Test automation (functional and regression) category in 2013 Forrester report on Navigating the Agile Testing Tool Landscape.


Bahrain Polytechnic in software deal with Microsoft

November 24th, 2014

Bahrain Polytechnic and Microsoft have signed an agreement that will enable the academic institution to acquire Microsoft software in a cost-effective way.

Bahrain Polytechnic’s acting chief executive Dr Mohamed Al Aseeri said through the Microsoft Volume Licensing Enrolment for Education Solutions (EES) agreement, the institution has acquired the technology to support students with the means to carve out successful careers, reported the Gulf Daily News (GDN), our sister publication.

“This deal also helped free the information technology (IT) directorate’s team from time-consuming and costly maintenance and the management of IT directorate activities giving them more time to concentrate on other fundamental tasks,” he said.

Bahrain Polytechnic is the first educational institution in the kingdom to benefit from the agreement.

“We essentially wanted a turn-key platform that would deliver easy management, always-on availability and could meet the growing storage needs to cope with the exponential increase in mailboxes without difficulty,” said Bahrain Polytechnic information and communications technology services director Sameera Alatawi.

She said Office 365 and Microsoft Azure, as part of the EES agreement, are being used to address IT management issues and deliver educational services. ‘Office 365 and Azure are important technology platforms that are also helping us meet our wider strategic objectives of promoting national economic development,” Alatawi added.

Microsoft in Bahrain and Oman regional general manager Sherif Tawfik said the new licensing programme was simple, smart and affordable.


Protecting Intellectual Property Rights In Software After Alice Corp. v. CLS Bank

November 24th, 2014

It is becoming clear that the Supreme Court’s decision in Alice Corp. Pty. Ltd. v. CLS Bank Int’l, 134 S.Ct. 2347 (2014) marks a sea change in the patentability of computer software. The numerous recent decisions invalidating software patents under Alice will force software owners and developers to find other ways to protect their investments in their software products. Chief among these alternatives are non-disclosure and confidentiality agreements and trade secret protections, but software owners should also keep in mind the potential for copyright protection for their intellectual property.

Under the two-step framework set forth in Alice, it can be relatively easy to characterize software patents as directed to an abstract idea because software applications often boil down to abstract steps or computations performed by a computer. Software patent claims are also often written in language that is both general and vague in order to gain a broad claim scope, heightening the abstract nature of the claims. Moreover, mere implementation of such general abstract steps in the form of computer software is not likely to satisfy Alice’s requirement of an “inventive concept” that can transform the idea into a patent eligible invention. This is especially true for software applications that perform business functions or do any sort of manipulation or analysis of data.

Since Alice, the Federal Circuit and District Courts around the country have invalidated all manner of computer software patents, almost uniformly holding that computer-implemented methods are not patent eligible. These post-Alice cases involve patents as complex as software that automatically synchronizes the lips and facial expressions of animated characters, McRO, Inc. v. Activision Publishing, Inc., 2014 U.S. Dist. LEXIS 135152 (C.D. Cal. Sept. 22, 2014), to straightforward methods that computerize the steps in guaranteeing a party’s performance of an online transaction. buySAFE, Inc. v. Google, Inc. 2014 U.S. App. LEXIS 16987 (Fed. Cir. Sept. 3, 2014). Here in the EDVA, Judge Leonie Brinkema recently invalidated, in almost summary fashion, patent claims relating to correlating two network accounting records to enhance the first record. Amdocs (Israel) Ltd. v. Openet Telecom, Inc., 2014 U.S. Dist. LEXIS 152447 (E.D. Va. Oct. 24, 2014).

The trend is clear. Software patents, especially software patents for performing business applications, are subject to serious challenge under Alice. As a result, software developers and owners will need to use other tools to protect their intellectual property. Chief among these tools is the use of non-disclosure and confidentiality agreements with employers, contractors, customers and potential investors. These and other measures to maintain secrecy are necessary to preserve protection under laws protecting trade secrets. Other tools include potential tort claims against competitors and third parties for tortious interference with contract and perhaps business conspiracy.

Using private contractual agreements and trade secret law to protect intellectual property, though, is not easy. It requires vigilance and attention to detail at all levels of a company. Software owners must make sure that they obtain non-disclosure agreements whenever they reveal any confidential information. They must also insist on employment agreements and vendor contracts that make clear their ownership rights and must regularly update and renew these agreements over the course of time. When dealing with potential customers and investors, software owners must be able to discuss the value of their product at a non-trade secret level to avoid inadvertent disclosure of confidential information. Protecting secrecy may also limit the ability to use emerging technologies, such as cloud computing, that can pose threats to the secrecy of software code.

Finally, software owners should consider their rights under copyright law. The Federal Circuit’s recent decision in Oracle America, Inc. v. Google Inc., 750 F.3d 1339 (2014) clarifies how broadly copyright law protects software, but a petition for certiorari is now pending before the Supreme Court (a good summary of the cert. petition can be found here at Patently-O). A copyright claim requires evidence that a defendant had some access to the software that could support a finding of copying, however, and so provides far narrower protection that patent law.

After Alice, the approach software owners must take towards protection of their intellectual property is in many ways the opposite of the strategy for obtaining patent protection. Instead of trading the disclosure of their intellectual property in a patent for exclusivity for a period of time, software owners must focus on using non-disclosure and secrecy to obtain exclusivity. Maintaining such secrecy while exploiting a software product in the marketplace is difficult, but after Alice, the choice between patenting and secrecy for software owners now falls very clearly on the side of secrecy.


Get Adobe Flash player