Read the full article at consumerist.com.
“A corporate squabble over printer toner cartridges doesn’t sound particularly glamorous, and the phrase “patent exhaustion” is probably already causing your eyes to glaze over. However, these otherwise boring topics are the crux of a Supreme Court case that will answer a question with far-reaching impact for all consumers: Can a company that sold you something use its patent on that product to control how you choose to use after you buy it?”
Here’s Consumerist’s TL;DR summary of the article:
• In order to stop customers from using third-party companies that refill printer toner cartridges, Lexmark began asserting patent control over its cartridges.
• One those third-party companies sued Lexmark, contending that this an abuse of patent protection, and that consumers have the right to do what they want with a product after they buy it.
• If the Supreme Court sides with Lexmark, it could have far-reaching implications, allowing companies to further limit consumers’ ability to use, reuse, or resell the things they purchase.
• A ruling is not expected in this matter until later in the spring or summer.
Read the whole article at snapfiles.com.
“Workrave is a program that can assist you in the recovery and prevention of Repetitive Strain Injury (RSI). It monitors your computer activity and frequently reminds you to take short micro-breaks and, less frequently, longer rest breaks.
The micro-breaks are designed to let you relax your hands for about 30 seconds, while the rest breaks provide a set of exercises that you can follow to heal existing injuries or prevent future ones.”
Read more: www.ghacks.net/, google.com
Read the full article at ghacks.net.
“ClickMonitorDCC is an excellent program when it comes to configuring the brightness, contrast, volume and RGB values of connected displays. It works well with single monitor systems but also with multi-monitor setups.
While it is designed to make things faster for all users, it is especially useful if one or multiple displays don’t support options to change these parameters easily, or at all.”
Read the full article at guidingtech.com.
The techniques described are:
1. Bread Ties
2. Twist Ties
3. Old Credit Cards + Double-Sided Tape
4. Binder Clips
5. Velcro Strips
6. iGotTech Cable Clips
This article originally appeared at consumerist.com.
“Hey, remember the USB Killer, a device that looks like a thumb drive and lets you destroy 95% of computers by frying them with a quick jolt of electricity? There’s now an improved version on the market, which is more powerful, looks more like any generic thumb drive, and comes with micro USB, USB-C, and Apple Lightning adapters, allowing you to fry a wider variety of electronics.
How do you know whether your device is vulnerable to attacks with a similar computer-frying stick? You don’t. A video compilation shows the new version’s Lightning port destroying an iPhone 7 and at least briefly confusing an iPad Pro. The only way to stop an attack on a vulnerable system is to physically keep anyone from accessing the USB ports, so good luck with that. Hope you don’t know anyone vindictive enough to try this.”
Go ahead. Read the whole article at consumerist.com.