Search This Blog

Tuesday, February 03, 2009

Linux Defenders organize to fight patent trolls

Linux group tries to head off abuse of patents
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Infoblox
rule

Take Control of Network TCO by Automating IPAM
Growing networks are in a vicious circle of rising costs, increasing downtime, and rising staff stress. Join Enterprise Strategy Group's Jon Oltsik, for this information-packed webinar on how enterprises can reduce stress and operational expenses by automating IPAM, listen today.

rule

Spotlight Story
Linux Defenders organize to fight patent trolls

M. E. Kabay By M. E. Kabay
Are you tired of hearing of patents granted for obvious innovations? Are you weary of hearing about old patents that are purchased by so-called "patent trolls"? If you think that the U.S. Patent and Trademark Office desperately needs help to clean the earwax out of its cerebral sulci, there's an excellent example from the world of Linux that would bear watching and emulating in other fields. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Glimpse into patent law Patent law is being used to make companies pay license fees for commonly used e-commerce techniques, so I'd like to present a brief, nontechnical overview of patent law in the U.S.

PanIP has rights In a previous article, I mentioned that patents could be used to generate revenue. PanIP holds patents that cover methods of using information transmission and retrieval systems applicable to e-commerce.

PanIP exercises its rights In the previous article, I introduced the California-based firm PanIP, which owns many patents covering fundamental applications of information technology for e-commerce.

Overly broad e-commerce patents In previous articles, I talked about small companies that are being sued or threatened with lawsuits on the basis of broad patents covering what is today known as e-commerce. In this column, I discuss the implications of such threatened lawsuits and why there should be a broad movement of resistance to overly broad patents.

How does Cisco IronPort prevent directory harvest attacks? Tom Topping, director of federal operations for Cisco IronPort gives his take on how IronPort prevents directory harvest attacks.

IPv6 capabilities in Cisco’s IPS software version 6.2 Cisco Subnet blogger Scott Hogg assesses Cisco's support for IPv6 in the newest version of Cisco's Intrusion Prevention System.

VoIP security: Share your concerns? Introducing new Cisco Subnet blogger and VoIP security author Patrick Park. Tell him your VoIP concerns.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Infoblox
rule

Take Control of Network TCO by Automating IPAM
Growing networks are in a vicious circle of rising costs, increasing downtime, and rising staff stress. Join Enterprise Strategy Group's Jon Oltsik, for this information-packed webinar on how enterprises can reduce stress and operational expenses by automating IPAM, listen today.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

02/03/09

Today's most-read stories:

  1. Wi-Fi hot spot horrors
  2. NFL's IT chief gears up for his 25th Super Bowl
  3. Windows 7 will not sway XP users
  4. Top 10 worst uses for Windows
  5. Human error caused Google search bug
  6. Ex-Fannie Mae employee accused of planting computer time bomb
  7. Satyam claims 15 contracts signed in January
  8. Wi-Fi vs. prepaid 3G data dongles
  9. Verizon clips VoiceWing, releases wireline VoIP service
  10. Don't fear the penguin: A newbie's guide to Linux


Product Guides
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Patch Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: