Wednesday, May 29, 2013

10 tech patents that should have been rejected

Cisco acquires IT energy management technology

10 Hottest Healthcare IT Developer and Programming Skills

Network World Daily News PM
May 29, 2013
Share this email

10 tech patents that should have been rejected

Welcome to the wacky world of tech patents--a place where you'll find not just the crazy-sounding ideas that inhabit any category of patents granted by the U.S. Patent and Trademark Office (USPTO), but some ideas that seem so minute or so obvious that you wonder how they ever qualified as patentworthy.

READ MORE
 

Issue highlights

1. Cisco acquires IT energy management technology

2. 10 Hottest Healthcare IT Developer and Programming Skills

3. JouleX fits Cisco's plan to target broader IT

4. Hackers exploit Ruby on Rails vulnerability to compromise servers, create botnet

5. TONIGHT: NOVA to examine tech role in capturing Boston bombers

6. Tim Cook: Apple has a 'grand vision' for improving the TV viewing experience

7. Funding for open source projects is more achievable than it seems

8. Why teenage girl's smartphone battery breakthrough may never see daylight

9. Citrix CEO questions efficacy of Yahoo's remote working ban

10. INSIDER Technology Development Process

RESOURCE COMPLIMENTS OF: VCE

Focus on business, not infrastructure

Vblock(TM) Systems from VCE provide innovative IT solutions that address common business pain points and provides faster deployment, significant lower cost per user and much higher availability. IT Executives are modernizing data centers and transforming operations with Vblock Systems to focus resources on speeding business value. Learn how converged infrastructure from VCE enables you to focus on your business, not your infrastructure.

Cisco acquires IT energy management technology

Cisco this week announced its intent to acquire privately held JouleX, a developer of enterprise IT energy management tools, for $107 million in cash. READ MORE

10 Hottest Healthcare IT Developer and Programming Skills

A convergence of technology, legislation and mandated migration to ICD-10 medical classifications make healthcare one of the hottest areas within IT. Here's a look at the skills most in demand, who's hiring and where the jobs are. READ MORE

JouleX fits Cisco's plan to target broader IT

This morning, Cisco agreed to acquire JouleX, a software company that helps IT organizations power the management capabilities of their IT infrastructure from the data center to the desktop and everywhere in between. The purchase price is reported to be $107 million, which is just a drop in the hat for the cash-rich company that has acquired a veritable cornucopia of software companies this year. Read... READ MORE

WHITE PAPER: Tripwire

Five Tips for Outsmarting the Information Age Adversary

Today's attackers vigilantly wait for you to slip up before they strike your information systems and compromise your data. Learn five actions you can take to improve your information risk management and security strategy and stay one step ahead of the information age adversary. Read More

Hackers exploit Ruby on Rails vulnerability to compromise servers, create botnet

Hackers are actively exploiting a critical vulnerability in the Ruby on Rails Web application development framework in order to compromise Web servers and create a botnet. READ MORE

TONIGHT: NOVA to examine tech role in capturing Boston bombers

This will be must-see TV for me (and that's rare outside of sporting events). NOVA and PBS have announced that they will air an hour-long special May 29 dedicated to examining the roles played by technology and science in the investigation that led to the capture of the Boston Marathon bombing suspects. From a NOVA/PBS press release: READ MORE

Tim Cook: Apple has a 'grand vision' for improving the TV viewing experience

Tim Cook on Tuesday sat down for an in-depth and far ranging interview with Walt Mossberg and Kara Swisher. Early on, the topic of the conversation turned to Apple's role as an innovator. Specifically, Mossberg wanted to know if Apple still has what it takes to change the game. READ MORE

WHITE PAPER: F5 Networks

Stop Frequent DDoS Attacks Before the Damage Is Done

This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while securely delivering applications and protecting the network, the session, and the user. Read Now.

Funding for open source projects is more achievable than it seems

Supporting and funding the creation of open source software is hard. Having access to the source code (and the binaries/packages/installers) of our favorite software is an awesome, empowering thing. And having access to them for free? Even more so. But building great software takes time. And money. Even highly successful projects can have a hard time simply paying for their programmers, artists, testers... READ MORE

Why teenage girl's smartphone battery breakthrough may never see daylight

Eesha Khare, an 18-year-old senior at Lynbrook High School in San Jose, Calif., won both the first prize at the Intel Science Fair and the Project of the Year award for the senior division of the California State Science Fair with her research on supercapacitors. But aside from the developmental barriers – experts warned Tech News World about issues with sustained power and risks of explosion – Khare's work violates a 2005 patent filed by green energy company Solaroad Technologies, whose CEO says he will be forced to take legal action if Khare's work goes public. READ MORE

Citrix CEO questions efficacy of Yahoo's remote working ban

Citrix CEO Mark Templeton has said that banning employees from working from home is an ineffective way of preventing slacking on the job. READ MORE

INSIDER

Technology Development Process

A little over 3 years ago, I wrote two blogs on network design process: Network Design Process Network Design Process - Part 2 In those blogs I referenced Cisco's PDIOO (Plan, Design, Implementation, Operations, and Optimize) framework for design. READ MORE

WHITE PAPER: Raritan Inc

The Distributed Enterprise: Remote Access and IT Management

This white paper examines and analyzes the increases in uptime and security provided by out-of-band access and control tools. Learn More

SLIDESHOWS

The 20 best iPhone/iPad games of 2013 so far

Fish turn into money, sorcerers rule and things get creepy in these iPhone and iPad games.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. IDC: PC sales being crippled by tablets

2. Inside look at the Apple iWatch

3. Now here's a great definition of a startup

10. Five steps to ultimate Firefox security

8. How to secure USB drives and other portable storage devices

9. Dell and Cisco grow despite tough server market in Q1

7. Cisco appeal of Microsoft/Skype to be heard this week

4. DOJ lays out cybersecurity basics every company should practice

6. CTIA roundup: New products for unwiring work and life

5. Getting the most out of flash storage

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: