IBM Drops Outsourcing Patent, After Outsourcing Patent Review To Slashdot

from the that's-how-it-works,-you-see dept

IBM consistently is one of the more aggressive companies in applying for patents (and, at times, enforcing those patents). However, in the last few years, the company has started realizing just how much patents can harm innovation -- and the company has been trying to work on ways to improve patent quality (though, it still gets involved in some questionable patent lawsuits). Over the weekend, however, the company got quite a bit of attention after Slashdot posted about a recent IBM patent application that appeared to cover figuring out how to best offshore workers. It was the type of thing that sounded so absurd that lots of other sites and the press picked up on it... leading IBM to apologize withdraw the patent application, put the "process" into the public domain and saying that with its new processes, it wouldn't have applied for that patent at all. This is a nice surprise, as you could see most companies simply trying to defend whatever ridiculous patent they had applied for.


Reader Comments (rss)

(Flattened / Threaded)

  1.  
    identicon
    Chuck Norris' Enemy (deceased), Oct 5th, 2007 @ 2:05pm

    Makes sense

    1. Patent outsourcing
    2. Competitors can't outsource
    3. Competitors must hire expensive domestic labor
    4. Your product prices are much cheaper
    5. Crush competition
    6. Market domination
    7. Take over the world

     

    reply to this | link to this | view in thread ]

  2.  
    identicon
    daruku, Oct 5th, 2007 @ 4:41pm

    Makes sense 2

    1. Patent outsourcing
    2. ???
    3. Profit

     

    reply to this | link to this | view in thread ]

  3.  
    identicon
    Jeff, Oct 5th, 2007 @ 9:14pm

    i like it.

    if i can get my laptops cheaper than i will be happy. but i don't want to see to many jobs go over there. my dad dose work for them. and half his clients are India.

     

    reply to this | link to this | view in thread ]

  4.  
    identicon
    Boogaloo Flu, Oct 6th, 2007 @ 5:20pm

    Re: i like it.

    Dood, liek cann ewe spel? Loox liek yu knead a spel-chekr

     

    reply to this | link to this | view in thread ]

  5.  
    identicon
    Anonymous Coward, Oct 7th, 2007 @ 7:50pm

    Sure why not. You put together a way to sort out the best way to make a profit ? Isn't that what business does ? And try to patent the software that does it to ? hummmmmm. Sounds all very reasonable to me.

     

    reply to this | link to this | view in thread ]

  6.  
    identicon
    Brian, Oct 8th, 2007 @ 8:38am

    OK, but what about the GUI-checkbox patent?

    Another silly patent app people need to watch out for is the one on GUI checkboxes...

     

    reply to this | link to this | view in thread ]

  7.  
    identicon
    sunil, Oct 8th, 2007 @ 9:19pm

    Patent Outsourcing Job

    Contact me for any kind of Patent related work - novelty assessment, technology trend assessment etc. @ patents4all@yahoo.com at very competitive rates.

     

    reply to this | link to this | view in thread ]

  8.  
    identicon
    Don O'Neill, Jan 1st, 2008 @ 6:41am

    Outsourcing Software Projects

    Understanding why companies engage in outsourcing, managing the risks inherent in outsourcing software projects, identifying the essential elements of global outsourcing maturity, and reasoning about the cost return ratio of typical outsourcing scenarios are all topics of current research.

    What should a Global Enterprise (GE) look for in an offshore outsourcing partner? Access to the world's high skilled, low cost software providers may be barred to the risk adverse enterprise unless it takes the Inside Track to Offshore Outsourcing featuring the Trusted Pipe. USPTO patent and trademark applications submitted.

    The control point nodes (GECP, OVCP) of the Trusted Pipe are populated with Intelligent Middlemen who compose, interpret, and exchange essential multi-dimensional messages associated with management, engineering, business, legal, and cultural packets in order to facilitate and ensure a smooth operation.

    The first-ever patent application teaching the best possible method for offshore outsourcing was filed nearly four years ago. Learn about the inside track to offshore outsourcing using a trusted pipe and intelligent middlemen at http://www.trustedpipe.com

    Don O’Neill
    Independent Consultant
    ONeillDon@aol.com

     

    reply to this | link to this | view in thread ]

  9.  
    identicon
    na, Jan 25th, 2008 @ 4:30pm

    Think!

    IBM's key concept is Think. IT means to think of good ways to do inavation.. not screw American workers out of their jobs.

     

    reply to this | link to this | view in thread ]

  10.  
    identicon
    Offshore Outsourcing, May 5th, 2008 @ 3:36am

    We can absolutely trust offshore outsourcing as a winning offer, which has widened its horizon to ITO, BPO, Software R&D and KPO. No doubt offshore outsourcing is a win-win game! We advise everyone related to IT field to bump into the magnetizing world of offshore outsourcing to maximize the gains.

     

    reply to this | link to this | view in thread ]

  11.  
    identicon
    Maluz Manalo, Jul 24th, 2008 @ 10:54pm

    NMG IT Outsourcing Philippines

    NMG I.T. Outsourcing Philippines is a product and software development outsourcing company that aims to deliver high quality and cost

     

    reply to this | link to this | view in thread ]

  12.  
    identicon
    Philippine outsourcing, Jan 12th, 2009 @ 9:14pm

    Philippine outsourcing

    heard rumours that dell plans to sell of dell international services to outsourcers. not sure if its true.. -Philippine outsourcing

     

    reply to this | link to this | view in thread ]

  13.  
    identicon
    sklepy internetowe, Feb 11th, 2009 @ 9:10am

    Software Projects

    The control point nodes (GECP, OVCP) of the Trusted Pipe are populated with Intelligent Middlemen who compose, interpret, and exchange essential multi-dimensional messages associated with management, engineering, business, legal, and cultural packets in order to facilitate and ensure a smooth operation.

     

    reply to this | link to this | view in thread ]

  14.  
    identicon
    amber shop, Apr 15th, 2009 @ 6:42am

    nice article!!!!

    The control point nodes (GECP, OVCP) of the Trusted Pipe are populated with Intelligent Middlemen who compose, interpret, and exchange essential multi-dimensional messages associated with management, engineering, business, legal, and cultural packets in order to facilitate and ensure a smooth operation.

     

    reply to this | link to this | view in thread ]

  15.  
    identicon
    Online florist, Jan 8th, 2010 @ 1:47am

    makes sense?

    Good point... I've been looking for IBM law-related articles and here I've found! Thanks dude!

     

    reply to this | link to this | view in thread ]

  16.  
    identicon
    fotowoltaika, Aug 1st, 2010 @ 8:05am

    for me is all right!

    Why this is so confusing? We all know that outsourcing is the best way to maximize gains and win the race.

     

    reply to this | link to this | view in thread ]

  17.  
    identicon
    strony internetowe wrocław, Oct 10th, 2010 @ 1:45pm

    good!

    Great share and good news. Thanks for your effort. BTW: your site works superb. :)

     

    reply to this | link to this | view in thread ]

  18.  
    identicon
    Serena Carli, Mar 6th, 2014 @ 7:37pm

    Outsourcing to the Philippines

    More and more people are securing their innovations through Patent. This is to ensure that the invention is named after him/her. That's a good thing, to share your inventions while protecting your rights as the registered owner. Thanks for sharing this article.

     

    reply to this | link to this | view in thread ]


Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here
Get Techdirt’s Daily Email
Save me a cookie
  • Note: A CRLF will be replaced by a break tag (<br>), all other allowable HTML will remain intact
  • Allowed HTML Tags: <b> <i> <a> <em> <br> <strong> <blockquote> <hr> <tt>
Follow Techdirt
A word from our sponsors...
Essential Reading
Techdirt Reading List
Techdirt Insider Chat
A word from our sponsors...
Recent Stories
A word from our sponsors...

Close

Email This