Feeds

Demob happy Court shows pointers to Microsoft Trial verdict

Our Graham is surprised by Judge Jackson's AOL Netscape ruling

  • alert
  • submit to reddit

High performance access to file storage

Some subtle messages from Judge Jackson have been overlooked in the general end-of-term atmosphere in Washington. Judge Jackson has started referring to "Gates" and not to "Mr Gates". Such subtleties are found in criminal trials in the UK when after a verdict of guilty, the prisoner is referred to by surname only. Fancy that. On the other hand, the judge is looking much more relaxed about the length of the trial, since he said, for example, that he "would rather err on the side of excess" [in the length of video extracts] "than running the risk of not playing counter-designations" . Microsoft head lawyer Bill Neukom sloped off at lunchtime on Wednesday: perhaps he had been summoned by Bill, but it could be that he was just going shopping. Judge Jackson said that it was "perfectly all right" that he had been replaced by Tod Nielson as the Microsoft representative. Depositions from Philip Barrett (VP of RealNetworks), John Romano (operating manager, HP home products division, Asia-Pacific), Mal Ransom (VP marketing, Packard Bell NEC), and Curtis Sasaki (group marketing manager, consumer and embedded technologies, Sun) were admitted but not played. Extracts from the deposition of Joseph Kanicki of Dell were included in the transcript, but the deposition has not yet been released by the DoJ. Admitting rather than showing the deposition extracts allowed everybody to leave for the break a day earlier. One of the results of the stampede was that the exhibits associated with the depositions were not admitted before the break. Justice was not exactly seen to be done, as the extracts shown in court would of course have a greater impact than those for which just a transcript was provided. An additional 15 so-called non-party depositions are likely to be admitted rather than played in court, after the recess. John Warden for Microsoft said that Microsoft had filed a Motion to exclude the deposition of Phil Schiller of Apple as it was, in his view, based on hearsay. Judge Jackson reserved judgement. Another document that Microsoft was about to file, Warden said, was Microsoft's Representation about allegations by Edward Felten that Microsoft had made "some change to the Windows update site that he believed interfered with is add/removal program". It was interesting that Felten never used the word "add" – just "remove". It was, in effect, an admission that Microsoft had failed in its cross-examination of Felten. Judge Jackson then turned to two pending Motions. The plaintiffs (both the DoJ and the states) wanted the judge to allow cross-examination by two attorneys. The judge said he did not want to change his rule that there should be one cross-examiner, but remained willing to listen to further argument, particularly if the claims by the DoJ and the states differed on the issue being cross-examined. Steve Houck for the states told the judge that a very important area where there were differences between the DoJ and states' case was with respect to remedies. Because the states wanted to secure effective relief to overcome violations of the law, he thought it important to ensure that the record would support the relief the states sought. Judge Jackson said: "We are a long way from any relief at this point. we are not dealing with relief." Interesting that the judge had not phrased this "if he found for the plaintiffs" – It seemed to be a telling moment. Judge Jackson added that he did not like the idea of collusive cross-examination or a co-counsel with "fresh wind" cross-examining a witness after exhaustive examination by the lead counsel. Microsoft had a pending Motion requesting access to documents in the AOL Netscape acquisition. It was very surprising how little all the lawyers present in court, and the judge, knew about the likely procedure so far as any regulation of the Netscape acquisition by AOL was concerned. It was therefore even more surprising when the judge ruled that Microsoft could see, subject to any protective order, the terms and conditions of the transaction. It seemed probable that Microsoft would get access to secret business information that might help it competitively in the future. Should there be a protective order for the documentation, theoretically the information will only be accessible to Microsoft lawyers. Houck noted that there was a lot of confidentiality associated with the documents, and that he wanted the states to have the same access as Microsoft to the documentation. The judge agreed. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.