Feeds

MS Java win against Sun leaves much to play for

The unfair competition issue remains, for starters

  • alert
  • submit to reddit

Intelligent flash storage arrays

MS on Trial It's taken nearly a year for Judge Ronald Whyte to rule on a motion by Sun that Microsoft had breached Sun's Java copyright. After a series of filings and argument, Sun's motion for summary judgement on its third claim for relief has been refused, but Microsoft's cross-motion has been granted. In the interim, Judge Whyte had to consider the evidence from the Microsoft trial in Washington, as well as other pending summary judgement motions. In the present Order, the judge admits that his Order is a turnaround from his May 1999 decision. What it amounts to is that copyright issues in the licence that Sun granted to Microsoft are technically covenants and not limitations on the scope of Microsoft's distribution licence. For once Microsoft was not crowing at what would seem to be a small win - perhaps because its entire legal team is too busy polishing its breakup defence. Sun has issued a brief statement that puts the complex nine-page ruling in context, and notes that the ruling is consistent with the judge's Orders on 24 January in which he denied Sun's motion to reinstate the injunctive relief on the grounds of copyright infringement, but did grant Sun's motion to reinstate preliminary injunctive relief on different grounds - unfair competition. It's a very technical case because of the complexity and imperfections of the Sun Java licence that was negotiated under pressure from Microsoft when it discovered the Internet in December 1995. The Court seems to be in no hurry to finish the case and strong hints have been dropped that Sun and Microsoft should get together and settle the matter out of court. No trial date has yet been set. In view of the situation in the DoJ case, Sun is already clearly the moral winner, but it is another matter as to the extent to which Microsoft has broken the particular terms of Sun's licence. Java is gaining more respectability as Microsoft encounters problems with the security holes in Outlook, as seen with the love bug. This strengthens reasons for using Java rather than Visual Basic for development if better security is required. After all, Java uses a designed-in sandbox security model, while Microsoft leans on trust - and as in so many love affairs, trust is not enough. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Scrapping the Human Rights Act: What about privacy and freedom of expression?
Justice minister's attack to destroy ability to challenge state
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
4chan outraged by Emma Watson nudie photo leak SCAM
In the immortal words of Shaggy, it wasn't me us ... amirite?
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.