Feeds

MS Java win against Sun leaves much to play for

The unfair competition issue remains, for starters

  • alert
  • submit to reddit

High performance access to file storage

MS on Trial It's taken nearly a year for Judge Ronald Whyte to rule on a motion by Sun that Microsoft had breached Sun's Java copyright. After a series of filings and argument, Sun's motion for summary judgement on its third claim for relief has been refused, but Microsoft's cross-motion has been granted. In the interim, Judge Whyte had to consider the evidence from the Microsoft trial in Washington, as well as other pending summary judgement motions. In the present Order, the judge admits that his Order is a turnaround from his May 1999 decision. What it amounts to is that copyright issues in the licence that Sun granted to Microsoft are technically covenants and not limitations on the scope of Microsoft's distribution licence. For once Microsoft was not crowing at what would seem to be a small win - perhaps because its entire legal team is too busy polishing its breakup defence. Sun has issued a brief statement that puts the complex nine-page ruling in context, and notes that the ruling is consistent with the judge's Orders on 24 January in which he denied Sun's motion to reinstate the injunctive relief on the grounds of copyright infringement, but did grant Sun's motion to reinstate preliminary injunctive relief on different grounds - unfair competition. It's a very technical case because of the complexity and imperfections of the Sun Java licence that was negotiated under pressure from Microsoft when it discovered the Internet in December 1995. The Court seems to be in no hurry to finish the case and strong hints have been dropped that Sun and Microsoft should get together and settle the matter out of court. No trial date has yet been set. In view of the situation in the DoJ case, Sun is already clearly the moral winner, but it is another matter as to the extent to which Microsoft has broken the particular terms of Sun's licence. Java is gaining more respectability as Microsoft encounters problems with the security holes in Outlook, as seen with the love bug. This strengthens reasons for using Java rather than Visual Basic for development if better security is required. After all, Java uses a designed-in sandbox security model, while Microsoft leans on trust - and as in so many love affairs, trust is not enough. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.