Feeds

Palm draws up plans for Graffiti 2

Time for a rethink

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

ComputerWire logo Palm Inc has sought to side-step further legal run-ins with Xerox Corp over its PDA handwriting technology by licensing another company's handwriting recognition software.

Palm's software subsidiary PalmSource will use Communication Intelligence Corporation's Jot software as the engine for Graffiti 2, the successor to the Graffiti handwriting recognition software which is integral to the Palm operating system for PDAs.

Graffiti was at the center of a long running patent dispute between Santa Clara, California-based Palm and Xerox Corp, which claimed the software infringed on Xerox patents. In December 2001 a US district court ruled in favor of Stamford, Connecticut-based Xerox. An appeal by Palm was heard earlier this month and a ruling is due later this year, said a Palm spokeswoman.

The spokeswoman said yesterday that while the court case had prompted Palm to look for alternatives to the earlier technology, the firm had decided it needed to rethink the product "independent of the law suit."

Palm had taken a close look at the CIC product and did not envisage any legal problems with Graffiti 2, the spokeswoman added. "We believe it does not infringe."

The PDA vendor said the new product had a more natural input system, and would help Palm grow the market faster.

Michael Higashi, director of OS marketing for PalmSource, said the Jot-powered product gave users more options on how they could input characters. Unlike the earlier product, Graffiti 2 would not require characters to be input as a single stroke. Higashi said Graffiti 2 would be available to its licensees immediately, and PalmSource expected its OEMs to begin shipping products featuring Graffiti 2 later this year.

Palm's spokeswoman said the company would still continue with its fight against Xerox' allegations. Xerox was unavailable for comment.

© ComputerWire

Reducing security risks from open source software

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.