Feeds

MS goes on attack in Sendo case

'Fraudulent course of conduct'

  • alert
  • submit to reddit

3 Big data security analytics techniques

Microsoft's legal attack dogs are snarling at last in the legal battle with Sendo, the niche British mobile phone designer.

The company has filed a counter-suit against Sendo in a federal court in Texas and is seeking to have Sendo's suit that it stole its former partner's secrets dismissed. Microsoft also wants to change the court venue - Texas, after all, is not the most obvious place to have a legal fight between companies based, respectively in Washington state and Birmingham England.

So let's rewind a bit. Sendo was Microsoft's partner to build a smartphone for the MS 'Stinger' platform, now called Smartphone 2002. After many delays, Sendo was ready to ship the Z100 in November 2002. But days from launch, the company pulled the launch. Sendo thought it had a straight run on Smartphone 2002 exclusivity, but those assumptions were shattered when Orange plumped for HTC of Taiwan to build its SPV, Stinger smartphone. The first SPVs have been somewhat buggy, but they are available - to date more than 40,000 have been sold.

In December, Sendo filed suit in Texas, accusing Microsoft of fraudulently passing on secrets to Taiwanese rivals and of deliberately undermining the company.

Microsoft filed its counterclaims on Monday (Feb 3) and Reuters once again appears to have a copy of the documents.

The failure of Z100 was, Microsoft says, due to various breaches of contract, as well the British company's "fraudulent course of conduct in repeatedly misleading Microsoft as to Sendo's financial situation, Sendo's progress in designing and developing the Z100, and Sendo's commitment to that project".

Does Microsoft have a smoking gun? Reuters reports that "in documents submitted to the court, Microsoft said it had received an unsolicited report from a Sendo employee describing Sendo's efforts to make the Z100 phone as a "runaway train," with management determined to release an unstable and unreliable product". ®

Related stories

Sendo junks MS smartphone, joins Nokia camp (lots of links to happier days with Microsoft)
Microsoft's masterplan to screw phone partner - full details
Sendo sues Microsoft over'secret' plan'
Taiwan flocks to MS Smartphone standard

Top three mobile application threats

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.