Feeds

Novell turns the screws on SCO

SCO's System V claims melting faster than a warm Itanic

  • alert
  • submit to reddit

High performance access to file storage

Novell has launched another foray at the heart of The SCO Group's case against IBM, the 1995 contract in which SCO says Novell gave it the rights to UNIX™ and derivative works.

Without the contract, SCO is simply another UNIX™ licensee and has no grounds to pursue its case against IBM, and by extension, Linux users everywhere. SCO is already retreating from its claims to ownership of AT&T's System V, some rights to which subsequently fell into Novell's hands, but which SCO insists fall under the 1995 agreement. This, SCO says, gives it the rights to control derivative works. But as a sub-sub-licensee, says Novell, SCO is hardly in a position to bully anyone. Who's right?

In a letter last week, published today, Novell reminds SCO that AT&T retains crucial ownership rights. SCO says that section 2.01 of the 1995 contract with SCO, gives it the "right to use includes the right to modify such SOFTWARE PRODUCT and to prepare derivative works based on such SOFTWARE PRODUCT, provided the resulting materials are treated hereunder as part of the original SOFTWARE PRODUCT."

"In fact, SCO's interpretation of section 2.01 is plainly contrary to the position taken by AT&T, as author of and party to the SVRX licenses," says Novell. It points to an addition to the section by AT&T made in 1985, to mollify potential licensees of its "official" Death Star UNIX™ which was threatened by the freely-distributable Berkeley flavor, then growing in popularity beyond its academic niche.

AT&T added a sentence explaining that the company "claims no ownership interest in any portion of such a modification or derivative work that is not part of a SOFTWARE PRODUCT." In other words, it couldn't stake a claim on licensees' code. At around this time, an Oregon start-up called Sequent had the bright idea of licensing UNIX™ on the then hopelessly unfashionable Intel microprocessor architecture to create large multi-processor systems. Which it did with great success, and was eventually acquired by IBM in 1999. Novell cited two copies of AT&T's newsletter $echo from 1985 which reassured licensees that it wouldn't try and claw back their enhancements.

"For these reasons, and the reasons stated in our October 7, 2003 letter to you about IBM-developed code, SCO's position on Sequent Code is unsupportable," says Novell. It's given SCO until noon today to give up any claims that Sequent's code is really confidential SCO code.

That leaves a large part of SCO's case against IBM holed below the waterline. The parallel, and far murkier case of "Project Monterey" - the deliberate co-mingling of SCO's UnixWare, IBM's AIX and Sequent's Dynix which the parties all agreed to co-mingle back in 1998 - is another matter.

But with its claims to System V disappearing rapidly, that might yet be the best SCO can hope for. It's not over yet. ®

Related Stories

SCO abandons trade secret attack on IBM
US markets warm to Linux makers over SCO
Open Source thieves stealing my American code - SCO boss
SCO sues Novell - retaliation expected
SCO surrenders claims to System V?
The SCO IP license: now it's Europe's turn
SCO sort of thinks there are Linux IP violations, but isn't quite sure
SCO targets Novell, steps into new legal trouble
SCO pesters Fortune 1000 for money (again)
IBM draws first blood in SCO Linux battle
Don't say nothing to the SCO cops, Gartner advises Linux users
We reveal major UNIX™ IP violations
SCO admits: Linux jihad is destroying our business
SCO says GPL unenforceable, unconstitutional and void
Against SCO’s GPL jihad: one size doesn't fit all
The GPL will win, claims law prof.
SCO blinks - bill us when you can
SCO: irrevocable doesn't mean forever
SCO set to take SGI's Unix licence away
HP hides its secret SCO shame
SCO still offers 'infringing' Linux source code
IBM sues SCO for selling Linux
SCO ready to clean out Linux users for $1399 per CPU
SCO and Linux: this one will run and run
SCO not playing by Aussie Rules
SCO says it's time for Linux users to pay up
SCO pulls AIX licence, calls for permanent ban
SCO's Second Amendment rebuffs Novell Unix claim
Novell torpedoes SCO's Unix IP claim
Come and get your Linux: SCO opens door to suing self?
MS blesses SCO, licenses Unix
SCO invokes RIAA in Linux jihad
SCO sues IBM for $1 billion for 'devaluing Unix'

High performance access to file storage

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.