Feeds

Munich asks ministers to drop EU patent vote

More last minute changes

  • alert
  • submit to reddit

Internet Security Threat Report 2014

The vote on the European Directive on software patents has, at the last minute, been moved to the afternoon session on the Agricultural and Fisheries Commission's meeting. The vote is now scheduled for around 3pm, Brussels time.

The change in schedule follows a statement (pdf, in German) from the Mayor of Munich, calling on Germany's minister to have the directive taken off the agenda altogether. Mayor Christian Ude said he can see no reason for the Council to proceed with such haste.

"After the multitude of concerns raised by all sides of politics, of small and medium enterprises and of many developers of free software, a further discussion about the directive proposal and not a nodding-off in the non-expert Council of Agriculture and Fisheries had been expected. I have today approached minister Künast to inform her of these expectations," he said.

Florian Mueller of campaign group NoSoftwarePatents said: "It shows that the city of Munich would really prefer a software patent-free environment for its Linux migration project. Frankly, it would be an unprecedented event if anyone stood up today and asked for software patents to taken off the agenda, but it's possible that the Dutch government [is simply taking] its chances even though various countries are unhappy."

According to Mueller, the rescheduling is probably for administrative reasons, but it is possible that the directive is so politically unstable, that more time was given to allow for more behind-the-scenes discussion of the vote.

The directive is now on the afternoon agenda for the council. It will be preceded by a vote on the adoption of a Regulation of the European Parliament and of the Council laying down requirements for feed hygiene. ®

Related stories

EU fish ministers to vote on software patents
No more debate on EU patents directive draft
Software patents: the UK Patent Office pleads its case

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.