Feeds

Novell's Microsoft antitrust action OK'd

Just don't use the "monopoly" word

  • alert
  • submit to reddit

High performance access to file storage

Novell is being allowed to sue Microsoft for allegedly withholding technical information on the inner workings of Windows to harm Novell's erstwhile desktop productivity software.

However, Novell cannot claim that Microsoft Office is a monopoly, even though the productivity suite dominates the vast majority of the world's home and office PCs.

Judge Frederick Motz of the US District Court for the District of Maryland has ruled he would allow Novell's civil case against Microsoft to proceed, based on the US government's antitrust trial against Microsoft that concluded in 2002.

Despite selling both WordPerfect and Quattro Pro in 1996 to Corel, Novell launched this latest legal assault on Microsoft in November 2004 shortly after settling with Microsoft to the tune of $536m over action involving Novell's NetWare business.

Novell's newer suit claims Microsoft used an unfair technical advantage provided by Windows and sharp business practices to rob WordPerfect and Quattro Pro of market share.

According to Novell, WordPerfect fell from 50 per cent market share in 1990 to less than 10 per cent by the time WordPerfect and Quattro Pro were sold in 1996. Office, meanwhile, grew from 20 per cent in 1990 to approximately 90 per cent by 1996. Novell merged with WordPerfect in 1994 and gained Quattro Pro around the same time.

Novell claims Microsoft impaired Novell's ability to build new versions of WordPerfect and other office applications by withholding information about Windows, while Microsoft also integrated "certain" technologies into Windows that were designed to exclude WordPerfect and other Novell applications from "relevant markets."

Motz's ruling appears to have rejected Novell's other claim, that Microsoft used its monopoly power to prevent OEMs from offering WordPerfect along with other rival applications.

Microsoft has in the past blamed WordPerfect and Quattro Pro's performance on "poor business decisions" and "mismanagement" by Novell.®

Related stories

Microsoft goes after Netware
MS and EU inch towards agreement
Judge Jackson is a big fat idiot
Breakup it is judge signs off DoJ MS proposal

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Microsoft: Windows version you probably haven't upgraded to yet is ALREADY OBSOLETE
Pre-Update versions of Windows 8.1 will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.