Feeds

Microsoft hands out patent protection to mobile chums

Avoid a RIM job

The Power of One Infographic

Microsoft is expanding its patent disputes and IP litigation protection to manufacturers and distributors of mobile and embedded devices running Windows.

The company said it would defend more than 4,000 partner companies against intellectual property (IP) claims in countries where its Windows Embedded and Windows Mobile software are offered and will meet all partners' legal costs. Microsoft's carte blanch protection covers patents, copyright, trademark and trade secret claims.

Expanded protection comes at an interesting time for IP in mobile computing, and indicates Microsoft is eager to demonstrate its platform offers partners a "safe bet."

Research in Motion (RIM) has been locked in a protracted legal action with NTP over alleged patent infringements that has threatened to shut down its popular email service.

Microsoft has been eager to take steal RIM's business and take its market share - particularly in the enterprise, which accounts for some 90 percent of RIM's sales. RIM has 70 per cent of the wireless email market in North America, according to Gartner, but this number is expected to decline as the market expands.

Analyst firm In-Stat last month predicted Windows, with Linux, would become the dominant platforms for smartphones, taking business from both RIM and PalmSource.

Microsoft has progressively increased its level of coverage for partners since 2003, as concern has grown over software IP - a concern raised by Linux and open source - and the level of indemnification for developers and OEMs shipping devices.

"This program enables our OEM and distributor partners to select Windows Embedded and Windows Mobile with even more confidence than ever," Microsoft said in a statement.

Microsoft, of course, is no stranger to patent actions, like this. ®

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.