Feeds

Ever talked to SCO? - asks IBM

Then tell us what you said

Internet Security Threat Report 2014

The discovery phase deepens in the SCO trial with IBM demanding every communication between SCO and Microsoft, Sun, Hewlett Packard and Baystar Capital - the investment company that initially funded the IP campaign - since the start of the McBride era.

This part of the discovery relates to "claims relating to Allegedly Misused Material." In addition to emails, IM chats and phone logs, IBM wants details of contracts between SCO and the four subpoened companies. IBM also wants to know the details of Microsoft, HP and Sun's Unix licensing agreements, including royalty schedules.

Microsoft's relationship to BayStar has long been a source of discussion amongst conspiracy theorists, and although Eric Raymond claimed to have produced the smoking pistol, it turned out to be nothing of the sort.

Courts generally frown on fishing expeditions, but IBM thinks it has something: specifically a communication between Microsoft CEO Steve Ballmer and SCO boss Darl McBride "... regarding SCO's rights to the UNIX operating system".

Sun and Microsoft were quick to settle with SCO when the lawyers started firing, back in the spring of 2003. Sun subsequently picked up Tarantella Inc, the former SCO acquisition headed by former SCO boss Doug Michaels. Both Michaels and former Caldera boss Ransom Love have distanced themselves from NewSCO's legal campaign over Unix IP.

Microsoft has an email retention policy that requires staff to destroy their emails within 30 days, it emerged during the Burst case. See How key Microsoft legal emails 'autodestruct'.

"Do not be foolish," Windows chief Jim Allchin told staff six years, "do not archive your e-mail."

Of course, records of financial and auditing communications must be retained for seven years under section 802 of the Sarbanes-Oxley Act. ®

Internet Security Threat Report 2014

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?