Feeds

Judge guts SCO claims

Put up or shut up

Beginner's guide to SSL certificates

A Utah magistrate judge this week threw out many of SCO's claims of intellectual property violation by IBM.

Judge Wells castigated SCO for its vagueness, and decided the vagueness was prejudicial to IBM. SCO had failed to make specific references to source code to back up its public claims that IBM had polluted its IP, Wells decided, and in the decision eviscerated SCO's case.

SCO made 294 claims in all. IBM contested 198 of them, and only 10 of the contested claims remain.

Last year, Judge Kimball had noted a "vast disparity between SCO's public accusations and its actual evidence".

"Accordingly, based on the delays that would arise from SCO's lack of specificity, and the burden this places on IBM at such a late stage in this litigation, the court finds that IBM is prejudiced by the lack of specificity in SCO's disclosures."

Wells found a vivid analogy for IBM's position of having to guess why it was guilty.

"Certainly if an individual was stopped and accused of shoplifting after walking out of Neiman Marcus they would expect to be eventually told what they allegedly stole. It would be absurd for an officer to tell the accused that 'you know what you stole I'm not telling'. Or, to simply hand the accused individual a catalog of Neiman Marcus' entire inventory and say 'it's in there somewhere, you figure it out'," wrote Wells.

"In essence, IBM is left to wade through all the code found in the operating systems, and then ask SCO are you claiming line X in the Read-Copy-Update method found in Linux because there is a somewhat similar line in the Read-Copy-Update in AIX? Such an endeavour seems like a waste of resources and time because under the court's orders SCO should have already identified such information.

"Accordingly, based on the delays that would arise from SCO's lack of specificity, and the burden this places on IBM at such a late stage in this litigation, the court finds that IBM is prejudiced by the lack of specificity in SCO's disclosures."

Groklaw has the decision in text format, here. ®

Security for virtualized datacentres

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
Profitless Twitter: We're looking to raise $1.5... yes, billion
We'll spend the dosh on transactions, biz stuff 'n' sh*t
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.