Feeds

Peace breaks out in mobile patent wars

Ericsson/Samsung, Visto/Seven settle differences

Top 5 reasons to deploy VMware with Tegile

Two long-running patent disputes came to an end today with Ericsson and Samsung agreeing to license each other's technology, while Seven agreed to pay Visto for use of its intellectual property.

Visto and Seven Networks have been at each other's throats for three years now over Visto's patents on e-mail push, but Seven is now saying it recognises the validity of Visto's patents and will pay to license them.

Meanwhile Ericsson and Samsung, who have been busy suing each other over various GSM technologies across various countries, have also made up and agreed to drop all the suits and cross-license their technologies.

Visto still has to get Microsoft and RIM to recognise the validity of its claims - cases are proceeding against the two and it seems unlikely either company is going to give up easily.

All this means less money for patent lawyers, but Qualcomm and Nokia will no-doubt be able to keep them busy if necessary.®

Internet Security Threat Report 2014

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.