Feeds

Sony faces case for 'Cell' patent infringement

Tough times ahead?

High performance access to file storage

Updated Sony could be in some hot water over development of the parallel processing Cell CPU, used in several devices including the PS3. A US company is claiming that Sony has infringed on a patent for "synchronized parallel processing with shared memory" and is seeking retribution through the courts.

The Parallel Processing Corporation, which filed the lawsuit against Sony in the Tyler Division of the Eastern District of Texas earlier this month, claims that a patent for the technology was approved on 8 October 1991. Despite the patent being originally granted to International Parallel Machines in Massachusetts, the Parallel Processing Corporation has described itself as the “exclusive licensee” for it.

Apparently the claimant Parallel is being caused “irreparable harm and monetary damage" by the potential patent infringement, so is seeking financial damages and the destruction of all Sony’s products that infringe on the patent.

For the time being, Sony is keeping its mouth shut about the case and has already told one online source that it doesn’t comment on pending litigation.

Sony is no stranger to such complaints though. It has already faced legal action from a Californian company, which claimed that the Japanese electronics giant had infringed on its patent for the use of Blu-ray technology in the PlayStation 3 games console.

Supplemental

Sony will exhibit a prototype of its Cell Computing Board in the US next week. It said the board, which will be unveiled at the annual Special Interest Group for Computer Graphics event in California, incorporates the high performance Cell Broadband Engine microprocessor and RSX graphics processor.

Sony claims the board is capable of handling large amounts of data at high speed, while also achieving reductions in size and energy consumption. The company didn’t say anything about which specific hardware the board could be integrated into, but did state that it is suitable for scientific and graphical markets where massive data quantities are processed.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.