Feeds

Nigerian keyboard firm sues One Laptop per Child

No hugs and kisses for XO Laptop

3 Big data security analytics techniques

The One Laptop Per Child foundation is being sued over its XO laptop keyboard design by the Nigerian-owned, Massachusetts-based firm, Lagos Analysis Corp.

Lagos claims the non-profit illegally reverse-engineered their software drivers to make the OLPC keypad more accent mark friendly to foreign fingers.

The initial copyright infringement suit has been filed in Nigeria, and the company plans to press further lawsuits in countries where the OLPC laptop is being vended.

Lagos CEO Adé G. Oyegbọla tells El Reg that the company's Konyin Multilingual Keyboard features four shift keys and a software driver specialized to more easily reproduce the uncommon accent marks found in Nigerian languages and dialects. Such diacritic ticks can be unwieldy in traditional keyboards, but are often essential to getting the right message through. (For example, Oyegbọla explains, without the dot below the "o" in Lagos CTO O. Walter Olúwọlé's name, the meaning becomes "God destroys the house).

Oyegbọla claims that Nicholas Negroponte, the Massachusetts Institute of Technology professor who founded the OLPC foundation, purchased two of the company's keyboards in 2006 and used them to reverse-engineer its keyboard technology. Negroponte is also named in the lawsuit.

OLPC keyboard

Lagos keyboard

Although the OLPC keyboard lacks the quartet of shifters found on the Lagos board, Oyegbọla claims the exact functionality of the "shift2" button was mapped to the XO's "alt gr."

OLPC apparently hasn't been served by the papers, and is only responding statement-style:

"One Laptop per Child, a non-profit educational organization, has hear that Lagos Analysis Corp. (LANCOR) has sued OLPC in Nigeria, but OLPC has not seen any legal papers related to the alleged suit at this time," said Robert Fadel, the OLPC Foundation's director of finance and operations. "OLPC has the utmost respect for the rights of intellectual property owners. To OLPC's knowledge, all of the intellectual property used in the XO Laptop is either owned by OLPC or properly licensed. Until we have a copy of the claim and have had time to review it, we will not be commenting further on the matter." ®

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.