Feeds

IBM countersues Neon over zPrime accelerator

More lawyers feast on the mainframe largesse

3 Big data security analytics techniques

With mainframe revenues off sharply and likely to be so until the System z11 mainframes ship much later this year, IBM can ill afford to look the other way as Neon Software peddles its zPrime tool for offloading mainframe workloads to much cheaper specialty engines on Big Blue's mainframes.

So it has called out the lawyers and countersued Neon Software, which sued Big Blue for anticompetitive practices back in December.

IBM tried a soft approach to zPrime at first, warning customers interested in zPrime they may be in violation of their software licensing agreements after the tool was announced at the end of June last year. The zPrime tool was starting to get traction in the fall, when zPrime 1.2 came out in early November. At that time, Neon had 14 customers using zPrime in production, 50 had tested it, and another 200 were getting ready to do evaluations, and 1,500 had contacted the company to get more information.

This is a lot of interest in a mainframe base that has somewhere between 6,000 and 7,000 customers worldwide, according to estimates made by Neon. And so, Neon decided that IBM's FUD had gone on long enough and it sued Big Blue in the US District Court for the Western District of Texas, located in Austin, for unfair business practices and anticompetitive behavior.

Neon's essential argument in its lawsuit is that IBM's contracts with mainframe customers have no provisions that restrict the use of zPrime to move various jobs running on the z/OS operating system and its expensive regular engines to the System z Application Assist Processor (zAAP) specialty engine, which is used to run offloaded Java and XML processing, or to the System z Integrated Information Processor (zIIP), which accelerates DB2 databases by running offloaded DB2 functions. The barn door was open, and the horse was out, and IBM is trying to seal off the exit.

IBM's answer to the suit and counterclaim, filed on 27 January in the same Austin court, cut right to the chase scene in the first paragraph. "This case is about Neon's attempted hijacking of IBM's intellectual property. Neon's business model expressly depends upon Neon inducing IBM’s customers to violate their agreements with IBM.

"In this respect, it is no different than that of a crafty technician who promises, for a fee, to rig your cable box so you can watch premium TV channels without paying the cable company. Even if it could be accomplished technically, it is neither lawful nor ethical."

IBM's countersuit alleges that Neon Software's business violates both federal and state law, that Neon has tortuously interfered with contracts between IBM and its customers, and that Neon has breached its own agreements with Big Blue. The filing goes on to suggest that Neon Software has violated IBM's copyrights because the use of zPrime makes unauthorized copies of IBM's mainframe systems software.

And, here's one you don't see often in the mainframe racket: IBM alleges that the zPrime tool violates the Digital Millennium Copyright Act "by trafficking in software designed to facilitate infringement and circumvent technological measures in IBM's mainframe computer systems." Finally, IBM's lawyers say that Neon Software violates the Lanham Act by taking money owed to Big Blue for software licenses.

The new twist in the suit is that IBM is claiming that zPrime is not just using the switch-to and dispatcher at the heart of the z/OS operating system to redirect z/OS jobs illegally from general purpose engines to zIIPs and zAAPs - something it was designed to do by IBM, but for very specific workloads, and not the ones zPrime is moving over, according to the suit - but is also being used to activate general purpose mainframe capacity. No one El Reg has ever talked to from Neon Software has ever said zPrime could do this or suggested that this was a goal of the tool.

According to the countersuit, the switch-to and dispatcher software is a block IBM put into mainframes that restricts the copying of mainframe systems software from the caches of general purpose mainframe engines to the cache memories on the zIIPs and zAAPs; these access controls also prevent copied programs from accessing services back on the general purpose mainframes.

IBM is seeking compensatory damages, punitive (triple) damages, and lost license fee revenue recovery in its countersuit, and says the suit is "not about stifling innovation" or a "purported 'monopoly'," as Neon Software has called it. The lawyers can, and may, argue about who is stifling what, but it is completely asinine to say that IBM does not have a monopoly on mainframes that run its systems software.

IBM says that Neon's lawsuit has no merits and should be dismissed, and is seeking an injunction to stop Neon from selling the zPrime tool. ®

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.