Feeds

Nokia takes Apple to court, again

This time it's Wisconsin

Choosing a cloud hosting partner with confidence

Nokia, not content with the pair of existing patent actions in Delaware, has filed another action for five patent infringements. This time it's in Wisconsin, presumably for variety.

These patents cover speech codecs, data transmission, the use of location information in applications and compact-antenna designs, all of which Nokia claims are infringed by the iPhone and iPad 3G.

Given the iPad's lack of speech capability we're guessing it might be not be included in that specific infringement, though we wouldn't put it past Nokia to have a punt anyway.

The details of the allegedly infringing patents aren't known, and nor is it clear why the Finns have decided to move the action to Wisconsin. Such actions traditionally take place in Texas, where juries respect the rights of the patent holder, but the popularity of Texan courts has led some companies to Delaware - "Delaware is the new Texas" as one patent attorney put it to us.

Which makes Wisconsin even more unlikely - unless patent actions are just going to spread, from state to state, until the entire US legal system is consumed in one almighty patent action. ®

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.