Feeds

Media luvvin' tech analysts contract patent fever

Nielsen and ComScore unleash lawyers

Internet Security Threat Report 2014

Number crunchers Nielsen and ComSore have gotten too close to the tech sector. They've hit each other with patent-infringement claims.

Nielsen has lodged suit against ComScore, claiming the latter infringed on of its five patents. Nielsen wouldn't comment on the case but directed us to a site here that lists what appears to be the patents in question.

The patents cover a computer-use meter and analyzer, metering of internet content using a control, network resource monitoring and measurement system method, content display, and monitoring by a process system and content display monitor. The action was filed on March 15.

Meanwhile, ComScore told The Reg that it has raised patent infringement claims against Nielsen. The company did not provide further details when pressed.

A ComScore spokesperson said: "Based on our initial review of [Nielsen's] claims, we believe they are without merit. We are respectful of IP rights and, as innovators, have filed and been issued patents of our own."

In a statement released to The Reg, Nielsen told us: "Nielsen has made substantial investments over many years in its intellectual property.

"While we support vigorous competition in the marketplace, that competition must be fair and respect intellectual property rights. Nielsen does not take such matters lightly and only after thorough analysis and consideration did we file this action. We look forward to a fair and appropriate resolution."

The companies' market share stats are frequently cited by media outlets. Both provide market data and analysis on computing, devices, and the internet, among other subjects.

Most recently, the pair reported on the US smartphone market. In reports that came out five days apart, with Neilsen's hitting first, both found Android is now the number-one operating system for smartphones in the US, having taken over from RIM - in second place - and with Apple placing third. ®

Internet Security Threat Report 2014

More from The Register

next story
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.