Feeds

Oracle accepts a nice round number in damages from Google

Let's get this over with so we can appeal already

High performance access to file storage

Oracle has agreed to accept damages of $0 from Google in the Java case for the small bit of copyright infringement of which the judge found it guilty.

Judge William Alsup cleared the Chocolate Factory of most of Oracle's infringement claims last month and ruled that Google had copied only a few small bits of Java code. Oracle and Google met in court yesterday to decide what damages Google should pay, where their lawyers announced the firms had settled on $0.

It sounds a bit like Oracle has taken leave of its senses, but it's more likely that the firm just wants this trial over so that it can appeal and try to get Alsup's earlier decisions overturned.

Google has also signalled that it might look for legal fees from Oracle, since it basically won on most counts.

It all went horribly wrong for Oracle at the end of last month when Judge Alsup ruled that APIs can't be copyrighted, effectively killing Oracle's suit.

"So long as the specific code used to implement a method is different, anyone is free under the Copyright Act to write his or her own code to carry out exactly the same function or specification of any methods used in the Java API," he said.

The previous week, Google got off the hook on patent infringement when the jury ruled that neither of the two patents left to be claimed by Oracle had been infringed by the Android operating system.

Oracle was originally hoping for as much as $1bn from the patent part of the suit and a cool $6bn on copyright infringement, so $0 isn't really going to cut it.

Dragging out the arguments about the amount of damages would just waste Oracle's time though, since it's not going to get anywhere near what it wants from the small amount of copyright infringement in the ruling. Tidying things up at this stage will speed the firm onward to its appeal.

Google now has two weeks to file for legal fees if it wants to, a request that Oracle can contest. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.