Feeds

Small software firm wins $28.4m after lobbing sueball at LOCKHEED MARTIN

Unfair competition: Jury rules firm was shut out of F-16 fighter jet manual market

Next gen security for virtualised datacentres

Titchy software company Command Technology has managed to win $24.8m in a settlement from the mighty Lockheed Martin for unfair competition.

In a David-and-Goliath story, Command sued Lockheed after being kept out of work making software for the 4,500 F-16 fighter jets that have been sold to US military and other countries.

A jury in the Circuit Court of Maryland for Montgomery County decided that Lockheed had competed unfairly and had injured Command, according to a verdict sheet seen by Reuters.

Lockheed said it was disappointed with the result.

"We believe that it will not stand after post-trial review by the circuit court or on appeal," spokesman Gordon Johndroe said.

Command developed electronic maintenance manuals for the F-16 jets, which Lockheed then said didn't pass tests for the US Air Force, the company said in its complaint. The jury also found Lockheed to have "tortiously interfered" with Command's "economic relationships".

Lockheed then went on to work with another software firm, InfoTrust Group, to develop its own rival product. InfoTrust is also being sued by Command and has launched its own suit against Lockheed.

Command said that Lockheed was trying to block its product from the F-16 market because Command threatens to topple the giant from its spot as the primary provider of maintenance for the the weapons it builds - a spot that brings in billions of dollars in associated sales.

The small software firm claimed that Lockheed and other weapons-makers were trying to restrict access to technical data for warplanes and other combat systems so they can charge the US Air Force and other military bodies for electronic access to the information.

It accused Lockheed of using its proprietary information, which it handed over to allow testing of its C2Web platform, to build its own platform. Command claimed that in its software, mechanics could choose any parts for a fix, while in the Lockheed system, people could only choose the aerospace giant's spare parts.

The company also claimed that Lockheed, BAE Systems and other suppliers had interfered with its platform and led other potential users to believe that the C2Web system couldn't be used for F-16s. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Uber, Lyft and cutting corners: The true face of the Sharing Economy
Casual labour and tired ideas = not really web-tastic
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.