• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Resources
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Resources
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find resources
      Search by title or subject area
      View all resources
  • SMB Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Open Source

Judge knocks back SCO's IBM Linux suit

SCO largely failed to prove stolen code in Linux, judge rules

  • Tom Sanders in California
  • 03 July 2006
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments

A Utah judge has dismissed a large portion of the claims that SCO filed against IBM in its ongoing Linux case.

SCO claims it owns key elements of the intellectual property of the Unix operating system and alleges that parts it have illegally ended up Linux open source distributions.

The company filed a lawsuit against IBM in 2003 demanding billions of dollars in damages for Big Blue's alleged role in the code misuse.

SCO so far has failed to produce much evidence to proof its case, prompting IBM to ask the judge presiding over the case to force the company to do so. After SCO failed to comply, Judge Brooke Wells largely sided with IBM in last week's ruling.

Nearly two thirds of all the items that SCO alleges IBM to have stolen concern misused methods and concepts. But in identifying those cases, SCO failed to identify the source code in which it claimed was violated.

The judge was unimpressed with SCO's case. "It is almost like SCO sought to hide its case until the ninth inning in hopes of gaining an unfair advantage" despite being repeatedly told to put "all evidence on the table", she wrote.

She furthermore scorned SCO's defence, which argued it was not necessary to provide IBM with the disputed code.

"The court finds SCO's arguments unpersuasive. SCO's arguments are akin to SCO telling IBM sorry we are not going to tell you what you did wrong because you already know," she said.

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
  • Topics
  • Open Source

V3 Latest

BT plan to close down conventional fixed-line phone network by 2025 and go all-IP
BT plan to close down conventional fixed-line phone network by 2025 and go all-IP

BT wants to make the public switched telephone network history within eight years

  • Communications
  • 20 April 2018
Facebook Login hijacked by hidden web trackers, claim security researchers
Facebook Login hijacked by hidden web trackers, claim security researchers

Personal data being purloined by third parties via Facebook Login API

  • Security
  • 20 April 2018
Apple: we've no plans to merger iOS and MacOS
Apple: we've no plans to merger iOS and MacOS

MacOS and iOS are better off apart, says CEO Tim Cook

  • Desktops
  • 20 April 2018
Oracle: Java SE 8 business users must buy a licence from January next year
Oracle: Java SE 8 business users must buy a licence from January next year

Or they'll no longer be entitled to updates and bug patches

  • Developer
  • 20 April 2018
Back to Top

Most read

Oracle: Java SE 8 business users must buy a licence from January next year
Oracle: Java SE 8 business users must buy a licence from January next year
Avast reveals more information detailing how hackers compromised CCleaner
Avast reveals more information detailing how hackers compromised CCleaner
BT plan to close down conventional fixed-line phone network by 2025 and go all-IP
BT plan to close down conventional fixed-line phone network by 2025 and go all-IP
Facebook Login hijacked by hidden web trackers, claim security researchers
Facebook Login hijacked by hidden web trackers, claim security researchers
Apple: we've no plans to merger iOS and MacOS
Apple: we've no plans to merger iOS and MacOS
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017