Language Selection

English French German Italian Portuguese Spanish

M$ loses appeal to limit damage awards

Filed under
Microsoft

Microsoft lost a U.S. appeals-court bid to limit the damages software makers can be ordered to pay in some patent-infringement cases, on its way to a new trial in a dispute over a method of surfing the Internet.

A jury had told Microsoft to pay Chicago-based Eolas Technologies $521 million for infringement. Yesterday an appeals court let stand its earlier decision that upheld the infringement finding and ruled that Microsoft can be forced to pay damages based on overseas sales of software. Microsoft still gets a new trial to argue its claim that the patent is invalid.

The case involves an award in 2003 to closely held Eolas by a jury that decided Microsoft's Internet Explorer browser infringed an Eolas patent on technology for reading information stored on the Internet. Intel and Time Warner's America Online supported Microsoft's argument that damages in such patent-infringement cases shouldn't include global sales when disks containing software code have been sent overseas.

Microsoft said in court papers that more than 64 percent of the $521 million award was based on computers "made, sold and used entirely in foreign countries."

The U.S. Court of Appeals for the Federal Circuit ruled March 2 that Microsoft's software on computers sold overseas was covered by a U.S. patent because it had been copied from a master program developed in the U.S.

The ruling also upheld the jury's finding that Microsoft infringed the Eolas patent, though the court granted Microsoft a new trial on the sole issue of whether the Eolas patent was valid. That means Microsoft must win a decision invalidating the patent to avoid paying the $521 million award.

Today, the appeals court made no comment in refusing to reconsider its decision.

Source.

More in Tux Machines

Red Hat News

More on Librem 5 Phone Update

  • Purism Post First Librem 5 Phone Update
    Purism has delivered its first progress report on development of the Librem 5 Phone, which it successfully crowdfunded last year.
  • Purism Says Its Privacy-Focused Linux Phone Will Use Wayland and i.MX8 ARM CPU
    Two and a half months after it successfully crowdfunded its Librem 5 privacy-focused, end-to-end encrypted Linux smartphone, Purism released today the first update on the development progress. Librem 5's crowdfunding campaign ended with more than $2 million funds raised from thousands of backers. Then, Purism promised to put all that money to good use in the manufacturing process of the Linux-powered smartphone, which should have started as soon as they find a company willing to build it.

Fedora: Updated F27 Live ISOs, Synergy 2.0, Bodhi 3.2.0, Announcing Flapjack

  • F27-20180112 Updated Live Isos Released
    The Fedora Respins SIG is pleased to announce the latest release of Updated 27 Live ISOs, carrying the 4.14.13-300 kernel.
  • synergy-2.0.0 is in Fedora updates-testing
    I have packed the latest stable version, 2.0.0, for Fedora 27, 26 and EPEL 7. No EPEL 6 update this time as it requires CXX14, which EL6 does not provide.
  • Bodhi 3.2.0 released
  • Announcing Flapjack
    Here’s a post about a tool that I’ve developed at work. You might find it useful if you contribute to any desktop platform libraries that are packaged as a Flatpak runtime, such as GNOME or KDE. Flatpak is a system for delivering desktop applications that was pioneered by the GNOME community. At Endless, we have jumped aboard the Flatpak train. Our product Endless OS is a Linux distribution, but not a traditional one in the sense of being a collection of packages that you install with a package manager; it’s an immmutable OS image, with atomic updates delivered through OSTree. Applications are sandboxed-only and Flatpak-only.
  • Flapjack Helps Developers Work On Components Inside Flatpak

Security Leftovers

  • Security updates for Wednesday
  • Latvia's e-health system hit by cyberattack from abroad
    Latvia said its new e-health system was on Tuesday hit by a large-scale cyberattack that saw thousands of requests for medical prescriptions pour in per second from more than 20 countries in Africa, the Caribbean and the European Union. No data was compromised, according to health officials, who immediately took down the site, which was launched earlier this month to streamline the writing of prescriptions in the Baltic state. "It is clear that it was a planned attack, a widespread attack—we might say a specialised one—as it emanated from computers located in various different countries, both inside the European Union and outside Europe," state secretary Aivars Lapins told reporters. "We received thousands of requests in a very short space of time. That's not the normal way the system works," he said, adding that an investigation is under way.
  • Linux Lite Developer Creates Automated Spectre/Meltdown Checker for Linux OSes
    The developer of the Ubuntu-based Linux Lite distribution has created a script that makes it easier for Linux users to check if their systems are vulnerable to the Meltdown and Spectre security flaws. As we reported last week, developer Stéphane Lesimple created an excellent script that would check if your Linux distribution's kernel is patched against the Meltdown and Spectre security vulnerabilities that have been publicly disclosed earlier this month and put billions of devices at risk of attacks.
  • Purism Releases Meltdown and Spectre Patches for Its Librem Linux Laptops
    Purism, the computer technology company behind the privacy-focused, Linux-based Librem laptops and the upcoming smartphone, released patches for the Meltdown and Spectre security vulnerabilities. The company was one of the first Linux OEMs and OS vendor to announce that it's working on addressing both the Meltdown and Spectre security exploits on his Linux laptops. Meltdown and Spectre have been unearthed in early January and they are two severe hardware bugs that put billions of devices at risk of attacks.
  • Facebook Awards Security Researchers $880,000 in 2017 Bug Bounties
    Facebook is hardly a small organization, with large teams of engineers and security professionals on staff. Yet even Facebook has found that it can profit from expertise outside of the company, which is why the social networking giant has continued to benefit from its bug bounty program. In 2017, Facebook paid out $880,000 to security researchers as part of its bug bounty program. The average reward payout in 2017 was $1,900, up from $1,675 in 2016.
  • Multicloud Deployments Create Security Challenges, F5 Report Finds