decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
SCOForum Slides vs. SCO's Memorandum -- A Closer Look
Monday, October 27 2003 @ 03:54 AM EST

In SCO's Memorandum of Law in Opposition to IBM's Motion to Compel Discovery, there is one section entitled "IBM's Characterization of the Presentation at the SCO Trade Show is False and Misleading."

Let's examine this one paragraph and see if that is true or if the shoe is on the other foot.

In order to do that, we'll be comparing what SCO wrote in its Memorandum with the slides in SCO's SCOForum presentation. In order to follow along, you will likely wish to look at the slides themselves. If you go here you can find them as a Powerpoint presentation, and they can be viewed here as html. You can alternatively go to this page where we covered IBM's Motion to Compel Discovery, and you will find links to the Motion, the Memorandum of Law in Support, and all the exhibits, including the SCOForum slideshow.

I will present text from the slides as appropriate so you can follow along without skipping back and forth. First, here is the paragraph from the Memorandum of Law we will be looking at carefully, and I have highlighted the points we will address most particularly to compare with the slides:

"1. IBM's Characterization of the Presentation at the SCO Trade Show is False and Misleading.

"Throughout its memorandum, IBM makes repeated reference to SCO's trade show and a particular presentation about SCO's contractual rights made at that trade show. IBM incorrectly asserts that during that presentation, SCO identified 'four categories of alleged "misappropriation" by IBM: (1) literal coping; (2) derivative works; (3) obfuscation; and (4) non-literal transfers.' (IBM Mem., p. 6)(parentheticals omitted). The slides from the SCO Forum trade show relied upon by IBM (IBM Mem., Exhibit F), corroborate that SCO has not publicly made any such allegation against IBM. Slide 8, which is the only one to contain the terms 'literal copying,' 'derivative works,' 'obfuscation,' and 'non-literal transfers' does not mention IBM, or indeed anyone else. In fact, Slide 8 does not mention trade secrets at all, but rather illustrates SCO's bases for a potential copyright infringement action. What makes IBM's use of this trade show material particularly misleading to this Court is that the code in question identified by SCO at the trade show and elsewhere was code from a licensee other than IBM. In fact, it was widely reported after the trade show that the example of improperly contributed code was from SGI, which has since publicly acknowledged its improper contribution. It is inconceivable that IBM is unaware that the code identified by SCO in its presentation was from SGI, not IBM. In any event, as code contributed by another licensee, it should be obvious to IBM that, despite its demands for this code, the identity of such code is not responsive to any of IBM's interrogatories."


As you can see, they accuse IBM of misleading the court. Let's see who is misleading whom, and we'll take it a piece at a time and look at the slides as we go along. First, SCO claims that the presentation was about contractual rights:

"Throughout its memorandum, IBM makes repeated reference to SCO's trade show and a particular presentation about SCO's contractual rights made at that trade show."

So, it's about contractual rights overall, according to SCO. However, a little further down, SCO characterizes Slide 8 as being a list of SCO's bases for a potential copyright infringement action:

"Slide 8 does not mention trade secrets at all, but rather illustrates SCO's bases for a potential copyright infringement action."

They appear to be distinguishing Slide 8 from the rest of the presentation, saying this particular slide wasn't about contractual matters or trade secrets, rather about copyright, which they haven't accused IBM of. And in fact they pointedly say that IBM is not mentioned at all on Slide 8, and that further it's the only slide that mentions the four infringement terms IBM says SCO has accused them of and which SCO here is denying having ever publicly accused IBM of having done:

"IBM incorrectly asserts that during that presentation, SCO identified 'four categories of alleged "misappropriation" by IBM: (1) literal coping; (2) derivative works; (3) obfuscation; and (4) non-literal transfers.' (IBM Mem., p. 6)(parentheticals omitted). The slides from the SCO Forum trade show relied upon by IBM (IBM Mem., Exhibit F), corroborate that SCO has not publicly made any such allegation against IBM. Slide 8, which is the only one to contain the terms 'literal copying,' 'derivative works,' 'obfuscation,' and 'non-literal transfers' does not mention IBM, or indeed anyone else. In fact, Slide 8 does not mention trade secrets at all, but rather illustrates SCO's bases for a potential copyright infringement action."

This may come as quite a surprise to those of us who have followed this story closely from the beginning, because it feels like that's all we've heard SCOfolk say and imply for about seven months. If you look at Slide 8, it's true that IBM is not mentioned by name on that slide. Here is the text:

"8. SCO UNIX System V Copyright Infringements in Linux®

"Linux is a registered trademark of Linus Torvalds
"Contracts, Agreements, and the Law

"Non-literal transfers
"Methods, structures and sequence from System V contributed to Linux kernels 2.4+

"Obfuscation
"Copying, pasting, removing legal notices, reorganizing the order of the programming structures

"Derivative Works
"Modifications of System V created by vendors contributed to Linux kernels 2.4+ in violation of contracts

"Literal Copying
"Line-for-line code copied from System V into Linux kernels 2.4+"

They are telling the judge that this slide is only about copyright, apparently so as to claim it couldn't be an accusation about IBM. But what does the slide itself say? -- "Contracts, Agreements and the Law." So is it really only about copyright? What did the author of the slide believe? As for their claim that this is the only slide to mention these four terms, this is a rather slick argument. It is true it is the only one to mention all four together on the same slide, but as you go through the slides one by one, you will see that in fact this Slide 8 is a summary of the four terms, but subsequent slides, beginning with Slide 9, mention each term in turn, and the subsequent slides give examples of each of these four terms, and the later slides do mention IBM by name, specifically on Slides 21 and 22.

For example, let's look at Slide 21. Here is the text:

"IBM Claimed Copyright Attribution for Transferring Dynix Code to Linux

"Copyright (c) International Business Machines Corp., 2001 This program is free software; you can redistribute it and/or modify  it under the terms of the GNU General Public License as published by  the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful,  but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the  GNU General Public License for more details. You should have received a copy of the GNU General Public License  along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. Author: Dipankar Sarma   (Based on a Dynix/ptx implementation by  Paul Mckenney )
"See: http://lse.sourceforge.net/locking/rcu/patches/rclock-2.4.1-01.patch

  "Derivative Works"

This Slide 21, then, is an example they offer in the category of "derivative works" and IBM's name is used in the title. If Slide 8 is only about copyright when it mentions "derivative works" and it has nothing to do with IBM, what is this Slide 21 talking about? What about the next slide, Slide 22? It's an example of "non-literal transfers", another of the 4 terms listed in Slide 8, and again IBM is mentioned by name:

"Non-Literal Transfers - Methods and Concepts

"From: Niels Christiansen (nchr@us.ibm.com)
"Date: Thu Dec 06 2001 - 11:10:47 EST

    "Hi Kiran,

"Are you concerned with increase in memory used per counter Here? I suppose that must not be that much of an issue for a 16 processor box....  Nope, I'm concerned that if this mechanism is to be used for all counters, the improvement in cache coherence might be less significant to the point where the additional overhead isn't worth it.

"...which may be true for 4-ways and even 8-ways but when you get to 32-ways and greater, you start seeing cache problems. That was the case on AIX and per-cpu counters was one of the changes that helped get the spectacular scalability on Regatta.

"Niels Christiansen
"IBM LTC, Kernel Performance

"Non-Literal Transfers – Methods and Concepts"

Whether this email can legitimately be used to prove an infringement is another discussion, but it is clear they used it for that purpose, and they pointed at an IBM employee. "Non-literal transfers" is one of the four terms on Slide 8, and this is an example of such a transfer, according to SCO, and yet they tell the judge that Slide 8 isn't about IBM?

Derivative works are also the topic addressed on Slide 18, "Use is Infringing if Scope of License Grant for Derivative Work is Exceeded", and Slide 19, "Examples of Significant Infringing Derivative Works Contributions to Linux 2.4/2.5", both listing NUMA, RCU, JFS, and XFS, and one adds NUMA and the other adds "Schedulers, Linux PPC 32- and 64-bit support, and Enterprise Volume Management System". Obviously, IBM is at a minimum under a cloud in this list. And Slide 20 lists exact numbers of files and lines of code under the title "Derivative Works" for RCU, NUMA, JFS, SFX, and SMP for a precise total of 1,549 files and 1,147,022 lines. Maybe more than a cloud, considering what Aberdeen Group analyst Bill Claybrook wrote SCO told him:

"One example of derivative code that SCO says IBM has released to Linux is IBM's AIX journaling file system (JFS) . . . Two other examples of derivative code that SCO says IBM has released to Linux is NUMA (nonuniform memory access) code and RCU (read, copy, and update) code developed by Sequent prior to IBM's acquisition of Sequent in 1999."

What about the other two terms on Slide 8, line-by-line copying and obfuscation? Let's take a look. Literal copying is handled on several slides, not just one. Slides 9-14, to be exact. SCO's assertion is that the code they showed later turned out to be SGI code, not IBM, so IBM has no reason to ask for SCO to hand it over in discovery. But if you look at the slides titled "Literal Copying", each one says this: "Line by Line Copying — One Example of Many", so SCO is pretending there was only one code example used at the slide show but we see several examples and in any case, the examples used were presented as just a sample of many others SCO could show. IBM is asking to see all of them, not just the sample code that turned out to be SGI code.

Obfuscated copying is addressed on Slide 15, but not being a programmer, I'm not qualified to analyze this slide. Others have already done so. With regard to the code examples later turning out not to be IBM code, the issue isn't what they turned out to be, but what SCO represented them to be at their slide show. We presented news articles of the show in our article on Saturday, "SCO Tells IBM: No, You Show *Your* Code First" that indicated that what SCO representatives said at the show was that IBM was guilty of infringement, and that was what attendees expressed their understanding was from the presentation. So we need not cover that ground again here, except to repeat this small example:

"At the SCO Forum on Monday, the company pulled out its latest weapon: lines and lines of disputed code that were allegedly copied from SCO's Unix into IBM's version of Linux. The company claims that IBM illegally copied Unix code into its version of Linux . . . "

But that isn't the only time SCO has accused IBM of infringing their IP. They accused IBM of directly copying their System V code into Linux, according to two news articles, first one in MozillaQuest, which quoted analyst Bill Claybrook as saying SCO told him IBM was a violator:

"I don't have a list of any of the alleged violators, except SCO did say that IBM has copied Unix System V code into Linux. I personally find that hard to believe because IBM has one of the best screening processes of any major supplier for making sure that code does not move into Linux. And SCO said no to IBM's copying the first time I asked the question and then several hours later changed their answer to the one that I just gave."

Here is the Newsfactor account:

"'I specifically asked SCO if they had any evidence that IBM directly copied System V source code into Linux. The reply was no,' Claybrook wrote in his report. 'SCO has subsequently changed that reply to, "We have that code but we have not presented it at this time."'

"When asked if the confusion about this issue is odd, given that this is the central tenet of SCO's lawsuit against IBM, Claybrook agreed. 'Whenever I asked the question, Chris Sontag, the VP there, told me no,' Claybrook said. 'But then I got an e-mail 8 to 10 hours later from Blake Stowell, director of PR, that said they had "misspoken" -- they did have evidence that IBM had directly copied code.'"

Here's what Darl McBride said on 07/03/2003 according to The Register:

"IBM has taken our valuable trade secrets and given them away to Linux."

In the press release SCO put out when it "terminated" IBM's AIX contract, McBride said IBM was continuing to "violate our source code". And SCO's attorney Mark Heise said:

"Through contributing AIX source code to Linux and using UNIX methods to accelerate and improve Linux as a free operating system, with the resulting destruction of UNIX, IBM has clearly demonstrated its misuse of UNIX source code and has violated the terms of its contract with SCO."

And here McBride made a direct accusation:

"In the last 18 months, we found that IBM had donated some very high-end enterprise-computing technologies into open-source. Some of it looked like it was our intellectual property and subject to our licensing agreements with IBM. Their actions were in direct violation of our agreements with them that they would not share this information, let alone donate it into open-source. We have examples of code being lifted verbatim.

"And IBM took the same team that had been working on a Unix code project with us and moved them over to work on Linux code. If you look at the code we believe has been copied in, it's not just a line or two, it's an entire section -- and in some cases, an entire program."

When SCO wrote that they have never accused IBM publicly of the four categories of alleged misappropriation, literal copying, derivative works, obfuscation, and non-literal transfers, was that truthful? The accusation ended up in Claybrook's report, and SCO not only didn't correct it, it corrected Sontag's orginal denial that they had proof of IBM's literal copying.

And they did it privately too, according to Ian Lance Taylor's report of his visit to look at the code, which report SCO never corrected to the best of my knowledge and, if I remember correctly, I believe McBride actually referred to this account in a teleconference. During his visit, he took notes and says that this is what SCO (mostly Chris Sontag) told him:

"SCO has a list of about 20 IBM engineers who are, it claims, using AIX methods in Linux. SCO claims that some of these engineers literally are looking at AIX source code as they discuss Linux issues and making recommendations based on the AIX code.

"SCO claims this is inappropriate because everything built on top of AIX or using methods developed in AIX is really a derived work of Unix. As we talked, I realized this is a key part of SCO's argument. SCO claims that anything built on top of Unix is itself a derived work of Unix. I will discuss this further below.

"SCO said that besides IBM, Sequent has contributed code to Linux which is derived from Unix. Sequent is now a subsidiary of IBM.

"SCO also claims that some of the derivative works IBM contributed to Linux include NUMA, RCU, JFS, SMP, performance measurement and improvements, serviceability, scheduler improvements, LinuxPPC 32 and 64 bit support, logical partition support. Sontag moved on to the next slide before I typed down the rest of the list."

Finally, about the SGI matter, SCO characterizes what happened like this:

"What makes IBM's use of this trade show material particularly misleading to this Court is that the code in question identified by SCO at the trade show and elsewhere was code from a licensee other than IBM. In fact, it was widely reported after the trade show that the example of improperly contributed code was from SGI, which has since publicly acknowledged its improper contribution."

Here's what SGI actually said about the code:

"When a question was raised by the community earlier in the summer about the ate_utils.c routine, we took immediate action to address it. We quickly and carefully re-reviewed our contributions to open source, and found brief fragments of code matching System V code in three generic routines (ate_utils.c, the atoi function and systeminfo.h header file), all within the I/O infrastructure support for SGI's platform. The three code fragments had been inadvertently included and in fact were redundant from the start. We found better replacements providing the same functionality already available in the Linux kernel. All together, these three small code fragments comprised no more than 200 lines out of the more than one million lines of our overall contributions to Linux. Notably, it appears that most or all of the System V code fragments we found had previously been placed in the public domain, meaning it is very doubtful that the SCO Group has any proprietary claim to these code fragments in any case.

"As a precaution, we promptly removed the code fragments from SGIs Linux website and distributed customer patches, and released patches to the 2.4 and 2.5 kernels on June 30 and July 3 to replace these routines and make other fixes to the SGI infrastructure code that were already in progress at SGI. Our changes showed up in the 2.5 kernel within a few weeks of our submission, and the 2.4 changes were available in the production version of the 2.4 kernel as of August 25 when the 2.4.22 kernel was released. Thus, the code in question has been completely removed.

"Following this occurrence, we continued our investigation to determine whether any other code in the Linux kernel was even conceivably implicated. As a result of that exhaustive investigation, SGI has discovered a few additional code segments (similar in nature to the segments referred to above and trivial in amount) that may arguably be related to UNIX code. We are in the process of removing and replacing these segments.

"SCO's references to XFS are completely misplaced. XFS is an innovative SGI- created work. It is not a derivative work of System V in any sense, and SGI has full rights to license it to whomever we choose and to contribute it to open source. It may be that SCO is taking the position that merely because XFS is also distributed along with IRIX it is somehow subject to the System V license. But if so, this is an absurd position, with no basis either in the license or in common sense. In fact, our UNIX license clearly provides that SGI retains ownership and all rights as to all code that was not part of AT&Ts UNIX System V."

Does that match what SCO said to Judge Kimball about SGI and this code? No? One thing I think we can all agree on. Someone is being false and misleading. I will leave it up to you to decide who.

Now, about the "it's not about trade secrets", here is how SCO characterized its lawsuit against IBM in its SEC 10Q filing for the quarter ending April 30, 2003:

"On March 6, 2003, the Company filed a complaint against IBM alleging breach of contract, misappropriation of trade secrets, tortious interference, and unfair competition.  The complaint centers on IBM’s activities regarding the UNIX operating system that underlies both the Company’s UNIX-based operating systems and IBM’s AIX, its UNIX-based operating system.  The complaint alleges that IBM obtained information concerning the UNIX source code from the Company and inappropriately used and distributed that information in connection with its efforts to promote the Linux operating system." [emphasis added]

And IBM is misleading the court and mischaracterizing the case as being about trade secrets? They said themselves that's what it was about. And they never publicly accused IBM? SEC filings are public. Interviews with the media are public. The SCOForum slide presentation was public.

Maybe the explanation is as simple as this snip from an exclusive interview McBride gave:

"In an exclusive interview, McBride told vnunet.com that SCO was about to embark on the discovery process of its legal case, when it looks for material related to the case.

"'As we move into discovery, this will be very nice for us because now we get to go in and talk to all their people, their customers. We get to really shake things up and get in to find out what really is going on over there,' he said.

"McBride claimed that SCO has the right to audit IBM's customers. 'We have other rights under the contract we are looking at. For example, we can audit IBM customers. SCO has audit rights on its customers,' he said.

"'The reality is that we are going into discovery right now and that might be the vehicle to be able to investigate what we need there anyway.'"

Normally, when I write about the SCOSaga, I try to be entertaining, but I have to confess to being old-fashioned enough that I can't find anything funny or witty to say about this story. You just don't mislead a judge. I'm shocked, actually. Not in the Casablanca-I'm-shocked-shocked kind of way. I mean I'm really stunned by the slide comparison. I keep thinking, maybe I've misunderstood. Maybe it's written so sharply I've missed something. It's possible. I actually hope so.

I've never worked for an attorney who misled a judge. This may amaze those of you who hate lawyers, but it's true. The whole legal system is based on honor, corny as that might sound. That is one of the things I like about it. I've seen lawyers lie to their wives, sadly, to their creditors, maybe, to their clients even, but never to a judge.

I guess it's true, what Lily Tomlin said. No matter how cynical you get, it is impossible to keep up.


  


SCOForum Slides vs. SCO's Memorandum -- A Closer Look | 233 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
SCOForum Slides vs. SCO's Memorandum -- A Closer Look
Authored by: maxhrk on Monday, October 27 2003 @ 04:38 AM EST
SO.. I think I better prepare to purhase the popcorns and go to court to watch
Judge and how reaction may come from the judge. anyhoo, have you all watched the
Kobe case that Judge gotten mad at the attorney correct? I think that judge may
be the most worst in the sight that this judge in kobe case.


Beside that, I think we all know what wrong with SCO and their lawyers too.
Hopefully I am not mistaken after I read this PJ's article. I am sure they will
pay.. it.. painfully... before... the... Judge's.. wr-(shudder, run away).

Overall, PJ, you did excellent job on it as always.

---
SCO: Linux... I am your.. father.

[ Reply to This | # ]

SCOForum Slides vs. SCO's Memorandum -- A Closer Look
Authored by: nealywilly on Monday, October 27 2003 @ 05:03 AM EST
If the judge comes to the same conclusion, what's the likely result.

Contempt of court?

[ Reply to This | # ]

SGI's "acknowledgement"
Authored by: Anonymous on Monday, October 27 2003 @ 05:18 AM EST
Here's how I would explain it if I were SCO:

We didn't say that SGI acknowledged the impropriety of its contribution, only that it acknowledged the contribution. We call the contribution improper because it was, in fact, improper, but we haven't claimed that SGI itself called it improper. [What is it you say? We implied it? Well duh, why do you think they call us spin doctors?]

[ Reply to This | # ]

SCOForum Slides vs. SCO's Memorandum -- A Closer Look
Authored by: minkwe on Monday, October 27 2003 @ 05:25 AM EST
It's like SCO is hiding in a cave and IBM is standing out with a weapon aimed
at the exit of the cave. And SCO knows that as soon as they bring out their
evidence, IBM is going to strike down their case with deadly precision.

[ Reply to This | # ]

SCOForum Slides vs. SCO's Memorandum -- A Closer Look
Authored by: minkwe on Monday, October 27 2003 @ 05:37 AM EST
There seems to be some clue to the SCO-MS relationship in this article. I've not heard much of this discussed on Groklaw. Microsoft judge raises concerns

Microsoft lawyers said the company believes it has complied fully with the settlement terms and that companies that haven't bought Windows licenses yet have done so of their own free will. Microsoft also pointed to the SCO agreement as an example of how even a direct competitor can easily license Windows

Microsoft judge raises concerns[CBS MarketWatch]

--

There are two classes of people in the world. Those that believe SCO and those that don't. -Darl McBride. Duh!!!

[ Reply to This | # ]

SGI did not deny improper contribution
Authored by: Anonymous on Monday, October 27 2003 @ 06:20 AM EST
SGI did not acknowledge making an improper contribution, but they did not deny
it, either: they said the amount in question was small, and that "most or
all" of it was public domain. That means that "none or some"
could have been improper.



As Miracle Max says, there's a difference between "mostly dead" and
"all dead".

[ Reply to This | # ]

SCOForum Slides on the SCO website do not appear to be the originals
Authored by: PJ on Monday, October 27 2003 @ 06:58 AM EST
Legal stuff. I do know. But for the purposes of this article, these are
enough.

[ Reply to This | # ]

Can't see the trees for the Forrester...
Authored by: geoff lane on Monday, October 27 2003 @ 07:01 AM EST
There's an article in News.Com written by Julie Giera, VP Forrester Research.

In the article she argues that "IBM is giving its customers the blues by asking them to assume financial and legal risk with its open-source software--that's after those same customers have already shelled out hundreds of thousands of dollars for the code."

It's another half baked argument for indemnification against copyright infringement litigation which misses the point that rarely if ever are customers liable for the actions of a company.

Indemnification is a trap that stupid companies fall into which enables 3rd parties to threaten customers knowing that someone is there in the background who will pick up the tab. The result would be to encourage court action rather than protect the customers.

If a customers wants special protection against being forced to make changes to their own products (as many who use IE6 to deliver services might have to do following recent patent cases) there is perfectly good insurance that can be bought; indeed should be bought -- while IBM may not disappear overnight many other small technology companies do and when they do not use open source you may be left with no software and nobody to sue...

--
If you love some code, set it free.

[ Reply to This | # ]

SCOForum Slides vs. SCO's Memorandum -- A Closer Look
Authored by: Anonymous on Monday, October 27 2003 @ 07:24 AM EST
***The reality is that we are going into discovery right now and that might be
the vehicle to be able to investigate what we need there anyway***

It sounds like they think they can use discovery to find out enough stuff to
support their case, and they might not have everything they need (like a full
copy of their source code and it's change logs).

Like you, I'm stunned, but its more that the lawyers haven't explained the way
things work to Darl.

[ Reply to This | # ]

PJ, Something else to point out
Authored by: Grim Reaper on Monday, October 27 2003 @ 07:28 AM EST
PJ: You may also want to explicitly point out the fact that, in the SCO
memorandum, they state:

"...so the specifics of who at IBM was involved with improperly
contributing this code to the public, how they did so, and the like will not be
known until SCO gets the information from IBM, the party who contributed the
protected materials in violation of its contractual obligations."

However, as you have pointed out, Sontag earlier stated:

"SCO has a list of about 20 IBM engineers who are, it claims, using AIX
methods in Linux. SCO claims that some of these engineers literally are looking
at AIX source code as they discuss Linux issues and making recommendations based
on the AIX code."

---
For the love of money is a root of all kinds of evil (1 Timothy 6:10); R.I.P. -
SCO Group, 2005/08/29

[ Reply to This | # ]

Repeat again
Authored by: Anonymous on Monday, October 27 2003 @ 07:36 AM EST
i really believe they have scripted this from the beginning
very carefully and that there is another lawyer not mentioned or acknowledged
yet.now as to whether they can get away with this i dont know
i am not familiar with law enough to know.
it is as korbomite says tho it is all a stock scam for a failing company.
br3n

[ Reply to This | # ]

SCOForum Slides vs. SCO's Memorandum -- A Closer Look
Authored by: fxbushman on Monday, October 27 2003 @ 07:43 AM EST
An interesting comment by Mark Radcliffe in an article here: In a very unusual provision, Novell, as part of its sale of the UNIX licenses to SCO, retained the right to require SCO to "amend, supplement, modify or waive any right" under the license agreements (and if SCO did not comply, Novell could exercise those rights itself on SCO's behalf). At IBM's request, Novell employed this right and demanded that SCO waive IBM's purported violations. When SCO did not do so, Novell exercised its right to waive the violations on SCO's behalf. Basically, this defense destroys the core of the SCO case: IBM's violation of its UNIX license with SCO.

[ Reply to This | # ]

SCO Claim - Enterprise Linux not possible without misappropriation by IBM
Authored by: smtnet1 on Monday, October 27 2003 @ 08:56 AM EST
In SCOs initial clam they said That Linux is the equivalent of a bicycle and could not reach enterprise standards without the misappropriation of UNIX code by IBM

86. It is not possible for Linux to rapidly reach UNIX performance standards for complete enterprise functionality without the misappropriation of UNIX code, methods or concepts to achieve such performance, and coordination by a larger developer, such as IBM.

This is just another example of SCOs direct claims of misappropriation by IBM

When I first read this I was angry because I knew that a large group of people motivated by a common cause and with a highly respected central figure can achieve much more than than a group motivated by money.

The Linux development process has a well respected central figure in Linus Torvaulds and very large number of highly motivated and talented programmers. With or without corporate sponsors Linux would become mainstream and displace SCO.

Groklaw is another excellent example of a group of dedicated people contributing to common cause with a highly respected central figure .. PJ

[ Reply to This | # ]

GPL is opaque
Authored by: gumout on Monday, October 27 2003 @ 08:56 AM EST
In the article referenced above by fxbushman at:

http://www.alwayson-network.com/comments.php?id=1303_0_1_0_C

The author,a senior partner at Gray Cary Ware & Freidenrich,
says about the GPL:

"Yet the GPL remains a dangerous defense for defenders of open source: the
GPL is the basis for the open-source software industry, yet no court has ever
ruled on the enforceability or interpretation of the agreement (one case
relating to MySQL generated an opinion, but the court deferred interpretation of
the GPL and the case settled). The language of the GPL is opaque and it has many
ambiguities: it does not establish a governing law, the scope of
"derivative works" that are governed by the GPL is unclear and the
legal effect of the FAQ (which are not part of the license itself) is
uncertain."

---
Software will never be free until the last CEO has been
strangled with the entrails of the last lawyer.

[ Reply to This | # ]

Did Boies/Heise write the enlargement motions and memos
Authored by: Anonymous on Monday, October 27 2003 @ 09:08 AM EST
I am wondering if Boies/Heise wrote all the versions of the enlargement motions and memo opposing IBM's motion to compel.

The reason that I wonder this, is in the first version of the enlargement motion, they say the drafters were working from incomplete faxed documents. While the "dog ate my homework" excuse is interesting (some might say hilarious) in itself, the underlying implication is that somebody other than the attorney signing the original motion, wrote it.

Another interesting contrast is not withstanding that, the memo against IBM's motion to compel, uses an entirely different argument to those used asking for enlargement of time (especially the first version of that motion).

So, I start to wonder if any of the SCO filings were prepared by SCO/McBride/Tibbitts (delete as applicable) as opposed to Boies/Heise.

[ Reply to This | # ]

Tradition
Authored by: overshoot on Monday, October 27 2003 @ 09:09 AM EST
Pity the Courts don't have the military tradition of asking for a Board of Inquiry. SCO has accused IBM of attempting to mislead the Court, and IBM should have the right to have the Court clear their name.

[ Reply to This | # ]

SCOForum Slides vs. SCO's Memorandum -- A Closer Look
Authored by: Anonymous on Monday, October 27 2003 @ 09:10 AM EST
This has probably been said before but here I go:

The way I see it SCO is simply trying to unsay everything they have said
publicly and I hope the judge doesnt allow this.

[ Reply to This | # ]

Breaking license agreement?
Authored by: Anonymous on Monday, October 27 2003 @ 09:24 AM EST
Please explain to me. What is in this license agreement that IBM allegedly broke
that is relevant to the claims and not about trade secrets? Does SCO still argue
about technology transfer? Are they just switching words to designate the same
actions? <P>
Looks to me their arguments won't excuse them from showing the code.

[ Reply to This | # ]

Lawyers playing games....
Authored by: p0ssum on Monday, October 27 2003 @ 09:33 AM EST
with lawyers is fine. That's what they do and it's a big part of being a good
attorney. If you know they other attorneys weaknesses, you have an advantage and
you can use it against him. IANAL but I have many friends that are lawyers. I
have had them repeatedly looking at this stuff and they are quite amazed at what
SCO is doing. One did point out, however, that SCO's wording on all of these
documents in very clever, not actually saying what they meaning and not meaning
what they say. He stated he would be embarrased to place these documents in
front of a judge. He said he would have no problem showing them to another
lawyer however.

Laywers play games with lawyers, not judges. One thought maybe SCO was trying to
get the case thrown out for acting so assanine. I have heard that theory thrown
around here. I wonder if there is really anything behind it, would SCO rather at
this point, just get thier case thrown out, deal with the IBM and RedHat suits
as best they can, reload and shoot again? If RedHat wins, SCO would be enjoined
from making their outlandish remarks as in Germany correct?

---

If you are not the lead dog, the scenery never changes.

[ Reply to This | # ]

Attention PJ - Direct misappropriation all over amended complaint
Authored by: Anonymous on Monday, October 27 2003 @ 09:38 AM EST
Attention PJ.

The allegation of direct misappropriation is all over SCO's amended complaint.

For example

162. SCO’s Trade Secrets are embodied within SCO’s proprietary SCO OpenServer and its related shared libraries and SCO’s UnixWare and its related shared libraries.

163. SCO and its predecessors in interest have expended over one billion dollars to develop SCO’s Trade Secrets.

164. IBM, through improper means acquired and misappropriated SCO’s Trade Secrets for its own use and benefit, for use in competition with SCO and in an effort to destroy SCO.


I'm lazy, but I'll try and pick out a few more (I do not claim this to be complete) examples of SCO alleging IBM misappropriating SCO Code in the complaint (emphasis added in each case):

4. The UNIX software distribution vendors, such as IBM, are contractually and legally prohibited from giving away or disclosing proprietary UNIX source code and methods for external business purposes, such as contributions to the Linux community or otherwise using UNIX for the benefit of others. This prohibition extends to derivative work products that are modifications of, or based on, UNIX System V source code or technology. IBM and certain other UNIX software distributors are violating this prohibition, en masse, as though no prohibition or proprietary restrictions exist at all with respect to the UNIX technology. As a result of IBM’s wholesale disregard of its contractual and legal obligations to SCO, Linux 2.4.x and the development Linux kernel, 2.5.x, are filled with UNIX source code, derivative works and methods. As such, Linux 2.4.x and Linux 2.5.x are unauthorized derivatives of UNIX System V.

5. As set forth in more detail below, IBM has breached its obligations to SCO, induced and encouraged others to breach their obligations to SCO, interfered with SCO’s business, and engaged in unfair competition with SCO, including by:

a) misusing UNIX software licensed by SCO to IBM and Sequent;

b) inducing, encouraging, and enabling others to misuse and misappropriate SCO’s proprietary software; and

c) incorporating (and inducing, encouraging, and enabling others to incorporate) SCO’s proprietary software into Linux open source software offerings.

57. SCO, on the other hand, had over 15 years of expertise in adapting UNIX to Intel based systems. Moreover, SCO had spent the previous 18 months working closely with Intel to adapt its existing UnixWare product to work on the new 64-bit Intel processor. That project, known as "Gemini-64," was well underway when work on Project Monterey was started. In furtherance of, and in reliance on, IBM’s commitment to Project Monterey, SCO ceased work on the Gemini-64 Project and expended substantial amounts of money and dedicated a significant portion of SCO's development team to Project Monterey. Specifically, plaintiff and plaintiff’s predecessor provided IBM engineers with valuable information and trade secrets with respect to architecture, schematics, and design of UnixWare and the UNIX source code for both 32- and 64-bit Intel-based processors.

80. However, as IBM executives know, a significant flaw of Linux is the inability and/or unwillingness of the Linux process manager, Linus Torvalds, to identify the intellectual property origins of contributed source code that comes in from those many different software developers. If source code is code copied from protected UNIX code, there is no way for Linus Torvalds to identify that fact.

81. As a result, a very significant amount of UNIX protected code is currently found in Linux 2.4.x and Linux 2.5.x releases in violation of SCO’s contractual rights and copyrights.

84. To make Linux of necessary quality for use by enterprise customers, it needed to be re-designed and upgraded to accommodate complex multi-processor functionality that has taken UNIX nearly 20 years to achieve. This re-design is not technologically feasible or even possible at the enterprise level without (a) a high degree of design coordination, (b) access to expensive and sophisticated design and testing equipment; (c) access to UNIX code and development methods; (d) UNIX architectural experience; and (e) a very significant financial investment.

89. Among other actions, IBM misappropriated the confidential and proprietary information from SCO in Project Monterey. IBM thereafter misused its access to the UNIX source code.

95. Again, “IBM’s AIX contributions” consisted of the improper extraction, use, and dissemination of SCO’S UNIX source code, derivative works and methods.

98. The only way that the pathway is an “eight-lane highway” for Linux to achieve the scalability, SMP support, fail-over capabilities and reliability of UNIX is by the improper extraction, use, and dissemination of the proprietary and confidential UNIX source code, derivative works and methods. Indeed, UNIX was able to achieve its status as the premiere operating system only after decades of hard work, beginning with the finest computer scientists at AT&T Bell Laboratories, plaintiff’s predecessor in interest.

99. Based on other published statements, IBM currently has over 7,000 employees involved in the transfer of UNIX knowledge into the Linux business of IBM, Red Hat, Inc. and SuSE Linux AG (the largest European Linux distributor). On information and belief, a large number of the said IBM employees currently working in the transfer of UNIX to Linux have, or have had, access to the UNIX Software Code.

101. IBM is affirmatively taking steps to destroy all value of UNIX by improperly extracting and using the confidential and proprietary information it acquired from UNIX and dumping that information into the open source community. As part of this effort, IBM has heavily invested in the following projects to further eliminate the viability of UNIX: a)The Linux Technology Center was launched in 2001 with the advertised intent and foreseeable purpose of transferring and otherwise disposing of all or part of UNIX, including its derivative works, modifications and methods, into an open source Linux environment;

b) The IBM Linux Center of Competency was launched to assist and train financial services companies in an accelerated transfer of UNIX to Linux with the advertised intent and foreseeable purpose of transferring and otherwise disposing of all or part of UNIX, including its derivative works, modifications and methods into open source.

c)A carrier-grade Linux project has been undertaken to use UNIX source code, derivative works, modifications and methods for the unlawful purpose of transforming Linux into an enterprise-hardened operating system;

d) A data center Linux project has been undertaken to use UNIX source code, derivative works, modifications and methods for the unlawful purpose of transforming Linux into an enterprise-hardened operating system; and

e)Other projects and initiatives have been undertaken or supported that further evidence the improper motive and means exercised by IBM in its efforts to eliminate UNIX and replace it with free Linux.

102. But for IBM’s coordination of the development of enterprise Linux, and the misappropriation of UNIX to accomplish that objective, the Linux development community would not have timely developed enterprise quality software or customer support necessary for widespread use in the enterprise market.

106. IBM has violated its grant of rights under §2.01 of the Software Agreement by, inter alia, modifying and assisting others to modify the Software Products (including System V source code, derivative works and methods based thereon) for purposes other than IBM’s own internal business purposes. By actively supporting, assisting and promoting the transfer from UNIX to Linux, and using its access to UNIX technology to accomplish this objective, IBM is (a) using the Software Product for external business purposes, which include use for the benefit of Linus Torvalds, the general Linux community and IBM’s Linux distribution partners, Red Hat, Inc. and SuSE Linux AG and its subsidiaries; and is (b) directly and indirectly preparing unauthorized derivative works based on the Software Product and unauthorized modifications thereto in violation of §2.01 of the Software Agreement.

107. IBM agreed in §2.05 of the Software Agreement to the following restrictions on use of the Software Product (including System V source code, derivative works and methods based thereon):

No right is granted by this Agreement for the use of Software Products directly for others, or for any use of Software Products by others.

108. IBM has breached §2.05 of the Software Agreement by, inter alia, actively promoting and allowing use of the Software Products and development methods related thereto in an open and hostile attempt to destroy the entire economic value of the Software Products and plaintiff’s rights to protect the proprietary nature of the Software Products. By way of example and not limitation, IBM has used protected UNIX methods for others in accelerating development of the 2.4.x kernel and 2.5.x Linux kernel in, among others, the following areas: (a) scalability improvements, (b) performance measurement and improvements, (c) serviceability and error logging improvements, (d) NUMA scheduler and other scheduler improvements, (e) Linux PPC 32- and 64-bit support, (f) AIX Journaling File System, (g) enterprise volume management system to other Linux components, (h) clusters and cluster installation, including distributed lock manager and other lock management technologies, (i) threading, (j) general systems management functions, and (k) other areas. But for the use by IBM of these protected UNIX methods in Linux development, the Linux 2.4.x kernel and 2.5.x kernel capacity to perform high-end enterprise computing functions would be severely limited.

110. IBM has breached §7.10 of the Software Agreement by, inter alia, transferring portions of the Software Product (including System V source code, derivative works and methods based thereon), including but not limited to the AIX Journaling File System and all other UNIX-based source code publicly announced by IBM, to Linus Torvalds for open distribution to the general public under a software license that destroys the proprietary and confidential nature of the Software Products.

111. IBM has further stated its intention to transfer the entirety of AIX into open source in anticipatory violation of its obligations under §7.10 of the Software Agreement.

114. IBM has breached its obligation of confidentiality by contributing portions of the Software Product (including System V source code, derivative works and methods based thereon) to open source development of Linux and by using UNIX development methods in making modifications to Linux 2.4.x and 2.5.x, which are in material part, unauthorized derivative works of the Software Product. These include, among others, (a) scalability improvements, (b) performance measurement and improvements, (c) serviceability and error logging improvements, (d) NUMA scheduler and other scheduler improvements, (e) Linux PPC 32- and 64-bit support, (f) AIX Journaling File System, (g) enterprise volume management system to other Linux components, (h) clusters and cluster installation, including distributed lock manager and other lock management technologies, (i) threading, (j) general systems management functions, and (k) others.

115. IBM has further stated its intention to transfer the entirety of AIX into open source in anticipatory violation of its obligations under §7.06 (a) of the Software Agreement.

116. Export of UNIX technology is controlled by the United States government. Thus, SCO, IBM and all other UNIX vendors are subject to strict export control regulations with respect to any UNIX-based customer distribution. To this end, IBM agreed in §4.01 of the Software Agreement to restrictions on export of the Software Product (including System V source code, derivative works and methods based thereon), as follows:

Licensee agrees that it will not, without the prior written consent of AT&T, export, directly or indirectly, Software Products covered by this Agreement to any country outside of the United States.

This provision was later modified to allow export rights to several countries outside the United States. However, no permission has ever been granted by SCO or its predecessors to IBM to allow it to indirectly make available all or portions of the Software Product to countries outside the United States that are subject to strict technology export control by the United States government: viz., Cuba, Iran, Syria, North Korea and Libya. IBM is ignoring and attempting to circumvent the export control restrictions that apply to UNIX as it accelerates development of Linux for enterprise use.

117. Thus, IBM has breached §4.01 of the Software Agreement by, inter alia, making extensive, advanced multiprocessor scaling functions of the Software Product, including derivative works and methods based thereon, available for free distribution to anyone in the world with a computer. As it relates to Linux 2.4.x and 2.5.x releases, IBM is indirectly making the Software Product and operating system modifications available to countries and organizations in those countries for scaling single processor computers into multi-processor supercomputers that can be used for encryption, scientific research and weapons research.

140. This publication of the RCU copyright is an example of IBM’s blatant disregard of SCO’s rights to control the use of the Software Product, including derivative works and modifications thereof, pursuant to §2.05 of the Sequent Software Agreement.

142. IBM has breached Sequent’s obligations under §7.10 of the Sequent Software Agreement by, inter alia, transferring portions of the Software Product (including System V source code, derivative works and methods based thereon), including DYNIX/ptx source code, documentation and methods for NUMA, RCU and SMP technologies, to Linus Torvalds for open distribution to the general public under a software license that destroys the proprietary and confidential nature of the Software Products.

144. IBM has breached Sequent’s obligation of confidentiality by contributing portions of the Software Product (including System V source code, derivative works and methods based thereon) to open source development of Linux and by using UNIX development methods in making modifications to Linux 2.4.x and 2.5.x, which are in material part, unauthorized derivative works of the Software Product, including but not limited to DYNIX/ptx-based NUMA technology, source code and methods, RCU source code and methods, and SMP source code and methods.

150. In furtherance of its scheme of unfair competition, IBM has engaged in the following conduct:

a) Misappropriation of source code, methods, trade secrets and confidential information of plaintiff;

b) Breach of contract;

c)Violation of confidentiality provisions running to the benefit of plaintiff;

d) Inducing and encouraging others to violate confidentiality provisions and to misappropriate trade secrets and confidential information of plaintiff;

e)Contribution of protected source code and methods for incorporation into one or more Linux software releases, intended for transfer of ownership to the general public;

f) Use of deceptive means and practices in dealing with plaintiff with respect to its software development efforts; and

g) Other methods of unlawful and/or unfair competition.

164. IBM, through improper means acquired and misappropriated SCO’s Trade Secrets for its own use and benefit, for use in competition with SCO and in an effort to destroy SCO.

[ Reply to This | # ]

One way out
Authored by: Anonymous on Monday, October 27 2003 @ 09:42 AM EST
I'm beginning to think that the Court might find that the path of least resistance looks good. Rather than deal with the the forcible-urination contest that TSG is setting up, the Court could simply decide to not recognize the (belated) request for more time to reply on the grounds that the signed request wasn't submitted until after the deadline. That would moot all of the accusations flying back and forth.

As long as TSG is gambling on submitting requests for extension one minute before deadline, why not? Those who live by the picky details can be hoist by their own picky details.

[ Reply to This | # ]

PJ do we have an idiot button ?
Authored by: gumout on Monday, October 27 2003 @ 09:57 AM EST
If we are logged on our own account in Groklaw is there any way to delete our
own mistakes that we post or are we eternally doomed to appear as blathering
idiots?

---
Software will never be free until the last CEO has been
strangled with the entrails of the last lawyer.

[ Reply to This | # ]

Preponderance of the evidence
Authored by: Anonymous on Monday, October 27 2003 @ 10:00 AM EST
Wow. Talk about shooting your case in the foot. Remember that TSG has to prove a
preponderance of the
evidence, and if they're admitting this much difficulty complying with
discovery, doesn't that telegraph
extreme shortcomings in their case to the judge?

[ Reply to This | # ]

There is no Dynix/AIX license - and AIX revokation again
Authored by: Anonymous on Monday, October 27 2003 @ 10:02 AM EST
I posted a bit about this in the previous discussion.

I have thought on this and found some more (added here). Some stuff is essentially a repeat of my last post, some is new.

NOT A "DYNIX LICENSE" OR AN "AIX LICENSE"

Before I start, I also want to point out calling the licenses "AIX" and "Dynix" is misleading, and accepts SCO's (in my opinion) wrong interpretation.

As far as I know, the licenses do NOT name AIX or Dynix. The licenses name IBM and Sequent. They grant rights to use the AT&T code and software to develop products. As far as I know, they contain no limitations on which divisions of IBM can use the AT&T code and software. As far as I can tell, there is nothing to stop IBM developing more than multiple products under the IBM license, or multiple products under the Sequent license.

From the date IBM acquired Sequent (1999 I think), IBM thus has have two independent sets of rights - and these rights apply to IBM's development of products based on the AT&T source code and software:

Right 1: Under the license signed in IBM's name

If IBM uses this "Right 1", they have to follow all the terms of the corresponding agreements.

Right 2: Under the license signed in Sequent's name

If IBM uses this "Right 2", they have to follow all the terms of the corresponding agreements.


Now let's imagine as a hypothetical the Sequent license was terminated and the IBM one wasn't (I am not saying it was like this). IBM would still have a right to release a product using AT&T code / software, under the IBM license. Vice-versa also applies.


If you look at IBM's counterclaims, this interpretation is consistent with how IBM's lawyers interpret the situation.

For example, they don't get into discussing the "Dynix" license. They don't separately argue that Novell's waiver needs to be applied to the "Dynix" license. They simply say IBM has a perpetual irrevokable right to use AT&T software / source code, and Novell waived SCO's alleged claims anyway.


SCO REVOKING AIX LICENSE

(this part a repost, except item 5 which is new)

I have been thinking about why SCO thinks they can revoke IBM's license, when it expressly is "irrevokable" and "perpetual".

They have advanced a number of theories:

1. Advanced by Blake Stowell in theregister.co.uk "irrevokable" would be stupid

IANAL, my opinion: So what, even if stupid, if SCO's predicessors (old SCO) signed such a license, that's the way it is, stupid or not.

2. Advanced by Blake Stowell in theregister.co.uk (specifically he was talking about SGI, but I guess you might think he was also talking about IBM): "irrevokable doesn't appear in [SGI's] contract"

IANAL, my opinion: Well it does for IBM. The lawsuit is with IBM. Not worth further comment

3. Advanced by Chris Sontag in CNET: the "enjoin" etc. phraseology means revoke is an option.

IANAL, my opinion: I personally do not think it does. The more likely "enjoin" means they can require IBM to comply with license terms (if breached, whether breached or not is a separate argument in itself), their remedy is therefore not to revoke but to force compliance.

4. Advanced in SCO slide show (presumably by Heise). Use of work beyond scope of license is a "nullity" reference to some court case.

** This one would be a good research project, if anybody wants to volunteer **

IANAL, my opinion: I haven't examined this in detail, but I would have though if the license specifies remedies ("enjoin" etc), you have to work within the available remedies in the event of a breach. I haven't read the case, and maybe I'm assuming too much, but I'd have thought it likely the facts of the case referenced are different. If this were not the case, then "irrevokable" would have absolutely no legal meaning (so why include it, and expand on it with the "enjoin" language in the contract?). Another problem with this theory, is SCO seems to be at least partiallly working within the framework of the various contracts, letters, etc., if breach of license meant it was a "nullity", then wouldn't it be a "nullity" immediately, without the 100 days notice, etc.

5. New: Just ignore the perpetual/irrevokable aspects. Paragraph 118 of their amended complaint, which reads:
118. SCO has the self-executing contractual right to terminate IBM’s right to use and distribute the Software Product, including derivative works and methods based thereon, if IBM fails to fulfill one or more of its obligations under the Software Agreement. This authority is contractually granted under the following provisions of the IBM Related Agreements:

If Licensee fails to fulfill one or more of its obligations under this Agreement, AT&T may, upon its election and in addition to any other remedies that it may have, at any time terminate all the rights granted by it hereunder by not less than two (2) months’ written notice to Licensee specifying any such breach, unless within the period of such notice all breaches specified therein shall have been remedied; upon such termination Licensee shall immediately discontinue use of and return or destroy all copies of Software Products subject to this Agreement. [Software Agreement, §6.03]

Regarding Section 6.03 of the Software Agreement and Sections 2.07 and 3.03 of the Sublicensing Agreement, we will not terminate your rights for breach, nor will we give notice of termination under such Sections, for breaches we consider to be immaterial. We agree to lengthen the notice period referenced in such Sections from two (2) months to one hundred (100) days. If a breach occurs that causes us to give notice of termination, you may remedy the breach to avoid termination if you are willing and able to do so. In the event that a notice of termination is given to you under either of such Sections and you are making reasonable efforts to remedy the breach but you are unable to complete the remedy in the specified notice period, we will not unreasonably withhold our approval of a request by you for reasonable extension of such period. We will also consider a reasonable extension under Section 2.07 of the Sublicensing Agreement in the case of a Distributor who is making reasonable efforts to remedy a breach.

In any event our respective representatives will exert their mutual good faith best efforts to resolve any alleged breach short of termination. [Side Letter, ¶ 5]

Of course there are other issues too:

1. Is there a breach? IBM contends there wasn't

2. Does SCO have to tell IBM the details of the breach ("good faith"). IBM contends they do.

3. How does Novell's waiver according to the three-way agreement fit it. I haven't seen any explanation from SCO of why they can disregard this.

[ Reply to This | # ]

Trade secrets vs confidential proprietary information
Authored by: Anonymous on Monday, October 27 2003 @ 10:06 AM EST
Does "confidential properietary information" have any legal meaning:

SCO: We're suing you, among out allegations are breach of trade secrets

IBM: What trade secrets? If you're alleging we breached your trade secrets, you have to tell us which ones are involved

SCO: We're not talking about trade secrets, we're talking about confidential proprietary information, we don't think we have to identify those.

IBM: Er, "confidential proprietary information", you what? What law are those protected by?

SCO: The Trade Secret laws.

[ Reply to This | # ]

When do we hear from the judge?
Authored by: chrism on Monday, October 27 2003 @ 10:09 AM EST
How long does the filing of motions and counter motions go on before we can
expect to hear anything from the judge?

I was under the impression we should have heard something by now and it's
driving me mad.

[ Reply to This | # ]

How long can SCO continue the spin?
Authored by: lightsail on Monday, October 27 2003 @ 10:19 AM EST
Can it be that SCO is keeping their lawyers in the dark? Can a company hope to
maintain a Chinese wall between the legal staff and their public statements? SCO
publicity is clearly well beyond the scope that they are presenting.

The rhetoric that SCO Group presents is clearly meant to sway opinion to their
side. They have publicly stated that a buyout would end the situation. Does the
funding recently make that more difficult? The continual delay tactics present a
company the wants to be bought, not go to trial or settle.

It seems that the consensus of informed legal opinion goes against SCO.

The Novell retained rights, previous Unix vs. BSD settlement, SCO GPL
distribution of Linux, SCO continued use of GPL products like Samba, prior
publication of RCU in as white paper –trade secret- NOT, not owning copyright to
released material, inclusion of technology in other products without complaint-
JFS in OS/2 and NUMA in Sequent Windows systems, second agreement allowing IBM
full rights to own work, possible Linux code in LKP, repudiation of samples of
theft, failure to mitigate, SCO Group corporate history – i.e. they are not
Santa Cruz Operation, SCO Group work on JFS as GPL, release of ancient Unix
code, failure to have BSD copyright in SysV code, Sun- Lindows- UnitedLinux
distributing Linux with license from SCO (Sun helped AT&T develop SysV- how
does that license read? Novell may know.), this lawsuit has so many holes in it
that one wonders which one will be the turning point, not that it will be lost.


IBM has shown the willingness to take this lawsuit to whatever length necessary
to win. I expect that they have aces yet to show.

SCO inability to produce infringing code or unwillingness to show the same may
get them the KO in RedHat lawsuit. Red hat lawsuit is much more clearly
delineated, SCO needs to show SysV copyrighted code in Linux or lose! SCO could
submit SGI samples to get this going to trial, buying more time. They may see
little damage by reusing that code. Will judge see that as enough evidence to
continue process to trial?

[ Reply to This | # ]

OT: SCO Stalling for a reason??
Authored by: Tyralf on Monday, October 27 2003 @ 10:35 AM EST
I think it is very probable that SCO started all of this in an effort to be
bought out. But if the only reason for starting this campaine in the name of FUD
and money, why are they still at it?

I reflected on the time frame for the case (go to court sometime 2005 and by the
looks of it the later the better)
Couldn´t this have something to do with the longhorn launch by a most
proprietary company in redmond?

I might just be overly paranoid but it seems to me that a FUD campaine of this
magnitude during the development process of their new beemoth of an operating
(nice GUI thou) is an opportunity too good to miss.
Especially since the FUD is not linked to them directly. M$ that is.

It is only too clear that the legal case might be what it is but the public case
is all about credibility.

I do hope I´m wrong and this is just an unfortunate coincidence..

[ Reply to This | # ]

SCOForum Slides vs. SCO's Memorandum -- A Closer Look
Authored by: gadget on Monday, October 27 2003 @ 10:46 AM EST
I can see the reports now...

"In a stunning development in the legal battle of SCO v. IBM, IBM has pulled their lawyers. At their lawyers' own behest, IBM has hired famous paralegal Pamela Jones, editor of Groklaw.net. Groklaw has been tracking the case for some time, debunking and exposing each move in the highly anticipated case. According to sources in IBM, their lawyers said it would be in the best interest of IBM to refrain from the high cost of hiring such expensive attorneys, when a brilliant paralegal could handle the case for them.

Also in another development, SCO has petitioned the judge in the case for an extension in the case. Lawyers for SCO said they would need another decade or two to be ready to take on the many arguments on Ms. Jones's Groklaw.net site which are publicly available for everyone. SCO executives said that this is another example of how Open Source is destroying the American economy and an unfair tactic on the part of IBM. SCO's CEO Darl McBride said, 'Now IBM has gone Open Source with their legal department destroying the proprietary case that their lawyers had been building. We will be tasking our team of MIT experts to research any misappropriation of proprietary legal arguments used by Ms. Jones. We are confident the judge will see this gross infringement of our legal intelluctual property.' When pressed to explain this last statement, Mr. McBride hotly contested, '...whatever filings and arguments Ms. Jones would make on behalf of IBM would obviously be considered a derivative work of the former attorneys of IBM, which are based on opposing arguments from our attorneys, and therefore, legally belonging to SCO.'

At the IBM press conference, other than the announcement of the change in counsel, the only comment executives of IBM would make is they would not be petitioning the court for an extension during the transition to Ms. Jones handling of the case. However, there was a fair amount of snickering and suppressed laughter observed from IBM's executives."

I know this is over-the-top tongue-in-cheek, but each time you hear from SCUMX, whether it be in legal filings or in the press, this case gets more surreal. I wanted to be as over-the-top as PJ's articles are brilliant. Thank you PJ, your hard work and the incredible expose you are making of this case. I think it is also interesting to note that /. is not even trying that much any more following the case other than to link to Groklaw, knowing you are shaming SCO with your excellent work.

PJ for President!

[ Reply to This | # ]

More DiDio
Authored by: Anonymous on Monday, October 27 2003 @ 10:47 AM EST
http://www.newsfactor.com/perl/story/22561.html

"SCO, regardless of what anyone wants to say, is marching on," DiDio
said. Its stock price has risen sharply, and it just received $50 million in new
financing.

Significantly, DiDio noted, famed attorney David Boies is handling SCO's case
on a contingency basis. Boies has handled some of the most high-profile
technology lawsuits to date, including the government's successful antitrust
case against Microsoft (Nasdaq: MSFT) .

That such an attorney would agree to handle SCO's case with no guarantee of a
fee unless SCO wins suggests the Utah-based company has a good chance of
success, DiDio said.

[ Reply to This | # ]

"interesting" article
Authored by: Anonymous on Monday, October 27 2003 @ 10:52 AM EST

IBM is giving its customers the blues by asking them to assume financial and legal risk with its open-source software--that's after those same customers have already shelled out hundreds of thousands of dollars for the code.

It gets better...

[ Reply to This | # ]

didio-enderle-giera connection
Authored by: raindog on Monday, October 27 2003 @ 11:16 AM EST
I just realized not everyone may be aware of the Didio-Enderle-Giera connection, since it was posted in a comment too.

This comment.

[ Reply to This | # ]

new legal docs
Authored by: Anonymous on Monday, October 27 2003 @ 11:36 AM EST
Some updates on legal page

http://www.utd.uscourts.gov/documents/ibm_hist.html

There does not appear to be additional IBM filings as yet, or a SCO response to
IBM's counterclaims

[ Reply to This | # ]

Slide 15
Authored by: floyds_void on Monday, October 27 2003 @ 11:37 AM EST
Obfuscated copying is addressed on Slide 15, but not being a programmer, I'm not qualified to analyze this slide. Others have already done so. With regard to the code examples later turning out not to be IBM code, the issue isn't what they turned out to be ...

It's a little hard to tell how IBM (or rather the original author) obfuscated the code here, since the SYSV side is obfuscated itself. Anyway, BPF stands for Berkely Packet Filter and this type of code seems to have been around for a while. For example, you can see it in linux 2.1.75 http://www.linuxhq.com/kernel/v2.1/75/net/core/filter.c and as we all know linux 2.2 is clean then what's the problem ??

[ Reply to This | # ]

So does IBM get a chance...
Authored by: cfitch on Monday, October 27 2003 @ 11:41 AM EST
... to point out these things to the Judge? I guess what I am really wondering
is that, PJ, you saw these things, this twisting of the truth by SCO, so does
IBM get to point this out or does the judge have to figure out that he is being
lied to?

just wondering...

[ Reply to This | # ]

The slideshow will be irrelevant
Authored by: webster on Monday, October 27 2003 @ 11:50 AM EST
When SCO does give up the code, they will omit the lines placed in the
slideshow. They will be irrelevant. No further discovery or questions in the
trial will be permitted in relation to them. (only if IBM can use it somehow to
attack credibility or competence.

This is of course a good reason for them to specify their claims so that the
weak or wrong ones will be eliminated before trial. But maybe they have nothing
that isn't weak or wrong. They would just like to bluff or posture as long as
possible.

[ Reply to This | # ]

Here's another place they claim direct copying
Authored by: Anonymous on Monday, October 27 2003 @ 12:06 PM EST
Here's another place they claim direct copying (emphasis added). http://www.sco.com/scos ource/linuxlicensefaq.html

17. Why did SCO revoke IBM's AIX license and what is the impact of this action by SCO?

IBM signed a UNIX System V source and sublicense agreements which gave IBM the right to create and ship derivative works of UNIX System V for as long as the license with SCO is in effect. IBM violated the terms of those licenses by unauthorized disclosure of UNIX System V and by contributing SCO's proprietary code to Linux. Among other actions, SCO has the right to terminate IBM's source and sublicense agreements if IBM violates the terms of the agreement. IBM's agreements were terminated on June 16. After this date, IBM no longer has the legal right to continue to ship any UNIX System V derivative work, including AIX.

[ Reply to This | # ]

Enterprise IT Week - Keynote speaker
Authored by: geoff lane on Monday, October 27 2003 @ 12:24 PM EST
ZDNET UK currently has an article Sh rinking Comdex wants to snare tech buyers. The SCO related bit is the last paragraph...

Although attendance at big trade shows is down all over the industry, another company is competing for the same audience. Enterprise IT Week, sponsored by Jupiter Communications, will take place at the same time. Among the highlights is a keynote by SCO Group chief executive Darl McBride, whose company is at the centre of a controversial lawsuit over the Linux operating system.

Might be interesting for anybody who can get tickets.

[ Reply to This | # ]

SGI admitted misappropriating code?
Authored by: Anonymous on Monday, October 27 2003 @ 01:30 PM EST

In your first example paragraph, SCO had the gaul to assert that SGI admitted that they'd misappropriated SCO code. Unless I've been reading SGI's statements all wrong, this is news to me. Didn't SGI merely say that they found some code that appeared to be similar and that they rewrote it to remove any possibility of it infringing on SCO's copyrights?

SCO seems to have the unique ability to take any statement made regarding this case and twist its meaning into something that supports their fantastic claims. It sure seems as though, even if that twisting goes so far as lying, it doesn't seem to bother them in the least.

[ Reply to This | # ]

SCO Worldwide City Tour
Authored by: jmc on Monday, October 27 2003 @ 01:58 PM EST
This is in London on 21 November in which they're advertising "an update
on how we are establishing IP leadership with the SCOsource initiative".

I thought I and a small tape recorder might go and share the fun - any UK
readers care to meet up beforehand?

[ Reply to This | # ]

Is this in the Quote DB?
Authored by: SeismoGuy on Monday, October 27 2003 @ 04:24 PM EST
In the article SCO Group says it has proof of Unix copyright ownership: "In fact, Novell does not own the Unix System 5 copyrights. All copyrights were properly transferred from Novell to SCO as part of the asset sale," said McBride. "SCO is the only rightful owner of the Unix System 5 source code and related copyrights."

[ Reply to This | # ]

Veritas undercutting SCO, along with Novell.
Authored by: Anonymous on Monday, October 27 2003 @ 05:14 PM EST
Things are looking grim for SCO. First with Novell made the announcement that
they were porting NetWare to work with the Linux kernel. Now Veritas is
switching too. The two major comanies that SCO is a customer of are saying that
SCO is not worth the trouble of getting money from. No wonder they are scared.

http://news.com.com/2100-1001_3-825855.html?tag=st_rn
http://news.com.com/2100-7344-5097222.html

[ Reply to This | # ]

There is no Sequent "problem"
Authored by: gumout on Monday, October 27 2003 @ 06:19 PM EST
From a MozillaQuest interview:

MozillaQuest Magazine: Does SCO have registered copyrights for JFS, NUMA,
and RCU?

Blake Stowell: No we don't, but this is not a copyright case. This is a
contracts case. We have, taken IBM to court because they are in breach of
contract.

MozillaQuest Magazine: If so, is that the same JFS, NUMA, and RCU code that
is in the Linux kernel?

Blake Stowell: I can't give you the exact location, but yes, it is in
Linux.

MozillaQuest Magazine: Does SCO have registered copyrights for the Unix
extensions developed by IBM?

Blake Stowell: No, IBM has those copyrights, but this is not about
copyrights. It is about the breaking of a contract.

MozillaQuest Magazine: If not, does SCO claim that it is entitled to
register copyrights for the Unix extensions developed by IBM?

Blake Stowell: SCO will not register those because they do not belong to
SCO. They belong to IBM.


Sequent authored NUMA code .
IBM bought Sequent.
IBM owns NUMA.
Therefore Sequent originally owned NUMA.
Simple deduction forces the conclusion that SCO admits Sequent owned NUMA.


The SCO-NOVELL asset purchase agreement stipulated SCO use the AT&T
contract agreement Exhibit A as the starting boilerplate framework upon which
future SVRX contracts would be negotiated.

---------------------------------------Exhibit A---
2.01 AT&T grants to LICENSEE a personal, nontransferable, and
nonexclusive
right to use in the United States each SOFTWARE PRODUCT identified in the
one or more Supplements hereto, solely for LICENSEE'S own internal business
purposes and solely on or in conjunction with designated CPU's for such
SOFTWARE PRODUCT. Such right to use includes the right to modify such
SOFTWARE PRODUCT and to prepare derivative works based on such
SOFTWARE PRODUCT, provided the resulting materials are treated hereunder
as part of the original SOFTWARE PRODUCT.
--------------------------------------------------

SCO admits Sequent owned the code and this admission contradicts
"provided the resulting materials are treated hereunder as part of the
original SOFTWARE PRODUCT.", thereby legally nullifying it.



---
Software will never be free until the last CEO has been
strangled with the entrails of the last lawyer.

[ Reply to This | # ]

Mozilla Quest Mag, HP / SCO
Authored by: mikebmw on Monday, October 27 2003 @ 06:36 PM EST
I don't think this has been posted yet. More BS quotes about HP's indemnification -- mozilla quest

[ Reply to This | # ]

  • Idiotic - Authored by: Anonymous on Monday, October 27 2003 @ 07:21 PM EST
Troll? Who? Me?
Authored by: gumout on Monday, October 27 2003 @ 06:51 PM EST
Certain fine upstanding netizens have accused me of being a
.......troll, yes a TROLL, because of my signature.
I therefore feel compelled to defend my honor and integrity.
(What's left that is after sixty years of Budweiser and crumpets.)

The "sig" is parody on the famous 18th century French philosopher
Denis Diderot who supposedly quipped "Man will never be free until the
last King has been strangled with the entrails of the last Priest".

There! I've insulted all the world's monarchs as well as all it's priests. So
sober up you netizens and study the natural philosophy of internet trolls. You
could be one too if only you tried.


---
Software will never be free until the last CEO has been
strangled with the entrails of the last lawyer.

[ Reply to This | # ]

  • Troll? Who? Me? - Authored by: Anonymous on Monday, October 27 2003 @ 07:51 PM EST
OT: What keeps McBride, Sontag, Gates, and McNealy up at night
Authored by: Grim Reaper on Monday, October 27 2003 @ 07:16 PM EST
http://www.osdl.org/newsroom/press_releases/2003/2003_10_27_beaverton.html

Among the major improvements in the new 2.6 kernel compared to the current
production 2.4 Linux kernel released in January 2001 are:

1. Improved scalability. It has been tested on up to 64-way systems. It is
ready for production use on 32-way machines. Added new CPU scheduler, memory
management and file system code. Supports up to 8Gb of memory on IA-32 systems.
2. Faster threading. New Native Posix Thread Library for Linux (NPTL) results
in test times on 100,000 threads reduced from 15 minutes to 2 seconds for
significantly faster system performance under heavy loads.
3. Enhanced driver layer. I/O devices such as disks perform better and are
easier to manage. New features include: Logical Volume Management (LVM), sysfs,
device mapper, reduced lock contention.
4. Support for many more embedded device applications. uClinux integration
brings new support for low-cost, low-power CPUs without memory management units
which are commonly used in embedded devices.
5. Improved desktop features. Hot plug devices, including firewire and USB,
are dramatically improved. Mouse, video, and sound are smoother and perform
better. New Advanced Linux Sound Architecture (ALSA) brings professional
music-studio quality audio.


---
For the love of money is a root of all kinds of evil (1 Timothy 6:10); R.I.P. -
SCO Group, 2005/08/29

[ Reply to This | # ]

SCOForum Slides vs. SCO's Memorandum -- A Closer Look
Authored by: gumout on Monday, October 27 2003 @ 07:31 PM EST
This is a slam-dunk:

http://www.linuxworld.com/story/35659.htm

"I in particular would like to thank Mr Ballmer for your entertaining
expose of Linux's deepest, darkest secret - that it can seriously worry the
senior executive of a convicted predatory monopoly, without that ever having
been the intention of its principal software designer and initial
developer."

---
Software will never be free until the last CEO has been
strangled with the entrails of the last lawyer.

[ Reply to This | # ]

SCOForum Slides vs. SCO's Memorandum -- A Closer Look
Authored by: Anonymous on Monday, October 27 2003 @ 09:16 PM EST
I hope IBM has a hold of this

[ Reply to This | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )