Examining the body of law Created by the U.S. Government

U.S. Federal Law

Subscribe to U.S. Federal Law: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get U.S. Federal Law: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Following is a summary of high technology news releases transmitted today by PR Newswire. The full text of these releases is available at the PR Newswire for Journalists, http://media.prnewswire.com/. HKF001 02/01/2008 02:33 r f SCS-Brunei-HRM (SINGAPORE) SCS Launches Human Resource Information and E-Document Management System for Brunei Ministry of Defence LAF003 02/01/2008 03:00 r f CO-Colorado-Nonprofit (DENVER) Colorado Nonprofits Contribute $2 Billion to the Colorado Economy NYF013 02/01/2008 05:00 r f NY-GFI-Group-Trayport (NEW YORK) GFI Group Inc. Acquires Trayport Ltd. LAF027 02/01/2008 06:00 r f CA-Make-It-Work-New (SANTA BARBARA) Make It Work(R) Launches Award-Winning Residential Tech Service to Palm Springs Area NYF040 02/01/2008 06:30 r f WA-MSFT-Yahoo-Acquire (REDMOND) Microsoft Proposes Acquisition of Yahoo! for $31 per Share AQF039 02/01/2008 06:55 r f... (more)

FireEye Educates Government Agencies to Help Defend Against Botnet Cyber Crime

FireEye, Inc., the leader in global anti-botnet protection, brings a new urgency and clarity to the botnet pandemic for government agencies combating stealthy cyber crime perpetrated by criminals exploiting networks of compromised, remotely controlled PCs. FireEye has been selected to speak at the 4th Annual Government Forum of Incident Response and Security Teams (GFIRST) National Conference, being held June 1-6, 2008 in Orlando, Fla. and the Federal Information Security Conference (FISC) being held July 1-2, 2008 in Colorado Springs, Colo. By compromising and gaining control over computers to create their armies of “bots,” cyber criminals can execute any number of fraudulent online activities including intellectual property theft, phishing scams, and massive DDoS extortion attacks, all designed to generate recurring revenue and wreak havoc on their ta... (more)

Ex-CA CEO Sanjay Kumar's Looking at Doing 100 Years

Related Links: "Not Guilty," Both Kumar and Richards Tell Judge Computer Associates Founder Charles Wang Government's Next Target Ex-Computer Associates CEO Sanjay Kumar could be sentenced to 100 years in the slammer if he's found guilty of everything he was charged with on Wednesday, according to the Justice Department. Not exactly a Martha Stewart reprise. Ditto the former head of the company's worldwide sales Stephen Richards. CA's former general counsel Stephen Woghin, who turned state's evidence and has reportedly been drawing the noose tighter and tighter around the necks of Kumar and Richards, pleaded guilty to charges of conspiracy to commit securities fraud and obstruction of justice in federal court in Brooklyn Wednesday morning. He could get 25 years. CA, on the other hand, which turned a blind eye to the company's so-called 35-day month shenanigans until ... (more)

Cherokee Indians To Encircle Open Source?

Jeff Merkey, who used to be chief scientist at Novell and wrote NetWare's SMP kernel, calls open source a "socialist movement that's destroying the software industry in America." He's also convinced open source misappropriates other people's IP. But he thinks he's figured out a way to make it a commercially viable capitalist tool by letting the Cherokee Nation run it. Merkey has rewritten NetWare and merged it with Linux to create a distribution called GaDuGi, a Cherokee word for the work crews that used to engage in what we might call community service for the good of the whole tribe. He says he has turned GaDuGi over to the Cherokee Nation, which will hold the copyright. GaDuGi will be distributed under a new Cherokee Nation Open Source License that is still being written, but reportedly differs from other open source licenses in recognizing trade secret rights in ... (more)

Breaking News: $92 Million Settlement in Kodak-Sun Java Patents Case

Related Links: Java Costs Sun $92 Million Java Patents: "Software and Patents Kodak Wins vs Sun The trial in the U.S. District Court for the Western District of New York in Rochester involving Eastman Kodak Co and Sun Microsystems will no longer be entering its penalty phase, as it was otherwise expected it would today. The parties agreed instead this morning to an out-of-court settlement, under which Sun has agreed to pay Kodak $92 million for a license with respect to the three US patents Java has been found to breach.. Accordingly, Judge Michael Telesca has signed an order formally dismissing the case - "with prejudice." It was just last Friday that a federal jury ruled in favor of Kodak in its dispute over Java, in which it alleged that the middleware mechanisms provided by Sun Microsystems' world-beating language in fact infringe patents Kodak acquired from Wang... (more)

Meet the Perens (Part 2): Secret preloads, Bitkeeper and TCO

(LinuxWorld) — Here it is, just as promised. This is the conclusion of the Perens extravaganza begun last week. This week's column is made up of excerpts from my conversation with Perens two weeks ago. The conversation followed no set course. My questions were not pre-ordained; they wandered over the Linux terrain like it was a cow-path in Texas. But Perens' responses were lucid, well-informed and very interesting. I have trimmed and edited the conversation a bit in order to pack as much of it as I could into this week's space. Lobbying for change LW: Let's say that I, as a hot-headed journalist, wanted to see the Texas Legislature enact new legislation that would make EULAs subordinate to the constitution and not the other way around. Where customers could not be assumed guilty and have to prove their innocence, but rather enjoy the normal way of things under the l... (more)

How Apache & Plan 9 will defeat Microsoft's Passport

(LinuxWorld) — Linux gets a lot of press these days, but much of it appears condescending and is more about the phenomenon of its emergence and growth than it is about the value and use of the technology. That may be about to change, and for the better. As a group, the so-called "mainstream press" often appears to favor Microsoft and show an appalling lack of technical depth in its enthusiastic repetition of the latest Microsoft press release. There’s been a lot of speculation on why this is and whether it even happens. So far, no definitive research provides answers one way or the other. I think there are two explanations. First, the press is largely the victim of a Microsoft marketing strategy that plays off of the social rules people learn in high school: Money and social skills define the in-crowd, and only nerds kvetch about the importance of better ... (more)

Out of Step - NIEM and N-DEx

Since the horrific events of September 11, 2001, the federal government has intensified its efforts to improve communications, collaboration, and information sharing between government and private sector agencies at all levels. The task of creating a seamless system of data and communication between disparate agencies has faced both technological and political obstacles. This article will look at two federal data-sharing initiatives: the National Information Exchange Model (NIEM) and the National Data Exchange (N-DEx). Each offers new information-sharing capabilities and each faces major challenges. Is universal sharing of information between governmental agencies actually doable? NIEM is an ambitious new initiative that is taking a giant step towards making the dream of government-wide data interoperability a reality. NIEM is a joint effort of the Departments of ... (more)

Microsoft Pays Off Lindows, Saves the Windows Trademark

Microsoft has settled the trademark infringement suit that it filed against Linux desktop start-up Lindows.com in December of 2001, the suit that Lindows cleverly managed to stand on its head and turn into an action challenging the legitimacy of the Windows trademark that Microsoft won from the Patent and Trademark Office years ago under cloudy, if not dicey, circumstances. Microsoft is paying Lindows $20 million to buy the Lindows.com name, although Lindows pretty much stopped using it a few weeks ago except in limited circumstances after Microsoft's lawyers basically got it kicked out of the Benelux. Instead Lindows changed its name and the name of its Linux operating system to Linspire. So now Lindows or rather Linspire is going to use Microsoft's own money to advance its position on the desktop. Lindows told the SEC this morning in an amendment to its IPO filing ... (more)

Google Loses Geico Gambit

A U.S. district court has ruled against Google in a trademark suit over the sale of the terms Geico and Geico Direct in Google's AdWords service. In April 2004 Google had changed a previous AdWords policy that stopped the sale of other companies’ words and phrase, and this policy was quickly attacked legally by Geico. The ruling follows an earlier judgement in December that had favored Google. The most recent ruling, however, found that Geico had “established a likelihood of confusion” and that there had been a breach of the insurance firm’s trade mark rights “solely with regard to those sponsored links that use GEICO's trade marks in their headings or text." The matter is not completely over, as the two parties now have 30 days to settle their differences, or failing that, go to trial. "Geico will continue to aggressively enforce its tr... (more)

A streaming media player for the rest of us

After my less than satisfying visit to the land of Linux streaming media viewers just a few weeks ago, I was a little reluctant to try another, in spite of the readers who suggested I look at Xine. I shouldn't have been. I found the Xine experience satisfying in every aspect. Xine installation is quick, easy, and well documented. On my Red Hat 7.2 desktop box with its 1-GHz Athlon CPU, 512 megabytes of RAM, and a GeForce 2 MX video card, I got video that rivaled anything I've seen, even in full-screen mode. I downloaded xine-lib-0.9.8.tar.gz and xine-ui-0.9.8.tar.gz source code tar balls from the Xine project page on SourceForge. A perfectly behaved configure script -- I was impressed by the level of detail and information provided by the scripts -- started the normal install process of ./configure; make; make install. Per the README on the Web site, I installed xine... (more)