This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Research In Motion Ltd. now faces threats on two fronts: The possibility that the BlackBerry service will be shut down in a patent dispute and a new wireless E-mail platform that could steal away BlackBerry users.
With Palm Inc.'s release of the much-anticipated Treo 700w smart phone at last week's Consumer Electronics Show, RIM's competition just got tougher. The Windows Mobile-based Treo has all the essentials a businessperson on the go might need, including Microsoft Office applications and E-mail access.
The next version of the Microsoft operating system will include "push" E-mail that lets the Treo receive messages without periodically synchronizing with a server. With another wireless E-mail option on the market, especially one that doesn't require additional middleware, businesses are starting to look beyond the BlackBerry.
RIM's legal battle with NTP Inc. over patent infringement also is causing corporate minds to consider switching. Nobody wants to be stuck with hundreds of BlackBerrys and no service should NTP prove that RIM violated its patents.
But that's far from certain. On Dec. 30, in the second of three rounds of re-examinations of NTP's patents, the U.S. Patent and Trademark Office rejected seven out of eight. It rejected claims for all eight NTP patents in the first round. In the third round, rulings for all eight patents will be final, according to the patent office. The date of that re-examination hasn't been disclosed. As for further maneuvers in court, all legal briefs from NTP, RIM, and the Justice Department are due Feb. 1.
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
The State of IT & Cybersecurity Operations 2020Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!