Bedrock Computer Technologies, LLC v. Softlayer Technologies, Inc. et al

Filing 842

Opposed MOTION for Attorney Fees Yahoo!'s Motion to Declare this an Exceptional Case and for Attorneys' Fees and Costs Pursuant to 35 USC Sec. 285 by Yahoo! Inc.. (Attachments: #1 Affidavit B. James Decl., #2 Exhibit 1, #3 Exhibit 2, #4 Exhibit 3, #5 Exhibit 4, #6 Exhibit 5, #7 Exhibit 6, #8 Exhibit 7, #9 Exhibit 8, #10 Exhibit 9, #11 Exhibit 10, #12 Exhibit 11, #13 Exhibit 12, #14 Exhibit 13, #15 Exhibit 14, #16 Exhibit 15, #17 Exhibit 16, #18 Exhibit 17, #19 Exhibit 18, #20 Exhibit 19, #21 Exhibit 20, #22 Exhibit 21, #23 Exhibit 22, #24 Exhibit 23, #25 Exhibit 24, #26 Exhibit 25)(Chaikovsky, Yar) (Additional attachment(s) added on 6/7/2011: #27 Text of Proposed Order) (mll, ).

Download PDF
EXHIBIT 22 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS TYLER DIVISION BEDROCK COMPUTER TECHNOLOGIES LLC, Plaintiff, v. SOFTLAYER TECHNOLOGIES, INC., et al. Defendants. § § § § § § § § § § § CASE NO. 6:09-cv-269-LED Jury Trial Demanded PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) TO: Defendant Yahoo! Inc., by and through its attorney of record, Yar R. Chaikovsky, MCDERMOTT WILL & EMERY LLP, 275 Middlefield Road, Suite 100, Menlo Park, California 94025. Pursuant to Federal Rules of Civil Procedure 33, Plaintiff Bedrock Computer Technologies LLC (“Plaintiff” or “Bedrock”) provides the following objections and responses to Yahoo! Inc.’s (“Yahoo”) Third Set of Interrogatories (Nos. 4-7). PRELIMINARY STATEMENT 1. Bedrock incorporates by reference each and every general objection set forth below into each specific response. The failure to include any general objection in any specific response shall not be interpreted as a waiver of any general objection to that response. 2. By responding to Yahoo’s interrogatories, Bedrock does not waive any objection that may be applicable to: (a) the use, for any purpose, by Yahoo of any information or PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 1 documents given in response to Yahoo’s interrogatories; or (b) the admissibility, relevance, or materiality of any of the information or documents to any issue in this case. 3. No incidental or implied admissions are intended by the responses herein. The fact that Bedrock has answered or objected to any interrogatory should not be taken as an admission that Bedrock accepts or admits the existence of any “fact” set forth or assumed by such interrogatory. 4. Bedrock’s responses to Yahoo’s interrogatories are made to the best of Bedrock’s present knowledge, information, and belief. Bedrock reserves the right to supplement and amend these responses should future investigation indicate that such supplementation or amendment is necessary. Bedrock reserves the right to make any use of, or introduce at any hearing or trial, information or documents that are responsive to Yahoo’s interrogatories, but discovered subsequent to Bedrock’s service of these responses, including, but not limited to, any information or documents obtained in discovery herein. GENERAL OBJECTIONS 1. Bedrock objects to each interrogatory to the extent that it seeks information already in Yahoo’s possession, a matter of public record or otherwise equally available to any Defendant. 2. Bedrock objects to each interrogatory to the extent that it seeks the identification of “all,” “every,” “any,” and “each” entity, person, or document that refers to a particular subject. Bedrock will comply with the Federal Rules and the Local Rules and will use reasonable diligence to identify responsive persons or documents. 3. Bedrock’s responses herein, and its disclosure of information pursuant to these responses, do not in any way constitute an adoption of Yahoo’s purported definitions of words PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 2 and/or phrases contained in Yahoo’s interrogatories. Bedrock objects to these definitions to the extent that they: (a) are unclear, vague, overly broad, or unduly burdensome; (b) are inconsistent with the ordinary and customary meaning of the words or phrases they purport to define; (c) include assertions of purported fact that are inaccurate or at the very least disputed by the parties to this action; and/or (d) incorporate other purported definitions that suffer from such defects. 4. Bedrock objects to each and every interrogatory to the extent that it purports, through Yahoo’s definitions, instructions to the extent that they are inconsistent with, or not authorized by, the Federal Rules of Civil Procedure, the Local Rules of the Eastern District of Texas, or the Court’s Patent Rules and discovery orders. 5. Bedrock objects to the extent that the interrogatories call for information protected by the attorney-client privilege, the attorney work product doctrine or any other applicable doctrine, privilege or immunity. Any disclosure of privileged information is inadvertent and should be deemed to have no legal effect or consequence, and Bedrock does not waive any privilege upon such inadvertent disclosure. 6. Bedrock objects to each and every interrogatory to the extent that it seeks information that is cumulative or duplicative of information, disclosures, or discovery already provided by Bedrock. 7. Bedrock objects to the inclusion of “Bedrock’s affiliates, parents, divisions, joint ventures, assigns, predecessors and successors in interest” and “former employees, counsel, agents, consultants, representatives, and any other person acting on behalf of the foregoing” in the definitions of “Bedrock,” “you,” “your,” and “plaintiff” to the extent that the interrogatories using these definitions are requesting information that is not in the possession, custody, or PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 3 control of Bedrock or seeking information that is protected by a doctrine, privilege, or immunity from discovery. 8. Bedrock objects to Yahoo’s definitions of “reflect,” “reflecting,” “refers to,” relating to,” “referring to,” “identify,” “identity,” “identity,” and “identity,” on the grounds that they are vague, ambiguous, overly broad, and as used in the interrogatories, make the interrogatories unduly burdensome. 9. Bedrock objects to the Definitions of “identify,” and related terms and “relates to,” and related terms to the extent that they purport to require Bedrock to take action or to provide information not required by, or which exceeds the scope of, the Federal Rules of Civil Procedure. 10. Bedrock objects to the extent that the interrogatories seek information of third parties with whom Bedrock may have entered into non-disclosure or confidentiality agreements or other agreements having privacy, confidentiality, or non-disclosure provisions, which prohibit the disclosure by Bedrock of the third party’s information. 11. Bedrock objects to providing responses to each interrogatory where the requested information may be derived or ascertained from documents that have been or are being produced. 12. Bedrock objects to each and every interrogatory to the extent that it seeks information that is properly the subject of expert testimony in advance of the Federal Rules of Civil Procedure, the Local Rules of the Eastern District of Texas, the Court’s Patent Rules and discovery orders, or the parties’ discovery stipulations. PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 4 13. Bedrock objects to the extent the interrogatories seek information that is not relevant to any claim or defense in this case, is not reasonably calculated to lead to the discovery of admissible evidence, or is otherwise not discoverable under Fed. R. Civ. P. 26(a). 14. Bedrock notifies the Defendants that it will object to interrogatories containing multiple subparts that together exceed the total number of interrogatories that the Defendants are allowed to propound pursuant to an order of the Court or the Federal Rules of Civil Procedure. For purposes of this objection, Bedrock will count interrogatory subparts as part of one interrogatory for the purpose of numerically limiting interrogatories to the extent that such subparts are logically or factually subsumed within and necessarily related to the primary question. To the extent any subsequent question can stand alone or is independent of the first question, such subsequent question is a discrete interrogatory. Accordingly, Bedrock will count discrete or separate questions as separate interrogatories, notwithstanding they are joined by a conjunctive word and may be related. Bedrock will endeavor, however, to treat genuine subparts as subparts and will not count such genuine subparts as separate interrogatories. For purposes of this objection, a subpart inquiring on the same topic as the interrogatory therefore will not itself qualify as a separately counted interrogatory, but when the interrogatory subpart introduces a new topic that is in a distinct field of inquiry, the subpart then assumes separate interrogatory status for the purpose of counting. See Orion IP, LLC v. Staples, Inc., et al., No. 2:04-CV-297, at *1 (E.D. Tex July 7, 2005) (Dkt. No. 171). PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 5 OBJECTIONS AND RESPONSES TO SPECIFIC INTERROGATORIES INTERROGATORY NO. 4: For each claim of the ’120 Patent, describe all investigations made by or on behalf of Bedrock, Richard Nemes, Mikhail Lotvin, or David Garrod prior to filing of the Complaint regarding whether any claim of the ’120 Patent is infringed by Yahoo! product or service, including identifying the persons involved in the investigations, the persons to whom reports were made, the persons involved in the approval of the filing of the Complaint, the date of the investigation, the Yahoo! products and services that were the subject of the investigation, the public information considered in the investigation, any other items or information considered in the investigation, when and where such information and items were obtained, the conclusions reached in the investigations, all documents referring to or describing such investigations, and the date on which Bedrock, Richard Nemes, Mikhail Lotvin, or David Garrod first became aware that any of Yahoo!’s accused products or services might infringe the ’120 Patent. ANSWER: In addition to the general objections, Bedrock specifically objects to this interrogatory to the extent that it seeks the production, identification, or disclosure of information protected by the attorney-client privilege, work product doctrine, or any other applicable privilege or doctrine. Bedrock further objects that the information to the extent that it seeks the disclosure of information that is properly the subject of expert testimony; such information will be disclosed consistent with the Court’s Docket Control Order and the deadline for burden expert reports. Subject to the foregoing specific and general objections, Bedrock responds as follows. Bedrock became aware of the infringement of software based on the publicly available Linux PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 6 kernel through inspection of the publicly available Linux kernel prior to filing suit. As such, Bedrock incorporates by reference its infringement contentions that it served on Google on October 9, 2009. Bedrock became aware that Yahoo operates software based on the publicly available Linux kernel through the website http://www.tribbleagency.com/?m=200811. INTERROGATORY NO. 5: For each asserted claim of the ’120 Patent, explain the basis for any contention by Bedrock that the claim, if implemented, prevents or in any way hinders a denial of service attack against servers implementing the claim, the specific claim element(s) allegedly preventing or hindering such an attack, and including any evidence which forms the basis for any such contention. Your answer should include the witnesses upon which Bedrock relies to support this contention, their anticipated testimony, and the specific portions of the documents or other information upon which the witnesses or Bedrock relies. ANSWER: In addition to the general objections, Bedrock specifically objects to this interrogatory to the extent that it seeks the production, identification, or disclosure of information protected by the attorney-client privilege, work product doctrine, or any other applicable privilege or doctrine. Bedrock further objects that the information to the extent that it seeks the disclosure of information that is properly the subject of expert testimony; such information will be disclosed consistent with the Court’s Docket Control Order and the deadline for burden expert reports. Subject to the foregoing general and specific objections, Bedrock responds as follows. All claims of the ’120 Patent require the identification and removal of expired records when a linked list is accessed by a record searching routine. See ’120 Patent at claims 1-8. “This incremental garbage collection technique has the decided advantage of automatically eliminating PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 7 unneeded records without requiring that the information system be taken off-line for such garbage collection.” See ’120::2:64-67. In a system that does not implement the on-the-fly garbage collection techniques claimed in the ’120 Patent, expired records “will, in time, seriously degrade the performance of the retrieval system.” See ’120::5:41-52. “Degradation shows up in two ways. First, the presence of expired records lengthens search times since they cause the external chains to be longer than they otherwise would be. Second, expired records occupy dynamically allocated memory storage that could be returned to the system memory for useful allocation.” See id. A denial of service attacker could exploit these disclosed weaknesses of a system not implementing the claims of the ’120 Patent. In fact, the very weaknesses described in the ’120 Patent were identified as weaknesses in pre-infringing versions of Linux. Specifically, on-the-fly garbage collection was added to the routine rt_intern_hash of the Linux routing cache code in the summer of 2003 to solve a serious performance problem of the Linux routing cache when under heavy load. Bedrock hereby incorporates by reference its infringement contentions. The goal of the change was to cut down on the frequency and duration of conventional garbage collections in the Linux routing cache. Under heavy TCP/IP loads, users were seeing the Linux boxes performing poorly and dropping TCP/IP packets. The problem was traced back to the routing cache garbage collector keeping the routing cache locked for long periods of time when there is heavy TCP/IP traffic. The routing cache performance problem is memorialized in a Linux-net email list of Linux users and Linux network stack developers. The message thread was entitled “Route cache performance under stress.” For example, a user named “CIT/Paul” described the problem as follows: PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 8 Try forwarding packets generated by juno-z.101f.c and it adds EVERY packet to the route cache.. Every one. And at 30,000 pps It destroys the cache because every single packet coming in is NOT in the route cache because it's random ips. Nothing you can do About that except make the cache and everthing related to it wicked faster, OR remove the per packet additions to the cache. See BTEX0748686-88 (http://marc.info/?l=linux-net&m=105513656320859&w=2). The on-the-fly garbage collection solution to the routing cache performance problems was first proposed by David Miller of Red Hat in a number of email messages on the same message thread: Here is a simple idea, make the routing cache miss case steal an entry sitting at the end of the hash chain this new one will map to. It only steals entries which have not been recently used. See BTEX0748689 (http://marc.info/?l=linux-net&m=105513880722053&w=2). My main current quick idea is to make rt_intern_hash() attempt to flush out entries in the same hash chain instead of allocating new entries. See BTEX0748690 (http://marc.info/?l=linux-net&m=105514015222804&w=2). We have to walk the entire destination hash chain _ANYWAYS_ to verify that a matching entry has not been put into the cache while we were procuring the new one. During this walk we can also choose a candidate rtcache entry to free. See BTEX0748691-92 (http://marc.info/?l=linux-net&m=105514201423926&w=2). The problem is that GC cannot currently keep up with DoS like traffic pattern. As a result, routing latency is not smooth at all, you get spikes because each GC run goes for up to an entire jiffie because it has so much work to do. Meanwhile, during this expensive GC processing, packet processing is frozen on UP system. See BTEX0748693-94 (http://marc.info/?l=linux-net&m=105514238324129&w=2). In this way, the Linux community in 2003 identified that the standalone garbage collection routine in Linux was the essentially taking servers off-line, just as described by Dr. Nemes in the ’120 Patent in 1999. PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 9 On-the-fly garbage collection was first added to rt_intern_hash in Linux kernel version 2.5.72 in June 2003 by David Miller and Alexey Kuznetsov, another Linux networking developer. The changes became a permanent part of the Linux kernel going forward. The original message thread on the Linux routing cache was begun in the April 2003 when a security researcher by the name of Florian Weimer first identified another serious performance problem in the Linux routing cache related to how the routing cache code was doing hashing. Mr. Weimer described this problem: Please read the following paper: <http://www.cs.rice.edu/~scrosby/tr/HashAttack.pdf> Then look at the 2.4 route cache implementation. Short summary: It is possible to freeze machines with 1 GB of RAM and more with a stream of 400 packets per second with carefully chosen source addresses. Not good. See BTEX0748695-96 (http://marc.info/?l=linux-kernel&m=104956079213417&w=2). This type of denial of service attack, which is called an algorithmic complexity attack, works by intentionally lengthening a linked list. In this way, the Linux community identified in 2003 that the lengthening of a linked list, as described by Dr. Nemes in the ’120 Patent in 1999, causes serious system performance degradation. On-the-fly garbage removal is a solution to this type of denial of service attack as well, but Linux developers, even when faced with this problem, did not come up with on-the-fly garbage collection as the solution. INTERROGATORY NO. 6: For each Accused Instrumentality identified in Bedrock’s Infringement Contentions, describe in detail the basis for any contention by Bedrock that the module/net/ipv4/route.c prevents or in any way hinders a denial of service attack against servers implementing this module, including any evidence which forms the basis for any such contention. Your answer should include the witnesses upon which Bedrock relies to support this contention, their PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 10 anticipated testimony, and the specific portions of the documents or other information upon which the witnesses or Bedrock relies. ANSWER: In addition to the general objections, Bedrock specifically objects to this interrogatory to the extent that it seeks the production, identification, or disclosure of information protected by the attorney-client privilege, work product doctrine, or any other applicable privilege or doctrine. Bedrock further objects that the information to the extent that it seeks the disclosure of information that is properly the subject of expert testimony; such information will be disclosed consistent with the Court’s Docket Control Order and the deadline for burden expert reports. Subject to the foregoing general and specific objections, Bedrock responds as follows. All claims of the ’120 Patent require the identification and removal of expired records when a linked list is accessed by a record searching routine. See ’120 Patent at claims 1-8. “This incremental garbage collection technique has the decided advantage of automatically eliminating unneeded records without requiring that the information system be taken off-line for such garbage collection.” See ’120::2:64-67. In a system that does not implement the on-the-fly garbage collection techniques claimed in the ’120 Patent, expired records “will, in time, seriously degrade the performance of the retrieval system.” See ’120::5:41-52. “Degradation shows up in two ways. First, the presence of expired records lengthens search times since they cause the external chains to be longer than they otherwise would be. Second, expired records occupy dynamically allocated memory storage that could be returned to the system memory for useful allocation.” See id. A denial of service attacker could exploit these disclosed weaknesses of a system not implementing the claims of the ’120 Patent. In fact, the very weaknesses described in the ’120 PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 11 patent were identified as weaknesses in pre-infringing versions of Linux. Specifically, on-the-fly garbage collection was added to the routine rt_intern_hash of the Linux routing cache code in the summer of 2003 to solve a serious performance problem of the Linux routing cache when under heavy load. Bedrock hereby incorporates by reference its infringement contentions. The goal of the change was to cut down on the frequency and duration of conventional garbage collections in the Linux routing cache. Under heavy TCP/IP loads, users were seeing the Linux boxes performing poorly and dropping TCP/IP packets. The problem was traced back to the routing cache garbage collector keeping the routing cache locked for long periods of time when there is heavy TCP/IP traffic. The routing cache performance problem is memorialized in a Linux-net email list of Linux users and Linux network stack developers. The message thread was entitled “Route cache performance under stress.” For example, a user named “CIT/Paul” described the problem as follows: Try forwarding packets generated by juno-z.101f.c and it adds EVERY packet to the route cache.. Every one. And at 30,000 pps It destroys the cache because every single packet coming in is NOT in the route cache because it's random ips. Nothing you can do About that except make the cache and everthing related to it wicked faster, OR remove the per packet additions to the cache. See BTEX0748686-88 (http://marc.info/?l=linux-net&m=105513656320859&w=2). The on-the-fly garbage collection solution to the routing cache performance problems was first proposed by David Miller of Red Hat in a number of email messages on the same message thread: Here is a simple idea, make the routing cache miss case steal an entry sitting at the end of the hash chain this new one will map to. It only steals entries which have not been recently used. See BTEX0748689 (http://marc.info/?l=linux-net&m=105513880722053&w=2). PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 12 My main current quick idea is to make rt_intern_hash() attempt to flush out entries in the same hash chain instead of allocating new entries. See BTEX0748690 (http://marc.info/?l=linux-net&m=105514015222804&w=2). We have to walk the entire destination hash chain _ANYWAYS_ to verify that a matching entry has not been put into the cache while we were procuring the new one. During this walk we can also choose a candidate rtcache entry to free. See BTEX0748691-92 (http://marc.info/?l=linux-net&m=105514201423926&w=2). The problem is that GC cannot currently keep up with DoS like traffic pattern. As a result, routing latency is not smooth at all, you get spikes because each GC run goes for up to an entire jiffie because it has so much work to do. Meanwhile, during this expensive GC processing, packet processing is frozen on UP system. See BTEX0748693-94 (http://marc.info/?l=linux-net&m=105514238324129&w=2). In this way, the Linux community in 2003 identified that the standalone garbage collection routine in Linux was the essentially taking servers off-line, just as described by Dr. Nemes in the ’120 Patent in 1999. On-the-fly garbage collection was first added to rt_intern_hash in Linux kernel version 2.5.72 in June 2003 by David Miller and Alexey Kuznetsov, another Linux networking developer. The changes became a permanent part of the Linux kernel going forward. The original message thread on the Linux routing cache was begun in the April 2003 when a security researcher by the name of Florian Weimer first identified another serious performance problem in the Linux routing cache related to how the routing cache code was doing hashing. Mr. Weimer described this problem: Please read the following paper: <http://www.cs.rice.edu/~scrosby/tr/HashAttack.pdf> Then look at the 2.4 route cache implementation. PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 13 Short summary: It is possible to freeze machines with 1 GB of RAM and more with a stream of 400 packets per second with carefully chosen source addresses. Not good. See BTEX0748695-96 (http://marc.info/?l=linux-kernel&m=104956079213417&w=2). This type of denial of service attack, which is called an algorithmic complexity attack, works by intentionally lengthening a linked list. In this way, the Linux community identified in 2003 that the lengthening of a linked list, as described by Dr. Nemes in the ’120 Patent in 1999, causes serious system performance degradation. On-the-fly garbage removal is a solution to this type of denial of service attack as well, but Linux developers, even when faced with this problem, did not come up with on-the-fly garbage collection as the solution. INTERROGATORY NO. 7: For each Accused Instrumentality identified in Bedrock’s Infringement Contentions describe in detail the basis for any contention by Bedrock that module /net/ipv5/route.c and the code identified by Bedrock in its Infringement Contentions and/or its response to Yahoo!’s Interrogatory No. 3 as infringing the ’120 patent [sic] are the basis for customer demand for such Accused Instrumentality, including any evidence which forms the basis for any such contention. Your answer should include the witnesses upon which Bedrock relies to support this contention, their anticipated testimony, and the specific portions of the documents or other information upon which the witnesses or Bedrock relies. ANSWER: In addition to the general objections, Bedrock specifically objects to this interrogatory to the extent that it seeks the production, identification, or disclosure of information protected by the attorney-client privilege, work product doctrine, or any other applicable privilege or doctrine. Bedrock further objects to this interrogatory to the extent that it seeks the disclosure of information that is properly the subject of expert testimony; such information will be disclosed PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 14 consistent with the Court’s Docket Control Order and the deadline for burden expert reports. Furthermore, the discovery in this case is on-going. Bedrock’s efforts to discover all facts related to this interrogatory have been hindered by the Defendants’ refusal to respond to Bedrock’s discovery requests. In fact, Bedrock has been required to move the Court for the discovery due to the Defendants continued failures to respond. Subject to the foregoing general and specific objections, Bedrock responds as follows: The internet has become a powerful and paradigm-changing tool for the United States and World economies. Businesses have become dependant on fast, reliable, always on services provided by websites. The Defendants, and their customers, rely upon infringing versions of Linux to provide the fast, reliable, and always-on services. Denial of service attacks directly challenge a company’s ability to provide these fast, reliable, and always on services to their customers. A final determination as to whether the entire market value rule applies in this case will be made by Bedrock’s expert. However, the Federal Circuit has made it clear that, even if the entire market value rule is not appropriate, “the base used in a running royalty calculation can always be the value of the entire commercial embodiment so long as the rate is within an acceptable range (as determined by the evidence).” Lucent Technologies, Inc. v. Gateway Inc., 580 F.3d 1301 at 1338-39 (Fed. Cir. 2009)(emphasis added). Bedrock is still investigating this issue and reserves the right to supplement. By way of example, but in no way limited to the documents specifically identified herein, Bedrock has produced relevant, responsive documents, from which a response to this interrogatory may be derived or ascertained, including the following: BTEX0748697-699 BTEX0748700-730 BTEX0748731-750 BTEX0748751-52 PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 15 Date: September 2, 2010. Respectfully submitted, /s/ Jason D. Cassady Sam F. Baxter Texas Bar No. 01938000 McKOOL SMITH, P.C. Email: sbaxter@mckoolsmith.com 104 E. Houston Street, Suite 300 Marshall, Texas 75670 Telephone: (903) 923-9000 Facsimile: (903) 923-9099 Douglas A. Cawley, Lead Attorney Texas Bar No. 04035500 Email: dcawley@mckoolsmith.com Theodore Stevenson, III Texas Bar No. 19196650 Email: tstevenson@mckoolsmith.com Jason D. Cassady Texas State Bar No. 24045625 Email: jcassady@mckoolsmith.com J. Austin Curry Texas Bar No. 24059636 Email: acurry@mckoolsmith.com McKOOL SMITH, P.C. 300 Crescent Court, Suite 1500 Dallas, Texas 75201 Telephone: 214-978-4000 Facsimile: 214-978-4044 Robert M. Parker Texas Bar No. 15498000 E-mail: rmparker@pbatyler.com Robert Christopher Bunt Texas Bar No. 00787165 E-mail: rcbunt@pbatyler.com PARKER, BUNT & AINSWORTH, P.C. 100 E. Ferguson, Suite 1114 Tyler, Texas 75702 Telephone: 903-531-3535 Facsimile: 903-533-9687 ATTORNEYS FOR PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 16 CERTIFICATE OF SERVICE The undersigned certifies that a true and correct copy of the foregoing document was served on counsel of record via email on September 2, 2010. /s/ Jason D. Cassady Jason D. Cassady PLAINTIFF BEDROCK COMPUTER TECHNOLOGIES LLC’S OBJECTIONS AND RESPONSES TO YAHOO! INC.’S THIRD SET OF INTERROGATORIES (NOS. 4-7) Dallas 307264v2 PAGE 17

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?