C. IBM Steals the Code.
55. Rather than innovating itself, IBM sought access to the Code.
D. IBM Secretly Copies the Code into its Own Server Operating Systems.
The stolen Code has been copied without permission into at least six different updates of AIX (AIX 5L 5.0, 5.1, 5.2, v.6.1, v.7.1, and v.7.2). For example, an IBM report well after termination of Project Monterey confirmed that the Xinuos “code is now embedded within AIX.” The stolen Code has also been copied without permission into an AIX environment that runs within the z/OS mainframe operating system (called “Unix System Services”). And the stolen Code has been copied without permission into an AIX environment that runs within the i midrange operating system (called “PASE”).
Az általa vélelmezett lopás részleteit a felperes hosszasan sorolja a periratban.