Welcome!

News Feed Item

Netlist's Amended Complaint Provides Details in ULLtraDIMM Litigation -- Sixty Trade Secrets Believed Stolen by Diablo

IRVINE, CA -- (Marketwired) -- 03/25/14 -- Netlist, Inc. (NASDAQ: NLST), a leading provider of high performance memory solutions for the cloud computing and storage markets, announced today that it has filed a Second Amended Complaint in the lawsuit against Diablo Technologies, Inc., related to the recently released ULLtraDIMM memory module. The complaint details Diablo's theft of Netlist's breakthrough HyperCloud® technology and its incorporation of the stolen trade secrets in the ULLtraDIMM product Diablo produced in partnership with Smart Storage Systems, Inc. This trade secret lawsuit and the related suit asserting infringement of seven Netlist patents against the ULLtraDIMM are pending before Judge Yvonne Gonzalez Rogers in the United States District Court for the Northern District of California in Oakland, California. In the complaint, Netlist seeks, among other things, an injunction against the ULLtraDIMM product, as well as damages, royalties and restitution for Diablo's misappropriation of Netlist's trade secrets.

As described in the complaint, Diablo exploited its position as a trusted vendor to steal Netlist's most valuable intellectual property and incorporate the stolen technology in the ULLtraDIMM. Netlist disclosed to Diablo in confidence, for the sole purpose of building products for Netlist, the core specifications for HyperCloud®, and spent significant engineering resources over several years teaching Diablo how to implement these technologies. The complaint details how Diablo stole these proprietary specifications and designs and used them to create its own products including the ULLtraDIMM. In the process, Diablo transformed itself from a contract design house to a "products company", leveraging this theft to build a reputation for new technology development that it does not deserve.

"Diablo's theft of Netlist's most valuable IP violates all norms of fair dealing between companies in our industry that play by the rules," said Netlist President and CEO, C.K. Hong. "We intend to bring Diablo's long course of unlawful conduct to light and to vigorously pursue every available remedy for its theft, including an injunction."

Netlist has also served an Amended Trade Secret Disclosure describing in detail approximately 60 technical trade secrets taught and disclosed by Netlist to Diablo, and, as described in the complaint, believed to reside in the ULLtraDIMM. Among these trade secrets are: (a) Netlist's LRD/DxD chipset architecture, including communication control architecture, control information extraction, write-leveling operations, and chipset pin definitions and operation modes; (b) Netlist's ASIC controller architecture, including multiplexing proprietary and standard operations, rank register controller, and access control architecture; (c) Netlist's isolation switch device architecture; and (d) novel features in Netlist's architecture for memory module self-test.

About Netlist:
Netlist, Inc. designs and manufactures high-performance, logic-based memory subsystems for server and storage applications for cloud computing. Netlist's flagship products include HyperCloud®, a patented memory technology that breaks traditional performance barriers, NVvault™ and EXPRESSvault™, the pioneering family of hybrid memory products utilizing both DRAM and NAND Flash that significantly accelerates system performance and provides mission critical fault tolerance, and a broad portfolio of industrial flash and specialty memory subsystems including VLP (very low profile) DIMMs and Planar-X RDIMMs. Netlist has steadily invested in and grown its IP portfolio, which now includes 43 issued patents and more than 30 US and foreign pending patent applications in the areas of high performance memory and hybrid memory technologies.

Netlist develops technology solutions for customer applications in which high-speed, high-capacity, small form factor and efficient heat dissipation are key requirements for system memory. These customers include OEMs that design and build tower, rack-mounted, and blade servers, storage hardware, high-performance computing clusters, engineering workstations and telecommunications equipment. Founded in 2000, Netlist is headquartered in Irvine, CA with manufacturing facilities in Suzhou, People's Republic of China. Learn more at www.netlist.com.

Safe Harbor Statement:
This news release contains forward-looking statements regarding future events and the future performance of Netlist. These forward-looking statements involve risks and uncertainties that could cause actual results to differ materially from those expected or projected. These risks and uncertainties include, but are not limited to, risks associated with the launch and commercial success of our products, programs and technologies; the success of product partnerships; continuing development, qualification and volume production of EXPRESSvault™, NVvault™, HyperCloud® and VLP Planar-X RDIMM; the timing and magnitude of the anticipated decrease in sales to our key customer; our ability to leverage our NVvault™ technology in a more diverse customer base; the rapidly-changing nature of technology; risks associated with intellectual property, including patent infringement litigation against us as well as the costs and unpredictability of litigation over infringement of our intellectual property and the possibility of our patents being reexamined by the United States Patent and Trademark office; volatility in the pricing of DRAM ICs and NAND; changes in and uncertainty of customer acceptance of, and demand for, our existing products and products under development, including uncertainty of and/or delays in product orders and product qualifications; delays in the Company's and its customers' product releases and development; introductions of new products by competitors; changes in end-user demand for technology solutions; the Company's ability to attract and retain skilled personnel; the Company's reliance on suppliers of critical components and vendors in the supply chain; fluctuations in the market price of critical components; evolving industry standards; and the political and regulatory environment in the People's Republic of China. Other risks and uncertainties are described in the Company's annual report on Form 10-K filed on March 29, 2013, and subsequent filings with the U.S. Securities and Exchange Commission made by the Company from time to time. Except as required by law, Netlist undertakes no obligation to publicly update or revise any forward-looking statements, whether as a result of new information, future events or otherwise.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Unless you don’t use the internet, don’t live in California, or haven’t been paying attention to the recent news… you should be aware that self-driving cars are on their way to becoming a reality. I have seen them – they are real. If you believe in the future reality of self-driving cars, then continue reading on. If you don’t believe in the future possibilities, then I am not sure what to do to convince you other than discuss the very real changes that will roll out with the consumer producti...
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
In his session at @ThingsExpo, Chris Klein, CEO and Co-founder of Rachio, will discuss next generation communities that are using IoT to create more sustainable, intelligent communities. One example is Sterling Ranch, a 10,000 home development that – with the help of Siemens – will integrate IoT technology into the community to provide residents with energy and water savings as well as intelligent security. Everything from stop lights to sprinkler systems to building infrastructures will run ef...
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, will shares the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
Struggling to keep up with increasing application demand? Learn how Platform as a Service (PaaS) can streamline application development processes and make resource management easy.
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...