Imaging vendor Eastman Kodak said Monday that it has formed a license agreement with NEC that will allow each company to access the other's patent portfolio. Imaging vendor Eastman Kodak said Monday that it has formed a license agreement with NEC that will allow each company to access the other’s patent portfolio.“We are pleased to have reached a mutually beneficial arrangement that advances the interests of Kodak and of NEC,” Laura G. Quatela , vice president and chief intellectual property officer at Kodak, in a statement.The deal “provides significant benefits to both companies” and will generate royalties for Kodak. No further financial details were provided.A Kodak spokesman declined to comment beyond the press release. An NEC spokeswoman did not immediately respond to a request for comment. NEC is well-known for its networking, server and storage offerings, but also sells monitors, projectors and digital cinema products, which may be the focus of the new patent agreement with Kodak.Chris Kanaracus covers enterprise software and general technology breaking news for The IDG News Service. Chris’s e-mail address is Chris_Kanaracus@idg.com Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe