Feeds

A year ago: FTC won't give up on Intel

Arrogant dragon may have cause to repent

  • alert
  • submit to reddit

Top 10 endpoint backup mistakes

It just seems merely one week ago that we received a cock-a-hoop email from Santa Clara telling us (incorrectly) that the Federal Trade Commission (FTC) had given it a clean bill of health. This was to do with the famous Chips & Technologies acquisition which had been a mouldering in some federal office waiting for the go-ahead which it now seems to have... Rivals to Intel had complained that the chip giant wanted everything including the kitchen sink if that made money. And now we spot that just a couple of days after Intel's favourite government agency has given it the green light, it is quite possibly up to its tricks again. Intel has bought a 20 per cent stake in Lockheed Martin's company Real 3D and co-incidentally, that company is helping to develop Intel's famous i740 graphics chip (passim). But all is not necessarily hunky-dory as far as the US FTC is concerned, The Register is given to understand. In fact, there is still considerable head-scratching about the Intel-Digital deal last year, so famously misreported by every man and his chihuahua. And we are also given to understand that a close perusal of Intel's yearly results shows that when its famous senior VP stood up at the end of last year and said his company was going be tres aggressif about the networking market too, the Great Stan was not joking. According to our friends at Infoworld, Lockheed Martin will allow Intel to have a non-voting observer present at its board meetings. This reminds us that when Microsoft had a 19 per cent stake in SCO some years ago, it also had a non-voting member of the board but he was made to go out for a walk during critical discussions about the future of operating systems. And look what's happened to SCO... * Register HairStyleTip 213. Heads I win, tails you lose is a useful phrase which describes a one-sided relationship -- possibly a little like having your hair shorn by a stylist who wants to trim the back of your neck with a cutthroat razor.

A new approach to endpoint data protection

More from The Register

next story
Amazon says Hachette should lower ebook prices, pay authors more
Oh yeah ... and a 30% cut for Amazon to seal the deal
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Nintend-OH NO! Sorry, Mario – your profits are in another castle
Red-hatted mascot, red-colored logo, red-stained finance books
Sonos AXES support for Apple's iOS4 and 5
Want to use your iThing? You can't - it's too old
Joe Average isn't worth $10 a year to Mark Zuckerberg
The Social Network deflates the PC resurgence with mobile-only usage prediction
Chips are down at Broadcom: Thousands of workers laid off
Cellphone baseband device biz shuttered
Feel free to BONK on the TUBE, says Transport for London
Plus: Almost NOBODY uses pay-by-bonk on buses - Visa
Twitch rich as Google flicks $1bn hitch switch, claims snitch
Gameplay streaming biz and search king refuse to deny fresh gobble rumors
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?