Feeds

FTC lets Intel off the hook

Sixty days, they've been and gone...

  • alert
  • submit to reddit

High performance access to file storage

dum, dum dum dum dum

The US Federal Trade Commission (FTC) quietly let Intel depart its records last Friday after a 60-day public consultation period expired. But the decision means that Intel's affairs will still come under scrutiny, if necessary. The commissioners voted to approve the consent order 3:1, with Orson Swindle the sole dissenter in the case of Docket 9228. However, the consent decree is now binding on Intel, meaning Chipzilla has to be nice and not prevent its customers from having access to technology that might damage their businesses. Swindle said: "I am unable to vote in favor of the consent order because I continue to lack reason to believe that Intel's actions against Digital, Intergraph, and Compaq would have adversely affected competition and innovation in the ways charged in the complaint. "Accordingly, because I still lack reason to believe that Intel's alleged conduct constituted a violation of Section 5 of the Federal Trade Commission Act, I dissent." Get that right. Swindle dissented because he thought there was no case against Intel in the first place. The other three commissioners said they voted for the consent order because they continue to believe "...that Intel, which the majority has reason to believe is a monopolist, engaged in 'conduct, other than competition on the merits or restraints reasonably 'necessary' to competition on the merits, that reasonably appear[s] capable of making a significant contribution to creating or maintaining monopoly power.' Barry Wright Corp. v. ITT Grinnell Corp., 724 F.2d 227, 230 (1st Cir. 1983) (Breyer, J.) (quoting III P. Areeda & D. Turner, Antitrust Law 626 at 83 (1978)). Nothing in the public comments submitted to the Commission leads us to depart from our initial judgment. "Second, requiring 'demonstrable' harm to competition after pretrial settlement has no legal basis because it has no practical basis. Settlement of the case necessarily prevents us from making any final judgment about the actual evidence of harm to competition from Intel's conduct." So the feds are still watching Mighty Chipzilla. ®

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Ex–Apple CEO John Sculley: Ousting Steve Jobs 'was a mistake'
Twenty-nine years later, post-Pepsi exec has flat-forehead moment
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.