Feeds

MS-backed trade group backs MS with trial brief

All getting a little circular, we reckon...

  • alert
  • submit to reddit

High performance access to file storage

MS on Trial The Washington-based Association for Competitive Technology (ACT), an industry lobbying group, has confirmed that it will be filing the amicus curiae (friend of court) brief on Microsoft's behalf this week. Judge Jackson is also expecting a similar brief on the DoJ's behalf. ACT most definitely swings the Microsoft way. When Judge Jackson's finding of fact was issued, ACT president Jonathan Zucker loudly denied that a monopoly was possible in the IT industry. Its Web site doesn't list its total membership, but the "Just a few proud members" section identifies Visio (relation), Symantec (defence witness), Sheridan Software, Sax Software, Microsoft (double relation), Elsinore Technologies, ComponentSource and Clarity Consulting. An impressive roster. Not. If we did cheap shots round here we'd point out that the ACT's current star in the "member showcase" is the IRA, Information Resource Associates, but we don't, so we won't. For the brief the ACT has retained Lloyd Cutler, a one-time special counsel to Presidents Carter and Clinton. Cutler represented US West in the so-called battle of Portland case concerning cable Internet access. Jonathan Zuck says that he has raised the money to pay for the brief from high-tech company contributions; one can always speculate about who in the disclosed membership has the most spare cash, but Zuck claims the money came from other members. So Symantec? Microsoft has also lined up support from a mixture of Democrat and Republican lawyers, including Boyden Gray who was counsel to President Bush; Griffin Bell, who was attorney general during President Carter's administration; and Nicholas Katzenbach, who was President Johnson's attorney general and who worked side-by-side with DoJ lead counsel David Boies in the IBM antitrust case. The next stage in the trial will be the filing by Microsoft tomorrow of its revised brief - essentially its legal defence - followed by a day in court on 22 February for final arguments. Bill Gates commented in Davos that "There's a good mediation process going on in Chicago," but he wouldn't comment any further. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.