Feeds

Ericsson polices CeBIT bootleggers

Pirates in a Messe

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Ericsson has slapped at least ten vendors with legal action for exhibiting pirate products at this year's CeBIT. The Swedish company said it has "a handful" of spies policing the halls at the Hanover Messe, searching for companies using its name on phone accessories. It has so far handed out at least 30 cease and desist letters to companies using the Ericsson brand in copied products - including on mobile phone batteries, front panels and cases. These vendors have to report to a German court within days of receiving the letters, where they will be ordered to halt production or fined. As a result of Ericsson's vigilance, three injunctions have been issued to stop exhibitors at CeBIT 2000 showing and selling Ericsson-branded kit. Bo Albertson, MD of information and events at Ericsson Mobile Communications, refused to reveal the names of the companies involved. "This is our third year of walking around CeBIT, and it has been very successful. The number of companies exhibiting counterfeit products has declined." CeBIT is not the only show where Ericsson patrols stands hunting for counterfeiters. But according to Albertson: "We are more organised at CeBIT." ® Related stories Software pirates still at large in UK Microsoft piracy buster trashes software and reputation

Remote control for virtualized desktops

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.