Feeds

Intel: jobs for life – or else

Stop looking at those job ads and get on with your work

  • alert
  • submit to reddit

High performance access to file storage

Chipzilla's litigious nature will again be on public display this week as its suit against Broadcom reaches the Californian courts. Intel is accusing set top box specialist Broadcom of poaching key staff and using secret knowledge in the development of new STB silicon. The case was filed on March 8 in Santa Clara County Superior Court and was seen as an attempt by chip behemoth Intel to keep three former employees from taking similar jobs at relative minnow Broadcom – in which Intel was once an investor. But in an amended complaint filed on April 28, Intel is now accusing Broadcom of actively misappropriating trade secrets and placing Intel's former employees in positions where there will be an "inevitable disclosure'' of Intel's intellectual property. This increased legal activity would seem to indicate that Chipzilla now regards the smaller company as a genuine competitor. California has very relaxed labour laws that have traditionally given employees freedom to move from job to job even if their job contracts threaten them with boils and plagues of frogs should they go to the competition. But if Intel proves that employees should be prevented from moving to competing firms, that freedom could soon be at an end. "In a sense Intel is trying to make an example of these employees," said Broadcom president and CEO Henry Nicholas. "This whole suit, I believe, is the result of some middle managers at Intel who were disgruntled over the fact that they lost some of their brightest stars." Intel further maintains that an engineer who has subsequently left the company, but has not joined Broadcom, gave Broadcom a highly detailed and confidential diagram of a networking chip design that Intel plans to introduce - a diagram that Broadcom never informed Intel it had seen. Broadcom is also alleged to have received email from an Intel employee outlining Intel's confidential processor road map and that Broadcom again failed to inform Intel that it had received confidential information.

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.