Feeds

Apple swipes Visual Voicemail from Citrix

Class action with Cisco?

Remote control for virtualized desktops

Exclusive Apple appears unable to "think different" on the cell phone front. First the computer maker nicked the iPhone name for the actual device from Cisco, and now we find it's grabbed an application name from poor old Citrix.

Earlier this week, Apple bragged about teaming with Cingular on its Visual Voicemail software that runs on the iPhone. The voicemail application displays caller information and allows users to pick the order in which messages are played back instead of forcing you to hear messages in a sequential order.

Such features won't impress Citrix, which has been selling Visual Voicemail software since it acquired Net6 in 2004. [Thanks, Jason.]

"Visual Voicemail enables Call Pilot voicemail users to have a visual indication of the number of voice mail messages in the mailbox, the senders of these voice mail messages, the time of the voice mail message, and the length of the voice mails," Citrix notes on its website. "Visual Voicemail enables users to take a quick glance at their list of voice mail messages to check for important ones - without having to listen to all their messages."

Citrix happens to have a deal in place that allows customers to use Visual Voicemail on Cisco's IP phones. Cisco recently put such gear under its iPhone brand, making use of an old trademark.

Citrix has yet to respond to our calls seeking comment about its feelings on the Visual Voicemail matter. We were unable to locate a trademark for the brand.

Cisco was less ambiguous, announcing a trademark infringement lawsuit yesterday against Apple.

Earlier this week, Apple CEO Steve Jobs bragged about the more than 200 patents backing up the iPhone.

"Just as the Macintosh was a breakthrough in 1984 for its mouse, and the iPod in 2001 for its click wheel, the iPhone's stroke of genius is this new 'multi-touch' technology," he said, according to The Economist. “And boy have we patented it."

Tough talk for an IP bully.®

Internet Security Threat Report 2014

More from The Register

next story
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
YOU are the threat: True confessions of real-life sysadmins
Who will save the systems from the men and women who save the systems from you?
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.