Feeds

US trade body probes IBM patent grumble

Judge appointed

Secure remote control for conventional and virtual desktops

IBM's infringement complaint about some Asustek Computer products will be investigated by the US International Trade Commission (ITC).

The ITC said in a statement on Friday that the case would be referred to an administrative law judge who will hold a hearing to determine whether or not IBM's allegations could be upheld.

That decision will also be subject to review by the ITC commissioners.

Last month the computer giant complained to the ITC that Asustek products and components including motherboards, graphic cards, and notebook computers, had infringed three IBM-owned patents.

IBM has requested that a cease and desist order and an exclusion order be issued to its Tawain-based rival.

Asustek has denied the allegations. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Linux? Bah! Red Hat has its eye on the CLOUD – and it wants to own it
CEO says it will be 'undisputed leader' in enterprise cloud tech
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Hey, what's a STORAGE company doing working on Internet-of-Cars?
Boo - it's not a terabyte car, it's just predictive maintenance and that
Troll hunter Rackspace turns Rotatable's bizarro patent to stone
News of the Weird: Screen-rotating technology declared unpatentable
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.