Feeds

EU may be lubricating IBM anti-trust probe

Mainframe scuffle primed, yet muffled

Beginner's guide to SSL certificates

European Union regulators may be preparing for an anti-trust review of IBM, following on the complaints of start-up mainframe challenger, Platform Solutions (PSI).

Bloomberg reports today that the EU is gathering information on IBM's mainframe business, citing two anonymous sources close to the case. The request for such data could mark the earliest stages of an official review into the mainframe claims.

Platform Solutions, which makes Itanium-based servers capable of running IBM's mainframe software, has lobbed similar anti-trust complaints against Big Blue stateside as well. The firm argues that IBM is trying to kill mainframe market competition by refusing to support customers running its software on PSI's systems.

PSI filed its complaint with the European Commission last October. It claims IBM violates an EC prohibition on abuse of market dominance by refusing to supply interface information about its mainframe computers, as well as refusing mainframe licenses to third parties.

IBM has also filed a lawsuit back at PSI in America, charging it with patent infringement.

An inquiry into IBM's mainframe business could suggest the EU determined there's at least some possible merit to PSI's antitrust complaint.

EU antitrust regulators aren't obligated to pursue the cases brought before them. The Commission's next step will be deciding whether to launch a formal probe into the matter. ®

Update:

"The case is progressing in both Europe and in the U.S," said IBM spokesman Fred McNeese ... "IBM has spent great time and expense developing its technology and will defend its intellectual property rights vigorously. We also are confident that the Commission will protect IBM's property rights and reject PSI's claims. It is no violation of competition laws for IBM to rightfully seek to prevent PSI from selling a product built through the violation of IBM's intellectual property rights."

We're awaiting official comments from PSI.

Remote control for virtualized desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.