Feeds

Apple ups the ante in Psystar battle

Attack on the Cloners

Security for virtualized datacentres

Apple has filed to dismiss with prejudice clone-maker Psystar's monopoly complaints.

The two have been trading legal blows since July when Apple accused the company of infringing on its trademarks and copyrights. Hackintosh vendor Psystar offers machines capable of running OS X from as little as $555.

Psystar responded in August by filing Sherman Antitrust Act complaints against Apple, accusing it of restricting its ability to trade and illegally monopolising a market. It wants to force Apple to license its software to rival hardware makers.

Apple used to support several clone makers, but Steve Jobs ditched them when he returned to the firm in 1997.

In papers filed with the northern district court of California, Apple asks the court to dismiss Psystar's claims.

The document says: "Ignoring fundamental principles of antitrust law, and the realities of the marketplace, Psystar contends that Apple has unlawfully monopolized an alleged market that consists of only one product, the Macintosh computer."

The full motion is available via ZDNet here (PDF).

Apple rejects the claim that Mac products represent a market in legal terms - instead Macs compete with PCs from various different manufacturers, and therefore cannot be considered a monopoly.

The dismissal case will be heard 6 November in San Francisco. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.