Feeds

Grand Theft Auto creator prevails in strip-club clash

Virtual venue doesn't infringe real one's trademark

Security for virtualized datacentres

A US court has dismissed claims made by the owner of a Los Angeles exotic dance venue that a virtual gentlemen’s club in Grand Theft Auto is based on his trademarked joint.

playpen_01

GTA: San Andreas doesn't infringe on the Play Pen's (above) trademark

Judge Diarmuid O'Scannlain ruled that because GTA: San Andreas is a parody of East Los Angeles, where the real-life Play Pen strip club is based, the only way that the game’s designers could realistically simulate the area was by recreating versions of the businesses and buildings in that area.

playpen_03

The Pig Pen in GTA: San Andreas (left) and the Play Pen in Los Angeles

He also said that there was no reasonable evidence to suggest that gamers would confuse the game’s Pig Pen strip club with the Play Pen.

We’d have thought the Play Pen would have been happy to feature in GTA: San Andreas. Some firms pay serious amounts of money to get their wares plugged in games.

We’ve stitched together images of the real-life Play Pen club and the virtual GTA version, so you can decide for yourself if the two sport any similar features.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.