Feeds

Hackintosh maker lands Apple punch

Judge approves Psystar for more fight

5 things you didn’t know about cloud backup

In its on-going legal battle with Apple, upstart clonemaker Psystar has won its first victory in many a month.

It was a minor victory, to be sure: a US District Court judge has allowed Psystar to continue copyright - but not monopoly - arguments in its countersuit against Apple.

But hope springs eternal for the Doral, Florida clonemaker.

It's been a tough seven months for Psystar. Last July, Apple filed a complaint in US District Court, accusing the company of "copyright infringement, induced copyright infringement, breach of contract, trademark infringement, trade dress infringement, and unfair competition."

Apple told the Hacintosh maker: "Stop installing our operating system on computers you sell, stop making people who buy your stuff criminals for using it, and stop using the term Mac OS X and its good-looking logo to sell your products."

In the seven months since Apple filed the suit, Psystar has had little to celebrate. In August, the company countersued, wielding the big stick of the Sherman Antitrust Act and Clayton Antitrust Act and claiming that Apple was indulging in "restraint of trade" by tying its operating system to its hardware.

Psystar Open computer with Mac OS X

If Psystar wins, $554.99 will buy you an ugly-but-serviceable Hackintosh

Of course, Apple didn't agree. In late September, the company filed a motion to dismiss Psystar's countersuit, claiming that the cloner was "ignoring fundamental principles of antitrust law, and the realities of the marketplace."

The big blow came in November, when the US District Court Judge handling the case, William Alsup, agreed with Apple and dismissed Psystar's countersuit. In sum, Alsup said that Psystar's claims that Apple was a monopoly were baseless since Apple is not alone in the personal computing business - there are plenty of other competitors, both of hardware and operating systems.

How accurate was Alsup about a thriving world of operating-system competitors? We'll let Linux fans chew on that.

Alsup did give Psystar one final shred of hope, however, by allowing the company to provide a counter-argument by early December, which he would respond to in early 2009.

However, less that a week before Psystar's counter-argument deadline, Apple muscled-up their original complaint by adding the allegation that Psystar was in violation of the Digital Millenium Copyright Act (DCMA). This amendment asserted that Psystar had hacked Apple's copyrighted software-protection schemes.

And that's when things started to get odd.

The essential guide to IT transformation

Next page: The John Does

More from The Register

next story
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
Chumps stump up $1 MEELLLION for watch that doesn't exist
By the way, I have a really nice bridge you might like...
HUGE iPAD? Maybe. HUGE ADVERTS? That's for SURE
Noo! Hand not big enough! Don't look at meee!
AMD unveils 'single purpose' graphics card for PC gamers and NO ONE else
Chip maker claims the Radeon R9 285 is 'best in its class'
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.