Feeds

Apple wins attack of the clones

Sees off Psystar

Security for virtualized datacentres

Apple has won its long legal battle against clone Mac maker Psystar.

Psystar came to the attention of Apple's many lawyers in July 2008 a few months after it started selling a $400 box capable of running Apple's OSX.

Apple claimed infringement of copyright, trademarks and of its licensing agreements while Psystar claimed fair use rights.

Judge William Alsup's court of Northern California ruled in Apple's favour on all counts. Psystar is now likely to face claims for damages from Steve Jobs. Psystar is attempting a parallel defence in Florida, where the firm is based.

The court heard that Psystar installed a copy of Mac OSX onto a Mac mini. It removed the bootload and removed and replaced certain kernel extensions so the software would run on non-Mac hardware.

There are some issues around trademarks, breach of contract and unfair competition still to be sorted out.

The court will reconvene 14 December. Groklaw, as ever, has the details and a copy of the actual judgement.

Back in the olden days Apple used to support a variety of clone makers offering non-Apple hardware which could run Apple software but the plug was pulled when Jobs returned to the company in the late 90s. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.