Feeds

Apple pries iPad moniker from Fujitsu

But again: What about the bra?

Choosing a cloud hosting partner with confidence

A week and a day before Apple's "magical and revolutionary" iPad is scheduled to be released, Apple has finally acquired the rights to its name.

As The Reg reported, shortly after Steve Jobs unveiled the iPad to the world on January 27, Fujitsu piped up to let Jobs know that he was using someone else's property. "It's our understanding that the name is ours," said Fujitsu PR director Masahiro Yamane.

We can only guess the extent of back-room cajoling, bargaining, arm-twisting and carrot-and-sticking that has gone on since then, but on Friday patentauthority.com reported that Fujitsu has now legally transferred ownership of the iPad trademark to Apple.

No word yet, however, on Apple's negotiations with the makers of all those other iPads in the wild: a credit-card swiper, Korean defibrillator, pre-fab home, proposed residential tower, commercial-kitchen Bump Bar Unit, Internet Personal Access Device, operating system, memo-taking iPhone app, and cleavage-enhancing technology from a Canadian bra company.

Perhaps that latter company might partner with Apple for some speciality items - after all, Cupertino still sells iPod Socks. ®

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.