Feeds

ITC investigates claims against Apple

Touchscreen patent row

Choosing a cloud hosting partner with confidence

The US trade watchdog confirmed this week that it would investigate patent infringement allegations made by Elan Microelectronics against Apple last month.

The US International Trade Commission (ITC) said in a statement that it had voted to probe "certain electronic devices with multi-touch enabled touchpads and touchscreens," following Elan's complaint.

"The products at issue in this investigation are electronic devices such as mobile telephones and computers that have multi-touch user interfaces,” said the ITC.

Elan, a Taiwanese chip designer which sued the iPhone maker in 2009, stepped up its actions against Apple last month when it asked the ITC for an injunction barring imports of the iPod Touch, iPhone and iPad.

The case will be assigned to one of the regulator's six administrative law judges, said the ITC. The complaint, filed with the US trade watchdog on 29 March this year, alleges violations of section 337 of the Tariff Act of 1930.

At this stage the ITC pointed out it had "not yet made any decision on the merits of the case," but Elan will nonetheless be pleased that an investigation has now begun. ®

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.