Feeds

EU stalls Googorola anti-competition probe

Rivals invited to have their say first

Intelligent flash storage arrays

The EU has temporarily suspended its probe into Google's planned buyout of Motorola Mobility because it wants more information, including comments from Google's competitors.

The antitrust authority has been reviewing Google's merger with Motorola Mobility for breaches of European competition law. The EU Competition Commission announced today that it has halted the review because its wanted to see "certain documents essential to the evaluation of the case", according to EU spokesperson Amelia Torres.

The notification published in Eur-Lex, the European Law journal, states that that information would include the observations of "interested third parties":

The Commission invites interested third parties to submit their possible observations on the proposed operation to the Commission.

Google told Bloomberg that it still believes that their deal will go through: “We’re confident the commission will conclude that this acquisition is good for competition, and we’ll be working closely and cooperatively with them as they continue their review.” ®

Choosing a cloud hosting partner with confidence

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.