Feeds

US Supremes hammer final nail into Psystar coffin

The fat lady croons doom tune over hackintosher's corpse

High performance access to file storage

The long and sordid Psystar saga creaked to its anti-climactic close on Monday: the US Supreme Court has refused to hear the hackintosher's request to review an appeals court's September 2011 decision not to overturn a December 2009 permanent injunction preventing the Florida company from selling Mac OS X–based clones.

"We are sad," said Psystar attorney K.A.D. Camara in an emailed statement, Computerworld reports.

Channeling the vision of the great ballpark philosopher Lawrence Peter Berra, who famously said "It ain't over 'til it's over," Psystar left no legal stone unturned in its efforts to keep selling the Mac clones it first unveiled four years and one month ago.

But when the US Supremes say it's over, it is, indeed, quite decidedly over – and when Psystar Corp. v. Apple Inc. appeared with 282 other petitioners in the court's "Certiorari Denied" summary disposition this Monday, the clonemaker and T-shirt vendor ran out of options.

We won't recount all the details of Psystar Corp. v. Apple Inc. – those Reg readers who are new to the case or simply want to take a stroll down litigious memory lane can do so here. In a nutshell, however, Apple sued Psystar in July 2008 to stop the hackintosher from selling its "OpenMac" clones – which, by the way, were quickly redubbed "Open" and "OpenPro". The next month, Psystar announced that it would take legal action against Cupertino, alleging – among other things – that Apple's end-user licensing agreement was in violation of antitrust laws.

Psystar T-shirt advertisement

In late 2009, Psystar was reduced to selling T-shirts to help pay its legal bills

The past four years have seen a war of legal filings and court decisions, with Apple winning the big battles and Psystar managing to gain the upper hand in a only skirmish or two. Now, however, fans of David-and-Goliath legal soap operas will need to find another storyline to latch onto.

May we suggest the Chinese iPad-trademark dispute between Apple and Proview Technology? Although there were reports last week that a settlement was being discussed, and although a US court recently threw out Proview's claims that Apple's acquisition of the trademark was fraudulent, there may be plenty more months – years? – of legal meanderings in the offing.

Perhaps Proview might drop K.A.D. Camara an email. After all, he has one fewer case taking up his billable hours these days. ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.