Feeds

Apple pulls back the iRon curtain to register iWatch trademark in Russia

Fruity firm may be Putin its new tech on Russian wrists

Internet Security Threat Report 2014

Apple has reportedly registered an iWatch trademark in Russia, providing the clearest indication yet that it will soon release a wearable computer disguised as a timepiece.

However, the fruity firm might be in a for a fight, because a wristwatch seller which runs a website called i-watch.ru has already registered the trademark in Russia. A court will need to repeal this trademark if Cupertinoski wants to claim it.

According to the newspaper Izvestia, Apple has applied for two trademarks for the device. The report said two claims have been filed with the Russian Federal Service for Intellectual Property (Rospatent) office. The applications were made under the categories of Class 9, which covers computers and peripherals, and Class 14, which includes watches.

Rumours that Apple is designing a new type of watch have been swirling for some months, but Cupertino's secrecy policy - which is the polar opposite of glasnost - means that nothing has been officially announced.

Fanbois starting ululating in joy after Corning, designers of the super tough Gorilla Glass, unveiled their new flexible Willow Glass, which could potentially be used to make an iWatch. When Apple then reportedly trademarked the name iWatch in Jamiaca, fanbois began boiling over with excitement.

The fruity firm often registers trademarks in the Caribbean, because records are not easily searchable online and the claims can later be used to bolster further applications in different countries.

It is not yet known what the point of an iWatch would actually be. Some fanbois have suggested it will monitor fitness or store music, while others suggest it could receive text messages or tweets.

A few clever people have even suggested it might tell the time, something that the BBC's website can no longer do following complaints about their clock's accuracy. ®

Beginner's guide to SSL certificates

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.