Friday, 11 January 2008 02:17

Intel target of New York antitrust probe

By
New York state attorney general Andrew Cuomo has launched an antitrust investigation of Intel to determine whether the company illegally coerced its customers to exclude AMD from their x86 purchasing.

"Our investigation is focused on determining whether Intel has improperly used monopoly power to exclude competitors or stifle innovation," said Cuomo. "We will also look at whether Intel abused its power to remove competitive threats or harm competition in violation of New York and federal antitrust laws."

Both Intel and AMD have been subpoenaed by the attorney general's office in an apparent attempt to unearth information about practices such as penalising customers who also purchased competing chips, making improper payments in return for exclusive use of Intel CPUs, and illegally cutting off competitors from distribution channels.

"Businesses and consumers everywhere should have the ability to easily choose the best products at the best price and only fair competition can guarantee it," said Cuomo.

According to the attorney general's office, Intel holds 90 percent of the $US30 billion annual market for x86 chips.

Intel also faces antitrust charges from the European Commission.

WEBINAR event: IT Alerting Best Practices 27 MAY 2PM AEST

LogicMonitor, the cloud-based IT infrastructure monitoring and intelligence platform, is hosting an online event at 2PM on May 27th aimed at educating IT administrators, managers and leaders about IT and network alerts.

This free webinar will share best practices for setting network alerts, negating alert fatigue, optimising an alerting strategy and proactive monitoring.

The event will start at 2pm AEST. Topics will include:

- Setting alert routing and thresholds

- Avoiding alert and email overload

- Learning from missed alerts

- Managing downtime effectively

The webinar will run for approximately one hour. Recordings will be made available to anyone who registers but cannot make the live event.

REGISTER HERE!

LAYER 1 ENCRYPTION A KEY TO CYBER-SECURITY SOLUTION

Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.

DOWNLOAD!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

VENDOR NEWS & WEBINARS

REVIEWS

Recent Comments