Feeds

A year ago: Microsoft spells it out to the judge

All very DoJy indeed

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

Last Friday, Microsoft attorney Richard Urowsky neatly summed-up the company's case for the DoJ action hearing in Columbia district court, and from what he said it's now crystal clear where the battle-lines lie. Microsoft contends that the rider it had added to the 1995 consent decree allowing it to integrate features into the operating system gives it carte blanche to build Internet Explorer into Windows 98, and to require that OEMs bundle it. But the logical conclusion to this line of reasoning was pursued by Judge Thomas Penfield Jackson, who asked if that meant that Microsoft applications could be integrated as well. Urowsky first responded that this wouldn't be economical, but when pressed further conceded that technically it could be done, and that it was possible that some parts of the apps could move into the OS. The judge has now retreated to his tent to consider his opinion, but he might do well to consider the extent to which pieces of Microsoft apps are already integrated in the OS, and take a look at the 'innovate, improve, incorporate' overheads Microsoft was showing its customers until quite recently. These make a virtue of the way Microsoft introduces features as applets and utilities, then builds them into the OS, or across the whole Windows 'platform.' Urowsky also tried to head-off Judge Jackson's interest in the US antitrust Sherman Act, pointing out that the consent decree didn't have anything to do with Sherman, so Sherman does not apply in the current case. That's probably correct (although the judge seemed unconvinced), but if Microsoft's case is sustained, then it seems likely that further antitrust action will be pursued by the DoJ. ®

Combat fraud and increase customer satisfaction

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.