Feeds

How MS destabilised Netscape and Marimba

Witness Eric Engstrom defends the DimensionX purchase

  • alert
  • submit to reddit

New hybrid storage solutions

MS on Trial During his evidence at the Microsoft trial, Eric Engstrom had some excuses ready about Microsoft's acquisition of DimensionX in 1997, which he engineered. He had wanted support from various people in Microsoft for the acquisition "so I put some statements in there that, you know, I was not fully briefed on, nor do I necessarily completely understand, but that represented the opinion of other people whose consensus I wanted in order to go through with the acquisition". There were however some more sinister reasons. The draft email advocating the acquisition to Gates and Maritz noted that DimensionX was about to be acquired by Javasoft. One of the statements that Engstrom referred to was that "Netscape is planning a large announce around this strategy [the key authoring tool for Marimba] and partners in the next few weeks. We could achieve a big tactical win here by removing their key tool." It was a clear case of a strategic acquisition that had an anti-competitive motivation. Engstrom defended this by claiming that Carl Jacobs, the CEO of Liquid Motion (acquired with DimensionX), had told him that the company was not working with Netscape. The Liquid Motion runtime was in many ways the equivalent of some multimedia controls that Microsoft was trying to develop. Engstrom had also written that "'derailing' what Netscape wanted would be a "HUGE HUGE thing". Brad Silverberg had asked Engstrom how the acquisition would take away the authoring tool from Marimba, so Engstrom (who confessed during his evidence that he did not understand what he was talking about) emailed Silverberg: "The authoring tool only works on the DimensionX runtime. It wouldn't be hard at all to make it (a) require our browser; (b) require DirectX runtime; (c) some other option to make Marimba's life difficult." This was not a good statement for a company accused of monopolisation to be seen to be making. Microsoft was considering a technical tie, so that users had to have IE in order to author with the tool. This was the same kind of "deep integration" that Microsoft had used with Windows and IE, and Malone's cross-examination exposed the motivation very well. ® Complete Register trial coverage

The next step in data security

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.