Feeds

Top MS exec charged over in-vehicle firearm innovation

Drive-by game shooting? Grief, Joachim...

  • alert
  • submit to reddit

High performance access to file storage

It's Christmas in Seattle, and the good folks of Washington State are engaging in traditional festive activities. Like blazing away at wildlife from the comfort of your own four wheel drive, apparently. Hello Microsoft OEM chief, star of subpoenaed emails and antitrust trials Joachim Kempin. Also now, it would seem, a noted gunslinger who is helping local Redmond police with their enquiries.

In Texas we believe good old boys grab a six pack, a flatbed truck and quantities of hardware and blaze away at road signs as they go by. In Redmond even the software guys have hardware, and shoot at... Well, we're not sure about this, yet. A story involving somebody called Kempin was published on MSNBC (relation) on 17th December. It now seems to have gone away, but it's left a trace at the MSNBC database here, which is the most recent MSNBC story covering somebody called Kempin.

The search result summary tantalisingly reveals "MS exec cited for hunting from car." Some other Kempin who works for Microsoft, perchance? We think not: "December 17 - A top Microsoft executive who figured prominently in the government's antitrust case against the software company has been charged with..." And there our summary ends.

What was the lad shooting at (allegedly)? Was the car moving? Is it usual for MSNBC to expire stories so quickly? What does Joachim keep in his pockets when negotiating with hardware OEMs, and had they been under the impression he was just pleased to see them? We expect we'll find out the answers to most of these very soon, but if nothing turns up in the mail, we'll take a turn through the local press a little later to check up on deletion skills.

Microsoft executives are of course no strangers to vehicles, police departments and mysterious deletions. Is it not the Albuquerque police department which has a mugshot of a youthful Bill Gates, who was noted at the time as something of a hot rod? But is it not also the Albuquerque police department which has a mysterious lack of any record as to how it might have come by the snap? ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.