Feeds

Reg staffer on ‘one-man-war’ against Microsoft

Bill Gates and our Graham don't get along, apparently

  • alert
  • submit to reddit

Intelligent flash storage arrays

From: McGuire, Jon
Subject: Graham Lea
Date: Wed, 10 May 2000 06:37:51

More and more I find that I'm disappointed that Mr. Lea's e-mail address is not made available. I find most of his reporting to be so misled and biased it isn't even humorous. His MS Java article (dated today) is just the latest example of his misguided one-man-war to reinvent the history of Microsoft. Did Gates sleep with his wife or something? There has to be something serious behind this.

The recent Java-lawsuit article is typical. In his wrap-up, Mr. Lea draws the most wild, far-fetched conclusions possible. In this case, he ties a mysteriously-cited increase in Java's respectworthiness to the Love Bug virus causing some kind of loss-of-face for the Outlook e-mail client. Either I'm missing some kind of extremely obscure connection, or Mr. Lea is once again throwing out well-known names in the hopes of confusing the less well-informed into assuming Microsoft weakenesses and failings where none exist. (To keep it simple, and to keep this message under one-page in length, we'll mostly ignore the fact that the only place Java has had any success is on the server, an environment to which it is least well-suited.)

Furthermore, as long as I'm on the subject and have your attention, the Love Bug virus really had nothing to do with "security holes in Outlook". Outlook just launched an application, period. These days many applications launch other apps in response to a user command. Have you ever double-clicked a file inside a ZIP archive? Guess what? It will launch the appropriate application. Security hole or convenience feature? Apparently it depends on which company you wish made your operating system.

If somebody saved the VBScript attachment from a Eudora client, then launched the script, would that be a security hole in Eudora? I didn't think so. What if it wasn't a VBScript file at all, but a plain old DOS batch file? Or a UNIX CMD file? Is it still an Outlook problem?

And to swerve back to the point, can anybody explain to me what the hell any of this has to do with Java? Apparently Mr. Lea sees a connection. The press has turned Microsoft's success into the current surreal landscape of persecution, speculation, and rhetoric. You guys need to get a grip. And publish Mr. Lea's e-mail address while you're at it.

J

Mail reproduced in full and un-edited. Email address supplied.

Want your say? Visit The Register's forum and toss your orb in public. ®

Intelligent flash storage arrays

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.