Feeds

Reg staffer on ‘one-man-war’ against Microsoft

Bill Gates and our Graham don't get along, apparently

  • alert
  • submit to reddit

Gartner critical capabilities for enterprise endpoint backup

From: McGuire, Jon
Subject: Graham Lea
Date: Wed, 10 May 2000 06:37:51

More and more I find that I'm disappointed that Mr. Lea's e-mail address is not made available. I find most of his reporting to be so misled and biased it isn't even humorous. His MS Java article (dated today) is just the latest example of his misguided one-man-war to reinvent the history of Microsoft. Did Gates sleep with his wife or something? There has to be something serious behind this.

The recent Java-lawsuit article is typical. In his wrap-up, Mr. Lea draws the most wild, far-fetched conclusions possible. In this case, he ties a mysteriously-cited increase in Java's respectworthiness to the Love Bug virus causing some kind of loss-of-face for the Outlook e-mail client. Either I'm missing some kind of extremely obscure connection, or Mr. Lea is once again throwing out well-known names in the hopes of confusing the less well-informed into assuming Microsoft weakenesses and failings where none exist. (To keep it simple, and to keep this message under one-page in length, we'll mostly ignore the fact that the only place Java has had any success is on the server, an environment to which it is least well-suited.)

Furthermore, as long as I'm on the subject and have your attention, the Love Bug virus really had nothing to do with "security holes in Outlook". Outlook just launched an application, period. These days many applications launch other apps in response to a user command. Have you ever double-clicked a file inside a ZIP archive? Guess what? It will launch the appropriate application. Security hole or convenience feature? Apparently it depends on which company you wish made your operating system.

If somebody saved the VBScript attachment from a Eudora client, then launched the script, would that be a security hole in Eudora? I didn't think so. What if it wasn't a VBScript file at all, but a plain old DOS batch file? Or a UNIX CMD file? Is it still an Outlook problem?

And to swerve back to the point, can anybody explain to me what the hell any of this has to do with Java? Apparently Mr. Lea sees a connection. The press has turned Microsoft's success into the current surreal landscape of persecution, speculation, and rhetoric. You guys need to get a grip. And publish Mr. Lea's e-mail address while you're at it.

J

Mail reproduced in full and un-edited. Email address supplied.

Want your say? Visit The Register's forum and toss your orb in public. ®

5 things you didn’t know about cloud backup

More from The Register

next story
MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
'Prettier, better organised, more harmonious than if men were in charge'
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.