Feeds

The Beast whinges

Sniff...

  • alert
  • submit to reddit

High performance access to file storage

MS on Trial When Judge Thomas Penfield Jackson returned from lunch on Wednesday, he blew Microsoft's mind. The Beast had been busy arguing that it needed a good six months more to mount a proper, lingering defence.

"This case has been pending for two years," a florid Jackson shot back. Then he ordered the US Department of Justice (DoJ) to run up a plan to break the beast into three pieces, separating operating system, applications, and Internet concerns including browser, portal and ISP. He said he wanted it fast, by the end of the week, and gave the company a mere 48 hours to reply.

The most important company in human history had been denied due process, Microsoft lawyers cried.

It was a sunny afternoon in Washington as the flacks gathered on the courthouse steps, eager to spin the day's events.

"It was incumbent upon us to inform the court, and the record, that there was a good deal of evidence that we thought was pertinent to the subject of appropriate relief, and to make that a part of the record," Microsoft General Counsel and silver-tongued-devil William Neukom sniffed at a press conference outside the courthouse.

The vultures circled with delight. "Not only will the world not end if there is a break-up of Microsoft, but it will be a much better world for the industry, for consumers and for innovation," Computer and Communications Industry Association spokesman Ed Black commented.

The CCIA assisted in drafting the brief of Amici Curiae which originally suggested to Judge Jackson the undeniable charm of a three-way break-up.

DoJ lawyer David Boies said the Department would have the requested paperwork in Jackson's hands by Friday. He seemed not at all distressed, suggesting that the DoJ might just have seen fit to get such a document ready in draft form, set to go after a bit of buffing. He would not confirm that such a document exists, but we have our suspicions.

One can only hope that the other side condescended to read the enemy Amicus brief, and that it saw fit to anticipate it with a bit of legalistic boilerplate which they can now buff up and submit. Otherwise, the lights are going to be on very late in Redmond. Very late indeed. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.