Feeds

MS hands out gongs to star programmers

PowerPup engineers mysteriously snubbed

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Microsoft has inaugurated a "Distinguished Engineers" programme and announced the first recipients. In a letter leaked to Dave Winer's Userland scripting website, Microsoft's Steve Ballmer says the first sixteen DEs are "visionaries... unparalleled and essential to our long-term success".

The gongs go to some familiar and well-respected names. Dave Cutler, ex-DECcie responsible for the design of Windows NT, heads the list, which also includes the great ex-IBM, Tandem, DEC survivor (and author of the TPC Benchmarks) Jim Gray, and ex-DEC and Xerox PARC veterans Chuck Thacker and Butler Lampson. Thacker now heads the Microsoft Research Lab in Cambridge, England.

They aren't the only ex-DECcies on the list. Others include Mark Lucovsky (NT design) and Wael Bahaa-El-Din (performance analysis).

Also honoured are Lou Perazzoli (NT design), Peter Spiro (SQL Server), Anders Hejlsberg (Visual J++, C#), Mohsen Al-Ghosein (middleware), Suryanarayanan Raman (apps and Internet), Brad Lovering (tools), Antoine Leblond (Office - and the man most culpable for letting the Power Pup slip through - thanks, Antoine), Michael Toutonghi (.NET) and software Veep Darryl Rubin.

Microsoft veteran Charles "lpfnChuck" Simonyi gets one too. Simonyi has spent the last ten years out of harm's way, working on Intentional Programming (as opposed to Unintentional Programming? - ed), but is still notorious for devising Hungarian Notation, a Byzantine variable naming convention christened in his honour

Register Footnote: We were intrigued that Michael Toutonghi's biog includes a reference to OmniView, whcih is described as a "multi-tasking environment". Once we'd composed ourselves after learning that that Microsoft actually has a multi-tasking environment, we set about trying to recall what OmniView was. We know that Microsoft made efforts to make its Windows 1.0 and 2.0 .PIF-compatible with TopView, the clunking DOS task-switcher IBM touted, then abandoned in the mid-80s. But between that and the task-switcher in DOS 5.0 which crept out in 1991, we can only draw a blank. Do any Register readers ever recall seeing OmniView? Come on, Michael. Don't be coy now... (Hint: This wasn't a Microsoft product, but whose was it? And what happened to it? - Ed) ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.