Feeds

Microsoft honours Linux programmer with patent gong

You can't make this stuff up

  • alert
  • submit to reddit

SANS - Survey on application security programs

In what must be one of the most surreal stories we've ever covered, Microsoft has awarded a Linux devotee with one of the company's most coveted patents awards -even though the recipient has never worked for Microsoft.

The story begins with work done by Intrinsa software developer Bill Softky on the Valley start-up's much-lauded software analysis tools. These let developers find bugs in software that might otherwise appear only through traditional regression testing.

Intrinsa created a virtual environment for a program in the build process, plotting multiple execution paths that could uncover memory conflicts and other errors without manual intervention. And the software was lauded by Cisco (a major customer) and Sun Microsystems in its brief life as a commercial product.

Softky himself devised a way of presenting this information to the user, and his patent is under consideration by the US Patent Office: one of several filed by Intrinsa. However Intrinsa was subsequently bought by Microsoft, with most of the development team moving to Redmond. But not Bill.

Now, Microsoft duly honours its patent-holders with an award, and the patent in this case fell into its lap with the purchase of Intrinsa. As ever, true to its word, Microsoft obliged by dispatching the gong - an inscribed cube to Softky.

"Thanks for your inventive contribution to Microsoft..." reads the inscription. The irony isn't lost on Softky, who runs Linux at home and has does his development work on the free software OS.

"To me, they're the Evil Empire. They're the Borg!" says Softky, who refused to be assimilated, and now works for a digital imaging company in the Valley.

But, we wondered, wasn't it a little ungrateful to keep an award given to him by a company he loathes? Shouldn't he do a John Lennon, and return the gong?

"It's kind of a badge of honour", he told us. "And anyway, I've got a much too perverse a sense of humour to give anything like this back!"

But he may have unintentionally gotten his revenge already. The much-reported 63,000 'bugs' in Windows 2000, which leaked out to spoil the launch of the product, were unearthed in large part through the Intrinsa software that he helped write.

Bill regrets that the Intrinsa software has, since its acquisition, been used by Microsoft internally only, and has yet to be incorporated into Visual Studio. Or Intrinsia.NET, or whatever Redmond calls it these days... ®

3 Big data security analytics techniques

More from The Register

next story
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.