Feeds

With Microsoft's quantum licensing, many parallel universes are possible

All at once

  • alert
  • submit to reddit

Build a business case: developing custom apps

The Beast of Redmond could yet confound attempts to scrutinize its monopoly with an escape strategy of fiendish cunning. It's so cunning, in fact, that no regulator will be able to keep track.

The following discrepancies in very recent Microsoft intellectual property disclaimers have come to our attention.

Exhibit One: an advisory RFC entitled Utilizing the Windows 2000 Authorization Data in Kerberos Tickets for Access Control to Resources", submitted by Microsoft's IETF point man, John Brezak.

The opening paragraph reads:-

"This document is an Internet-Draft and is subject to all provisions of Section 10 of RFC2026 [1] except that the right to create derivative works is not granted."

Now examine Exhibit Two: "HTTP Authentication: SPNEGO Access Authentication As implemented in Microsoft Windows 2000.

It's also an RFC advisory, and another submission on the same technical area. You'll note that the boilerplate text is subtly different: there's no clause prohibiting "derivative works". So far, so interesting, but bear with us gentle readers.

Exhibit Three is Exhibit One, only hosted at the Microsoft web site. With one important difference: there's no clause banning "derivative works".

In other words, the same Microsoft license has appeared at two ends of the universe simultaneously, give or take a few important particles. But which one is correct?

That's a question that has interested physicists for sixty years, and the answer, of course, is that they both are.

Only by slipping through a wormhole in the space-time continuum are we able to see both licenses at once. Quantum theory had this all pretty much mapped out, we're pleased to report. Although how the regulators will deal with this startling new development, we can't say. They'll need parallel regulatory agencies to police each universe that Microsoft inhabits. Or something like that.

Either way, we think it's a first. Skeptics who sneer that there's no innovation going on up in Redmond can eat their hats. ®

5 things you didn’t know about cloud backup

More from The Register

next story
PEAK LANDFILL: Why tablet gloom is good news for Windows users
Sinofsky's hybrid strategy looks dafter than ever
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Fiendishly complex password app extension ships for iOS 8
Just slip it in, won't hurt a bit, 1Password makers urge devs
Mozilla keeps its Beard, hopes anti-gay marriage troubles are now over
Plenty on new CEO's todo list – starting with Firefox's slipping grasp
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
Another day, another Firefox: Version 31 is upon us ALREADY
Web devs, Mozilla really wants you to like this one
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Cloudy CoreOS Linux distro declares itself production-ready
Lightweight, container-happy Linux gets first Stable release
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?