Feeds

SCO, Groklaw and the Monterey mystery that never was

Bullets for SCO?

  • alert
  • submit to reddit

The essential guide to IT transformation

Analysis Over the past two years, the influential web site Groklaw has become a focal point for open source advocates discussing The SCO Group's litigation against Linux companies. The community of knowledgeable experts has helped with clarifying contract technicalities, dug through news archives, and filed on-the-spot reports from the Utah the courtroom, much to SCO's discomfort.

But over the past month the site's maintainer Pamela Jones has run a series of articles which could offer SCO some elusive ammunition to discredit the site. [We now understand this series, after some input from your reporter, has been amended.]

Given the internet's well documented "echo chamber" tendencies, what we'll call the Monterey Mystery is now cementing into an orthodoxy. From a Google search for "Project Monterey" the top six results are either the Groklaw articles, or articles about them.

At least five articles published this month suggest that Project Monterey, the joint Unix that was being co-developed by IBM, the Santa Cruz Operation and Sequent beginning in 1998 was only a "stop-gap" measure. The participants, she asserts, had from the start bet that Linux would supplant their proprietary Unix offerings. And more damningly, she claims that SCO knew this at the time, and has declined to reveal this secret strategy.

"Project Monterey was the stopgap, in a way, I gather. It worked for the enterprise right away, and it was a path to smoothly move to Linux as it matured," wrote Jones.

There is a serious problem with this hypothesis: it isn't true.

(Your reporter bases this conclusion on first hand experience with representatives from IBM, SCO, Compaq and Sequent which included attending four of the week-long SCO Forum events between 1998 and 2001 - reports from which have been cited in the litigation, and widely quoted at Groklaw itself).

Let's examine the Groklaw conjectures, their merit, and see how much damage they could do to the open source defense against SCO, which until now has been both exhaustive and exacting. But first, some history.

5 things you didn’t know about cloud backup

Next page: Unix before Linux

More from The Register

next story
BBC: We're going to slip CODING into kids' TV
Pureed-carrot-in-ice cream C++ surprise
China: You, Microsoft. Office-Windows 'compatibility'. You have 20 days to explain
Told to cough up more details as antitrust probe goes deeper
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.