Feeds

You're taking the p*ss, Europe tells Microsoft

Foot dragging, insolence and bloatware

The Power of One Infographic

Microsoft continues to flout its anti-trust order, the European Commission said on Friday in two strongly worded statements. The EC has again written to Redmond explaining where it's failing to comply with a 2004 decision by the competition office.

Further study of Microsoft's submissions - it's obliged to document its protocols and interfaces - revealed them to be "entirely inadequate". For good measure, the EC compared Microsoft's protocol documentation to bloatware, and implied that Microsoft hadn't read the decision it was legally obliged to obey.

The EC said Microsoft had fundamentally misunderstood the role of its monitoring trustee Neil Barrett. His role (and here the EC draws m'learned friends' attention to paragraph 1045 of the March 2004 decision) "should not only be reactive, but should play a proactive role in the monitoring of Microsoft’s compliance".

Microsoft had accused Barrett of colluding with competitors by meeting with them regularly. In fact, that's just his job.

Rather tartly, the EU also reminded Microsoft that Barrett had been proposed by … er, Microsoft.

The commission also quotes from an independent analysis of Microsoft's protocol documentation conducted by Taeus.

Taeus compared Microsoft's submissions to a car manufacturer selling a car without wheels, handbrake, or steering wheel, and only fitting each begrudgingly after the customer complains.

Microsoft hadn't changed the submission between 29 December 2005 and meetings on 30 and 31 January, despite being asked to do so.

Taeus concluded that what documentation Microsoft had provided was "devoted to obsolete functionality", "self-contradictory" and was written "primarily to maximize volume (page count) while minimizing useful information".

Ouch.

Microsoft's fighting hard to get its documentation obligations muted. As well as trying to get Barrett thrown off the case, Microsoft has published 200 or so pages of rebuttal based on analyses it's commissioned itself.

Microsoft's strategy is designed to ensure free/open source software can't interoperate with Windows, says the Free Software Foundation Europe. ®

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.