Feeds

'Microsoft was caught stealing secrets from Borland'

Reader, I was there

Providing a secure and efficient Helpdesk

Way, way back in 1992 I was at that conference in Palm Springs. One evening, purely by chance, I happened to meet a very amiable guy called Bill Marklyn. It turned out that he worked for Microsoft. He didn't, at that point, look like a spy. He didn't have a large magnifying glass, nor a miniature camera; at least, as far as I could see. But then, those miniature cameras are, by definition, easy to conceal so perhaps he had it hidden under the large black cloak he was using to conceal his face. (No. Let's not start another myth. That was a joke; he was not wearing a black cloak).

Bill and I happened to get along well together; in fact it turned out to be the start of a long friendship, we still write books together. But we didn't know that at the time. So we chatted about databases and database engines from about 7:00PM until about 1:00AM the next morning. (Look, we were far from home, at a database conference. What do you expect us to do? Get drunk and argue about baseball?) During the evening we met up with two other guys from Microsoft: Tod Nielsen and Adam Bosworth. Adam had worked for Borland in the past developing Reflex; an excellent flat-file database system; and guess who was appointed as CEO and president of Borland in November 2005? None other than Tod Nielson...

During the day Borland announced that the labs would be open late to allow all the conference delegates the opportunity to try out the software. Early in the evening the labs had been packed with delegates, so we tried again later on in the evening. Most of the conference delegates were, by that stage, getting drunk and arguing about baseball so the room was empty. We tried out the software which was, most certainly not secret stuff; this was in a completely open area.

Despite all of that, after a couple of minutes Adam said something like "I'm a little uncomfortable sitting here as a Microsoft employee with no-one watching us. What if someone thinks we are trying to steal the software?"

He really did say that. I'm sorry if it sounds unlikely but he did. The rest of us laughed and I said I'd watch them. But he insisted on going out and finding someone. He returned with a couple of Borland developers he knew from his time at the company. We all chatted for a while as developers do - not about marketing and company politics, but about coding and languages and data structures. It was a very pleasant evening. Eventually the Borland guys closed up the lab and we all drifted off. No one even hinted at impropriety. I saw no cameras. Despite what Sidnam said later, I saw no notebooks. There was no drama.

I trust developers (Borland and/or Microsoft) but my guess is that one of the Borland guys just happened to mention that he had come across the Microsoft people in the lab. At some point, as the story was passed around, a non-developer saw a golden opportunity.

A couple of mornings later I entered the Press room to find an impromptu UK press meeting in full swing. A Borland spokeswoman was recounting the dramatic story of how three Microsoft people had been caught stealing secrets. I thought it was a great story until I realised that she was talking about the same three guys and the same evening.

Now, I'm a journalist. I like a good story as well as the next news hound. But I do like my articles to contain at least an element of truth. My editors are very picky on this point and tend to insist. I pointed out to the spokeswoman that, completely inadvertently, these guys had acquired a completely independent witness. I said that they were demonstrably innocent. My brothers in the press fraternity also like their articles to be based on planet Earth whenever possible and so the story never appeared in the UK. What I didn't realise at the time was that someone (the same spokeswoman?) simply repeated it to the US press which published the story.

So, it is no longer a great mythtery how some of these myths are born; but I think it is now time to put this one firmly to sleep. ®

Internet Security Threat Report 2014

More from The Register

next story
UNIX greybeards threaten Debian fork over systemd plan
'Veteran Unix Admins' fear desktop emphasis is betraying open source
Preview redux: Microsoft ships new Windows 10 build with 7,000 changes
Latest bleeding-edge bits borrow Action Center from Windows Phone
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
Redmond top man Satya Nadella: 'Microsoft LOVES Linux'
Open-source 'love' fairly runneth over at cloud event
Google+ goes TITSUP. But WHO knew? How long? Anyone ... Hello ...
Wobbly Gmail, Contacts, Calendar on the other hand ...
Chrome 38's new HTML tag support makes fatties FIT and SKINNIER
First browser to protect networks' bandwith using official spec
Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
Four new patches for open-source crypto libraries
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.