Feeds

EC vs. MS: IT depts find a champ in Europe

If nerve holds

The essential guide to IT transformation

Of course a commercial vendor can license the protocols, and hope for the best. In Luxembourg recently, Microsoft was keen to show that this could result in a happy collaboration. But it's difficult to compete effectively with the finished result - and impossible for an open source implementation to agree to the license conditions.

The key question now is who can benefit from the documentation Microsoft has failed to produce - and here the spotlight falls on software libre.

Before the court of the first instance, Samba's Andrew Tridgell held up that mythical device, the appliance server, as an example of the innovation that could return to the enterprise server business. But that isn't the kind of innovation that matters to IT users at this end of the business. It's rare to hear IT managers wishing for server appliances - but it's hard not to find one who didn't wish for reduced complexity. Opening the guts of Microsoft's software business is really about lowering prices, which are maintained at an artificially high level because of a monopoly supplier, for some very basic computer functionality.

The downstream effect could - and really ought to - concentrate minds at Redmond on Plan A, which was always about replicating functions found in expensive proprietary Unix systems and midrange systems and putting them on lower cost volume PCs. In recent years, it's been Linux that has been humming this tune.

All computer companies expect features to be imitated, and few companies can sit on features that weren't even new twenty years ago. The winners aren't just open source and its biggest backer IBM, but Microsoft's business customers.

But competitive advantage doesn't just come from copying, and joining the relentless race to the bottom. Microsoft might even try to innovate itself, rather than neglecting worthy and ambitious projects such as its on-off "future storage" project - last known as WinFS, and last seen heading for the deep freeze.

For the first time, then, we have an antitrust remedy that is not only being enforced - but might actually be able to restore some competition.

This supposes two things.

The first is that Microsoft is actually able to document these protocols adequately to the Commission's satisfaction - and there are people familiar with the protocols, and the documentation produced so far, who seriously doubt that Microsoft actually knows what's taking place on the wire. The second is whether Microsoft has the will to comply. Microsoft is already paying the fine into an escrow account, and this evening, Redmond lawyers were filing their appeal. Having played the antitrust poker game for so long, and discovered that prevarication is a successful tactic, the chances of it continuing with this gambit must remain.

What's $500m a year?®

5 things you didn’t know about cloud backup

More from The Register

next story
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.