Feeds

Addicted to antitrust, Microsoft outlines 12-Step Recovery

No more interventions, please

Secure remote control for conventional and virtual desktops

Antitrust addict Microsoft has outlined a 12-Step Recovery Program, which it says will help prevent it from lapsing back into anti-competitive practices in the future.

The declaration follows three major "interventions" in fifteen years. A 1991 investigation by the Federal Trade Commission resulted in a Consent Decree signed in 1995. A 1997 investigation by the Department of Justice, joined by a number of US states the following year, resulted in a conviction and settlement in 2002. And just last month, the EU rejected Microsoft's claim that it was complying with a 2004 antitrust settlement.

Microsoft calls these vows "Windows Principles", or "Twelve Tenets to Promote Competition", and they reiterate many of the pledges made in 1995, 2002 and 2004.

"Through the set of voluntary Windows principles that we are announcing and adopting today, we're taking a principled, transparent and accountable approach to the future of our operating system," said Microsoft's general counsel Brad Smith.

Some of these "principles" are familiar - others are plain strange.

Pledges you may have heard before include a promise to permit OEMs to choose their own desktop icons and remove Microsoft's, and not to retalitate against OEMs. These were part of the 2002 Settlement.

There are promises to document its server APIs (made in 2004), and license its IP on a "fair" royalty basis (2002).

Then come the strange vows.

Microsoft will not prevent anyone from installing their own software, it says, nor will Windows "block access to any lawful Web site or impose any fee for reaching any non-Microsoft web site." As far as we can remember, not one of these transgressions has ever happened. What Microsoft has been found guilty of in the past, however, is preventing already-installed software from running as it should (DR-DOS); and blocking access to third-party browsers (Opera). But in the latter case, it was MSN that was doing the blocking - not Windows.

"We want the developer community to know that it is free to develop, support and promote products that compete with any part of Windows," says Microsoft.

Two months ago Microsoft and the Department of Justice agreed to renew the monitoring period, which was due to expire next year, for an additional two years.

Microsoft admitted that its documentation program "needed a reboot". The EU is currently fining Microsoft.

"One day at a time, Lord," said Smith.

No he didn't - we made that bit up. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.