Feeds

On Microsoft's feeble Fortune-based nastygram to Red Hat

Missing BillG's pen

Combat fraud and increase customer satisfaction

Comment Microsoft has lost its guts. Maybe they're on the floor of Bill Gates's "think week" cabin.

Chairman Gates owned a steel sack once upon a time. You all remember the missive deriding computer hobbyists as software stealing criminals. "I would appreciate letters from any one who wants to pay up, or has a suggestion or comment," Gates wrote in 1976. "Nothing would please me more than being able to hire ten programmers and deluge the hobby market with good software."

It would seem that Microsoft now relies on the likes of Fortune to perform scoldings. The software maker, as you've no doubt heard, placed a terse article with the publication. In the piece, both Microsoft CEO Steve Ballmer and top lawyer Brad Smith go after the free/open source crowd, saying 235 Redmond patents have been violated - 42 of them in the Linux kernel, 65 in the GUI (graphical user interface), 45 in OpenOffice, 15 in e-mail and another 68 scattered across various other packages.

You have to read all the way to the end of the Fortune story to grasp the full feebleness of Microsoft's grousing.

Reporter Roger Parloff asks, "If push comes to shove, would Microsoft sue its customers for royalties, the way the record industry has?"

"That's not a bridge we've crossed," replies Ballmer, "and not a bridge I want to cross today on the phone with you."

With this unbelievable, weak reply, Ballmer chose to threaten many of Microsoft's largest customers with the possibility of legal action, if they've picked up Linux, as most of Microsoft's largest customers have. In so doing, the CEO replaced Gates's straight-forward feistiness of yesteryear with a vacuous grimace delivered via the vehicle of a business publication.

Microsoft has such little respect for its customers these days that it won't even yell at you to your face - a task for which Baller is uniquely suited.

Let's be clear here. Microsoft has no intention of suing its customers. It's already tortured users enough with product delays and under achievement. Only pure insanity would drive Microsoft to mimic the RIAA (Recording Industry Association of America) by clogging US courts with lawsuits. We don't think Microsoft is insane.

Time wasted not hunting Google

The actual meat behind Microsoft's Fortune play seems thinner than a well-beaten carpaccio.

As we read it, Microsoft wanted nothing more than to remind Red Hat that it will need to go ahead and strike a deal like Novell. Microsoft sees the free software types maneuvering the GPL to undercut its voucher/no lawsuits against users agreement with Novell. The software maker also, no doubt, noticed Dell behaving badly by agreeing to support Ubuntu on computers. And, of course, Microsoft sees the same trends as the rest of us in the middleware game where open source has really taken off in recent months. Red Hat could enjoy the most revenue from this trend thanks to its new Exchange program.

3 Big data security analytics techniques

Next page: Patent Patsy

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
IBM rides nightmarish hardware landscape on OpenPOWER Consortium raft
Google mulls 'third-generation of warehouse-scale computing' on Big Blue's open chips
It's GOOD to get RAIN on your upgrade parade: Crucial M550 1TB SSD
Performance tweaks and power savings – what's not to like?
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.