Feeds

Why Borland trashed its spreadsheet

Finds hidden meaning

The smart choice: opportunity from uncertainty

Myths and legends Always remember, the compiler is your friend. Programming is stressful but no matter how many f**ks and b***ocks you might occasionally feel the need to insert into the comments, the compiler will always strip them out. It's great.

Of course, it doesn't actually go looking for rude words. So it would be a mistake to use them haphazardly. But that's OK because programmers who work for large, well-established companies would never make that mistake.

Let me take you back to September 1992, when "collaboration" software was known as productivity software, ISVs wrestled with the decision of whether to support a relatively new thing called Windows from Microsoft, and when Borland Software shipped the mighty Quattro Pro for Windows version 1.0.

As one of the first Windows-based spreadsheets, Quattro Pro - since sold to Corel and now part of WordPerfect Office - was a fabulous product, way ahead of its time. Certainly ahead of Microsoft's then-young Excel and Office.

It featured multiple pages and right-click access to a properties menu, both of which are common features now but were staggeringly innovative then. It also, predictably, had a button bar but even this had a twist: it was fully customizable and you could create your own. Each new button bar was stored as a file on disk so if you created a bar called Penguin, for example, a file called PENGUIN.BAR appeared.

This was in the days of the change over from DOS to Windows, so it was still common to use the DOS prompt as well as the GUI. One of the commands available in DOS is "Type", which displays on screen the typeable characters in any file. Now there was no good reason to "Type" one of the .BAR files but, if you did so, the name of the file appeared - so it must have been embedded into the file header - followed by an assortment of random characters.

Borland supplied several sample button bars with arty names like PICASSO.BAR and MONET.BAR and also one called SECOND.BAR. The latter name seemed like an odd choice beside its artistic brethren so, in a moment of boredom, I "Typed" it. Instead of the expected SECOND appearing, the characters "FUCKME" appeared. I was shocked. No, that doesn't really cover it: I was traumatised.

At the time I was completing a review of the product and had been in daily contact with the UK product manager, the charming and unflappable Frances Reay (now Fawcett). I rang her immediately to share the trauma.

Mark Whitehorn: Hi, Frances, do you happen to have Quattro Pro installed?

Frances Reay: Of course, what else would you expect from the product manager?

MW: OK, would you do me a favour and pop down to DOS for a moment?

(Clattering of fingers on keyboard heard down the phone).

FR: OK, I'm there.

MW: Can you swap to the QPW directory?

(More clattering of fingers).

MW: Now "Type" SECOND.BAR.

(Even more clattering of fingers, followed by a long pause).

FW: Well now, that's interesting.

MW: Does your screen say what mine says?

FR: More than likely. I suppose I'd better make some calls.

I may have been the first to report this to Borland, but I certainly wasn't alone in discovering it. Before I could publish the story in a magazine (the long defunct PC User) the news was rapidly spreading via email.

Frances passed the news on to Borland US with the result that the production lines in Ireland and the States were shut down and, as I was later told, Borland had to trash all those boxed copies that hadn't escaped the warehouses. Early copies of 1.0 instantly became collector's items.

Ah, such happy days, but that kind of thing could never happen now, of course.

Oh, wait a minute

Securing Web Applications Made Simple and Scalable

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.