Feeds

Microsoft hit by two more EC probes

Updated: Stop me if you've heard this one before

Internet Security Threat Report 2014

The European Commission is launching two formal investigations into Microsoft.

Microsoft is accused of abusing its dominant position by unfairly tying products together - in this case its operating system and its browser, Internet Explorer. Microsoft is also accused of illegally refusing to disclose interoperability information across a range of products including Office, server software and .NET.

The Commission will also investigate whether the software giant's new office file format, Office Open XML, is interoperable enough with competing products. This refers to a complaint made by the European Committee for Interoperable Systems (ECIS). Microsoft assured the Court of First Instance last year that it would work with competitors to provide all necessary interoperability information.

The unfair tying case was brought following a complaint from Norwegian browser maker Opera. Opera said that Microsoft's tying of its browser with its operating system was especially damaging, because Microsoft has introduced technology into its browser which reduces compatibility with open internet standards. Microsoft will also be investigated for allegedly illegally tying other products like Desktop Search and Windows Live.

The EC statement notes: "This initiation of proceedings does not imply that the Commission has proof of an infringement. It only signifies that the Commission will further investigate the case as a matter of priority."

The Commission has already found Microsoft guilty of abusing its monopoly position in regards to tying its media player to its operating system and its failure to provide sufficient interoperability information relating to workgroup servers.

The EC statement is here.

Updated: Microsoft sent us the following statement: "We will cooperate fully with the Commission’s investigation and provide any and all information necessary. We are committed to ensuring that Microsoft is in full compliance with European law and our obligations as established by the European Court of First Instance in its September 2007 ruling."®

Remote control for virtualized desktops

More from The Register

next story
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
Apple's OS X Yosemite slurps UNSAVED docs into iCloud
Docs, email contacts... shhhlooop, up it goes
Was ist das? Eine neue Suse Linux Enterprise? Ausgezeichnet!
Version 12 first major-number Suse release since 2009
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.