Feeds

Microsoft discloses 14,000 pages of coding secrets

Tech documentation for all

Intelligent flash storage arrays

Microsoft today lifted the lid on 14,000 pages of sketchy versions of tech documentation for core software code. On show for the first time in public are underlying protocols for Office 2007, Office SharePoint Server 2007 and Exchange Server 2007.

This is Microsoft's latest effort to satisfy anti-trust concerns of the European Union, which is possibly a tougher adversary for the company than Google.

In February, the firm made a surprise announcement in which it agreed to publish and provide free access to application programming interfaces (APIs) for its major software products.

At the time Microsoft said it also planned to free up protocols around its client and server software.

Now it has unleashed preliminary tech docs that reveal some of the inner-workings of its code via its Microsoft Developer Network (MSDN) website. This is the first stage of the process.

Microsoft is to release details in three phases.

Between now and June it will garner feedback from the developer community. Then, at the end of June, Microsoft will publish the final versions of technical documentation – along with definitive patent licensing terms.

The definitions will be crucial to third parties who want to play with Microsoft code. We shall find out soon enough if Redmond will let them play ball.

Tom Robertson, Microsoft’s interoperability and standards general manager, says today's moves are "another step toward putting our interoperability principles into action with the public availability of these protocol specifications".

It may also help the company head off some anti-trust concerns.

In January European regulators began two formal investigations against Microsoft for alleged market abuse.

One is a response to the complaint filed by the European Committee for Interoperable Systems alleging Redmond had refused to disclose interoperability information on a range of Microsoft products.

The EC is scrutinising several server products and Office Open XML (OOXML) on the grounds that the specification doesn't work with those of competitors. Just last week OOXML bagged enough votes to be passed as an international standard, much to the chagrin of open source fanciers around the globe.

The second investigation was sparked by a complaint from the Norwegian web browser company Opera, which alleged that the tying of Internet Explorer to its Windows operating system was anti-competitive.®

Providing a secure and efficient Helpdesk

More from The Register

next story
UNIX greybeards threaten Debian fork over systemd plan
'Veteran Unix Admins' fear desktop emphasis is betraying open source
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
Redmond top man Satya Nadella: 'Microsoft LOVES Linux'
Open-source 'love' fairly runneth over at cloud event
Chrome 38's new HTML tag support makes fatties FIT and SKINNIER
First browser to protect networks' bandwith using official spec
Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
Four new patches for open-source crypto libraries
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.