Feeds

Microsoft discloses 14,000 pages of coding secrets

Tech documentation for all

High performance access to file storage

Microsoft today lifted the lid on 14,000 pages of sketchy versions of tech documentation for core software code. On show for the first time in public are underlying protocols for Office 2007, Office SharePoint Server 2007 and Exchange Server 2007.

This is Microsoft's latest effort to satisfy anti-trust concerns of the European Union, which is possibly a tougher adversary for the company than Google.

In February, the firm made a surprise announcement in which it agreed to publish and provide free access to application programming interfaces (APIs) for its major software products.

At the time Microsoft said it also planned to free up protocols around its client and server software.

Now it has unleashed preliminary tech docs that reveal some of the inner-workings of its code via its Microsoft Developer Network (MSDN) website. This is the first stage of the process.

Microsoft is to release details in three phases.

Between now and June it will garner feedback from the developer community. Then, at the end of June, Microsoft will publish the final versions of technical documentation – along with definitive patent licensing terms.

The definitions will be crucial to third parties who want to play with Microsoft code. We shall find out soon enough if Redmond will let them play ball.

Tom Robertson, Microsoft’s interoperability and standards general manager, says today's moves are "another step toward putting our interoperability principles into action with the public availability of these protocol specifications".

It may also help the company head off some anti-trust concerns.

In January European regulators began two formal investigations against Microsoft for alleged market abuse.

One is a response to the complaint filed by the European Committee for Interoperable Systems alleging Redmond had refused to disclose interoperability information on a range of Microsoft products.

The EC is scrutinising several server products and Office Open XML (OOXML) on the grounds that the specification doesn't work with those of competitors. Just last week OOXML bagged enough votes to be passed as an international standard, much to the chagrin of open source fanciers around the globe.

The second investigation was sparked by a complaint from the Norwegian web browser company Opera, which alleged that the tying of Internet Explorer to its Windows operating system was anti-competitive.®

Combat fraud and increase customer satisfaction

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.