Feeds

Microsoft discloses 14,000 pages of coding secrets

Tech documentation for all

The essential guide to IT transformation

Microsoft today lifted the lid on 14,000 pages of sketchy versions of tech documentation for core software code. On show for the first time in public are underlying protocols for Office 2007, Office SharePoint Server 2007 and Exchange Server 2007.

This is Microsoft's latest effort to satisfy anti-trust concerns of the European Union, which is possibly a tougher adversary for the company than Google.

In February, the firm made a surprise announcement in which it agreed to publish and provide free access to application programming interfaces (APIs) for its major software products.

At the time Microsoft said it also planned to free up protocols around its client and server software.

Now it has unleashed preliminary tech docs that reveal some of the inner-workings of its code via its Microsoft Developer Network (MSDN) website. This is the first stage of the process.

Microsoft is to release details in three phases.

Between now and June it will garner feedback from the developer community. Then, at the end of June, Microsoft will publish the final versions of technical documentation – along with definitive patent licensing terms.

The definitions will be crucial to third parties who want to play with Microsoft code. We shall find out soon enough if Redmond will let them play ball.

Tom Robertson, Microsoft’s interoperability and standards general manager, says today's moves are "another step toward putting our interoperability principles into action with the public availability of these protocol specifications".

It may also help the company head off some anti-trust concerns.

In January European regulators began two formal investigations against Microsoft for alleged market abuse.

One is a response to the complaint filed by the European Committee for Interoperable Systems alleging Redmond had refused to disclose interoperability information on a range of Microsoft products.

The EC is scrutinising several server products and Office Open XML (OOXML) on the grounds that the specification doesn't work with those of competitors. Just last week OOXML bagged enough votes to be passed as an international standard, much to the chagrin of open source fanciers around the globe.

The second investigation was sparked by a complaint from the Norwegian web browser company Opera, which alleged that the tying of Internet Explorer to its Windows operating system was anti-competitive.®

Boost IT visibility and business value

More from The Register

next story
Intel's Raspberry Pi rival Galileo can now run Windows
Behold the Internet of Things. Wintel Things
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
Linux kernel devs made to finger their dongles before contributing code
Two-factor auth enabled for Kernel.org repositories
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.