Feeds

Strange cults, vocal surgery and the quiet man: Inside Microsoft

Mary-Jo Foley on life after Gates

Remote control for virtualized desktops

Radio Reg Who'd have thought a bad haircut and rocking backwards and forwards in your chair like a child with ADD could pass as must-have traits? Yet, such was the cult of Bill Gates at Microsoft, company employees adopted these to become more like their boss.

Then there's ballistic Steve Ballmer, shouting so hard at one event his throat later required medical attention.

Into this ego-driven maelstrom steps Ray Ozzie: the quiet man of software, responsible for the hated Lotus Notes, who wants Microsoft to become more like Apple.

Join The Reg as we talk to journalist, author and blogger Mary-Jo Foley to get her take on these characters and life for Microsoft without Gates. We also get into the next version of Windows, how it feels to be a member of the team that delivered Windows Vista, and what's going on with new projects like Red Dog and D.

Why Mary-Jo? She's been reporting on Microsoft for 25 years, just eight less than Microsoft has actually been around.

She's also almost as legendary as Gates in hack circles. From interviewing the fidgety man at Comdex before anyone cared about Microsoft to infiltrating the corporate employees' bus to work each day, Mary-Jo's been scooping journalists and frustrating Microsoft's hated PR machine for more than two decades. She gives her thoughts on this and the future of Microsoft without the man who helped found it in her new book: Microsoft 2.0: how Microsoft plans to stay relevant in the post-Gates era.

Microbite

Warning for podcast snobs: there's no fancy music or fades here. We get right into it. You can listen here or through our player, above.®

Internet Security Threat Report 2014

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.