Feeds

Apple surrenders the Pink (to Microsoft)

Zune pilfers famous codename

Eight steps to building an HP BladeSystem

And so it has come to this: Microsoft has stooped so low as to filch Apple's codenames.

This week, Steve Ballmer reiterated that Redmond has no interest in building a Zune phone. Praise be. But he did say the company is prepping Zune software and services for the Windows Mobile platform, and according to sources whispering to ZDNet's Mary Jo Foley, this semi-secret endeavor is codenamed "Pink."

So, more than thirty years after stealing Apple's operating system, Microsoft has shamelessly stolen its operating system codename. Pink was the sobriquet of the ill-fated late-80s Apple OS project that eventually spun off into a joint Apple-IBM venture known as Taligent.

Around 1987 or '88, after the Steves (Jobs and Wozniak) had departed the company, Apple's top software engineers gathered to brainstorm a next-generation Mac operating system. Ideas for a revision of the current platform were written on blue index cards. Proposals for an OS of the distant future were scribbled on red cards. And thoughts that landed somewhere in-between were sketched out on, yes, pink cards.

Pink would be an object-oriented operating system written in C++ atop a brand new microkernel, and when IBM and Apple dumbfounded the planet with their PowerPC partnership in the summer of 1991, Apple's then chief executive John Sculley said developers had written 1.5 million lines of Pink code. But under the aegis of Taligent - a conflation of "talent" and "intelligent," if you must know - the kernel was eventually abandoned and Pink faded into distant memory.

Until now - with Microsoft once again exercising its knack for repeating what others have already done.

You can read more about the (real) Pink here, here, and here. Though we suggest you avoid Wikipedia's Taligent entry, which is unsourced, riddled with mistakes, and could have been written by almost anyone. ®

Boost IT visibility and business value

More from The Register

next story
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.