Feeds

IE icon too familiar for Microsoft EU settlement?

Natural bias in question

Security for virtualized datacentres

Updated Details could undermine Microsoft's proposal to let Windows users pick their browser, the company's effort to keep Internet Explorer on the right side of European Union regulatory law.

Speaking with TechFlash, Opera Software CTO Hakon Wium Lie has questioned the use of the famous IE icon in a ballot screen Microsoft said it's willing to include in Windows.

Meanwhile, Lie has told told Computerworld he would like to see Windows users worldwide given the ability to pick the browser they want.

The ballot screen - detailed as part of a settlement package Friday by Microsoft - would let users pick from a list of browsers when they install Windows. The screen would come with Windows 7 and could be downloaded via software update to Windows XP and Windows Vista. When a user clicks the browser they want, it would take them to the download site.

Microsoft's proposed Windows browser ballot screen

Spot IE: Microsoft's proposed Windows ballot screen for browsers

Lie has reportly said that the use of icons in the ballot screen could result in a natural bias towards IE. The sticking point could be that the IE logo has become synonymous with Windows.

"The blue 'e' has become so associated with the Internet in general, due to the bundling with Windows. We think using the blue 'e' might not be such a good idea," told TechFlash.

But Lie is apparently pleased with Microsoft's proposal. In the reading-between-the-lines world of EU-antitrust politics, that could be an early sign of settlement.

It was Opera that brought the original complaint against Microsoft to the EU, over integration of IE with Windows, and it has been outspoken on the latest version of IE and Windows: IE 8 and the up-coming Windows 7.

The EU, meanwhile, which in its preliminary findings found integration of IE and Windows broke anti-trust law earlier this year, said it "welcomed" Microsoft's proposal. ®

This article has been updated to include Lie's comments in Computerworld on the ability to pick browsers worldwide.

Choosing a cloud hosting partner with confidence

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.