Feeds

Office 2010 to come loaded with WGA's bastard child

Microsoft takes advantage

Boost IT visibility and business value

Microsoft has stretched its twitching anti-piracy tentacles more widely across the globe with the expansion of its Office Genuine Advantage Notifications program into 13 more countries.

The software giant confirmed yesterday that 41 countries could now enroll in Redmond’s voluntary program that offers end users “enhanced protection” against the “risks” of using counterfeit copies of Office.

Microsoft once again pointed in the direction of its software's oldest enemies - viruses and malfunctioning code - both of which it claimed dog dodgy copies of its Office suite. Of course, piracy puts a dent in Redmond’s pockets too.

Additionally, the vendor announced yesterday that Microsoft’s upcoming Office 2010 suite, due out in the first half of next year, will come loaded with new tools to help the company better control how volume-licensing keys are activated and used.

It said the tools had been built on Microsoft’s Software Protection Platform (SPP), which MS claimed would “make it harder for counterfeiters to defraud consumers by selling inferior, bogus copies of Office”.

Essentially SPP is the bastard child of the firm's much-derided Windows Genuine Advantage tool. It was first debuted in the company's unloved OS Vista back in 2006.

Microsoft said the product would be harder to pirate due to technical features built into the Office 2010 software.

It also wheeled out figures compiled from a recent study by the Business Software Alliance and research outfit IDC.

“In addition to hurting developers such as Microsoft, piracy harms software resellers and computer users throughout the world,” said MS anti-piracy wonk Keith Beeman.

“In 2008, 41 percent of software on the world’s PCs was obtained illegally or used without a license… That equates to more than $50bn in losses for the global software ecosystem.” ®

Boost IT visibility and business value

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.