Feeds

EC forces interop promise out of Microsoft

Redmond issues 'how to sue us' template

Protecting against web application threats using SSL

The second part of the agreement between Microsoft and the European Commission, although it will garner fewer headlines, is by far the most important part of the agreement.

This part of the deal breaks new legal and technical ground in attempting to remove the European Commission from future disagreements between companies in this area.

Microsoft has issued what amounts to a public pledge to behave properly in future in giving competing companies proper access to its APIs and other communication protocols.

The 13-page Public Undertaking is summarised in one sentence: "Microsoft shall ensure that third-party software products can interoperate with Microsoft’s Relevant Software Products using the same Interoperability Information on an equal footing as other Microsoft Software Products."

The company promises to support public, open industry standards and document that support.

Access to interoperability information will be "subject to no more than a nominal upfront fee" - this issue particularly irking the open source community.

Microsoft promises to provide interoperability information for its server operating systems, SharePoint, Outlook and Exchange, productivity applications and .NET. Internet Explorer will also follow public standards.

The firm will also make available APIs for its PC operating system through the Microsoft Developer Network, unless doing so would create a security risk.

The devil of course is in the detail. All the documents are available from this page - let us know what you think via comments or email.

By now some of the cynics amongst you may be asking: "Why the hell should we believe that Microsoft will really do any of this in such a way that the information can be used by competitors?"

The second part of the agreement aims to ensure that this is enforced without the need for the European Commission, or any other regulator, to get involved.

It is a warranty agreement template to be signed between Microsoft and any software firm which wants access to APIs. It aims to guarantee interoperability "with certain specified Microsoft products (Covered Products) on an equal footing with and to the same degree that Microsoft’s own software products interoperate with those specified Microsoft products.

"Whereas, Company does not desire to receive any information that could be used to clone or port Microsoft products in whole or in part."

This document aims to provide the basis for a civil case should Microsoft fail to provide the interoperability information without dragging itself, and the Commission, into another ten-year legal battle. ®

The next step in data security

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.