Feeds

Microsoft cops to webcode theft

Blames 'Chinese vendor'

New hybrid storage solutions

Microsoft has admitted that its new Chinese microblogging service used webcode pilfered from a similar service popular elsewhere in Asia.

On Monday, as reported by The Reg, Asian microblogging site Plurk accused Microsoft China of pilfering its code for a new social-networking feature known as Juku on the Chinese MSN site.

Monday night, Microsoft announced that it had removed the offending feature as it investigated the charges, and now, Microsoft has admitted that the code was indeed lifted from Plurk.

That said, Microsoft puts the blame on an unnamed partner:

On Monday, December 14, questions arose over a beta application called Juku developed by a Chinese vendor for our MSN China joint venture. We immediately worked with our MSN China joint venture to investigate the situation.
The vendor has now acknowledged that a portion of the code they provided was indeed copied. This was in clear violation of the vendor's contract with the MSN China joint venture, and equally inconsistent with Microsoft’s policies respecting intellectual property.

Microsoft's statement also notes that it would suspend its new social-networking feature "indefinitely."

But Plurk isn't entirely mollified. "Microsoft has used this 'independent vendor' strategy to try and absolve itself of responsibility for deliberate actions undertaken by them as recently as last month," a company spokesman tells The Reg. That would be the ImageMaker incident, when Microsoft was forced to remove a Windows 7 media and administration tool from the Microsoft Store site after a violation of the GPL. Microsoft did indeed blame a third party, and it later open sourced the tool.

Speaking with The Reg, Plurk questions whether today's statement from Microsoft is just more spin. "It just appears to be a stop-gap measure, damage-control measure, and we have a very hard time believing, given the size and scope of the undertaking, that there was no active involvement or development taking place directly within Microsoft itself on this service," the company said.

"While they have temporarily shut the site down, it appears some of the lifted code still appears to be on the club.msn.cn site", citing this chunk of code as "just one example."

Clearly, some wrinkles still need to be ironed out in the resolution of the Plurk/Microsoft dust-up. As Microsoft said in its statement: "We are obviously very disappointed, but we assume responsibility for this situation. We apologize to Plurk and we will be reaching out to them directly to explain what happened and the steps we have taken to resolve the situation." ®

Security for virtualized datacentres

More from The Register

next story
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.