Feeds

MS hits Office 2010 upgrade program button prematurely

Office 2007 purchasers to get free update from 5 March?

Security for virtualized datacentres

Microsoft let slip details about its Office 2010 “technology guarantee” plan yesterday.

The apparent PR gaffe revealed that the software vendor would kick off the program on 5 March. Office 2010 is expected to hit retail in June this year, but Microsoft hasn’t yet confirmed an official date for its next big consumer product launch.

MS has since taken down a posting to its website added by one of its employees. Ars Technica, which first reported the mishap, pointed out that Google still has a cached version of the page.

As is standard Microsoft marketing practice, the company is offering customers who buy Office 2007 between 5 March and 30 September a free upgrade to an equivalent edition of Office 2010.

The company will also sell punters a DVD containing the software for an undisclosed fee. The posting didn't reveal which suppliers the company would be using this time around.

In October 2009, Microsoft was flooded with complaints from hundreds of disgruntled university bods who struggled to download or successfully install Windows 7 files supplied by Digital River.

Many UK-based university staff and students, who stumped up £30 for Microsoft’s Windows 7 academic offer, grumbled the download wasn’t working for them.

Similarly, academic customers trying to take advantage of Redmond’s $29.99 Windows 7 upgrade offer to students in the US were also hit with problems once the software was downloaded from the Minneapolis-based Digital River’s website.

Earlier this week Microsoft pushed out a Release Candidate version of its Office 2010 suite, which includes Word, Excel, Outlook and OneNote, to a select bunch of testers.

It’s not clear when that near-ready version of the software will become generally available, however.

We asked Microsoft to comment on the butterfingers slip up, and also if it could confirm which suppliers the vendor planned to use for its Office 2010 upgrade program. We'll update this story once we hear back from the firm. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.