Feeds

Google and Microsoft relive Joan Collins catfight

Hair pulled, eyes scratched over 'stolen search results'

The essential guide to IT transformation

We haven't seen a catfight like this since Linda Evans and Joan Collins. Or maybe even Bette Davis and Joan Crawford.

Google flaming Microsoft for copying its search results was already great fun. But the two have now descended into the sort of endless slagging match typically reserved for insecure adolescents – or Register commentards.

Microsoft is quite clearly copying Google's search results – in automated fashion. Google caught Redmond in the act by loading its live search engine with 100 bogus results pages. But surely, Google's rather involved efforts to publicly shame Microsoft are rather childish – not to mention deliciously ironic. This is a company that makes multi-billions from copied content.

At first, Microsoft's response to Google's claim was relatively restrained. A brief statement sent to The Reg didn't deny the claim, and then came a blog post from Bing vice president Harry Shum that didn't deny it again. But the post did accuse Mountain View of a "spy-novelesque stunt to generate extreme outliers in tail query ranking".

Then Microsoft did deny it. "We do not copy Google results," Redmond told ZDNet. So Google unloaded a blog post where it accused Microsoft of not telling the truth. "Microsoft’s Bing uses Google search results—and denies it," is the title. And it demanded that the copying stop.

Google and Microsoft

Google and Microsoft

Meanwhile, at a mini-conference in San Francisco, Microsoft's Harry Shum traded public barbs with Google search guru Matt Cutts. At one point, Shum referred to Google's "sting operation" as a "new source of spam and click fraud". And according to CNet, before the conference kicked off, Cutts "made the rounds...with a laptop open to four screenshots comparing the fake queries Google constructed and the results page with the same queries on Bing."

Throughout the day, Microsoft head of corporate communications Frank Shaw slung mud at Google via Twitter. When one Google supporter said Mountain View's evidence was "pretty convincing", Shaw responded with: "Google had employees log onto ms customer feedback system and send results to Microsoft"

Then came the return slap from Google's Matt Cutts: "Normal people call that 'IE8'".

And then the final hair pull from Shaw: "@mattcutts hey if this whole engineering thing doesn't work out for you, try PR -- you've got the chops for it. ;)"

You can see the full blow-by-blow here:

®

Boost IT visibility and business value

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Intel's Raspberry Pi rival Galileo can now run Windows
Behold the Internet of Things. Wintel Things
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
Linux kernel devs made to finger their dongles before contributing code
Two-factor auth enabled for Kernel.org repositories
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.