Feeds

Walking through MIME fields: Snubbing Steve Jobs to Star Trek tech

Email daddy Borenstein talks rejection and attachments

Combat fraud and increase customer satisfaction

What next for MIME? The world wild web awaits

The timing was ripe for MIME, coming on the heels of CERN-based computer scientist Tim Berners-Lee's work on the first world wide web server, web browser and humanity's first web site in 1991. Berners-Lee needed a way to exchange multimedia messages but didn't want to re-invent the wheel.

"Just as we reached this consensus on the MIME standard, Tim Berners-Lee and his folks said they had to figure out how to do multimedia, so they said 'let's use this new MIME thing'... this thing I'd never heard of called the World Wide Web adopted it and took over the world," Borenstein said.

Fate played its hand several times in the making of MIME, and therefore the internet as we know it.

First, there was Borenstein's interest in email that stemmed from his service job at CMU - all students were assigned tasks outside of their studies. His job was running CMU's email system in 1980. "That turned into my entire career, which wasn't my goal at the time," he told us.

Borenstein joined the Andrew Project upon completion of his thesis, and it was Andrew that inspired MIME. Andrew tagged files with a content header but it used just a flat namespace that assigned everything a single label; this meant the list of possible headers became cluttered and content didn't always come through as readable. You might open what you thought was an image only to be confronted by pages of densely packed random characters - the raw data of the picture.

It was through Andrew that Borenstein met email pioneer Einar Stefferud, active in internet standards and credited with inventing the first internet mailing list, at a conference where X.400 - rival to SMTP email - had dominated discussions.

Stefferud was impressed by Borenstein and hooked him up with the person who was to become his MIME collaborator, Ned Freed. Borenstein's interest was in the exchange of multimedia content while Freed's interest lay in building a gateway between different email systems. By the time MIME went to the Internet Engineering Taskforce (IETF) for discussion, people had piled onto MIME's third aspect - sending non-English without it becoming gibberish.

"I was the only person with a paper not on X.400. I ran into these people who believed email can't do what I've already made it do [with Andrew]," Borenstein said of the X.400-heavy event. "Einar made a beeline for me."

Getting MIME accepted internationally at the IETF was a matter of politics. The landscape was a battlefield of the kinds of technology disagreements, vendor bickering and a hazy belief that market forces would pick a de-facto standard that we would come to know and, er, love. Often, Borenstein says, the best way to get critics onside was to conceded a minor point and then add them to MIME's lengthy list of contributors. Just one person rejected this play, he said, an individual who believed MIME was "very ugly".

A better built MIME

To this date, Borenstein concedes MIME could have been built better but accounts for its design on the need to be backwards compatible with huge chunks of what is now regarded as the internet's backbone, ARPANET, that was already in place thanks to the military and universities that pioneered it. Back then MIME had to support FTP and data encoding used on older servers as well as Base64 and ASCII. "If you were starting from scratch, you wouldn't start at Base64 and 7-bit ASCII," Borenstein says.

Two decades on, and despite its complexity, MIME is embedded in the internet. Borenstein, who is chief scientist at Mimecast, reckons one trillion MIME attachments are exchanged every day. The number of MIME types to describe different media has grown considerably from the original 16. Its success is because of the freedom you have in being able to define new name types.

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.