Feeds

Microsoft to comply with Brussels over browser choice gaffe

Steve Ballmer recognises how VERY SERIOUS it is

Security for virtualized datacentres

Microsoft has reportedly agreed to comply with any sanctions laid down by competition officials in Brussels, who are currently probing the software giant's allegedly mistaken banishment of a "browser choice" screen, which would have allowed European customers to pick which browser they wanted to run on their Windows-based machines.

The EU's competition commissioner Joaquin Almunia told Reuters at an economic conference in Italy that he had met with Redmond's boss to discuss the issue, which MS labelled as a "technical error" that it had failed to spot for 17 months.

"In my personal talks with Microsoft CEO Steve Ballmer he has given me assurances that they will comply immediately regardless of the conclusion of the antitrust probe," said Almunia, who added that Ballmer had agreed that the apparent cockup was a "very, very serious issue."

In July this year, the EC opened a fresh investigation into Microsoft's practice of using its Windows operating system to push people into using its Internet Explorer browser, following allegations of non-compliance with an EC settlement deal the software giant agreed to in late 2009.

Under that legally binding agreement, Microsoft was supposed to display a choice screen to its European Windows customers allowing them to pick between IE, Firefox, Chrome and other browsers on the market until 2014.

However, in February 2011 – when Microsoft issued a first service pack for its Windows 7 operating system – the choice screen had vanished. Redmond, however, said it had only recently discovered - courtesy of the European Commission - that it had stopped offering European punters a selection of browsers.

Microsoft recently began offering the browser choice screen to users of Windows in the EU's 27 member-states once again. The settlement deal with Brussels remains in force.

It's not yet clear what punishment Almunia will dish out to Microsoft, but he has previously indicated "severe consequences" if a breach is confirmed by competition officials. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.