Language Selection

English French German Italian Portuguese Spanish

M$ remains unrepentant, says antitrust judge

Filed under
Microsoft

Microsoft Corp. is still trying to "leverage" its Windows operating system monopoly to control all software markets, said the former judge who ordered the company's breakup in the U.S. government's landmark antitrust case.

"Nothing has changed, to my observation, in the five years that have elapsed since my decision," said Thomas Penfield Jackson, who retired last year as a federal judge. He said the settlement of the government's case hasn't diminished Microsoft's power in the marketplace or changed its business strategy of trying to expand its monopoly.

"Windows is an operating-system monopoly, and the company's business strategy was to leverage Windows to achieve a comparable dominion over all software markets," Jackson said yesterday in Washington at a conference sponsored by the American Antitrust Institute.

Jackson's 2000 decision ordered the breakup of Microsoft, but in 2001, a U.S. appeals court overturned that element, leaving the company intact. It upheld his findings that Microsoft illegally protected its Windows monopoly for personal computer operating software by squelching competition from rival Netscape Communications Corp.'s Web browser.

The Bush administration, which inherited the case from the Clinton administration, settled with Microsoft once the company agreed to let computer makers promote rival software products.

Jackson defended his decision to grant the Clinton administration's request to break up the company. "The Microsoft persona I had been shown throughout the trial was one of militant defiance, unapologetic for its past behavior and determined to continue as before," he said.

Jackson said he "had no illusions that an order less drastic than that advocated by the government would meet with Microsoft's even grudging submission."

Jackson didn't criticize the settlement negotiated by the Bush administration, which drew objections from half the 19 states that had joined the Justice Department in suing Microsoft.

Still, he noted that Microsoft hasn't "fared so well in Europe." Antitrust enforcers ordered it to sell a Windows version without a music and video player and to grant competitors access to information on the operating system's inner workings.

"Microsoft has won the browser war in the United States," Jackson said, noting that Netscape's Navigator, now owned by Time Warner Inc., "has only a small fraction of the browser market."

Microsoft spokeswoman Stacy Drake said the company won't comment on the former judge's remarks.

Microsoft supporter Jim Prendergast disputed Jackson's description of the software industry. "Five years later, the industry has certainly been competing as vigorously as ever," said Prendergast, president of Americans for Technology Leadership, a pro-Microsoft group. "You can run three or four different browsers that are widely available now on your laptop. The settlement was a much more reasonable approach" than Jackson's breakup remedy, he said.

The appeals court that overturned Jackson's breakup order also disqualified him from overseeing further proceedings in the case because he had granted interviews to reporters during the trial. In his speech, Jackson said the appeals court "concluded that my indiscretions in allowing two journalists to confer with me in chambers, off the record, during the trial disqualified me from presiding over further proceedings."

Writer Ken Auletta, who wrote a book about the Microsoft case, based in part on interviews with Jackson, quoted the judge as comparing Microsoft executives to members of a drug gang because of their unrepentant attitude in court.

The judge who replaced Jackson on the case, Colleen Kollar-Kotelly, rejected calls by the states for tougher antitrust remedies.

Jackson said the breakup would have promoted competition by creating a company that sold software applications, including Internet browsers and another that sold operating systems for computers.

"The rationale was to enable the divisions to compete -- the former for applications from independent software suppliers as well as with its now independent counterpart, and the counterpart to write applications for nascent operating systems that might someday offer worthy competition to Windows."

Jackson said he ordered the breakup without more hearings because each side would continue to produce "equally eminent experts" who "were in good faith in almost total disagreement about every issue in the case."

"Time, moreover, was on Microsoft's side," Jackson said. "Microsoft would continue to do what it had been doing until some court told it to stop. A remedies trial would postpone that indefinitely."

By JAMES ROWLEY
BLOOMBERG NEWS

More in Tux Machines

Mint 18.3: The best Linux desktop takes big steps forward

I run many operating systems every day, from macOS, to Windows 7 and 10, to more Linux desktop distributions than you can shake a stick at. And, once more, as a power-user's power user, I've found the latest version of Linux Mint to be the best of the best. Why? Let's start with the basics. MacOS has been shown to have the worst bug I've ever seen in an operating system: The macOS High Sierra security hole that lets anyone get full administrative control. Windows, old and new, continues to have multiple security bugs every lousy month. Linux? Sure, it has security problems. How many of these bugs have had serious desktop impacts? Let me see now. None. Yes, that would be zero. Read more

Today in Techrights

Security: NSA, Microsoft Debacles, and FOSS Updates

  • Script Recovers Event Logs Doctored by NSA Hacking Tool
    Security researchers have found a way to reverse the effects of an NSA hacking utility that deletes event logs from compromised machines. Last week, Fox-IT published a Python script that recovers event log entries deleted using the "eventlogedit" utility that's part of DanderSpritz, a supposed NSA cyber-weapon that was leaked online by a hacking group known as the Shadow Brokers. According to Fox-IT, they found a flaw in the DanderSpritz log cleaner when they realized the utility does not actually delete event log entries, but only unreferences them, merging entries together.
  • Pre-Installed Keylogger Discovered on Hundreds of HP Laptop Models
    A keylogger that can help record pretty much every keystroke on the computer has been discovered on HP’s devices, with a security researcher revealing that hundreds of laptop models come with this hidden software pre-installed. Michael Myng says in an analysis of the keylogger that the malicious code is hiding in the Synaptics Touchpad software and he actually discovered it when looking into ways to control the keyboard backlight on his laptop. According to his findings, the keylogger isn’t activated by default, but it can be turned on by any cybercriminals that get access to the system. The list of affected models includes hundreds of laptops like EliteBook, ProBook, Spectre, Zbook, Envy, and Pavilion.
  • Laptop touchpad driver included extra feature: a keylogger [Ed: This is the second time in recent times HP gets caught with keyloggers; This is no accident, it's intentional.]
    Flaws in software often offer a potential path for attackers to install malicious software, but you wouldn't necessarily expect a hardware vendor to include potentially malicious software built right into its device drivers. But that's exactly what a security researcher found while poking around the internals of a driver for a touchpad commonly used on HP notebook computers—a keystroke logger that could be turned on with a simple change to its configuration in the Windows registry.
  • Microsoft Needed 110 Days to Fix Critical Security Bug After First Ignoring It
    Microsoft needed more than 100 days to fix a critical credential leak in Dynamics 365 after the company originally ignored the bug report and only reacted after being warned that details could go public. Software engineer Matthias Gliwka explains in a long blog post that he discovered and reported a security flaw in Microsoft’s Customer Relationship Manager and Enterprise Resource Planning software in August, but the software giant refused to fix it on claims that administrator credentials would be required. Gliwka says he came across a wildcard transport layer security (TLS) certificate that also included the private key, which would in turn expose communications by anyone who could decrypt traffic. The developer says that extracting the certificate grants access to any sandbox environment, with absolutely no warning or message displayed to clients.
  • UK Spy Agency Finds Severe Flaw in Microsoft Antivirus in Kaspersky Bye-Bye Push
  • Security updates for Monday

OSS Leftovers

  • What is a blockchain smart contract?
    Now, in a blockchain, the important thing is that once the state has changed, you then ensure it's recorded on the blockchain so that it's public and nobody can change or challenge it. But there are other uses for blockchain technology, as I explained in "Is blockchain a security topic?" Permissionless systems, often referred to as distributed ledger technologies (DLTs) are a great fit for non-transactional state models, largely because the sort of people who are interested in them are closed groups of organisations that want to have complex sets of conditions met before they move to the next state. These aren't, by the tightest definition, blockchains. Banks and other financial institutions may be the most obvious examples where DLTs are gaining traction, but they are very useful in supply chain sectors, for instance, where you may have conditions around changing market rates, availability, and shipping times or costs, which may all play into the final price of the commodity or service being provided.
  • Running a successful open source project
    Running an open source project is easy. All you have to do is make your source code available and you’re open source, right? Well, maybe. Ultimately, whether or not an open source project is successful depends on your definition of success. Regardless of your definition, creating an open source project can be a lot of work. If you have goals regarding adoption, for example, then you need to be prepared to invest. While open source software is “free as in beer”, it’s not really free: time and energy are valuable resources and these valuable resources need to be invested in the project. So, how do you invest those resources?
  • New package repositories are now enabled by default
    During this year’s coding sprint in Toulouse (which I was able to attend, thanks to being in Europe on a study-abroad program), I spent a lot of time massaging HaikuPorts to generate a consistent-enough state of packages for us to switch to them by default, and then making the in-tree changes necessary for the switch. Thanks to this and mmlr’s comprehensive overhaul of the HaikuPorter Buildmaster over the past couple months, we have finally switched to the new repositories by default as of hrev51620. If you’ve installed a nightly image from after this, you should be able to just pkgman full-sync and upgrade away.
  • Haiku OS Is Very Close To Their Long Awaited Beta, New Repository Working
    The BeOS-inspired Haiku operating system should be issuing its long-awaited beta release by early 2018. For months there has been talk of the long-awaited beta for Haiku OS while it looks like roughly within the next month we should be actually seeing this milestone.
  • DeepVariant: Tool to call out variants in sequencing data goes open source
    Megan Molteni, Wired, decoded, at least, the very nature of the challenge to know more about our human puzzle. "Today, a teaspoon of spit and a hundred bucks is all you need to get a snapshot of your DNA. But getting the full picture—all 3 billion base pairs of your genome—requires a much more laborious process. One that, even with the aid of sophisticated statistics, scientists still struggle over." DeepVariant was developed by researchers from the Google Brain team, focused on AI techniques, and Verily, the Alphabet subsidiary focused on life sciences. It is based on the same neural network for image recognition, but DeepVariant, is now making headlines not for cat IDs but as a way to scan a genetic code for mutations. DeepVariant has gone open source. The GitHub definition of DeepVariant: "an analysis pipeline that uses a deep neural network to call genetic variants from next-generation DNA sequencing data."
  • Open source VPN clients vs VPN provider apps: which is better?
    Power users love open source software for its transparency and flexibility – but what about open source VPN software? Are there any open source VPN clients that can stand up to being compared with the more popular VPN apps from premium providers like ExpressVPN, VyprVPN, IPVanish or NordVPN? The short answer is... not really. But the long answer depends a lot on your level of technical know-how, patience, and where you’re willing to place your trust.
  • Coreboot Conference 2017 Videos Now Available
    For those interested in the open-source Coreboot project that serves as a replacement to proprietary UEFI/BIOS, the videos from their European Coreboot Conference are now available. The European Coreboot Conference 2017 (ECC'17) was held in Bochum, Germany back at the end of October.
  • Election night hackathon supports civic engagement
    On November 7, 2017, members of the Rochester Institute of Technology (RIT) community came together for the annual Election Night Hackathon held in the Simone Center for Student Innovation. This marked the seventh anniversary of a civic tradition for the FOSS @ MAGIC community, in which students and faculty analyze civic problems in the local community, state, or country and propose a project to address them. MAGIC Center faculty and event organizers are on hand to help students choose open source licenses and publish and share their code.
  • What is a blockchain smart contract?
    Now, in a blockchain, the important thing is that once the state has changed, you then ensure it's recorded on the blockchain so that it's public and nobody can change or challenge it. But there are other uses for blockchain technology, as I explained in "Is blockchain a security topic?" Permissionless systems, often referred to as distributed ledger technologies (DLTs) are a great fit for non-transactional state models, largely because the sort of people who are interested in them are closed groups of organisations that want to have complex sets of conditions met before they move to the next state. These aren't, by the tightest definition, blockchains. Banks and other financial institutions may be the most obvious examples where DLTs are gaining traction, but they are very useful in supply chain sectors, for instance, where you may have conditions around changing market rates, availability, and shipping times or costs, which may all play into the final price of the commodity or service being provided.
  • Running a successful open source project
    Running an open source project is easy. All you have to do is make your source code available and you’re open source, right? Well, maybe. Ultimately, whether or not an open source project is successful depends on your definition of success. Regardless of your definition, creating an open source project can be a lot of work. If you have goals regarding adoption, for example, then you need to be prepared to invest. While open source software is “free as in beer”, it’s not really free: time and energy are valuable resources and these valuable resources need to be invested in the project. So, how do you invest those resources?
  • New package repositories are now enabled by default
    During this year’s coding sprint in Toulouse (which I was able to attend, thanks to being in Europe on a study-abroad program), I spent a lot of time massaging HaikuPorts to generate a consistent-enough state of packages for us to switch to them by default, and then making the in-tree changes necessary for the switch. Thanks to this and mmlr’s comprehensive overhaul of the HaikuPorter Buildmaster over the past couple months, we have finally switched to the new repositories by default as of hrev51620. If you’ve installed a nightly image from after this, you should be able to just pkgman full-sync and upgrade away.
  • Haiku OS Is Very Close To Their Long Awaited Beta, New Repository Working
    The BeOS-inspired Haiku operating system should be issuing its long-awaited beta release by early 2018. For months there has been talk of the long-awaited beta for Haiku OS while it looks like roughly within the next month we should be actually seeing this milestone.
  • DeepVariant: Tool to call out variants in sequencing data goes open source
    Megan Molteni, Wired, decoded, at least, the very nature of the challenge to know more about our human puzzle. "Today, a teaspoon of spit and a hundred bucks is all you need to get a snapshot of your DNA. But getting the full picture—all 3 billion base pairs of your genome—requires a much more laborious process. One that, even with the aid of sophisticated statistics, scientists still struggle over." DeepVariant was developed by researchers from the Google Brain team, focused on AI techniques, and Verily, the Alphabet subsidiary focused on life sciences. It is based on the same neural network for image recognition, but DeepVariant, is now making headlines not for cat IDs but as a way to scan a genetic code for mutations. DeepVariant has gone open source. The GitHub definition of DeepVariant: "an analysis pipeline that uses a deep neural network to call genetic variants from next-generation DNA sequencing data."
  • Open source VPN clients vs VPN provider apps: which is better?
    Power users love open source software for its transparency and flexibility – but what about open source VPN software? Are there any open source VPN clients that can stand up to being compared with the more popular VPN apps from premium providers like ExpressVPN, VyprVPN, IPVanish or NordVPN? The short answer is... not really. But the long answer depends a lot on your level of technical know-how, patience, and where you’re willing to place your trust.