Is there a secret story behind the Novell/Microsoft deal?
Was the Novell/Microsoft deal a worthwhile well-meaning effort between renegade open-source geeks at Microsoft and geeks at Novell that got derailed by salespeople and management, after which it was turned into a nightmare deal with the devil? I raise this question because I know someone with ties to people at both Microsoft and Novell. He has a credible story to tell about what really happened, and how much it differs from what we now know about the Novell/Microsoft deal. Unfortunately, I haven't been able to get him to write up the history - yet. While I continue to pester him, here's the short version, third hand.
Normally I wouldn't go public with a third-hand version, but the story is credible enough to warrant attention. The basic skinny is that some renegade Microsoft employees who believe in open standards and open source approached Microsoft lawyers with a scheme to disarm the Microsoft patent portfolio. They got together with geeks and lawyers at Novell to make this happen. At some point, sales guys and management at one or both companies saw this as an opportunity for Novell to make money, and for Microsoft to manipulate the Linux market. They wrested the process away from the people who originated it, and the end result was the abominable deal that went forward.
Ironically, according to this story, people like Steve Ballmer were totally unaware of what was going on until the deal was sealed. So all of the posturing that Steve Ballmer has done since the deal is after-the-fact FUD-mongering.
It didn't sound credible to me, at first, but my source is reliable, and the people to whom he refers fit perfectly into this scenario. I know I haven't been able to give you many details, but what do you think? Sound credible to you?
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The Humble Hacker?
- The Death of RoboVM
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- Varnish Software's Hitch
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide