Language Selection

English French German Italian Portuguese Spanish

Evangelism is War – The Mono/Moonlight Agenda

I was going over an old Groklaw posting that got me thinking about Microsoft and it’s .NET Agenda. I decided to do more research and took a look at the Comes vs Microsoft documents again but from the perspective of the current Mono issues. After reading the information contained in the documents I am even more convinced that Mono and Moonlight do nothing but help Microsoft win against competing platforms. I will quote and comment on a few relevant sections I found useful to prove my point.

Evangelism Is War

Our mission is to establish Microsoft’s platforms as the de facto standards throughout the computer industry. Our enemies are the vendors of platforms that compete with ours: Netscape, Sun, IBM, Oracle, Lotus, etc. The field of battle is the software industry. Success is measured in shipping applications. Every line of code that is written to our standards is a small victory; every line of code that is written to any other standard, is a small defeat. Total victory, for DRG, is the universal adoption of our standards by developers, as this is an important step towards total victory for Microsoft itself: “A computer on every desk and in every home, running Microsoft software.”

Our weapons are psychological, economic, and political–not military. No one is forced to adopt our standards at the barrel of a gun. We can only convince, not compel.

Rest Here




the same procedure as every year...

...and again a member of the tinfoil-hat-wearing faction has dug out a well-known, prehistoric Microsoft strategy paper - congratulations! And what is your excuse for boring us to death, dear sir?

So what is your complaint

So what is your complaint with the article, exactly?

Are you saying that the current situation with Mono is somehow different, so what was written years ago doesn't apply?

Or are you saying that MS has changed as a company and no longer adheres to those philosophies?

Or are you just easily bored?

Clear as day

Microsoft go strictly by the 'secret' plan laid out in those documents; clearly the company strives by never, ever adapting its strategy to changing market situations and instead thinking up new programming-languages and multimedia-frameworks, NOT as a means of strengthening their own portfolio or promoting their own system, but ONLY with the hostile intent of undermining that every-looming threat of desktop-Linux' world-domination that otherwise would be just beyond the horizon...

Yes, in order to stop and crush us irreverent 1% of computer users who use Linux on the desktop Microsoft thinks it prudent to sink billions of dollars in wicked schemes, spies, saboteurs, and, oh, Windows, which of course also only was created to taunt us.

I don't say that I of all persons have the strongest grip on business-realities; but the author of that article we comment here has definitely lost it.

Edit: And yes, I believe that Microsoft has changed in one respect - back in the day they thought Linux might be a threat to them. But that threat never came to life. Now MS seems to have realized there might actually be money in co-opting Linux.

Microsoft bashers

Microsoft bashers are such morons.

What company, project, team, person, etc doesn't have a strategy to "win"?

Microsoft certainly does NOT have a monopoly on that idea.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Debian and Ubuntu

Development: JavaScript, PHP, and GCC

  • 10 JavaScript concepts every Node.js programmer must master
    With JavaScript and the V8 engine at the core, an event-driven architecture, and scalability out of the box, Node.js has quickly become the new de facto standard for creating web applications and SaaS products. Many frameworks like Express, Sails, and Socket.IO enable users to quickly bootstrap applications and focus only on the business logic.
  • PHP Tour - Nantes 2017
    As for every AFUP event, organization was perfect, and I was able to meet a lot of developers and PHP users.
  • More OpenACC 2.5 Code Lands In GCC
    More code for supporting the OpenACC 2.5 specification has been landing in mainline GCC.
  • D Language Front-End Proposed For GCC 8, 800k Lines of Code
    A set of 13 patches amounting to nearly 800k lines of new code were sent out Sunday morning for adding a D language front-end to the GNU Compiler Collection (GCC).

Security Leftovers

  • Researchers find Android design defects that allow attacks

    The researchers — Yanick Fratantonio of the University of California, and Chenxiong Qian, Simon Pak Ho Chung and Wenke Lee, all from the Georgia Institute of Technology — called it a Cloak and Dagger attack as it happened without the owner of the smartphone being aware that any attack had taken place.

    The attack does not exploit any vulnerability, but takes advantage of two permissions that are allowed for apps to use certain features on Android.

  • The internet of unreliable and broken things
    Fine, the current process is rocky. Some of that is that it’s not matured yet (Alexa, when did Vincent Price die? No, not “play vincent price die”, not “christ die”, not “do you speak some price dead”, you stupid pile of undocumented microchips!) Some of it is that basically every large company underestimates how much people’s accounts are set up incorrectly or incompletely; after all, employees have everything set up right, because they know what they’re doing, and so this never comes up in testing. Some of it is because I’m joining dots on three or four very different puzzles: I’m sure if I were to get a Google Home and use Google Mail to send my shopping list to Google Keep and then buy things from Google Shopping, or if I were to get some theoretical Home Siri device and play music from my Apple account and put things in my Apple iCloud account… then all this would be a lot more seamless. But you should beware people who proclaim that technology would be easy if all us heathens were just to renounce our diverse needs and join their true faith. Mastery goes to the designer who can cope with us real people, in all our glittering and varied patterns and colours and desires. Not just the ones who take the easy way out and block you if you haven’t already bought all the rest of your stuff from them too.
  • 9 Ways Organizations Sabotage Their Own Security: Lessons from the Verizon DBIR
    Datasets from the recent Verizon 2017 Data Breach Investigations Report (DBIR) show that some security teams still may be operating under false assumptions regarding what it takes to keep their organizations secure. For starters, the same security standards don't apply across all vertical industries, says Suzanne Widup, a senior consultant for the Verizon RISK Team and co-author of the Verizon DBIR.
  • “Yahoobleed” flaw leaked private e-mail attachments and credentials
  • Web Developer Security Checklist
    If you have drunk the MVP cool-aid and believe that you can create a product in one month that is both valuable and secure — think twice before you launch your “proto-product”. After you review the checklist below, acknowledge that you are skipping many of these critical security issues. At the very minimum, be honest with your potential users and let them know that you don’t have a complete product yet and are offering a prototype without full security.
  • Obstacles to the Adoption of Secure Communication Tools

    [...] we interviewed 60 participants about their experience with different communication tools and their perceptions of the tools' security properties. We found that the adoption of secure communication tools is hindered by fragmented user bases and incompatible tools. Furthermore, the vast majority of participants did not understand the essential concept of end-to-end encryption, limiting their motivation to adopt secure tools

  • VMware Patches Multiple Security Issues in Workstation
    VMware fixed two bugs in its VMware Workstation late Thursday night, including an insecure library loading vulnerability and a NULL pointer dereference vulnerability. The virtualization software company warned of the issues Thursday night in a security advisory VMSA-2017-0009.

Linux Devices, Tizen, and Android