Did Microsoft steal DOS from CP/M? There’s $100,000 in it for you if you can prove they did.
Start with what we know.
John C. Dvorak wrote an analysis of how Microsoft lost its way with Windows 8 this week.
All in all it sounds reasonable to me. His recollection of DOS and some DOS version 8 confused me at first, but that was what the DOS buried in Windows ME was called. But mentioning it is appropriate, because it shows how DOS faded from center stage to being barely visible in the end, to the point where it was difficult to dig it out, and that it took 15 years for it to happen. He’s completely right, that if Microsoft had pulled the plug on DOS in 1985, Windows would have failed. Read more
This week, Mark Shuttleworth closed the longstanding Ubuntu bug #1, which simply read, “Microsoft has majority market share.” Because Microsoft didn’t lose its market share lead to Ubuntu, or Red Hat, or some other conventional Linux distribution, some people, including John C. Dvorak, are interpreting this as some kind of surrender.
I don’t see it as surrender at all. Microsoft’s dominant position, which seemed invincible in 2004 when Shuttleworth opened that bug, is slipping away. They still dominate PCs, but PCs as we know it are a shrinking part of the overall computing landscape, and the growth is all happening elsewhere.
I have (or at least had) a reputation as a Microsoft hater. That’s a vast oversimplification. I’m not anti-Microsoft. I’m pro-competition. I’m also pro-Amiga, and I’ll go to my grave maintaining that the death of Amiga set the industry back 20 years. I have Windows and Linux boxes at home, my wife has (believe it or not) an Ipad, and at work I’m more comfortable administering Linux than Windows right now, which seems a bit strange, especially considering it’s a Red Hat derivative and I haven’t touched Red Hat in what seems like 400 years.
What Shuttleworth is acknowledging is that we have something other than a duopoly again, for the first time in more than 20 years, and the industry is innovating and interesting again. Read more
It’s interesting that I read two things about buying Twitter publicity today: John C Dvorak’s experiment for PC Magazine and an interview with my classmate and friend Ken. The idea is that people buy Twitter followers to make themselves look bigger than they are, whether they’re celebrities trying to make themselves look like they’re on their way up rather than down, or, like the scam my friend discovered, indie book authors trying to build a following.
This week I posted a link to a video showing how to crack a WPS-enabled wifi network, and this week, Ars Technica wrote a firsthand account of cracking a password list. I’m sure this raises questions of ethics in some people’s minds. To be honest, spreading this kind of information makes me a little uncomfortable too, but I also think it’s necessary.
John C Dvorak is raving in PC Magazine about Netgear wireless routers and range extenders and how easy WPS makes it to set them up–and providing some very seriously flawed security advice along the way.
“Note that WPS is crackable by serious hackers using brute-force attack, but any SOHO user not dealing with government secrets should be fine.”
I saw the headline on Slashdot: Forensic evidence trying to prove whether MS-DOS contained code lifted from CP/M. That got my attention, as the connection between MS-DOS and its predecessor, CP/M, is one of the great unsolved mysteries of computing.
Unfortunately, the forensic evidence doesn’t prove a lot.