States slam Google, Firefox as no match for Microsoft
'Internet platform' is a joke, antitrust officials argue
Computerworld - In a brief submitted to federal court, state antitrust regulators dismissed companies such as Google Inc. and Mozilla Corp. and technologies such as AJAX and software as a service as piddling players that pose no threat to Microsoft Corp.'s monopoly in the operating system and browser markets.
Ten states and the District of Columbia made the unusual claim to try to show that the operating system and browser spaces had changed much more slowly than expected in 2002, when state regulators and the U.S. Department of Justice brokered a deal with Microsoft in a long-running antitrust case against the company. The lack of change, they said, means that potential competitors need more time -- and judicial protection -- if they are to develop into real rivals to Microsoft.
"The relevant markets -- those for Intel-compatible PC operating systems and Web browsers -- have not experienced the rapid development that the court had anticipated they might when it limited the initial term of the Final Judgments to five years," the states argued in a Nov. 16 filing to U.S. District Court Judge Colleen Kollar-Kotelly. "This is a 'changed circumstance' that has an important bearing on whether the Final Judgments have had sufficient time to achieve the pro-competitive benefits that the court expected they would -- and that the public itself is entitled to receive."
Lead by California and New York, the states have asked Kollar-Kotelly to extend her monitoring of Microsoft's business practices another five years, until November 2012. In a series of legal filings since August, Microsoft and the DOJ have argued that an extension is unwarranted while the states have pressed for the longer oversight.
In their most recent brief, the states countered Microsoft's contention that Web-based companies -- Google, Salesforce.com Inc., Yahoo Inc., eBay Inc. and others -- and new Web-centric technologies constitute what Microsoft dubbed a "competitive alternative to Windows."
Not even close, said the states. "While these companies' products provide some functionality for users, they still depend upon a PC operating system and browser -- the two spaces where Microsoft dominates -- and thus they are not yet able to reduce the applications barrier to entry."
A pair of experts that the states hired to write rebuttals to Microsoft's position were even more damning. For all the talk about "OS agnostic" applications, Web. 2.0, Google's dominance in search and Firefox's inroads against Internet Explorer, the collective cannot compete with Microsoft where it counts, said Ronald Alepin and John Kwoka in separate reports filed along with the states' brief.
"The 'Internet Platform' ... does not even exist, much less constitute for the foreseeable future a practical or viable alternative to the desktop platform," said Alepin, a technical adviser at law firm Morrison & Foerster LLP, and a frequent expert witness for parties facing Microsoft in court. "Firefox has yet to reach a level of penetration and use that Microsoft's own internal measures indicate is necessary for survival and for the all-important ability to influence developer choices," Alepin added later in his rebuttal. "With a market share of less than 20%, Firefox does not have the influence to promote the adoption of alternatives to standards or extensions advanced by Microsoft."
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you like your iPhone, you can keep your iPhone. Period.
President Obama has revealed that he's not permitted to carry an iPhone. It's too insecure for the job, he says. Instead, he's stuck with a BlackBerry. Well, someone's got to have one still. However, it turns out that the Pentagon has also outlawed non-BlackBerry smartphones. In IT Blogwatch, bloggers joke that 2006 called and they want their smartphones back.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
- Review: Box beats Dropbox - and all the rest - for business
- Box trumps Dropbox, Engyte, Citrix ShareFile, EMC Syncplicity, and OwnCloud with rich mix of file sync, file sharing, user management, deep reporting and... All Government IT White Papers
- Video: 5 Secrets To Scaling Enterprise Apps Watch this video to learn how to successfully scale enterprise apps>>
- Collaboration 2013: Where Mobility Meets Connectivity Mobility and collaboration are quickly converging and users are demanding more capabilities. It's no longer enough to enable file sharing. This Webcast dives...
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.