Windows Vista

Epocrates software works on Vista

Apparently, it worked all the time.

Pursuant to my blog entry here, I received an email from Erica Sniad of the Epocrates team informing me of that fact and also of the reason why the email was sent out to their subscribers.

While I'm still somewhat miffed that the email was sent out at all, I must applaud them for taking the high road and declaring an upgrade verboten until they were sure everything worked.

After all, the information contained in their software concerned lives and health.

A redacted view of the email is supplied below.

Hello John,

Since you and your blog community have shown interest in this issue, we wanted to let you know that all Epocrates products (Palm OS and Windows Mobile) are compatible with the Windows Vista operating system

For Palm devices, our initial testing appeared to show problems, and we elected to take the conservative route and recommend that users delay upgrading. However, after more extensive testing, we are confident that the vast majority of users will have no problems installing and syncing Palm devices with Windows Vista systems. Users can refer to Epocrates’ Support page for more details.

Accordingly, I will upgrade my copy of Epocrates this weekend, and upon finding no errors, will advise my clients to do so in a flash SmallBizVista.com/Logikworx communiqué to be sent out on Monday, March 5th.

Thanks to you, Erica Sniad, and the Epocrates team for resolving this issue.

© 2007, John Obeto II for SmallBizVista.com®

UAC can be hijacked by social engineering

What is it with Symantec nowadays?

Could it be that they correctly foresee a dwindling in their fortunes with the 1-2-3 punch of Microsoft Windows Vista, Windows Internet Explorer v7, and Windows Live OneCare?

For days now, they have been sounding the horn over minutiae in Windows Vista's security blanket.

Yesterday, it was the architecture. Before that, Windows Live OneCare.

Today, it is UAC, as User Access Control is generally known, is the subject of another unfair attack by Symantec.

A report of supposed research by another faceless drone at Symantec declares that Vista's UAC can be compromised by a 'social engineering' attack.

Pray tell, what OS isn't prey to such an attack?

What a stupid stream of FUD by a formerly relevant company. And one headed by a Brotha' no less!

Is this how good companies start their death spiral?

A shame.

© 2007, John Obeto II for SmallBizVista.com®

4200+ downloads of the Vista Assessment Tools

Coincident with the public release of Windows Vista and the 2007 Microsoft Office system, Microsoft on February 20, 2007, released a series of Vista Assessment tools, six in number, for partners to utilize in identifying and migrating users to the new operating system and desktop productivity software suite.

Microsoft is reporting that in the eight days since, there have been over 4,200 downloads by (Microsoft) Partners of the tools leading to increased sales and opportunities.

For the record, Microsoft has had over 20,000 downloads of the tools since their beta debut in August of 2006.

As a user of the tools, especially the Application Compatibility Toolkit (ACT) and the Solution Accelerator for Business Deployment Desktop 2007 (BDD 2007), I fully concur on their immediate usefulness, and the ability it gives me to leverage the knowledge gleaned from the generated reports into solid sales.

© 2007, John Obeto II for SmallBizVista.com®

Dell to sell Linux on systems

If Mikey thinks that this is the way to get back on top maintain #2, he is sorely mistaken.

According to the number of yobs posting on the Dell Ideastorm web site, Linux, instead of crapware-free Windows installs, seems to be the numero uno problem users have with his systems.

Mick, step away from that IT crack pipe and shake the wax offa your head! OK?

If you take that totally unscientific sampling as gospel, what you will find out, to the detriment of DELL holders, is that you have just been had by the most vocal group of biped a$$wipes on Terra.

Listen Mike, what you need to do, is meet with forward thinkers, internal to Dell and without, and create an extraordinary OOBE for your users.

And I don't mean the crap loaded on your systems for a vig from the companies. All those time-bombed pieces of crap just serve to piss users off. Not to mention the 3-versions late software as well.

What you want to do is get Bruce Kasrel and the Live group from Microsoft to deliver an experience worthy of your name. And it is your name on the company, Mikhail!

And make those vendors give your users a year's worth of software for placement with your users. If they believe in their products, then they should believe that there is enough of a valueadd in their products for users to re-up at the end of a year.

Right now, what separates you from anyone else?

  1. Everyone else is also as cheap.
  2. You all deliver the same crappy sales experience.
  3. Your customer service does a disservice to the phrase.
  4. And your technical support is both useless and utterly incompetent.

So just what is your differentiator?

The pittance you get from each crapware vendor cannot be worth the dilution to your brand, Mickey!

As for the default installs, remember, Windows Vista. And with a concession to your software ho's, add a menu asking users if they want the software installed on their systems. Give them the option to install the crap.

BTW, you would find out that after the 10,000 or so Linux fans who might order from you, the spigot would dry up; then what are you going to do? What about the investment in certifying your systems for Linux? For what amounts to less than a rounding error?

There is a reason Linux has 1.5% or so of client computers: outside of the IT 'ivory towers': no one, but no one, gives a fu*k about it. They want Linux, have them do what what they have done so far, download, compile and whatnot.

Please return to the astute guy who ran PCs Limited, and please, pretty please, don't pick up the stupid Linux crystal meth that Linux fanboi is trying to get you to smoke or whatever they do with that illegal substance.

If not, Dude, nobody will be getting a Dell!

© 2007, John Obeto II for SmallBizVista.com®

Microsoft calls out Blue

In this post in The Hive, member Waggler comments on IBM's underhanded, yet increasingly vocal opposition to Microsoft's Open Office XML document specification.

IBM's moves in this regard make the cowardly lion in Alice in Wonderland seem most fierce.

How insidious is this wink-wink, FUD-FUD campaign?

However, the following is my reply to the post.

(Edited to allow language not allowed in The Hive.)

Why should we blame IBM?

The culprit here is Microsoft.

Yes, Microsoft!

Listen, you do not go to a gunfight with a Taser®.

Where has Microsoft been all this time?

Even now, the letter and the problem, does not seem to be addressed at the highest levels. I know those guys are, by all indications, very important to the Office dev/mktg team and Microsoft, but to everyone else outside their locus of authority, just who the fuck are they?

For this, you need Bill Gates. You need Steve Ballmer. Heck, I’ll even take Margo Day (Have you listened to that woman speak? After a speech from her, you just want to get out there and move a whole lotta Microsoft stuff!)

You need someone to take a Martin Taylor-like position and slam those donkeys at IBM.

I think Microsoft’s counter attack has to come from the very highest levels; with the executive at Microsoft taking the fight to the leaders of those countries that are trying to lead their cattle people down that path.

It was this sort of belated lukewarm response that allowed the open source tossers the opportunity to gain a foothold in the EU and LDCs because those same asswipes could point to the lack of a fierce response from Microsoft as either arrogance, or worse, indifference.

Every time I come across those same arguments, I kick them down by asking, when was the last time the head of technology assessment for the country looked at source code or expressed a wish to do so. However, the inclusion of such source code as been sold to those fools as a way of equalizing technology. Go figure!

Moreover, the counterattack has to be swift, sufficiently sarcastic, loud, coherent, consistent, and long-lasting.

It is one thing to stand and attack with Apple, since the charisma delta between St Steven Paul 1 and Bill G. is pretty wide to the general public, though not to us in the industry.

It is another thing entirely to lose a PR battle to that invisible, creepy Palmisano.

Are you fuckin' kiddin’me?

That guy is so bland, even CPAs don’t want to hang with him.

So, Microsoft, MSFT has been doing well, please keep it that way and get the VITOs out.

And in full force!

My blog post about IBM’s deceptively named ‘Open Client’ is here.

Notes:

  • LDC: Less-developed country, the PC name for 3rd World country.
  • VITO: Very Important Top Officer
  • Martin Taylor: Where is this dude?

© 2007, John Obeto II for SmallBizVista.com®

Epocrates: Don't Install Vista

Add Epocrates to the list of the absurdists.

In a missive sent out via email yesterday, Epocrates, the budding online and PDA-based physician and healthcare provider formulary software ISV, asks users not to install Vista due to installation or synchronization problems with Vista.

Are you freakin' kiddin' me?

Correct me if I'm wrong, but didn't these yum-yums see Vista approaching?

Then they send out a memo 2 weeks after the public release of Vista?

It took the fu*kers 2 weeks after public release! And nearly 3 months from RTM!

You can imagine how pissed I was, getting a number of calls from physician clients whose practices are slated for upgrading to Vista asking me to explain the memo to them. (After all, they are just doctors, speaking or writing English is foreign to them!)

Looking into my own Epocrates account - got to stay abreast as well - I found the email, and flipped.

I asked all of them a simple question: since when have I been notifying them about Vista; inventoried their hardware and software for Vista, and generally prepped them about the advent of Vista?

Since January 2005, that is when!

So, what is the value of a company that makes a widely-used program cannot either engage Microsoft at a level that would produce dividends for them, or get into the beta test program in order to produce a shim for current programs while developing a Vista-class product?

I am undertaking a personal quest to find a replacement for this product as all credibility they may have had with me, and by proxy, Logikworx or any related companies just went bye-bye with that idiotic email memorandum.

© 2007, John Obeto II for SmallBizVista.com®

Office 2007 sales up 109% out the door

Where's Gartner?

I'm sure they have an explanation for this 'aberration'.

© 2007, John Obeto II for SmallBizVista.com®

Secrets of a clean Vista install

Ed Bott is showing why he's much respected and a very good read in this article which shows how to do a clean install of Vista on a partition already occupied by a previous-generation Windows installation.

Thanks, Ed.

© 2007, John Obeto II for SmallBizVista.com®

Microsoft settles Iowa Suit

What a land grab!

Now Microsoft can go on without this distraction from a bunch of country-bumpkin Playa' wanna-bes.

The morons running the antitrust department in Des Moines have absolutely no clues about monopolies.

If they did, they should have brought a suit against AAPL for being a monopoly as well.

EDIT:
I am reminded by Royce that Mississippi still has a pending antitrust action against Microsoft.

To which I answer, "Mississippi? Pfeui!"

© 2007, John Obeto II for SmallBizVista.com®

Windows Home Server

The Microsoft Windows Home Server group is about to open this wonderful new experience to a larger group.

As a current beta tester, I can assure you that it is such a required product for multiple-PC homes that it's obviousness should have smacked the powers-that-be at Microsoft square on the forehead before now!

Anyway, the link to register for an invite is here. (Connect account and Windows Live ID required)

My friend Mauricio Freitas, Editor and founder of Geekzone, and a Microsoft MVP for mobile devices, has a couple of nuggets for prospective testers:

  1. Read the manual. For this device more than at any other time, and also because,
  2. It reformats ALL hard drives connected to the server, since the Windows Home Server is a dedicated device.

Thanks Mauricio.

Remember, this device is headless, and just does assigned tasks.

© 2007, John Obeto II for SmallBizVista.com®

Why Vista matters

Got Vista on your brain?

Read this article by Darryl K. Taft in eWeek.

(Link edited at 3.28pm Pacific to point to longer version of article.)

Excerpts:

  • "So building Windows applications just got easier and much more exciting,"
  • "I'm not just talking about the new Aero look and feel, but Vista itself has superior rendering capabilities due to its new WDDM (Windows Display Driver Model) to leverage the power within the video graphics cards,"
  • "However, it's now clear that smart application developers and technology product marketers will build killer applications using Vista's advanced graphics and communications technology,"
    Schadler said. The New York Times' Times Reader, a Vista-based beta application, is one such application, he said.
    "It's the visuals and the underlying capabilities made manifest in killer applications that will convince consumers to upgrade," Schadler said. "It took only one application to convince me: the Times Reader."

Read the entire article.

Now I ask again: Got Vista?

Go get it, now!

Better yet, ask me how - only if you are/represent a small to medium-sized business.

© 2007, John Obeto II for SmallBizVista.com®

Project Glidepath Windows Vista Spotlight Launches!

If you're into MicroISV applications, you cannot afford to miss this.

Plus, the site looks fab! (Or whatever name is currently hip.)

© 2007, John Obeto II for SmallBizVista.com®

Jobs: No DRM is good.

Is it now, Stevie?

When did you get religion, SJ?

For years, you had the option of licensing your DRM to others in order to create seamlessly-interoperable storefronts.

Did you, Steveski?

The coming flap over the closed DRM in your iPods in the EU has you sweating, eh, Stevorino?

What, the 20 iTMS songs bought for iPod sold, which has held steady did not make you do it, Steven.

This is not for the consumer, you smug-faced hypocrite, it is to protect your iPod sales, S.

Have you forgotten, Stephan, that you are on record as saying that iTMS is just there to facilitate more iPod sales and not the reverse.

Shake yourself, and get offa the "high road", dude!

© 2007, John Obeto II for SmallBizVista.com®

Bill Gates on Trustworthy Computing

If you think security and trustworthy computing do not have the attention of the executive branch at Microsoft, think again.

From his email newsletter, Bill Gates writes:

During the last decade, digital technology has changed the world in profound and exciting ways. Today we communicate instantly with the people we care about without worrying about traditional limitations of time and location. At work, we collaborate with colleagues in distant cities. Global supply chains enable businesses to manufacture products and move them to market with incredible speed and efficiency. Mobile devices ensure that we are productive no matter where we are.

But these changes are just the beginning. As more and more of the world's information, commerce, and communications moves to digital form, it will open the door to a new world of connected experiences that link our interests and our communities into a seamless whole that extends across home, work, school, and play.

Already, a new generation of technology is transforming expectations for how we will conduct business, communicate, access entertainment, and much more. Increasingly, people envision a world of anywhere access - a world in which the information, the communities, and the content that they value is available instantly and easily, no matter where they are.

Of course we're not quite there yet. But whether we get there or not is no longer a question of the power of our devices and the speed of our connections. The real issue today is security. Ultimately, anywhere access depends on whether we can create and share information without fear that it will be compromised, stolen, or exploited.

The answer lies in trust - in creating systems and processes that are always secure so that people and organizations have a high degree of confidence that the technology they use will protect their identity, their privacy, and their information. This is an imperative that transcends any one company. Success will require hard work and extensive cooperation between companies, governments, and organizations from around the world.

Trust and security are critical priorities for Microsoft. Because you are a subscriber to the Microsoft Executive Email program, I wanted to share my thoughts with you about the changing nature of security and the work that is being done at Microsoft to advance trust in computing and to help pave the way for future connected experiences based on secure and easy anywhere access.

Connectivity and the Evolving Threat Landscape

Today, connectivity - the basic foundation for anywhere access - can be a double-edged sword. Connectivity that streamlines the flow of information and communications can also open the door to malicious users. Meanwhile, where publicity once motivated many digital attacks, criminal financial gain is behind most security threats today. So in addition to viruses and worms, we must contend with spyware that logs keystrokes; rootkits that are used to hijack computers; and social engineering threats where criminals try to trick people into divulging the personal data needed to exploit digital information.

How widespread is the problem? In the United States last year, security breaches - some inadvertent, some purposeful and criminal - exposed the personal information of more than 100 million people. In 2005, 46 percent of fraud complaints filed with the U.S. Federal Trade Commission were Internet related. A 2006 report from the Cyber Security Industry alliance noted that 50 percent of Internet users are afraid their credit card information will be stolen. No company is immune to the danger. Malware targets products from virtually every software vendor. Every business is vulnerable to the risks that come with unauthorized access to corporate information.

In this changing threat environment, striking the right balance is extremely difficult. Easy access speeds communications but increases the danger that confidential information will be exposed. Stringent security measures reduce risk, but can make it too difficult for employees to access information or communicate with customers and partners and too complex for IT professionals to deploy and manage solutions.

The Road to Trust

Achieving the levels of trust needed to make connected experiences based on anywhere access possible will require an industry-wide effort to change the way we approach digital identities, build networks, and protect information.

The evolution of identity: The proliferation of identities and identity systems is a significant problem and a difficult challenge. We all struggle to remember an ever-growing number of user names and passwords as we move between systems at work and home. Because it is unlikely that a single digital identity system or technology will be universally adopted, a different approach is required - an approach based on creating a system of systems that provides the interoperability needed to link all identity solutions and technologies. This "identity metasystem" will be able to take advantage of the strengths of existing and future identity technologies while enabling the creation of a consistent and straightforward user interface. Solutions built on top of this metasystem will enable digital identities to be managed and protected effectively and easily.

The evolution of networks: To resolve the tension between providing access and maintaining security, new technologies for managing the way people and information move between corporate networks and the Internet are essential. In the face of a rapidly evolving threat landscape, the firewall - the fundamental tool for managing network security today - is no longer adequate. A better approach is security that is based on policy. With policy-based security, the rules that govern access to networks, resources, and information can be enforced seamlessly across platforms and devices.

The evolution of protection: It is impossible to overstate the importance of providing the right levels of privacy and information protection so that users can trust that their information is secure. To achieve this, we must be able to protect information not only when it is in transit, as we do today through encryption, but also on the server, the desktop, mobile device, and wherever else it may reside. Policy will also play an important role in the evolution of protection. By applying policy when information is created, we can enable information to flow freely and safely across systems and networks while maintaining appropriate control over how it is used, and by whom.

Security, Reliability, and Privacy: Trustworthy Computing at Microsoft

At Microsoft, Trustworthy Computing provides the foundation for the work we do to create trusted computing experiences. Announced five years ago, Trustworthy Computing is a core principle that places security, reliability, and privacy at the center of all of our efforts. One example of the impact of Trustworthy Computing is the Secure Development Lifecycle, a rigorous software development process that makes security a critical focus for every line of code that we write.

Trustworthy Computing is an important reason why Windows Vista is the most secure operating system that Microsoft has ever delivered. Developed from the ground up using the Secure Development Lifecycle process, Windows Vista includes new security features that help computer users protect sensitive information and give IT administrators new ways to protect corporate networks and preserve data integrity and confidentiality.

Windows Vista also offers new controls that enable parents to manage exactly what their children can do on the computer. These controls allow parents to restrict computer use to specific times and determine which games their children can play, which programs they can use, and which Web sites they can visit.

The 2007 Microsoft Office system and Microsoft Exchange Server 2007 were also built using the Secure Development Lifecycle, and they include a wide range of new security features that help protect against phishing scams and other threats to privacy and information security.

Together, Windows Vista, the 2007 Office system, and Exchange Server 2007 represent an important step forward in Microsoft's efforts to deliver tools to help protect information and privacy. And we continue to focus on developing comprehensive security solutions for consumers and businesses that provide more secure, controlled access to information and network resources. Examples include:

Windows Live OneCare: A comprehensive service for consumers, Windows Live OneCare automatically manages important PC maintenance and security tasks.

Microsoft Forefront: Designed for businesses, Microsoft Forefront is a family of security products that provides advanced protection against the latest threats and enables secure access across client operating systems, application servers, and the network edge, with a focus on simplified management and integration with existing IT infrastructure.

Identity Lifecycle Manager 2007: Building on Microsoft Identity Integration Server, Identity Lifecycle Manager 2007 adds new capabilities for managing strong credentials such as smart cards while providing an integrated approach that links certificate and password management and provisioning across Windows and enterprise systems.

Windows CardSpace: An important component of Microsoft's efforts to create an identity metasystem, Windows CardSpace enables any Windows application to provide users with a common way to work with digital identities so that people can use their digital identities on any machine, running any operating system.

Achieving Trust Through Industry Partnership and Collaboration

Before trust can become a reality, systems, processes, programs, and applications must work together reliably and securely. That is one important reason why Microsoft is committed to interoperability: before digital identities and information protected by policy-based security can move seamlessly between platforms and devices, systems must be able to interoperate. Today we are working closely with governments, organizations, and partners to create and implement industry-wide standards that will enable systems and applications to work together so that connectivity can be seamless and pervasive, and people can access digital information more securely no matter where they are or what device they have at hand.

Examples of industry partnerships and initiatives aimed at enhancing interoperability and improving trust and security include:

Interop Vendor Alliance: Launched in November, 2006, this global group of software and hardware vendors is working together to enhance interoperability through scenario-based testing and by sharing information about interoperability solutions with customers.

Microsoft Network Access Protection (NAP): This policy enforcement platform built into Windows Vista and Windows Server "Longhorn" helps ensure that only safe devices can access networks. More than 100 technology partners in the networking and security industry have joined the NAP ecosystem and have products that work with NAP.

SecureIT Alliance: This Web-based community was created to enable companies across the industry to develop, enhance, and promote applications that interoperate with the Microsoft platform. A central clearinghouse for security technology professionals, the SecureIT Alliance includes more than 100 members from countries around the world.

In addition, during the development of Windows Vista, Microsoft worked closely with leading security companies including Symantec and McAfee to provide technical support resources, access to application testing and compatibility labs, and developer training. Our goal is to ensure that our partners have the information they need to provide consumers with a broad range of security and safety software and services that can help to make computing experiences safer from the moment they begin using Windows Vista.

Today, nearly 1 billion people use digital technology in their day-to-day lives to communicate, connect, and create. As we continue to work together as an industry to create trust, we will be able to deliver incredible new connected experiences that transform the way people explore ideas, exchange goods and services, teach and learn, and share experiences with the people they care about. In the process, we have the opportunity to bring new levels of value and excitement to each of those 1 billion people, and hundreds of millions more.

Bill Gates

Putting their money where their collective mouths are, right?

© 2007, John Obeto II for SmallBizVista.com®

Jim Allchin's last post on the Vista Team Blog

Full text:

As most of you know, today is my last day as a fulltime employee at Microsoft. It’s been an exciting 16+ years and all I can say is that I have been very fortunate to have had the opportunity to be in this industry and at Microsoft. What an incredible chance to work with such a great set of people. I was also very fortunate to be in an environment that allowed me to work on a team that was able to have such a positive and significant impact on the way people play and work with technology.

What’s truly amazing to me is that we are just at the beginning for what technology will be able to do. The next 50 years are going to be much more exciting than the last 50 (and that’s saying a lot!) when you consider the potential impact technology advances will have on people and businesses.

Lots of people have been asking me what comes next. In the long term, I can tell you honestly that I don’t know. While the term “retire” has been used to describe people at all stages of their lives as they leave a job, for a guy my age it’s a pretty strange term. I’m not exactly the golfing type. I am looking forward to spending time with my family and frankly getting some rest.

While I don’t know what I will be up to in the long term (although charity will be one key focus), I have a pretty good sense of what I will be doing in the near term, so I thought I would share what I think a typical day might look like.

It might go something like this:

  • 7:00 AM: Breakfast with my sons. Ended up doing a product comparison review of the various cereals we had in our pantry. Sugar does beat the natural stuff and my suspicions about the impact of packaging on the post purchase experience were spot on. It turns out the box does matter.
  • 7:40 AM: Kids off to school.
  • 7:45 AM: Went to check email. Only two pieces.
  • 7:46 AM: Checked network connection to see why I am not getting any email. Everything working perfectly.
  • 8:00 AM: Went to clean up the playroom so that it’s organized for when the kids get home. Ended up building an application to sort the Legos using a SQL Server backend and a Windows Presentation Foundation front-end on Windows Vista. Can’t decide whether the primary index of the database should be color or size of the piece. While searching the web discovered that Lego means “I put together” in Latin.
  • 9:30 AM: Spent 45 minutes looking around the house for the big refrigerator with the free soda just like Microsoft – was unable to find it.
  • 10:15 AM: Worked on my Windows logo latch hook rug – another couple days and I’ll finish the red.
  • 11:00 AM: Watched Rachel Ray – god is she engaging. Maybe she should do the launch of the next version of Windows.
  • 11:30 AM: Checked mail again. No messages.
  • 11:31 AM: Turned off Spam filter.
  • 12:00 PM: Went out to lunch with my wife. Was surprised to see so many other people out for lunch during the week. I wonder if they have been buzzing around for all of these years that I have been in building 26.
  • 1:30 PM: Went to check out the Apple store at University Village to see what all of the hype was about. Ended up demoing Windows Vista for all of the employees (and a few customers). All they could say was “Wow.” Ended up leading a group of them over to BestBuy to help them pick out new PCs with Windows Vista pre-loaded. Need to go to the Bellevue store tomorrow.
  • 3:00 PM: Checked email. 150 unread messages. Unfortunately, 149 of them were spam.
  • 3:10 PM: Turned Spam filter back on.
  • 3:15 PM: Went to drive the afternoon carpool run. Spent 20 minutes waiting in line behind other parents whose kids weren’t even outside yet. Need to write paper about Next Generation Carpool Queuing solution (NGCQ) that integrates Windows Live Presence with the driveway scheduler. Must get appointment with school principal when it’s done.
  • 4:00 PM: Home with the boys. Went to the playroom to help them build a train layout. Ended up doing interoperability test to study compatibility issues related to using Thomas trains on Brio track. Turns out while they work, the trains perform better on their native platform. Need to try Brio trains on Thomas track tomorrow.
  • 4:30 PM: After a phone call with my Mom, I decided I needed to configure her account as a standard user for Windows Vista. This gives new meaning to “parental controls”, but a son has to do what a son has to do.
  • 5:00 PM: Dinner with the family. After they finished asking who was this strange man sitting at the dinner table, we had a great conversation about the kids’ day. May have spent too much time asking them “how they would have done things better” and “what do they see as their key areas for growth.”
  • 6:45 PM: Read kids a bedtime story. They seem to be recently interested in “chapter books.” I was amazed by how quickly they feel asleep when I read them one of my favorite classics, “The Theory of Recursive Functions and Effective Computability” by Rogers.
  • 7:30 PM: Checked email. Again. No new email.
  • 7:31 PM: Turned Spam filter off again.
  • 8:00 PM: Went down to my music room to play my guitar. Dozed off on the couch.

Anyway, on a serious note, a few months ago, when I decided to start blogging, a lot of people thought I was crazy. It was certainly an experiment, but in the end it’s been very rewarding for me, and I hope that you’ve enjoyed it as well. I’m about to walk out the door, so clicking “post” on this blog will be my last official act as a Microsoft employee.

I love this company, and I have the utmost confidence that the great people here will continue to bring their creativity, passion, and drive to building world-class software that help our customers do amazing things.

See you on the Internet,

jim


From the Windows Vista Team Blog

Apple to be bigger than Microsoft in 5 years?

If the doofus who came up with this drivel still has his/her/its job, I want to know why?

Don't 'analysts' have editors/bosses/whatever that they supposedly answer to before the publication of such crap?

Clients, feel free to vote with your collective feet!

Forbes.com on Vista's prospects

Apart from absolutely bonehead articles like this here, Forbes magazine, and Forbes.com continue to deliver accurate business information.

This article, titled Teflon Windows, is indicative of the cred' Forbes has with the financial community and that I have blogged about here and here.

Excerpts:

So what happened? Well, there are now 665 million copies of XP installed worldwide, giving it 74.3% share of the PC installed base. Other versions of Windows account for another 190 million units, or 21.6% share.

The Mac, for all of Apple's snazzy advertising, has less than 1.6% share of the PC installed base. Linux, for all of the millions of column inches devoted to its wondrous abilities (many of those lines by yours truly), holds about 2.5% share.

[...]

Another reason: With 3,000 Microsofties blogging, and Microsoft’s two Internet TV channels drawing a combined 4.5 million viewers each month, the company doesn’t need to rely on the mainstream media as much as it used to.

Most telling though, is the conclusion of the writer:

I’ve been running Vista for a while now on one of my older PCs. This machine doesn’t have enough memory or processor power to run the full-blown Aero interface. So all I’m using is the low-end “Basic” version of Vista.

But I can say this much: The upgrade from XP went off without a hitch. Vista figured out what hardware I had, and automatically set itself to run in Basic mode. It immediately found all of my peripherals. (By contrast, my recent installation of Novell's SLED 10 Linux desktop required a special visit to a Novell engineer, and a few hours of custom hacking on his part.)

Performance on the Vista machine is great--it’s faster than on any of my Macs, .......

In other words, things are fine. I’ve had no headaches on the Vista machine. No crashes, no hang-ups.....

And although I still prefer the Mac, I’m sure that, as my pals at Microsoft would no doubt be very glad to tell me, it doesn’t really matter what I think. Vista is going to be huge, no matter what.

And that is a jaded reviewer with no doubt a jaundiced eye.

However, can you imagine what a regular user would feel.

Ladies and gentlemen:

The WOW! has started!

© 2007, John Obeto II for SmallBizVista.com®

Technorati tags: , , , , , ,


Jim Allchin

Thank you and farewell.

Over the years, anyone with any knowledge of Windows has come to appreciate and respect the way Jim Allchin managed the team.

On the client side, Jim was tasked with preserving and extending the most important, and undoubtedly the most valuable brand in technology, Windows.

And what a remarkable job he has done!

While America slept, and contrary to the beliefs of mainstream media, Jim and his team delivered several updates to Windows since the debut of XP:

  • Windows XP Service Pack 1 & 2
  • Windows XP x64
  • Windows XP Media Center Edition
  • Windows XP Starter Edition
  • Windows XP Tablet PC Edition
  • Windows XP, Ultra-mobile PC edition.

As he rides off into the sunset of his life at Microsoft, Jim Allchin leaves with the knowledge that his indelible mark is upon the next version of Windows, Windows Vista™, and the way most of the world would be computing for the next several years.

Thank you, Jim.

Adiós.

Not even Alex Bell had the chutzpah!

Not even Alexander Graham Bell had the chutzpah to bestow all those nonsensical platitudes on the first telephone as Steve Jobs did on the iPhone iBrick.

But, worse than Stevie is the media, especially mainstream media and Apple fanboi.

Following the press conference, they all anointed the iBrick as the second coming.

Wow.

Are you freakin' kiddin' me?

Have they no shame?

In one fell swoop, HTC, Motorola, Nokia, Sony Ericcson, etc., etc, are irrelevant?

Can someone perform emergency recto-cranial de-insertion surgery on all these tossers? Please? Pretty please?

People, back away from the ether and regain your senses.

Then revisit your articles/posts/blogs/whatever, and redo the absolutely stupid and hypocritical banalities in the fishwrap/glossy/whatever medium you morons earn your pitiful remuneration.

Sheeez!

© 2007, John Obeto II for SmallBizVista.com®