I was chatting with a colleague here at BZ Media’s New York headquarters office (I’m based near San Francisco, but trek out to NY every few months) about how companies react to negative coverage… and remembered this gem from The SCO Group last summer.

The June 12, 2006, edition of SD Times News on Monday, an e-mail newsletter, carried a “Zeichick’s Take” column entitled “It’s Time for Darl to Go.” I wrote:

In its relentless drive toward ever-bigger losses, The SCO Group passed a milestone with its most recent quarterly earnings: Its losses exceeded the ongoing costs of its famous intellectual-property litigation. That means that even stopping the soap-opera legal proceedings wouldn’t return the company to profitability.

The numbers are grim. For the quarter ending April 30, 2006 (whose numbers were released this week), SCO lost US$4.69 million on sales of $7.13 million. That compares pretty badly with the same quarter in 2005, where SCO lost $1.96 million on sales of $9.25 million.

According to the company’s financial reports, “Legal and other expenses incurred in connection with the Company’s litigation with IBM were $3,762,000 for the second quarter of fiscal year 2006. Because of the unique and unpredictable nature of this litigation, the occurrence and timing of certain expenses is difficult to predict, and will be difficult to predict for the upcoming quarters.”

Further, the company says that the last year it was profitable was in the four quarters ending on Oct. 31, 2003—and that the company’s accumulated deficit has reached $236 million. The company’s piggy bank is getting low, too. SCO reports that cash, cash equivalents and available-for-sale marketable securities now stand at only $18.62 million, down over a million dollars over the past three months.

No matter how you slice it, SCO is crashing and burning.

If you read through the company’s own financial documents, the business is fraught with peril. On June 5, the company released a prospectus for the sale of about 2.1 million shares of common stock by some stockholders (SCO itself wouldn’t see any of the proceeds.) The prospectus admits that “We do not have a history of profitable operation,” among other things, and provides a laundry list of reasons why SCO is, basically, a bad bet. A terrible bet.

The question remains: What are the owners of SCO going to do about this? Are they going to let Darl McBride, their president, CEO and chief champion of this ruinous legal fight, destroy the business? Maybe SCO’s lawsuit has legal merit (I don’t know—I’m not a lawyer), but despite the genuine innovations that SCO’s developers have created, the company is a pariah and a disaster.

It’s time for management changes. The current board of directors consists of McBride, R. Duff Thompson, Ralph J. Yarro III, J. Kent Millington, Omar Leeman, Edward E. Iacobucci, Darcy Mott and Daniel W. Campbell. Gentlemen, it’s time to perform your fiduciary responsibilities to your shareholders—and fire Darl McBride.

SCO’s reaction was swift and hilarious. They didn’t contact me or any of the other editors, but their then-head of corporate communications, Blake Stowell, wrote to one of SD Times’ advertising sales representatives:

I know there is supposed to be a very concrete line between the advertising staffs and editorial staffs of publications, but when SD Times puts out an article like this at the very time that we are looking to possibly do something to market to the developers that subscribe to your publication, it seems EXTREMELY counter-intuitive for us to do ANYTHING at all with SD Times. Any campaign we might do with your readership would fall on deaf ears and be a complete waste of our money after an editorial like this one.

After conferring with me, our sales rep responded to Blake,

One of the reasons SD Times is valuable to readers (and the industry) is because of its independent view and editorial, given much of our coverage is on vendors and their products. An editorial opinion in our email newsletter by no means indicates all our readers agree or disagree. I respectfully submit that your advertising message with SD Times would strengthen your position with our readers and the industry. As you know, all companies face adversity as a part of their progress, but having a continued presence and consistent message will endure in the minds of consumers.

Please do not forgo reaching a readership that can make a difference in your business. Again, I understand your position and your hesitation to proceed with an advertising campaign with us. My hope is that I can communicate to you the integrity we have as a news organization, the value and importance of our product and our audience, and most importantly, how we can help you grow as a company.

The follow-up came from another person with SCO. This person is not named because he’s still at SCO; Blake left a few months ago:

My challenge as director of SCO Marketing is that I’m ready to launch a significant campaign and had the SD Times at the top of our list for an integrated campaign. While the previous coverage is appreciated, what is seared in minds here is the latest message from your magazine and it has made it a VERY hard sell for me to convince executive management to let me use SD Times, even though it is probably the best vehicle for me to use. To have a magazine call for the removal of our CEO makes my job a whole lot harder internally and externally. At this point, I’ve been told to look at several other alternatives.

That was the end of the conversation… and you know, I haven’t seen that “significant campaign” appear anywhere. Maybe they really were planning something big, but my call for Darl’s removal scuttled their entire marketing program. Or maybe these were empty words intended to punish SD Times and attempt to ensure that future opinion essays and editorial coverage would be more positive.

Another day in the life of a publishing company… and I still think that SCO should fire Darl McBride.

Z Trek Copyright (c) Alan Zeichick

Want a free book? I’m giving away two different titles:

The first is “Software Security: Building Security In,” by Gary McGraw. Gary covers just about every aspect of software security, from risk management to code reviews, from testing to case development.

The other book is “The Software Vulnerability Guide,” by Herbert “Hugh” Thompson and Scott Chase. It’s a really strong book for both Java and .NET developers – very practical, stuff you can put to use right away.

How do you get free books? If you register to attend the 4th Software Security Summit, and use a special code, I’ll send you your choice of these books. This offer is for a “full event pass,” which gets you into everything: the full-day tutorials, the technical classes, the keynotes, everything.

The keynotes are, by the way, by Gary McGraw and Hugh Thompson. You’ll receive your book when you check into the conference. Track Gary and Hugh down, and ask ‘em to autograph your book.

The conference is April 16-17, in San Mateo, Calif. Here are the codes:

If you’d like Gary McGraw’s “Software Security: Building Security In,” register with the special code ALZ1.

If you’d like Hugh Thompson and Scott Chase’s “The Software Vulnerability Guide,” register with the special code ALZ2.

See you at the conference!

Z Trek Copyright (c) Alan Zeichick

As you know, Daylight Savings Time (DST) in the United States was changed by an act of Congress, so that it starts earlier this year. For me personally, it’s been a bigger nuisance than Y2K (which wasn’t a nuisance at all).

Here are three personal anecdotes:

1. On Sunday morning, I used my Garmin StreetPilot c550 to get to a friend’s house. (They live in a maze in Foster City, Calif.) I noted that the time was incorrect on the GPS. Today, on the Garmin Web site, I saw that on March 8 the company posted a firmware patch. So, in addition to the numerous software patches for my Windows and Mac computers, I also need to patch my GPS.

2. On Sunday night, I flew on the red-eye from San Francisco to New York City. All the clocks inside the United airlines lounge at SFO were wrong. Every few minutes, an announcer came over the public address system to remind everyone that the correct time was one hour later than shown on the clocks.

3. This afternoon, I was scheduled to have a conference call with a company at 4:00 pm Eastern time. I called into their bridge line – and was told that the passcode was invalid. I emailed the guy who set up the conference, and he replied saying that the combination of their Exchange Server group calendar and the Cisco Unified MeetingPlace software that schedules their phone bridges messed up. Although Exchange correctly adjusted the meeting times for DST, the MeetingPlace software didn’t sync with those adjustments. Therefore, Exchange knew the meeting was at 4:00 pm, but MeetingPlace set up the phone bridge to activate at 3:00 pm. The solution: He had to delete all future meetings set up with the MeetingPlace phone bridge and re-schedule them, in order for the system to work correctly.

Think about all the productivity wasted, and all the hard and soft costs, of this change to Daylight Savings Time. It’s hard to believe that the potential benefits (in theory, reduced energy consumption), is worth the inconvenience and expense that this has caused.

Please share your DST horror stories, large or small… and whether you see any benefit at all to the DST change, or to DST at all.

Z Trek Copyright (c) Alan Zeichick

The Screen Actors Guild is beefing up the software security embedded inside its pension and health plans, spending half a million dollars to protect its data. The county government in Anne Arundel County, Virginia, was paralyzed for more than a day after an attack last week.

Vulnerabilities were found in Google Desktop, where hackers could exploit cross-site scripting flaws in Google.com to read end users’ files or even run remote applications. The Web site for the Florida Marlins was hacked before the Superbowl to include an exploit that could install malicious software on browsers that didn’t have the latest security patches.

That’s all recent news, not ancient history. The more than we expose our applications to the Internet, the more vulnerable they are to attack. Because applications are increasingly interconnected, through Web services, trust networks, single sign-on, SOA and mashups, each vulnerable application represents a significant threat to the entire enterprise data center – and our increasingly distributed IT infrastructure.

Network firewalls can’t protect you; many attacks are generated internally, or have an “inside job” agent. Intrusion detection systems can’t protect you; the network traffic is legitimate, it’s what it’s trying to do that’s malicious. Authentication systems can’t protect you; often the attacks come from publicly accessible resources, or from authorized accounts (which might have been compromised). Virtual private networks can’t protect you; they guard the pipe, not the endpoints. The only thing that can protect you is properly written software.

The solution is developer training. Too many software developers simply don’t understand the fundamentals of creating secure applications. They’re so focused on software features, platform compatibility and run-time performance that there’s literally no time left for using the right coding techniques. Similarly, architects often don’t know the security aspects of their designs, and testers are focused on requirements – which rarely spell out the security vulnerabilities that an application must guard against.

For that reason, I invite you, and your architects, developers and testers, to the 4th Software Security Summit – the only technical conference that’s 100 percent focused on helping you write more secure software, and helping you secure the software that you already own. It’s not about networking, it’s not about VPNs, it’s not about firewalls… it’s about software development. (I’m the chairman of this year’s event.)

The two-day conference, held April 16-17 in San Mateo, Calif, has a strong program for everyone on your team. There are solid keynotes from Herbert “Hugh” Thompson and Gary McGraw. There are full-day tutorials on breaking software security, creating enterprise software security standards, and creating a plan for improving your software security.

The technical sessions cover everything from cross-site reference forgery to source code analysis, rootkits to SQL injection. There are specific sessions on securing Windows/.NET, Java EE and AJAX applications. New for this year are classes designed for the software development manager, addressing organizational issues that lead to software security problems.

The Software Security Summit is one conference that you and your team can’t afford to miss. There are discounts if you register by Friday, March 16. I look forward to seeing you there.

Z Trek Copyright (c) Alan Zeichick

In my blog comments about the 2006 ACM A.M. Turing Award, won by Frances E. Allen, I wrote, “It’s a shame that it’s taken 40 years to recognize the first woman for the most prestigious award in computing.”

A reader responded sardonically:

I guess the Lady Admiral who wrote Fortran wasn’t very important… So I won’t bother to even name her. After all, she only worked for the U.S. Government and not a large conglomerate like IBM…

Without detracting from Fran Allen’s justly deserved honor, the reader brings up a valid question. Why wasn’t Adm. Grace Hopper recognized as a Turing Award winner? I’ve asked the ACM, which promises that the Turing Award Committee will have a response to me shortly.

My first thought was that the Turing Award wasn’t given out posthumously, and so there wasn’t time to give her the honor. No, that can’t be it. The A.M. Turing Award was first offered in 1966. Adm. Hopper passed away in January 1992, so, there was plenty of time to give her the Turing Award. In fact, the very first Turing Award went to Alan J. Perlis, who died in February 1990.

It can’t be that the ACM didn’t recognize Adm. Hopper’s contribution. Indeed, since 1971 the ACM has offered the Grace Murray Hopper Award, given out to outstanding young computer professionals. (The first recipient of this award was Donald Knuth, who won the Turing Award three years later.)

I’ll be curious what the Turing Award Committee has to say on this subject.

While we wait, I’ll relate one anecdote about Adm. Hopper, who has long been a personal hero. The expression “computer bug,” or “there’s a bug in the system” dates back to Sept. 1945, when Adm. Hopper “debugged” a Mark II Aiken Relay Calculator by removing a moth stuck between two relay points.

Adm. Hopper’s notebook — with the poor moth taped to the page and the comment, “first actual case of bug being found” — is on display at the U.S. Naval Surface Weapons Center in Dahlgren, Va., where I worked in the early 1980s as a DoD contractor. Discovering that moth, and her notes, created a wonderfully tangible connection to the early days of computer science.

Z Trek Copyright (c) Alan Zeichick

I love my new Apple MacBook Pro, but I’ve been frustrated at how slow it seems, compared to my first-generation Intel-based 20-inch iMac. On the face of it, the MacBook Pro should blow the iMac out of the water. However, when the machines are running with lots of applications, the 15-inch MacBook Pro is a tortoise, the iMac is a hare. Starting apps and switching apps seems instant on the iMac, but lags on the MacBook Pro.

Why should that be? Let’s compare specs:

Processor:
The iMac has a 2.0GHz Intel Core Duo
The MacBook Pro has a 2.33GHz Intel Core 2 Duo

(Note: the current iMac models use the Core 2 Duo processor. Mine is over a year old.)

Memory:
Both machines have 2GB of 667MHz DDR2 RAM, in two 1GB sticks

Ethernet:
Both machines have Gigabit Ethernet linked to a GigE switch

Graphics:
The iMac has an ATI Radeon X1600 with 128MB RAM
The MacBook Pro has an ATI Radeon X1600 with 256MB RAM

To make a long story short, what’s killing me is the hard drive. This dawned on me when I started keeping the Apple System Profiler open on my screen. When the machine slowed down, the amount of virtual memory was huge – 8GB, 9GB, 10GB or more. The access speeds out to the spinning drive was clobbering everything. (As I write this blog entry, the MacBook Pro has 65 processes running with 235 threads, and is using 12.14GB of virtual memory. That’s a lot of disk I/O.)

Hard drive interface:
Both machines use Serial ATA, supporting up to 1.5GB/sec. In fact, they both use the same Intel ICH-7M AHCI chip.

Hard drive:
The iMac has a 3.5-inch 250GB Western Digital Caviar WD2500JS drive (pictured), running at 7200RPM with a 300MB/sec interface, 8MB buffer, and 32-step native command queue. It has an average seek time of 8.9ms.

The MacBook Pro uses a 2.5-inch 200GB Toshiba MK2035GSS drive, running at 4200RPM with a 150MB/sec interface, 8MB buffer, and a 4-step native command queue. It has an average seek time of 12ms.

Yep. There it is. My beautiful notebook is creamed by a slowly rotating hard drive with a slow interface. This swamps the benefit of the faster, more advanced microprocessor. Grrrr.

I’m not mad at Apple: Their online system configurator stated that the 200GB drive was a 4200RPM model. If I’d selected a 160GB drive instead, I would have had 5400RPM. I chose capacity over speed. That may have been a mistake.

In today’s multithreading, multitasking world, disk performance matters! Whether you’re running Windows, Linux, Solaris or Mac OS X, all modern operating systems make extensive use of virtual memory. So, next time you spec your server, your desktop or your laptop, get the fastest freakin’ hard drive available – look at interface, look at rotation speed, look at buffer, look at seek time.

A faster disk is going to make as much difference, in real-world performance, as a faster processor. Probably more.

Z Trek Copyright (c) Alan Zeichick

When was the last time you asked your general contractor if the company had a power-tool standard, and whether it was Makita or DeWalt? Does your auto mechanic use wrenches from Sears or Snap-On?

When I talk to carpenters, electricians, plumbers and other professionals, I’m engaging them to perform a task. I assume that they have the the right tools for the job, and they know how to use them.

It’s not that simple with software development. Yes, our industry has reached a level of maturity. We can safely assume that all the tools are, generally speaking, pretty darned good. You can write great code with Eclipse. You can write great code with NetBeans. You can write great code with Visual Studio. You can write great code with BEA Workshop and CodeGear JBuilder and Apple Xcode and Oracle JDeveloper and the IBM Rational Software Delivery Platform and you-name-it.

But having an IDE is not enough. The fact that you’ve bought a development environment that integrates many functions is not nearly enough.

You don’t expect a drill to help ensure that your house meets safety specifications. But you could, and should, expect your software development tools to play an active role in helping build better business applications.

What matters, truly, are platforms and applications. You don’t engage a plumber to use a welder and pipe-cutter; you engage a plumber to stop a leak or install a new bathtub in your home. Similarly, enterprises don’t hire programmers or engage consultants to use Eclipse or NetBeans or Visual Studio. CIOs and CTOs pay these people to develop applications that advance the business.

That’s not to say that tools aren’t important. Carpenters need saws, plumbers need torches, and programmers need IDEs. Picking the right tool for the job is essential. However, the metric shouldn’t be “does the IDE enable the creation of good code.” They all do — just like both Makita and DeWalt drills can make clean holes, and Sears and Snap-On socket wrenches can all remove spark plugs.

Writing good code and fast code is easy for a professional developer. We’ve done that, even before today’s crop of super-sophisticated IDEs. The true test for tools makers is: How does their tool help your enterprise developers solve business problems? Do they support your vertical market or vertical application? Do they enforce security? Do they nurture best practices? Do they support the full application life cycle, or smoothly interoperate with other ALM solutions?

Of course, we don’t expect our cordless drill to interoperate with our welding torch and with our screwdriver set. That’s where software development and plumbing are just a little bit different. Too many writers stretch this analogy too far. We don’t expect Makita to document New York City building codes, but we should expect development tools and platform makers to worry about Sarbanes-Oxley and buffer overflows.

As I return from EclipseCon this week, it’s clear that enterprise programming isn’t just about banging out code. Not any more. It’s about building business applications. Challenge your tools providers to talk about how their products actively facilitate the creation of business applications. Because you already know that they handle the easy stuff: coding.

Z Trek Copyright (c) Alan Zeichick

I’m not always a fan of The Onion, but they outdid themselves this week with “Apple Unveils New Product-Unveiling Product.”

Even amid fevered speculation, Apple was typically mum before the launch product’s launch, and Mac rumor websites failed to predict any major details about the new offering, other than the fact that it was going to “change everything” and “be huge.”

It’s almost crazy enough to be credible. Where can I buy one?

Z Trek Copyright (c) Alan Zeichick

Please, please, please, please, please. Don’t allow the use of cell phones on airplanes.

I can sympathize completely with the philosophy espoused by Fortune columnist Stanley Bing in a piece in the Mar. 5 issue called “Called to His Reward.” (Oddly, in their online version, it’s called “Great big cell phones in the sky,” and dated Feb. 23.) This essay describes how unbearable life will be if/when the FAA and FCC allow the use of cell phones during commercial flights.

Last week, I was flying to a meeting in the midwest U.S., routing through Denver. The moment the plane landed, a passenger two rows behind me whipped out her phone, and started making calls. She returned voicemails, she phoned her husband, she burbled baby-talk to a young child, she arranged for ground transportation, she gave instructions to her assistant, she rescheduled a meeting, she talked and talked and talked in a very loud voice.

And talked and talked. It turned out that our plane had landed early, and the gate at Denver wasn’t ready yet. So, we sat on the tarmac for about half an hour, while this well-dressed, obviously successful, young executive talked

and talked

and talked

and talked

and talked

and talked.

Everyone within at least six rows of her could hear every word of every call. Toward the end, many of us were chatting, quite audibly, about her and her calls; my seatmate and I had an active running commentary. The young executive was quite oblivious. We were all mostly bemused by her cluelessness and, frankly, self-centered rudeness.

This was bad enough.

But imagine the day when she — and many others — will talk and talk and talk throughout flight, for hours and hours. And there’s just about nothing that you can do about it. If you can’t imagine it, read Stanley Bing’s article.

For the sake of civilized society, please, FAA and FCC, please don’t allow cell phones to be used during flights.

Z Trek Copyright (c) Alan Zeichick

A few weeks ago, my colleague Edward Correia struck a nerve with his Feb. 22 Test/QA Report essay about team leaders behaving badly. We got some great letters from readers, some of which I included in my blog entry on the subject.

Now, in yesterday’s Test & QA Report, Eddie has gone a step beyond merely publishing some of those letters. In “No Shortage of Bad Leaders Out There,” he ran some of the most egregious reader responses past Dr. Linda Burrs (pictured), an expert in organizational leadership and management. She offers comments and guidance on their specific situations.

However: Dr. Burrs points out (and I agree), that things aren’t always what they may seem to be: Bad boss behavior does not always appear in a vacuum. “It’s important to note, Burrs says, that some unpleasant work situations are the result not of a boss behaving badly, but might be representative of a boss behaving negatively to an employee behaving badly.”

Thanks, Eddie, for a great follow-up newsletter.

Z Trek Copyright (c) Alan Zeichick

Yesterday was the first day of EclipseCon, and I spent the afternoon in the Annual General Meeting of Eclipse Membership. This is where you hear people like Mike Milinkovich discuss the plans for the Foundation moving forward. New members are also introduced around, there are discussions of marketing, and so-on.

An important part of the meeting was a discussion of the forthcoming Europa “simultaneous release,” scheduled for June 29. According to Bjorn Freeman-Benson, Europa is on track. Milestone 5 came out on Feb. 24, and Milestone 6, which locks down the APIs, is set for Apr. 7. Currently, there are 25 projects set for inclusion in the Europa event; that’s an ever-changing number.

There was a bit of unexpected news: Skip McGaughey, one of the prime movers of the Eclipse movement, will be retiring from the Eclipse Foundation at the end of May. He was given a great T-shirt that said something like, “I helped create a multi-billion-dollar ecosystem and all I got was a lousy T-shirt.”

The Members Meeting often includes interesting talks by outside experts, and yesterday was no exception. There were two this year. Brent C. Williams, a financial analyst, talked about the evolution of the open source business model. James Governor, a principal at analyst firm Redmonk, shared his advice for future directions of the Eclipse community.

After the Members Meeting ended, it was time for the second annual Eclipse Community Awards; as one of the judges, I was asked to participate in the ceremony.

The winners fell into two broad categories: individuals within the Eclipse community; these were chosen by ballot; and products/companies, chosen by outside judges (like me).

The Individual Award Winners this year were:

Top Ambassador
: Chris Aniszczyk
Top Contributor
: Kimberley Peter and Tom Schindl (tie)
Top Committer: Ed Merks
Top Newcomer Evangelist: Daniel Megert

The Technology Awards went to:

Best Open Source RCP application
: PSICAT
Best Commercial RCP application
: TIBCO Business Studio
Best Open Source Eclipse-based Developer tool: eclipse-cs Checkstyle Plugin
Best Commercial Eclipse-based Developer tool: QNX Momentics IDE
Best Deployment of Eclipse technology in an enterprise: JPMorgan Chase

Congratulations to the winners! I’ll be back down at EclipseCon again today.

Z Trek Copyright (c) Alan Zeichick

A couple of weeks ago, I joined a petition started by Ian Skerrett, director of marketing for the Eclipse Foundation, urging Sun to send its NetBeans Girls to EclipseCon this year. Sun brought the young emissaries to the conference next year, where they were welcomed in good cheer by EclipseCon attendees.

Given that both Eclipse and NetBeans are open-source software development platforms that primarily benefit Java developers, I was glad that Sun was engaging in some good-natured fun. After all, whether developers are using Eclipse or NetBeans, the odds are good that they’re using Sun’s Java platform.

However, it doesn’t look like Sun wants to play this year. According to Roumen Strobl (pictured), a member of Sun’s evangelism team, “I discussed this issue with my manager and we can send NetBeans girls to EclipseCon if you will cover all the expenses connected with this trip,” including accommodation, meals and other related expenses.

That’s a pity. I’ll be at EclipseCon most of this week, and hope to see you there, perhaps at my session, “Working with IT Press,” on Thursday.

Separately, Sun has announced a NetBeans Software Day at its JavaOne conference. NetBeans Software Day will be on Monday, May 7. I’ll be there as well. I wonder if Ian will send some Eclipse Girls (or Eclipse Boys) to NetBeans Software Day?

Z Trek Copyright (c) Alan Zeichick

The principal techies at software security company Cigital have started an intriguing new blog called Justice League. Gary McGraw, Cigital’s CTO, described the blog to me as “an eclectic collection of opinions about software security and software quality.” That certainly fits the first few postings (the blog started on Tuesday, Feb. 20), which were a combination of discussing Cigital’s security solutions and thoughtful tech-talk about things like Sarbanes-Oxley and Service Oriented Architecture.

The full team of bloggers are Gary (pictured), Pravir Chandra, Scott Matsumoto, Sammy Migues, Craig Miller and John Steven. That’s a pretty solid crop of experts. Gary, in fact, is the keynote speaker at the 4th Software Security Summit, April 16-17 in San Mateo.

Z Trek Copyright (c) Alan Zeichick

The latest financials for the SCO Group show that the company’s revenues continue to shrink. For their first fiscal quarter of 2007, which ended on January 31, SCO reported gross revenue of US$6,015,000, compared to $7,343,000 from same quarter of the previous fiscal year. That’s a fall of 18 percent.

However, SCO seems to have slowed the bottom-line hemorrhage. For the first quarter, the losses were $(1,024,000), instead of $($4,581,000) from the same quarter in 2006.

A statement from Darl McBride, SCO’s president and CEO, attributed the declining revenues to “continued competitive pressures” on the company’s Unix products and services. The smaller-than-expected losses were attributed to a significant decrease in litigation costs against IBM and Novell – legal fees were only $654,000 for the first quarter of 2007, compared to $4,010,000 for the first quarter of 2006.

When you consider that SCO not only offers a decent operating system in its Unix distribution, and also has released some truly innovative solutions for mobile computing, such as its new HipCheck software, one can’t help but feel a sense of a wasted opportunity. If only SCO had decided to compete in the marketplace of ideas, instead of trying to litigate its way to a quick fortune, the company might have been a profitable powerhouse and McBride would have been hailed as a visionary leader. Instead, SCO is a failure, and McBride is a pariah. It’s truly a waste. But, by focusing on the courts instead of focusing on creating great products for his customers, McBride brought it on himself.

The best that we can hope for is that when SCO collapses, its products will be acquired (at fire-sale prices) by other companies who can make them successful in the market.

The March 15, 2007, issue of SD Times has some compelling coverage of SCO, and predictions about its future from some leading analysts. You’ll enjoy reading it.

Z Trek Copyright (c) Alan Zeichick

No, this isn’t about one of those ubiquitous charities, advertising on the radio that they want you to donate your car, running or not in most cases, in exchange for a potential tax deduction. Instead, this is about sending the entirely wrong message to your happy customers.

My wife received an e-mail this morning from Acura of Serramonte, the dealer in Colma, Calif., where she had purchased a new 2006 Acura TSX sedan last July. (The Acura replaced a 1999 BMW 528i, also known as “the piece of junk that spent all its time in the shop,” but that’s another story.)

The e-mail said:

WE WANT YOUR CAR!

We need nice Acuras for our used car inventory. We”ll pay top dollar for your car – paid for or not.

My wife is incensed. She loves her shiny green TSX, which we took to Santa Barbara last week for a short vacation. It’s stylish, it’s extremely comfortable, it has great fuel efficiency, it’s fun to drive, it has tons of safety features, and it has all the toys. “Why do they want me to sell my new car?” she fumed. “Do they expect that I’m dissatisfied with it already?”

Maybe this is an accepted practice in the used-car business, trying to get people to sell back their just-purchased cars to build up inventory. But what a mean-spirited message for the dealer to send to a very satisfied customer: that she should dump a car that has only 7,200 miles and is half a year old.

Z Trek Copyright (c) Alan Zeichick

My session at EclipseCon, “Working with the IT Press,” has been scheduled and rescheduled a few times, but now it appears have solidly landed: Thursday, March 8, from 10:10 – 11:00 am. EclipseCon is at the Santa Clara Convention Center; this class should be in Grand Ballroom C.

You can read the full description at the EclipseCon 2007 site, but the gist is that this is a session advising people and companies how to work more effectively with reporters/editors on trade publications about news stories, new product/project announcements, product reviews and more.

This is the latest iteration of an presentation that I created in the early 1990s, and have presented dozens of times at many different venues. I hope to see you there.

Z Trek Copyright (c) Alan Zeichick

Which browser do YOU use? In a completely non-scientific study, the chances are that you use Firefox. You’re probably also using Windows.

I was examining the FeedBurner stats for this blog, which arguably is read by a technically savvy subset of the computer-using world. Specifically, the subset that is aware that you can choose which browser you use, and are not locked into the one which shipped with your operating system, or which your operating system manufacturer urged you to install. Further, this is a subset that knows how to evaluate a browser.

FeedBurner told me that we had the following usage for Friday, Feb. 23 (a day which had heavier-than-usual traffic):

Firefox 2.0.x: 39%
Firefox 1.5.x: 13%
All Firefox: 52%

Internet Explorer 7.x: 20%
Internet Explorer 6.x: 11%
All IE: 31%

Safari: 5%
Mozilla: 5%
Others: 7%

Among other things, FeedBurner also logs the operating system from the browser request.

Windows XP: 52%
Windows 2000: 4%
Windows Vista: 1%
Other Windows: 3%
All Windows: 60%

Mac OS X (Intel): 17%
Mac OS X (PowerPC): 6%
All Mac OS X: 23%

Linux: 16%
Others: 1%

Please consider this to be just one data point – but it is an interesting one.

Z Trek Copyright (c) Alan Zeichick

January’s proposal of a Threading Maturity Model (ThMM), both in my blog and in SD Times, has inspired some thought-provoking conversations. So far, nobody has proposed any changes to the model. I’ve been impressed by several writings that comment or expand on the ThMM, which ranks an organization’s or team’s threading skills and practices.

First, my colleague (and SD Times columnist) Larry O’Brien has proposed a complementary Personal Threading Maturity Model (PTMM), a five-point scale ranking individual progress toward mastery of threading. “An organizational model is necessary because, as with object orientation, it does not suffice for a single person to have mastery or near-mastery; the average ability of the team must be at least fair in order to maintain quality,” he writes.

Michael Suess writes, in his blog entry Parallel Programming is Entering the Mainstream – or isn’t it?, that “Alan Zeichick is convinced that parallel programming (threading in this case) is conquering the desktop.” Well, that’s not quite what I said or meant; the ThMM isn’t focused on the desktop, and the goal is to measure competency, not predict market penetration. Beyond that, he makes some excellent observations: “Refactoring a big, existing codebase to use threads or some other parallel programming model is a huge undertaking (sometimes even comparable to a total rewrite)…. If, on the other hand, the technical leadership of a software shop acknowledges the risk and decides to act in anticipation of the problem, a migration may be started early and will go more smoothly because there is more time to get everything right.”

Rob McCammon goes farther, talking about developing a multi-core readiness plan for embedded projects. “This is why I believe that any development team that sees a transition from a single processor to a multi-core processor on the horizon must develop a multi-core readiness plan. Not doing so is like mounting an expedition to Mount Everest by simply making your way to base camp and trying to figure it out as you go from that point forward,” he says.

Michael Cassens suggests in his blog that “the average lifespan of a new consumer computer is 3-5 years. This means that within the next year or two, most computers will have at least a dual core system inside. I think consumers will continue to demand more responsive software and their data needs are only going to grow. I think that all developers will have to be at a high level of adoption in the next few years or they will be left behind.” Further, he adds, “The article suggested that most corporations are in Tier 1 or 2 at the moment. There is definitely an interest in parallel programming, but dual core and quad core systems are going to force developers go beyond just hobby programming and integrate these solutions in their production level applications.” I agree completely.

David Dossot goes in a similar direction as Larry with his Threader Maturity Model, which also focuses on individuals, not organizations. It’s interesting to compare and contrast their different five-step scales. I like his fifth level: “Adoption. This is also known as Being Brian Goetz. At this level, the developer has an intimate knowledge of the memory model, the concurrency mechanisms and all that pesky internal details. He is able to think in all the dimensions of multi-threaded development (time, space and whatnot). Nirvana is nearby.” Brian Goetz is an extremely well-respected Java guru, and his newly published Java Concurrency in Practice is outstanding.

Z Trek Copyright (c) Alan Zeichick

As I just told a time-wasting caller from a public relations agency in San Francisco, “Any PR professional who would pitch an editor based on information in Bacon’s MediaMap is not a PR professional.”

Bacon’s and MediaMap are always-out-of-date directories that lazy PR professionals use to learn about upcoming feature articles in trade publications like SD Times or Software Test & Performance. (MediaMap merged with Bacon’s in 2003.) These and other “PR aggregation” services were useful 10+ years ago, when trade publications only offered printed editorial calendars, which the media directories conveniently amalgamated together.

However, today, nearly all trade publications place their editorial calendars on the Web, and include the appropriate contact information.

PR professionals should use the up-to-date information provided by these publications (as a service to the PR community) instead of using the out-of-date information provided by the media directories to pitch the wrong editors at key publications about the wrong stories.

Best case: PR professionals should know their top-tier media targets, and read them regularly. For upcoming stories, work directly from each publication’s Web-based editorial calendar. To find the right reporter, look at the online beat list and check the bylines on recent, relevant coverage. This will yield the best, most timely, most accurate, most complete results.

Almost as good: Prospecting using Bacon’s MediaMap or another media directory, but then verifying the information using the publications’ Web-based editorial calendars before picking up the phone. Of course, you’ll miss stories that aren’t listed in Bacon’s MediaMap, but that’s what happens when you’re lazy.

Not good: Making pitch calls or sending e-mails based on Bacon’s MediaMap or another media directory, and thereby wasting your time and annoying editors who haven’t been the appropriate contact for years, or asking questions about stories that nobody’s ever heard of. If your excuse is that you don’t read my publication, even on the Web, then, I have no sympathy whatsoever.

>> Update 2:40 pm Pacific: I’ve had some nice private comments about this post — mainly from tech journalists who share this frustration, but also one from a senior PR professional who said, essentially, “Hey, Alan, what do you expect?” I’ve also stumbled across three interesting blog postings from early 2006 that discuss Bacon’s MediaMap, from Steve Rubel, Sherri and Karen Sams.

Z Trek Copyright (c) Alan Zeichick

There’s more to life than high-level languages, like Java, C/C++ or C#. Perhaps we’re witnessing a new era, the age of scripting languages. They’re faster to code in, better suited to tasks such as Web development, easier to learn, and highly portable.

What scripting languages have lacked, however, have been a wide variety of professional-grade tools purpose-built to accommodate their unique characteristics. Sure, there have long been some great tools, such as ActiveState’s Komodo IDE and powerful super-editors like MetaEdit+ or Visual SlickEdit. But for the most part, script-writers have been forced to shoe-horn themselves into generic IDEs, or use text editors like vi, BBEdit or even Notepad. (By tools, I don’t just mean an editor; I mean everything from design/modeling to coding to static/dynamic testing to deployment.)

Thus, my pleasure this week at CodeGear’s announcement of Delphi for PHP, a visual RAD system for PHP-based Web development. It’s got editing and integrated debugging – the same resources, in fact, that Delphi has offered for Object Pascal shops for quite a few years. Delphi for PHP is a huge step forward, not just for script-language developer, but also for the new Borland subsidiary. (I saw a prerelease build of Delphi for PHP in my recent visit to the CodeGear campus, and was impressed with what I saw.) It’s expected to ship in March.

Also this week, Microsoft shipped final versions of several free tools to help IT administrators deploy Windows Vista and Office 2007 ; I haven’t worked with any of them. They include:

Application Compatibility Toolkit 5.0 helps resolve potential application compatibility issues encountered when moving to Windows Vista.

Windows Vista Hardware Assessment 1.0 inventories all PCs on a business’s network without installing any software agents on each PC, assesses their hardware and device compatibility with Windows Vista, and generates a set of upgrade recommendations.

Microsoft Volume Activation 2.0 activates multiple Windows Vista-based PCs in which are covered by volume license agreements.

Key Management Service for Windows Server 2003 hosts a local service that is used during the Windows Vista activation process without sending information to Microsoft.

Solution Accelerator for Business Desktop Deployment 2007 bundles some of the tools above with deployment guidelines.

>> Update 10:15 am PT: Reposted because I had originally referred to Borland instead of CodeGear. Old habits die hard.

Z Trek Copyright (c) Alan Zeichick

I can’t be the only person envisioning the chest-worn combadges from Star Trek: The Next Generation. A new product from Ekahau Inc., which bills itself as “the leading provider of Wi-Fi-based Real Time Location Systems,” has just announced a wearable two-way communications device based on 802.11 wireless networks.

The T301-B badge, according to the company, is designed for hospitals and enterprise campuses, where it’s important to be able to both locate and communicate with individuals, leveraging the WiFi network instead of using an outside paging service or a private paging system.

It’s not quite Star Trek yet. There’s no voice capability or point-to-point communciations, but there is text messaging, colored lights and buttons. To quote from the company’s news,

The T301-B tag is the industry’s first tag that combines location capabilities with a display, which supports wireless text messaging and enables users to acknowledge messages by using the tag’s two integrated call buttons. By incorporating this functionality into the tags, enterprises are able to use their own Wi-Fi networks for tracking applications and two-way communications, rather than managing and paying for separate paging services.

The T301-B tag will incorporate audible alarm signals, multicolored LEDs and a screen to provide messaging capabilities. As a result, the Ekahau system can provide audible, visual and text-based alerts or work-flow messages to individuals carrying or using the T301-B tags, much like traditional paging or text messaging services.

The T301-B badges are expected to begin shipping in the second half of 2007. The future gets closer every day. Energize!

>> Update 7:42am PT: Swapped out the Star Trek combadge graphic with a picture of the T301-B, kindly provided by Ekahau.

Z Trek Copyright (c) Alan Zeichick

Dear reader,

I’ve made some changes to the way the blog handles RSS, and I’m told that this has “bumped” some people off the feed. If you’re one of them, please renew your feed. Please accept my apologies for any inconvenience!

Z Trek Copyright (c) Alan Zeichick

Here’s a petition I can wholeheartedly support: Ian Skerrett, director of marketing for the Eclipse Foundation, is urging Sun’s CEO, Jonathan Schwartz, to send his NetBeans Girls to the EclipseCon conference again this year.

Please join me in signing onto the Committee To Have the NetBeans Girls Return to EclipseCon.

(Photo credit: Don Smith)

Z Trek Copyright (c) Alan Zeichick

Edward Correia’s column in this week’s Test & QA Report really struck a nerve with readers. My colleague was writing about “team leaders behaving badly” — that is, bosses that yell at you in front of coworkers, or who ignore you for weeks on end. That sort of thing.

There was some great feedback, some of which I’m sure you’ll see addressed in a future Test/QA News. But here are four excerpts from letters:

1. It seems that when middle- and lower-management openings become available, a company just fills the slot and does not train the individual on how to lead. To make it worse, the company may not back the manager up in crisis situations sending the message that the manager and their insight is unimportant. Faith is lost in the entire project and upper management. The middle- and lower-manager begins to speak disparaging comments about upper management to their subordinates. If you have a 5 yr old child screaming, flopping around and behaving badly, do you blame the child, or the parents? It is usually like that with employees it seems. The parents have not led by example (which includes accountability) or else (barring mental illness) the child would be more controlled. If managers behave badly as described in your article, and employees lose inspiration and focus (resulting in undesirable behavior such as not giving their all), then a mirror needs to be held up from the highest level down to the lowest level of the organization and each person asking, what have I done to contribute to this problem? Unfortunately based on my experience, instead of honest self-assessment, the result is finger-pointing and people being let go (under the guise of top grading).

2. Wow, you are so right. I have unfortunately experienced coworkers and leaders behaving badly throughout my career. Many years ago, I had a coworker take credit for my work. It was my first year out of college. I immediately reported him to my manager. He soon was no longer with the company and I was promoted. Just recently I had a manager who was into blaming me for everything that was wrong instead of coaching me and helping me to succeed. He was only here 6 months and in that short time managed to completely alienate almost everyone in the department. Morale was very low, and nobody that I talked with liked him. I was about to talk with Human Resources about him when a reorganization was announced and he was gone. Everyone was elated! I now have a new manager who understands my career goal is to become a leader in our organization and is genuinely interested in helping me achieve that goal and is giving me the coaching I need to help me get there.

3. I work for such a bad boss. He encourages people in my office, to be dishonest, and make false statements about co-workers he does not like. The victim is then punished , and the person who discredits them is rewarded. The Ethics Group in my company has been aware of it, and yet does nothing.

4. Good leaders must recognize talent, especially when employees demonstrate the ability to meet new challenges critical to the survival of key projects. Leaders must develop key relevant skills in their existing staff whenever possible, much like a good coach will keep his promising new quarterbacks on the bench until they have become seasoned and developed the necessary maturity and stamina to become a major contributor. Good leaders must recognize that consistent performers occasionally need a change of venue and allow them to groom newer employees to take over key tasks in their absence. It is not enough to have a successful team. Good managers must always be on the lookout for new opportunities that can be quickly handled by members of the staff.

Have you had experiences like that? Share them with us — and let us know what you did about it!

Z Trek Copyright (c) Alan Zeichick

Of all the major commercial versions of Unix, HP-UX is the one that I’ve spent the least time with. Other than exploring it on a couple of PA-RISC boxes, and then on an HP Integrity Itanium 2-based server, I have little feel for the unique characteristics and features of this venerable operating system, compared to, say, Solaris, AIX or UnixWare.

However, I was please to see last week that HP continues to invest in HP-UX 11i, and still supports both the PA-RISC and Itanium 2 processors. In conversations with PA-RISC users, they’re fanatical in their devotion to that chip, and singularly unenthusiastic about migrating to the Itanium processor. (However, change is inevitable. HP has stated that the current shipping version of the processor, the PA-8900, will be the last, so migration is inevitable.)

What’s new in HP-UX 11i v3? According to HP, the focus of this release has been on performance tuning (with claimed improvements of up to 30 percent) and on better support of virtualization:

HP-UX 11i v3 delivers enhancements in virtualization and performance that prepare customers for today’s and tomorrow’s most demanding workloads and data explosion.

HP-UX 11i v3 expands its mission-critical virtualization leadership with:

* OS performance accelerated through kernel optimization, an increase of 30% on average compared to version 2 running on the same hardware;

* Scalability expanded to almost unlimited storage capacity while simplifying storage management;

* Availability and manageability increased through hot swap for hardware components and self-healing I/O.

* Flexible capacity enhanced, with uncompromising uptime, with the ability to dynamically move memory among vPars. (vPars is available on mid-range and high-end servers).

I welcome your comments regarding HP-UX 11i, the PA-RISC 8900 processor, and the HP 9000 (PA RISC) and HP Integrity (Itanium 2) server families.

Z Trek Copyright (c) Alan Zeichick

My column in this week’s SD Times News on Thursday has elicited some positive feedback. In “Snacks in the Break Room,” I shared some thoughts inspired by a chat with WebMethods’ Miko Matsumura regarding SOA governance.

One point regarded the constast between a policy-based SOA arrangement between corporate IT and service departments (which I term “demand-comply”) and an agreement-based SOA arrangement between a company and its outside service providers (“request-respond”).

It’s worthwhile pondering the balance-of-power relationship between service providers and their customers (who willingly enter mutually beneficial agreements), vs. the arrangements between centralized IT and its internal customers (where the terms of the engagement are dictated by top-down policies or executive mandate, not negotiated between peers).

Z Trek Copyright (c) Alan Zeichick

Remember Ingres? That’s a name with a long and proud history in the software development world, originating as a database project at the University of California, Berkeley, in the early 1970s.

Ingres was purchased by Computer Associates in 1994; for a long time, the database software thrived, but then its popularity flagged in the early part of this decade. In 2004, CA released the Ingres database as open-source software, and then everything went quiet.

That wasn’t the end of the story. In November 2005, CA and Garnett & Helfrich Capital, a private-equity group, reincarnated Ingres Corp., with the now-open-source database as its primary intellectual property asset. Little was heard about innovation at the new Ingres, however, after the formation of the new company. Most of the news they announced focused on partner programs or executive appointments, with next to nothing about new technology.

And then last week, out of the blue, we heard about a new Ingres software bundle for Eclipse developers. The offering is pretty interesting. The company describes it as:

As part of the bundle, developers will receive:

* Working system of Eclipse Framework with Ingres Eclipse Data Tools Project (DTP) plug-in
* “How to Get Started” with Ingres DTP including screenshots and step-by-step instructions

* Source code for a feature-rich demonstration that developers will find useful in getting started with Eclipse and Ingres

The Ingres DTP plug-in extends the Eclipse DTP by providing functionality specific to Ingres including:

* Ingres Connectivity
* Ingres Schema Support

* Ingres Database Procedure Support

* Ingres SQL Syntax (SQL Editor, Stored Procedure Editor, Trigger Editor)

If you do database work with Eclipse, it’s worth checking the bundle out.

Z Trek Copyright (c) Alan Zeichick

The U.S. Government’s decision to tamper with Daylight Savings Time (DST) has been seen as a mini-Y2K issue. It’s probably not that severe – I don’t expect elevators to jam or airplanes to crash – but DST is an issue that IT professionals must deal with.

What are the changes? To quote from the National Institute of Standards and Technology:

Starting in 2007, Daylight Saving Time (DST) begins each year at 2:00 a.m. (local time) on the second Sunday in March in most of the United States and its territories. Clocks must be moved ahead one hour when DST goes into effect. DST is not observed in Hawaii, American Samoa, Guam, Puerto Rico, the Virgin Islands and the state of Arizona (with the exception of the Navajo Indian Reservation, which does observe DST). Standard Time begins each year at 2:00 a.m. (local time) on the first Sunday of November. Move your clocks back one hour at the resumption of Standard Time.

In 2007, DST begins at 2:00 a.m. (local time) on March 11, 2007.

In 2007, DST ends at 2:00 a.m. (local time) on November 4, 2007.

The current Daylight Savings Time rules represent a change from the past. On August 8, 2005, President Bush signed the Energy Policy Act of 2005, which included the changes in Daylight Saving Time described above, effective March 1, 2007. Prior to 2007, DST began at 2:00 a.m. (local time) on the first Sunday in April, and ended at 2:00 a.m. (local time) on the last Sunday in October. The new rules for DST beginning in 2007 mean an extra four weeks of DST each year. In 2007, there will be a total of 238 days of DST, compared to a total of 210 days of DST in 2006 under the previous rules.

What does this mean for us? For the most part, you’ll need to download and install operating system patches, since applications assume that the date/time reported by the operating system is accurate.

For most desktop users on a modern operating system, such as Windows XP/Vista, Mac OS X 10.4.x and 10.3.x, and the latest Linux or Unix distributions, patches might be installed automatically. For older operating systems, such as Mac OS X 10.2.x and Windows 2000, the software company is not issuing patches – you’ll need to manually override your date/time settings.

This is a more serious issue for servers, most of whom are not configured to automatically install operating system patches. Many organizations only patch servers rarely, when a “show-stopper” flaw is revealed, or on a fixed schedule. Frankly, few people would consider a DST algorithm change to be a show-stopper. However, it has the potential to affect everything, for the time stamp on files on a file server, to the metrics in a server log, to spam algorithms in an e-mail server.

You can’t trust the fact that your desktops and servers are configured to get their time from a network time server (using ntp) to help you with this issue. Time servers report the time based on Coordinated Universal Time (UTC), which doesn’t know about DST. It’s up to your local desktop/server to apply the time-zone correction.

Bottom line: the DST issue is something you have to deal with, even if you don’t live in one of the areas affected by the change, and you should deal with it before March 11.

If you’re a software developer, and don’t have direct access to the IT infrastructure, be sure to bring this issue to the attention of those who can handle those updates. There’s no time to lose!

Z Trek Copyright (c) Alan Zeichick

The laugh of the day came from the official Microsoft Statement in Response to Speculation on Next Version of Windows. Kevin Kutz, director of the Windows Client, told the world:

We are not giving official guidance to the public yet about the next version of Windows, other than that we’re working on it. When we are ready, we will provide updates.

Thanks for clarifying that, Kevin.

Z Trek Copyright (c) Alan Zeichick

It was bound to happen: Someone sent a BZ Media employee a document in the new .docx format. That’s one of the Open Office XML formats that Microsoft introduced with Office 2007. Given that Office 2007 just came out, I didn’t expect this to happen so soon.

But the sender was a Microsoft employee, so I shouldn’t be surprised.

BZ Media is a mixed Windows and Mac shop. Our Windows XP users are on Office 2003; our Mac users are on Office 2004. We, like many businesses, have not budgeted to upgrade Office this year. (We’re kinda dreading what will happen when we buy a new PC that comes with Windows Vista and Office 2007 on it, but that’s another story.)

So, to continue our tale, a Windows user running Office 2003 received a .docx file. Office 2003, recognizing the file extension, prompted the user to download and install the Microsoft Office Compatibility Pack from Microsoft. This software teaches Office 2003 how to use the new file formats. The employee, following our IT policies, asked if this was legitimate and okay – and that’s when I entered the story.

As you may have seen from previous posts, I’m primarily a Mac user who runs Office 2004. After approving installation of the compatibility pack, I asked the employee to send me the file to play with. Guess what?

No surprise: Office 2004 for the Mac doesn’t natively understand .docx.

Big surprise: Microsoft hasn’t released file-format converters for its own current product: Office 2004 for the Mac.

That’s simply unacceptable, Microsoft.

I’m not the only person who thinks so. Tim Gaden rants about this nicely in a blog entry called “The lock-out begins for Office Mac users.”

What does Microsoft have to say? A member of the company’s Macintosh Business Unit, posting on their Mac Mojo blog in early December, advises, “For now, we recommend that Mac users advise their friends and colleagues using Office 2007 to save their documents as a “Word/Excel/PowerPoint 97-2003 Document” (.doc, .xls, .ppt) to ensure the documents can be shared across platforms.”

Why the delay? The blogger writes, “We had to wait until Office 2007 bits and the new file format itself were locked down. During this time, we spent the last year and a half prepping and planning for our own development of file format converters for Office for Mac.”

What about timing? “We are running on target and expect to release a free public beta version of the file format converters in Spring 2007, with final converters available six to eight weeks after we launch our next version of Office for Mac (which, as previously reported, will be available 6-8 months after general availability of Win Office.)”

In other words, Microsoft won’t release the converters for Office 2004 for the Mac until six-to-eight weeks after it ships Office 2008 for the Mac much later this year.

How can Microsoft expect outside developers to be able to implement these new Office Open XML formats, when they can’t even do that themselves in a timely matter? A six to eight month delay, after having more than a year to prepare? Completely, completely, completely unacceptable.

Z Trek Copyright (c) Alan Zeichick