EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

12.19.08

Microsoft & Paid Lobbyists Attack Open Source in European Interoperability Framework

Posted in Deception, Europe, Free/Libre Software, Microsoft, Standard at 10:33 am by Dr. Roy Schestowitz

EU and Polish flagAmerican multinational/monopolist ‘instructs’ Europe

Microsoft ‘loves’ open source. Yes, it really does. This must be the reason why its ‘fronts’ are all responding to the EIF V2.0, which was made available for feedback from the public. They are also taking open source off the table. Microsoft, ACT, CompTIA and even the BSA have all responded. Their interests are not to facilitate fair competition, but to promote further monopolisation by their big funding source. In page 2 of ACT’s recommendations, for example, they write in very large fonts: “Promotion of Open Source is Outside the Scope of this Framework.”

Yes, that’s how Microsoft writes the law. It does not need to do this directly. It just hires lobbyists to do the writing ‘on behalf’ of “the software industry” and ‘on behalf’ of “small businesses”.

For more information, see:

CompTIA-Microsoft connections: [1], [2], [3], [4], [5], [6]
BSA-Microsoft connections: [1], [2], [3], [4]
ACT-Microsoft connections: [1], [2], [3], [4], [5], [6], [7], [8]

This is not lawmaking. And like the ACTA shows [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16], it’s a total mockery of European citizens.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email
  • Slashdot

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

12 Comments

  1. Needs Sunlight said,

    December 19, 2008 at 3:53 pm

    Gravatar

    It’s rather a shame that so few real stakeholders were informed about the request for feedback.

  2. Roy Schestowitz said,

    December 19, 2008 at 4:17 pm

    Gravatar

    No, remember… it’s by industry… for industry. It’s never for computer users.

  3. Andre said,

    December 20, 2008 at 9:35 pm

    Gravatar

    That is actually not true, everyone could contribute. The consultation was about the first draft of the EIFv2.

    Maybe you should blog more about ICT consultations:
    http://ec.europa.eu/yourvoice/consultations/index_en.htm

    There is nothing wrong with lobbyists who write comments, it is their job. Whether an American company and American citizens are well advised to lobby European institutions in an aggressive way is another issue.

    It is certainly high time to reclaim European institutions and get a Foreign Lobby Transparency ACT as they have it in the US.

  4. Roy Schestowitz said,

    December 21, 2008 at 4:33 am

    Gravatar

    It’s better not to fight fire with fire. You get burned and the rich(er) can still game the system the most. It’s undemocratic.

  5. Andre said,

    December 22, 2008 at 3:34 pm

    Gravatar

    You know that this is not true. In particular when it comes to the IDABC.

    But of course there should be more participation in EU consultations which relate to ICT.

    Just because these organisations respond to the consultation this doesn’t translate in them beeing influential.

    Once you get into such a debate there is nothing or little to lose but a lot to gain.

  6. Roy Schestowitz said,

    December 22, 2008 at 3:38 pm

    Gravatar

    It can swing either way, but those with more money and less ethics often get their way.

  7. Andre said,

    December 22, 2008 at 4:12 pm

    Gravatar

    This is not my experience and the experience of my friends. In fact too much classical lobbying quickly gets counter-productive, gets shrill. Classic public affairs approaches do not work very well when you expose them to the public. Slow motion and lazy lobbyists.

    Consider for instance OOXML. It started with the attitude, I am dead, go and kill me. The best way to combat a party is to force them to play evil and expose that. You build a little Tiananmen Square for them. One person against the tanks. It doesn’t matter if the person gets rolled over as long as you record it on tape. One person killed, then comes the next one. For a campaigner you need to be professional and not get outraged over the violent acts. In fact these acts are very useful to built your case and make it real fun.

    Sometimes you don’t have to “win”, you rather stage a “phyrric victory” or artificially escalate a situation.

    European ICT policy urgently needs more public involvement and input. You are too negative here. You should monitor the site YourVoice and the sub pages and direct your readers to upcoming consultations.

  8. Roy Schestowitz said,

    December 22, 2008 at 4:18 pm

    Gravatar

    Oh, I see, thanks.

    http://www.yourvoice.com.au/au/

  9. Andre said,

    December 22, 2008 at 4:24 pm

    Gravatar

    No,

    this one
    http://ec.europa.eu/yourvoice/consultations/index_en.htm

    ;-)

  10. Roy Schestowitz said,

    December 22, 2008 at 4:31 pm

    Gravatar

    Eeek. Look at that navigation panel. Compare to:
    http://web.archive.org/web/20050101091330/www.apple.com/macosx/

  11. Andre said,

    December 22, 2008 at 5:01 pm

    Gravatar

    For instance
    http://ec.europa.eu/internal_market/consultations/2008/hedge_funds_en.htm

    Probably the worst time right now for a hedge fond lobbyist.

    This is the consultation document:
    http://ec.europa.eu/internal_market/consultations/docs/hedgefunds/consultation_paper_en.pdf
    with the questions.

    Or more relevant to us
    http://ec.europa.eu/yourvoice/ipm/forms/dispatch?form=InfsoNis
    which runs till 9 January.

    Interactive Policy Making(IPM), the software for the consultation form, is btw. an open source software developed by the EU Commission IDABC.

    My recommendation on ENISA: rewind the institution. It is totally useless and just a lobby proxy, consultancy without any effects. This is why the Commission proposed to merge it into the new telecom regulation agency. But as no one liked the new telecom regulation agency, enisa survived for now. The estonian case is the typical lobby sermon and the only sphere where it is debated is among enisa lobbyists.

    Now there are certain questions:

    “Electronic networks and services constitute the nervous system of our society and the economy, and recent large scale cross-border cyber attacks, for example in Estonia, have highlighted our dependence on them. In this context, what are the major challenges for network and information security to be considered at the national, EU and international level, in particular with regard to resilience of electronic communication networks and information infrastructures?”

    “Given the importance of electronic networks and services for society and the economy, what should be the three key priorities for policy to address the evolving challenges to network and information security at the EU and the international level? ”

    “Member States have a key role and overall responsibility in guaranteeing the security and continuity of critical services for citizens and businesses. In this context, what should be the focus of future EU policy in order to: •enhance cooperation at the EU level between national competent bodies; and •achieve a holistic, all-encompassing approach to network and information security; •reinforce the synergy between measures focusing on prevention and resilience (“first pillar”) and measures supporting judicial and law enforcement cooperation (“third pillar”)? (optional)”

    “The security and resilience of the Internet is a joint responsibility of all stakeholders, including operators, service providers, hardware and software providers, end-users, public bodies and national governments. This responsibility is shared across geographical boundaries, in particular when responding to large-scale cyber attacks. In this context, what role should the EU play to strengthen the preparedness of the key stakeholders?”

    “Because of the global nature of the Internet, each and every country has a degree of inter-dependence with other countries, not least when responding to large-scale cyber attacks. How can we support trans-national cooperation in the EU to cope with evolving network and information security challenges? ”

    “What instruments are needed at EU level to tackle the challenges and support the policy priorities in the field of network and information security? In particular, what instruments or mechanisms are needed to enhance preparedness to handle large scale cyber disruptions and to ensure high levels of security and resilience of electronic networks and infrastructures? ”

    etc.

    So how to respond? The best way is to collect all these questions and let a response text to the consultation just mature over time.

  12. Roy Schestowitz said,

    December 22, 2008 at 5:05 pm

    Gravatar

    Unless you have financial resources backing your efforts, this may prove to be a time drainage.

    I don’t know about FFII, but this site and its efforts are run voluntarily.

What Else is New


  1. International Business Machines and the 1941 Watson Letter Which Refutes IBM Denials

    The letter revealed by Mr. Black (researcher and investigative author of these long-suppressed matters) shows that the co-founder of IBM knew what was going on and what he was profiting from (until it became a potential PR disaster for IBM as the Unites States entered the war)



  2. The Real 'Pee-gate' Was on External (Portable) Media of Bill Gates' Engineer, Arrested Over Pedophilia at the Gates Mansion

    We let readers use their imagination (we don’t have access to the files, just the filenames from the police report/FOIA) to figure out what was in “D:\Alexey&Garik_Pissing_004.jpg, D:\Ivan_Pissing_003.jpg, D:\Ivan_Pissing_006.jpg, D:\Raul_Pissing_003.jpg, D:\Raul_Pissing_005.jpg, D:\Yaroslav_Pissing_001.jpg” among other such files on other machines and drives (Case Reference: 14-22121 Item 6_CD label 2 in Seattle Police Department; this could be copied to any machine, anywhere, because it is external, portable media without journaling.)



  3. Links 14/8/2020: GNUnet 0.13.2, Mesa 20.2 RC2

    Links for the day



  4. OK, Melinda...

    Teaching children about sex at the age of seven may seem controversial to most people, but not the Gates family



  5. High-Level Criminals Associate Privacy With Crime Because They Want Privacy Only for Themselves (Control But No Accountability)

    Tyrannical tendencies from the non-scientist who tries to paint himself as Mr. “science” (Jeffrey Epstein tried to do exactly the same thing, which is why he and Gates paid universities) are bare naked for everybody to see



  6. It Was Mozilla -- Not Google (or Chrome) -- That Liberated the World Wide Web From MSIE Monoculture and O/S Vendor Lock-in, But Firefox is Likely Dying

    Mozilla's attitude towards software freedom, privacy, and the most widely used free/libre operating system (O/S) isn't helping the "protected media" (DRM) Fox because its biggest selling point is becoming outdated/irrelevant/neglected



  7. Ars Technica, ZDNet and Bleeping Nonsense Still Misreporting to Blame 'Linux' for Malware One Can Merely Add to Linux (Distracting From Systems With Back Doors, Such as Windows)

    A revised (spun) 'report' that we alluded to last night is spreading to more sites today or overnight; but it's totally distorting the situation to make "Linux" seem a lot more dangerous than it really is



  8. DistroTube Does a Richard Stallman

    A video published yesterday in various sites



  9. Reporting Facts is Never a Crime (It Must Not Become That Way)

    The two-party political system in the United States is racing towards bipartisan (transcending perceived 'wings') rejection of free press, which won't be on the ballot box except for "third" parties; it's a real problem because it's designed to weaken if not obliterate accountability



  10. IRC Proceedings: Thursday, August 13, 2020

    IRC logs for Thursday, August 13, 2020



  11. [Meme] Linux Foundation and ZDNet Openwashing Proprietary Mass Surveillance (for a Fee!)

    The Linux Foundation and ZDNet tell us that Facebook is “open” (because it pays for that openwashing); the Foundation’s love of mass surveillance and spin regarding such surveillance is reaching new heights for the Foundation, clearly misusing the “Linux” brand, is rapidly becoming a leading voice for malicious surveillance companies that need openwashing to merely seem or feel “ethical”



  12. [Meme] IBM and Its Shakeups (Shaking up of the Earth)

    The Linux Foundation helps IBM seed shallow press coverage [1-6] about how IBM supposedly ‘saves the world from earthquakes’ 75 years after atomic bombs were dropped on Japan (after IBM had helped develop these), causing earthquakes-like effects and deaths of hundreds of thousands of people



  13. Backup: KIRO Report About Arrest of Rick Allen Jones

    We're making a mirror of this report as the media never touches the topic anymore



  14. Promoting False Perspectives and Narratives About GNU/Linux to Let Microsoft Dominate/Control Everything (Sometimes Quite Cynically in the Name of 'Security' or 'Responsibility')

    Microsoft's "perception management" games are progressing and are finding their way into official blogs of supposed 'competitors' like Canonical and SUSE



  15. Links 13/8/2020: New LibreOffice 6.4.x, Linspire 9.0, Endless OS 3.8.5

    Links for the day



  16. The National Center for Missing and Exploited Children (NCMEC) Identified Some of the Children in the Pornographic 'Stash' of Bill Gates' Engineer

    Today we carefully and responsibly disclose just 9 pages (out of about 2700 pages) with slightly redacted samples and a handful of exemptions to show what Bill Gates' engineer was amassing, including identified kids (known to NCMEC)



  17. A Red Hat Response to Factual Information About Red Hat

    So far we've seen only Red Hat employees blasting our articles about Red Hat/IBM and the responses lack any substance, just name-calling (so we must be on the right track; there's no refutation so far)



  18. Always Look for Stories the Media is Suppressing and Hiding

    Based upon closer scrutiny of the Jones case (engineer of Bill Gates arrested for pedophilia at the Gates mansion), the sentence he received is incredibly negligible or close to nothing (for possession and sharing/dissemination of massive troves of child pornography, typically leading to many years in prison), so we’re closely examining if he’s still working and whether he still works for Bill and Melinda (more FOIA requests may be necessary)



  19. On Web Servers, Microsoft's Collapse Continues More Rapidly Under COVID (a Million Domains Lost in the Past Month)

    Even though the Microsoft-sponsored media repeatedly refuses (or strangely enough just 'fails') to report on it, the days of Microsoft's IIS are likely numbered; it won't be long before less than a million computers run it



  20. Canonical is Boosting Microsoft's Proprietary Software With Extensive Surveillance

    Canonical’s commitment to Free software barely exists; with so-called “Apps” and “Snaps” and “Stores” we’re seeing a gradual transition to — and acceptance of — blobs and DRM, including Microsoft lock-in inside Ubuntu



  21. IRC Proceedings: Wednesday, August 12, 2020

    IRC logs for Wednesday, August 12, 2020



  22. Harfbuzz Joins LibFFI, Zlib1g in Dragging GNOME, All Free Software Towards Microsoft

    "...I don’t want to help them help Microsoft control my computing by proxy — by controlling the development platform itself"



  23. Links 12/8/2020: Go 1.15, LibreOffice 7.0 Downloaded About Half a Million Times, LibreELEC (Leia) 9.2.4

    Links for the day



  24. Mega Setup, Mini Budget

    For a sum total of under £800 (eight hundred British pounds are about USD/$1043) one can piece together a versatile working environment (my latest additions, as of 5 days ago, are the 4 plastic plants)



  25. Twitter Appears to Have Taken Vendor/Platform Lock-in up Another Notch, Having Become Almost as Malicious as Facebook

    Twitter jumped the shark



  26. IRC Proceedings: Tuesday, August 11, 2020

    IRC logs for Tuesday, August 11, 2020



  27. Infographic by Marcia Wilbur: Where's My Refund?!

    Tweet by Marcia Wilbur:



  28. Links 12/8/2020: New GNU Emacs, GXml-0.20, WordPress 5.5, and Mozilla is Laying off 250 Staff

    Links for the day



  29. You Just Know Somebody is in a State of Retreat When the Strategy Becomes to Discredit One's Critics (or Collectively Paint Them All as Wrong/Crazy)

    A goulash of bullcrap from Bill Gates doesn't add up; it seems like his media strategy has warped (or fallen back) onto discrediting his critics as though they don't exist, don't know anything, or are simply jealous



  30. United States v IBM Archives/Resources

    As the massive case against IBM monopoly (United States v IBM; 104,400 pages of trial transcripts and 17,000 exhibits) predates the World Wide Web it's difficult to find comprehensive literature about it any longer (Wikipedia and more modern sites are instruments of revisionism and reputation laundering)


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts