Resolve and Fortitude : Microsoft's ''SECRET POWER BROKER'' breaks his silence (49 page)

BOOK: Resolve and Fortitude : Microsoft's ''SECRET POWER BROKER'' breaks his silence
9.23Mb size Format: txt, pdf, ePub

Now let’s look at product differentiation where I believe MS holds an edge. First of all the company has huge brand recognition in general and with Windows in particular. Second Windows 8 will uniquely unify how a variety of computing and mobile devices will be operated and seamlessly communicate with each other and in the cloud. MS’s solutions encompass the living room, the office, and the mobile space. Its characteristics and potential reach are unsurpassed, and her services and applications are attractive—exceeding most competitive offerings at least in the short term.

Microsoft’s competitive aim is clearly defined as I see it: Applications, tools and services for mobile and stationary computing, and communication devices interconnecting users to the rest of the IT world. No other company covers that as broadly and in-depth as MS. Not being too narrow in her aim and not being a monoculture works to MS’s advantage.

We can expect that current competitors will vigorously answer MS’s challenge and even new competitive forces might emerge. MS is used to deal with all of them by moving her products forward—not resting on her laurels. Management’s revived resolve and fortitude should suffice to regain and keep the company’s lead for the foreseeable future.

Product substitutes for her top revenue producing products already exist. So far this has not endangered the company’s ecosystem. As long as she can hold onto a critical mass of independent software and hardware vendors she will do well. With Windows 8 she is threatening her competitors with a superior concept, which will take time to reverse engineer. If the Facebook generation buys into this new paradigm as the new standard for coolness, MS will break through.

When it comes to bargaining power of her suppliers Microsoft has to fear if they will get upset by her ambitious plans to produce competing hardware devices and eventually defect. Producing these devices cheap enough is less of an issue. Not endangering the ecosystem the company depends on needs to be avoided at all cost! In regard to customers, the company has always pursued a low pricing policy, and I am convinced management knows how to make sure that price will never stand in the way when deciding to purchase any Microsoft product.

Winning over the Facebook and Twitter generation—while no easy task for Microsoft—will be central to success, and I am more than ever convinced that Microsoft will pull through with revived audacity and new magic. Replacing her twenty five year old logo and adapting it to the Windows 8 look further underlines how serious the company is taking this launch. As an optimist—while critical when needed—I believe that
resolve and fortitude
will not only keep her prosperous—but against all odds and pundit opinions—facilitate her conquering of unheard-of heights! Google’s and Apple’s glory days are numbered.

APPENDIX:
HOW MICROSOFT GOT HER STRIPES

For less familiar readers, let me put the nascent mechanics and the growing pains MS endured into context as I background the meteoric evolution of the PC market and showcase its competitive forces. In ’83 when I started working for MS, the company was just 8 years old and had only 400 employees. Co-founded and led from inception by a young and charismatic CEO and chairman, Bill Gates, she gave the impression of a risk taking entrepreneurial software pioneer. She came alive at the cradle of the PC revolution when Bill’s dream to deliver meaningful and affordable computing systems for personal use became a tangible probability.

The deliverance of such a system in the mid-70s depended on the availability of an affordable and powerful enough semiconductor chip called a microcomputer—the heart, soul, and work horse of early Personal Computers (PCs). In a modern PC, that component has been replaced by a much more complex and powerful Central Processor Unit (CPU). But like a microcomputer, todays CPUs need additional hardware components, peripherals, and software to become a fully usable computing platform. As the hardware components were invented and became available, the focus of the Information Technology (IT) industry shifted to a kind of magic glue, called software. It was needed to make the different parts working together and enable the common man to effortlessly perform meaningful computational tasks.

Software is nothing other than a collection of instructions a computer can understand and execute. Cobbled together in a meaningful way and able to perform a computing task, they represent an application program. To execute one on a computer system, you typically need an intermediary, which experts call an Operating System (OS). A mystic piece of software code which talks directly to its CPU, manages all hardware components, and enables the utilization of the application program you want to deploy.

Writing a software programs requires a tool known as a programming language. This is an artificial language that links the instructions a programmer writes to an OS so that the computer system can perform the desired operations. Depending upon the type of application programmers want to write, a number of specialized programming languages are available to them. One of the simplest is called BASIC.
78
Bill Gates started MS by adapting a version of it to a variety of microcomputers. Its availability enabled the programmer community to quickly write useful applications for a new platform. With retail distribution channels for software unavailable, he sold his tailored product directly to the early manufacturers, who in turn installed it on and sold it with their microsystems.

Utilizing the primitive micros of that time required way more tech knowledge than using today’s PCs. No wonder merely a smattering of unsophisticated end-users bought them. Its momentum increased when Tandy and Commodore jumped in the fray, delivering easier to use systems and inspiring more usable and sophisticated application programs to appear. A fundamental breakthrough occurred in ’77 when Apple Computer introduced a PC called Apple II, leapfrogging competitors’ designs and usefulness. Soon overpowering its contenders by attracting a number of quality applications programs, Apple rapidly became the market’s trendsetter. Two years later her position was further manifested with the appearance of a spreadsheet program
79
called VisiCalc, running exclusively on the Apple II and turning her flagship into a formidable analytical business tool. The press grandiosely labeled it a “killer application,” postulating how hardware and software progression depended on each other for eternal success. This number crunching program alone, unbelievable as it sounds, motivated people to buy an Apple II—killing its competitors! Software to win—hardware to function!

The next formidable entry happened in ’81. I can still remember the ads Apple launched that fall headlined “Welcome IBM. Seriously!” The largest computer company in the world legitimizing PC technology motivated her to arrogantly embrace the threatening giant publicly—a gutsy bit of ad copy. Having beaten IBM by four years to the market, nobody at Apple, my then employer, genuinely expected IBM’s new baby could or would endanger her lead. Apple fans counted in the millions and were quite loyal, and with an abundance of slick application programs readily available, the incumbent seemed clearly advantaged.

Over the years Apple’s strength had been manifested by an army of Independent Software Vendors (ISVs)
80
and the huge number of dedicated applications they had created for the Apple II. Their faithfulness was a prized and powerful defensive asset, and Apple’s management knew darned well how essential they were for her success. As soon as IBM showed up, Apple increased support for this software community. I was part of mounting a paramount defense effort in Europe. My management firmly believed we were protected from IBM’s onslaught for now by hiding behind a much richer application environment. Way too cocky as history shows. Within less than two years the imaginary protective shield crumbled. The supposedly iron-clad application barrier to entry
81
eroded when ISV’s entrepreneurial spirit risked supporting mighty IBM following alternative and less expensive consumer’s choices and enterprise sentiments. It for sure crossed Apple’s plan to hold IBM in check long enough until she could ambush and beat her with the advanced systems that Steve Jobs, the company’s co-founder and CEO, was working on.

The two contenders varied tremendously in how they had arrived at their products. Apple mirrored the traditional proprietary go-to-market approach, which the computer industry had deployed for decades. Excluding her CPU, bought from Motorola, all key parts of the Apple II were designed and manufactured solely by or for her. IBM on the other hand had, for the first time ever, deviated from this tactic. Spinning her newly formed PC division off, she freed her from the exclusivity dogma to meet time to market objectives.

Not making the operating system an exception from this newly crafted policy surprised the industry the most. Yet a bit more cautious, IBM offered a choice of two functionally equivalent ones from two different vendors: Digital Research Institute Inc. (DRI) and Microsoft (MS). Hedging her bets, she avoided picking a winner in the ensuing race for popularity—leaving it to be ultimately decided at the point of purchase.

Hard to imagine, but the original IBM PC came without any OS, making installing it an afterthought—either performed in the purchaser’s home or on the premises of his or her friendly retailer. The reason for separating hardware from software can be found in an antitrust case IBM settled years earlier and now applied, without being legally obliged, to her newest creation.

The two vendors IBM had picked as OS suppliers had vastly different backgrounds and expertise. DRI had established herself as a widely recognized leader in early microcomputer OS technology while MS had made a name supplying programming languages for the same ecosystem. Both knew each other from an earlier business relationship which had MS compelled to license an early version of DRI’s OS, CP/M,
82
to adapt and sell it together with an add-on card to the Apple II community. A prosperous and profitable business as it turned out. Now the rapport between them was poised to turn ugly, as DRI considered MS’s alternative offering an invasion of her turf.

The method MS had used to develop her newest darling added insult to injury. To deliver in time for IBM’s launch, she obtained a clone of one of DRI’s CP/M versions called QDOS
83
from a small software company in Seattle, Washington.
84
It served as a starting point to develop an IBM PC tailored derivate christened MS-DOS.
85
After a court challenge about its legality launched by DRI got defeated, the first OS war was about to begin.

MS’s cloner image and DRI’s market leader reputation should have given the latter a huge advantage over the newcomer. Not so. The first mistake made was how DRI dealt with IBM. While MS licensed
86
her version at an aggressive price, DRI’s CEO believed that his company’s reputation as market leader warranted excessive royalties. IBM therefore offered DRI’s version at $495 at retail while asking only $39.95 for MS’s version, which she sold under the name of PC-DOS. The low price instantly resonated with early IBM PC buyers who veered to the MS’s solution en masse. Round one for MS!

To make inroads into Apple’s empire, IBM desperately needed to attract and recruit a sufficient mass of ISVs. Only rich application availability drives PC sales—just the existence of hardware combined with an operating system doesn’t get that job done. IBM smartly enlisted both companies for the challenging recruiting task. DRI did a lack luster job helping IBM out. If she would have made an honest effort and reconsidered here excessive pricing at the same time, history might have turned out differently. Instead serious assistance for IBM came mainly from fastidious MS. She engaged vigorously willing to help other ISVs, even her competitors. It turned the tide and soon the development community followed the most supportive and mass attracting vendor. Round two for MS, without deciding the battle for dominance once and for all!

IBM’s early decision to buy freely available and generic components from third parties made cloning her hardware quite feasible. A high temptation for start-ups and IBM’s existing hardware competitors to enter the PC fray developed. Early on Bill had bet that nobody would tolerate that IBM could have and eat the PC cake alone. Following his belief, he engaged in an early crusade lobbying for and preaching the cloning of IBM’s architecture.

The largest remaining obstacle to a successful cloning of the architecture was a piece of software code called the IBM BIOS. It contained the Basic Input Output System an IBM PC needed to manage peripherals like printers, hard disks, etc. These programming instructions should have been an integral part of two the OSs. Instead, IBM had written the essential software herself. Without it, no one could replicate her PC architecture. Worse, IBM was showing no intent to or interest in licensing it to lurking competitors. To protect it from unauthorized use, she had copyrighted its code. An insurance policy and a company called Eagle Computer soon felt IBM’s legal wrath after copying it without permission. But as with all software, clever programmers can legally overcome such obstacles.

A small entrepreneurial ISV in Massachusetts called Phoenix Computer Systems was first in line attempting to clone IBM’s code. Reinventing software, even if copyrighted, is perfectly legal as long as the imitator writes a functional equivalent piece of code and refrains from identically replicating the original instructions. This was understood as being one of the vulnerabilities in the software industry and easier to accomplish when the code’s volume is relatively small. To pull this off, developers use only the functional specifications of the targeted software as a starting point. As long as this principle—called a dark-room approach by attorneys—is strictly followed, the newly from scratch created program is deemed legal and will survive court challenges. Phoenix encountered none.

Once available, companies such as Compaq, Acer, Nippon Electric Company (NEC), Hewlett-Packard (HP), Zenith, Dell, Siemens, Victor, Olivetti, Tandy
87
and Osborn took up the challenge and designed IBM PC clones. Under Bill’s directions, MS overtly promoted them with valuable tech insight and advice, which did little to engender warm and abiding friendships within IBM. Energized to compete, the avalanche of new entries accelerated the affordability of PC technology and presented MS with the opportunity to win new customers for MS-DOS. Not to be outdone and with a highly compatible but not identical OS at hand, DRI immediately engaged as well, drawing MS into a fiercely and long lasting battle to win over emerging PC manufacturers.

Other books

That Touch of Pink by Teresa Southwick
The Naked Face by Sidney Sheldon
Pendant of Fortune by Gold, Kyell
Colonization by Aubrie Dionne
The Captive Maiden by Melanie Dickerson
The Master's Mistress by Carole Mortimer
Demon Evolution by David Estes
For Love of a Gypsy Lass by Juliet Chastain