Microsoft admits to code theft from Plurk

 

Blames Chinese third-party developer.

Microsoft has today confirmed that its new Chinese micro-blogging application, Juku, was developed using code stolen from Canadian start-up Plurk.

The software giant said in a statement released yesterday that the site had been developed by a Chinese vendor for Microsoft's MSN China joint venture, and that the vendor in question has acknowledged that it copied the code.

"When we hire an outside company to do development work, our practice is to include strong language in our contract that clearly states the company must provide work that does not infringe the intellectual property rights of others," the statement said.

"We are a company that respects intellectual property and it was never our intent to have a site that was not respectful of the work that others in the industry have done."

However, Microsoft said that it "assumes responsibility" for the situation, and confirmed that it will be suspending the beta site indefinitely.

The company also apologised to Plurk and said it will be "reaching out to them directly" to explain what happened and the steps it has taken to resolve the situation.

Plurk said in a blog post that it was "stunned, shocked and unsure what to do next" after the incident.

"It hits that much closer to home when all the years of hard work and effort to create something unique are stolen so brazenly," the firm said.

Plurk is now gathering facts on the timeline of events and parties involved to understand why and how the theft took place.

The company's micro-blogging service is hugely popular in Taiwan, where it is currently 10 times bigger than Twitter.

Copyright ©v3.co.uk


Microsoft admits to code theft from Plurk
 
 
 
Top Stories
Photos: Global Switch opens Sydney East data centre
First stage opened, to some fanfare.
 
ATO releases long-awaited Bitcoin guidance
Everyday investors escape the tax man.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger'
IT transformation starts to reap results.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Looking for storage? Seagate has five new small business NAS devices
Aug 22, 2014
Seagate has announced a new portfolio of Networked Attached Storage (NAS) solutions specifically ...
Run a small business in western Sydney?
Aug 15, 2014
This event might be of interest if you're looking to meet other people with a similar interest ...
Buying a tablet? Microsoft's Surface Pro 3 goes on sale this month
Aug 8, 2014
Microsoft has announced its Surface Pro 3 will go on sale in Australia on 28 August from ...
Apple's top MacBook Pro with Retina is now cheaper
Aug 1, 2014
Apple has updated its MacBook Pro range with faster processors and new pricing, including ...
Pass on carbon tax savings, warns ACCC
Jul 24, 2014
The ACCC is warning businesses that supply "regulated goods" to pass on any cost savings ...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 482

Vote