Embrace, extend, and extinguish (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Embrace, extend, and extinguish" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
7th place
7th place
153rd place
151st place
2,755th place
1,753rd place
18th place
17th place
272nd place
225th place
254th place
236th place
786th place
558th place
712th place
526th place
14th place
14th place
low place
low place
low place
low place
low place
low place
6,731st place
5,817th place
low place
low place
822nd place
445th place
1,535th place
822nd place
1,045th place
746th place
8,307th place
5,922nd place
3,029th place
2,272nd place
99th place
77th place
114th place
90th place

americanantiquarian.org

archive.today

bloomberg.com

businessweek.com

cnet.com

news.cnet.com

cnet.com

economist.com

  • "Deadly embrace". The Economist. 2000-03-30. Archived from the original on 2018-05-23.

groklaw.net

harvard.edu

cyber.law.harvard.edu

hr.com

microsoft.com

microsoft.com

developer.microsoft.com

minneapolisfed.org

msdn.com

channel9.msdn.com

nytimes.com

nytimes.com

query.nytimes.com

  • Matt Richtel (1998-10-22). "Memos Released in Sun-Microsoft Suit". The New York Times. Retrieved 2008-02-22. The court documents state that in April 1997, Ben Slivka, the Microsoft manager responsible for executing the Java strategy, sent an E-mail to Microsoft's chairman, William H. Gates, noting 'When I met with you last, you had a lot of pretty pointed questions about Java, so I want to make sure I understand your issues and concerns.' Mr. Slivka goes on to ask if Mr. Gates' concerns included 'How do we wrest control of Java away from Sun?' and 'How we turn Java into just the latest, best way to write Windows applications?'

opera.com

reactor-core.org

slated.org

antitrust.slated.org

theverge.com

usdoj.gov

web.archive.org

  • "Deadly embrace". The Economist. 2000-03-30. Archived from the original on 2018-05-23.
  • "Microsoft limits XML in Office 2003". Archived from the original on September 22, 2005. Retrieved 2006-03-31.
  • Rebello, Kathy (1996-07-15). "Inside Microsoft (Part 1)". Business Week. Archived from the original on 1996-10-19. Retrieved 2018-08-05.
  • "Windows: The Next Killer Application on the Internet". Microsoft.com. Archived from the original (RTF) on 2016-04-21. Retrieved 2016-04-28.
  • "U.S. v. Microsoft: We're Defending Our Right to Innovate". Openacademy.mindef.gov.sg. Archived from the original on March 29, 2007. Retrieved 2007-03-29.{{cite web}}: CS1 maint: unfit URL (link)
  • "Opera files antitrust complaint with the EU". Opera. 2007-12-13. Archived from the original on 2012-03-13. Retrieved 2016-04-28.
  • "Plaintiff's Exhibit : 2991 : Comes v Microsoft" (PDF). Antitrust.slated.org. Archived from the original (PDF) on 2011-09-30. Retrieved 2016-04-28.
  • "Microsoft's lawsuit payouts amount to around $9 billion". The Inquirer. Archived from the original on 2015-05-30. Retrieved 2010-03-04.{{cite web}}: CS1 maint: unfit URL (link)
  • "Microsoft and Sun Microsystems Enter Broad Cooperation Agreement; Settle Outstanding Litigation". Microsoft.com. April 2004. Archived from the original on 2010-02-25. Retrieved 2010-03-04.
  • "What is the WHATWG and why did it form?". Blog.whatwg.org. Archived from the original on 2007-08-21. Retrieved 2007-08-25.
  • "MSConversations". Archived from the original on 2008-02-16. Retrieved 2009-07-28.

whatwg.org

blog.whatwg.org

wisc.edu

kb.wisc.edu

  • "UW-Madison IT dept. help page". University of Wisconsin. Retrieved 2020-07-01. Enabling password security for an Office 365 forces modern authentication to be used for all protocols. SMTP Auth is deprecated and is no longer supported.

zdnet.com

news.zdnet.com