Xref: utzoo comp.sys.ibm.pc:17987 comp.binaries.ibm.pc.d:685
Path: utzoo!utgpu!attcan!uunet!steinmetz!davidsen
From: davidsen@steinmetz.ge.com (William E. Davidsen Jr)
Newsgroups: comp.sys.ibm.pc,comp.binaries.ibm.pc.d
Subject: Re: PK361.EXE
Keywords: foot removal from mouth
Message-ID: <11814@steinmetz.ge.com>
Date: 10 Aug 88 12:50:56 GMT
References:  <356@marob.MASA.COM> 
Reply-To: davidsen@crdos1.UUCP (bill davidsen)
Organization: General Electric CRD, Schenectady, NY
Lines: 15

In article  msmith@topaz.rutgers.edu (Mark Robert Smith) writes:

| Steve,  Sorry, but stealing somebody else's market is a standard
| practice inthe world of software.  Else, why are word processors able
| to read WordStar's format?  Why can Excel read Lotus 123?  Why can
| Paradox import dBase and RBase files?  It is standard to attempt to
| grab somebody else's users.

  What's not standard is to write Wordstar or 1-2-3 files which can not
be read by the original program. The idea seems to be "once you use my
program you can never go back."
-- 
	bill davidsen		(wedu@ge-crd.arpa)
  {uunet | philabs | seismo}!steinmetz!crdos1!davidsen
"Stupidity, like virtue, is its own reward" -me