Xref: utzoo comp.sys.ibm.pc:17987 comp.binaries.ibm.pc.d:685 Path: utzoo!utgpu!attcan!uunet!steinmetz!davidsen From: davidsen@steinmetz.ge.com (William E. Davidsen Jr) Newsgroups: comp.sys.ibm.pc,comp.binaries.ibm.pc.d Subject: Re: PK361.EXE Keywords: foot removal from mouth Message-ID: <11814@steinmetz.ge.com> Date: 10 Aug 88 12:50:56 GMT References:<356@marob.MASA.COM> Reply-To: davidsen@crdos1.UUCP (bill davidsen) Organization: General Electric CRD, Schenectady, NY Lines: 15 In article msmith@topaz.rutgers.edu (Mark Robert Smith) writes: | Steve, Sorry, but stealing somebody else's market is a standard | practice inthe world of software. Else, why are word processors able | to read WordStar's format? Why can Excel read Lotus 123? Why can | Paradox import dBase and RBase files? It is standard to attempt to | grab somebody else's users. What's not standard is to write Wordstar or 1-2-3 files which can not be read by the original program. The idea seems to be "once you use my program you can never go back." -- bill davidsen (wedu@ge-crd.arpa) {uunet | philabs | seismo}!steinmetz!crdos1!davidsen "Stupidity, like virtue, is its own reward" -me