Feeds

Acorn rebuffs dealer bid

Bring on the Dutch

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Acorn’s relationship with its dealers has hit the rocks following a “sudden, unexpected and unpredictable change in (its) negotiating position”, over attempts to keep the RiscOS alive. The Four Wise Men, members of the Steering Group formed on behalf of the Acorn dealer and developer community, said they had “reluctantly stepped back from negotiations with with Acorn Computers for their Product business, upon learning that Acorn is now negotiating directly with another company from the Netherlands, introduced to Acorn via the Steering Group's agency.” Pile indignity upon indignity, Steering Group members “signed a Memorandum of Understanding which (Acorn CEO) Stan Boland signed for Acorn and which was abruptly abandoned by Acorn a few days later”. Reading between the lines, the Acorn dealers are saving their anger for another day. Until the outcome of the negotiations is settled, at any rate. “The Steering Group regard as a notable achievement the rapid introduction to the scene of another firm, with technical and manufacturing experience and substantial financial backing, which may lead to continuing the Acorn product range.” Substantial financial backing must be the key in Acorn’s considerations. How viable the Steering Group’s plans were on that front we will probably never know. “If the negotiation leads to the sale of Acorn's Workstation Products to another party, the Group will work to convince that party of the value of the recent and imminent Products, and will encourage them to sustain the Dealer and Developer community, so as to sustain the broad Acorn-Using community, with all its enthusiasm, creativity and commitment to RiscOS.” A ringing declaration, but does it actually mean anything in concrete tems ? Steering Group members say that if the new set of negotiations fail, they will “continue to seek an alternative way of bringing Phoebe to market and continuing development of RiscOS”. If these negotiations fail, Phoebe is dead in the water. For customers are not going to hang around all that much longer. Maybe it’s time for more Acorn dealers to plunge into Wintel. Sure, the technology is frustrating. But it’s alive and kicking. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.