Feeds

Caldera closes UK thin client development unit

Development being moved over to Utah

  • alert
  • submit to reddit

High performance access to file storage

Events have overtaken our report (Earlier Story) that Caldera Thin Clients work was carrying on in Andover, UK. Following a decision by the Caldera board, the British Caldera development team has disbanded, although it is anticipated that some work will continue in Salt Lake City, with a new team. But it may prove hard to recruit people wishing to work in a DOS environment, although it would appear that there is enough DOS business to make the operation viable. Caldera CEO Bryan Sparks and PR manager Lyle Ball told The Register that it had proved too expensive to coordinate activities between Salt Lake City and Andover, especially with the time difference. Caldera's main thin client thrust is to sell a DR-DOS + Web Spyder set-top box combination as a WebTV killer, although efforts in the embedded market eill also continue. Sparks also said that Caldera has a JVM for Web Spyder in prototype for delivery at the end of the year. The previous team was contracted to finish some work on the Web Spyder browser development. A problem at present is that WebSpyder does not support plug-ins. Caldera's other unit, Caldera Systems, sees its competitor as Microsoft and NT, rather than Red Hat. PR Nancy Pomeroy commented that a rising tide lifts all ships, so that Caldera is pleased at the corporate investments in Linux obtained by Red Hat. Caldera has one investment, apart from former Novell CEO Ray Noorda's support, from Anaheim-based MTI, a data storage management specialist, but says it has no special need for cash. In Caldera's antitrust case against Microsoft, which centres on moves allegedly made by Microsoft to exclude DR-DOS from the market, there will be a series of five hearings in May and June on Microsoft's various manoeuvres to have the case dismissed. It is likely that many of the documents at present under seal will also be made public, following decisions in Microsoft's Washington trial. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.