Feeds

Amiga ends ‘freedom of information’ policy

And, in the face of users who still think it's 1985, who can blame it?

  • alert
  • submit to reddit

High performance access to file storage

Opinion Amiga, inc. today scaled back its attempts to be rather more open with the Amiga community than it has in the past. Set in motion by Amiga president Jim Collas, Amiga Glasnost centred on regular updates on the company's progress both as a business and as a technology developer. However, according to the company's Web site, "for the next several months, the Amiga staff will be focused on implementing our business and product plans. We will not be discussing or commenting on future company directions during this time". So there... Still, given the grief Collas and co. have been given by the more conservative -- dare we say 'backward looking'? -- members of the Amiga community, primarily over the company's decision to base the next generation of the Amiga Operating Environment on Linux rather than the more AmigaOS-like (at least in the die hards' view) QNX, you can't blame the man for saying: 'To hell with this openness -- we'll just do what every other computer company does and keep our mouths shut.' It's notable that Commodore wannabe Iwin has suddenly taken the same approach. Ultra-minority computer systems -- sorry, folks, but that's what the Amiga is. For now... -- tend to be supported by people who are most insistent that their favourite system is the best, despite the fact it may have been long out-evolved by 'fitter' systems. That insistence on maintaining an identity in the face of the facts, tends to generate a proportionally higher number of users willing to toss their orb around, often without any real appreciation of the way the computer business works. One or two Mac users we could mention behave in just the same way, and the Mac is way more viable than the Amiga is right now. No wonder then that Collas who, to be fair, is probably doing what he can to maintain the viability of the Amiga platform, has got a little fed up with the carping of those who insist on living in the past, circa 1985. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.