Feeds

Psion's Potter goes ZD UK-baiting

Hush-hush deal with semiconductor outfit beginning with M. Not.

  • alert
  • submit to reddit

Seven Steps to Software Security

Let no one accuse Psion's founder David Potter of lacking a sense of humour.  In the parallel universe of ZDNet News UK, a strange and shadowy world where year-old facts are "disclosed", or breathlessly  "revealed" ... or just made up, Potter has been having some fun at the expense of the channel and Richard Barry, its accident-prone editor.

ZDNet reports Potter as saying "I should also tell you, though I cannot give you details, that there is an implementation of Epoc on another processor as well - which I'm not going to mention!". This teaser was enough to send our friends spinning into a frenzy of speculation about just what this might be. Taking up the mystery is Matthew Boersma, the hack who gave Pat Gelsinger a sex-change last week. "Potter said there is already an implementation of Epoc on a non-ARM processor, which he declined to name," Boersma reports. Casting around for some likely silicon, the loves heroically spin this one into an impending deal with MIPS. Unfortunately... Psion's Symbian partner Motorola is in on the conspiracy. Sixteen months ago it surreptitiously put out a press release just to throw ZDNet off the scent. The press release describes how Motorola is porting Epoc to its M-Core processors. ®

See also: ZD goes Ape MIPS Fatal press release

Boost IT visibility and business value

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.