Feeds

Of bubbles and developers

The big events of 2005

The Power of One Brief: Top reasons to choose HP BladeSystem

2005 in review Silicon Valley is a different place these days. After years of dot-com fallout, 2005 saw tech companies regain their self confidence - a fact signified by rapacious M&A, guilt-free spending on marketing activities and bold strategic statements.

Here are the events that made this year what it was, and that will have an impact on the coming 12 months.

IBM's turns open source on self with Gluecode

There's a common misunderstanding in Silicon Valley that IBM loves open source. It does, just as long as open source furthers IBM's own business and doesn't compete against products like WebSphere. That logic saw IBM buy open source application Java application server start-up Gluecode and agree to fund the Apache Geronimo project on which Gluecode is based. The deal was significant for two reasons: first, it was IBM's entrance into this year’s hot topic of charging for software as a service instead of charging per CPU. Secondly, it was designed to stop JBoss from building large market share at the expense of closed-source products like its WebSphere application server, which IBM would be forced to win back years from now.

Microsoft played nice with open source

We're not in Kansas any more when one of open source's harshest critics announces support for Linux in Windows Virtual Server 2005 and a Windows server integration deal with JBoss. What's going on? Microsoft demonstrated good business sense this year by toning down the rhetoric and recognizing if it continued to put itself outside of the open source market then it would lose business and - essential for Microsoft - developer mindshare. More than 20 per cent of Windows developers plan to build with open source according to analyst Evans Data, meaning that Microsoft could either work with people like JBoss and optimize Windows for the application server or it could see its developers drift away by using tools and server software from competitors whose products are optimized for JBoss. Shame Microsoft hasn't experienced the same moment of clarity on Office.

Bubble 2.0

Everyone was bitten by the Web 2.0 bug in 2005. Search and social networking were this year's hottest subjects. You couldn't mention Microsoft's desktop and internet search strategy without referencing Google, while Google's run-away train ads business and drip-drip drain on

Seven Steps to Software Security

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
KDE releases ice-cream coloured Plasma 5 just in time for summer
Melty but refreshing - popular rival to Mint's Cinnamon's still a work in progress
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Another day, another Firefox: Version 31 is upon us ALREADY
Web devs, Mozilla really wants you to like this one
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.