Feeds

Microsoft – it’s only marketing

So that's all right then

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

An interesting set of responses have already come in to the article here about Microsoft charging for Office beta downloads.

The comments already attached to it I will let stand for themselves, but a couple of emails I have received are of interest: one because it appeals to the naturally occurring improbable-conspiracy-theorist in me, and the other because it may contain a genuine, and slightly underhand, marketing reason for the move to start charging.

Firstly, the conspiracy theory. I am grateful to Jez for the suggestion that "Bill Gates is actually the world's biggest Linux advocate, but due to the potential for a political nightmare if he just said this, he is being sneaky and trying his best to make windows so un-workable that people are forced to switch to the superior OS."

I suppose it could be true.

The second email, however, may contain more to ponder. Roger Thomas works in the finance industry, and brought to my attention what might just be the real, marketing-driven reason behind the move.

By making people pay, Microsoft will garner a great deal of valuable information about them – names, addresses, valid email addresses etc – all types of information that marketing departments move heaven and earth to acquire.

But as companies like Microsoft move towards the subscription model for revenue generation, rather than the cash-up-front comfort of the outright purchase of licences, identifying customers with ownership of a valid and functional credit card – presumably to which some form of "regular payments" order can be attached – is important information.

Couple this with a proven penchant for being an "early adopter" – and actually shelling out money for a beta copy of Office would be just such a sign – and suddenly Microsoft has, Roger Thomas speculates, information that is "worth its weight in gold".

Perhaps we all ought to start singing that old Hollies hit, "King Midas in Reverse" as a protective incantation. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.