Feeds

MS launches 'unlimited potential' campaign

The big picture on the 'next five billion'

Internet Security Threat Report 2014

Comment Microsoft has announced its Unlimited Potential campaign - with a sub headline of "The Next Five Billion". This number points to the number of people as yet untouched by general computer technology, with only around 1.2 billion people on the planet currently having such technology available to them.

With multiple offerings hidden under the main banner, Microsoft seems to be providing "commercial philanthropy" - a very low cost of entry to the target users, but also in a way that provides revenue with margins to the mothership. As an example, governments in qualifying environments will be able to license a Microsoft stack (operating system and software) at a cost of $3 per student.

By doing this, the theory goes, Microsoft will turn out adults who are more used to Microsoft than the alternatives - and local commercial organisations will probably opt for buying Microsoft products to tap in to this available skills base.

However, an area that has to be watched here is the overall global sustainability of getting technology to people who are disenfranchised through existing distribution models. The West went through massive changes in the 19th century as the industrial revolution progressed, with mass migration from the rural economies to the cities.

Many of the people moving from the country to the cities found their situation did not improve - life in a country hovel was often better than the day to day struggle to survive in a city slum. The move would also have had an impact on the agricultural output of the rural economies but luckily the agricultural revolution had already replaced a lot of manual resources with automated ones, so providing a ready base of workers for the industrial needs.

If we look at the relentless pace of the technical revolution in certain emerging economies we see something remarkably similar - cities such as Mumbai and Pune in India and Beijing and Shenzhen in China have become the technology magnets, attracting people from surrounding towns and villages towards a promise of wealth in the technologically advanced centres.

Again, this migration has bred large shanty towns and/or low cost, low quality housing for the people who thought the cities would provide them with wealth - but find that if they can find a job, the wages paid do not make up for the increase in their cost of living. Worse, the loss to the agronomy of the country is not being offset to the level that the West managed and the pace of change is happening over the space of a few years, rather than the decades the industrial revolution took. With the West having a degree of dependency on the agricultural output of many of the emerging economies, any failure in the agronomies of these countries has a far-reaching knock-on effect.

It becomes incumbent, therefore, on technology vendors to be careful in how they approach these markets. The creation of specific technology centres within many countries will lead to destabilisation of the supply and demand of basic staples and to unsustainable use of resources, first at a local level but rapidly growing to a country, regional, and then global level.

Beginner's guide to SSL certificates

More from The Register

next story
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.