Feeds

Microsoft shouts 'Long Live XP'

Extends XP sales as market snubs Vista

High performance access to file storage

Microsoft’s dream of a Vista only world moved farther out on the horizon yesterday as the software firm admitted it would extend sales of Windows XP by another five months.

XP was supposed to be off the vendor’s price list by the end of January 2008. Now it will stick around until the end of the second quarter. The cut down Starter edition for very low end machines will stay on Microsoft’s price list till 2010.

Mike Nash, Microsoft corporate vice president, Windows product management, put a brave face on the decision, claiming that, “While we’ve been pleased with the positive response we’ve seen and heard from customers using Windows Vista, there are some customers who need a little more time to make the switch to Windows Vista.”

Or put another way, punters are doing anything they can to avoid having to install and run Vista on their machines.

Nash also said, “We’re also seeing more retail customers purchasing their new Windows operating system when they get a new PC than we ever have before, rather than purchasing it standalone.”

The problem is, while Microsoft used to have punters queuing around the block to buy a shrink-wrapped copy of its latest OS, this time it’s remaining copies of a six year old product that they’re carrying to the check-out.

Microsoft’s sputtering Vista launch has left vendors and the channel fuming, after they ramped up to deal with the hardware hungry leviathan of an OS.

UK retail chain PC World blamed the non-take off of Vista for an over-stock problem in its most recent results, with CEO John Clare saying “gross margins have been materially impacted as a result of increased promotional activity to reduce one-off hardware stock levels that resulted from lower than expected demand for Vista products.”

Vista’s half-cocked launch has also been blamed for a slide in component prices, that has exacerbated price cutting in the PC market, putting manufacturers’ margins under even more pressure.®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.