Feeds

Dell offers 'Windows Vista Bonus' to frightened customers

The 'bonus' is XP instead of Vista

High performance access to file storage

Dell is actively promoting a Microsoft licensing loophole to channel partners eager to keep selling PCs installed with Windows XP, after Microsoft's official cut off.

The Dell channel blog is pointing resellers to the loophole in the Windows Vista license that enables business customers to downgrade from the unwanted Windows Vista to its dated, but comfortable and better-supported predecessor.

According to the blog: "Dell can sell what we've branded 'Windows Vista Bonus' which allows us to preinstall XP Professional with a Vista license (on select system categories). This lets customer's upgrade to the Vista platform when they're ready. And yes, Dell will support both OSs."

Dell's blog points resellers to further information here.

Dell, meanwhile, is also making Windows XP available as an image to those partners using the company's Custom Factory Integration service.

The blog was designed to coincide with the last day Windows XP was officially available from Microsoft. From now on, you can only get Windows Vista. Officially.

Dell has taken a leading position in continuing to offer Windows XP. Earlier this month Dell vowed to keep selling PCs running the operating system until "at least 2009".

Dell's stance of not just offering Windows XP directly but actively telling its huge ecosystem of resellers how they, too, can game Microsoft's system and continue selling Windows XP demonstrates a significant shift in the OEM's relationship with Microsoft.

With chief software architect Bill Gates' departure fresh in the air, it should be remembered how, under Gates' tenure last decade as chief executive, Microsoft exploited its position as supplier of a popular PC operating system to play hardball with PC OEMs on licensing Windows.

During the US Department of Justice's antitrust trial, IBM revealed that Microsoft had delayed giving IBM access to Windows 95 simply because IBM refused to kill its own OS/2 operating system or agree to not bundle its SmartSuite rival to Office on IBM PCs.®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.