Feeds

World hunts CherryPal cloud PC chimera

Have you seen the 2 watt mini machine?

Build a business case: developing custom apps

People are beginning to wonder if Max Seybold's sandwich-sized wonder machine really exists.

The CherryPal CEO says his 2-watt thin client cloud PC finally shipped on November 4, after months of delays. But a chorus of CherryPal "Brand Angels" - Web 2.0 denizens enlisted to promote the product in the blogosphere - say they've yet to see any hardware.

"I know I'm not alone in suspecting that all the promises of shipments and funding up until now were a ruse - as far as I can tell, there's not a single CherryPal computer out in the wild yet, and I'm starting to doubt that there'll ever be," one Brand Angel says on a private social network the company may or may not have set up for these blog-happy reviewers.

Seybold has fashioned his Mountain View-based operation as a mashup of every buzzphase now gripping the minds of the worldwide digerati, from cloud computing to green tech to, yes, user generated content. Each Brand Angel was promised a free cloudy, green machine - and perhaps free stock options - in exchange for some online viral marketing. But the Brand Angel social network includes 106 members, and none say they've received a system.

In June, the CherryPal CEO told The Reg that his Freescale-powered mini-machine would outpace both your Vista desktop and your beloved Macintosh. And little more than a month later, the startup began taking pre-orders at $249 a pop, telling buyers that units would ship within a matter of days.

Seybold and company promised a 10.5-ounce box that moves "most of the software and data that traditionally sits on the desktop to the Internet." The unit would include a small solid state drive, but it would also tap into data and services sitting on Amazon's S3 cloud.

Shot of the wee CherryPal

Have you seen me?

Then the company said a snafu involving its graphics hardware would push shipments back at least two weeks. Then two months passed. But Seybold insisted his mystery machine would finally make its debut on November 4, US election day.

The essential guide to IT transformation

Next page: Halloween tale

More from The Register

next story
Reg man looks through a Glass, darkly: Google's toy ploy or killer tech specs?
Tip: Put the shades on and you'll look less of a spanner
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
One step closer to ROBOT BUTLERS: Dyson flashes vid of VACUUM SUCKER bot
Latest cleaner available for world+dog in September
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
Apple's iWatch? They cannae do it ... they don't have the POWER
Analyst predicts fanbois will have to wait until next year
Tim Cook in Applerexia fears: New MacBook THINNER THAN EVER
'Supply chain sources' give up the goss on new iLappy
HUGE iPAD? Maybe. HUGE ADVERTS? That's for SURE
Noo! Hand not big enough! Don't look at meee!
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.