Feeds

Texas senator wants to ban Vista purchases

State agencies need written permission for Aero

Secure remote control for conventional and virtual desktops

Windows Vista gets a lot of grief both in tech circles and the general public — but one Texas lawmaker wants to make it a matter of public policy.

Democrat Texas state Senator Juan Hinojosa recently added a rider to Texas' $182bn budget plan that would ban the state's agencies from purchasing Vista (and all Vista-related technologies) unless they get written permission from the budget board.

The rider was added last week in the Texas senate finance committee, in which Hinojosa serves as vice-chairman. The senate's version of the budget will be up for debate on Wednesday.

Hinojosa told San Antonio Express-News: "We have a lot of problems with the Vista program. It had a lot of bugs. It takes up a lot of memory. It's not compatible with other equipment, and it's supposed to be an upgrade from the XP program that is being used by state agencies, and it's not."

According to the Senate Committee on Finance minutes for March 23, Hinojosa added the anti-Vista rider to the state budget without objection.

One is tempted to speculate Hinojosa received the business end of a BSOD a few too many times to inspire his legislative wrath — but this appears to be just another case of someone taking Vista's unpopular popular opinion on faith. In a brief video interview with the Austin American-Stateman, Hinojosa admits he has no personal experience with the operating system but has "read a lot about the problems they have with this particular software."

And just judging by the rider's title, "Limitation on Purchase of Microsoft Vista Information Technology," it's safe to assume this man isn't the technical wiz to be dictating what software a government agency can use. ®

Beginner's guide to SSL certificates

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.