Feeds

Sun: Let us now praise the ponytail

Could you have done better than McNealy and Schwartz?

  • alert
  • submit to reddit

Internet Security Threat Report 2014

The end of Sun Microsystems as an independent systems company has been met with a mixture of "I told you so" and "good riddance". But as someone who spent plenty of time at Sun over the past decade - including the dot com years - I wonder if anyone could have played a better hand?

Schwartz and McNealy succeeded in stemming the haemorrhage of Sun's user base, preserving most of the company's R&D investment, and ultimately delivering a handsome deal to shareholders. The latter is what CEOs are actually paid to do - not clean your car, or cure malaria.

(Or as our Ashlee put it here, "replace data centers with jellybeans and justice").

Giving McSchwartz credit isn't always easy. Would a grown man, in full possession of his marbles, really write "If the Information Age was passive, the Participation Age is active" and give the blog post the name "inevitability"? Hubris beckons. For any reporter, it was hard to keep up with Sun's desktop strategy. In a mere three years, it shifted from emphasising the thin-client SunRays, to its own Linux ("Java Desktop System"), to giving away a souped-up Solaris for x86.

(In 2002, Sun had axed Solaris for Intel and it took pressure from customers to revive it. By 2005, it was a key strategic asset again, and today, you can buy Dell Poweredge servers with Solaris).

My esteemed colleague Chris Mellor thinks Sun could never decide which company it wanted to be - a proprietary SPARC vendor or a commodity Intel vendor. But that dilemma has faced not only Sun, but every proprietary hardware company, for every day since the ascendence of Intel in the early 1990s. (Remember that even Microsoft didn't bet the farm on Intel, making sure NT ran on MIPS, Alpha and PowerPC chips, all of which were superior at the time, and looked like they would endure). It's really the same challenge Sun posed to minicomputer makers in the 1980s with Unix. Most of those competitors were sold for scrap, not $7.4bn. The mighty SGI fetched just $25m recently.

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.