Feeds

Windows 7: MS plays a Jedi mind trick on netbook owners

And happiness is not a hardware acquisition

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Radio Reg At Microsoft, your potential is their passion. Unless you’re passionate about owning a low-priced netbook, which hurts Microsoft’s bottom line.

Netbooks are the only segment of the PC market growing, and while netbooks installed with Windows are good for the ubiquity of Windows and power of Microsoft, they deny Microsoft money that might have gone on more expensive, premium editions of Windows on notebooks and desktops.

With Windows 7, out as a release candidate this week and next, Microsoft hopes you’ll succumb to a Jedi Mind Trick: that you’ll buy a netbook with a version of Windows 7 that will only let you run three applications simultaneously and that won’t have a media player or simplified networking, but that you’ll like Windows 7 so much you’ll then want to buy a notebook or desktop running a full version of Windows 7.

And Microsoft wonders why European regulators are so willing to see the company in court. But then, hey, they are a bunch of latte-drinking, European socialists - what would they know about liberty and the spirit of free enterprise, the hallmarks of capitalism and Microsoft?

The Register Software editor Gavin Clarke and All-About-Microsoft blogger Mary Jo Foley tear into the technology of the Windows 7 RC 1, talk about the anti-trust button Microsoft is introducing to “remove” Internet Explorer 8 and finally silence regulators, and whether Microsoft should carry rival browsers when it distributes Windows 7.

Also in this latest edition of MicroBite, we look at why you shouldn’t expect Microsoft to follow database and software rival Oracle with a hardware- or systems-company purchase of its own.

That’s straight from the House Un-Microsoft Activities Committee (HUMAC). If such a thing existed. Microsoft does, though, plan to compete against Oracle in the market for massive, mainframe-like database appliances - so, rest assured, there is some red-blooded, meat-eating competition ahead for all you Ayn Rand types.

Catch the whole, 35-minute, pinko-loving-free-market-hating-left-bashing-competitive-embrace of MicroBite using The Reg player below, in MP3 or Ogg Vorbis format.®

MicroBite 8

Providing a secure and efficient Helpdesk

More from The Register

next story
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
Business is back, baby! Hasta la VISTA, Win 8... Oh, yeah, Windows 9
Forget touchscreen millennials, Microsoft goes for mouse crowd
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
'Google is NOT the gatekeeper to the web, as some claim'
Plus: 'Pretty sure iOS 8.0.2 will just turn the iPhone into a fax machine'
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.