Feeds

Why Microsoft is Acorn and Symbian is the new CP/M

Today's phones are just like '80s computers

Top 5 reasons to deploy VMware with Tegile

And what happened?

Unfortunately by next year MSX was indeed out of date, and despite selling several million units it never became the standard the owners intended.

One can even extend this analogy to encompass Java, or J2ME as the phone-version is known. Java, rather unfortunately, compares well to the BASIC language of the 1980's, in that every computer ran a variation of it, but you couldn't expect an application developed on one to work properly on another without considerable effort. J2ME is still a useful language, but fragmentation of implementations continue to hold it back.

Take this analogy and run forward twenty years or so, and we find that Windows Phone 7, Symbian and Bada are memories brought up in the pub for the sake of geek nostalgia - or worse, relegated to powering something like the Amstrad PCW, where CP/M found a home for a while. In 2030, if our analogy is accurate, the majority of people are using Android, while a small, but vocal, minority continue to insist that Apple makes the best of everything.

One thing we have failed to do is find a place for the Blackberry, though if we keep our horizons within the UK then it's tempting to compare RIM to ICL. ICL certainly dominated government departments, but the comparison isn't really satisfactory, so we welcome suggestions for the 1980's player who most resembles RIM, and anyone else we missed off.

Our analogy isn't complete, or entirely accurate. It's obviously wrong to compare the mighty Google with the fledging Microsoft, though taking IBM's involvement in the promotion of MS-DOS into consideration perhaps that's not too far from the mark.

The point is that the number of desktop operating systems expanded hugely, and then contracted as the majority of people wanted decided to either be different, or run the same software as everyone else.

That left space for two significant players - and all the evidence now points to the mobile industry following a similar course. Only smaller. ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.