Feeds

MeeGo and the Great Betrayal Myths of tech history

Twitter fanbois demand resurrection of burned-out platform

New hybrid storage solutions

Schisms in the Church of Unix™

Linux comes with its own betrayal myth, for quite different reasons.

Unlike say the Amiga, or OS/2 or BeOS, it's seen as a political movement rather than just a neat bit of technology. This means there's a moral dimension to the evangelism. So it inevitably attracts some noisy people who are naturally disposed to Being Right, And Morally Superior.

Some of us might use Linux because (say) Ubuntu is (or was) faster and more reliable on a cheapo ULV-processor laptop than any version of Windows. Using it is not a statement of identity or political beliefs.

Alternative diets and currencies provide a similar attraction here - it isn't unusual for someone to embrace several.

Eventually being vindicated becomes more important than Winning or pleasing your users, and it becomes an end in itself. Unix has always provided an umbrella for this kind of evangelist, a place where people can subdivide into endlessly squabbling factions.

The Linux Betrayal Myth is usually deployed pre-emptively. Linux would take over the world if it only wasn't for false consciousness of Windows - just wait and see, next year there'll be a billion or a trillion desktops.

Why MeeGo isn't coming back

MeeGo isn't going to return because Nokia can't, on its own, persuade media companies and developers to back it. That's all Elop means by "ecosystem" - markets of content, and developers. Most analysts are doubtful the Microsoft-Nokia combination will even be able to squeeze home into third place, let alone fourth. And if Android (as I expect) forks, those runners-up places in the market will be taken by flavours of Android.

By the end of the year, Nomura predicts, Nokia will be the third largest mobile phone company in the world, with (still) the weakest smartphone portfolio. Be realistic: that's not going to attract developers en masse.

The petition has overnight amassed 734 Twittering signatories. That's 25 an hour.

It must only be a matter of time. You must be worried, Mr Elop... ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
Shades of Mannesmann: Vodafone should buy T-Mobile US
Biting the bullet would let Blighty-based biz flip the bird at AT&T
Drag queens: Oh, don't be so bitchy, Facebook! Let us use our stage names
Handbags at dawn over free content ad network's ID policy
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.