NCD to 'cease operations'

Slim pickings for thin clients


Exclusive One of the older thin client vendors appears to be closing shop, The Register has learned. Network Computing Devices (NCD) will stop all operations by year end, according to a company memo. Calls to NCD's CEO and CFO were not returned, and a spokeswoman said the company has no comment at this time.

"NCD is currently in the process of ceasing operations," the company said in a memo to workers obtained by The Register. "The company will close operations on December 31, 2004."

The US company seems to have a skeleton staff at the moment. Calls placed to NCD's main line, technical support line and customer service line were all greeted by answering machines.

In February of this year, NCD worked to consolidate its European operations as a cost-cutting measure.

NCD started way back in 1988. Some of its earliest products were thin client terminals designed for Unix users. Later, NCD developed a Windows-based client running Microsoft's Windows CE operating system. It currently makes a variety of hardware and software products in its ThinPATH line and has offices in the US and Europe.

The thin client remains one of those great computing ideas that never really took off. Unlike PCs, thin clients typically ship with a minimum set of innards. They simply connect back to a server. This means the client on a user's desk is typically smaller, cooler and more quiet than a regular PC. Advocates of the thin client also argue that it's cheaper and more secure to manage clients from a server as opposed to rolling out software updates to myriad individual PCs.

Sun Microsystems is the last of the big vendors really pushing the thin client idea. A number of others, however, do now offer clients that connect back into a blade server that functions as a PC, which is a similar attack. Sun has recently been talking about possibly having service providers give away its thin clients to users for free in exchange for ongoing software subscription services. This model is similar to phone companies that give away or subsidize the cost of mobile handsets.

NCD enjoyed a large amount of press back in 1998 when thin client hype was particularly high. It shared product development with the likes of Intel and IBM and secured strong endorsements from Microsoft. Its X Terminal products were particularly popular for a time, but the firm steadily lost market share.

Most of NCD's current hardware sales go to Europe with it focusing on software in North America. Competitor Wyse Technology estimates that NCD sold less than 900 thin clients in Europe last quarter.

"They were playing a very small role," said Jeff McNaught, vice president of communications at Wyse.

Wyse remains optimistic about the thin client market despite NCD's apparent problems. IDC predicts the thin client segment will grow much faster than the PC market in the coming years. Close to 400,000 thin clients were sold worldwide in the third quarter of this year. ®

Related stories

What the hell is a thin client?
NCD raids Wyse for UK operations
NCD scores thin client deal with EDS
NCD and Intel to leanly dally
The post-PC era is upon us
ClearCube puts bells and whistles on blade PC
Thin client thrives in Web services era
Transmeta powers brace of HP thin clients


Other stories you might like

  • Prisons transcribe private phone calls with inmates using speech-to-text AI

    Plus: A drug designed by machine learning algorithms to treat liver disease reaches human clinical trials and more

    In brief Prisons around the US are installing AI speech-to-text models to automatically transcribe conversations with inmates during their phone calls.

    A series of contracts and emails from eight different states revealed how Verus, an AI application developed by LEO Technologies and based on a speech-to-text system offered by Amazon, was used to eavesdrop on prisoners’ phone calls.

    In a sales pitch, LEO’s CEO James Sexton told officials working for a jail in Cook County, Illinois, that one of its customers in Calhoun County, Alabama, uses the software to protect prisons from getting sued, according to an investigation by the Thomson Reuters Foundation.

    Continue reading
  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading

Biting the hand that feeds IT © 1998–2021