Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They did ship hardware and software that wasn’t fully enabled. But your post implies there was some deception or extortion. System owners were well aware of what they paid for, or that they could upgrade and unlock some things. Today in software we just call it IAP.

I’m not saying it is how we -should-. But that IBM wasn’t rug pulling.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: