The Great Tech Rebellion: When Platforms Turn Against Their Own
Editorial digest April 09, 2026
Last updated : 00:45
Something is shifting in the relationship between technology companies and the platforms they depend on. Wednesday brought a cascade of stories that, taken together, paint a stark picture: businesses and developers are hitting the limits of what they'll tolerate from their technology landlords.
The VMware exodus accelerates
Western Union, one of the world's oldest financial services companies, has begun migrating its entire infrastructure from VMware to Nutanix. The reason is blunt — it no longer wants to do business with Broadcom, which acquired VMware and promptly overhauled its licensing model. Western Union is not alone. South Korea's largest theme park is on the same journey, and across the enterprise world, IT teams are quietly drawing up exit plans.
This matters beyond the data centre. Broadcom's aggressive monetisation of VMware has become a case study in what happens when a platform owner decides to extract maximum value from a captive user base. For UK businesses running VMware — and there are thousands — the calculation is straightforward: pay significantly more, or invest in migration now. Neither option is painless, but the direction of travel is clear.
Microsoft locks out the people who build its ecosystem
The VMware story finds a troubling parallel in the developer world. Jason Donenfeld, creator of WireGuard — one of the most respected open-source VPN tools in use today — cannot ship software updates because Microsoft locked his developer account. No warning. No explanation. He is the second high-profile developer to report this treatment in recent weeks.
Think about what this means in practice. Millions of Windows users running WireGuard cannot receive security patches because a platform gatekeeper flipped a switch. The developer who wrote the code, who maintains it for free, who has built something that genuinely makes the internet safer, is powerless. This is not a hypothetical risk of platform dependence. It is happening now, to critical security infrastructure.
For the UK's growing open-source community and the businesses that rely on these tools, the lesson is uncomfortable: your software supply chain runs through chokepoints controlled by companies with no obligation to keep the lights on for you.
The AI gold rush reshapes everything — even the hype
Meanwhile, the artificial intelligence transformation continues at breakneck speed, though not always in the directions the marketing departments promise.
Meta unveiled Muse Spark, the first model produced under its new Superintelligence Labs division, now led by former Scale AI chief Alexandr Wang. The naming alone — "Superintelligence Labs" — signals the ambition. Canva acquired two AI companies in a single day, bolting on agentic AI and marketing automation capabilities. Atlassian is rebuilding Confluence around AI tools that turn notes into graphics and ideas into working applications.
But the sharpest observation came from Kelsey Hightower, the former Google engineer who helped popularise Kubernetes. His advice to IT professionals: rebrand your existing automation as "zero-token architecture" and watch the enterprise buyers come running. It is a joke, but only just. The insight underneath is serious — much of what is being sold as revolutionary AI capability is, in practice, conventional automation with a language model bolted on top. Smart technologists will exploit that gap between perception and reality.
AWS chief Matt Garman, meanwhile, offered a remarkably candid explanation for why Amazon invests billions in both Anthropic and OpenAI — direct competitors. His answer: AWS has always competed with its own partners. It is a reminder that in the AI arms race, the cloud providers are not picking winners. They are building tollbooths.
The threats you cannot see
Beneath the platform wars and AI frenzy, cybersecurity continues its grim evolution. A hack-for-hire group was caught targeting Android devices and iCloud backups using spyware and phishing, a reminder that surveillance-for-sale is a thriving industry. And Cynthia Kaiser, former FBI cyber division chief, offered a counterintuitive warning: amateur ransomware operators may be more dangerous than the professionals. Why? Because they do not know what they are doing. When an amateur encrypts your data, there may be no decryption key to buy back. The incompetence is the threat.
For British organisations already grappling with tightening cyber regulations, this is a sobering thought. You cannot negotiate with someone who has accidentally destroyed what they stole.
What this means
The thread connecting these stories is control — who has it, who is losing it, and what it costs to get it back. The enterprises fleeing VMware, the developer locked out of his own tools, the businesses trying to separate AI substance from AI theatre — all are navigating the same fundamental question: how much autonomy are you willing to surrender for convenience?
The answer, increasingly, is less than we thought.