Click here to close now.



Welcome!

Open Source Cloud Authors: Jeev Trika, Pat Romanski, Elizabeth White, Ed Featherston, Roger Strukhoff

News Feed Item

Personal Computing's Reincarnation

NEW YORK, Feb. 4, 2014 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:

Personal Computing's Reincarnation
http://www.reportlinker.com/p02003750/Personal-Computing's-Reincarnation.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Broadband

In this SPIE, Stratecast outlines advancements in alternative personal computing models—namely, USB portable workspace (USB-PW), client-hosted desktop virtualization (C-HDV), and server-hosted desktop virtualization (S-HDV)—in the context of a ranking matrix. This matrix consists of four dimensions: end-user device flexibility, session performance, security, and economy.

Introduction

The personal computer (PC) is not dead, but it is in need of an overhaul. Once the bastion of personal productivity in business, this fairly uniform computing model (i.e., the same utilitarian desktop profile provisioned to each end user's physical PC) is generationally obsolete. End-user emphasis on personalization is a prominent driving factor in this need for a PC overhaul. Examples of this include:

Connected and Collaborative – The advent of multiple wired and wireless broadband options transformed the PC from being an isolated environment with narrow means of collaboration (e.g., store-and-forward email) to being part of multiple communal systems and cloud services. As such, the PC experience for end users is no longer defined exclusively by the applications run locally, but also by access to remotely hosted applications. Additionally, software proliferation is on steroids. Stimulated by specialized departmental needs, open source collaboration, publication of application programming interfaces (APIs), and the establishment of app stores, an era of end users personalizing their desktops has been ushered in—frequently with an eye toward enhancing their information gathering, productivity, and collaboration capabilities beyond those authorized by their employers.

Multi-device, Multi-platform – The PC is no longer the only tool in end users' productivity toolboxes. Smartphones and tablets—company-supplied and user-owned— compete for end-user face time. Not only are there more devices in use—diversity in make and model is the norm. Furthermore, with the galloping trend of bring your own device (BYOD), this diversity is compounding.

While seemingly a positive idea—personalization to release end users' inner creative potential—the operational dark side bubbles up too. From an IT perspective, desktop management and helpdesk duties are creeping upward; yet, efficiency and effectiveness are in a catch-up mode. Security and compliance professionals are equally behind in confidently and comprehensively answering "where is our sensitive data now?" Consequently, a retooling of the PC model is overdue; not only to support the agility and personalization requirements that end users and businesses covet, but also to lessen the burden and expense of lifecycle desktop management, and to fortify security.

In this SPIE, Stratecast outlines advancements in alternative personal computing models—namely, USB portable workspace (USB-PW), client-hosted desktop virtualization (C-HDV), and server-hosted desktop virtualization (S-HDV)—in the context of a ranking matrix. This matrix consists of four dimensions: end-user device flexibility, session performance, security, and economy.

Positively, the advancements are noteworthy and offer organizations bona fide alternatives to traditional physical PCs. Each alternative, however, is bound by circumstances that hinder mass adoption. Stratecast's recommendations to increase the appeal for these alternative computing models are also included in this report.

Portable Desktop and its Location

Before describing the three alternative personal computing models, a brief background on the concept of a portable desktop, and the bearing that location has on performance, is presented first.

Common among alternative personal computing models is the concept of a portable desktop. The portable desktop contains the entire software stack of a traditional physical PC (i.e., operating system, company-selected applications such as Microsoft Office suite, user-selected applications, and user files and configurations). This software-only desktop is portable in the sense that it is not bound to one hardware device. Rather, the portable desktop can be hosted on other compatible hardware devices. The role of the host hardware is to power the portable desktop (electricity and computing resources) and function as the interface to peripherals and communication networks.

With the desktop portable, improving desktop management and reducing instances and length of end-user productivity disruptions are possible. For example, if the host device is lost or stolen, the portable desktop (provided a back-up exists) is replicated on a replacement host device in less time than provisioning a replacement physical PC. Similarly, if the operating system or application software become corrupted, a "golden image" of the corrupted software facilitates rapid recovery.

While there are important portability differences across the alternative personal computing models (e.g., range of compatible host devices), which will be discussed later, the portable desktop's location is equally important. By location, Stratecast is referring to two locational dimensions: within the host device, and proximity to the end user. The first, within the host device, refers to whether the portable desktop operates directly on top of the host device's hardware (native; no hypervisor) or on top of a hypervisor. Additionally, there are two types of hypervisors: Type I hypervisor (also referred to as bare metal), which runs directly on the host device's hardware, and Type II hypervisor, which runs on top of the host device's operating system.

The "within the host device" implications are:
Performance Degradation – Two performance implications associated with hypervisor-based models are: the virtualization tax2 and contention caused by multiple active desktops vying for the host device's hardware resources. In practice, the magnitude and variation in performance degradation are partially controllable through technology and architecture (e.g., optimizing hypervisor operation, and the interplay with the host device's hardware), and by good desktop management practices in sizing and configuring the host device's hardware infrastructure based on realistic workload requirements; and then actively monitoring and managing this shared infrastructure.

Security Risk – The host device's operating system and hypervisor operating below the portable desktop represent seams of security risk. As software, the operating system and the hypervisor are vulnerable to hacker exploits. Additionally, each is potentially outside the direct and continuous control of the issuing agent of the portable desktop (i.e., the IT organization); for example, in a BYOD (user-owned device) circumstance or in a subscribed service instance, such as desktop as a service (third-party environment). Also, similar to other forms of software, the likelihood and severity of a security incident or incidents is unpredictable and changeable over time. Nevertheless, security risk exists and should be evaluated relative to the sensitivity and criticality of the work performed through the portable desktop.

Table of Contents

1 | PERSONAL COMPUTING'S REINCARNATION

SPIE 2014 #3 - January 24/2014
1. Introduction
2. Portable Desktop and its Location
3. Alternative Personal Computing Models: Descriptions, Advantages & Limitations, Recent Advances, and Four-Dimension Ranking
4. Stratecast - The Last Word
5. About Stratecast
6. About Frost & Sullivan

To order this report: Personal Computing's Reincarnation
http://www.reportlinker.com/p02003750/Personal-Computing's-Reincarnation.html#utm_source=prnewswire&utm_medium=pr&utm_campaign=Broadband

__________________________
Contact Clare: [email protected]
US: (339)-368-6001
Intl: +1 339-368-6001

SOURCE Reportlinker

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
"We work in the area of Big Data analytics and Big Data analytics is a very crowded space - you have Hadoop, ETL, warehousing, visualization and there's a lot of effort trying to get these tools to talk to each other," explained Mukund Deshpande, head of the Analytics practice at Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2016' as Conference Chair The @DevOpsSummit at Cloud Expo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited t...
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effi...
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Presidio has received the 2015 EMC Partner Services Quality Award from EMC Corporation for achieving outstanding service excellence and customer satisfaction as measured by the EMC Partner Services Quality (PSQ) program. Presidio was also honored as the 2015 EMC Americas Marketing Excellence Partner of the Year and 2015 Mid-Market East Partner of the Year. The EMC PSQ program is a project-specific survey program designed for partners with Service Partner designations to solicit customer feedbac...
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profession...
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Connected devices and the industrial internet are growing exponentially every year with Cisco expecting 50 billion devices to be in operation by 2020. In this period of growth, location-based insights are becoming invaluable to many businesses as they adopt new connected technologies. Knowing when and where these devices connect from is critical for a number of scenarios in supply chain management, disaster management, emergency response, M2M, location marketing and more. In his session at @Th...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Apixio Inc. has raised $19.3 million in Series D venture capital funding led by SSM Partners with participation from First Analysis, Bain Capital Ventures and Apixio’s largest angel investor. Apixio will dedicate the proceeds toward advancing and scaling products powered by its cognitive computing platform, further enabling insights for optimal patient care. The Series D funding comes as Apixio experiences strong momentum and increasing demand for its HCC Profiler solution, which mines unstruc...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...