Feeds

MS unveils PC rental plan

Pay-as-you-go computing for emerging markets

Security for virtualized datacentres

Microsoft today launched a technology to enable the delivery of PC rental schemes in emerging markets modelled on mobile phone pay-as-you-go packages. Dubbed FlexGo, the framework allows suppliers to rent out PCs activated by pre-pay cards. Consumers buy access to the machine for a certain period of time - when the card runs dry, the PC refuses access until the user buys more runtime.

Microsoft said the scheme was aimed at regions where folks can't afford to buy new machines or can't get credit to do so either. The scheme overlaps a little with projects to offer developing countries low-cost computers, but it's aimed more at nations that already have large urban populations and industrialisation.

Microsoft said trial pay-as-you-go PC schemes were now commencing in Brazil, with other pilots coming soon to China, Hungary, India, Mexico, Russia, Slovenia and Vietnam.

FlexGo also enables subscription models, allowing, say, ISPs to provide customers not only with internet access, but a machine to connect up at their end. Depending on the ISP's business model, users pay a percentage of the up-front cost of the PC or nothing at all.

The pay-as-you-go programme works the same way but the initial cost to the consumer is likely to be higher because there's less opportunity for the machine's provider to recoup costs over time.

microsoft flexgo rental pc

Either way, end users are likely to end up paying more for the PC than they might otherwise do, as is the way with all credit and rental schemes. Of course, buying outright may be less expensive in the long run, but it assumes the user has the wherewithal to do so.

But this is no philanthropic exercise - Microsoft's partners see the scheme as a way to sell more PCs and the software giant is itself looking to ship technology licences and server software on the back of it.

Will consumers in the countries Microsoft is targeting perceive a benefit to PC ownership? And will the system be sufficiently secure to prevent its abuse? Microsoft claimed that in addition to the metering system FlexGo adds to a "standard PC", it also monitors the PC for attempts to compromise its integrity - if someone puts back the system clock, for example. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
iPAD-FONDLING fanboi sparks SECURITY ALERT at Sydney airport
Breaches screening rules cos Apple SCREEN ROOLZ, ok?
Crouching tiger, FAST ASLEEP dragon: Smugglers can't shift iPhone 6s
China's grey market reports 'sluggish' sales of Apple mobe
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
The British Museum plonks digital bricks on world of Minecraft
Institution confirms it's cool with joining the blocky universe
Turn OFF your phone or WE'LL ALL DI... live? Europe OKs mobes, tabs non-stop on flights
Airlines given green light to allow gate-to-gate jibber-jabber
Be your own Big Brother: Keeping an eye on Mum and Dad
All watched over by machines of loving grace
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.