Feeds

In the beginning was the mainframe...

Technical evolution

HP ProLiant Gen8: Integrated lifecycle automation

Comment Some say the technical platform future lies with commodity-based blade computers.

Others would have us believe in a mainframe renaissance, with centralisation giving better economies and up-times. Yet others say that software as a service will drive us towards a socket-in-the-wall mentality where all computer requirements are served by hosted managed solutions.

Are any of these right? On their own, probably not. What is more likely is that they will all be right in one way or another.

As an analogy, I would like to use the history of our planet, and how the mountains and plains have emerged over time. Right back at the beginning, we had a spinning ball of debris with little topographical detail, which we can compare to the pre-computer days of abacuses, tally sticks, log tables and slide rules, but nothing very big.

The planet then consolidated and formed a hard crust, with contents that, over a period of billions of years, crashed into each other, creating huge mountain chains (for us, mainframes).

On these mountains, luxurious flora flourished, much like the specialised applications written by the early developers who had no need to worry about standards and interoperability.

Away from the edges of the main activity, large areas of relative stability remained as plains (the majority of companies, which did not use computers at all). Even today, ongoing volcanic and tectonic plate activity still sends up a new mountain every now and again.

The early mountains wore slowly worn down to smaller mountains (midi servers) and rolling hills and dales (distributed client/server computing). Water and ice action created valleys even in the plains (even laggard organisations eventually found computers useful).

Man enters the picture very late on, and, finding the valleys fertile and easy to farm, slowly moves over to common crops such as wheat and barley—in much the same way as early standardisation happened in the client/server world.

It gives us today's "standard" environment - flood plains, valleys, foothills and mountains. To make things work for us, we have globalised agriculture in areas with a similar environment (the right sort of soil, weather and farming capabilities), more specialised approaches for areas with less commonality, and exotica growing in the higher reaches where few people dare to tread.

But erosion will continue. The mountains and many of the larger hills are ill-suited to long-term survival. For example, large rocks are precariously perched on steep slopes, cliffs are broken down by ice and water, thin layers of once heavily forested soil are washed away.

Similarly, within mainframe and large server applications, redundant functionality will be washed out into the valleys and flood plains, which will silt up with smaller, commodity blade computers. But the large machines will still be there, doing what they are best at, being more "exotic" than the heavily farmed low-lying areas.

How we access the world has also changed. In the early days, climbing a mountain was something only a few could be proud of, but now even if you cannot scale a mountain on foot, you can fly around it and see its glories up close.

With the technology world, we have driven connectivity and interoperability, opening up the large mountains and the rolling hills to the flood plain dwellers.

The next generation of service-oriented composite applications will find a way up to the highest parts of the mountains. For the purist, this has little attraction: being one of the few who can physically go there is a big part of the attraction.

But we may be able to keep everyone happy, for example, by virtualising the whole experience and allowing people to "be there" from the real comfort of their own environment.

Similarly in IT, there will always be those who prefer to keep all others out of their domain. But integration and the removal of functional redundancy is all to the good.

And the ending to this analogy? It is that you cannot change what you have got completely, and the world will only change slowly around you. But in a world in which you are just a very small item, changing your viewpoint can let you appreciate things a lot more.

Copyright © 2006, Quocirca

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.