Feeds

Nope, it's not a Gphone

Memories of Java

  • alert
  • submit to reddit

Boost IT visibility and business value

Opinion Yesterday, Google's announcement of Android headlined the blogosphere, as much for what it was as for what it wasn't. For us, Google's announcement took us a few steps down memory lane, back to an era when software appliances were better known as turnkey systems.

Thanks to Moore's Law, it is taken for granted today that the brunt of value in an IT system is comprised of software. In other words, when hardware became cheap or commodity enough, you could cultivate a market for commercial software.

But until the early 90s, you couldn't always take that for granted. If your application involved heavy number crunching, such as developing mechanical or electrical designs (computer-aided design, or CAD; electronic design automation, or EDA), or grinding out a capacity-constrained schedule for a large factory, you probably had to buy a specialized box powerful enough to run your software. And you paid a pretty premium for it. By the early 90s, Moore's Law made a mockery of that argument, and the market started demanding that vendors shake off their proprietary boxes. Arguably, the emergence of a free market for portable software helped create the conditions that enabled the Internet to flourish.

Today turnkey systems have come back, but we don't call them that. They're available as self-contained software appliances that handle functions so compute-intensive, such as XML message parsing or perimeter security, that it makes sense to move the computing overhead off your network or server farms. And then there are the devices that are bought turnkey, but not out of choice: the portable communications devices on which enterprises (and society at large) increasingly rely.

In the case of appliances, turnkey packaging adds value because of the headaches that it eliminates with integrating such resource hungry systems. By comparison, in the mobile device space, turnkey adds no value, except to the mobile carriers who profit from captive markets. As demand for unlocking the iPhone has demonstrated, the demand for freedom to separate the choice of device, carrier, and service plan is more than idle chatter. The Wall St. Journal's Walt Mossberg made an especially elegant case:

Suppose you own a Dell computer, and you decide to replace it with a Sony. You don't have to get the permission of your internet service provider to do so, or even tell the provider about it. You can just pack up the old machine and set up the new one...

This is the way digital capitalism should work, and, in the case of the mass-market personal-computer industry, and the modern internet, it has created one of the greatest technological revolutions in human history, as well as one of the greatest spurts of wealth creation and of consumer empowerment...

So, it's intolerable that the same country that produced all this has trapped its citizens in a backward, stifling system when it comes to the next great technology platform, the cellphone"

Amen!

With the FCC (Federal Communications Commission) planning to auction off new digital spectrum, Google secured a well-publicized victory by persuading the commission to allot a portion to providers that would support a more open systems approach. And since then, we've been waiting for the next shoe to drop: when will Google unveiled its Gphone, or will it step up to the plate and actually bid on bandwidth (or do so through surrogates)?

Instead, yesterday Google announced Android, a first act towards opening a new mobile market that more resembles the mainstream of digital markets. It's an open source platform for smart mobile devices that's supposed to provide an alternative to Microsoft and Symbian. Android will include its own OS, an HTML web browser, middleware, for which third parties are invited to create applications. Or as colleague Dana Gardner put it, the potential ramifications of Android could shake the PC industry, which is finding itself converging with mobile and home entertainment systems.

Application security programs and practises

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.