Feeds

Nope, it's not a Gphone

Memories of Java

  • alert
  • submit to reddit

The next step in data security

Opinion Yesterday, Google's announcement of Android headlined the blogosphere, as much for what it was as for what it wasn't. For us, Google's announcement took us a few steps down memory lane, back to an era when software appliances were better known as turnkey systems.

Thanks to Moore's Law, it is taken for granted today that the brunt of value in an IT system is comprised of software. In other words, when hardware became cheap or commodity enough, you could cultivate a market for commercial software.

But until the early 90s, you couldn't always take that for granted. If your application involved heavy number crunching, such as developing mechanical or electrical designs (computer-aided design, or CAD; electronic design automation, or EDA), or grinding out a capacity-constrained schedule for a large factory, you probably had to buy a specialized box powerful enough to run your software. And you paid a pretty premium for it. By the early 90s, Moore's Law made a mockery of that argument, and the market started demanding that vendors shake off their proprietary boxes. Arguably, the emergence of a free market for portable software helped create the conditions that enabled the Internet to flourish.

Today turnkey systems have come back, but we don't call them that. They're available as self-contained software appliances that handle functions so compute-intensive, such as XML message parsing or perimeter security, that it makes sense to move the computing overhead off your network or server farms. And then there are the devices that are bought turnkey, but not out of choice: the portable communications devices on which enterprises (and society at large) increasingly rely.

In the case of appliances, turnkey packaging adds value because of the headaches that it eliminates with integrating such resource hungry systems. By comparison, in the mobile device space, turnkey adds no value, except to the mobile carriers who profit from captive markets. As demand for unlocking the iPhone has demonstrated, the demand for freedom to separate the choice of device, carrier, and service plan is more than idle chatter. The Wall St. Journal's Walt Mossberg made an especially elegant case:

Suppose you own a Dell computer, and you decide to replace it with a Sony. You don't have to get the permission of your internet service provider to do so, or even tell the provider about it. You can just pack up the old machine and set up the new one...

This is the way digital capitalism should work, and, in the case of the mass-market personal-computer industry, and the modern internet, it has created one of the greatest technological revolutions in human history, as well as one of the greatest spurts of wealth creation and of consumer empowerment...

So, it's intolerable that the same country that produced all this has trapped its citizens in a backward, stifling system when it comes to the next great technology platform, the cellphone"

Amen!

With the FCC (Federal Communications Commission) planning to auction off new digital spectrum, Google secured a well-publicized victory by persuading the commission to allot a portion to providers that would support a more open systems approach. And since then, we've been waiting for the next shoe to drop: when will Google unveiled its Gphone, or will it step up to the plate and actually bid on bandwidth (or do so through surrogates)?

Instead, yesterday Google announced Android, a first act towards opening a new mobile market that more resembles the mainstream of digital markets. It's an open source platform for smart mobile devices that's supposed to provide an alternative to Microsoft and Symbian. Android will include its own OS, an HTML web browser, middleware, for which third parties are invited to create applications. Or as colleague Dana Gardner put it, the potential ramifications of Android could shake the PC industry, which is finding itself converging with mobile and home entertainment systems.

Security for virtualized datacentres

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.