Feeds

Nope, it's not a Gphone

Memories of Java

  • alert
  • submit to reddit

High performance access to file storage

Opinion Yesterday, Google's announcement of Android headlined the blogosphere, as much for what it was as for what it wasn't. For us, Google's announcement took us a few steps down memory lane, back to an era when software appliances were better known as turnkey systems.

Thanks to Moore's Law, it is taken for granted today that the brunt of value in an IT system is comprised of software. In other words, when hardware became cheap or commodity enough, you could cultivate a market for commercial software.

But until the early 90s, you couldn't always take that for granted. If your application involved heavy number crunching, such as developing mechanical or electrical designs (computer-aided design, or CAD; electronic design automation, or EDA), or grinding out a capacity-constrained schedule for a large factory, you probably had to buy a specialized box powerful enough to run your software. And you paid a pretty premium for it. By the early 90s, Moore's Law made a mockery of that argument, and the market started demanding that vendors shake off their proprietary boxes. Arguably, the emergence of a free market for portable software helped create the conditions that enabled the Internet to flourish.

Today turnkey systems have come back, but we don't call them that. They're available as self-contained software appliances that handle functions so compute-intensive, such as XML message parsing or perimeter security, that it makes sense to move the computing overhead off your network or server farms. And then there are the devices that are bought turnkey, but not out of choice: the portable communications devices on which enterprises (and society at large) increasingly rely.

In the case of appliances, turnkey packaging adds value because of the headaches that it eliminates with integrating such resource hungry systems. By comparison, in the mobile device space, turnkey adds no value, except to the mobile carriers who profit from captive markets. As demand for unlocking the iPhone has demonstrated, the demand for freedom to separate the choice of device, carrier, and service plan is more than idle chatter. The Wall St. Journal's Walt Mossberg made an especially elegant case:

Suppose you own a Dell computer, and you decide to replace it with a Sony. You don't have to get the permission of your internet service provider to do so, or even tell the provider about it. You can just pack up the old machine and set up the new one...

This is the way digital capitalism should work, and, in the case of the mass-market personal-computer industry, and the modern internet, it has created one of the greatest technological revolutions in human history, as well as one of the greatest spurts of wealth creation and of consumer empowerment...

So, it's intolerable that the same country that produced all this has trapped its citizens in a backward, stifling system when it comes to the next great technology platform, the cellphone"

Amen!

With the FCC (Federal Communications Commission) planning to auction off new digital spectrum, Google secured a well-publicized victory by persuading the commission to allot a portion to providers that would support a more open systems approach. And since then, we've been waiting for the next shoe to drop: when will Google unveiled its Gphone, or will it step up to the plate and actually bid on bandwidth (or do so through surrogates)?

Instead, yesterday Google announced Android, a first act towards opening a new mobile market that more resembles the mainstream of digital markets. It's an open source platform for smart mobile devices that's supposed to provide an alternative to Microsoft and Symbian. Android will include its own OS, an HTML web browser, middleware, for which third parties are invited to create applications. Or as colleague Dana Gardner put it, the potential ramifications of Android could shake the PC industry, which is finding itself converging with mobile and home entertainment systems.

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.