Feeds

Nope, it's not a Gphone

Memories of Java

  • alert
  • submit to reddit

High performance access to file storage

Opinion Yesterday, Google's announcement of Android headlined the blogosphere, as much for what it was as for what it wasn't. For us, Google's announcement took us a few steps down memory lane, back to an era when software appliances were better known as turnkey systems.

Thanks to Moore's Law, it is taken for granted today that the brunt of value in an IT system is comprised of software. In other words, when hardware became cheap or commodity enough, you could cultivate a market for commercial software.

But until the early 90s, you couldn't always take that for granted. If your application involved heavy number crunching, such as developing mechanical or electrical designs (computer-aided design, or CAD; electronic design automation, or EDA), or grinding out a capacity-constrained schedule for a large factory, you probably had to buy a specialized box powerful enough to run your software. And you paid a pretty premium for it. By the early 90s, Moore's Law made a mockery of that argument, and the market started demanding that vendors shake off their proprietary boxes. Arguably, the emergence of a free market for portable software helped create the conditions that enabled the Internet to flourish.

Today turnkey systems have come back, but we don't call them that. They're available as self-contained software appliances that handle functions so compute-intensive, such as XML message parsing or perimeter security, that it makes sense to move the computing overhead off your network or server farms. And then there are the devices that are bought turnkey, but not out of choice: the portable communications devices on which enterprises (and society at large) increasingly rely.

In the case of appliances, turnkey packaging adds value because of the headaches that it eliminates with integrating such resource hungry systems. By comparison, in the mobile device space, turnkey adds no value, except to the mobile carriers who profit from captive markets. As demand for unlocking the iPhone has demonstrated, the demand for freedom to separate the choice of device, carrier, and service plan is more than idle chatter. The Wall St. Journal's Walt Mossberg made an especially elegant case:

Suppose you own a Dell computer, and you decide to replace it with a Sony. You don't have to get the permission of your internet service provider to do so, or even tell the provider about it. You can just pack up the old machine and set up the new one...

This is the way digital capitalism should work, and, in the case of the mass-market personal-computer industry, and the modern internet, it has created one of the greatest technological revolutions in human history, as well as one of the greatest spurts of wealth creation and of consumer empowerment...

So, it's intolerable that the same country that produced all this has trapped its citizens in a backward, stifling system when it comes to the next great technology platform, the cellphone"

Amen!

With the FCC (Federal Communications Commission) planning to auction off new digital spectrum, Google secured a well-publicized victory by persuading the commission to allot a portion to providers that would support a more open systems approach. And since then, we've been waiting for the next shoe to drop: when will Google unveiled its Gphone, or will it step up to the plate and actually bid on bandwidth (or do so through surrogates)?

Instead, yesterday Google announced Android, a first act towards opening a new mobile market that more resembles the mainstream of digital markets. It's an open source platform for smart mobile devices that's supposed to provide an alternative to Microsoft and Symbian. Android will include its own OS, an HTML web browser, middleware, for which third parties are invited to create applications. Or as colleague Dana Gardner put it, the potential ramifications of Android could shake the PC industry, which is finding itself converging with mobile and home entertainment systems.

Combat fraud and increase customer satisfaction

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.