The Register® — Biting the hand that feeds IT

Feeds

Upstairs, downstairs: IT goes into service

Everything on a tray

5 ways to reduce advertising network latency

It seems as though everything these days is being provided as a service. Software, security, storage, platforms and infrastructures are all being rented by the seat, MIP or gigabyte.

And now it's desktops. Virtualisation transforms the desktop from an item of personal jewellery into a service. Your users’ PCs cease being tangible possessions on their desks and instead become fungible streams of bits, delivered under contract.

If you think this is an isolated phenomenon, you are wrong. It is part of a broader trend, and it could put you out of a job.

Technological trends inevitably change cultures. Those early adopters providing software and security as a service today herald a world in which entire IT infrastructures become invisible commodities, provided by third parties.

Do desktops and applications fall into that category?

Younger model

Graeme Swan, Ernst & YoungService-based cultures mean different things to different people, argues Graeme Swan, a partner at Ernst & Young. For some, it simply means changing the procurement model, as IT departments begin buying services instead of hardware.

“But that’s old-school thinking,” he says.

Others take the concept more to heart and explore what it might mean to provide IT as a service, rather than as a scarce resource, to business departments.

Storage is always a good example. Business managers have always been seen as the IT department’s adversaries when they request storage. The IT department knows it may have to go and buy another piece of hardware, on which unused capacity will be wasted.

That process can take weeks because of the capital expense involved. The users meanwhile ask for as much storage as they can get away with. Better to have it now and use it later, rather than go through the whole painful procurement rigmarole again.

Pay as you go

In a service-based culture built on virtualised resources, storage is not just a piece of hardware. The users ask for storage and get it quickly. They ask for just as much as they want. Or better still, they get more storage automatically as employees use it and are charged accordingly.

Dave Buchholz, Intel The same goes for virtualised desktops. Dave Buchholz, principal engineer at Intel’s IT group, says desktop virtualisation models have become so complex that it is easier simply to look at the whole thing as a service.

“The internal stuff will just get switched off”

Consumers have been exploring the concept of applications as services for a while, and this will leach into the enterprise space. The endpoint devices used will become largely irrelevant and it’s the service – whether that be desktop access or specific applications – that will be important.

“They want a consistent user experience across their devices. If I’m reading a book and I close my Kindle and pick up my phone or tablet, then I want to carry on from where I left off,” Buchholz says. “But I also want it to show me the fonts or graphics in an appropriate way.”

What happens when services are not tied directly to specific pieces of infrastructure, either at the device level or in the IT department?

Cold shoulder

The likelihood is that users will be able to buy them from the IT department – or from a third party, Swan warns. If IT departments don’t step up and provide IT as a service effectively, they could be left out in the cold.

“The internal stuff will just get switched off,” Swan says. “There is still a ten-year period of sweating the assets. But any startup, or a big merger and acquisition where they are canning both systems and starting again, they are not going to buy a data centre, or a licence from SAP.”

That may worry El Reg sysadmin readers who don’t want their jobs to disappear. But true service means selfless dedication to others, including internal business users who may end up treating you as just another supplier. ®

Email delivery: Hate phishing emails? You'll love DMARC

Whitepapers

Microsoft’s Cloud OS
System Center Virtual Machine manager and how this product allows the level of virtualization abstraction to move from individual physical computers and clusters to unifying the whole Data Centre as an abstraction layer.
5 ways to prepare your advertising infrastructure for disaster
Being prepared allows your brand to greatly improve your advertising infrastructure performance and reliability that, in the end, will boost confidence in your brand.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Avere FXT with FlashMove and FlashMirror
This ESG Lab validation report documents hands-on testing of the Avere FXT Series Edge Filer with the AOS 3.0 operating environment.
Email delivery: Hate phishing emails? You'll love DMARC
DMARC has been created as a standard to help properly authenticate your sends and monitor and report phishers that are trying to send from your name..

More from The Register

next story
EU move to standardise phone chargers is bad news for Apple
Faster than a speeding glacier but still more powerful than Lightning
Chaos Computer Club: iPhone 5S finger-sniffer COMPROMISED
Anyone can touch your phone and make it give up its all
Travel much? DON'T buy a Samsung Galaxy Note 3
Sammy region-locks the latest version of its popular poke-with-a-stylus mobe
Full Steam Ahead: Valve unwraps plans for gaming hardware
Seeding 300 beta machines to members with enough friends
Fandroids at pranksters' mercy: Android remote password reset now live
Google says 'don't be evil', but it never said we couldn't be mischievous
Samsung unveils Galaxy Note 3: HOT CURVES – the 'gold grill' of smartphone bling
Flat screens are so 20th century, insist marketing bods
DEAD STEVE JOBS kills Apple bounce patent from BEYOND THE GRAVE
Biz tyrant's iPhone bragging ruled prior art
prev story