Feeds

Tablets will overtake consumer PCs, says Fujitsu CTO

Customers want to consume content, not produce it...

3 Big data security analytics techniques

Content consumption rules for consumers and tablet sales will overtake consumer PC and notebook sales. That's the view of Dr Joseph Reger, Fujitsu's chief technology officer.

Reger thinks tablet sales are going to cannibalise consumer desktop and notebook sales, because consumers want to consume content more than they want to create it with a keyboard and mouse.

Reger cites the success of iPad as evidence of this. He is convinced that the disadvantages of the PC will help ensure that tablet devices sales will crossover PC/notebook sales for consumers in 2016 or so.

iPad 2

Apple's iPad 2

The CTO says that it is possible Amazon could bring out a tablet costing just $299 and that consumers could buy two of them for the price of a desktop. They would no longer need to go a special room in the house where the desktop PC is located, with tablets just left lying around and fetched whenever you needed to use one.

What this means, in his view, is that the whole consumer PC ecosystem is going to wither away and die. The Intel chips, Seagate or WD hard drives, BIOS and motherboards and PC application software are all going to fade away and become as useless as your collection of vinyl music albums, relic technology looked on with fond and exasperated remembrance.

Businesses will still need PCs and notebooks because a lot of content creation goes on, with masses of reports and PowerPoint decks and spreadsheets being created and updated.

Fujitsu has a stylus-driven Windows tablet coming out soon and an Android one, using simpler hardware, following on. Reger says app availability is crucial to tablet success, and suppliers will need app stores.

Steve Jobs is killing the desktop consumer franchise created by Bill Gates, and – if Reger is right – currently being lost by Steve Ballmer.

For Intel, Atom is absolutely crucial. Atom has to succeed to keep Intel in the many homes from which ARM is in the process of ejecting Intel. But it seems consumers would rather play with their iPad 2 than their Windows PC at the breakfast table.

Although the tablet asteroid has made a deep impact in the industry, only time will tell if Reger is right and we are at the beginning of the end of the consumer desktop/notebook era. ®

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.