Feeds

if year > 2013 then PC != Personal Computer

Personal Cloud will be your digital hub instead

High performance access to file storage

The abbreviation 'PC' will soon no longer stand for 'Personal Computer', but 'Personal Cloud'. Come 2014, the latter will be where consumers keep their digital content, not the former.

So says Gartner, a market watcher, reckons what you might call 'PC 2.0' will be ushered in by legions to tech-savvy punters already used to operating online through social network tech and who will soon expect to access their content as easily and as quickly on the move as they do at home.

"No one device will be the primary hub," said Gartner research VP, Steve Kleynhans. "The personal cloud will take on that role."

Users will use a collection of devices, with the PC remaining one of many options, he added. Content won't be explicitly associated with a given device, but accessed by all, mediated by apps tuned to each gadget's capabilities.

Cloud storage is the mechanism that will make all this possible, as will virtualisation - the ability to run complex operating systems and applications on a net-connected server, with the user interface handled by the mobile gadget, be it smartphone, tablet or skinny compact laptop.

Case in point: look what OnLive is doing, not only with games but also Windows and Microsoft Office. It uses virtualisation to make console games and productivity software on platforms not natively capable of running the code.

True, OnLive may fall foul of Microsoft's licensing terms, but it seems more likely that that two will come to an arrangement that allows OnLive to continue.

But whatever happens to OnLive, the notion that you can access complex apps on a pared-back device - the old 'thin client computing' concept that was pitched at big business in the 1990s - is gaining a foothold among consumer applications, Gartner reckons.

"Many call this era the post-PC era, but it isn't really about being 'after' the PC, but rather about a new style of personal computing that frees individuals to use computing in fundamentally new ways to improve multiple aspects of their work and personal lives," said Kleynhans. ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.