Feeds

DEATH of the desktop: Virtual systems could KILL OFF the biz PC

BYOD and ever-sophisticated VDI offerings are changing everything

Internet Security Threat Report 2014

Blocks and Files The business PC desktop is facing death by a thousand VDI cuts augmented by a BYOD bashing.

Her are just a few reasons to predict the death of the business desktop :

I know this is repetitious – that’s partly the point. These aren’t just a few pointers, this is a flood, a veritable tidal wave of systems all focused on removing pricey and complex-to-manage business desktops with centralised virtual desktop systems.

Some other suppliers with VDI capabilities include: Pure Storage, Tegile, Nimble Storage and Fusion-io. A combination of flash storage and deduplication is making it possible for cost-efficient and storage capacity-efficient VDI set-ups with the responsiveness of actual desktops, or better.

Set this VDI blitzkrieg to one side and consider BYOD - Bring Your Own Device, in which users bring their own notebook computers to the office. This is the guerilla war assaulting the business PC with VDI being a full-on, frontal assault.

The net result could be a multi-year reduction in business PC use with, in some businesses, desktop PCS literally disappearing.

We haven’t any numbers, beyond the general PC annual shipment numbers decline. Our sense of it is that the business desktop is an endangered IT species facing year-on-year shipment declines, wilting under the impact of artillery barrages from the massed ranks of VDI howitzers and BYOD sharpshooters.

In that case there will be a consequent decline in business PC component shipments – hard disk drives, power supplies, DRAM, motherboards and CPUs.

If 200,000 business desktops go away each year for five years that’s a million fewer hard drives shipped. And it could be worse; 500,000 fewer desktops each year means 2.5 million fewer drives over five years.

I think we’re at a VDI/BYOD tipping point and a storm surge of virtual desktop instances is going to wash increasingly unwanted and unloved business desktops right out of the offices they’re anchored to, never to return. On the other hand, someone's got to flog those BYOD devices... What do you think? ®

Comments to this Reg Forum topic please.

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.