Desktop Defectors - InformationWeek
IoT
IoT
Infrastructure // PC & Servers
Commentary
9/12/2006
04:55 PM
Thomas Claburn
Thomas Claburn
Commentary
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%
RELATED EVENTS
Dun & Bradstreet CAO Discusses Her Roll & The Skills Needed to Do the Job
Jul 26, 2017
LWhat does a chief analytics officer do each day? To help us answer that question we welcome Dun & ...Read More>>

Desktop Defectors

Recently, I wrote a story about the vulnerabilities of Web applications in which Alan Paller, director of research at the SANS Institute, predicted, "Security will drive people to centralized applications." That's in fact what I'm hearing from some of the attendees at the 2006 InformationWeek Fall Conference. The difficulty

Recently, I wrote a story about the vulnerabilities of Web applications in which Alan Paller, director of research at the SANS Institute, predicted, "Security will drive people to centralized applications."

That's in fact what I'm hearing from some of the attendees at the 2006 InformationWeek Fall Conference. The difficulty and expense of keeping desktop and laptop PCs secure, not to mention provisioned with licensed software, is making some IT execs re-evaluate the need for full-blown PCs.In a conference session I moderated with Equifax CTO Robert Webb, Webb validated the notion. (At Equifax, they've banned wireless networks completely to avoid potential security risks.) Others I've spoken with said as much: PCs are a liability. Add to that dissatisfaction with the price of enterprise software licenses and the not-inconsiderable hardware requirements for Windows Vista, and you have the potential for a large-scale defection from the desktop model in the years to come.

What's more, the need for mobility is also likely to make centralized applications, or at least centralized data, even more appealing.

While thin clients may be an attractive option for certain types of businesses, such as call centers, the desktop (and notebook) PC won't disappear. Local processing power and local storage remain necessary for many use cases. But IT admins are likely to look at those use cases more carefully going forward and weigh whether full-blown computers are necessary for everyone.

At lunch today, one IT exec talked about how some companies are exploring variations on the thin-client model involving local caching of data on PCs that then gets withdrawn to a central store once the worker logs out. The goal, as he described it, is to enable mobility and to enhance security without forcing workers to endure the limitations of dumb terminals.

If these random conversations reflect broader concerns among enterprise IT pros, Microsoft has one more reason to worry (beyond the general threat posed to its business model by ad-supported software services and open-source software). That's why I believe Microsoft will acquire Citrix within a year.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll