Should You Start the Meter Running?
- 07 May, 2003 14:29
IBM says it's investing $US10 Billion in it, some $US800 million of that in this slow-tech year alone. And that's largely for "education" (okay, hype) to convince managers in every corner of the IT universe (one would assume) that this is the Real McCoy. And they're just one of the proponents.
Could it really be the long-awaited be-all and end-all to every computing problem you've ever even imagined? Actually, yes, it could. And that would make it much bigger than even IBM and all their 800-pound gorilla cronies combined. It's Utility computing - buying only the amount of computing you need, like plugging into the electrical grid. It's been long talked about and, if you now believe the promises, almost, just almost, upon us. Doesn't ring a bell yet? Well, it will, as the "education" process builds steam. Then again, some may already be hearing a scattering of terms with a similar ring, as other industry players jockey for position to attach their own monikers to this next big thing.
IBM's version, which is getting more attention because of all that money behind it, is called "On-Demand Computing", along with an oft-heard variant, "E-Business on Demand".
But that's just the beginning of the buzzword parade. Many other terms are beginning to be put forth with considerable vigour by various IT vendors and the usual analysts, all to describe what really amounts to much the same thing, or key parts of the same puzzle. So, if you're confused, that wouldn't be surprising. Which is why we thought we'd take a look at this utility computing concept - really quite a simple one - and see if we can help you cut through the confusion and understand why you may really need it.
The utility computing concept carries this threefold promise:
- It will simplify IT, as in reducing or masking complexity
- It will turn IT from a fixed to a variable cost
- And it will cut the biggest cost culprit of all: operating expenses
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Batten Down the Hatches! A Guide to Protecting Data in Motion
The risks facing high-speed data networks and unencrypted data while in motion are very real and on the rise. As information becomes one of the most valuable ‘off balance sheet’ assets, protection of that information and the investment in it is a paramount obligation of office-holders and management. Read now for a better understanding of the risks to data in motion.
Best Practices for Migrating to SharePoint 2013
This white paper details a number of best practices for migrating to SharePoint 2013. These best practices also apply to migrations to most earlier versions of SharePoint. Download now.
Android Malware Exposed
Take an in-depth look at the evolution of android malware. The world of malware targeting the Android OS is similar yet very different from malware affecting Windows. Explore the rapidly evolving world of android malware and shed light on the various techniques used to exploit devices using this OS.