Posts Tagged ‘operating system’

Where Next for My PC

August 25, 2010

I have been pondering this for quite some time:

Where is the PC going, and what substantial changes are likely for the operating system and for productivity software?

Keywords here for all of us: cloud, mobility and context.

Lately, Apple and Mac media has been asking, “What is Apple doing for Mac OSX 10.7? …for IOS 5? ¬†Lately, Windows 7 has received some deservedly good press, and I wonder what is in store for Windows 8… Lately, there has been a lot of talk in the tech media about “thin clients” and “cloud apps” in lieu of locally executed productivity applications running on a “screamer” desktop PC. Hmmm… So, where is all this going? Well, I’ll tell you!

Minimal Local Storage – no petabytes, and probably not even terabytes. Here, the thin client pundits probably are on to something, but I don’t think they see the forrest for the trees just yet. What storage resources you have locally may really need to be quite small if you can utilize many devices and servers. The real evolution I expect to see will be with the file system…

Distributed File System – a combination of NAS and SAN functions with a substantial layer of security. I may have a folder of documents stored physically anywhere – on an Apple server, a Microsoft server, an AT&T server, a Google server, a Yahoo server, on my desktop hard drive, in flash in my iPhone – anywhere, and I don’t want to need to know where.

  • I need to be able to have instant access to my document files anywhere and anytime.
  • I need to be sure that I have exclusive access to my files.
  • I need to be sure that all my files are strongly encrypted to keep the server owner honest and to defeat the likely hacker.
  • I need to be able to share any file with anyone I designate.
  • I need to be able to define the organization of my documents and folders of documents without regard to the physical location of a file.
  • I need to have the same file organization presented to me regardless of which physical computing device I am using.
  • I need to be able to access certain files even when a local device is turned off or is not at hand (multiple device aware).
  • I need to be able to access certain files even in the event of a local computer failure (locally fault-tolerant).
  • I need to be able to access certain files even in the event of a remote server failure (remote fault-tolerant).
  • I need to be able to access certain files even in the event a network failure (network fault-tolerant).

Gesture-Based User Input System – gestures, but not necessarily touch or mouse. Here, I think that Apple is right on track. Mouse behavior has been exquisitely refined, touch interfaces are being diligently defined, cameras are being built into every display device. The next step is to extend type, point, click, touch and swipe to arbitrary surfaces and new hand gestures in the air. Any time, now… I’m waiting…

Agile Display System – my display “desktop” moves with me to the best display system that I have access to at any moment. ¬†As I move from room to room, building to building or city to city, I want my work and my display desktop to follow me and be visible to me on the best display device I have access to wherever I am seamlessly and instantly at my command – with a gesture of some sort to cue and command the device and use it.

Contextual Environment Anticipates My Needs – community-aware, activity-aware, time-of-day-aware and location-aware. Who am I with with right now and who I am meeting with later in the day, what I was just doing and what is scheduled next on my calendar and what is queued on my To-Do List, what the time of day is and what do I usually do at this time of day and what is scheduled next, where am I now and where am I going next – all this has a direct bearing on what I want to do with my computer right now! I want my computer to anticipate my every move. This is a BIG effort to complete.

Unobtrusive Automatic Refinement – settings to accommodate the “cloud”, mobility and context should change automatically based upon limitations and failures encountered, additions to my community, appearances of new devices and services, and new collaborations.

Identification – this is key to secure sharing and hacker warfare. If your credentials are unknown, you don’t get in. How to assemble a set of trusted credentials? How to verify them unobtrusively? How to manage and maintain them? How to revoke them? How to detect spoofing and challenge the credential? Well, that requires some finesse, new standards and some user education.

If you ask me, this sounds like another decade of significant opportunity in this industry’s products and services – and a tremendous life cycle extension for the PC and its OS and applications.

Advertisements