5 Ways to Convince Your CIO to Move to the Cloud

CIO-priorities

Chief Information Officer.

The meaning of that title has changed pretty drastically since the introduction of cloud computing. Traditionally the CIO focused on purchasing hardware and software, overseeing implementation, maintenance and security, and simply making sure everything worked.

Then came the cloud and an absolute reliance on technology in the business world. Suddenly, everything has to be better and faster, but also cheaper. The CIO has turned into a leader and strategist, instead of simply a maintenance person. This role includes keeping up with ever-changing technology, delivering business value, focusing on growth and the competitive landscape, identifying problems and solutions and choosing new tools to implement. Though the role has changed, it will continue to be valuable and demanding.

But some CIOs still haven’t moved to the cloud, despite it’s impact on the role. There are many reasons to make the move, and the CIO and business will ultimately benefit. Here are five convincing reasons to move to the cloud:

1. Spend Less and Get More

With a utility-based payment model, the cloud has proven to be extremely cost effective. The technology reduces operational costs overall, while also saving in countless other areas. Organizations will reduce IT spending, as well as spending on purchasing and maintaining expensive hardware. And since the cloud provider manages upgrades and maintenance, the IT team is free to tackle other important projects. While these savings occur, businesses simply pay a monthly fee, based on their usage of the cloud services. The cloud makes computing and IT resources much more affordable, allowing businesses of all sizes to experience the latest technology. Seven in 10 respondents either agreed or strongly agreed that the cloud environment had delivered significant efficiencies and cost savings – and it’s this fact that is driving cloud adoption today.

2. You Can’t Use What You Don’t Know

But lowered costs isn’t the only reason to move to the cloud, though it’s one of the most well-known. With the cloud, CIOs are able to access and use valuable business insights, thanks to advanced analytic capabilities. Today, organizations can truly utilize data for business strategy and reporting. You can better manage your own growing data while accessing new sources of data to gain amazing insight. With these insights, businesses can meet their goals, develop strategies and grow significantly.

3. See Productivity on All Levels

With cloud computing, productivity improves in your employees as well as in your hardware.

Users are able to remotely access their files and documents from anywhere, at anytime, using any computing device. And that means they can work freely, no matter where they are. They will be more productive while having greater capabilities for collaboration. This also trickles down to customers, who will experience better customer service when your employees can quickly respond to problems.

More specifically, the IT department will be able to switch gears. Instead of focusing on the constant tasks of updating software and licenses, dealing with security breaches, and maintaining equipment, they can turn their focus to innovation and business improvement. The cloud provider will handle automatic updates and behind-the-scenes management.

In terms of hardware, you’ll simply get more use out of what you already have while experiencing great reliability. It’s rare for on-site servers to operate at more than about 20% of their capacity, and that means that a lot of resources go to waste. With the cloud, you use virtual machines that increase this efficiency, allowing servers to operate at higher capacity. This leads to better hardware performance, cost savings and productivity. Additionally, cloud computing better handles all types of failures and creates true reliability. With redundancy, the cloud maintains your data, even if you lose access to a certain machine or a data center experiences downtime.

4. Who says the cloud isn’t secure?

There is still much disagreement surrounding security in the cloud, but cloud providers are standing up to the challenges. While some people worry about the risk, many are finding they receive better security in the cloud than they traditionally had in-house. That’s because cloud vendors can stay up to date on the latest technology and devote more time and personnel to security. What’s more, the vendors are completely aware that this is a big obstacle, so they’ve focused on security substantially in recent years.

Problems that do arise with security tend to originate from the management of the service, rather than the virtual cloud location. In other terms, security isn’t a cloud-specific problem. It’s a human problem. The factor behind 95% of security breaches is human error. And that simply means organizations need to do their research before choosing a provider, because not all providers are equal. The cloud should majorly simplify security processes, and a great provider should have dozens of measures in place to protect data.

While security used to be a major factor hindering cloud adoption, today it’s a key factor for migrating. 94% of cloud adopters say it produces security benefits, and more than 50% of IT professionals rank security as a top reason for moving applications to the cloud. Those numbers certainly display the change of heart businesses are having in terms of security in the cloud.

And the fact is this: if your business doesn’t move to the cloud, your employees will. They will find easier ways to do things, whether that’s using an online service like Dropbox or Google Drive, or adding applications to their mobile devices. And honestly, it’s better if you know how your users are accessing their data. The only way to give them the freedom and flexibility they want while maintaining necessary control over confidential business information is to move to the cloud.

5. Meet All Business Demands

Maybe you’re in a business where content spikes naturally come or go. Or maybe you’re in a period of major business growth. Whatever the situation is, scalability is extremely valuable for any organization. To meet these business demands, you can either continue to buy more and more equipment that will soon be obsolete, or you can move to the cloud. Scalability, or elasticity, is the ability of a provider or an application to instantly and automatically provision compute capacity to meet spikes in demand. You can support business growth without making expensive or timely changes to your current setup. It’s quick and easy to get the resources you need – as described above, you simply pay for what you need, when you need it. The cloud provider ensures that overloading is never a concern, as its team will manage the servers within the data center.

Advertisements

Cloud Computing in 2015-What should we expect?

Cloud Computing in 2015

What should we expect?

In case you thought the new year meant brand new technology trends, we can set the record straight. It seems that cloud computing is officially here to stay. Businesses have moved past the introduction phase of the popular technology and are now profiting from the benefits of the cloud. Countless studies have already been conducted to predict technology trends in 2015, and cloud computing seems to top the list every time.

IT spending on cloud computing will increase 42% this year, according to the Computerworld Forecast Study 2015. The study showed that cloud initiatives are the most important for the majority of IT departments today. These initiatives are expected to cause the most disruption in the future, with a focus on improving current service and generating new revenue streams. Spending will also increase heavily on security technologies, business analytic investments, storage solutions and wireless and mobile, all of which can tie back into cloud computing. It’s clear that these trends are important, as the top three skills IT professionals need in 2015 are network security, data analytics and enterprise app development and support.

According to Gartner, cloud computing is also one of the 10 strategic technology trends for the new year. A “strategic technology trend” is defined as one with the potential for significant impact on an organization in the next three years. There will be a huge trend of moving computational power away from devices, which is where cloud computing gets involved. As consumers, we’ve quickly become accustomed to applications that can be integrated across different devices, and now this will become a business focus. Applications and information can be centrally managed, allowing users to easily access their business apps and data on any device, in any location. This popular feature of cloud computing leads to scalability, flexibility and customizability within an organization. It also allows businesses to move their focus to innovation and revenue growth.

Additionally, cloud experts have shared their opinions on this year’s technology trends. According to tech writer Paul Korzeniowski, the technology itself won’t change. The emphasis will. There will be a lot of interest in the Internet of Things, as various brands continue to explore home automation and wearable technology. While this is exciting for consumers, it will continue the heated discussion on cloud security. Especially following some major security incidents this past year, cloud computing will have to continue proving itself on that front.

There will also be an emphasis on vertical applications, as businesses realize they want tailored cloud services for their specific daily operations. Dave Wright, Chief Strategy Officer of ServiceNow, said, “As cloud platforms continue to mature, and more organizations are drawn to the financial and innovative benefits, cloud is spurring interest from even those industries that have been hesitant.” Cloud computing has the potential to impact every single industry, and businesses in all areas are realizing this.

It’s very apparent that the cloud will only continue to grow. There is a renewed confidence in the technology, cloud tools and services have matured, and the cost and efficiency benefits are obvious. Cloud computing has gained acceptance and now we get to see how drastically it can impact the business world. Get ready – 2015 is going to be an exciting year!

Only 10% of Hospitals & Clinics Keep Their Patients’ Data Safe

According to privacy researchers at the Ponemon Institute, “Recent numbers show 90% of health care organizations have exposed their patients’ data — or had it stolen — in 2012 and 2013.” The implications of this research are far-reaching and unsettling for most consumers.

Most attacks are caused by hackers who want to acquire medical records due to their extreme value. The information in medical records (name, birthdate, addresses, phone numbers, medical history and social security numbers), can be easily used for identity theft, fraudulent medical billing or acquiring prescriptions to resell on the street. Hackers can use the medical information to accomplish just about anything once acquired. This flaw in IT security is not a series of isolated incidents but an incredibly widespread problem now affecting millions of people across the nation.

In August, Community Health Systems reported that Chinese hackers had allegedly stolen a staggering 4.5 million patient records in what could be the largest breach of patient data to date. The company is treating the breach as a violation of HIPPA, even though the hackers didn’t gain access to medical records (only names, addresses, birth dates, phone numbers, and Social Security numbers were stolen). The breach happened between April and June this year, and was discovered in July. According to cyber-security firm Mandiant, which helped investigate the breach, the group responsible for the attack is known as “APT 18,” and may have links to the Chinese government.

The majority of hospitals and health organizations are using outdated technology on a single network making the job of hacking into networks even easier for criminals. IT security is often a large oversight for healthcare organizations because their objective is to save lives. Unfortunately, lack of internal IT expertise and outdated technology plagues the healthcare industry making it an easy target.

The challenge here is that doctors are inherently more interested in saving lives, instead of upgrading their IT security. This a great thing for society and we believe that’s exactly what doctors should be focused on! The only thing is that IT security must be addressed too. Over the years, we’ve learned exactly what it takes to protect health organizations and we love being a part of the solution to this problem. It’s unfortunate when something like this happens but it brings much needed education to the issues at hand. We consider it our duty to educate our market and provide doctors with the technology tools they need to do their jobs, protect their  patients and spend their time focused on saving lives, instead of firewalls. That’s our job.

Microsoft Ending Support for Windows Server 2003 Operating System

NCCIC / US-CERT

National Cyber Awareness System:

11/10/2014 07:19 AM EST
Original release date: November 10, 2014

Systems Affected

Microsoft Windows Server 2003 operating system

Overview

Microsoft is ending support for the Windows Server 2003 operating system on July 14, 2015.[1] After this date, this product will no longer receive:

  • Security patches that help protect PCs from harmful viruses, spyware, and other malicious software
  • Assisted technical support from Microsoft
  • Software and content updates

Description

All software products have a lifecycle. End of support refers to the date when Microsoft will no longer provide automatic fixes, updates, or online technical assistance.[2] As of July 2014, there were 12 million physical servers worldwide still running Windows Server 2003.[3]

Impact

Computer systems running unsupported software are exposed to an elevated risk to cybersecurity dangers, such as malicious attacks or electronic data loss.

Users may also encounter problems with software and hardware compatibility since new software applications and hardware devices may not be built for Windows Server 2003.

Organizations that are governed by regulatory obligations may find they are no longer able to satisfy compliance requirements while running Windows Server 2003.

Solution

Computers running the Windows Server 2003 operating system will continue to work after support ends. However, using unsupported software may increase the risks of viruses and other security threats. Negative consequences could include loss of confidentiality, integrity, and or availability of data, system resources and business assets.

The Microsoft “Microsoft Support Lifecycle Policy FAQ” page offers additional details.[2]

Users have the option to upgrade to a currently supported operating system or other cloud-based services. There are software vendors and service providers in the marketplace who offer assistance in migrating from Windows Server 2003 to a currently supported operating system or SaaS (software as a service) / IaaS (infrastructure as a service) products and services.[4,5] US-CERT does not endorse or support any particular product or vendor.

References

Revision History

  • November 10, 2014: Initial Release

 

Our partnership with Rapidscale allows you to never have to worry about these types of announcements ever again.

CloudApps is the next generation application purchasing and licensing management platform for business. CloudApps connects businesses with the applications they want while eliminating licensing management and application upgrades. With CloudApps, the application purchasing process is automated from per user or per business purchasing to application approval workflow delivered on one bill.

Check out more at http://www.primetelecommunications.com/infrastructure-service/.

Phishing Campaign Linked with “Dyre” Banking Malware

NCCIC / US-CERT

Overview

Since mid-October 2014, a phishing campaign has targeted a wide variety of recipients while employing the Dyre/Dyreza banking malware. Elements of this phishing campaign vary from target to target including senders, attachments, exploits, themes, and payload(s).[1][2] Although this campaign uses various tactics, the actor’s intent is to entice recipients into opening attachments and downloading malware.

Description

The Dyre banking malware specifically targets sensitive user account credentials. The malware has the ability to capture user login information and send the captured data to malicious actors.[3](link is external) Phishing emails used in this campaign often contain a weaponized PDF attachment which attempts to exploit vulnerabilities found in unpatched versions of Adobe Reader.[4](link is external)[5](link is external) After successful exploitation, a user’s system will download Dyre banking malware. All of the major anti-virus vendors have successfully detected this malware prior to the release of this alert.[6](link is external)

Please note, the below listing of indicators does not represent all characteristics and indicators for this campaign.

Phishing Email Characteristics:

  • Subject: “Unpaid invoic” (Spelling errors in the subject line are a characteristic of this campaign)
  • Attachment: Invoice621785.pdf

System Level Indicators (upon successful exploitation):

  • Copies itself under C:\Windows\[RandomName].exe
  • Created a Service named “Google Update Service” by setting the following registry keys:
    • HKLM\SYSTEM\CurrentControlSet\Services\googleupdate\ImagePath: “C:\WINDOWS\pfdOSwYjERDHrdV.exe”
    • HKLM\SYSTEM\CurrentControlSet\Services\googleupdate\DisplayName: “Google Update Service”

Impact

A system infected with Dyre banking malware will attempt to harvest credentials for online services, including banking services.

Solution

Users and administrators are recommended to take the following preventive measures to protect their computer networks from phishing campaigns:

US-CERT collects phishing email messages and website locations so that we can help people avoid becoming victims of phishing scams.

You can report phishing to us by sending email to phishing-report@us-cert.gov(link sends e-mail).

References

Revisions

  • October 27, 2014: Initial Release

 

Improving Security & Reducing the Risk of Data Breach

It’s a parallel that seems to represent a negative product of change: as technology advances, so do security threats. In a world where data breaches make headlines, security is of utmost importance—especially for companies that have critical assets such as customer data, intellectual property, or proprietary corporate data.

Despite the progress that has been made to improve security, there are still instances of data breaches over the cloud. However, by taking the right measures, businesses can utilize the cloud to prevent data breaches and reduce the inherent stress perpetuated by security threats.

Below are five tips on utilizing security in the cloud.

1)    Be aware of your cloud apps. We all love the various services that apps can provide. However, it is important to know the business readiness of app and which ones encrypt data stored on the service. It is important to know which apps render you more or less prone to a breach. If you employ cloud services, you should know exactly what is provided, and how your company utilizes them.

2) Transfer users to high-quality apps. As you already know, cloud-switching costs are minimal—which means that switching to better apps is possible. Choose apps that are best suited to your business needs; shopping around for the best apps is advised. If you stumble upon unsatisfactory apps, talk to your vendor or even switch. Our current technological makeup is dominated by a preponderance of worthy apps—utilize them.
3) Ask yourself: where is my data going? Look at your data in the cloud: review uploads, downloads, and data. Check if you have personally-identifiable information (PII) or unencrypted confidential that is in—or moving to—the cloud. Be aware of where your data is going.

4) Identify user activity. It is essential to understand not only which apps you utilize, but also your user activity. Which apps are used to share information? According to a VentureBeat study, one-fifth of tracked apps enabled sharing—ranging from customer-relationship management to finance and business intelligence. Knowing who is what sharing information—and with whom—will enable you to implement the right policies.

5) Reduce risk through granular policy. Begin with business-critical apps and implement policies that will help your business in the case of a breach. Some ideas: blockthe upload of information, block the download of PII, or block access to vulnerable apps when necessary. Preparation is key—and knowing where your information is at all times is paramount in mitigating risk.

Preventing data security breach is possible—it relies on your careful attention to cloud apps and user activity. Knowing your data is crucial in preventing risk. Analyzing your apps takes time, but is a worthwhile task. Contact us today to learn more about security and minimizing your cloud and data risks.

Get more information here!

increased_security

Practical On Moving Your Office

When it comes to managing a small business in the process of expanding, moving is certainly an action that will need to be taken from time to time. The office a firm begins in, when that business is successful, will rarely be large enough throughout the years of increased traffic, demand, client volumes and more, and shifting the entire framework to a new building can be a serious stressor, especially for entrepreneurs who have never gone through the process before.

However, by following certain best practices and making sure that all of the aspects of the move are planned out ahead of the scheduled start date, this can be a relatively straight forward and stress-free activity.

Here is a comprehensive list of standard considerations that every small business owner should remember before making the big move to a new office:

Time Line: Makesure that you have a workable timeline with everyone.  Coordination through communication should be your mantra. You need to make sure that your phones, Internet access and equipment are ready and waiting to be connected well in advance. I can’t tell you how many times we receive a call- “We just moved into a new space and we need to hook up our phones now!” . To what? Did you order services? Do you have connectivity? Don’t wait until the last moment!

Money: Budget is a major factor in any move, and the first step in planning is to evaluate how much money can be spent on the project. Transportation, professional assistance, new setups, office adjustments and many more aspects should be considered. As many entrepreneurs already know, the move has to be done in such a way that minimizes the overall expenditure, as failure to be extremely diligent with budget allocation can spell disaster down the road.

Exit plans: Before making it into the new environment, small business owners should ensure that all of the items they wish to be moved are taken into account. Equipment, desks and other furniture, office supplies, kitchenware, modems, computers, decorations and lighting fixtures are just some of the items that might need to be safely relocated.

Carry or replace: While composing the exit plan, entrepreneurs should compare the costs of moving certain items to the expenditures that would be necessary to replace them in the new facility. For example, a large sofa might cost far more to move across the country than simply buying a new one locally in the next location, and this type of thinking can add to the cost-efficiency of the overall project.

Entry plans: Who will be waiting at the new location for the movers? When will the various persons tasked with moving new items in be arriving? How will any reconstruction or building processes be taking place? These questions should be answered before the move begins, and entrepreneurs should always ensure trusted members of staff are acting as the leaders throughout the exit and entry procedures.

Delegate: Although this is not necessarily a bad problem, the average small business owner – especially when new to entrepreneurship – tends to be less proficient at delegating tasks. This cannot happen when relocating, as it will simply lead to too much stress placed on leadership. Every employee should be involved in the move, and setting up a comprehensive list of tasks and placing certain responsibilities on various staff members can have a positive impact on the overall success of the relocation.

In today’s highly technology-dependent marketplace, business owners must ensure that they are covering all of the IT needs associated with the move as well. Here are several considerations:

Ready to go: Once the physical move is completed, the speed with which employees can get back to their normal jobs is critical. Having all of the communications and technology capabilities set up in the new location before the first full day of work will maximize productivity.

Ask for help: Setting up an office IT and communications frameworks is difficult enough. Moving that entire set-up to another location can be complex and potentially impossible without the right expertise. Entrepreneurs should not hesitate to ask their chosen service provider to take care of the IT and communications side of the relocation.

Insurance: Make sure that you contact the office of the building that you are moving to and get a copy of their insurance requirements. Make sure that all of your vendors  file their certificates of insurance with the landlord per the requirements. Make sure that you have copies of their insurance on file.

Occupancy License: Check with the local city government for your occupancy permit. Make sure that you have paid all of the license taxes and fees.

Cancellation of utilities at your previous location: Make sure that you cancel any services at your previous location! You are still liable for them even if you are not using them! Phone, electric, Internet, gas – just to name a few.

Moving

 

Consumerization of IT, BYOD and the Cloud

When the first personal computers appeared nearly 40 years ago, it was a revolutionary moment. The ability to set up a spreadsheet on the screen of a computer and instantly recalculate when any variable changed was such a huge advance that workers would secretly slip PCs (i.e., the Apple II) into the workplace under their coats. And so consumerization and the first Bring Your Own Device (BYOD) assault on the IT department were underway.  Eventually, of course, IT reasserted control, thanks to the ascendancy of MS-DOS and later Windows.

Fast forward to 2012. Instead of slipping PCs in under their arms, workers armed with tablets, smartphones, ultrathin laptops and more are once again manning the ramparts. It’s déjà vu all over again, but this time it’s here to stay. Unlike the first PCs, today’s devices are cheaper, smaller and far more versatile.

At the end of 2011, there were 6 billion mobile subscriptions, according to The International Telecommunication Union (2011), equivalent to 87 percent of the world population. Some 300,000+ applications were downloaded 10.9 billion times. On average US feature-phone users have 10 apps on board.

Given the scale of the change, more and more consultants like Forrester are warning of major disruptions if businesses do not implement a thorough mobile strategy across the enterprise. These disruptions include problems in coordinating data, network access and applications across multiple channels; servers and infrastructure that are unable to handle the surge in activity; applications poorly constructed for user engagement; and business processes that are misaligned with mobile requirements.

Forrester recommends that companies start to get a grip on the new era of mobility by establishing the office of the chief mobility officer with a focus on crafting an approach to the company’s mobile architecture and mobile engagement practices, including the adoption of Cloud solutions, which are being driven by the mobile shift.

BYOD, consumerization, the Cloud and more are all here to stay. Waiting to see how they evolve is likely to leave you feeling overwhelmed.

Are CIO’s Lighting a Fire for More Managed Services?

“Come on baby light my fire” has more meaning than just lyrics to a great old song.

We know things are getting more complex with application integration. mobile device management, social integration and UC integration… the list goes on. Things are – heating up.. But what’s an IT leader to do when pressures are mounting? Resources are scarce and CAPEX budgets are capped.. Almost 90 percent of companies nowadays are telling us they’re doing something within the realm of managed and hosted services.

Nemertes Research analyst Irwin Lazar, pointed out that this increase in managed/hosted services trend is increasingly important – especially when you look at how companies are planning for growth. (Have a listen to what Irwin Lazar has to say about this in our communication trends video about Managed & Hosted Services.) We discuss how nearly 40 percent of companies are adding more services. Not only are folks raising the roof in a positive way about Managed Services, CIO’s are lighting a fire within their IT teams to get more creative about the mix of managed services support.

If you’re concerned about managed services and if you haven’t really looked at them carefully, our advice is to take a hard look now.

Important success metrics include cost of IT per employee, revenue per employee, and IT spend per employee. All of these metrics tend to correlate positively with higher use of managed services. So, companies that outsource the day-to-day support operations of their applications tend to spend less per employee and have higher success metrics.
Being able to leverage third-party services shows significant financial and operational benefits in this day and age, where talent is so hard to find. So, are you waiting for someone to light your fire – baby?

Looking for evidence of a Post-PC world

A number of vendors are touting that a post-PC era has begun, I believe it, but believing is not seeing. Lets begin with what a Post-PC world should look like. Will there be PCs in the future? I would say yes. They still have a purpose, and some general value, but they will be a minority form factor as far as local computing is concerned. What will the majority form factor look like? Mobile computing platforms: smartphones, tablets, and devices that are hybrids of those two. A key characteristic is the ability to be data connected at a decent bit-rate while on the cellular network. Many things should look and act differently given these changes, lets speculate on a few.

Lets start with form factor, the PC usually is connected to a healthy size monitor, this makes digesting large scale data sheets (web pages as an example) easy, it produces a conducive environment for running multiple applications (windows), it provides a large rendering space for user interface (more real estate to easily activate or modify entries while seeing the entire UI) and a number of people can easily view the monitor at once. A large tablet can handle all of this today except the sharing aspect. A smart phone, for the most part, is challenged. What adaptations are necessary? Optional micro-projectors would increase real estate and address all these characteristics. We can see evidence of thinking here at [here & here] Another possibility is a wireless interface between the mobile computing device and a general purpose display. Evidence of thinking in this domain can be found at [here]
I’d characterize this as early evidence that the video real estate characteristic is being solved.

Another physical characteristic is the input method (keyboard, mouse, trackpad, etc.). This area is already well addressed in the commercial market. In fact, it may be driving the post-PC evolution as users embrace touchscreen tablets. Additionally, as natural gestures and speech become more important as input and control methods, something the smartphone and tablet provides easily, as is already being witnessed in the consumer marketplace.

Lets look at application modeling. Apple iOS and Android provide excellent local application capabilities that can operate while network connected or not. Some productivity toolsets require video real estate to create content effectively or view complex content (like spreadsheets). As discussed before, technology innovators seem to already have a handle on that problem. Some applications require connectivity (they may be focused on messaging, collaboration, or real time feeds) or may be better used if connected (augmented data and search are a couple of examples). Both mobile computing platforms and PCs provide the connectivity. Mobile computing platforms can do so from many locations and while in motion. Connectivity requiring significant bandwidth could be challenged on cellular networks (video calls for example). Even with LTE deployments on North American cellular networks, the likelihood of a significant bandwidth crunch is high if video calling is supported natively on the network. For this reason, expect most high bandwidth real time applications to be limited to WiFi networks for a few years.

This brings up another consideration for the connectivity model: Virtual Desktop Infrastructure. Virtual Desktop Infrastructure (VDI) eliminates the need for a fully functional PC, it can be replaced by a special purpose low cost viewing brick, or it can be replaced by a browser running on any platform. While it does not necessarily require significant bandwidth to support, there are times where it might, and certainly some use cases where it certainly will. Mobile computing platforms already support VDI viewing, but connectivity can dictate how functional it is. VDI is an example of an application type that requires connectivity, cloud based service applications is another example (think Google tools). As connectivity reach increases (think WiFi on airplanes) the need for intense local processing on PCs decrease. The evidence based on application connection model certainly indicates that mobile computing has evolved enough to begin replacing desktops.

Other evidence will be in the types of applications that become favored over long standing PC applications. Email, Calendaring, Web browsing all come to mind. Email is evolving to include common inbox, virtually no one wants multiple email clients on their platform. Both iOS and Android support this well. Many users are shifting to prefer Instant Messaging or SMS because they offer prospects of answers in near real time. Users will want to have a common messaging client for the same reasons they do not want multiple email clients. Evidence of this can be seen with iMessage, Gtalk, and Yahoo Messenger. There is no dominant calendaring application outside of Microsoft, a Post-PC world should see some movement here. Calendaring clients can be Microsoft independent. Web browsing innovations are already outstripping the need for a PC and have been for a number of years. HTML 5 adoption will foster this and is another strong indication of a Post-PC world.

Lastly, there should be evidence in trending. Fewer PCs and laptops sold; more smart phones; more tablets. More application sales for mobile computing, more SMS, MMS, and their derivatives. What do the trends show? Canalys reports that in 2011 smartphones outsold PCs. [here] Further its growth rate is a scorching 63%, tablets grew at an incredible 274%, while desktop PCs shrank 3.6%. ComScore’s review of 2010 indicates that mobile subscribers preferred text message use to email use 2:1 in the US and almost 4:1 in Europe. [here] Further the growth rate in SMS traffic is presently between 20 and 30% for the age 18-54 demographic. [here]

It seems like there is evidence that the era of Post-PC is approaching, will the evidence become even more pronounced? It will be an interesting year or two as we observe.

Until next time …