Living with Limits in the Post-PC Era

Article from ADMIN 10/2012
By

With the Personal Computer approaching middle age, industry analysts tell us that we're entering the Post-PC Era. That might be true by the formal definition of a "Personal Computer," but – no matter what we call the end user's device or in whatever form we recognize it – it's still personal computing and that device is the new personal computer.

In ADMIN issue 09's "Welcome" column, I discussed the strained symbiosis between mobile device management in bring your own device (BYOD) programs and users. In this issue, it's all about dealing with the hardware and placing limits on what we want that hardware to do once inside our realm. Sure, there's a user on the other end of that device, but it's the hardware that we have to develop a rapport with first. We have to greet its interface, learn its idiosyncrasies, conquer its faults, control its activities, and then hand it back to its owner, the user. By controlling the hardware, we also control the user and create a more consistent environment.

It all started with the Commodore PET personal computer back in 1977 as the first successfully mass-produced and mass-marketed computer exclusively for desktop computing use. It looks like what we all think of when we imagine a traditional desktop computer. But, when contemporary analysts write and speak about the Post-PC Era, they're talking about desktop computers and standard laptops as well. By my definition, the Post-PC Era generally includes netbooks, ultrabooks, tablets, and mobile phones – essentially any portable personal computing device.

What the so-called Post-PC Era brings to us as system administrators is inconsistency. System administrators hate inconsistency. We spend countless hours perfecting and polishing our "Gold" images so that our users will have an easy startup and smooth daily operating experience. And, we do it to ensure consistency.

The inconsistency arising from the Post-PC Era is a result

...
Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • News for Admins
    News for system administrators around the world.
  • Tuning SSD RAID for optimal performance
    Hardware RAID controllers are optimized for the I/O characteristics of hard disks; however, the different characteristics of SSDs require optimized RAID controllers and RAID settings.
  • Managing networks in Windows Server vNext
    We look at a new component in Windows Server vNext – the Network Controller server role.
  • Azure AD with Conditional Access
    Trust is good, but controls are better. As more flexible working models become widespread, the boundaries of the classic perimeter are blurring and softening existing models of trust for adopting cloud software and data storage or running domain controllers or core applications in the cloud.
  • News for Admins
    Meltdown and Spectre revisit Intel, AMD, and ARM processors, Orangeworm, a new hacking group, targets the healthcare industry, Docker EE 2.0 announced, Remote code execution vulnerability found in Cisco
comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=