Managing Editor, www.smallbusinesscomputing.com
Experts at Gartner, Inc. (NYSE: IT and ITB) have developed a model called the "service station," which combines the best features of the new technologies. The service station establishes a model that may let businesses access data through Web services and Peer-to-peer (P2P) computing.
"A critical factor is that an organization's documents usually exist throughout the organization rather than on centralized servers," said Daryl Plummer, group vice president and research group director for Gartner. "The advantage of the service station concept is that it allows data captured in files on desktop PCs to be available throughout an enterprise or to anyone who subscribes as a user to the files, making individual files a corporate resource."
Service station is defined as a PC or network appliance that is used to publish individual files and data as Web services in a P2P architecture. Although the service station is derived from concepts that have been available for years, the advent of Web services and the interest in P2P models have made the service station a timely concept for both strategic and opportunistic applications, according to Gartner.
"The service station will do for corporate file sharing what Napster did for music. It will make it easy to get what you want when you want it," said Plummer.
A company would apply a service station for projects in which many people contribute to the final output, such as reporting companywide budget spending or combining slides for a presentation. With each project, individual documents would need to be created, updated and maintained to produce the final document. A service station would provide the means to do that by subscribing to each of the individual documents to produce the finished product, complete with all changes and updates made to the individual files throughout the process.Another advantage of the service station concept would be to use it across company boundaries. However, since files are made accessible as a service, there is always an available connection to access the data, thus opening the door to spoofing, unauthorized access and possible denial of service attacks.