Every so often there is a company that catches your eye. Not because of their flashy marketing, but because they are solving a really interesting problem with a clever approach. That happened at Tech Field Day’s Cloud Field Day 3, where Droplet Computingofficially came out of stealth and held the public launch of the company.
LIBERATION OF APPLICATIONS
Droplet Computing’s core value proposition is the containerization of applications in an effort to modernize infrastructure. Essentially, Droplet Computing provides the ability to take an application and create a container around the application. This creates an abstraction layer between the application and the underlying system operating system (OS). Droplet Computing does note that there are components of the original OS that are needed inside the container to support the application, but that they are not the full OS. Once the application is containerized, it can move to other platforms; newer OS, different platform, moved to a mobile device, etc.
There are many applications still in use across the globe that are not able to be upgraded for a myriad of reasons. Unfortunately, this limits the ability of the operator to move forward in modernizing their entire infrastructure while these older applications are still in use.
The solution is not limited to just older applications. Other applications could use the same technology to provide mobility between different system types, OS and the like. However, there are a number of competing products that provide similar functions for current applications.
Several of the use-cases that the Droplet Computing team mentioned included custom applications associated with CNC machines, MRI devices and the like. One thought was, think of all the WindowsXP based applications and older custom machines that are still in use today.
REDUCING THE CYBERSECURITY FOOTPRINT
There is one clever side-effect to encapsulating the application and providing the ability to upgrade the underlying hardware and OS without having to upgrade the application. It reduces the cybersecurity footprint and risk for that system. Does it eliminate the risk completely? No. But by leveraging modern hardware and OS, it does make a dent into reducing the potential risk.
Droplet Computing is not the silver bullet that will magically modernize your entire environment, but it does give a level of abstraction to those older applications still widely used. This allows enterprises to bring legacy applications forward through modernization.
At the same time, it addresses a core issue that all enterprises are seeking: reduce your cybersecurity footprint. In today’s world where the risks from cyber-attacks are increasing, anything that reduces the footprint is a welcome approach.
Droplet Computing’s product is currently in ‘pre-GA’ and slated to move to GA by mid-May.