PC-on-a-Stick
PC-on-a-Stick is a term that refers to a small USB flash drive-sized device that can be plugged into an HDMI-compatible TV or monitor to provide a complete personal computing (PC) experience. PC-on-a-Stick devices are primarily designed for light productivity work as well as Web browsing, social networking, video chatting and media streaming.
Also called Stick PCs or Compute Sticks, PC-on-a-Stick devices are typically pared with a Bluetooth wireless keyboard and mouse for user input, although USB wired hardware can be used as well via an included USB port on the PC-on-a-Stick. Most PC-on-a-Stick devices are powered by a ARM or Intel Atom system-on-a-chip (SoC) with either Windows (8.1 or Windows 10) or a Linux distribution (typically Ubuntu) serving as the device’s operating system.
PC-on-a-Stick Vendors and Use Cases
Intel released its version of PC-on-a-Stick as the Intel Compute Stick in 2015, and Lenovo, Archos, Amazon (Fire Stick) and Google (Chromecast) all have their own PC-on-a-Stick devices available. Prices for these devices range on the low end from about $35 – $40 for the limited-functionality Chromecast and Fire Stick devices to between $99 for the Archos and $149 for the Windows version of the Intel Compute Stick at the high end.
While PC-on-a-Stick devices lack the power and full functionality of traditional desktop and laptop PCs, their portability, inexpensive pricing and low energy usage make them attractive and versatile for a wide variety of use cases, particularly on the consumer end.
Read Also:
- Identity-as-a-Service (IDaaS)
IDaaS is an acronym for Identity-as-a-Service, and it refers to identity and access management services that are offered through the cloud or SaaS (software-as-a-service) on a subscription basis. This is in contrast to traditional identify and access management (IAM) solutions that are typically completely on-premises and delivered via bundled software and/or hardware means. These systems […]
- Identity and Access Management (IAM)
An acronym for Identity and Access Management, IAM refers to a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. Also called identity management (IdM), IAM systems fall under the overarching umbrella of IT security. Identity and access management systems not only identify, […]
- Shadow IT
Shadow IT is a term that refers to Information Technology (IT) applications and infrastructure that are managed and utilized without the knowledge of the enterprise’s IT department. Shadow IT can include hardware, software, web services or cloud applications that employees turn to without IT authorization to accomplish their tasks and projects. Shadow IT has become […]
- Human Capital Management (HCM)
Human capital management (HCM) is a business philosophy that emphasizes the enhancement of employees while viewing them as a quantifiable asset whose future value can be increased through investment. Employees are perceived as assets that can be provided with clear performance expectations, against which they can be rated and rewarded based on their progress over […]
- Infrastructure
A marketing phrase that serves to group a variety of software-defined computing technologies into one overarching moniker. The umbrella of Software-Defined Everything (SDE) technologies includes, among other terms, software-defined networking (SDN), software-defined computing, software-defined data centers (SDDC), software-defined storage (SDS) and software-defined storage networks. With Software-Defined Everything, the computing infrastructure is virtualized and delivered as […]