Will our PCs even exist in 5 years? Unlike the new generation stepping into the digital era failing to see how upsetting it is for us and the elders to have a mobile phone that essentially allows checking the morning weather forecast in real time without looking out the window, I was constantly amazed by entering the computer age. I remember my first PC. A Philips branded PC. It would have been retrieved in 1985. (sung to an Edith Piaf tune) It was bulging, It was wonderful, appearing fit with the hot silicon, my first PC ! Carrying green messages on its screen making no further progress on my keyboard ! We kept it in the living room. Keyboard, monitor and device in tune. It did not dream about clouds. It showed its labels, the loudspeaker trebled, while starting, Showing its : « BIOS certified » screen Showing its « MS DOS 3.1 loaded » floppy disk. 30 years later, it has remained virtually unchanged… It is indeed more powerful and cheaper, but with little change. Amazing for a constantly changing technological environment. During recent years, the traditional PCs at home have been replaced by tablets. This corresponds to a philosophy of use. Within our families, it was not justified to continue terrorizing our ancestors with these uncomfortable casings in any respectful dialogue while subjecting them to view an ordinary video. The Windowsien PC will be a godsend, yet, without discussing any rich Excel macro, used with abundance in business. The logical pathway taken by some is to infer that the tablet will also be the future for the PC in business. There are some recesses that are useful, but in the present case, we are concerned with facing a risk of regression in terms of productivity. Remember that the business employees must first have these highly ergonomic best performance applications at the lowest cost possible. The tablet with keyboard? Hybrid? With dock? A PC. BYOD with a tablet? A mis-routing. CYOD (Choose Your Own Device) ? Yes, but it is a PC (and slightly Mac), etc., etc., Will an innovative PC generation follow the PC, eventually replacing my old Philips branded PC? This is unlikely. Most US manufacturers and factories are less inclined to innovation in this field. The equipment cost is the only competition left over. No leading industry would even consider producing Apple’s Keynote, to present the youngest medium of the PC family. It is the cousin left over in the family. A faraway cousin, since it owns the terminals to connect to the mainframes in the 1970s. A cousin who also envies. As a result of the success of the PC, it wanted to be prepared for the same expensive collection. This led him astray. Instead of merely supporting the RDP protocols and others through access to virtualized applications or desktops in a data center, it wished to have the Linux or Windows operating system. That requires spending a bit more money. Forgetting his roots, the athlete in the 1970s has become a kind of PC at a cost close to integrated systems and software requiring complicated system maintenance. In 5 years down the road, will our desktop computer remain the same PC? In any case, after the significant innovations, even radical for some, at every level of the infrastructure, it is hard to believe that it will continue to exist in its present form. What might it look like? Would it look like a Cloud Terminal, a Thin Client, really thin, with no operating system but with a leaner hub with some mega bytes, authenticationPrimary or secondary authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give user access to the workstation (Windows login). Several authentication modes can be made available to users: login and password, smart or contactless cards, biometrics, mobile ... To classify an authentication mode it will be enough to rely on the principles of the 3 factors: "What do I have? ", " What do I know? ", " Who am I? ». The answers provided to these questions make it possible to say for a given authentication method whether it is "simple" or "double" factor. Secondary authentication is the access of a user to an application from an open session on a workstation. The application can be of any type: web, client-server, local to the workstation or external...... modes renewed through my Smartphone, applications, and a virtualized desktop in the cloud available to work when the screen turns on-one to two seconds, at a cost of a few dozen euros. And to eventually consign my PC to the museum, it would be wonderful to take pride of place on my desktop?