Feeds

Mixed fortunes for enterprise WLANs

‘low priority’

  • alert
  • submit to reddit

Maximizing your infrastructure through virtualization

Mixed fortunes for enterprise WLANs, if the latest crop of research results are anything to go by. A survey by investment bank Goldman Sachs found that wireless Lans are now rated ‘low priority’ for IT spending, according to a panel of 100 CIOs. In the same survey last year, WLANs rated in the top category. The bank says this is mainly because most companies have already adopted Wi-Fi and see further investments, for instance in upgrades, as luxuries.

Systems integration and consulting were the big winners.

On a brighter note, dell’Oro found that the global WLAN market grew by 9 per cent in revenue terms in the third quarter, compared to the second, achieving sales of $457 million. The market for enterprise class access points increased by 25 per cent to $121m, reflecting the start of the upturn in corporate spending on WLANs, and these devices made up over one-quarter of the total sector. Cisco improved on its market lead, increasing its revenue from WLAN by 44 per cent in sequential quarters.

And looking specifically at the US enterprise market, InfoTech predicts that WLAN penetration will reach 80 per cent by 2008, creating a market worth $5.9bn.

InfoTech says that almost half of US businesses currently have WLANs, but 75 per cent of these installations are limited in scale, reaching only 10 per cent or less of the workforce. The researchers believe this pattern will remain until applications that can be used by all staff, and with demonstrable return on investment, become mainstream. They see the key example as being voice over WLAN.

By 2008, business users of mobile networks inside buildings will rise from 14.8m to 30.8m, says the report. So far, this has been held back by the failure of mobile service providers to provide adequate in-building coverage, whether WLAN or cellular, and over half of the companies surveyed were dissatisfied with current indoor services. "The traditional mobile boundaries will continue to blur as wireless business users no longer perceive in-building and out-of-building as separate domains, putting further pressure on providers to achieve ubiquitous coverage,” said report author Scott Drobner.

© Copyright 2003 Wireless Watch

Wireless Watch is published by Rethink Research, a London-based IT publishing and consulting firm. This weekly newsletter delivers in-depth analysis and market research of mobile and wireless for business. Subscription details are here.

Related Products
Buy Wireless, 802.11 & WiFi products in The Reg mobile store

Reducing security risks from open source software

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.