Feeds

IP telephony and Wi-Fi must tie the knot

Converged communication strategies the secret of wedded bliss

  • alert
  • submit to reddit

Application security programs and practises

Vendors should stop pushing IP telephony and Wi-Fi technology in isolation and put forward converged communication strategies instead.

Analyst Butler Group reckons suppliers are letting end users down by failing to help them migrate to converged communications and allowing an ad hoc approach to technology deployment to become commonplace.

Butler forecast that over the next five years businesses will complete the migration to converged communications. Converged communications bring real business benefits (such as making an organisation more flexible and reducing IT costs) but the move is been badly handled in many instances.

"Vendors must abandon their current approach of adopting technologies such as VoIP and Wi-Fi in isolation. While such technologies can bring short-term benefit, they are not in harmony with the real business challenges facing enterprises today and totally ignore the advantages of merging voice and data networks," Butler opines.

Businesses will adopt one network for voice and data as previous hurdles such as security, immature standards and cost have disappeared, according to Butler.

"It will take five years before converged communications is commonplace but vendors risk losing their ability to compete if they focus on short-term cost saving implementations," it adds.

Butler predicts that major players in the communication and network industry that offer the prospect of end-to-end converged solutions, seamlessly roaming from one transport technology to another, will be the most successful in the medium to long term. Currently, BT and Cisco lead the market for convergence but over the next few years Alcatel and Siemens will join them, the analyst house forecasts. ®

Related Products
Check out Wi-Fi products in The Reg mobile store

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.