Feeds

Networking 'will never be a commodity'

Procurve's crystal ball gazing

Application security programs and practises

NetEvents In his keynote speech to the NetEvents European Summit in Garmisch, Germany today, HP Procurve VP John McHugh stuck his neck out, and said: "Enterprise networking is not going to be a commodity."

McHugh's keynote was a look into the year 2010. He can claim a good track record for anticipating technology developments, such as the failure of ATM on the desktop, or the collapse of Token Ring, and he has some interesting predictions for the next five, ten and fifteen years. But amongst those he is definite: corporate networking won't commoditise.

"Every year for the last 15 years, I've heard that enterprise networking is commoditising; and I've said no, I don't think so. One of our bad calls in the past was when we followed that path a couple of times, and got injured. We're back on course. I still believe it's not commoditising" McHugh said.

Predicting the future accurately is key to his business, he said. "If we just tried to develop products for every aspect of networking, we'd be in the unfortunate position of a gambler who tried to bet on every number on the roulette wheel."

So, what does this future spy think will happen in 2010?

Wi-Fi access, he thinks, will be robust, universal and properly billed. "It will be the time mobility comes of age. It will achieve the level of robustness, accounting reliability and security which people expect. Wi-Fi account billing will be supported in most public hot spots - you can feel comfortable that you can turn your phone on anywhere in the world, and be sure that the bill will be accurate."

He also predicted that 10 gigabit Ethernet over copper to the desktop would be being deployed.

But VoIP would still not have swept away conventional phone networks. "It will continue to be installed on a case by case and account by account basis, but it will take 10, 15, 20 years before the old system is swept away - just look how long Token Ring lasted after it died. VoIP will continue to overtake TDM, and will win over customers one by one. But there's no 'hockey stick' coming in VoIP."

Video calling, however, will still be unused. "People simply won't use it, because they don't like using it," he predicted.

And storage would, finally, start being a standard Ethernet based service, rather than a series of highly proprietary storage area network technologies.

And Unified Network Access? "We can predict that Trusted computing will announce yet another unified access protocol, and will still struggle with achieving relevance," he said. "We can also predict that the cycle of replacing the dominant networking company will continue; so where Cabletron replaced IBM, where 3Com replaced Cabletron, where Cisco replaced 3Com, someone will replace Cisco as the industry leader." ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.