Feeds

Microsoft and Nortel unite on communications

Can you hear me now, Steve?

Secure remote control for conventional and virtual desktops

Nortel has signed a four-year deal with Microsoft for the development and installation of integrated voice and data communications products running on Windows.

Under the Innovative Communications Alliance, Microsoft and Nortel will form joint teams to develop products due in 2007, cross-license intellectual property and participate in sales and marketing activities. Additionally, Nortel will become a strategic systems integrator of products and services developed through the union.

Agreement with Nortel is a major piece of the Microsoft's unified communications jigsaw. Microsoft unveiled its plan for unified voice, email, IM and video communications in Office 2007 and Windows last month, and immediately nailed down the mobile portion of the strategy by announcing backing from Motorola.

Motorola earlier this year ended a joint product development deal with Cisco Systems, which competes with Nortel.

Announcing the Nortel deal, Microsoft chief executive Steve Ballmer said Nortel's systems integration focus would provide customers with "excellent transition from the traditional phone system and corporate PBXs of today to unified communications based around software that spans phones, PCs and servers."

The goal of Nortel, meanwhile, is to move 20 per cent of its own existing install base to newer systems. Both companies believe they can add more capabilities such as voice, presence, contacts and video to Microsoft's' Office and Dynamics business applications, and embed more next-generation communications in networks and devices.

"This is a real inflection point," Ballmer said on the timing of the Nortel deal. "Within a very few years all of us will be have next generation devices for voice and video communications in our hands, desks and pockets. The combination of technology, service and support offerings will allow enterprise customers to deploy unified communications." ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.