Feeds

Microsoft and Nortel unite on communications

Can you hear me now, Steve?

Securing Web Applications Made Simple and Scalable

Nortel has signed a four-year deal with Microsoft for the development and installation of integrated voice and data communications products running on Windows.

Under the Innovative Communications Alliance, Microsoft and Nortel will form joint teams to develop products due in 2007, cross-license intellectual property and participate in sales and marketing activities. Additionally, Nortel will become a strategic systems integrator of products and services developed through the union.

Agreement with Nortel is a major piece of the Microsoft's unified communications jigsaw. Microsoft unveiled its plan for unified voice, email, IM and video communications in Office 2007 and Windows last month, and immediately nailed down the mobile portion of the strategy by announcing backing from Motorola.

Motorola earlier this year ended a joint product development deal with Cisco Systems, which competes with Nortel.

Announcing the Nortel deal, Microsoft chief executive Steve Ballmer said Nortel's systems integration focus would provide customers with "excellent transition from the traditional phone system and corporate PBXs of today to unified communications based around software that spans phones, PCs and servers."

The goal of Nortel, meanwhile, is to move 20 per cent of its own existing install base to newer systems. Both companies believe they can add more capabilities such as voice, presence, contacts and video to Microsoft's' Office and Dynamics business applications, and embed more next-generation communications in networks and devices.

"This is a real inflection point," Ballmer said on the timing of the Nortel deal. "Within a very few years all of us will be have next generation devices for voice and video communications in our hands, desks and pockets. The combination of technology, service and support offerings will allow enterprise customers to deploy unified communications." ®

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.