Feeds

Juggle those connections

It’s a multi-protocol world

  • alert
  • submit to reddit

3 Big data security analytics techniques

Mobile Workshop It doesn’t seem that long ago that we were debating whether Wi-Fi would make 3G redundant. Well it didn’t happen, and with the “son of 3G”, HSDPA, now a mainstream option for business connectivity, and driving rapid uptake, it seems less likely than ever that cellular data options are going to go away.

In fact, in a recent Reg Panel survey, you made it very clear that cellular and Wi-Fi would co-exist, with the cellular continuing to dominate for handled connectivity and Wi-Fi being emphasised for notebooks PCs (see chart).

Connectivity

Regardless of the emphasis, however, the message seems to be that a blend of options is what’s really needed. Even for notebooks, three quarters of respondents saw a place for cellular, as even the most dyed-in-the-wool Wi-Fi advocate will sometimes not be able to find a handy hotspot. And in the other advocacy camp, many a cellular enthusiast will argue that with the speed and convenience of 3G/HSDPA connections today, coupled with flat-rate billing, why would anyone mess around with the inconvenience of tracking down and authenticating against a Wi-Fi hotspot at all?

Extremes and vested interests to one side, though, the reality is that we are going to be living in a multi-protocol wireless world as we look forward, and as options such as WiMax and others come along, these will simply add to the cocktail.

At one level, this is very good news as it represents choice to the customer and also the opportunity to mix and match to achieve the most appropriate blend to meet user requirements.

There is an obvious challenge, though, and that is managing the complexity and redundancy. The average user does not want to have to think about how to connect to achieve the best balance between bandwidth, latency, cost, and so on, and the purse-string holders in business clearly don’t want to be paying twice for services that fundamentally do the same thing – get their employees connected.

It is against this background that connection management solutions (some call them dashboards) and various commercial bundling and network aggregation approaches have emerged. But do these provide for what is needed or is there still some way to go? In this week’s mobile workshop, we’d be interested in your views, and perhaps your predictions or “wish list” for mobile connectivity in a multi-protocol world over the coming five years.

You can have your say below.®

3 Big data security analytics techniques

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.