Feeds

Juggle those connections

It’s a multi-protocol world

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

Mobile Workshop It doesn’t seem that long ago that we were debating whether Wi-Fi would make 3G redundant. Well it didn’t happen, and with the “son of 3G”, HSDPA, now a mainstream option for business connectivity, and driving rapid uptake, it seems less likely than ever that cellular data options are going to go away.

In fact, in a recent Reg Panel survey, you made it very clear that cellular and Wi-Fi would co-exist, with the cellular continuing to dominate for handled connectivity and Wi-Fi being emphasised for notebooks PCs (see chart).

Connectivity

Regardless of the emphasis, however, the message seems to be that a blend of options is what’s really needed. Even for notebooks, three quarters of respondents saw a place for cellular, as even the most dyed-in-the-wool Wi-Fi advocate will sometimes not be able to find a handy hotspot. And in the other advocacy camp, many a cellular enthusiast will argue that with the speed and convenience of 3G/HSDPA connections today, coupled with flat-rate billing, why would anyone mess around with the inconvenience of tracking down and authenticating against a Wi-Fi hotspot at all?

Extremes and vested interests to one side, though, the reality is that we are going to be living in a multi-protocol wireless world as we look forward, and as options such as WiMax and others come along, these will simply add to the cocktail.

At one level, this is very good news as it represents choice to the customer and also the opportunity to mix and match to achieve the most appropriate blend to meet user requirements.

There is an obvious challenge, though, and that is managing the complexity and redundancy. The average user does not want to have to think about how to connect to achieve the best balance between bandwidth, latency, cost, and so on, and the purse-string holders in business clearly don’t want to be paying twice for services that fundamentally do the same thing – get their employees connected.

It is against this background that connection management solutions (some call them dashboards) and various commercial bundling and network aggregation approaches have emerged. But do these provide for what is needed or is there still some way to go? In this week’s mobile workshop, we’d be interested in your views, and perhaps your predictions or “wish list” for mobile connectivity in a multi-protocol world over the coming five years.

You can have your say below.®

The essential guide to IT transformation

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
EE fails to apologise for HUGE T-Mobile outage that hit Brits on Friday
Customer: 'Please change your name to occasionally somewhere'
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
EE plonks 4G in UK Prime Minister's backyard
OK, his constituency. Brace yourself for EXTRA #selfies
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.