Feeds

Juggle those connections

It’s a multi-protocol world

  • alert
  • submit to reddit

Security for virtualized datacentres

Mobile Workshop It doesn’t seem that long ago that we were debating whether Wi-Fi would make 3G redundant. Well it didn’t happen, and with the “son of 3G”, HSDPA, now a mainstream option for business connectivity, and driving rapid uptake, it seems less likely than ever that cellular data options are going to go away.

In fact, in a recent Reg Panel survey, you made it very clear that cellular and Wi-Fi would co-exist, with the cellular continuing to dominate for handled connectivity and Wi-Fi being emphasised for notebooks PCs (see chart).

Connectivity

Regardless of the emphasis, however, the message seems to be that a blend of options is what’s really needed. Even for notebooks, three quarters of respondents saw a place for cellular, as even the most dyed-in-the-wool Wi-Fi advocate will sometimes not be able to find a handy hotspot. And in the other advocacy camp, many a cellular enthusiast will argue that with the speed and convenience of 3G/HSDPA connections today, coupled with flat-rate billing, why would anyone mess around with the inconvenience of tracking down and authenticating against a Wi-Fi hotspot at all?

Extremes and vested interests to one side, though, the reality is that we are going to be living in a multi-protocol wireless world as we look forward, and as options such as WiMax and others come along, these will simply add to the cocktail.

At one level, this is very good news as it represents choice to the customer and also the opportunity to mix and match to achieve the most appropriate blend to meet user requirements.

There is an obvious challenge, though, and that is managing the complexity and redundancy. The average user does not want to have to think about how to connect to achieve the best balance between bandwidth, latency, cost, and so on, and the purse-string holders in business clearly don’t want to be paying twice for services that fundamentally do the same thing – get their employees connected.

It is against this background that connection management solutions (some call them dashboards) and various commercial bundling and network aggregation approaches have emerged. But do these provide for what is needed or is there still some way to go? In this week’s mobile workshop, we’d be interested in your views, and perhaps your predictions or “wish list” for mobile connectivity in a multi-protocol world over the coming five years.

You can have your say below.®

Internet Security Threat Report 2014

More from The Register

next story
TEEN RAMPAGE: Kids in iPhone 6 'Will it bend' YouTube 'prank'
iPhones bent in Norwich? As if the place wasn't weird enough
Consumers agree to give up first-born child for free Wi-Fi – survey
This Herod network's ace – but crap reception in bullrushes
Crouching tiger, FAST ASLEEP dragon: Smugglers can't shift iPhone 6s
China's grey market reports 'sluggish' sales of Apple mobe
Sea-Me-We 5 construction starts
New sub cable to go live 2016
New EU digi-commish struggles with concepts of net neutrality
Oettinger all about the infrastructure – but not big on substance
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
EE coughs to BROKEN data usage metrics BLUNDER that short-changes customers
Carrier apologises for 'inflated' measurements cockup
Comcast: Help, help, FCC. Netflix and pals are EXTORTIONISTS
The others guys are being mean so therefore ... monopoly all good, yeah?
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.