Feeds

How feasible is the personal communications hub?

It's the comms capability that matters, not the device

  • alert
  • submit to reddit

3 Big data security analytics techniques

Reg Technology Panel How would we like to use mobile technologies in the future? The answer seems to be that we'd prefer to consolidate all of our messaging and calls to a single device.

A recent Reg survey considered the importance of having such a comms hub, and more than 60 per cent of you responded that it would be highly desirable or desirable. But just how practical is this?

One thing that we didn't specify when we asked this question was the type of device. In general terms you have repeatedly told us that the laptop computer is likely to maintain its position as the primary mobile device. However, there are going to be plenty of contexts (hotel, train, top of a mountain) where it's just not going to be practical to be carting around a computer, however ultra-thin and portable.

Home is where the hub is

Instead, this will be more about ensuring that we can take our communications profile with us wherever we go, regardless of what we choose to put into our pocket or bag.

In terms of profiles there can't be any one size fits all: not only do habits vary, but we like to communicate in different ways with different people, depending on what we're trying to do. Some situations require a simple terse voice call, for example, or a quick email exchange; whereas others may involve a group chat, video, or indeed some clever screen sharing using tools from Cisco/WebEx, Adobe or Citrix.

While this last example may not yet be de facto mobile behaviour, it is becoming more prevalent on the desktop, and it's fair to surmise that the mobile equivalent will follow. As smartphones become more powerful they will no doubt take on some of this workload, but for the foreseeable future we shall still need to select the most appropriate device for the job – and associate our connectivity with it as simply as possible.

Whatever is the device that sits between the connection pipes and the person, it's going to have to be capable of managing a whole set of different information flows, voice and data. Not only this, but based on what we have already seen about wanting to plan ahead in terms of connectivity costs and single-billing, service providers will need to ensure they deliver appropriate tariffs to support the differing needs of their subscriber base, regardless of what sits at the end of the pipe.

In a future article we'll be looking into the possibility of always-on, blanket mobile access and its potential impact. For now, however, what's most important is enabling people to bring together their differing communications onto whatever device they choose. ®

3 Big data security analytics techniques

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.