The only publication dedicated to OSS Volume 1, Issue 5 - September 2004 |
|
Tracking the Elusive "IP Application"By Edward J. Finegold, Editor-in-ChiefThe IP applications wave is like the next blockbuster movie hit – it sounds cool, everyone is talking about it, but no one knows any details. Most of the time, if you ask someone around the telco business what the hot new IP services actually will be, the response is something like, “well, email, web hosting, VoIP and video.” For the record – these are not the great new IP applications to which we look forward, but rather network functions already in use. The service provider's burden lies in deepening its expertise in IP applications and giving customers superior alternatives to what they already use. To serve enterprise customers this means deepening expertise in security, identity management, storage, hosted applications, content management and capabilities that take advantage of presence and mobility. Application Outsourcing Grows Fast What Did I Do With That Number? Enterprises have security concerns regarding these web-based services because they are outside of the corporation's control. Further, even some users equate the impersonal emails these services generate with spam. Telcos can provide secure versions of these services as part of a total offering and help overcome information security concerns. Email and messaging unification is a slightly bigger challenge, but is perhaps the next step given the number of email and messaging users the increasing number of email and messaging capable devices in the workplace. These are all practical ideas that attend to users' every day needs and provide secure alternatives to public, Internet-based providers. No Spam. No Phishing Spam, as all email users know, is unsolicited junk email that not only wastes disk space, but can carry viruses and worms. It also encourages users to visit places on the Internet employers and IT staff would rather they avoided. Phishing is a slightly more devious scam. Spammers pose as legitimate financial institutions and bombard corporations with email, with the intent to fool users into surrendering credit card information. Like most other IT functions, commercial software exists to combat these common problems, but this is yet another growing expense corporations inherit with their basic IT infrastructure. If an enterprise can contract for an email solution with a carrier, it makes sense for it to pay a premium for a spam and phishing-free experience, courtesy of the service provider. Rather than throwing money at the problem and failing to solve it, enterprises should be able to count on their communications partners to clean their email before it's delivered.
© 2004, All information contained herein is the sole property of Pipeline Publishing, LLC. Pipeline Publishing LLC reserves all rights and privileges regarding the use of this information. Any unauthorized use, such as copying, modifying, or reprinting, will be prosecuted under the fullest extent under the governing law. |