Pipeline Publishing, Volume 3, Issue 9
This Month's Issue: 
Delivering the Total Package 
download article in pdf format
last page next page

Avoiding Future Schlock

back to cover
article page | 1 | 2 | 3 | 4 | 5 |

also qualitatively different from the prepay of Europe and Asia. What is needed is a pay-as-you-go approach – a micro-payment system capable of accounting for, and charging for, all those differentially treated traffic flows. This will require a transaction system scaling to transaction volumes that make the credit card networks and the phone calling networks look small.

Coupled with this will be the pressures to implement very fine-grained security. Un-encrypted content will be sifted by type, source and destination. Encrypted traffic will be pre-validated or else blocked or stored for decryption. Governments and providers will cooperate - in enlightened countries with the cooperation and consent of users; but nevertheless, cooperation will occur. And with the size of networks, and the immediacy of need during threats, this must become highly automated. Also, priority access will be given to first responders and civic utilities. This will be deeply integrated with disaster recovery projects and graceful-fail-and-recovery technologies.

Plan ahead for tomorrow

Many promising horizon technologies are in development and bear directly upon the issues above. While not yet ready for prime time, the Innovative service provider or vendor will be monitoring these technologies. We recommend having a presence in the standards groups or forums; perhaps conducting an early market feasibility analysis. The potentially productive, promising technologies and social movements include:

- Network resident grids and anywhere/anytime hosting of applications
- Extrapolation of 911, 411, etc into life watch services
- Micropayments joining service providers to banking networks
- IPv6, the internet everywhere, everything addressed, and the intelligent toaster
- Complexity theory and management of complex network systems
- Pandemic networking and pervasive computing
- Autonomic networks (self configuring and self healing)

Governments and providers will cooperate - in enlightened countries with the cooperation and consent of users; but nevertheless, cooperation will occur.

- Network aware software applications
- Fusion of network terminations into composite endpoints (the mixing of connectivity and services from multiple specialized networks at the point of use).
- Soft terminals (Bio-resident or bio-enhanced)


Just Rewards
In all this, what remains unchanging? Where is stay the course the right strategy? Keeping your focus on satisfying your customer is of course the right answer. If we actively listen to our customers (remember – good opportunities exist in everyday life: our friends, neighbors, children and co-workers), we stand a good chance of hearing about dissatisfaction early, and having the time to fix it. Many avenues are available to make today’s services more appealing, today’s technologies more cost-effective, and today’s processes more efficient. There are lots of dollars to be eked out of today for sure.

As we’ve shown, there are also many new products just waiting for realization. Like a sculptor teasing the image out of the stone, today’s technologist, architect, planner, and business development specialist should be working closely together to define the products and services that will yield real value. Collaboration is the essential strategy to having all parts of the product definition, launch, operation and management environment in place to win the futures game.

 

 




article page | 1 | 2 | 3 | 4 | 5 |
last page back to top of page next page
 

© 2006, All information contained herein is the sole property of Pipeline Publishing, LLC. Pipeline Publishing LLC reserves all rights and privileges regarding
the use of this information. Any unauthorized use, such as copying, modifying, or reprinting, will be prosecuted under the fullest extent under the governing law.