Tag Archives: security

Unmuddling APIs, Developer Communities, Developers, Third Parties, App Stores, App Warehouses, and Widgets…..

Network APIs do not require a developer community.  Its just an API: publish, provide code examples, define the process on how a third party can access the API, and you’re done. Network APIs are not necessary for an operator’s App Store.  For example operators have been selling content and apps on their portals for years, […]

The Emerging App Store Ecosystem

There are 4 main application store provider categories: Operating System: Google Android, Microsoft Mobile Consumer Electronics: Apple, Nokia (Ovi), RIM, Sony, Nintendo, Microsoft Xbox Mobile Storefronts: Getjar, Handango, and in the future Amazon (they’ve already started with Kindle) Operator: Vodafone (Live), OrangeWorld, O2 Active Though the term app store is not entirely correct, as some […]

Service Delivery Platform Virtualization

Virtualization is a hot topic, made more so by IBM’s potential acquisition of Sun; two leading proponents of virtualization and cloud computing.  From an enterprise perspective the drivers for virtualization are saving cost; and improving employee efficiency, manageability of IT and enterprise security.  Take for example desktop virtualization, e.g Sun Ray thin clients, it’s your […]

An Independent Review of Femtocell Technology: It’s a timing issue!

Femtocell can be thought of as the “son of FMC,” rather than using a Bluetooth or WiFi air interface and a specialized phone; it re-uses the GSM or CDMA air interface and potentially your existing mobile phone.  But given FMC’s (Fixed Mobile Convergence) poor market acceptance; why should femtocell be any different?  Reviewing femtocell against […]

Unified Communications, the Enterprise, the Mobile Phone and the Threat to Mobile Operators

UC (Unified Communications) brings together the communication and data networks of an enterprise.  The Innovative Communications Alliance (ICA), led by Nortel and Microsoft, is creating the hype surrounding UC.  The purpose of this article is not to discuss UC within the enterprise, rather look at the emerging mobilization of UC and the impact it could […]