Welcome!

Mobile IoT Authors: Liz McMillan, Yeshim Deniz, Pat Romanski, Elizabeth White, Kevin Benedict

Related Topics: Mobile IoT

Mobile IoT: Article

Media with Your Messages?

It's fun, but is it practical?

Today's message networks take on tomorrow's advanced messaging and unified communications services.

With over 40 billion e-mails sent each day, the world's communications backbone is increasingly traveling across message networks. Businesses execute transactions, partnerships, sales, negotiations, and marketing through their e-mail messages. Consumers chat with friends and family, read newsletters, and buy products. Furthermore, technology innovations are converging traditional voice, data, and wireless networks, so messages take shape not only as e-mail, but also as videos, voice mails, animated greetings, images, Short Message Service (SMS) and Multimedia Message Service (MMS) mobile messages, and faxes.

As message networks take on an increasingly central role in our communications, users need more flexibility to access their critical information from any device, anywhere, with a single click. This includes traditional devices like desktop computers and Web clients, but also mobile phones, voice interfaces, and many more devices yet to be invented. For all types of customers, emerging unified communications (UC) applications offer a great potential for better connecting individuals together and facilitating communications and collaboration. Specifically for businesses, UC applications have the potential to dramatically increase employee productivity and help remote or "deskless" workers, like salespeople or delivery personnel, better stay in touch with corporate headquarters.

UC technologies provide a bridge between traditional e-mail servers and mixed media content from the traditional telephony and wireless worlds. Gateways allow voice mails, faxes, and mobile messages to be centrally stored in highly reliable, scalable Internet message stores. New demands for storing this broad variety of content require a new generation of future-proof message network architectures. These UC architectures will need to employ components optimized to route, store, manage, and access Internet messages throughout their life cycle within the message network.

As these next-generation message stores take on the additional load of multimedia content, customers will need ways to manage the ever-increasing storage requirements. This becomes particularly critical as new mobile messaging formats, like MMS, allow for the rapid creation and dissemination of messages that include photos, animations, and video and audio clips from mobile phones and other devices. Furthermore, since mobile users will usually have limited physical storage on their device, the network-based store of their messaging information will be particularly important for retaining messages in the event they upgrade mobile handsets or move to a new service provider.

For this reason, storage flexibility will need to be built into whatever messaging system is selected. This includes integrating with networked storage solutions, like Network Attached Storage (NAS) and Storage Area Networks (SAN), so customers can leverage a plug-and-play framework for as-needed scaling to support new users and greater message volumes. Furthermore, management tools will be required that allow for easy management of the store, so customers can get an instant view into what's happening on their message store. This includes tools for tracking storage allocation, CPU usage, and other low-level hardware diagnostic information, like cooling fans and power supplies or even network-level elements.

A key element of converged message network architectures that address today's e-mail, as well as advanced applications like UC, will be the presentation of message content to the end user. Transcoding and media conversion technologies facilitate the transformation of message content to meet the varied requirements of individual devices and their respective user interfaces. Examples of this include the conversion of text messages to speech for access from voice interfaces, like traditional phones or the reduction of long text e-mails into short limited-character excerpts that can be sent via SMS.

A related challenge that will be created by emerging, converged UC architectures is the requirement for digesting this new abundance of message content centralized in one giant, unified mailbox. Users not only need the flexibility to get this information from anywhere, but also capabilities for managing the message traffic. This includes not only traditional tools for blocking spam, but also capabilities for preventing security breaches, like hacker attacks, virus outbreaks, or forwarding of confidential attachments.

Throughout the converged message networks of the future, routing and filtering systems will need to be put in place to direct message traffic. Powerful scanning tools will need to police messages for inappropriate content, including spam and viruses. Priorities will also need to be granted for different types of message content or users. For example, enterprises will likely want to prioritize voice mail over e-mail or SMS messages. Service providers will want to differentiate service options for "free" Webmail versus unified e-mail, voice, fax, and wireless messaging services.

For businesses, policies will need to be defined and enforced for controlling usage of message networks. Content filtering can be employed to watch out for harassing content, like profanity. Policies could be used to watch for inappropriate media embedded in e-mail, like an audio or video clip. Related to this, the same issues around online file sharing will also infect message networks, so both enterprises and service providers will need to better monitor and document user activity.

Furthermore, businesses will need to establish security policies for protecting sensitive voice mails or e-mails from being forwarded outside the company. Archival systems and quarantine queues will allow businesses to better track and store messages in the event of future electronic discovery requests. Quarantine queues will give administrators and management the power to control which messages ultimately get delivered, and auditing capabilities will further allow for the end-to-end tracking of a message throughout its life cycle from sender to receiver and even beyond.

With their experience in dial-tone reliable services, service-level billing, and network connectivity, service providers are in an ideal position to offer advanced messaging services, including UC, to their consumer and business customers. For example, many mobile operators deploying 2.5 and 3G wireless networks are already in advanced trials or early deployments of powerful UC services. Other wireline ISPs, portals, and traditional telecom providers are looking to offer these services to better differentiate their service offerings and generate new revenues, as well as lure more lucrative business customers to hosted services.

For service providers that want to generate revenue from UC services, effective billing system integration is critical. For example, mobile operators need to ensure that both their pre-pay and post-pay subscribers can authenticate and get appropriate access to these next generation services. Additional complexities emerge when you consider that billing for UC services may invoke new business models - such as when subscribers get charged not only for time-based usage, but alternative billing is done based on message content type, size of message and related attachments, or even on the specific applications being used. In addition to billing requirements, a converged message network solution will also need to fit into the Operations Administration Maintenance Provisioning (OAMP) framework already in use at the customer site. This includes addressing network diagnostics, managing downtime, defining classes-of-services on a per-user or domain basis, as well as integrating with existing systems for provisioning new users or service offerings.

For traditional enterprises and government institutions, UC technologies allow increased flexibility and productivity for employees. It's already been shown that employees using e-mail for business interactions can be three times more productive than when using a traditional voice interface. In addition to employee productivity and efficiency gains, these next-generation UC technologies will also allow the mobile workforce to remain better connected to their critical messaging information and more responsive to business requests from anywhere, at any time. And with advanced notification capabilities of UC technologies, users can more easily be reached or get access to their critical messaging information from truly anywhere, at any time. Similarly, educational institutions see these advanced messaging technologies as a way to better connect students, faculty, and alumni, as well as enable distance learning applications.

Converged architectures will allow customers to centralize multiple stores of traditional communications information, including voice mail, e-mail, and fax stores. The server consolidation that these next-generation converged message network architectures provide will dramatically simplify management, provide flexibility for deploying future services to nontraditional clients, and reduce ongoing hardware, software, and support IT costs. Today's economic environment will force any business looking at deploying UC services to focus heavily on how to best maximize operational efficiencies of their messaging and IT investments. With that said, all businesses looking to deploy advanced messaging services should stay focused on the significant end-user benefits that these services provide and the way they can dramatically simplify how each user - business or consumer - gets mail.

More Stories By Jeff Brainard

Jeff Brainard is an industry expert on messaging software and e-mail security. He is manager of product marketing at Mirapoint, responsible for product management and product marketing activities

Comments (1) View Comments

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Most Recent Comments
Bob Jones 05/28/04 02:29:45 PM EDT

interesting article

IoT & Smart Cities Stories
Early Bird Registration Discount Expires on August 31, 2018 Conference Registration Link ▸ HERE. Pick from all 200 sessions in all 10 tracks, plus 22 Keynotes & General Sessions! Lunch is served two days. EXPIRES AUGUST 31, 2018. Ticket prices: ($1,295-Aug 31) ($1,495-Oct 31) ($1,995-Nov 12) ($2,500-Walk-in)
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...