How Mobile Cloud Computing Is Set To Change The Telecommunications Ecosystem

How Mobile Cloud Computing Is Set To Change The Telecommunications Ecosystem

Cloud computing has impacted the telecommunications industry across crucial fronts and now is in the process of amply changing its ecosystem. The ecosystem here is broad and spans business models, human behavior and technical issues like the Networks versus the End-user devices, Access points, core networks and the services. Just like in a natural ecosystem, adverse changes in the environment will cause organisms to change traits and behaviors in order to adapt to the change. The telecom world is now experiencing the ‘cloud wave’ and will inevitably have to adapt.

The change will come in many forms that may include;

As telecommunication architectures move towards a more cloud-oriented structure, there will be more demand on self-services. This is even more significant in the mobile telecoms where people are now basically utilizing the cloud as the processing power unit for their mobile devices, turning them into high performance utility tools.

Anne Bouverot, Director General GSMA gives an example of a real time translation service (cloud-based) by NTT DOCOMO in Japan. The need for such in a telecom ecosystem is infinitely vast and any ecosystem that supports the conception and sustenance of such will always thrive. Support may come in from the cloud technology, encouraging open source platforms like the Android system which will in turn enrich the ecosystem with billions of day to day solutions to complex applications courtesy of diverse developers.

As we move from the physical to the virtual, new players in the service sector are coming up to feed this need. Cloud service delivery in the new ecosystem is being offered through three kinds of services: Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS). These services too are anticipated to evolve with improvements or we could witness an entirely new set of services. This means that more telecom companies are relocating their infrastructure to the cloud as the point of service delivery, and more specifically through IaaS. Others will offer value added services through SaaS.

Telecom companies will also be faced with the options of necessary mergers and or strategic organizational and corporate overhaul. Mergers and partnerships will be necessitated by the need for infrastructure and capital consolidation in order to power such companies’ capabilities to set up and offer cloud services. The ecosystem has also been altered by the entry of new players, those whose entry is directly influenced by strategic business decisions. For example, when Amazon-an internet retail site, decided to invest in cloud services, many in the telecom industry had no idea why they were doing this. But as time progressed, their corporate foresight was continually being unveiled. Since traditional telecom service providers still have a sizeable share of the market, they are integrating both methods to improve and come up with new services that are essential.

We can never forecast enough the game-changing abilities of cloud computing technology but we can always be sure of little surprises (mostly pleasant) along the way. As long as the cloud lives, change in the telecom ecosystem is inevitable.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Comics
Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…