Amazon Tech Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 20 August 2010

The Top 10 Unwarranted Assumptions in Telecoms

Posted on 06:38 by Unknown
Disruptive Analysis' tagline is "don't assume".... so I thought it might be interesting to examine what the main unspoken assumptions are in the telecoms industry as I see it. These are themes and concepts burnt into the mind of the "industry establishment", especially standards bodies and traditional suppliers; they are seen as unwritten laws.

But are they really self-evident and unquestionable? I don't think so. It needs to be remembered that the telecom industry has grown up around the constraints and artificial boundaries of 100-year old technology (numbering, for example, or linking of length of a conversation with value). Many of those unnatural constraints no longer apply in an Internet or IP world - it is possible to more accurately replicate society's interactions - and extend them way beyond normal human modes of communication.

For any telecoms company wanting a continuing role for the next 100 years of the industry, it's worth going back to first principles. It is critical that everything previously taken for granted is reassessed in the light of real human behaviour - because we now have the tools to make communications systems work the way that people do, rather than forcing users to conform to technology's weird limitations.

So, in no particular order, these are the assumptions I think are unwarranted:

1) A “subscription” is the most natural way to engage with, or pay for, communications services

2)
The most basic quantum of human communication is “a session”

3)
It is entirely rational to expect people to want a single presentation layer or interface, for all their various modes of communication

4)
Communications capabilities are best offered as “services” rather than being owned outright, or as features of another product

5)
A phonebook is the best metaphor for aggregating all of a person’s contacts and affiliations

6)
A phone call – (person A sets up a 2-way voice channel with person B for X minutes) is an accurate representation of human conversation & interaction, and not just a 100-year old best effort

7)
People always want to tell the truth (presence, name, context) to others that wish to communicate with them

8)
People are genuinely loyal to communications service providers, rather than merely grudgingly tolerant

9)
Ubiquity is always more important than exclusivity

10) The quality of a communications function or service is mostly determined by the technical characteristics of the network

I'm sure that there are others - and also plenty of debate to be had around the ones I've listed. I regularly encounter innovators and strategists that *do* question these principles, or actively look to subvert them. But I still see a huge amount of focus put on these undebated tenets, especially among standards- and policy-makers. In my view, such assumption is an abdication of duty.

Together with its associates, Disruptive Analysis addresses all of these issues and more - and the implications for service providers, investors, regulators and product vendors. Please get in touch via information AT disruptive-analysis DOT com if you would like more detail on workshops or advisory engagements.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Quick musing on Cloud Computing
    I just heard the phrase "Everything as a Service" during a presentation on Cloud, SaaS and other forms of managed service offering...
  • Apple, embedded SIMs, NFC and mobile payments - some speculation
    I wonder if I've just managed to join up the dots on something rather important: - Recent reports suggest that Apple is intending to use...
  • New Cisco VNI traffic report out
    One of the broadband industry's "bibles" has been published in a 2010 edition . Cisco's "Visual Networking Index...
  • Is the MID a market?
    MIDs (Mobile Internet Devices) are being pushed by some notebook OEMs and silicon suppliers as the next big convergent handheld category. I...
  • "You can't use my eyeballs for free"
    Let's look forward 10 years. We've all got augmented reality browsers on our handsets, or perhaps our 4G-connected sunglasses. They ...
  • Mobile traffic management - the Inter-technology war begins
    I've been following the proliferation of mobile broadband traffic management technologies for some considerable time now, having publish...
  • Pre-MWC notes for analyst relations staff
    OK, it's the time of the year when I get bombarded by emails and phone calls from a million people inviting me to briefings and similar ...
  • Mobile operators' future voice strategies decoded
    Apologies in advance, but this blog post is deliberately a bit of a tease. I'm not going to spell out the answer here, as it's too v...
  • Hosted mobile services in the recession - Caveat Emptor
    I used to work as an equity analyst at an investment bank back in 2000-2001. I remember an unending stream of first generation Application S...
  • Challenges in measuring offload volumes
    I suspect we're going to get bombarded with statistics in the next year, along the lines of "Operator X deployed Vendor Y's off...

Blog Archive

  • ►  2013 (31)
    • ►  October (2)
    • ►  September (3)
    • ►  August (1)
    • ►  July (2)
    • ►  June (6)
    • ►  May (5)
    • ►  April (1)
    • ►  March (3)
    • ►  February (3)
    • ►  January (5)
  • ►  2012 (46)
    • ►  December (5)
    • ►  November (4)
    • ►  October (3)
    • ►  September (2)
    • ►  August (4)
    • ►  July (3)
    • ►  June (1)
    • ►  May (6)
    • ►  April (4)
    • ►  March (1)
    • ►  February (9)
    • ►  January (4)
  • ►  2011 (73)
    • ►  December (4)
    • ►  November (10)
    • ►  October (8)
    • ►  September (6)
    • ►  August (3)
    • ►  July (5)
    • ►  June (7)
    • ►  May (9)
    • ►  April (4)
    • ►  March (7)
    • ►  February (6)
    • ►  January (4)
  • ▼  2010 (130)
    • ►  December (4)
    • ►  November (10)
    • ►  October (10)
    • ►  September (6)
    • ▼  August (9)
      • Telcos: time to stop reporting "subscribers" and s...
      • Mobile traffic management - the Inter-technology w...
      • Is mobile voice being over-valued?
      • The Top 10 Unwarranted Assumptions in Telecoms
      • The hidden secret in the Google / Verizon statemen...
      • Work in Progress (comments welcome) - Code of Cond...
      • Device rental as a mechanism for mitigating roamin...
      • BlackBerry BBM intercept - workarounds probable?
      • Device-specific data plans and policy management
    • ►  July (7)
    • ►  June (19)
    • ►  May (19)
    • ►  April (11)
    • ►  March (18)
    • ►  February (7)
    • ►  January (10)
  • ►  2009 (126)
    • ►  December (4)
    • ►  November (14)
    • ►  October (9)
    • ►  September (8)
    • ►  August (9)
    • ►  July (10)
    • ►  June (21)
    • ►  May (14)
    • ►  April (2)
    • ►  March (11)
    • ►  February (15)
    • ►  January (9)
  • ►  2008 (94)
    • ►  December (24)
    • ►  November (26)
    • ►  October (25)
    • ►  September (19)
Powered by Blogger.

About Me

Unknown
View my complete profile