SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Mobile Web Insights
                             October 6, 2009


S   ince our inaugural report earlier this year, our Mobile
    Analytics team has been working with a number of
operators across North America, Europe and Asia to help
                                                                  One option could be to offer a mobile social networking
                                                                  aggregation service for the top sites like MySpace,
                                                                  Facebook, Myxer and Plenty-of-fish, which could be
them dig deeper into their subscriber data and understand         accessed from Operator X’s own portal through a single
the full impact of unprecedented mobile data usage.               log-in. Furthermore, Operator X can build propositions
                                                                  and tariff plans around social networking devices such
In this report, we analyze data from a tier-one mobile
                                                                  as the INQ or Samsung Corby.
operator, using data traffic, device, subscriber and error
reports to consider the implications of social networking,        Another option is to capture new revenues through SMS
bandit devices and the impending data tsunami on the              alerts for specific social network activity events: pokes,
operator business. The data sample was taken from a               friend requests, status notifications, even the sending
five-day period in September, 2009.                               and receiving of messages.

                                                                  Craigslist attracted the second highest number of
Operator Profile
                                                                  impressions over the period. One reason could be that the
“Operator X” is a large North American operator offering          site’s simple design makes it easy to navigate on handheld
mobile communication services to consumers and businesses.        devices. The down economy could be a factor as buyers are
This operator has a strong consumer proposition, offering a       searching for bargains on classified ad sites like Craigslist.
wide range of mobile services, devices and data plans. It also    Operator X could consider promoting Craigslist as an
has mobile email and mobile broadband services targeted           on-deck partner.
towards small businesses and large enterprises.
                                                                  Child protection issues also need to be considered with
Online Communities Continue to Grow                               these type of sites, as some parents may wish to restrict
Operator X’s site-based reports show four of the top ten          their children’s access while allowing them full access to
domains by page impressions being social networking sites         other sites.
(fig. 1). These results are confirmed in a recent study from
the Internet Advertising Bureau (IAB) that show a one-year
                                                                  Focus on Devices
increase of 179% in the number of subscribers accessing           As device interfaces improve, subscribers tend to consume
social networking sites from their mobile devices, compared       richer, more compelling content and services. These changes
to a 10% traffic increase on the PC versions of the same sites.   in user behavior can have a tremendous impact on the
                                                                  operator network.
This trend presents a great opportunity for Operator X to add
value to a very popular part of the user experience.




Figure 1: Top domains by impressions                              Figure 2: Data volume by device model
A device-based report for Operator X shows smartphone           Alternative 2: Using bandwidth/traffic management software,
devices such as the Palm D062 and Samsung-SPHM800               enforce fair usage policies for bandit device users who exceed
are consuming at least three to four times more data volume     their monthly data limits, and encourage them to switch to
compared to other, less sophisticated smartphones (Palm         high usage plans.
D060) and feature phones (Samsung-SPHM540), (fig. 2).
                                                                Alternative 3: Offer SIM-only plans with attractive
                                                                bolt-on offers for data bundles to increase the customer
Bandit Devices Drive Data Volumes
                                                                lifetime value of bandit device users and create loyalty
Perhaps more interesting is that the report uncovers a          in this segment.
category of unknown device type classified in the reports as
“bandit.” These bandit devices generate between 1.25 and 1.5    Using HTTP Success/Failures to Diagnose Network Health
times more traffic than the powerful smartphones and almost
                                                                Since user experience problems can be attributed to gateway
5.5 times more traffic than feature phones.
                                                                operational problems, network congestion, limitation of client
Deeper research shows that this new category of bandit          and server bandwidth and random user browsing behavior, it
devices consists of unidentified, unlocked iPhones, USB         is important to have the clearest view of your network to spot
modems or netbooks from other networks being used on            anomalies or trends quickly.
Operator X’s network. This raises concerns about the lack
                                                                As the threat of overtaxed networks grow, Operator X
of visibility operators have when it comes to planning and
                                                                can measure the health of their mobile data network by
mitigating the effects of high data volumes consumed by
                                                                monitoring the number of HTTP success/failure transactions.
these devices.
                                                                Preventative network measures help in maintaining a good
The traffic generated by bandit devices not only impacts the    user experience and improving customer satisfaction.
network in terms of congestion and latency problems, but
they also have associated financial implications in terms of
increased CAPEX costs due to additional network capacity
upgrades in congested areas.

Unique Subscribers by Device
Another powerful device-based report shows that the bandit
device issue is more complicated. Unique Subscribers by
Device (fig. 3) reveals that the number of unknown devices
being used on the network is almost four times higher than
the most popular device (Samsung-SPHM800).

Besides separate bandit devices, the high number of
unique unknown users might indicate the presence of data-
consuming applications which, once downloaded to devices,        Figure 3: Unique subscribers by device
access the network directly, not via the built-in browser on    The time-based report below (fig. 4) shows a low number of
the phone.                                                      HTTP failures from September 22-26, while the number of
These “bandit applications” might be perfectly harmless         successful HTTP transactions drops steeply between
or they could also indicate virus activity or other risks to    September 25-26, probably because of network congestion.
the user experience that Operator X could address using
an anti-abuse solution.

A good traffic management solution paired with mobile
analytics would enable Operator X to separate the bandit
apps from the bandit devices. Careful monitoring of ports
and protocols used by bandit apps allows Operator X to
control the usage of these types of apps. Managing the issue
of bandit devices is easier. Here are three alternatives:

Alternative 1: Offer exclusive content and device bundles
with advanced personalization and service discovery features,
thereby controlling the user experience and attracting bandit
device users to change their devices.

                                                                Figure 4: HTTP Success/Failures per day
Digging Deeper: HTTP Error Codes                                 Alternative 2: Implement a network compression and
Figure 5 shows four common errors which occur on Operator        caching solution as a preventative measure to reduce data
X’s network. While Error 404 and Error 503 remain flat,          volume going through the network, and place rich content
Errors 403 and 504 spike on September 25.                        closer to the network edge. This technique also helps defer
                                                                 investment in network capacity.

                                                                 Alternative 3: Invest in additional network capacity to
                                                                 relieve congestion and improve latency. Obviously this
                                                                 alternative is costly and in most cases inevitable, but
                                                                 software solutions are a smart way to alleviate immediate
                                                                 congestion problems and protect future investments in
                                                                 network upgrades.

                                                                 Conclusion
                                                                 Operator X used mobile analytics to monitor data network
                                                                 traffic, track emerging trends, extract actionable insights
                                                                 and realign its content and device portfolios to turn the large
                                                                 numbers of bandit device users into loyal subscribers.
Figure 5: HTTP Status Error Codes                                Operator X also analyzed user behaviors to provide
Error 403 could be a website maintenance issue (not              additional services and understand how its subscribers
Operator X’s problem), or it could indicate authentication       are influenced by social media. By offering more targeted
issues in Operator X’s infrastructure: a user that cannot        services, operators can facilitate new revenue opportunities
be identified by the gateway or a distant application that       and alternative business models to position themselves as
refuses to provide the service.                                  important players in the mobile ecosystem.

In this latter case, Operator X has an opportunity to redirect   The mobile analytics reports we have examined in this
the subscriber back to its own portal or replace the Error 403   report are just a fraction of what Openwave Mobile Analytics
page with a more user-friendly message to avoid a negative       can offer operators to help them optimize network usage and
user experience.                                                 confidently predict user behavior patterns to help them
                                                                 prepare for the data tsunami.
In the case of Error 504, the gateway request has timed out,
possibly due to network congestion, latency or insufficient      Stay tuned for another edition of Insights into the Mobile
bandwidth. If Operator X notices this trend repeating itself     Web featuring real data from real operators across the world.
over the next few weeks, then it would need to mitigate
network congestion with the following alternatives:

Alternative 1: Implement a traffic/bandwidth management
solution as a preventative measure to ensure subscriber
usage is monitored and controlled through defined traffic
management policies. Rigorous policy control can effectively
defer investment in network capacity.




                                                                 About Openwave
                                                                 Openwave Systems Inc. (Nasdaq: OPWV) is one of the world’s leading innovators of software
                                                                 applications and infrastructure designed to enable revenue-generating, personalized services,
                                                                 including mobile analytics, content adaptation and a suite of unified messaging solutions.
                                                                 As the communications industry intersects with the Internet, Openwave software enables
                                                                 service providers to converge services, in an effort to increase the value of their networks by
                                                                 accelerating time to market and reducing the cost and complexity associated with new service
2100 Seaport Boulevard                                           deployment. Openwave’s unique product portfolio provides a complete range of mobile internet
                                                                 service management, messaging, and location based solutions. Openwave is a global company
Redwood City, California 94063 U.S.A.                            with a blue chip customer base spanning North America, Latin America, Australia and New
Corporate +1 650 480 8000                                        Zealand, Asia, Africa, Europe, and the Middle East. Openwave is headquartered in Redwood
Europe +44 2890 416 200                                          City, California. For more information please visit www.openwave.com.
Asia +81 3 5909 6100                                             Openwave and the Openwave logo are registered trademarks of Openwave Systems Inc. in
http://www.openwave.com                                          various jurisdictions. All other trademarks are the properties of their respective owners.
                                                                 Copyright © 2009 Openwave Systems Inc. All rights reserved. October 2009.

Contenu connexe

Plus de Julius Trujillo

The Razorfish 5: Five Technologies that will change your business
The Razorfish 5: Five Technologies that will change your businessThe Razorfish 5: Five Technologies that will change your business
The Razorfish 5: Five Technologies that will change your businessJulius Trujillo
 
The State of Marketing 2011
The State of Marketing 2011The State of Marketing 2011
The State of Marketing 2011Julius Trujillo
 
Building your business with Facebook Pages by Facebook
Building your business with Facebook Pages by FacebookBuilding your business with Facebook Pages by Facebook
Building your business with Facebook Pages by FacebookJulius Trujillo
 
Social media landscape 2011 by CMO
Social media landscape 2011 by CMOSocial media landscape 2011 by CMO
Social media landscape 2011 by CMOJulius Trujillo
 
Wave5 the socialisation of brands By Universal McCann
Wave5 the socialisation of brands By Universal McCannWave5 the socialisation of brands By Universal McCann
Wave5 the socialisation of brands By Universal McCannJulius Trujillo
 
A B2B Social Media White Paper By Microsoft Advertising
A B2B Social Media White Paper By Microsoft AdvertisingA B2B Social Media White Paper By Microsoft Advertising
A B2B Social Media White Paper By Microsoft AdvertisingJulius Trujillo
 
Social Media and Mobile Internet Use Among Teens And Young Adults
Social Media  and Mobile Internet Use Among Teens And Young AdultsSocial Media  and Mobile Internet Use Among Teens And Young Adults
Social Media and Mobile Internet Use Among Teens And Young AdultsJulius Trujillo
 
Global Social Media Check-Up 2010 by Burson-Marsteller
Global Social Media Check-Up 2010 by Burson-MarstellerGlobal Social Media Check-Up 2010 by Burson-Marsteller
Global Social Media Check-Up 2010 by Burson-MarstellerJulius Trujillo
 
Two Thousand And Ten Digital Marketing Outlook By Soda
Two Thousand And Ten Digital Marketing Outlook By SodaTwo Thousand And Ten Digital Marketing Outlook By Soda
Two Thousand And Ten Digital Marketing Outlook By SodaJulius Trujillo
 
10 Ideas For The New Decade By Edelman
10 Ideas For The New Decade By Edelman10 Ideas For The New Decade By Edelman
10 Ideas For The New Decade By EdelmanJulius Trujillo
 
100 Best Global Brands 2009 by Interbrand
100 Best Global Brands 2009 by Interbrand100 Best Global Brands 2009 by Interbrand
100 Best Global Brands 2009 by InterbrandJulius Trujillo
 
The Brand Value Of Rich Media And Video Ads
The Brand Value Of Rich Media And Video AdsThe Brand Value Of Rich Media And Video Ads
The Brand Value Of Rich Media And Video AdsJulius Trujillo
 
360i Social Marketing Playbook
360i Social Marketing Playbook360i Social Marketing Playbook
360i Social Marketing PlaybookJulius Trujillo
 
Measuring Social Influence Marketing
Measuring Social Influence MarketingMeasuring Social Influence Marketing
Measuring Social Influence MarketingJulius Trujillo
 
Wave 4 "power to the people"
Wave 4 "power to the people"Wave 4 "power to the people"
Wave 4 "power to the people"Julius Trujillo
 

Plus de Julius Trujillo (15)

The Razorfish 5: Five Technologies that will change your business
The Razorfish 5: Five Technologies that will change your businessThe Razorfish 5: Five Technologies that will change your business
The Razorfish 5: Five Technologies that will change your business
 
The State of Marketing 2011
The State of Marketing 2011The State of Marketing 2011
The State of Marketing 2011
 
Building your business with Facebook Pages by Facebook
Building your business with Facebook Pages by FacebookBuilding your business with Facebook Pages by Facebook
Building your business with Facebook Pages by Facebook
 
Social media landscape 2011 by CMO
Social media landscape 2011 by CMOSocial media landscape 2011 by CMO
Social media landscape 2011 by CMO
 
Wave5 the socialisation of brands By Universal McCann
Wave5 the socialisation of brands By Universal McCannWave5 the socialisation of brands By Universal McCann
Wave5 the socialisation of brands By Universal McCann
 
A B2B Social Media White Paper By Microsoft Advertising
A B2B Social Media White Paper By Microsoft AdvertisingA B2B Social Media White Paper By Microsoft Advertising
A B2B Social Media White Paper By Microsoft Advertising
 
Social Media and Mobile Internet Use Among Teens And Young Adults
Social Media  and Mobile Internet Use Among Teens And Young AdultsSocial Media  and Mobile Internet Use Among Teens And Young Adults
Social Media and Mobile Internet Use Among Teens And Young Adults
 
Global Social Media Check-Up 2010 by Burson-Marsteller
Global Social Media Check-Up 2010 by Burson-MarstellerGlobal Social Media Check-Up 2010 by Burson-Marsteller
Global Social Media Check-Up 2010 by Burson-Marsteller
 
Two Thousand And Ten Digital Marketing Outlook By Soda
Two Thousand And Ten Digital Marketing Outlook By SodaTwo Thousand And Ten Digital Marketing Outlook By Soda
Two Thousand And Ten Digital Marketing Outlook By Soda
 
10 Ideas For The New Decade By Edelman
10 Ideas For The New Decade By Edelman10 Ideas For The New Decade By Edelman
10 Ideas For The New Decade By Edelman
 
100 Best Global Brands 2009 by Interbrand
100 Best Global Brands 2009 by Interbrand100 Best Global Brands 2009 by Interbrand
100 Best Global Brands 2009 by Interbrand
 
The Brand Value Of Rich Media And Video Ads
The Brand Value Of Rich Media And Video AdsThe Brand Value Of Rich Media And Video Ads
The Brand Value Of Rich Media And Video Ads
 
360i Social Marketing Playbook
360i Social Marketing Playbook360i Social Marketing Playbook
360i Social Marketing Playbook
 
Measuring Social Influence Marketing
Measuring Social Influence MarketingMeasuring Social Influence Marketing
Measuring Social Influence Marketing
 
Wave 4 "power to the people"
Wave 4 "power to the people"Wave 4 "power to the people"
Wave 4 "power to the people"
 

Dernier

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Mobile Web Insights Oct. 2009

  • 1. Mobile Web Insights October 6, 2009 S ince our inaugural report earlier this year, our Mobile Analytics team has been working with a number of operators across North America, Europe and Asia to help One option could be to offer a mobile social networking aggregation service for the top sites like MySpace, Facebook, Myxer and Plenty-of-fish, which could be them dig deeper into their subscriber data and understand accessed from Operator X’s own portal through a single the full impact of unprecedented mobile data usage. log-in. Furthermore, Operator X can build propositions and tariff plans around social networking devices such In this report, we analyze data from a tier-one mobile as the INQ or Samsung Corby. operator, using data traffic, device, subscriber and error reports to consider the implications of social networking, Another option is to capture new revenues through SMS bandit devices and the impending data tsunami on the alerts for specific social network activity events: pokes, operator business. The data sample was taken from a friend requests, status notifications, even the sending five-day period in September, 2009. and receiving of messages. Craigslist attracted the second highest number of Operator Profile impressions over the period. One reason could be that the “Operator X” is a large North American operator offering site’s simple design makes it easy to navigate on handheld mobile communication services to consumers and businesses. devices. The down economy could be a factor as buyers are This operator has a strong consumer proposition, offering a searching for bargains on classified ad sites like Craigslist. wide range of mobile services, devices and data plans. It also Operator X could consider promoting Craigslist as an has mobile email and mobile broadband services targeted on-deck partner. towards small businesses and large enterprises. Child protection issues also need to be considered with Online Communities Continue to Grow these type of sites, as some parents may wish to restrict Operator X’s site-based reports show four of the top ten their children’s access while allowing them full access to domains by page impressions being social networking sites other sites. (fig. 1). These results are confirmed in a recent study from the Internet Advertising Bureau (IAB) that show a one-year Focus on Devices increase of 179% in the number of subscribers accessing As device interfaces improve, subscribers tend to consume social networking sites from their mobile devices, compared richer, more compelling content and services. These changes to a 10% traffic increase on the PC versions of the same sites. in user behavior can have a tremendous impact on the operator network. This trend presents a great opportunity for Operator X to add value to a very popular part of the user experience. Figure 1: Top domains by impressions Figure 2: Data volume by device model
  • 2. A device-based report for Operator X shows smartphone Alternative 2: Using bandwidth/traffic management software, devices such as the Palm D062 and Samsung-SPHM800 enforce fair usage policies for bandit device users who exceed are consuming at least three to four times more data volume their monthly data limits, and encourage them to switch to compared to other, less sophisticated smartphones (Palm high usage plans. D060) and feature phones (Samsung-SPHM540), (fig. 2). Alternative 3: Offer SIM-only plans with attractive bolt-on offers for data bundles to increase the customer Bandit Devices Drive Data Volumes lifetime value of bandit device users and create loyalty Perhaps more interesting is that the report uncovers a in this segment. category of unknown device type classified in the reports as “bandit.” These bandit devices generate between 1.25 and 1.5 Using HTTP Success/Failures to Diagnose Network Health times more traffic than the powerful smartphones and almost Since user experience problems can be attributed to gateway 5.5 times more traffic than feature phones. operational problems, network congestion, limitation of client Deeper research shows that this new category of bandit and server bandwidth and random user browsing behavior, it devices consists of unidentified, unlocked iPhones, USB is important to have the clearest view of your network to spot modems or netbooks from other networks being used on anomalies or trends quickly. Operator X’s network. This raises concerns about the lack As the threat of overtaxed networks grow, Operator X of visibility operators have when it comes to planning and can measure the health of their mobile data network by mitigating the effects of high data volumes consumed by monitoring the number of HTTP success/failure transactions. these devices. Preventative network measures help in maintaining a good The traffic generated by bandit devices not only impacts the user experience and improving customer satisfaction. network in terms of congestion and latency problems, but they also have associated financial implications in terms of increased CAPEX costs due to additional network capacity upgrades in congested areas. Unique Subscribers by Device Another powerful device-based report shows that the bandit device issue is more complicated. Unique Subscribers by Device (fig. 3) reveals that the number of unknown devices being used on the network is almost four times higher than the most popular device (Samsung-SPHM800). Besides separate bandit devices, the high number of unique unknown users might indicate the presence of data- consuming applications which, once downloaded to devices, Figure 3: Unique subscribers by device access the network directly, not via the built-in browser on The time-based report below (fig. 4) shows a low number of the phone. HTTP failures from September 22-26, while the number of These “bandit applications” might be perfectly harmless successful HTTP transactions drops steeply between or they could also indicate virus activity or other risks to September 25-26, probably because of network congestion. the user experience that Operator X could address using an anti-abuse solution. A good traffic management solution paired with mobile analytics would enable Operator X to separate the bandit apps from the bandit devices. Careful monitoring of ports and protocols used by bandit apps allows Operator X to control the usage of these types of apps. Managing the issue of bandit devices is easier. Here are three alternatives: Alternative 1: Offer exclusive content and device bundles with advanced personalization and service discovery features, thereby controlling the user experience and attracting bandit device users to change their devices. Figure 4: HTTP Success/Failures per day
  • 3. Digging Deeper: HTTP Error Codes Alternative 2: Implement a network compression and Figure 5 shows four common errors which occur on Operator caching solution as a preventative measure to reduce data X’s network. While Error 404 and Error 503 remain flat, volume going through the network, and place rich content Errors 403 and 504 spike on September 25. closer to the network edge. This technique also helps defer investment in network capacity. Alternative 3: Invest in additional network capacity to relieve congestion and improve latency. Obviously this alternative is costly and in most cases inevitable, but software solutions are a smart way to alleviate immediate congestion problems and protect future investments in network upgrades. Conclusion Operator X used mobile analytics to monitor data network traffic, track emerging trends, extract actionable insights and realign its content and device portfolios to turn the large numbers of bandit device users into loyal subscribers. Figure 5: HTTP Status Error Codes Operator X also analyzed user behaviors to provide Error 403 could be a website maintenance issue (not additional services and understand how its subscribers Operator X’s problem), or it could indicate authentication are influenced by social media. By offering more targeted issues in Operator X’s infrastructure: a user that cannot services, operators can facilitate new revenue opportunities be identified by the gateway or a distant application that and alternative business models to position themselves as refuses to provide the service. important players in the mobile ecosystem. In this latter case, Operator X has an opportunity to redirect The mobile analytics reports we have examined in this the subscriber back to its own portal or replace the Error 403 report are just a fraction of what Openwave Mobile Analytics page with a more user-friendly message to avoid a negative can offer operators to help them optimize network usage and user experience. confidently predict user behavior patterns to help them prepare for the data tsunami. In the case of Error 504, the gateway request has timed out, possibly due to network congestion, latency or insufficient Stay tuned for another edition of Insights into the Mobile bandwidth. If Operator X notices this trend repeating itself Web featuring real data from real operators across the world. over the next few weeks, then it would need to mitigate network congestion with the following alternatives: Alternative 1: Implement a traffic/bandwidth management solution as a preventative measure to ensure subscriber usage is monitored and controlled through defined traffic management policies. Rigorous policy control can effectively defer investment in network capacity. About Openwave Openwave Systems Inc. (Nasdaq: OPWV) is one of the world’s leading innovators of software applications and infrastructure designed to enable revenue-generating, personalized services, including mobile analytics, content adaptation and a suite of unified messaging solutions. As the communications industry intersects with the Internet, Openwave software enables service providers to converge services, in an effort to increase the value of their networks by accelerating time to market and reducing the cost and complexity associated with new service 2100 Seaport Boulevard deployment. Openwave’s unique product portfolio provides a complete range of mobile internet service management, messaging, and location based solutions. Openwave is a global company Redwood City, California 94063 U.S.A. with a blue chip customer base spanning North America, Latin America, Australia and New Corporate +1 650 480 8000 Zealand, Asia, Africa, Europe, and the Middle East. Openwave is headquartered in Redwood Europe +44 2890 416 200 City, California. For more information please visit www.openwave.com. Asia +81 3 5909 6100 Openwave and the Openwave logo are registered trademarks of Openwave Systems Inc. in http://www.openwave.com various jurisdictions. All other trademarks are the properties of their respective owners. Copyright © 2009 Openwave Systems Inc. All rights reserved. October 2009.