As I described in my previous blog How the Mobile Industry Will Make Money in the Future, the history of the mobile industry has involved huge and successful waves of revenue growth. Lucrative revenues from the first wave of voice and the second messaging wave have crested and are now in decline. Mobile data access has taken up much of the shortfall, comprising well over one-half of the total revenue of most MNOs. However, the crest of this third growth wave is visible on the horizon as critical industry disruptors begin to shape a new mobile world.
The question for mobile operators everywhere is, what is this fourth, or next, wave of mobile growth?
Unfortunately there is no obvious tsunami-size fourth monetization wave cresting on the horizon for mobile operators. Unlike the preceding three waves, there will be no gold rush created by a single killer app, such as voice, messaging, or data. A lot of gold still remains in the mobile business, but it is going to come from multiple sources and require some sophisticated mining techniques.
Cisco believes that there are four key strategic thrusts, or monetization areas, for operators to create new value from their mobile business.
1. Cost Optimization Read More »
Tags: Cisco, mobile, mobility, monetization, research, Service Provider
The mobile market continues to evolve at a blindingly fast pace. It seems as though new faster, sleeker, and more powerful mobile devices are launched every day. And new categories of mobile devices are created almost overnight. The number of applications available to run on these revolutionary new mobile devices is staggering, numbering in the millions. The insatiable demand for mobile devices and new bandwidth-hungry applications is generating enormous amounts of mobile data. The Cisco Visual Networking Index™ (Cisco VNI™) predicts that these trends will cause global mobile data traffic to increase 11-fold from 2013 to 2018, surpassing 15 exabytes per month by 2018.
In spite of this phenomenal growth and insatiable consumer demand, many MNOs are struggling to profit from this mobile gold rush. Mobile operators are watching as their average revenue per customer (ARPU) flattens or declines. Despite increasing customer appetite for mobile data, minutes of use in their cash-cow voice business are falling off sharply, and usage of text messaging is peaking. In fact, Ovum predicts that 2018 will mark the first year of revenue contraction in the history of the global mobile market. Following four years of less than 1 percent growth between 2012 and 2017, revenues will decline by 1 percent in 2018, ending the year $7.8 billion lower than in 2017.
This mobile paradox – huge growth and customer demand, yet Read More »
Tags: Cisco, mobile, monetization, research, Service Provider
This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda.
Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be laborious and time consuming with relational databases as multiple tables are joined, queried, and the results inevitably take too long to return. Enter the graph database, a fundamentally improved database technology for specific threat analysis functions. Representing information as a graph allows the discovery of associations and connection that are otherwise not immediately apparent.
Within basic security analysis, we represent domains, IP addresses, and DNS information as nodes, and represent the relationships between them as edges connecting the nodes. In the following example, domains A and B are connected through a shared name server and MX record despite being hosted on different servers. Domain C is linked to domain B through a shared host, but has no direct association with domain A.
This ability to quickly identify domain-host associations brings attention to further network assets that may have been compromised, or assets that will be used in future attacks.
Read More »
Tags: analysis, Big Data, correlation, D3, Domain, edge, fast, Graph, Gremlin, IE, Intelligence, internet explorer, IP address, name server, node, relationships, research, threat, Titan, TRAC, vertex, visual, zero-day
Technische Universität Darmstadt, usually known as TU Darmstadt is a research university based in Germany. It was founded in 1877 and over the last 137 years has grown to be among the largest and most prestigious public universities in Germany serving over 25,000 students per year. It is the alma-mater to many world-wide leaders from Nobel prize winners, a CEO of a fortune 500 company, a president of a country and multiple World Robocup champions.
No wonder, they have a reference from Albert Einstein!
In 2009 TU Darmstadt embraced BYOD with the 5508 Series Controller managing the 1140 802.11n Access Points. Recently we talked to Thomas Vogel, the Head of Network Group and Andreas Liebe, the Network Services Manager who have over 15 years of experience managing WLAN environments. In this blog, we will describe some of the details of WLAN deployments using the 3850 Series Switch and the 5760 Series Wireless LAN Controller to address the new requirements in the school environment. Read More »
Tags: 3850, 5760, 802.11, 802.11ac, 802.11n, access, access point, account, AP, App, application, authorized, AVC, bring your own device, buildings, byod, Cisco, client, controller, Converged Access, darmstadt, deployment, devices, employee, encrypted traffic, environment, frankfurt, Germany, infrastructure, IPv6, LAN, management, network, policy, prime, Prime Infrastructure, requirements, research, school, security, services, standard, switch, technische, technology, trend, TU, TUD, unified access, Universität, university, user, visualize, wi-fi, wifi, wired, wireless, wlan
This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering.
Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners are adding Silverlight to their update releases, and since April 23rd we have observed substantial traffic (often from Malvertising) being driven to Angler instances partially using Silverlight exploits. In fact in this particular Angler campaign, the attack is more specifically targeted at Flash and Silverlight vulnerabilities and though Java is available and an included reference in the original attack landing pages, it’s never triggered.
HTTP requests for a specific Angler Exploit Kit campaign
Angler exploit content types delivered to victims, application/x-gzip (Java) is notably absent
Read More »