Showing posts sorted by date for query private networks revenue. Sort by relevance Show all posts
Showing posts sorted by date for query private networks revenue. Sort by relevance Show all posts

Monday, April 20, 2026

Debating Amazon Leo Objectives

Amazon’s objectives with Leo are debated. 


Is this a standalone telecom business or a strategic infrastructure layer feeding higher-margin businesses (likely AWS)?


The possible motives are complicated as Amazon often talks like a “margin hunter,”  but often acts like a scale builder that tolerates thin margins for a time. 


The trick is that Amazon usually tries to separate where value is created from where it is captured. 

Amazon repeatedly enters markets characterized by low margin and high margin, so “margin” is not the primary consideration.


The effort to find “moats” or bottlenecks where value is extracted, and sometimes a low-margin business can lead to a high-margin moat. 


Layer

Characteristic

Amazon Behavior

Customer-facing layer

Huge TAM, fragmented, price-sensitive

Compete aggressively, often low margin

Infrastructure / platform layer

High fixed cost, scalable, defensible

Invest heavily, aim for high margin long term

Data / control layer

Feedback loops, optimization

Build moats that others can’t replicate


The point is that Amazon doesn’t mind entering a low-margin market if it helps it own a high-margin layer underneath or adjacent to it.


Also, “high capital investment” can be a feature, not a bug:

  • High CapEx deters competitors

  • Once built, marginal costs drop sharply

  • Scale converts fixed costs into a profit flywheel

  • Infrastructure can support multiple businesses

  • Pricing power eventually comes, once dominance is achieved.


So huge capex commitments are consistent with Amazon’s playbook, if Amazon believes it can control a bottleneck layer.


“Is this a high-margin or low-margin business?” might not be the right question for Amazon leaders, who likely are asking:

  • Can we own a critical layer?

  • Does this scale globally?

  • Does it reinforce our existing flywheels?

  • Can we improve cost structure vs incumbents?

  • Is there a hidden high-margin component?


So the larger picture is often not the immediate or obvious business, but the ability to create leverage elsewhere. Consumer initiatives such as e-commerce; devices or streaming then can be viewed as demand aggregators and ecosystem lock-in creators that drive revenue indirectly (advertising, cross selling, subscriber lock in).


Enterprise infrastructure plays such as AWS or logistics might be better examples of direct, high margin initiatives.


The thing about Leo is where it fits. From one point of view, consumer telecom is a low-margin, highly-competitive business with high regulatory conditions, low innovation and low growth rates. 


So why even consider it?


Amazon probably envisions non-obvious leverage points:

  • Where Amazon captures high-margin compute, not connectivity

  • With different value drivers in consumer and business markets.


Owning a connectivity service could:

  • Reduce internal costs

  • Improve performance (latency, reliability)

  • Be bundled with Prime and devices to

  • Drive usage of AWS, the advertising platform and e-commerce

  • Support IoT connectivity (devices, logistics, smart home). 


Framed that way, Leo might be viewed as a platform layer supporting:

  • Edge cloud

  • AWS (compute plus connectivity)

  • Telcos as customers

  • Prime average revenue per user or account

  • Customer retention and acquisition


To be sure, execution will matter. But, in theory, Leo is not directly about high margin. It is about control of what is likely to be a low-margin feature of a higher-margin ecosystem. 


Amazon’s explicit framing is straightforward:

  • Create a global broadband access business

  • Serving “tens of millions of customers” globally

  • in “unserved and underserved” markets

  • Offers private connectivity directly into AWS

  • for enterprise, government, and telecom customers.


So AWS integration, enterprise and government use cases and private networks might be key, not “consumer telecom.”


Leo then is a connectivity extension of AWS. 


But there are clear risks and some skeptics. 


Optimistically, Leo extends AWS to the edge of the network. 


On the other hand, it is a near-term drag on earnings, in a business with tough economics and financial returns that could take some time to develop.


So it might matter hugely whether Leo can generate AWS pull-through; enterprise demand and other ecosystem upsides. 


Also, how long this takes could matter. 


Layer

Role

Margin Potential

Consumer broadband (Leo ISP)

Distribution / scale

Low

Enterprise connectivity

Premium services

Medium

AWS integration layer

Data + compute + control

High

Ecosystem effects (Prime, commerce, ads)

Indirect monetization

Very high


Sure, it’s risky. But some will point to past Amazon initiatives based on entry into low-margin businesses that provided moats:

  • Retail → low margin → enabled AWS scale

  • Devices → low margin → enabled ecosystem lock-in

  • Logistics → low margin → enabled marketplace dominance.


Leo arguably fits the pattern, optimists will argue. It’s about high-margin AWS, not low-margin telecom. Skeptics will worry about the execution risk. 


Monday, April 13, 2026

Will Claude Mythos Preview Help or Harm Security Suppliers?

It now seems almost routine that some new language model emerges to further disrupt some part of the computing industry. First it was chips, processors and memory. Then it was enterprise software. Now it seems to have extended to edge networks. 


The impact on security suppliers is less clear.


Claude Mythos Preview is Anthropic’s most capable frontier AI model to date, announced April 7, 2026), and seems poised to affect security software suppliers, although the direction and magnitude seem unclear. 


Many climbed on the day of the announcement, then retreated afterwards. 


Company

Pre-Announce Close (Apr 6)

Announce Day Close (Apr 7)

Latest Close (Apr 10)

% Change Announce Day (Apr 6 → 7)

% Change Since Announce (Apr 6 → 10)

CrowdStrike

$398.61

$423.23

$379.02

+6.2%

-4.9%

Palo Alto Networks

$161.95

$169.87

$155.73

+5.0%

-3.8%

Cisco

$80.44

$80.68

$82.22

+0.3%

+2.2%

Fortinet

$82.29

$83.72

$76.70

+1.7%

-6.8%

Zscaler

$139.52

$142.09

$118.05

+1.8%

-15.4%

SentinelOne

$13.51

$13.38

$11.94

-1.0%

-11.6%

Cyber Security ETF

$77.41

$78.55

$71.17

+1.5%

-8.1%


Claude Mythos Preview is a general-purpose large language model that shows a major leap in capabilities over predecessors like Claude Opus 4.6, particularly in software engineering, reasoning, agentic tasks, and cybersecurity.


In internal and partner testing, the model autonomously:


Implication

Description

Why It Matters (Rationale)

43e

Defensive Product Enhancement

Use Mythos-level AI for autonomous vuln scanning, exploit chaining detection, and code hardening in EDR, SIEM, and cloud security tools.

Model finds zero-days and generates PoCs far faster than humans or legacy scanners.

New AI-powered “Mythos-class” scanning modules; faster patch recommendations; competitive edge for partners with early access.

Offensive Threat Amplification

Future public/similar models enable low-skill actors to launch advanced, autonomous attacks (e.g., custom zero-days overnight).

Drops the expertise and time required for exploits dramatically.

Must build stronger behavioral AI detection, sandboxing, and exploit-prevention layers; shorter detection windows expected.

Partnership & Access Advantage

Launch partners (CrowdStrike, Palo Alto, Cisco, etc.) get exclusive early access and collaboration.

Direct integration into security platforms and threat-intel sharing.

Accelerated R&D; co-developed defensive tools; potential revenue from AI-augmented services. Non-partners may lag.

Open-Source & Supply-Chain Security

Providers can scan and help patch foundational software (Linux kernel, browsers, FFmpeg, etc.) via Glasswing.

Thousands of previously unknown critical flaws in core dependencies.

Contribute to/fund open-source programs; integrate supply-chain risk scoring; position as “AI defenders of the internet.”

Market & Regulatory Pressure

Increased demand for AI-native security solutions; possible new compliance rules around AI-assisted vuln disclosure.

Governments and enterprises will require defenses against AI-powered threats.

Invest in AI talent/infrastructure; lobby for standards; prepare for audits on AI usage in security products.

Cost & Resource Implications

High token pricing + need for massive compute for agentic scanning.

Frontier models are expensive to run at scale.

Budget for API credits; optimize agentic workflows; explore on-prem or hybrid deployment once safeguards improve.

Ethical/Responsibility Shift

Providers become active participants in preemptive global hardening rather than just reactive responders.

Anthropic’s explicit goal: “put these capabilities to work for defensive purposes” before they proliferate.

Public reporting on patched vulns (90-day Glasswing updates); transparency on AI usage; align with responsible AI scaling.

Long-Term Industry Equilibrium

AI will eventually make software more secure overall (model-generated hardened code, automated patching).

Transitional risk is high, but net positive expected.

Pivot product roadmaps toward AI-augmented prevention and autonomous response; prepare for reduced reliance on signature-based detection.


It is available only in a tightly gated private preview via Project Glasswing, a defensive cybersecurity consortium. 


Launch partners include Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, the Linux Foundation, Microsoft, NVIDIA, Palo Alto Networks, and more than 40 additional organizations. 


For security software providers (antivirus/EDR vendors, firewall/endpoint firms, cloud security platforms, etc.), Claude Mythos Preview raises both the defensive opportunity and the offensive threat level.


Why it matters:

  • Models can now autonomously find and exploit subtle, long-hidden vulnerabilities (some 16–27 years old) that survived millions of automated tests and human expert review 

  • Defenders benefit by using Mythos Preview to scan their own products, customer environments, and critical open-source dependencies at superhuman speed and scale.

  • Long-term equilibrium shifts are possible: (harder code, automated patching, faster incident response), but also increased attack volume and sophistication.


At least for the moment, investors seem unclear whether opportunity or risk is greater for incumbent suppliers of security products.


Using AI is Not Always "Cheaper" than Using Humans

Although many argue that using artificial intelligence can be a substitute for human workers, it also can be argued that using AI could be m...