Monday, March 10, 2008
at&t to Raise Text Messaging Rates
For most of us, that means the buckets make even more sense. For light users, the move just shows how data services are becoming the revenue model for mobile services, with voice gradually declining in importance.
WiMAX Segmentation
And there is at least some reason to believe an opportunity exists, though pricing might be an issue.
Analysts at Compete Inc. recently asked consumers shopping online for consumer electronics devices about their interest in connecting devices to the Internet.
More than 50 percent of laptop and GPS shoppers were very interested in devices that enable enhanced connectivity using an open access network.
A follow-up question revealed that consumers are also willing to pay for this connectivity, with about 25 percent willing to pay over $50 at the time of purchase to include this feature, Compete suggests.
Recurring costs are the bigger issue, though. It isn't clear how many users will be happy to pay recurring connection fees if the option to use their in-home Wi-Fi networks is available for no incremental cost. Up to this point, no matter what they might say as part of a poll, few camera users have proven willing to spend money for network services.
Sprint Mogul to Use Rev A Broadband
Sprint is releasing a software update for the Mogul phone, made by HTC Corp. of Taiwan, that will enable the phone to connect at Rev. A speeds.
Downloads speeds should be 600 kilobits per second to 1,400 kbps, up from a range of 400 kbps to 700 kbps with Rev. 0.
It will be capable of uploads of 350 to 500 kbps, up from 50 kbps to 70 kbps.
Traffic Shaping Enhances User Welfare
To protect all users of shared access resources from service degradation, it makes sense to charge a congestion premium or use traffic management techniques, say researchers at the Phoenix Center. When congestion-causing applications degrade the experience of other users, the most efficient traffic management actions would be targeted at applications that cause congestion externalities and not upon all applications generally, say George S. Ford, PhD, Thomas M. Koutsky, Esq.and Lawrence J. Spiwak, Esq., Phoenix Center analysts.
Ironically, service providers tend to do too little to reduce the harmful effects of negative externalities caused by network congestion, they say. So those who argue that the Federal Communications Commission needs to impose prohibitions against network management practices because broadband providers will always be “too aggressive” in clamping down on uses of their network have it precisely backward, the researchers argue.
"It is socially desirable to charge a congestion premium when congestion-causing applications are used on a broadband network," Ford, Koutsky and Spiwak say. That is especially true when the congestion charge targets a particular congestion-causing
application, not blanket "price-per-bit" rules, they argue.
Indeed, if such charges are not targeted, then the price premiums may not achieve their desired purpose, Phoenix Center argues.
The objective of such charges is to attenuate congestion by requiring users of bandwidth-greedy applications to consider more fully the
congestion costs imposed on others.
"The fact that a broadband service provider operator may engage in application-specific traffic management techniques should not necessarily be viewed by a policymaker as evidence of illicit anticompetitive intent, the researchers say.
In fact, congestion is more likely to occur in shared media networks, such as wireless broadband networks, where all users share the common pool of spectrum capacity.
The complexity of this issue indicates that specific, prescriptive rules that ban entire categories of traffic management techniques across all network architectures and topologies can result in sub-optimal outcomes, they say.
"Our focus is upon the presence of congestion externalities: that is, the use of applications by some users that reduce the value of broadband service to other users on the broadband network, without compensation, by causing delays or other service quality problems," the researchers say.
"In the presence of a congestion externality, network management—including, but not limited to, the differential treatment of particular applications—is welfare enhancing," Ford, Koutsky and Spiwak say.
Sunday, March 9, 2008
Apple Won't Block VoIP Apps Using Wi-Fi
CEO Steve Jobs says Apple will not block third-party development of VOIP applications for the iPhone and iPod Touch, as long as the applications run over Wi-Fi. That's an obviously politically astute move given Apple's relationship with mobile providers who aren't keen on the idea.
Nevertheless, the idea might allow everybody to get a bit more experience with "dual mode" service, using a widely-deployed handset, without a lot of expensive bets on particular devices, interfaces or marketing.
Mobile Content Habit Grows
Nearly 90 percent of 13-to-24-year-old Internet users surveyed said they sent text messages frequently or occasionally.
Slightly more respondents overall said they used their handsets as cameras than said they used them for texting.
The intensity of usage of just about any data-oriented application drops in older demographics, as you might expect.Ubiquitous Wireless Broadband: New Possibilities
“Cloud computing” or "network computing" will move applications and data storage away from the desktop or laptop to remote servers accessed using high-speed networks. That's going to change enterprise data center strategies in profound ways.
It will make possible lighter, more portable access devices on the PC side, and might also drive the emergence of even-more-powerful portable devices on the handheld side, as business users start to rely on network-based resources where they now rely on their own hard disc drives.
The other potential development is that the range of consumer behaviors related to wireless broadband data might emerge.
"Our recent research shows that 62 percent of American adults have either accessed the Internet wirelessly or used non-voice data applications, such as texting, emailing, taking a picture, or recording video, with a handheld," says John B. Horrigan, Pew Internet & American Life Project associate director.
On the average day, 42 percent of those with cell phones or other wireless-enabled handhelds use the devices for at least one non-voice data application.
Users in this emerging environment will fall ino at least two different use profiles, Horrigan argues. Mobile business use might start to resemble desktop use. But consumer users might embrace digital content to play games. Today, some think mobile blogging or social networking might emerge as widespread new behaviors.
Directv-Dish Merger Fails
Directv’’s termination of its deal to merge with EchoStar, apparently because EchoStar bondholders did not approve, means EchoStar continue...
-
We have all repeatedly seen comparisons of equity value of hyperscale app providers compared to the value of connectivity providers, which s...
-
It really is surprising how often a Pareto distribution--the “80/20 rule--appears in business life, or in life, generally. Basically, the...
-
One recurring issue with forecasts of multi-access edge computing is that it is easier to make predictions about cost than revenue and infra...