Monday, March 10, 2008

Traffic Shaping Enhances User Welfare


To protect all users of shared access resources from service degradation, it makes sense to charge a congestion premium or use traffic management techniques, say researchers at the Phoenix Center. When congestion-causing applications degrade the experience of other users, the most efficient traffic management actions would be targeted at applications that cause congestion externalities and not upon all applications generally, say George S. Ford, PhD, Thomas M. Koutsky, Esq.and Lawrence J. Spiwak, Esq., Phoenix Center analysts.

Ironically, service providers tend to do too little to reduce the harmful effects of negative externalities caused by network congestion, they say. So those who argue that the Federal Communications Commission needs to impose prohibitions against network management practices because broadband providers will always be “too aggressive” in clamping down on uses of their network have it precisely backward, the researchers argue.

"It is socially desirable to charge a congestion premium when congestion-causing applications are used on a broadband network," Ford, Koutsky and Spiwak say. That is especially true when the congestion charge targets a particular congestion-causing
application, not blanket "price-per-bit" rules, they argue.

Indeed, if such charges are not targeted, then the price premiums may not achieve their desired purpose, Phoenix Center argues.

The objective of such charges is to attenuate congestion by requiring users of bandwidth-greedy applications to consider more fully the
congestion costs imposed on others.

"The fact that a broadband service provider operator may engage in application-specific traffic management techniques should not necessarily be viewed by a policymaker as evidence of illicit anticompetitive intent, the researchers say.

In fact, congestion is more likely to occur in shared media networks, such as wireless broadband networks, where all users share the common pool of spectrum capacity.

The complexity of this issue indicates that specific, prescriptive rules that ban entire categories of traffic management techniques across all network architectures and topologies can result in sub-optimal outcomes, they say.

"Our focus is upon the presence of congestion externalities: that is, the use of applications by some users that reduce the value of broadband service to other users on the broadband network, without compensation, by causing delays or other service quality problems," the researchers say.

"In the presence of a congestion externality, network management—including, but not limited to, the differential treatment of particular applications—is welfare enhancing," Ford, Koutsky and Spiwak say.

Sunday, March 9, 2008

Apple Won't Block VoIP Apps Using Wi-Fi


Mobile Content Habit Grows

Mobile phones for lots more than just talking, especially by Millenials, according to a recent study by the Deloitte Development-Harrison Group.

Nearly 90 percent of 13-to-24-year-old Internet users surveyed said they sent text messages frequently or occasionally.

Slightly more respondents overall said they used their handsets as cameras than said they used them for texting.

The intensity of usage of just about any data-oriented application drops in older demographics, as you might expect.

Ubiquitous Wireless Broadband: New Possibilities

As new WiMAX and 700-MHz broadband networks are built, two different sorts of new user behaviors will emerge. The abiliy users have to access Web-based data and applications anywhere, at any time, over wired and wireless networks, is going to allow business users to rely on network-based applications in a way unthinkable at present.

“Cloud computing” or "network computing" will move applications and data storage away from the desktop or laptop to remote servers accessed using high-speed networks. That's going to change enterprise data center strategies in profound ways.

It will make possible lighter, more portable access devices on the PC side, and might also drive the emergence of even-more-powerful portable devices on the handheld side, as business users start to rely on network-based resources where they now rely on their own hard disc drives.

The other potential development is that the range of consumer behaviors related to wireless broadband data might emerge.

"Our recent research shows that 62 percent of American adults have either accessed the Internet wirelessly or used non-voice data applications, such as texting, emailing, taking a picture, or recording video, with a handheld," says John B. Horrigan, Pew Internet & American Life Project associate director.

On the average day, 42 percent of those with cell phones or other wireless-enabled handhelds use the devices for at least one non-voice data application.

Users in this emerging environment will fall ino at least two different use profiles, Horrigan argues. Mobile business use might start to resemble desktop use. But consumer users might embrace digital content to play games. Today, some think mobile blogging or social networking might emerge as widespread new behaviors.

Saturday, March 8, 2008

Apple, RM Battle Shapes Up



Apple took 28 percent share of the fast growing U.S. converged device (smart phone) market in the fourth quarter of 2007, behind Research in Motion’s 41percent, but a long way ahead of third placed Palm at nine percent, say Canalys researchers.

Apple also finished ahead of all Windows Mobile device vendors combined, whose share was 21 percent in the quarter.

Globally, converged device shipments rose 60 percent to hit 115 million in 2007. U.S. sales doubled.

Nokia remained the global market leader, shipping 60.5 million smart phones, while RIM shipments grew 112 percent to 12.2 million.
Globally, Symbian operating system devices had 67 percent share, followed by Microsoft on 13 percent and RIM with 10 percent.

Apple claims that nearly 70 percent of all mobile Internet traffic is generated by iPhone users. Executives at Google, meanwhile, have confirmed the basis thesis: iPhone users surf the Web way beyond anything seen up to this point.

On the other hand, RIM points out that nearly two thirds of its 12 million BlackBerry subscribers in December 2007 were government or corporate customers.

The observation is that as the smart phone market continues to grow rapidly, the dynamics of the U.S. market--as distinct from the global markets--are shaping up, in part, as Apple going "up market" to enterprises and RIM going "down market" to consumers. That's not to dismiss Microsoft-powered or Nokia devices, but simply to illustrate a dynamic.

We have a market likely to take new shape as devices and users expand beyond the original base of "mobile email" addicts. The iPhone has shown there is a new class of user who uses mobile email but also surfs the Web and uses the mobile Internet in ways we haven't seen before. That's going to get designers moving in different directions as the various segments start to emerge. For some users the current iPhone or BlackBerry interfaces still will work. For others, something else might emerge.

Personally, I like the ability to swap SIMs between devices, which iPhone doesn't want me to do. I like to be able to change my own batteries, which iPhone doesn't want me to do. Small things, of course, but real barriers to me getting rid of my BlackBerry. Other choices will have to be made by music or video afficianados.

Friday, March 7, 2008

DirecTV Awaits Satellite Launch

Satellite launches always are dangerous things. But, should the DirecTV 11 broadcast satellite be launched successfully on March 12, DirecTV will be able to provide 150 national high-definition channels and will be capable of supporting spot beams carrying 1,500 local high-definition channels, typically useful for beaming retransmitted local broadcast station signals back into the local markets.

In February 2007 a Zenit-3SL rocket on the Sea Launch platform, the same one DirecTV is using, exploded on the platform. It happens from time to time.

The odds of a Sea Launch satellite launch will fail are about one in 8.5. Of roughly 25 attempts to date, the company has experienced a failure rate of 12 percent. That's no particular slam on Sea Launch. Launch failures have been part of the industry's reality since the beginning.

Thursday, March 6, 2008

Enterprise Users Get their iPhone


Starting in June, Apple iPhones will be able to receive push email, calendar and contact information from Microsoft Corp.'s Exchange server. Apple has licensed Exchange ActiveSync from Microsoft and is building it right into the iPhone, so that iPhone will connect out-of-the-box to Microsoft Exchange Servers 2003 and 2007 for secure over-the-air push email, contacts, calendars and global address lists.

The iPhone 2.0 software provides a configuration utility that allows IT administrators to easily and quickly set up many iPhones, including password policies, VPN setting, installing certificates, email server settings and more.

Once the configuration is defined it can be easily and securely delivered via web link or email to the user. To install, all the user has to do is authenticate with a user ID or password, download the configuration and tap install. Once installed, the user will have access to all their corporate IT services.

Built-in Exchange ActiveSync support also enables security features such as remote wipe, password policies and auto-discovery.

The iPhone 2.0 software supports Cisco IPsec VPN to ensure the highest level of IP-based encryption, as well as the ability to authenticate using digital certificates or password-based, multi-factor authentication.

The addition of WPA2 Enterprise with 802.1x authentication enables enterprise customers to deploy iPhone and iPod touch with the latest standards for protection of Wi-Fi networks.

Those are features most enterprise information technology managers require before a device is approved for widespread use, and represent a huge potential opportunity for Apple to penetrate enterprise accounts.

Some even think the iPhone is about to become an envied thing: a "platform."

“Think about it," says venture capitalist John Doerr, who has launched a $100 million fund to back iPhone-related application companies. "In your pocket, you have something that's broadband and connected all the time. It's personal. It knows who you are and where you are. That's a big deal. A really big deal. It's bigger than the personal computer."

Study Suggests AI Has Little Correlation With Long-Term Outcomes

A study by economists Iñaki Aldasoro , Sebastian Doerr , Leonardo Gambacorta and Daniel Rees suggests that an industry's direct expos...