Bringing the ‘social’ out of the operator walled gardens

A ‘walled garden’ is the term aptly applied to the last decade of mobile operator services. And Facebook is the generic name aptly applied to the social network revolution of our times.

Wikipedia defines ‘walled gardens’ as referring “to a carrier’s or service provider’s control over applications, content, and media on platforms … and restriction of convenient access to non-approved applications or content”. This has been the common sense approach to operator strategies; build high walls to protect your revenues – which by now we know is becoming irrelevant. Mobile operators are facing market saturation, declining ARPU, higher subscriber acquisition costs (see iPhone), fierce regional competition and viable threats of being replaced by the over-the-top players.

In 2009 alone, global operator ARPU fell by 7.3% year-on-year and is forecasted to further decline around 10% y-o-y according to Strategy Analytics. How come operators – having a ‘social’ network at their very core – have been steadily declining, whereas Facebook has risen to a 600 million user, $35B valuation business in just 7 years? Let’s take a step back.

2010 will probably be known as the year where mobile service innovation has moved squarely to the software domain. Think about the 100,000s of applications against the 10s of operator services launched in the last 2 years. Continue reading …

Related Posts

FSF position on GPLv2 & current App Store terms This was written by Brett smith on the VLC development mailing list. Brett is the Licensing Compliance Engineer with the Free Software Foundation: Sal...
He can steal your smart phone’s and tablet’s encryption keys If you think that the encryption keys that your smart phone or tablet computer uses to protect data you want to keep others from accessing is secure, ...
Open Source community building: a guide to getting it right Community development in open source software is not just for geeks in sandals nor for niche Linux companies any more. It’s mainstream and it’s here...
The Open Source trials: hanging in the legal balance of copyright and copyleft For those meddling in open source software affairs, compliance with licenses is a very hot topic. In the last 2 years we have witnessed the licensing ...
Does disk encryption really protect your data from unauthorized access? Disk encryption is one of several physical security measures that could be used to protect data on your computer from unauthorized physical access. An...
Wikileaks: Lessons For Consumer Privacy The website Wikileaks recently published hundreds of thousands of confidential State Department cables. These communications apparently reveal the de...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Pingback: Tweets that mention Bringing the ‘social’ out of the operator walled gardens -- Topsy.com

Leave a Comment

Your email address will not be published. Required fields are marked *

*