Commentary

Bringing the ‘social’ out of the operator walled gardens

A ‘walled garden’ is the term aptly applied to the last decade of mobile operator services. And Facebook is the generic name aptly applied to the social network revolution of our times.

Wikipedia defines ‘walled gardens’ as referring “to a carrier’s or service provider’s control over applications, content, and media on platforms … and restriction of convenient access to non-approved applications or content”. This has been the common sense approach to operator strategies; build high walls to protect your revenues – which by now we know is becoming irrelevant. Mobile operators are facing market saturation, declining ARPU, higher subscriber acquisition costs (see iPhone), fierce regional competition and viable threats of being replaced by the over-the-top players.

In 2009 alone, global operator ARPU fell by 7.3% year-on-year and is forecasted to further decline around 10% y-o-y according to Strategy Analytics. How come operators – having a ‘social’ network at their very core – have been steadily declining, whereas Facebook has risen to a 600 million user, $35B valuation business in just 7 years? Let’s take a step back.

2010 will probably be known as the year where mobile service innovation has moved squarely to the software domain. Think about the 100,000s of applications against the 10s of operator services launched in the last 2 years. Continue reading …

Related Posts

The Open Source trials: hanging in the legal balance of copyright and copyleft For those meddling in open source software affairs, compliance with licenses is a very hot topic. In the last 2 years we have witnessed the licensing ...
Protect the API Keys to your Cloud Kingdom API keys to become first class citizens of security policies, just like SSL keys Much lip service is paid to protecting information in the Cloud, b...
Neuroprivilogy: The New Frontier of Cyber Crime The first step of this discussion is defining a fancy term to help educate and describe this new phenomenon: Neuroprivilogy. As the name suggests Ne...
Steer clear of Android Market and its DRM Google recently made headlines after they identified some malware being distributed through the Android Market. Not only did they stop distributing t...
FTC’s New Privacy Report Endorses “Do Not Track” Mechanism to Empower On... This morning, the Federal Trade Commission released its long-anticipated privacy report. The report is the final result of a series of FTC privacy ro...
Amazon and WikiLeaks – Online Speech is Only as Strong as the Weakest Intermediary The First Amendment to the Constitution guarantees freedom of expression against government encroachment - but that doesn't help if the censorship do...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Pingback: Tweets that mention Bringing the ‘social’ out of the operator walled gardens -- Topsy.com

Leave a Comment

Your email address will not be published. Required fields are marked *

*