ADC Administration Guide, Staros Release 21.10

Total Page:16

File Type:pdf, Size:1020Kb

ADC Administration Guide, Staros Release 21.10 ADC Administration Guide, StarOS Release 21.10 First Published: 2018-11-02 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2018 Cisco Systems, Inc. All rights reserved. CONTENTS PREFACE About this Guide vii Conventions Used vii Supported Documents and Resources viii Related Common Documentation viii Related Product Documentation viii Obtaining Documentation ix Contacting Customer Support ix CHAPTER 1 Application Detection and Control Overview 1 ADC Overview 1 Qualified Platforms 2 License Requirements 2 Dynamic Software Upgrade 2 Overview 2 ADC Protocol Group Detection 3 Behavioral Traffic 4 SNI Detection 4 SSL Renegotiation Tracking 4 Analyzer Interworking 5 Traffic Sub-classification 5 ADC Support for TRM/FP 5 ADC Support for FAPA 5 ADC Support over Gx 7 Limitations 9 Dynamic Advertisement Server Correlation 9 Bulk Statistics Support 10 ADC Administration Guide, StarOS Release 21.10 iii Contents How ADC Works 11 Limitations 11 CHAPTER 2 Application Detection and Control Configuration 13 Configuring Dynamic Software Upgrade 13 How to perform Dynamic Software Upgrade 13 Configuring System for ADC 15 Initial Configuration 16 Enabling Enhanced Charging 16 Modifying the Local Context 16 ADC Configuration 17 Creating the Active Charging Service 17 Configuring ADC Rules 18 Configuring P2P Protocol Groups 19 Configuring Behavioral Detection 20 Configuring P2P Advertisement server 21 Configuring SSL Renegotiation 21 Configuring Analyzers 22 Configuring the Charging Action 22 Configuring the Rulebase 23 Setting EDR Formats 24 Configuring IP Protocol and Server port mapping 24 Configuring EDR for P2P Events 25 Gathering ADC Statistics 26 Supported Bulk Statistics 27 P2P Reports 27 CHAPTER 3 App-based Tethering Detection 29 Feature Information 29 Feature Description 30 How It Works 30 Licensing 30 Configuring App-based Tethering Detection 30 Enabling App-based Tethering Detection at Rulebase Level 30 ADC Administration Guide, StarOS Release 21.10 iv Contents Enabling App-based Tethering Detection at Ruledef Level 31 Enabling App-based Tethering Detection at Rule-variable 31 Monitoring and Troubleshooting the App-based Tethering Detection 32 Show Commands and Outputs 32 CHAPTER 4 Peer-to-Peer Protocol and Application Detection Support 35 Supported Protocols and Applications 35 New in this Release 35 All Supported Protocols and Applications 37 Port-based Protocols 101 IP Protocols 129 CHAPTER 5 Reporting SSL Parameters in EDR 135 Feature Summary and Revision History 135 Feature Description 136 How It Works 136 EDR 136 Configuring SSL Parameters in EDR 138 Enabling SSL Parameters 138 Monitoring and Troubleshooting 138 Show Commands and/or Outputs 138 CHAPTER 6 Support for SNI Detection 141 Feature Description 141 QUIC SNI Detection 141 Relationships to Other Features 142 Configuring SNI Detection 143 Configuring SNI in Ruledef 143 Configuring SNI rule variable 144 Enabling HTTPS Analyzer Interworking 145 Verifying the SNI Configuration 145 Monitoring and Troubleshooting the SNI Detection 145 SNI Detection Show Command(s) and/or Outputs 145 show active-charging analyzer statistics name cdp 145 ADC Administration Guide, StarOS Release 21.10 v Contents show active-charging flows type cdp 146 Bulk Statistics 146 ADC Administration Guide, StarOS Release 21.10 vi About this Guide This preface describes the ADC Administration Guide, how it is organized and its document conventions. Application Detection and Control (ADC) is a StarOS™ in-line service application that runs on Cisco® ASR 5500 platform. The ADC in-line service makes use of innovative and highly accurate protocol behavioral detection techniques to reliably detect protocols and applications in the network. ADC is mainly used to detect Peer-to-Peer protocols by analyzing traffic, and can also detect network traffic created by audio and video clients. • Conventions Used, on page vii • Supported Documents and Resources, on page viii • Contacting Customer Support , on page ix Conventions Used The following tables describe the conventions used throughout this documentation. Notice Type Description Information Note Provides information about important features or instructions. Caution Alerts you of potential damage to a program, device, or system. Warning Alerts you of potential personal injury or fatality. May also alert you of potential electrical hazards. Typeface Conventions Description Text represented as a screen display This typeface represents displays that appear on your terminal screen, for example: Login: ADC Administration Guide, StarOS Release 21.10 vii About this Guide Supported Documents and Resources Typeface Conventions Description Text represented as commands This typeface represents commands that you enter, for example: show ip access-list This document always gives the full form of a command in lowercase letters. Commands are not case sensitive. Text represented as a command variable This typeface represents a variable that is part of a command, for example: show card slot_number slot_number is a variable representing the desired chassis slot number. Text represented as menu or sub-menu names This typeface represents menus and sub-menus that you access within a software application, for example: Click the File menu, then click New Supported Documents and Resources Related Common Documentation The following common documents are available: • AAA Interface Administration and Reference • Command Line Interface Reference • GTPP Interface Administration and Reference • Installation Guide (platform dependant) • Release Change Reference • SNMP MIB Reference • Statistics and Counters Reference • System Administration Guide (platform dependant) • Thresholding Configuration Guide Related Product Documentation The most up-to-date information for this product is available in the product Release Notes provided with each product release. The following product documents are also available and work in conjunction with ADC: • ECS Administration Guide • GGSN Administration Guide • PDSN Administration Guide • P-GW Administration Guide ADC Administration Guide, StarOS Release 21.10 viii About this Guide Obtaining Documentation Obtaining Documentation The most current Cisco documentation is available on the following website: http://www.cisco.com/cisco/web/psa/default.html Use the following path selections to access the ADC documentation: Products > Wireless > Mobile Internet > In-Line Services > Cisco Peer-to-Peer Contacting Customer Support Use the information in this section to contact customer support. Refer to the support area of http://www.cisco.com for up-to-date product documentation or to submit a service request. A valid username and password are required to access this site. Please contact your Cisco sales or service representative for additional information. ADC Administration Guide, StarOS Release 21.10 ix About this Guide Contacting Customer Support ADC Administration Guide, StarOS Release 21.10 x CHAPTER 1 Application Detection and Control Overview
Recommended publications
  • Open 1-Matthewdering-Thesis.Pdf
    The Pennsylvania State University The Graduate School ANDROID MARKET: LARGE SCALE RECONSTRUCTION AND ANALYSIS A Thesis in Computer Science and Engineering by Matthew Dering c 2014 Matthew Dering Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science May 2014 The thesis of Matthew Dering was reviewed and approved∗ by the following: Patrick McDaniel Professor of Computer Science and Engineering Thesis Advisor Sencun Zhu Associate Professor of Computer Science and Engineering Raj Acharya Professor of Computer Science and Engineering Department Chair ∗Signatures are on file in the Graduate School. Abstract Smartphones have experienced a boom over the last 10 years. Currently a user is left to trust their device manufacturer when installing applications. In this paper we outline our suite of applications that are designed to provide us and users information about applications leveraging a reversed API for the Google Play market, working in concert with several analysis tools, some of our own design. In order to gather as complete of a picture of the market as possible, we propose a method for recreating the market in its entirety. Using this procured data, we present an overview of how two popular Android features are used in the real world: Permissions and Libraries. We find that there is a large correlation between library use and Permission use, which represents a security concern. iii Table of Contents List of Figures vi List of Tables vii Acknowledgments viii Chapter 1 Introduction 1 1.1 Introduction . 1 1.2 Google Play Market . 2 1.3 Privileges . 4 1.4 Design .
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Chapter # 1 Introduction
    Chapter # 1 Introduction Mobile applications (apps) have been gaining rising popularity dueto the advances in mobile technologies and the large increase in the number of mobile users. Consequently, several app distribution platforms, which provide a new way for developing, downloading, and updating software applications in modern mobile devices, have recently emerged. To better understand the download patterns, popularity trends, and development strategies in this rapidly evolving mobile app ecosystem, we systematically monitored and analyzed four popular third-party Android app marketplaces. Our study focuses on measuring, analyzing, and modeling the app popularity distribution, and explores how pricing and revenue strategies affect app popularity and developers’ income. Our results indicate that unlike web and peer-to-peer file sharing workloads, the app popularity distribution deviates from commonly observed Zipf-like models. We verify that these deviations can be mainly attributed to a new download pattern, to which we refer as the clustering effect. We validate the existence of this effect by revealing a strong temporal affinity of user downloads to app categories. Based on these observations, we propose a new formal clustering model for the distribution of app downloads, and demonstrate that it closely fits measured data. Moreover, we observe that paid apps follow a different popularity distribution than free apps, and show how free apps with an ad-based revenue strategy may result in higher financial benefits than paid apps. We believe that this study can be useful to appstore designers for improving content delivery and recommendation systems, as well as to app developers for selecting proper pricing policies to increase their income.
    [Show full text]
  • Profiles, Identities, Data: Making Abundant and Anchored Selves in a Platform Society
    This is a repository copy of Profiles, identities, data: making abundant and anchored selves in a platform society. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/139678/ Version: Accepted Version Article: Szulc, L. (2019) Profiles, identities, data: making abundant and anchored selves in a platform society. Communication Theory, 29 (3). pp. 257-276. ISSN 1050-3293 https://doi.org/10.1093/ct/qty031 This is a pre-copyedited, author-produced version of an article accepted for publication in Communication Theory following peer review. The version of record, Lukasz Szulc; Profiles, Identities, Data: Making Abundant and Anchored Selves in a Platform Society, Communication Theory is available online at: https://doi.org/10.1093/ct/qty031 Reuse Items deposited in White Rose Research Online are protected by copyright, with all rights reserved unless indicated otherwise. They may be downloaded and/or printed for private study, or other acts as permitted by national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of the full text version. This is indicated by the licence information on the White Rose Research Online record for the item. Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ Szulc - Profiles, Identities, Data 1 Lukasz Szulc Lecturer in Digital Media and Society Department of Sociological Studies University of Sheffield [email protected] Profiles, Identities, Data: Making Abundant and Anchored Selves in a Platform Society Abstract The practice of profile making has become ubiquitous in digital culture.
    [Show full text]
  • Peer-To-Peer Protocol and Application Detection Support
    Peer-to-Peer Protocol and Application Detection Support This appendix lists all the protocols and applications currently supported by Cisco ASR 5500 ADC. • Supported Protocols and Applications, page 1 Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols, and the applications using these protocols. Important Please note that various client versions are supported for the protocols. The client versions listed in the table below are the latest supported version(s). Important Please note that the release version in the Supported from Release column has changed for protocols/applications that are new since the ADC plugin release in August 2015. This will now be the ADC Plugin Build number in the x.xxx.xxx format. The previous releases were versioned as 1.1 (ADC plugin release for December 2012 ), 1.2 (ADC plugin release for April 2013), and so on for consecutive releases. New in this Release This section lists the supported P2P protocols, sub-protocols and applications introduced in the ADC Plugin release for December 1, 2017. ADC Administration Guide, StarOS Release 21.6 1 Peer-to-Peer Protocol and Application Detection Support New in this Release Protocol / Client Client Version Group Classification Supported from Application Release 6play 6play (Android) 4.4.1 Streaming Streaming-video ADC Plugin 2.19.895 Unclassified 6play (iOS) 4.4.1 6play — (Windows) BFM TV BFM TV 3.0.9 Streaming Streaming-video ADC Plugin 2.19.895 (Android) Unclassified BFM TV (iOS) 5.0.7 BFM — TV(Windows) Clash Royale
    [Show full text]
  • Meteor: Seeding a Security-Enhancing Infrastructure for Multi-Market Application Ecosystems
    Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems David Barrera William Enck Paul C. van Oorschot School of Computer Science Department of Computer Science School of Computer Science Carleton University North Carolina State University Carleton University Abstract—Application markets providing one-click software in- Bouncer [16]).1 Second, it provides a means to remotely stallation have become common to smartphones and are emerging uninstall distributed apps later identified as malicious. These on desktop platforms. Until recently, each platform has had only remote uninstalls (or “kill switches” [6], [5]) provide faster one market; however, social and economic pressures have resulted in multiple-market ecosystems. Multi-market environments limit, clean-up than traditional antivirus software, as they push and in some cases eliminate, valuable security characteristics actions to devices and do not require definition updates or provided by the market model, including kill switches and resource intensive scanning. Finally, search results display developer name consistency. We outline a novel approach to consistent developer names for applications. Once a developer retaining single-market security semantics while enabling the has registered with the market, controls exist such that no flexibility and independence of a multi-market environment. We propose Meteor as a security-enhancing application installation other developer can easily distribute applications under that framework that leverages information (e.g., app statistics, expert developer name. Hence, consumers have some assurance that ratings, developer history) from a configurable set of security all applications provided by “John Smith” are provided by the information sources. We build a proof-of-concept Android ap- same John Smith.
    [Show full text]
  • The Constitutionality of Banning Sex Offenders from Social Networking Sites
    WYNTON IN PRINTER PROOF.DOC 4/14/2011 8:08:24 PM Note MYSPACE, YOURSPACE, BUT NOT THEIRSPACE: THE CONSTITUTIONALITY OF BANNING SEX OFFENDERS FROM SOCIAL NETWORKING SITES JASMINE S. WYNTON† ABSTRACT In recent years there has been intense public pressure to enact increasingly restrictive and intrusive sex offender laws. The regulation of sex offenders has now moved online, where a growing amount of protected expression and activity occurs. The latest trend in sex offender policy has been the passage of state laws prohibiting sex offenders from visiting social networking sites, such as Myspace or Facebook. The use of these websites implicates the First Amendment right of expressive association. Broad social-networking-site bans threaten the First Amendment expressive association rights of sex offenders, who do not lose all of their constitutional rights by virtue of their conviction. Although social-networking-site bans are politically attractive on the surface, such prohibitions are fundamentally flawed because they are predicated on a number of widespread misconceptions about sex offenses and sex offender behavior. These misconceptions include the beliefs that all registered sex offenders are violent sexual predators who have extremely high recidivism rates and that Internet predators are increasing the incidence of sex crimes against minors. In fact, there is very little evidence to indicate that this type of legislation will help reduce sexual violence. This Note argues Copyright © 2011 by Jasmine S. Wynton. † Duke University School of Law, J.D. expected 2011; Spelman College, B.A. 2008. First, I would like to thank God for the ability, strength, and perseverance to write this Note, and I would like to thank my family for their constant love, support, and encouragement.
    [Show full text]
  • Iphone Apps by Downloads How to Download Apps on Iphone: the Complete Guide! You Don’T Know How to Install Apps on Your Iphone, but You Want to Learn How
    iphone apps by downloads How To Download Apps On iPhone: The Complete Guide! You don’t know how to install apps on your iPhone, but you want to learn how. There are more than two million apps in your iPhone’s App Store, most of which help you get more out of your iPhone. In this article, I’ll show you how to download apps on your iPhone ! The content of this article has been updated for iOS 11, the most recent version of iPhone software. Apple introduced a new App Store layout with iOS 11, so if you’re running an older software version, your iPhone may look slightly different. If you haven’t already, I strongly recommend updating your iPhone! What Are Apps On My iPhone? Apps, which is short for applications, are programs you install on your iPhone. There are apps for fun games, organizing your work or personal life, and your favorite email service or social media platform. How To Download Apps On iPhone. Unlock your iPhone using your passcode, Touch ID, or Face ID. Open the App Store app. Find the app you want to download by browsing the Today, Games, or Apps section, or search for the app using the Search tab. Once you’ve found the app you want to download, tap Get to the right of the app. Confirm the installation by entering your passcode or using Touch ID. If you have an iPhone X, double-click the side button to activate Face ID and confirm the installation. Now, the app will begin installing on your iPhone.
    [Show full text]
  • Qello Analytics Case Study
    CASE STUDY Qello Analytics Case Study BACKGROUND Qello combines a stellar web interface with mobile phone and tablet experiences to provide subscribers full-length HD concerts and entertainment videos anytime, anywhere. Members can access their content across the iOS and Android ecosystems, Amazon’s Kindle Fire, Windows Mobile, Samsung and Sony Smart TVs, and the web at Qello.com. PROJECT CHALLENGE Qello, the world’s Tracking subscriber acquisition, adoption, and sustained engagement across devices leading on-demand was a challenge for Qello. Multiple analytics solutions were in place, with reporting and streaming service for valuable data in disparate locations. User experience and marketing teams were struggling full-length HD concerts to understand the customer lifecycle from initial touchpoint, through to subscriber and documentaries, uses analytics to grow their conversion. subscriber base, and decrease churn. SERVICES GOOGLE ANALYTICS IMPLEMENTATION & CONSULTING Making Digital More Human™ 6Dglobal.com | labs.6Dglobal.com | [email protected] SOLUTION RESULTS BY THE NUMBERS: 6D Analytics worked with Qello to restructure and optimize the Google Analytics implementation, so that it could serve as the central analytics platform. Advanced tracking was implemented across web properties and applications, to gain a better understanding Subscription of in-page and in-app activity, and how visitors were transcending mediums. The Google Conversion Increase: Analytics profiles were streamlined, and advanced segments used to provide more focused reporting for marketing and user experience stakeholders. 115% Churn Decrease: RESULTS Qello was able to increase subscription conversions by 115% within the first 60 days of 240% receiving data from the refined Google Analytics implementation. During this time, churn also decreased by 240%.
    [Show full text]
  • The Innovative Use of Mobile Applications in the Philippines – Lessons for Africa
    SEPTEMBER 2007 • SHAWN MENDES, ERWIN ALAMPAY, EDWIN SORIANO AND CHERYLL SORIANO The innovative use of mobile applications in the Philippines – lessons for Africa Table of Contents Acknowledgements...................................................................................3 1. Introduction ..........................................................................................5 Background...........................................................................................5 The.potential.of.m-Commerce.............................................................6 2. m-Commerce in the Philippines...........................................................8 History of ICTs in the Philippines ............................................................ 8 Policy .................................................................................................... 9 Growth in ICT access ............................................................................ 12 Public access: PCO service/telecentres and payphones ................................ 13 Cellular/mobile coverage ........................................................................ 14 Internet access ....................................................................................... 16 Impact of Technology & Market Innovations .......................................... 16 Expansion ............................................................................................ 17 Affordability & choice …the impact of SMS and prepaids ........................ 17 Short
    [Show full text]
  • Asia-Pacific Yearbook 2014
    Asia-Pacific Yearbook 2014 2200 people 24 offices 17 markets The premier global non-profit trade association representing all players in the mobile marketing value chain CREDITS Rohit Dadwal, Managing Director, MMA Asia Pacific Jasveen Kaur, Senior Regional Membership & Marketing Manager, MMA Asia Pacific Ammita M, Consultant, Strategic Projects, MMA Asia Pacific Tam Phan Bich, Country Manager, MMA Vietnam LE Thi Ngoc Yen, Assistant to Country Manager Vietnam, MMA Vietnam Amanda Guan, Membership Manager, MMA China Maggie Qin, Marketing Manager, MMA China Madanmohan Rao, Yearbook Editor First published 2014 Copyright © 2014 Mobile Marketing Association Published by Mobile Marketing Association APAC Headquarters E-mail: [email protected] Website: www.mmaglobal.com All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the publishers. Designed and produced by Reality Premedia Services Pvt. Ltd. MMA Asia-Pacific Yearbook, 2014 Foreword ...............................................................................4 Mobile Marketing and Content Consumption ....................................50 Welcome Letter ....................................................................5 Making Magic in the Moment: How Symbiosis Drives Mobile Ecosystems .......................................54 Executive Summary ..............................................................6
    [Show full text]
  • Cutting the Cord How Dropping Cable Can Help Save You Doug Cuts the Cord and Saves $100 a Month on Cable Why Cut the Cord?
    Cutting the Cord How dropping cable can help save you Doug cuts the cord and saves $100 a month on cable Why cut the cord? ★ It saves Money ★ No contracts ★ Better control over content What do you need before you cut the cord? 1. A streaming player 2. An antenna (optional) 3. Streaming Services 4. Internet Streaming Players Streaming players allow you to watch videos over the internet. They are almost like a cable box without a monthly fee. Common players include Roku, Fire TV, Chromecast, and Apple TV. You may already have streaming capabilities if you have a smart TV, blu-ray player, or game system. Streaming Devices Antenna Getting an antenna could get you access to local stations for free. Availability of channels depends on your location and the height of the antenna. Stations What can you stream? You can stream on demand from a large variety of services. These include things like Netflix, YouTube, Vudu, Hulu, and Amazon Prime Video. While some services (like YouTube and PBS) are free, other services require you to either pay a subscription or to rent or purchase content. What about live TV? There are many services that let you watch live TV over the internet. The most popular services include: ★ Sling TV ★ DirecTV Now ★ Hulu with Live TV ★ YouTube TV ★ Playstation Vue What to look at in a streaming service ★ Price ★ Number of concurrent streams ★ DVR ★ Ads? ★ Content ★ Free Trial ★ Compatibility Internet In Narragansett, you have a choice of 3 providers: ★ Verizon Fios ★ Verizon High Speed Internet ★ Cox How much internet do you need? ★ Depends on how much you’re doing at the same time ★ Generally, take the max number of concurrent streams and multiply it by 10 For example if you are watching content on TV and someone else is watching on a tablet at the same time, you should aim for having 20 mbps available.
    [Show full text]