The Business Case for Service Automation in Mobile Networks

Total Page:16

File Type:pdf, Size:1020Kb

The Business Case for Service Automation in Mobile Networks 2016 The Business Case for Service Automation in Mobile Networks Commissioned by: {Core Analysis} Patrick Lopez pms 187c pms 429c {Core Analysis} Contents Table of Figures.............................................................................................................................................3 About This Report.........................................................................................................................................3 Accelerate and Reduce Costs of Existing Services (Infographic).................................................................4 New Services Enabled by Automation (Infographic)..................................................................................5 Executive Summary.......................................................................................................................................6 Introduction....................................................................................................................................................7 The Challenge of Creating New Services in a Legacy Mobile Network.......................................................8 Can Virtualization Alone Increase Service Velocity?...................................................................................9 Virtualization + Automation: A Winning Combination.............................................................................11 Accelerate and Reduce Costs of Existing Services.....................................................................................14 1. Greenfield Mobile Virtual Network Operator (MNO) or Mobile Virtual Network Operator (MVNO)...............................................................................................................14 2. Sponsored Data: URL / Domain Zero Rating....................................................................................16 3. Parental Control.................................................................................................................................17 4. Enterprise VPN as a Service...............................................................................................................20 New Services Enabled by Automation........................................................................................................21 1. Demand, Congestion or Event-Based Pricing...................................................................................21 2. Enterprise Traffic Management Self Service...................................................................................24 3. Blockbuster or Niche Services?.......................................................................................................26 3.1. Short Tail Services...................................................................................................................26 3.2. Niche services...........................................................................................................................27 About Affirmed Networks...........................................................................................................................30 About Red Hat.............................................................................................................................................31 About Mellanox Technologies....................................................................................................................32 About {Core Analysis} ...................................................................................................................................33 © 2016 Core Analysis Inc. Public distribution 2 All rights reserved. White paper Figures Figure 1: Automated Configuration Management Platform........................................................................6 Figure 2: Traditional core network service creation...................................................................................8 Figure 3: Typical duration in months of new service introduction and service change in wireless networks............................................................................................9 Figure 4: From iterative to automated service provisioning....................................................................12 Figure 5: Automation Platform..................................................................................................................13 Figure 6: MVNO launch project plans.......................................................................................................15 Figure 7: Example of service segmentation enabled by automated service provisioning......................19 Figure 8: Ratio busy / average hour traffic in wireless networks................................................................22 Tables Table 1: Legacy EPC & MVNO.....................................................................................................................16 Table 2: Legacy Zero Rating..........................................................................................................................17 Table 3: Legacy Parental Control.................................................................................................................19 Table 4: Legacy Enterprise VPN as a Service..............................................................................................20 Table 5: Demand-based Pricing Based on Cell Capacity...........................................................................23 About This Report This report has been prepared by {Core Analysis} for public distribution. All rights of distribution and license of this report as well as the content and intellectual property herein are reserved by {Core Analysis}. This report can be distributed freely but its content cannot be reproduced neither partially nor completely without attribution to {Core Analysis}. Abstract – This white paper, commissioned by Affirmed Networks, Mellanox and Red Hat, examines the business benefits that a virtualized, cloud-ready, automated service provisioning environment can bring to mobile operators. © 2016 Core Analysis Inc. Public distribution 3 All rights reserved. White paper Accelerate and Reduce Costs of Existing Services The use cases in this section are composite examples of commercial deployments from individual case studies and their corresponding project plans. The products deployed are a virtual EPC with collapsed Gi LAN functionality and a stateful Automated Configuration Management Platform that records and automates third-party physical and virtual element configuration. Legacy EPC EPC Virtualized + Automation EPC and MVNO $3.1 million $0.78 million 19.5 months 9.75 months Add MVNO Add MVNO with Automation $48,000 $1,610 2 months 2 days Sponsored Data Legacy Zero Rating Zero Rating with Automation $9,660 $1,610 12 days 2 days Legacy Virtualized + Automation Parental Control $0.9 million $0.38 million 8 months 4 months Subsequent Service Subsequent Service with Automation $64,400 $1,610 2 months 2 days Enterprise VPN Legacy VPNaaS Virtualized + Automation VPNaaS Enterprise Onboarding Enterprise Onboarding as a Service $12,075 $1,610 2 weeks 2 days © 2016 Core Analysis Inc. Public distribution 4 All rights reserved. White paper New Services Enabled by Automation One has to look at the Automated Configuration Management Platform (ACMP) as a best practice that accelerates and multiplies service opportunities. The real benefit of automating service provisioning in virtualized and hybrid environments is the opportunity to launch services that were otherwise too daunting or too expensive to launch. Virtualization & Demand Automation Congestion or Event-Based Pricing Network usage = <60% Network usage = >60% - <80% Network usage = <60% Speed = unlimited Speed = up to 5MMbps Speed = Capped at 2Mbps Data usage cost = $X Data usage cost = $1.2X Data usage cost = $2X Virtualization & Automation Enterprise Traffic Management Wireless Self-Service Executives IT Network SalesAdmin - Create new rules weeks days - Testing & deployment days minutes - Fault detection/error reduction Short Tail Services with Virtualization & Automation Blockbuster/ Montreal Canadiens Niche Services Hockey Season Boston Bruins Pass Eastern Conference Championships 20 packages U.S. Team Pass 4 days Stanley Cup Pass $30,000 French, English, Spanish © 2016 Core Analysis Inc. Public distribution 5 All rights reserved. White paper EXECUTIVE SUMMARY Mobile network operators (MNOs) are reducing the cost of delivering services through Network Functions Virtualization and Software-Defined Networking (SDN). Today, service creation and management rely on many proprietary elements, platforms, interfaces and protocols. Service creation is lengthy (typically 12 to 18 months), error prone (requiring two to three months of planning and testing) and expensive (costing millions of dollars in direct and indirect costs). Most of the delays, costs and errors are attributable to the fact that legacy systems require manual configuration through proprietary, non-interoperable interfaces. To address this challenge, cloud- native vendors are introducing virtualized network functions (VNFs) that provide highly modularized, auto-scalable software to replace many of the legacy network elements in a dynamic, flexible and cost- effective manner. VNFs have been shown to accelerate the time-to-market for new networks or new services such as Voice over LTE (VoLTE) or Machine-to-Machine (M2M) communications, resulting
Recommended publications
  • Chestnut Colt Barn 9 Hip No. 1081
    Consigned by Thomas and Casse, Agent Barn Chestnut Colt Hip No. 9 1081 Seattle Slew A.P. Indy ............................ Weekend Surprise Girolamo .......................... Mr. Prospector Get Lucky .......................... Chestnut Colt Dance Number May 13, 2013 Seeking the Gold Mutakddim ........................ Oscillate Go Ask Daisy .................... (2001) Affirmed Affirmed Bel ...................... Bel Real By GIROLAMO (2006). Black-type winner of 5 races, 2 to 4, $443,800, Vos - burgh S. [G1] (BEL, $210,000), Jerome H. [G2] (BEL, $90,000), 3rd Hill 'N' Dale Cigar Mile H. [G1] (AQU, $25,000). Brother to black-type winners Daydreaming, Accelerator, half-brother to black-type winner Harborage. His first foals are 2-year-olds of 2015 . Son of horse of the year A.P. Indy, leading sire twice, sire of 151 black-type winners, 11 champions, including Mineshaft [G1] (10 wins, $2,283,402), Rags to Riches [G1] ($1,342,528). 1st dam GO ASK DAISY , by Mutakddim. 2 wins at 2, $93,352, Mid-Peninsula S.-R (BMF, $29,100), 3rd Courtship S. (BM, $11,700), Carmel H. (BM, $10,- 725), Palo Alto H. (BM, $10,725). Dam of 7 other registered foals, 6 of racing age, 5 to race, 3 winners, including-- Lady Alex (f. by Benchmark). 6 wins, 3 to 5, $196,984, in N.A./U.S., 3rd B. Thoughtful S.-R (HOL, $18,000). (Total: $198,150). Colburn (g. by Heatseeker (IRE)). Winner at 3, placed at 4, 2014, $69,709, 3rd Harry Henson S. (BHP, $8,802). 2nd dam AFFIRMED BEL, by Affirmed. Winner at 4, $27,360. Dam of 4 winners, incl.-- GO ASK DAISY (f.
    [Show full text]
  • Governor Andrew M. Cuomo to Proclaim MEMORIALIZING June 5
    Assembly Resolution No. 347 BY: M. of A. Solages MEMORIALIZING Governor Andrew M. Cuomo to proclaim June 5, 2021, as Belmont Stakes Day in the State of New York, and commending the New York Racing Association upon the occasion of the 152nd running of the Belmont Stakes WHEREAS, The Belmont Stakes is one of the most important sporting events in New York State; it is the conclusion of thoroughbred racing's prestigious three-contest Triple Crown; and WHEREAS, Preceded by the Kentucky Derby and Preakness Stakes, the Belmont Stakes is nicknamed the "Test of the Champion" due to its grueling mile and a half distance; and WHEREAS, The Triple Crown has only been completed 12 times; the 12 horses to accomplish this historic feat are: Sir Barton, 1919; Gallant Fox, 1930; Omaha, 1935; War Admiral, 1937; Whirlaway, 1941; Count Fleet, 1943; Assault, 1946; Citation, 1948; Secretariat, 1973; Seattle Slew, 1977; Affirmed, 1978; and American Pharoah, 2015; and WHEREAS, The Belmont Stakes has drawn some of the largest sporting event crowds in New York history, including 120,139 people for the 2004 running of the race; and WHEREAS, This historic event draws tens of thousands of horse racing fans annually to Belmont Park and generates millions of dollars for New York State's economy; and WHEREAS, The Belmont Stakes is shown to a national television audience of millions of people on network television; and WHEREAS, The Belmont Stakes is named after August Belmont I, a financier who made a fortune in banking in the middle to late 1800s; he also branched out
    [Show full text]
  • Champion Maker
    MAKER CHAMPION The Toyota Blue Grass Stakes has shaped the careers of many notable Thoroughbreds 48 SPRING 2016 K KEENELAND.COM Below, the field breaks for the 2015 Toyota Blue Grass Stakes; bottom, Street Sense (center) loses a close 2007 running. MAKER Caption for photo goes here CHAMPION KEENELAND.COM K SPRING 2016 49 RICK SAMUELS (BREAK), ANNE M. EBERHARDT CHAMPION MAKER 1979 TOBY MILT Spectacular Bid dominated in the 1979 Blue Grass Stakes before taking the Kentucky Derby and Preakness Stakes. By Jennie Rees arl Nafzger’s short list of races he most send the Keeneland yearling sales into the stratosphere. But to passionately wanted to win during his Hall show the depth of the Blue Grass, consider the dozen 3-year- of Fame training career included Keeneland’s olds that lost the Blue Grass before wearing the roses: Nafzger’s Toyota Blue Grass Stakes. two champions are joined by the likes of 1941 Triple Crown C winner Whirlaway and former record-money earner Alysheba Instead, with his active trainer days winding down, he has had to (disqualified from first to third in the 1987 Blue Grass). settle for a pair of Kentucky Derby victories launched by the Toyota Then there are the Blue Grass winners that were tripped Blue Grass. Three weeks before they entrenched their names in his- up in the Derby for their legendary owners but are ensconced tory at Churchill Downs, Unbridled finished third in the 1990 Derby in racing lore and as stallions, including Calumet Farm’s Bull prep race, and in 2007 Street Sense lost it by a nose.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • The Art, Science, and Engineering of Fuzzing: a Survey
    1 The Art, Science, and Engineering of Fuzzing: A Survey Valentin J.M. Manes,` HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele, Edward J. Schwartz, and Maverick Woo Abstract—Among the many software vulnerability discovery techniques available today, fuzzing has remained highly popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of empirical evidence in discovering real-world software vulnerabilities. At a high level, fuzzing refers to a process of repeatedly running a program with generated inputs that may be syntactically or semantically malformed. While researchers and practitioners alike have invested a large and diverse effort towards improving fuzzing in recent years, this surge of work has also made it difficult to gain a comprehensive and coherent view of fuzzing. To help preserve and bring coherence to the vast literature of fuzzing, this paper presents a unified, general-purpose model of fuzzing together with a taxonomy of the current fuzzing literature. We methodically explore the design decisions at every stage of our model fuzzer by surveying the related literature and innovations in the art, science, and engineering that make modern-day fuzzers effective. Index Terms—software security, automated software testing, fuzzing. ✦ 1 INTRODUCTION Figure 1 on p. 5) and an increasing number of fuzzing Ever since its introduction in the early 1990s [152], fuzzing studies appear at major security conferences (e.g. [225], has remained one of the most widely-deployed techniques [52], [37], [176], [83], [239]). In addition, the blogosphere is to discover software security vulnerabilities. At a high level, filled with many success stories of fuzzing, some of which fuzzing refers to a process of repeatedly running a program also contain what we consider to be gems that warrant a with generated inputs that may be syntactically or seman- permanent place in the literature.
    [Show full text]
  • © 2012 Thomson Reuters. No Claim to Original U.S. Government Works. 1 Hodge V
    Hodge v. City of Cleveland, Not Reported in N.E.2d (1998) 1998 WL 742171 Only the Westlaw citation is currently available. CHECK OHIO SUPREME COURT RULES FOR REPORTING OF OPINIONS AND WEIGHT OF LEGAL AUTHORITY. Court of Appeals of Ohio, Eighth District, Cuyahoga County. Erica HODGE, et al., Plaintiffs-appellants v. CITY OF CLEVELAND, et al., Defendants-appellees No. 72283. | Oct. 22, 1998. Civil appeal from Common Pleas Court, Case No. CV-314029. Affirmed. Attorneys and Law Firms John T. Castele, Cleveland, for plaintiffs-appellants. Sharon Sobol Jordan, Director of Law, Donna M. Andrew, Lisa Herbert, Assistant Law Directors, Elise Hara, Cleveland, for defendants-appellees. Opinion JOURNAL ENTRY AND OPINION KARPINSKI, J. *1 This case arises from a rape at a municipal recreation center. Plaintiffs-appellants Erica Hodge and her mother and next friend Bennedetta Ayers recovered a judgment against the rapist. They further seek to impose liability for compensatory and punitive damages against defendants-appellees the City of Cleveland and Tim Isaac, one of its employees. Plaintiffs' original complaint was filed against the rapist, Jesse McShan, and “the City of Cleveland, Cuyahoga County, Ohio.” The complaint alleged that McShan committed a series of intentional malicious criminal acts. Specifically, plaintiffs' complaint alleged that McShan “kidnaped, assaulted, and forcibly raped” Hodge in “the Kovasic [sic ] Center (“Center”), a recreation center * * * owned and operated by” Cleveland. The complaint further alleged that McShan was a “volunteer
    [Show full text]
  • Freedom: Engineering a State-Of-The-Art DOM Fuzzer
    FreeDom: Engineering a State-of-the-Art DOM Fuzzer Wen Xu Soyeon Park Taesoo Kim Georgia Institute of Technology Georgia Institute of Technology Georgia Institute of Technology [email protected] [email protected] [email protected] ABSTRACT ACM Reference Format: The DOM engine of a web browser is a popular attack surface and Wen Xu, Soyeon Park, and Taesoo Kim. 2020. FreeDom: Engineering a State- has been thoroughly fuzzed during its development. A common of-the-Art DOM Fuzzer. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), November 9–13, 2020, approach adopted by the latest DOM fuzzers is to generate new Virtual Event, USA. ACM, New York, NY, USA, 16 pages. https://doi.org/10. inputs based on context-free grammars. However, such a generative 1145/3372297.3423340 approach fails to capture the data dependencies in the inputs of a DOM engine, namely, HTML documents. Meanwhile, it is unclear whether or not coverage-guided mutation, which is well-known to 1 INTRODUCTION be effective in fuzzing numerous software, still remains to beeffec- A DOM (Document Object Model) engine is a core component of tive against DOM engines. Worse yet, existing DOM fuzzers cannot every modern web browser, which is responsible for displaying adopt a coverage-guided approach because they are unable to fully HTML documents in an interactive window on an end-user device. support HTML mutation and suffer from low browser throughput. Considering its giant code base and extraordinary complexity, a To scientifically understand the effectiveness and limitations of DOM engine has always been one of the largest bug sources in a web the two approaches, we propose FreeDom, a full-fledged cluster- browser.
    [Show full text]
  • RSA Adaptive Authentication
    RSA Adaptive Authentication (Hosted) Data Gathering Techniques Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA, the RSA Logo and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other trademarks used herein are the property of their respective owners. For a list of RSA trademarks, go to www.rsa.com/legal/trademarks_list.pdf. License agreement This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person. No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability. This software is subject to change without notice and should not be construed as a commitment by EMC. Note on encryption technologies This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption technologies, and current use, import, and export regulations should be followed when using, importing or exporting this product. Distribution Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC believes the information in this publication is accurate as of its publication date.
    [Show full text]
  • Appendix a the Ten Commandments for Websites
    Appendix A The Ten Commandments for Websites Welcome to the appendixes! At this stage in your learning, you should have all the basic skills you require to build a high-quality website with insightful consideration given to aspects such as accessibility, search engine optimization, usability, and all the other concepts that web designers and developers think about on a daily basis. Hopefully with all the different elements covered in this book, you now have a solid understanding as to what goes into building a website (much more than code!). The main thing you should take from this book is that you don’t need to be an expert at everything but ensuring that you take the time to notice what’s out there and deciding what will best help your site are among the most important elements of the process. As you leave this book and go on to updating your website over time and perhaps learning new skills, always remember to be brave, take risks (through trial and error), and never feel that things are getting too hard. If you choose to learn skills that were only briefly mentioned in this book, like scripting, or to get involved in using content management systems and web software, go at a pace that you feel comfortable with. With that in mind, let’s go over the 10 most important messages I would personally recommend. After that, I’ll give you some useful resources like important websites for people learning to create for the Internet and handy software. Advice is something many professional designers and developers give out in spades after learning some harsh lessons from what their own bitter experiences.
    [Show full text]
  • 18-966 Department of Commerce V. New York (06/27
    (Slip Opinion) OCTOBER TERM, 2018 1 Syllabus NOTE: Where it is feasible, a syllabus (headnote) will be released, as is being done in connection with this case, at the time the opinion is issued. The syllabus constitutes no part of the opinion of the Court but has been prepared by the Reporter of Decisions for the convenience of the reader. See United States v. Detroit Timber & Lumber Co., 200 U. S. 321, 337. SUPREME COURT OF THE UNITED STATES Syllabus DEPARTMENT OF COMMERCE ET AL. v. NEW YORK ET AL. CERTIORARI BEFORE JUDGMENT TO THE UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT No. 18–966. Argued April 23, 2019—Decided June 27, 2019 In order to apportion congressional representatives among the States, the Constitution requires an “Enumeration” of the population every 10 years, to be made “in such Manner” as Congress “shall by Law di- rect,” Art. I, §2, cl. 3; Amdt. 14, §2. In the Census Act, Congress del- egated to the Secretary of Commerce the task of conducting the de- cennial census “in such form and content as he may determine.” 13 U. S. C. §141(a). The Secretary is aided by the Census Bureau, a sta- tistical agency in the Department of Commerce. The population count is also used to allocate federal funds to the States and to draw electoral districts. The census additionally serves as a means of col- lecting demographic information used for a variety of purposes. There have been 23 decennial censuses since 1790. All but one be- tween 1820 and 2000 asked at least some of the population about their citizenship or place of birth.
    [Show full text]
  • Skyfire: Data-Driven Seed Generation for Fuzzing
    Skyfire: Data-Driven Seed Generation for Fuzzing Junjie Wang, Bihuan Chen†, Lei Wei, and Yang Liu Nanyang Technological University, Singapore {wang1043, bhchen, l.wei, yangliu}@ntu.edu.sg †Corresponding Author Abstract—Programs that take highly-structured files as inputs Syntax Semantic normally process inputs in stages: syntax parsing, semantic check- Features Rules ing, and application execution. Deep bugs are often hidden in the <?xml version="1.0" application execution stage, and it is non-trivial to automatically encoding="utf- pass pass pass 8"?><xsl:stylesheet version="1.0" Syntax Semantic Application xmlns:xsl="http://www.w3 .org/1999/XSL/Transform" generate test inputs to trigger them. Mutation-based fuzzing gen- ><xsl:output xsl:use- √ attribute- Parsing Checking Execution erates test inputs by modifying well-formed seed inputs randomly sets=""/></xsl:stylesheet> Parsing Semantic or heuristically. Most inputs are rejected at the early syntax pars- Inputs Crashes ing stage. Differently, generation-based fuzzing generates inputs Errors Violations from a specification (e.g., grammar). They can quickly carry the ! ! X fuzzing beyond the syntax parsing stage. However, most inputs fail to pass the semantic checking (e.g., violating semantic rules), Fig. 1: Stages of Processing Highly-Structured Inputs which restricts their capability of discovering deep bugs. In this paper, we propose a novel data-driven seed generation approach, named Skyfire, which leverages the knowledge in the analysis [8, 9] that identifies those interesting bytes to mutate, vast amount of existing samples to generate well-distributed seed symbolic execution [10, 11, 12] that relies on constraint solving inputs for fuzzing programs that process highly-structured inputs.
    [Show full text]
  • Kentucky Derby Winners Vs. Kentucky Derby Winners
    KENTUCKY DERBY WINNERS VS. KENTUCKY DERBY WINNERS Winners of the Kentucky Derby have faced each other 43 times. The races have occurred 17 times in New York, nine in California, nine in Maryland, six in Kentucky, one in Illinois and one in Canada. Derby winners have run 1-2 on 12 occasions. The older Derby winner has prevailed 24 times. Three Kentucky Derby winners have been pitted against one another twice, including a 1-2-3 finish in the 1918 Bowie Handicap at Pimlico by George Smith, Omar Khayyam and Exterminator. Exterminator raced against Derby winners 15 times and finished ahead of his rose-bearing rivals nine times. His chief competitor was Paul Jones, who he beat in seven of 10 races while carrying more weight in each affair. Date Track Race Distance Derby Winner (Age, Weight) Finish Derby Winner (Age, Weight) Finish Nov. 2, 1991 Churchill Downs Breeders’ Cup Classic 1 ¼ M Unbridled (4, 126) 3rd Strike the Gold (3, 122) 5th June 26, 1988 Hollywood Park Hollywood Gold Cup H. 1 ¼ M Alysheba (4,126) 2nd Ferdinand (5, 125) 3rd April 17, 1988 Santa Anita San Bernardino H. 1 1/8 M Alysheba (4, 127) 1st Ferdinand (5, 127) 2nd March 6, 1988 Santa Anita Santa Anita H. 1 ¼ M Alysheba (4, 126) 1st Ferdinand (5, 127) 2nd Nov. 21, 1987 Hollywood Park Breeders’ Cup Classic 1 ¼ M Ferdinand (4, 126) 1st Alysheba (3, 122) 2nd Oct. 6, 1979 Belmont Park Jockey Club Gold Cup 1 ½ M Affirmed (4, 126) 1st Spectacular Bid (3, 121) 2nd Oct. 14, 1978 Belmont Park Jockey Club Gold Cup 1 ½ M Seattle Slew (4, 126) 2nd Affirmed (3, 121) 5th Sept.
    [Show full text]