Over-The-Top Communications: Threats & Opportunities for Mobile

Total Page:16

File Type:pdf, Size:1020Kb

Over-The-Top Communications: Threats & Opportunities for Mobile Over-the-Top Communications : Threats & Opportunities for Mobile Operators SECTOR REPORT Over-the-Top Communications: Threats & Opportunities for Mobile Operators October 2012 Chris White Lead Analyst Matt Lewis Research Director ARCchart 78 York Street London W1H 1DP United Kingdom Tel: +44 33 00 88 1355 Fax: +44 33 00 88 1350 [email protected] ARCchart is an independent research and consulting firm focusing on all aspects of the wireless communications sector. Based in London, ARCchart’s depth and breadth of analysis provides a global perspective on wireless technology and industry developments. Combining original thinking with exceptional knowledge and experience, ARCchart assists clients in making sound commercial decisions about technologies, market strategies and competitive positions. ARCchart’s strategic advice covers all aspects of the wireless value-chain - ranging from semiconductors and WLANs to network operators, handsets and mobile applications. This report draws upon research and analysis conducted by all the ARCchart information groups. Use of this report by any third party for whatever purpose should not, and does not, absolve such third party from using due diligence in verifying the report’s contents. Any use which a third party makes of this document, or any reliance on it, or decisions to be made based on it, are the responsibility of such third party. ARCchart, its affiliates and representatives accept no duty of care or liability of any kind whatsoever to any such third party, and no responsibility for damages, if any, suffered by any third party as a result of decisions made, or not made, or actions taken, or not taken, based on this document. ARCchart does not make investment recommendations, in this report or otherwise, and nothing in this report should be interpreted as an opinion by ARCchart either on market forecasts or on the prospects of specific companies. Over-the-Top Communications: Threats & Opportunities for Mobile Operators Executive Summary Over-the-top (OTT) communications represents the largest threat to mobile operator revenues in the last 10 years. Prominent examples of OTT services, like Skype and WhatsApp, have had a direct impact on the mobile industry’s profitability and are placing pressure on operators at a time when they are compelled to build expensive new 4G networks. Today, VoIP is capturing an increasing proportion of mobile voice minutes, but in terms of value it is still worth less than 0.5% of overall voice revenues. With regards to messaging, ARCchart expects that instant messages will exceed SMS volumes by 2014 and continue growing rapidly thereafter, accounting for 65% of all message traffic pushed over mobile networks by 2016. This report examines the implications of widespread adoption of mobile over-the-top IP communications for mobile operators, handset vendors, and the OTT providers themselves, looking at how OTT players have gained a foothold at the expense of the mobile network operators and analysing how the various ecosystem stakeholders are dealing with the new industry dynamics. The report sizes the OTT market both in terms of revenue and users, and forecasts growth in relation to traditional circuit-switched voice and text messaging. In many ways, the seeds of success for the OTT providers were sewn by the mobile operators themselves who offered flat rate data plans to encourage consumption of 3G data, and who opened their network APIs in an effort to fill the pipes. This research presents case studies showing how operator voice and SMS revenues – which still equate to 80% of total revenues – have been eroded through revenue leakage to third parties. A major driver for OTT services has been the ever-increasing penetration of smartphones. Growth of iOS and Android devices and their respective ecosystems have acted as a fertile breeding ground for many of the nascent OTT services currently in play. Global smartphone penetration is expected to be 51% of total handset sales by the end of 2016, up from an estimated 31% in 2012. The report examines how operators have responded to the OTT challenge, from early attempts to block OTT service from running through the network, to offering large bundles of SMS and voice minutes at attractive prices in order to compete with VoIP and IM. Some operators have looked to partner with the OTT providers as a way of differentiating themselves – a strategy that has proved successful with new entrants. i Over-the-Top Communications: Threats & Opportunities for Mobile Operators The strategies which mobile operators can leverage in order to fight back against the rise of OTT services are a central aspect of this research, and the GSM Association’s Rich Communications Suite (RCS) represents a key part of this defence. RCS-e exploits a number of the Achilles heels of the OTT community, including a general lack of interoperability. Skype – the largest of the OTT providers - has largely been protective of its user base and has prevented interoperability between other platforms. A lack of a strong business model is also weighing heavy on some OTT providers who have yet to monetise their offerings. RCS-e neatly combines interoperability through existing telecoms infrastructure and a billing relationship with the end-user. Although RCS-e has been fraught with problems in its introduction, ARCchart anticipates a strong uptake of RCS-e, with around 35% of mobile VoIP users going through an RCS-e solution by 2016 and 19% of mobile IM users choosing RCS-e. Nonetheless, several mobile OTT communications providers have critical mass and the evidence shows that even when SMS and voice are priced comparatively cheaper than IM and VoIP, many customers continue to use their OTT solutions because of the richer experience. To win back these customers operators will need to offer a compelling mix of quality products that are competitively priced and built with interoperability and ease-of-use in mind. Selected companies within the over-the-top sector are profiled along with a discussion of how their business models are evolving. The report assesses how regulations could impact the market and how the prospects of a ‘Google tax’, or some form of tax on data usage, could turn business models on their head. ii Over-the-Top Communications: Threats & Opportunities for Mobile Operators Table of Contents A. INTRODUCTION ...................................................................................... 1 A.1 | History of Over-the-Top ........................................................................................................ 2 | Historical OTT Example ....................................................................................................... 2 Microsoft versus IBM ....................................................................................................... 2 | Contemporary OTT Examples ............................................................................................. 2 Skype ................................................................................................................................ 2 Apple’s Siri ........................................................................................................................ 3 Facebook .......................................................................................................................... 3 A.2 | The Threat to Traditional Communications .......................................................................... 3 | Operator Revenues at Risk ................................................................................................. 4 A.3 | Operators Fighting Back ........................................................................................................ 5 | Attempts to Limit OTT Access ............................................................................................. 5 | Operator Advantages over OTT .......................................................................................... 6 A.4 | Report Overview ................................................................................................................... 6 B. MARKET OVERVIEW ............................................................................... 7 B.1 | The Evolving Mobile OTT Landscape ..................................................................................... 7 | The Flow of Value Between Internet Companies and Cellcos ............................................ 7 | Risks to the OTT Business Model ........................................................................................ 8 Transitioning from Free to Paid........................................................................................ 8 User Consolidation of Services ......................................................................................... 8 Support for RCS ................................................................................................................ 8 B.2 | Data Revenue Not Compensating for Lost Voice and SMS ................................................... 9 | Regional Examples .............................................................................................................. 9 UK ..................................................................................................................................... 9 iii Over-the-Top Communications: Threats & Opportunities for Mobile Operators Netherlands .....................................................................................................................
Recommended publications
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • Social Networking Service
    Social networking service A social networking service is an online service, platform, or site that focuses on building and reflecting of social networks or social relations among people, e.g., who share interests and/or activities. A social network service essentially consists of a representation of each user (often a profile), his/her social links, and a variety of additional services. Most social network services are web based and provide means for users to interact over the internet, such as e-mail and instant messaging. Online community services are sometimes considered as a social network service, though in a broader sense, social network service usually means an individual-centered service whereas online community services are group-centered. Social networking sites allow users to share ideas, activities, events, and interests within their individual networks. The main types of social networking services are those which contain category places (such as former school year or classmates), means to connect with friends (usually with self-description pages) and a recommendation system linked to trust. Popular methods now combine many of these, with Facebook and Twitter widely used worldwide, Nexopia (mostly in Canada); Bebo, VKontakte, Hi5, Hyves (mostly in The Netherlands), Draugiem.lv (mostly in Latvia), StudiVZ (mostly in Germany), iWiW (mostly in Hungary), Tuenti (mostly in Spain), Nasza-Klasa (mostly in Poland), Decayenne, Tagged, XING, Badoo and Skyrock in parts of Europe; Orkut and Hi5 in South America and Central America; and Friendster, Mixi, Multiply, Orkut, Wretch, renren and Cyworld in Asia and the Pacific Islands and Twitter, Facebook, LinkedIn and Orkut in India.
    [Show full text]
  • Protocol Filter Planning Worksheet, V7.X
    Protocol Filter Planning Worksheet Websense Web Security Solutions (v7.x) Protocol filter (name): Applies to (clients): In policy (name): At (time and days): Legend Action Bandwidth Permit Block Network Protocol (percentage) Protocol Name Action Log Bandwidth Database SQL Net P B N P % File Transfer FTP P B N P % Gopher P B N P % WAIS P B N P % YouSendIt P B N P % Instant Messaging / Chat AOL Instant Messenger or ICQ P B N P % Baidu Hi P B N P % Brosix P B N P % Camfrog P B N P % Chikka Messenger P B N P % Eyeball Chat P B N P % 1 © 2013 Websense, Inc. Protocol filter name: Protocol Name Action Log Bandwidth Gadu-Gadu P B N P % Gizmo Project P B N P % Globe 7 P B N P % Gmail Chat (WSG Only) P B N P % Goober Messenger P B N P % Gooble Talk P B N P % IMVU P B N P % IRC P B N P % iSpQ P B N P % Mail.Ru P B N P % Meetro P B N P % MSC Messenger P B N P % MSN Messenger P B N P % MySpaceIM P B N P % NateOn P B N P % Neos P B N P % Netease Popo P B N P % netFM Messenger P B N P % Nimbuzz P B N P % Palringo P B N P % Paltalk P B N P % SIMP (Jabber) P B N P % Tencent QQ P B N P % TryFast Messenger P B N P % VZOchat P B N P % Wavago P B N P % Protocol Filter Planning Worksheet 2 of 8 Protocol filter name: Protocol Name Action Log Bandwidth Wengo P B N P % Woize P B N P % X-IM P B N P % Xfire P B N P % Yahoo! Mail Chat P B N P % Yahoo! Messenger P B N P % Instant Messaging File Attachments P B N P % AOL Instant Messenger or ICQ P B N P % attachments MSN Messenger attachments P B N P % NateOn Messenger
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 9,634,969 B2 Katis Et Al
    USOO9634969B2 (12) United States Patent (10) Patent No.: US 9,634,969 B2 Katis et al. (45) Date of Patent: *Apr. 25, 2017 (54) REAL-TIME MESSAGING METHOD AND (58) Field of Classification Search APPARATUS CPC ..... H04L 12/581; H04L 51/04; H04L 51/046: H04L 51/08: H04L 51/10; H04L 65/4069; (71) Applicant: Voxer IP LLC, San Francisco, CA (US) (Continued) (72) Inventors: Thomas E. Katis, Jackson, WY (US); (56) References Cited James T. Panttaja, San Francisco, CA (US); Mary G. Panttaja, San U.S. PATENT DOCUMENTS Francisco, CA (US); Matthew J. Ranney, Oakland, CA (US) 4,807,224 A 2f1989 Naron et al. 5,117,422 A 5/1992 Hauptschein et al. (73) Assignee: Voxer IP LLC, San Francisco, CA (US) (Continued) (*) Notice: Subject to any disclaimer, the term of this FOREIGN PATENT DOCUMENTS patent is extended or adjusted under 35 U.S.C. 154(b) by 0 days. CN 1393090 A 1, 2003 CN 1852421 10, 2006 This patent is Subject to a terminal dis claimer. (Continued) (21) Appl. No.: 15/091,746 OTHER PUBLICATIONS “About Gmail.” http://mail.google.com/mail/help? chat.html. Down (22) Filed: Apr. 6, 2016 loaded on Aug. 20, 2009, 3 pages. (65) Prior Publication Data (Continued) US 2016/0234136A1 Aug. 11, 2016 Primary Examiner — Patrice Winder Related U.S. Application Data (74) Attorney, Agent, or Firm — Beyer Law Group LLP (63) Continuation of application No. 147839.266, filed on (57) ABSTRACT Aug. 28, 2015, now Pat. No. 9,338,113, which is a A system and method for the late-biding of time-based (Continued) media in real-time.
    [Show full text]
  • A Perfectly Good Hour
    A PERFECTLY GOOD HOUR 1. Social Capital 2. Social Intelligence 3. Listening 4. Identity 5. Language & Cursing 6. Nonverbal Communication 7. Satisfying Relationships 8. Consummate Love 9. Conflict Management 10. Styles of Parenting/Leading Modern Social Commentary Cartoons by David Hawker from PUNCH Magazine, 1981 A PERFECTLY GOOD HOUR Feel free to voice your opinion and to disagree. This is not a friction- free zone. AND, please do demonstrate social intelligence. Let’s Get Better Acquainted If you match this descriptor, keep your 1. You belong to an LLI Special Interest Group video on and unmute. 2. You are fluent in another language 3. You’ve received your flu shot If you don’t match this 4. You attended the LLI class on nanotechnology descriptor, temporarily 5. You have grandchildren stop your video. 6. You (have) participate(d) in Great Decisions 7. You have a pet 8. You play a musical instrument 9. You are/have been on the LLI Board 10. You think this is a fun poll How fortunate we are that during this global pandemic, we can stay home, attending LLI classes, reading, creating, baking, taking walks, and talking with our loved one. The last six months have exposed and magnified long standing inequities -- in our communities, in our hospitals, in our workplaces, and in schools. Too many of our school districts lack a fair share of resources to address the pandemic’s challenges; not every student can be taught remotely with attention to their need for social and emotional safe learning spaces. The current circumstances are poised to exacerbate existing disparities in academic opportunity and performance, particularly between white communities and communities of color.
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 8,391,213 B2 Katis Et Al
    USOO839 1213B2 (12) United States Patent (10) Patent No.: US 8,391,213 B2 Katis et al. (45) Date of Patent: *Mar. 5, 2013 (54) GRACEFUL DEGRADATION FOR (56) References Cited COMMUNICATION SERVICES OVER WIRED AND WIRELESS NETWORKS U.S. PATENT DOCUMENTS 4,790,003 A 12/1988 Kepley et al. (75) Inventors: Thomas E. Katis, Jackson, WY (US); 4,807,224 A 2f1989 Naron et al. 5,117,422 A 5/1992 Hauptschein et al. James T. Panttaja, Healdsburg, CA 5,222, 189 A 6, 1993 Fielder (US); Mary G. Panttaja, Healdsburg, 5,283,818 A 2, 1994 Klausner et al. CA (US); Matthew J. Ranney, Oakland, 5,375,018 A 12, 1994 Klausner et al. 5,390,236 A 2f1995 Klausner et al. CA (US) 5.487,167 A 1/1996 Dinallo et al. (73) Assignee: Voxer IP LLC, San Francisco, CA (US) (Continued) (*) Notice: Subject to any disclaimer, the term of this FOREIGN PATENT DOCUMENTS patent is extended or adjusted under 35 EP 1715648 10, 2006 U.S.C. 154(b) by 205 days. EP 1725060 A1 11, 2006 This patent is Subject to a terminal dis (Continued) claimer. OTHER PUBLICATIONS Office Action datedMar. 3, 2010 in European Patent Application No. (21) Appl. No.: 12/948,707 O88393.657. (22) Filed: Nov. 17, 2010 (Continued) (65) Prior Publication Data Primary Examiner — Hassan Phillips Assistant Examiner — Prenell Jones US 2011 FOO64O27 A1 Mar. 17, 2011 (74) Attorney, Agent, or Firm — Beyer Law Group LLP (57) ABSTRACT Related U.S. Application Data An application for gracefully extending the range and/or capacity of Voice communication systems.
    [Show full text]
  • Introduction
    Introduction ............................................ Thank you for purchasing the T-Mobile® Sparq™ phone. Widget Bar - Convenient at-a-glance view of Widget applications - Sub-menu shortcuts for quick access Power media applications - Music player & Radio - Webcam - Camera Bluetooth With Bluetooth 2.0 supporting A2DP profiles, enjoy handsfree conversations. 1 Table of contents Safety and use .......................................................................................... 6 1 Your cellphone ................................................................................. 11 1.1 Status bar icons .................................................................................................................14 1.2 Personalize mainscreen ...................................................................................................16 1.3 Simple menu .......................................................................................................................16 2 Getting started ................................................................................ 17 2.1 Set-up...................................................................................................................................17 2.2 Power on your cellphone ...............................................................................................19 2.3 Power off your cellphone ...............................................................................................19 3 Making a call ...................................................................................
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 9th Edition, June 2012 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ................................................................................................................. 4 Streaming Media Bandwidth Consumption Triples ......................................................... 5 Streaming Video Business Risks ................................................................................................................ 6 Streaming Video Security Risks ................................................................................................................. 7 P2P Streaming and Unknown Malware ................................................................................................. 8 P2P Filesharing Bandwidth Consumption Increases 700% ............................................ 9 Business and Security Risks Both Old and New ...................................................................................... 10 Browser-based Filesharing Maintains Popularity ................................................................................... 10 Where Did The Megaupload Traffic Go? ................................................................................................... 11 Which Ports Do Filesharing Applications
    [Show full text]
  • An Analysis of End User Application Trends in the Enterprise, 7The Edition
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 7th Edition, May 2011 Palo Alto Networks www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Introduction .................................................................................................................... 4 SSL and Port Hopping Applications: The Elephant in the Room? .................................... 5 SSL on tcp/443 or Other Ports: The Majority of the Applications and Potential Risks ............................. 6 SSL on tcp/443 Only: A Small, but Significant Set of Applications ............................................................ 7 SSL on Dedicated, Non-Standard Ports: Some Business, Some Purposely Evasive ................................ 8 Applications That Can Use SSL: A Discussion of Risk vs Reward ......................................................... 9 Applications That Port Hop: The Ultimate Accessibility Feature? ............................................................. 9 Work is Increasingly Social ........................................................................................... 10 Social Networking: Big Growth for a Select Few ..................................................................................... 11 File Transfer/Sharing Applications: Will History be Repeated? ................................... 12 FTP: The Original File Transfer Application ............................................................................................
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 5th Edition, Spring 2010 Palo Alto Networks 232 E. Java Dr. Sunnyvale, CA 94089 408.738.7700 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Introduction ....................................................................................................................4 Application Usage Is Consistent...................................................................................... 5 Homogeneous Use, Heterogeneous Risk—A Vertical View....................................................................... 7 Financial Services and Healthcare Users Love to Socialize.................................................................. 8 University Users are Masking Their Activity ........................................................................................ 11 Enterprise 2.0: Usage Is Consistent But Intensity Has Increased................................. 12 Google Applications: The Epitome of Enterprise 2.0? .............................................................................13 Applications Are Not Always What They Seem to Be .................................................... 14 Tunneling—an Accessibility Feature or an Evasive Tactic?..................................................................... 15 Summary......................................................................................................................
    [Show full text]
  • Rich Communicator for Android
    Masters in Informatics Engineering Internship Final Report Rich Communicator for Android Sandra Filipa Leitão Mendes [email protected] WIT Software Supervisor: Eng. Nuno Costa DEI Supervisor: Prof. Dr. Bruno Cabral Sandra Filipa Leitão Mendes [email protected] Nº 2006131531 WIT Software supervisor Nuno Costa [email protected] DEI supervisor: Bruno Cabral [email protected] ACKNOWLEDGEMENTS To my parents, for whom I owe everything I have and am today, and for putting their children’s education above all. To my supervisors Nuno Costa and Bruno Cabral, for the help, the patience and the effort throughout this internship. To WIT Software for the opportunity to work in an excellent environment and for the responsibility that was given to me during this internship. To the team who accompanied me throughout these months, with all the necessary support and friendship. Last but not least, to all my friends who have spent months hearing about the internship, work, Android and similar, but never stopped being there. Thank you all for everything. ABSTRACT In our days, communication and portability are key points in the people’s lives. With the emergence of smartphones, it is expected that mobile devices do more than a simple call or send an SMS. It is necessary to develop applications to enrich the communication of their users, and take advantage of all available features. To encourage the development of such applications, an initiative named Rich Communicator Suite was created and now supported by operators and other telecommunication companies. This effort defines a set of features such as voice and video calls, social presence, chat and chat group and file transfer, based on common standards, in order to develop applications compliant with each other.
    [Show full text]
  • International Journal of Emerging
    Paper—Conception of a Conversational Interface to Provide a Guided Search of Study Related Data Conception of a Conversational Interface to Provide a Guided Search of Study Related Data https://doi.org/10.3991/ijet.v14i07.10137 Rene Berger, Markus Ebner, Martin Ebner * Graz University of Technology, Graz, Austria( ) [email protected] Abstract—Since the beginning of software development, solution ap- proaches and technologies have changed massively, including the requirements for a user interface. At the very beginning, it was the desktop application, with a classic Graphical User Interface (GUI), which fulfilled the needs of a user. Nowadays, many applications moved to web respectively mobile and the user behavior changed. A very modern concept to handle the communication be- tween a computer and a user is a chatbot. The range of functions of a chatbot can be very simple up to complex artificial intelligence based solutions. This publication focuses on a chatbot solution for Graz University of Technology (TU Graz), which should support the student by finding study related infor- mation via a conversational interface. Keywords—Chatbot; conversational interface; natural language understanding 1 Introduction 1.1 Applying the styles to an existing paper This publication is about researching, designing, implementing and evaluating a chatbot for the TU Graz, which provides a search concept for students to simplify finding study related information. The bot should be a standalone client messenger and not integrated in one of the major messenger platforms like Facebook Messenger1 or Slack. Although, it is a standalone messenger, it should be similar to existing ones, so that there is no confusion how to use it.
    [Show full text]