Feeds

The mobile operators' Three Ring Trick

So you want us to use your networks?

Designing a Defense for Mobile Applications

Comment A classic magician’s tricks is to flash three solid steel rings then hand them to a punter to examine before spinning and linking them as though metal passes through metal.

Mobile phone networks might wish to turn to magic to help with Subscriber Acquisition Cost. Margins are being squeezed by regulation - a problem they treat with the blunt implement of price. It’s not the magic they need, it’s the rings.

Price is only one of the three rings of mobile. This isn’t in Powerpoint and I’m not going to start posting Venn diagrams, but imagine, if you will, three overlapping circles in a straight line. Like the Audi logo with the last ring missing. In the first one you write Coverage, in the second Price and in the third Service. Go on, get out a pencil and do it.

This is the growth path for carriers and it is the overlaps that are important. When a network is new it has limited coverage. In the days when all the networks in a country were new they all fought on coverage. Indeed this is still true of some emerging places like Cameroon, Ghana and North America. If coverage is poor, particularly if there is a better established rival, the new entrant needs to be cheap. Really cheap. Smart handsets discounted to zilch and masses of credit for cents. This is at a time when money needs to be spent on infrastructure and makes for a very expensive business. Governments don’t help with what they charge for spectrum. Live through the pain and build enough customers and coverage and you can start to recoup the cost. One of the nice things is as kit and costs get cheaper tariffs can be kept fairly static and the margin improves.

Then comes the second ring. As consumers realise coverage is much of a muchness, everywhere is reasonable and all the networks have the same blackspots – imposed by geographic conditions – there is no longer a need to pay a premium for better coverage and prices decline to that of the cheaper operator.

Operators then fight on price. A subtle war with offers which cannot be compared directly. Are anytime free calls to a few friends worth more than free weekend calls to anyone? Free calls on your Birthday? Free at Christmas? Bundles of minutes and texts, In the overlap between coverage and price there is the opportunity for showing off: “Our network is so good that if we drop your call we’ll give you the next call free”. Once, however, things stabilise, the savvy customers who are the focus of churn realise all the deals pretty much amount to $30 a month for a low to medium user and it doesn’t matter which network you are on.

Then comes the Service ring. In the mature UK market this is the focus of the battle and it is what is behind the music services and particularly the interest in social networking: Post to Facebook, Flirtomatic or Last.FM from your mobile. Teens are more loyal to their social network than carrier, and will happily swap carrier if it means they have better communication with their circle of friends. Other services make different customers sticky – SpinVox, Zyb, Blue Book or Gypsii.

Price regulation may actually be destructive because it harms the two rings to which it is attached. If prices are kept low then so will be coverage , and you won’t get new innovative services, but this is something that is outside the control of networks and they have to live with it. They can’t roll out a great, compelling service before coverage is a non-issue. This will be a major obstacle to the fourth generation, be it LTE or WiMax. The proposition of super services needs to be built on complete coverage. As we saw with the launch of 3G, people didn’t want the advanced data services when coverage was rubbish. Now it’s good, and sensibly priced, 3G dongles are doing well.

If the networks want advanced use, they need to build the first two rings of confidence. No amount of trickery will get subscribers to sign up for something that might be great - but that only works some of the time. ®

Catherine Keynes is a electronic engineer turned consultant who works for IT and telecoms companies. This is a longer version of an article first posted at her blog, Cat Calling.

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
What FTC lawsuit? T-Mobile US touts 10GB, $100 family-of-4 plan
Folks 'could use that money for more important things' says CEO Legere
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.