Welcome!

Python Authors: Pat Romanski, Matt Davis, AppDynamics Blog, Donald Meyer, Liz McMillan

Blog Feed Post

May I Borrow A Cup of Wi-Fi?

cup-of-wifi.png

At one time the knock on the door was a friend or neighbor looking to borrow a cup of sugar or the hedge trimmer.  They may still be looking for those things, but increasingly they are also looking to connect up to our home networks when they come to visit.  People are now carrying with them an average of 2.6 mobile devices according to recent mobile research by Cisco Internet Business Solutions Group.  And people want to make sure that these devices are connected to the Internet.  Often the first question following the pleasantries when friends and families enter our homes is can I use your Wi-Fi network to connect my smartphone, tablet, laptop or other new mobile device?  Mobile users are now expecting that their friend’s and neighbor’s homes will have Wi-Fi, just like they have electricity and running water. 

 

The value of “community Wi-Fi” is being recognized by a number of organizations. One is Fon, who has created a shared open-source network of more than 7 million hotspots around the world that community members can use for free. Another is BT, who has incorporated the Fon application and model into its home broadband service. This approach enables BT to provide broadband customers free access to the global Fon network, while expanding its U.K. hotspot network to more than 4 million sites—so, now friends and family members who are also BT customers can seamlessly authenticate and join the host’s home network.

The benefits of community Wi-Fi are becoming increasingly apparent to other service providers.  By extending the network through their own customers not only do they rapidly expand the size of that network, but they create a compelling “friends and family” world that helps in new customer acquisition and retention of existing customers.  Equally, community Wi-Fi allows SPs to differentiate their broadband offers from competitors and potentially extract a premium for their service. 

 

Many service providers are now trying to understand how they can create a community Wi-Fi network amongst their broadband customers and reap these new business benefits.  Recent research on Community Wi-Fi by Cisco IBSG revealed some very interesting findings into the needs and behaviors, current and future mobile usage, and the average profile of community Wi-Fi users. Approximately 40 percent of mobile device owners are “community” users. Compared with other mobile users, community users are technically advanced, own more sophisticated devices, and use these devices up to twice as often as mobile users. The community segment is also significant to SPs: this group is younger, wealthier, and willing to spend more money on mobile services.

These and other research findings from the survey can help SPs understand the size of the opportunity, develop strategies for success, acquire new customers and retain existing ones, and differentiate their community Wi-Fi offerings and initiatives from those of their competitors, extracting a premium for their service. 

 

The complete results can be found at “May I Borrow A Cup of Wi-Fi?”

 

About the Author

Stuart Taylor's further industry research, insights, and perspectives can be found at his blog, The Connected Life

Follow Stuart Taylor on Twitter: @STaylorCisco

Read the original blog entry...

More Stories By Deborah Strickland

The articles presented here are blog posts from members of our Service Provider Mobility community. Deborah Strickland is a Web and Social Media Program Manager at Cisco. Follow us on Twitter @CiscoSPMobility.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...