SlideShare a Scribd company logo
1 of 14
Download to read offline
How	can	Operators	Thrive	in	the
5G	Driven,	Application	
Economy?
Stephen	Miles	- CTO	CA	Technologies	 APJ
6Th	October	 2015
AirBNB	Market	
valuation
$13B140MNumber	of	Uber	
rides	last	year
“Software	is	eating	the	world”
- Marc	Andreesson
A	perfect	technology	storm	of	mobile apps,	
connected	products,	social connections,	data
analytics,	and	cloud computing	 continually	raises	
customer	expectations	for	quality	in	every	industry.3
$131B
worldwide	spending	
on	public	cloud	
service2
268B
projected	number	of	
mobile	app	downloads	
by	20171
$142B
Volume	of	US	Mobile-
based		payments	by	2019
APPLICATION	
ECONOMY
Welcome	to	the
Your	Apps	are	Something	You	are
Increasing	Customer	Expectations	&	Impact
Sources:	*Aberdeen	 Group,	Reaching	the	Top	of	the	Web	Performance	Mountain,	March	2013
Digital	 Trends,	Are	you	a	rarity?	Only	16	percent	of	people	will	try	out	an	app	more	than	twice,	March	2013
RT.com,	 NASDAQ	longest	downtime	adds	to	woes	over	glitches	in	electronic	trading,	Aug	2013
of	users	will	abandon	a	web	
application	after	just	three		
seconds	of	delay*
80-90%
of	all	consumer	
applications	will	only	
be	used	ONCE
cost	of	trading	
losses	during	
Facebook	IPO	due	
to	‘system	
problems’
25%
$500M
5 ©	2015	CA.	All	rights	reserved.	CA	confidential	and	proprietary	information;	for	internal	use	only.	
No	unauthorized	use,	copying	or	distribution.
3G/4G	
LTE
4G	/LTE	:	Enabling	the	Application	economy
Voice
Video
Data
• LTE	and	LTE	Advanced
• Faster	Mobile	Broadband
• Improved	coverage
For	the	customer
• Video	streaming,	TV	Broadcast
• Video	calls,	clips
• Enhanced	Gaming,	
• Chat	,	location	services
For	the	Business
• High	speed	Teleworking
• Sales	force	automation
• Video	conferencing
• Real	time	financial	info
6 ©	2015	CA.	All	rights	reserved.	CA	confidential	and	proprietary	information;	for	internal	use	only.	
No	unauthorized	use,	copying	or	distribution.
2002 2007 2011
3G 3.5G 4G
2015
By	2019
Source	:	Cisco	VNI
Global	Mobile	Traffic,
2006	Through	2014
iPhone
Android
iPad
Samsung
GalaxyBlackberry
App	stores	,	Vendors	OS
App	stores	,	OEM		OS
Streaming	,	geolocation
ecommerce
The	perfect	confluence	:	smart	phone,	mobile	Apps,	4G
5
10
15
20
25
0
Data	volume
(Exabyte's	per	month	)
2019
LTE-A 4G
3G
69% Video
90%
Mobile
Cloud
54%
Smart
Devices
7 ©	2015	CA.	All	rights	reserved.	CA	confidential	and	proprietary	information;	for	internal	use	only.	
No	unauthorized	use,	copying	or	distribution.
5G	Vision	:	Application	Economy,	society	and	Nations	
5G
• User	experience	continuity
:- Rich	Application	performance
• ‘Internet	of	everything’	
:- Built	for	human	&	machine	use
• Mission	critical	services
:- Remote	surgery,	driverless	cars
• Network	slicing
:- massively	virtual	private	N/W
• Innovative	new	applications
:- Augmented	/virtual	reality
Billions	of	
connected	
things
Lower
Latency
<1ms
Increased	
Throughput
Massive
Data
Longer	
Battery	Life
8 ©	2015	CA.	All	rights	reserved.	CA	confidential	and	proprietary	information;	for	internal	use	only.	
No	unauthorized	use,	copying	or	distribution.
Healthcare
Transport
Defense
Digital	Media
Network	Slicing	by	Demand
API
API
API
API
Identity	:	Authentication,	Authorization
Leverage	4G	Investments
5G		:		Networks	rewritten	by	softwareTM	
SW	Control	Plane	
Telecom	OSS
Telecom	BSS
Orchestration
Traffic	analytics
9 ©	2015	CA.	All	rights	reserved.	CA	confidential	and	proprietary	information;	for	internal	use	only.	
No	unauthorized	use,	copying	or	distribution.
B2B2C	– Business	re-written	by	software
Ecosystem	of	ValueCustomer	JourneyOmni	Channel	Approach
Digital
Services
Digital
Suppliers
Digital
Partners
Service	Continuum
Web
Mobile
Store
Software Factory
10 ©	2015	CA.	All	rights	reserved.	CA	confidential	and	proprietary	information;	for	internal	use	only.	
No	unauthorized	use,	copying	or	distribution.
Accelerate
+	or	-
Increased
Consumption
Explosion	of	
Data
User	defined	
experience	
Greater	
Complexity
New	Business	
services
New	Business	
Models
Scaled	Agility
New	
Technology
Digital	disruption	:	Threat	&	Opportunity	co-existence
TTM
11 ©	2015	CA.	All	rights	reserved.	CA	confidential	and	proprietary	information;	for	internal	use	only.	
No	unauthorized	use,	copying	or	distribution.
AGILE	
MANAGEMENT
Navigate	market	
shifts	quickly
Agile	best	practices	
to	help	you	drive	
transformation
DEVOPS
SECURITY
Business	outcomes	 in	support	of	your	transformation	initiatives
Accelerate	
development	
processes	
Flawless	app	
performance	in	
every	customer	
engagement
Give	the	right	access	
to	the	right	people	at	
the	right	time
Build	security	into	
your	apps	from	the	
get-go
CUSTOMER	INITIATIVE
Better	 business	decisions
Amazing	customer	experience
Faster	speed	to	market
Share	data	to	seize	new	market	
opportunities
Frictionless	 security
Scale	for	growth
12 ©	2015	CA.	All	rights	reserved.	CA	confidential	and	proprietary	information;	for	internal	use	only.	
No	unauthorized	use,	copying	or	distribution.
Agile	&	
Transformation	
Consulting
Project	&	
Portfolio	
Management
Agile	ALM
Continuous	
Delivery
Application	
Performance	
Management
Unified	
Infrastructure	
Management
Identity	&	Access	
Management
Technology	‘enablers’	required		to	support	your	4/5G	digital	transformation
Apps APIs
BUSINESS	INITIATIVE
DEV	&	TEST
DEPLOYOPERATE
MEASURE
PLAN
SECURITY
API	Management
Payment	Security
AGILE	MANAGEMENT
Prioritize
Analyze
Support
IdentitiesAPIsAccess
DEVOPS
Develop
& Test
Deploy
Assure
13 ©	2015	CA.	All	rights	reserved.	CA	confidential	and	proprietary	information;	for	internal	use	only.	
No	unauthorized	use,	copying	or	distribution.
©	 2015	CA.	ALL	RIGHTS	 RESERVED.Visit	us	today	at	ca.com
Visit	us	today	at	ca.com

More Related Content

Viewers also liked

Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129
Mohammad Khatib
 
Introduction to Scrum.ppt
Introduction to Scrum.pptIntroduction to Scrum.ppt
Introduction to Scrum.ppt
Mohan Late
 

Viewers also liked (17)

Final Year Project Guidance
Final Year Project GuidanceFinal Year Project Guidance
Final Year Project Guidance
 
Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129Huawei 5g white_paper_en_20140129
Huawei 5g white_paper_en_20140129
 
DWS16 - Mobile networks forum - Frederic Pujol, IDATE DigiWorld
DWS16 - Mobile networks forum - Frederic Pujol, IDATE DigiWorldDWS16 - Mobile networks forum - Frederic Pujol, IDATE DigiWorld
DWS16 - Mobile networks forum - Frederic Pujol, IDATE DigiWorld
 
5G Spectrum in EUROPE
5G Spectrum in EUROPE5G Spectrum in EUROPE
5G Spectrum in EUROPE
 
Janette Stewart, Analysys Mason - Presentation from Analysys Mason (Qualcomm ...
Janette Stewart, Analysys Mason - Presentation from Analysys Mason (Qualcomm ...Janette Stewart, Analysys Mason - Presentation from Analysys Mason (Qualcomm ...
Janette Stewart, Analysys Mason - Presentation from Analysys Mason (Qualcomm ...
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
 
Small Cell Forum: Lighting the path to 5G
Small Cell Forum: Lighting the path to 5GSmall Cell Forum: Lighting the path to 5G
Small Cell Forum: Lighting the path to 5G
 
Cannes plenary Workplan Webinar - 14th March 2017
Cannes plenary Workplan Webinar - 14th March 2017Cannes plenary Workplan Webinar - 14th March 2017
Cannes plenary Workplan Webinar - 14th March 2017
 
Seminar report on Millimeter Wave mobile communications for 5g cellular
Seminar report on Millimeter Wave mobile communications for 5g cellularSeminar report on Millimeter Wave mobile communications for 5g cellular
Seminar report on Millimeter Wave mobile communications for 5g cellular
 
Millimeter wave mobile communication for 5G cellular.
Millimeter  wave  mobile communication for 5G cellular.Millimeter  wave  mobile communication for 5G cellular.
Millimeter wave mobile communication for 5G cellular.
 
Millimeter Wave mobile communications for 5g cellular
Millimeter Wave mobile communications for 5g cellularMillimeter Wave mobile communications for 5g cellular
Millimeter Wave mobile communications for 5g cellular
 
Seminar presentation on 5G
Seminar presentation on 5GSeminar presentation on 5G
Seminar presentation on 5G
 
Ericsson 5G Core System
Ericsson 5G Core SystemEricsson 5G Core System
Ericsson 5G Core System
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
Visual and Creative Thinking:What We Learned From Peter Pan and Willy Wonka
Visual and Creative Thinking:What We Learned From Peter Pan and Willy WonkaVisual and Creative Thinking:What We Learned From Peter Pan and Willy Wonka
Visual and Creative Thinking:What We Learned From Peter Pan and Willy Wonka
 
Introduction to Scrum.ppt
Introduction to Scrum.pptIntroduction to Scrum.ppt
Introduction to Scrum.ppt
 
Socioeconomic impacts of 5G in Europe
Socioeconomic impacts of 5G in EuropeSocioeconomic impacts of 5G in Europe
Socioeconomic impacts of 5G in Europe
 

More from CA Technologies

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

How Can Operators Thrive in the 5G Driven Application Economy?