Facebook: a rolling down ARPU?

FacebookThe third quarter results of Facebook in 2013 are out (see the press release).  The good news (for Facebook) are the increase of both advertising revenues ($1.80 billion, a 66% increase from the same quarter last year) and users (+25% year-over-year for daily active users, and +18% year-over-year for monthly active users). On the other hand, costs soared as well (though less steeply than revenues), reaching  $1.28 billion in the quarter, up by 45% from the third quarter of 2012.  But what is more worrying is that  Continue reading

Posted in Information economics | Tagged , | Leave a comment

Call centers: wait, wait, and wait again...

ccwaitWe all know the often frustrating experience of interacting with a call center. Waiting for an operator to answer can take an appreciable portion of our time. And, while in most cases the chance to talk to an operator comes after a long sequence of choices (press 3, then press 1, then press 5, etc.), in some cases a selection of one of the pre-determined automatic options is all we are offered. Call center waiting times are always too long. Continue reading

Posted in Call centers, Quality of Service | Tagged , , , | Leave a comment

Discovering communities in a network through network clustering

nclustSome members in a network (be it a physical or a virtual one) may have a stronger relationship with some of the other members. Inside a network there are communities, whose members have stronger connections inside their community rather than outside of it. The detection of such communities is a relevant task in network analysis and is achieved through network clustering, e.g., decomposing the network into clusters (the communities). Continue reading

Posted in Network clustering, Network topology, Traffic analysis | Tagged , , , , | Leave a comment

The role of customers in data breach events and security investments

Data-breach-chartIn the most established model to evaluate the effectiveness of security investments by Gordon and Loeb, the probability of data breaches is represented as a function of investments only. The more the company invests to protect the data of its customers, the lower the probability that a data breach occurs. Continue reading

Posted in Security | Tagged , , | Leave a comment

Call for papers - DRCN 2014 (Design of Reliable Communication Networks)

DRCN is a well-established annual forum for scientists, engineers, designers and planners from industry, government and academia who have interests in the reliability and availability of communication networks and services. The conference covers topics Continue reading

Posted in Call for paper, Quality of Service, Risk analysis | Leave a comment

Some photos from UKSim 2013 in Cambridge

unionjackThis year I've attended the annual UKSim conference in Cambridge. UKSim is the flagship conference of the UK Simulation Society and is additionally sponsored by a number of simulation societies as well as the local chapter of IEEE Computer Society. The conference gathers Continue reading

Posted in Risk analysis | Tagged , , | 1 Comment

If the provider has to compensate for data breaches...

Revenue-sanction....revenues can be the right basis to do it.

Proposals for holding the service provider liable for damages suffered by its customers due to data breaches have been submitted in the past. In our papers "Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach" and "Damage Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation Policy for Data Breaches", Continue reading

Posted in Security | Tagged , , , | Leave a comment

In the beginning it was the Impact Factor

BibliometricsWhen I started my career as a researcher (very late 80's...), I was told to publish on international journals of good reputation. And in those days good reputation basically meant journals with an Impact Factor as high as possible (i.e., the index delivered by Thomson Reuters on their Journal Citation Report, updated yearly). Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

On credit risk analysis

Our paper "Solution Space Size in Credit Risk Simulation" on credit risk analysis has been presented at the 15th International Conference on Computer Modelling and Simulation UKSim 2013, held in Cambridge on April 9-12, 2013. You can download the presentation here Continue reading

Posted in Risk analysis | Tagged , , | Leave a comment

Some photos from DRCN 2013

Last week I attended the 9th International Conference on Design of Reliable Communication Networks (DRCN 2013) in Budapest, Hungary. In addition to presenting my own paper on cloud availability (you can download it here, while you find the presentation here), it was a good chance to meet the network reliability community and watch some interesting presentations. And to have some photos taken 😀  Continue reading

Posted in Cloud computing, Quality of Service | Tagged , , | Leave a comment