Presentation is loading. Please wait.

Presentation is loading. Please wait.

All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 Trends of Internet Use in Japan 26 June, 2007 Shigeyuki Suzuki FUJITSU LIMITED For Educational.

Similar presentations


Presentation on theme: "All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 Trends of Internet Use in Japan 26 June, 2007 Shigeyuki Suzuki FUJITSU LIMITED For Educational."— Presentation transcript:

1 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 Trends of Internet Use in Japan 26 June, 2007 Shigeyuki Suzuki FUJITSU LIMITED For Educational Use Only

2 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 1 Network of Networks Access Network Sprint C&W UUNET BT AOL T-Online BIGLOBE IIJ WIDE @nifty SINET So-net OCN The Internet

3 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 2 Features of the Internet Global Network Open Technologies Multimedia-oriented Common Resources for Everyone

4 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 3 Basic Internet Applications Electronic Mail Worldwide Web(WWW) Network News File Transfer(FTP) Remote Login(TELNET)

5 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 4 Internet Service Provider Information Services Other ISPs Database Services LAN Internet Service Provider LAN Servers(E-mail, WWW, etc.) Routers … IX Internet Exchange

6 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 5 Low-speed, Character-based Centralized Control Master-slave Communications Internet vs. Legacy Online Info. Services ABC PC BBS FilesMailbox for A Online Info. Services Center Access Network

7 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 6 Internet vs. Legacy Online Info. Services Internet News File A BC WS Mailbox News File WS High-speed, Multimedia-oriented Distributed Control Peer-to-Peer Communications

8 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 7 IP Address A unique number to identify a computer connected to the Internet An IP address consists of 32 bits under the IPv4 architecture An IP address is divided into four 8-bit sections and is written in four decimal numbers separated by periods. e.g. 204.248.24.16 The address space will be expanded to 128 bits in the future IPv6

9 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 8 Domain Name A unique name to identify an organization connected to the Internet e.g. fujitsu.com fujitsu.co.jp icl.co.uk With a host name attached before a domain name, it identifies a computer connected to the Internet. e.g. www.fujitsu.com DNS(Domain Name System) is a database system to map a domain name(host name) to an IP address.

10 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 9 Internet Host Counts (Millions) Source : Network Wizard 433,193,199(Jan. 2007)

11 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 10 Worldwide Internet Users Source : Internet White Paper 2006 (c) Access Media International,2006

12 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 11 Internet Users by Region World Total : 1,000.6million (December, 2005) Source : Internet White Paper 2006 (c) Access Media International,2006

13 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 12 Internet Users by Country 1.U.S.203.1 million 2.China110.1 3.Japan 72.9 4.India 51.5 5.Germany 48.6 6.U.K. 37.5 7.Korea 33.2 8.Italy 28.3 9.France 26.7 10.Russia 24.5 Source : Internet White Paper 2006 (c) Access Media International,2006

14 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 13 Internet User Population & Penetration Rate in Japan (million) (%) (as of December) Source : Ministry of Internal Affairs and Communications

15 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 14 Internet User Population in Asia Pacific 1China110,100,000 2Japan72,879,000 3India51,500,000 4Korea33,200,000 5Indonesia18,500,000 6Australia13,980,000 7Taiwan13,900,000 8Malaysia9,978,000 9Thai8,396,000 10Philippine7,760,000 11Pakistan7,390,000 12Vietnam5,910,000 13Hong Kong4,840,000 14New Zealand3,170,000 15Singapore2,880,000 16Sri Lanka360,000 17Bangladesh345,000 18Macao240,000 19Mongolia227,000 20Papua New Guinea225,000 Source : Internet White Paper 2006 (c) Access Media International,2006 Asia Pacific Total : 366.7million (December, 2005)

16 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 15 Spread of Internet by Country Source : Internet White Paper 2006 (c) Access Media International,2006

17 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 16 Market Trends(1)  Slowdown of Internet User Growth Until 2000 the growth rate had been explosive. Major driving forces were:  Spread of all-in-one PCs (Windows 98SE/Me/XP, WWW browser, 56Kbps modem, Ethernet interface)  Reduction of Internet access charges  Internet access with mobile phone

18 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 17 Spread of IT Appliances into Home Source : Ministry of Internal Affairs and Communications

19 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 18 Comparison of Internet Access Charges Japan(@nifty) USA(AOL) Dial-up \2,000/mo.(=$18*)$25.90/mo. (Unlimited Access) USA(AT&T) ADSL \3,000/mo.(=$27*) $14.95/mo. (Upstream:1Mbps (Upstream:128Kbps Downstream:8 - 40Mbps) Downstream:768Mbps) $24.99/mo. (Upstream:512Kbps Downstream:3Mbps) FTTH \6,170/mo.(=$56*) (100Mbps) (*) $=\110

20 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 19  Shift to Broadband Access Broadband access networks such as CATV, ADSL, and FTTH  Diversified Access Networks Wired : PSTN, ISDN, CATV, ADSL, FTTH Wireless : Cellular mobile, satellite, 3 rd generation mobile (IMT 2000), wireless LAN(IEEE 802.11.b/g/a) Market Trends(2)

21 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 20 Transition of Internet Access From Home Source : Ministry of Internal Affairs and Communications

22 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 21 Broadband Households in Japan Source : Ministry of Internal Affairs and Communications 14.2 mil. (Dec. '06) 3.6 mil. (Dec. '06) 7.9mil. (Dec. '06) (million)

23 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 22 Variety of Internet Access Networks Transmission speed(bps) 10K100K1M10M100M Leased line Tel/ISDN ADSL CATV PDC PHS 64 - 128K PHS 64 - 128K cdmaOne 64K cdmaOne 64K IMT-2000 WLL Satellite WLL:Wireless Local Loop IMT-2000 : International Mobile Telecommunications 2000 PDC:Personal Digital Cellular ADSL:Asymmetric Digital Subscriber Line Wireless Wired FTTH FTTH:Fiber To The Home

24 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 23 Mobile Internet Services in Japan Mobile Telephone Users (May, 2007) 97.6M DoCoMo52.8M au28.6M SoftBank Mobile16.2M Mobile Internet users (May, 2007) 85.2M DoCoMo (i-mode)47.7M au (EZweb) 23.9M SoftBank Mobile13.6M Source: TCA (Telecommunications Carriers Association)

25 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 24 Internet Access via CATV Network Router Head End Cable MODEM Internet Cable Network CATV Center Home ~ 30Mbps Transmission speed : Upstream : max. 10Mbps, Downstream : max. 30Mbps Monthly charge : \4,000 ~ \5,000

26 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 25 Internet Access via Satellite Proxy Server ISP (Terrestrial Network) Information Server The Internet PSTN/ISDN Uplink Center Down-stream : 30Mbps(shared) Individual User Corporate User Request for Information Up-stream is via ISP Network

27 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 26 ADSL NTT Central Office Home/Office Metallic lines(1 pair) Router CO Switch Up :~ 1Mbps Down: ~ 40Mbps DSLAM ADSL MODEM Splitter DSLAM : Digital Subscriber Line Access Multiplexer Internet connection via an existing telephone line Transmission speed : Upstream : max.1Mbps, Downstream : max.40Mbps Monthly charge : \3,000 (ISP charge included) (ADSL:Asymmetric Digital Subscriber Line)

28 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 27 FTTH NTT Central Office Home/Office Fiber Optic Cable Router Up :~ 100Mbps(max.) Down: ~ 100Mbps(max.) LAN SW Media Converter … CO Switch Metallic lines(1 pair) Internet access via fiber optic cable User Interface is either 10Mbps or 100Mbps. 100Mbps(home use) : \6,170*/mo. *)ISP charge is not included. (FTTH:Fiber To The Home)

29 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 28 IMT-2000(3 rd Generation Mobile) IMT-2000(International Mobile Telecommunication 2000) - 3rd generation mobile communications systems using international standard - Transmission speed: In moving cars/trains : ~ 144kbps, Walking : ~ 384kbps, Still : ~ 2Mbps - NTT DoCoMo : Launched commercial services October, 2001. Currently about 37.1 million subscribers. - au(KDDI Group) : Started commercial services April 2002. Currently about 27.9 million subscribers. - Vodafone : Started commercial services December 2002. Currently about 8.7 million subscribers.

30 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 29 Wireless LAN Access Point Home/Office Public Place(e.g. railway station, airport) ISP Broadband Connection (ADSL, FTTH) 11/54Mbps(max.) Radio frequency band : 2.4GHz(IEEE 802.11.b/g), 5GHz(802.11.a) Transmission Speed : ~ 11Mbps(b), ~ 54Mbps(a/g)

31 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 30 Market Trends(3)  Diversified Internet Access Devices PDA, Game machine, Mobile telephone, (Word processor, Internet TV)  Multimedia-oriented Applications Java : animations, realtime data transfer Windows Media Player/Real Player : Video/audio on demand Internet Phone : IP Telephony (VoIP) VoIP : Voice over IP

32 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 31 Variety of Internet Access Devices Mobile Phone only 19.2 million PC only 15.8 million Mobile Phone & PC 48.6 million Game Machine 1.6 million PC Users 66.0 million Mobile Phone Users 69.2 million Source : Ministry of Internal Affairs and Communications

33 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 32 Subscribers of the Internet Source : Ministry of Internal Affairs and Communications No. of Subscribers (in millions)

34 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 33 Mobile Phone/Internet Users Source: TCA (Telecommunications Carriers Association)

35 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 34 Spread of IP Telephony No. of Subscribers (in millions) Source : Ministry of Internal Affairs and Communications

36 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 35  New Services/Businesses WWW Search Engine : Yahoo!, Google, Infoseek, Excite, etc. Electronic Commerce : Online shopping, EDI Blog (Weblog) SNS (Social Network Service)  Intranet/Extranet Applications Use of Internet technologies in corporate information network systems Market Trends(4) EDI : Electronic Data Interchange

37 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 36 Use of the Internet from PCs (%) Multiple answers Source: Ministry of Internal Affairs and Communications

38 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 37 Use of the Internet from Mobile Phone (%) Multiple answers Source: Ministry of Internal Affairs and Communications

39 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 38 Web 2.0 The Internet is “SOCIAL MEDIA” Source: Dion Hinchcliffe’s Web2.0 Blog

40 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 39 Blog (Weblog) A weblog, which is usually shortened to blog, is a website where regular entries are made (such as in a journal or diary) and presented in reverse chronological order. Blogs often offer commentary or news on a particular subject, such as food, politics, or local news; some function as more personal online diaries. A typical blog combines text, images, and links to other blogs, web pages, and other media related to its topic. Most blogs are primarily textual although many focus on photographs, videos or audio. Source: Wikipedia

41 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 40 Blog Posts by Language Source: “The State of the Live Web, April 2007” Technorati Japanese37% English36% Chinese8% Italian3% Spanish3%

42 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 41 SNS (Social Networking Service) Social networking is a category of Internet applications to help connect friends, business partners, or other individuals together using a variety of tools. These applications, known as online social networks are becoming increasingly popular. Most social network services are primarily web based and provide a collection of various ways for users to interact, such as chat, messaging, email, video, voice chat, file sharing, blogging, discussion groups, and so on. Source: Wikipedia

43 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 42 Second Life Second Life is an Internet-based virtual world developed by Linden Research, Inc. A downloadable client program enables its users, called "Residents", to interact with each other through motional avatars, providing an advanced level of a social network service combined with 3D virtual spaces. Residents can explore, meet other Residents, socialize, participate in individual and group activities, create and trade items (virtual property) and services from one another. Source: Wikipedia

44 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 43 Electronic Commerce (B2B) (trillion yen) Source:2006 White Paper Information & Communications in Japan

45 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 44 Electronic Commerce (B2C) (billion yen) Source:2006 White Paper Information & Communications in Japan

46 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 45 The Long Tail Traditional Market 80% of Sales comes 20% of products TOP 20% of products Other products (80%) The Long Tail Address wide variety demand Amazon.com, Inc. earns 1/3 of its sales from “The Long Tail” area. Sales

47 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 46 Goods Purchased via Net Shopping (%) Source:2006 White Paper Information & Communications in Japan

48 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 47 Goods Bought/Sold via Net Auction (%) Answers from experienced users Multiple answers Source:2006 White Paper Information & Communications in Japan

49 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 48 Impediments to Net Shopping (%) Answers from inexperienced users Multiple answers Source : Internet White Paper 2006 (c) Access Media /impress R&D,2006

50 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 49 Issues about Network Security Unauthorized access using a stolen password Stealing and crashing data files by invalid access to ISP’s servers Wiretapping of data transmitted on the Internet Software/data files infected with computer virus Attack to ISP’s servers by E-mail/packet flood Phishing Pharming

51 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 50 Phishing (Fishing) In computing, phishing is a criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by email or instant messaging, and often directs users to give details at a website, although phone contact has been used as well. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, and technical measures. Source : Wikipedia

52 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 51 Technique of Phishing E-mail sender’s server E-mail sender Real web site of bank, credit card company, etc. E-mail server of recipient × Account no., etc. E-mail urging to enter account no., etc. Personal information such as account no. Falsely claiming to be a real bank and so on, send an e-mail asking for entering personal information such as account no. due to renewal of the system. Show a web link to direct the recipient to a false web site that is set up to steal the personal information.

53 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 52 Damage of Phishing Approximately 5.7 million people received phishing mails. 19% of the phishing mail recipients (about 1.1 million) actually accessed false web sites. 3% (about 1.8 million) of the recipients entered personal information. Financial damage of banks and credit companies amounted to 1.2 billion dollars. Estimation by the Gartner Group based on the hearing from 5,000 Internet users in the U.S.A. between the second half of 2003 and the first half of 2004.

54 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 53 Pharming (Farming) Similar in nature to e-mail phishing, pharming seeks to obtain personal or private (usually financial related) information through domain spoofing. Rather than being spammed with malicious and mischievous e-mail requests for you to visit spoof Web sites which appear legitimate, pharming 'poisons' a DNS server by infusing false information into the DNS server, resulting in a user's request being redirected elsewhere. Your browser, however will show you are at the correct Web site, which makes pharming a bit more serious and more difficult to detect. Phishing attempts to scam people one at a time with an e-mail while pharming allows the scammers to target large groups of people at one time through domain spoofing. Source : Webopedia Computer Dictionary

55 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 54 Reporting of Computer Virus Infection Source:2006 White Paper Information & Communications in Japan

56 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 55 Internet vs. Intranet WWW Browser Inhouse WWW Server Corporate Applications Servers Intranet (LAN-WAN-LAN) Firewall Internet ・ Public Server ・ Proxy Server ・ Mail Server ・ News Server ・ DNS Server etc.

57 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 56 Firewall A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

58 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 57 Remote Access to Corporate Network Customer’s Data Center Router Servers Intranet FENICS Remote LAN Access Network ACE Server Tunneling GW Cellular Phone PHS 123456 Secure ID AP PSTN ISDN Dial-up Router Modem TA - Caller’s number Check - Onetime Password Network Monitoring Center 24 hours/365 days Administration Server Authentication Administrator PSTN / ISDN Modem/TA (RADIUS)

59 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 58 Security Technologies Encryption to protect from loss of privacy Digital Signature to protect from loss of integrity Authentication to protect from spoofing

60 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 59 Encryption Methods Secret- key(Symmetrical) cryptography The same key is used to encrypt and decrypt e.g. DES(Data Encryption Standard) Public-key cryptography A pair of keys, public and private keys, are used. A sender encrypts a message with the receiver’s public key and that message can only be decrypted with the receiver’s private key. e.g. RSA

61 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 60 Privacy-Enhanced Mail(PEM) DES RSA 1. Encrypt a message with a data encryption key(DES) 2. “A” encrypts the data encryption key with “B”’s public key. (RSA) 3. “B” decrypts the data encryption key with “B”’s private key.(RSA) 4. “B” decrypts the message with the decrypted data encryption key(DES) Hello! ?!*&# B’s public key B’s private key Data Encryption Key AB Hello! Data Encryption Key

62 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 61 Digital Signature RSA 1. “A” creates a message digest(MD). 2. “A” encrypts the MD with “A”’s private key(RSA). Digital Signature 3. “B” decrypts the MD with “A”’s public key(RSA) and restore the MD. 4. “B” creates a message digest using the message that “B” received separately. 5. Compare the restored MD and the MD that “B” created. ?!*&# A’s public key A’s private key AB Create Message Digest Compare Hello! A Message Digest(MD) Hello A Create Message Digest Hello!

63 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 62 Spoofing Purchase Order I am A. A A BB Invalid signature Invoice To: A This is A’s public key. ??? A B 1. Person “B” pretends to be Person “A” using B’s private and public keys. 2. “B” places an order with a forged signature. 3. Seller’s authentication system understands “A” placed the order and sends an invoice to “A”. Authentication System

64 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 63 W Certificate Authority RSA A W A A A W W Certificate A B CA(Certificate Authority) W CA’s private key CA’s public key Digital Signature Registration 1. Sender “A” registers his public key to the CA. 2. The CA creates a digital signature with its private key and issues a certificate. 3. If Receiver “B” can decrypt the certificate with the CA’s public key, it is authentic.

65 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 64 Troubles Related to Internet Use Posting harmful messages to BBS Damage someone’s reputation or credibility Spam mail(unsolicited bulk mail) Problems related to home page content Pornography Infringement of third party’s copyright, trademark Invasion of privacy Unlawful business

66 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 65 Domain Name Disputes Collision of domain name Shortage of name space Troubles related to trademarks mcdonald.com matsuzakaya.co.jp Need for creating new gTLDs* Conventional gTLDs :.com,.org,.net,.gov,.edu,.mil,.int New gTLDs :.aero,.biz,.info,.coop,.museum,.name,.pro (*)gTLDs : generic Top Level Domains

67 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 66 Internet Use in Business Strengthen the company's core business Communications with clients/suppliers Publish information outside Increase efficiency of white-collars Intra-company communications Information gathering from the outside Information sharing among employees Explore new business opportunities Online shopping, online publishing, etc.

68 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 67 Examples of Internet Use in Business(1/4) Public Relations Advertisement -Publication of corporate info. -Notification of events -Globalization -Reduced cost -Quickness Personnel -Recruitment -Reduced cost -Two-way commu- nication Sales -Electronic catalog -Online shopping -Reduced cost -Globalization DepartmentApplicationsEffect -- Strengthen Core Business --

69 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 68 Examples of Internet Use in Business(2/4) Purchasing -Globalization -Reduced cost -2-way communi- cation Customer Support -Frequently asked questions(FAQ) -Procurement of components and software Department Applications Effect -- Strengthen Core Business --

70 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 69 Examples of Internet Use in Business(3/4) Personnel -Notice of organizational changes -Notice of personnel shift -Paperless -Quickness General Affairs -Electronic telephone directory -Directions to offices Sales -Various notices -New products information -Communications with customers -Quickness DepartmentApplications Effect -Paperless -Quickness -- Increase Efficiency --

71 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 70 Examples of Internet Use in Business(4/4) Development -Quickness Research -Propagation of research results -Sharing of technical info. -Sharing of design info. DepartmentApplications Effect -Quickness -- Increase Efficiency --

72 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 71 Telecommuting Source:2006 White Paper Information & Communications in Japan (%)(million)

73 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 72 Internet Use for Product Development Quick support Expansion of market Results Shorter development time Product Management Subcontractors University of Illinois WAIS Inc. Instructions, Review Source code Q&A Sales Customer Online shopping FNETInternet NCSA Mosaic WAIS Software Licensing Business

74 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 73 In-house Information Sharing WWW Browser WWW SGML Intranet HTML manuals FIND2FIND2 Information Sharing among System Engineers

75 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 74 Intranet SNS

76 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 75 Shift to Network Based Marketplace Changes of Business Models by Internet Alliance between different industry segments Creation of new sales channels New business relationship Internet based marketing Business expansion

77 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 76 @nifty “New Business Opportunities” Business Partners - Finance - Insurance - Credit Card - Retail - Education - Mobile Service - CATV etc. Creation of New Business Creation of New Business Expanding Subscribers Expanding Subscribers Keeping up momentum Keeping up momentum Subscribers Management,Security, Community Management,Payment System,etc. Collaboration with active companies toward new business on the Internet New Business Opportunities

78 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 77 Channel Services @nifty (portals) Automobile Real Estate/Living Finance Music Women Travel Fortune Telling

79 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 78 Finance@nifty Finance Center (Gateway to the service below) - Bank - Insurance - Trading - Credit Card Investment Gate - Stock market - Mutual Funds - Exchange rate

80 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 79 @nifty BANK @nifty subscribers @nifty Virtual Shop Transfer Balance check Deal check, etc ATM Deposit / Payment Shopping Open an account Internet Banking Deposit/ Payment transfer Call Center inquiry FUJITSU BtoC ◆ Virtual Bank ◆ open accounts Internet Virtual Bank

81 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 80 Broadband Internet On demand Connection Slow Transmission speed Connect time based Pricing Home/Office Access from Always on Fast Flat rate Various places New technologies enabling broadband access CATV, ADSL, FTTH, IMT-2000 New technologies enabling broadband access CATV, ADSL, FTTH, IMT-2000

82 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 81 Broadband Subscribers Source : Internet White Paper 2006 (c) Access Media International,2006 (million)

83 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 82 Comparison of Broadband Rates (US$) Costs per 100Kbps of data trancemission Source: “ITU Internet Reports 2005: The Internet of Things”

84 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 83 e-Japan Strategy (2001) e-Japan Priority Policy Program Foundation of the world's most advanced information & telecommunications networks Promotion of education and development of human resources Facilitation of e-commerce Digitization of administration and application of IT in other public areas Ensuring of security and reliability on advanced information & telecommunications networks Realize the world's most advanced IT nation within 5 years.

85 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 84 u-Japan Strategy (2006) User-oriented From the user’s point of view Unique Be something special ○Create individual energy ・ A new society where your dreams come true ○ Re- Vitalize the society ・ Create new social systems and business services ・ Get out from the norm and realize local revitalization by creative means Ubiquitous Connects everyone and everything ○An easy-to-use network anytime, anywhere, with anything and for anyone. ・ ICT will be part & parcel of daily life to create a user-friendly society ○Person2Person plus Person2Goods, and Goods2Goods ・ Communications will play a more important role in society from every and all aspects u-Japan ( Ubiquitous Japan ) Universal User-friendly ○Easy to use ・ Can be used by anyone regardless of equipment or network complexity ・ The aged and disabled will be able to participate in society by means of ICT ○Interaction ・ A heart to heart interaction overcoming barriers between generations and localities to create togetherness 4U = For You ○Close to the user ・ For a society that is user-orientated rather than a society where products are only provided by the supplier ・ Developing technologies and services that are connected to our needs ○Users become suppliers ・ Creating a total of 100 million consumers with network dynamics

86 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 85 u-Japan Strategy u-Japan Policy Package Network collaboration infrastructure Promotion of content production, distribution and usage Social systems reform for advanced ICT use ICT human resources Nationwide broadband infrastructure International strategy Technological strategy Selecting priority issues to be addressed and developing associated strategies (ICT Safety and Security 21 strategy) Seamless wired/wireless access environments Real-objects networking Promoting universal design Identifying the negative aspects Responding to important emerging issues for the future Ubiquitous networks development Advanced ICT use Improvement of ICT use environment By FY2010:  Eliminate zero-broadband areas ( During the process eliminate zero-broadband cities and towns by 2008)  Ensure over 90% household access to ultra high-speed broadband networks By FY2010:  Eliminate zero-broadband areas ( During the process eliminate zero-broadband cities and towns by 2008)  Ensure over 90% household access to ultra high-speed broadband networks

87 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 86 User Evaluation of Broadband Services Source : InfoCom Research, Inc.

88 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 87 Content/Applications of Broadband Network Source : InfoCom Research, Inc.

89 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 88 Broadband Network & Enterprises ◆ Reduced time for design/manufacturing/procurement by sharing information ◆ Speedy decision making by sharing information and network based conference ◆ Direct communication between enterprises and cutomers ◆ Reduced time for design/manufacturing/procurement by sharing information ◆ Speedy decision making by sharing information and network based conference ◆ Direct communication between enterprises and cutomers Work-from-home Procurement Video Chat Two way communication with rich content -Extensive Collaboration- Broadband Network

90 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 89 Broadband Network & Local Government ◆ Administrative Reform - Outsourcing, merger of cities and villages ◆ Improve regional services by making use of services from private sectors ◆ Reform services for citizens - Network based services accessible from home ◆ Administrative Reform - Outsourcing, merger of cities and villages ◆ Improve regional services by making use of services from private sectors ◆ Reform services for citizens - Network based services accessible from home < Healthcare Center > Regional Information DB -Local Government Becoming an Information Center- Broadband Network

91 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 90 e-Government Application systems through the Internet Source:2006 White Paper Information & Communications in Japan

92 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 91 - PoD (Program on Demand) Service - 'Keiko(Practice)' and 'Manabu(Learn)'

93 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 92 Transition of Internet Use Research E-mail Communication Information lifeline Personalization Push type information delivery Applications based on life style/local community Always-on connectivity PCs Diversified Access Devices Broadband UNIX machines Browser Search Engine Banner Ads.

94 All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 93 Communication Home Factories Remote Healthcare BtoBEDI/CRM Online Library SCM/CRM Enterprises Public Services Online School E-Government BtoC/CtoB/PtoP Online Content ( Newspaper ・ Magazine ・ Music ・ Movie ) Online Finance Electronic Money Digital Broadcasting E-mail, Web, Motion picture Broadband Always-on Internet access will be available whenever you want, wherever you are, and for whatever you like. Emerging Broadband Era


Download ppt "All Rights Reserved, Copyright (C) FUJITSU LIMITED 2007 Trends of Internet Use in Japan 26 June, 2007 Shigeyuki Suzuki FUJITSU LIMITED For Educational."

Similar presentations


Ads by Google