Conferencia impartida durante el Congreso CRM + Social Media + Centros de Contato México 2011 organizado por Mundo Contact a cargo de Pedro Gomez, Senior Solution Manager de Huawei
The 2013 Deloitte Undergraduate Case Competition challenged students to develop strategy, technology, and human capital recommendations for MAD HATS, a company that donates a hat to a person in need for each hat purchased by one of their customers.
The 2013 Deloitte Undergraduate Case Competition challenged students to develop strategy, technology, and human capital recommendations for MAD HATS, a company that donates a hat to a person in need for each hat purchased by one of their customers.
This presentation was delivered at the PMA Food Service Conference in Monterey, California, on July 25, 2015. It focused on psychographic segmentation and its application to health, wellness, nutrition and produce growers & sellers
Analysis of stock market after Covid-19 By Anshika SinghAnshikaSingh141
The rapid spread of the unprecedented COVID- 19 pandemic has put the world in jeopardy and changed the global outlook unexpectedly.
As many countries adopt strict quarantine policies to fight with the unseen pandemic, their economic activities are suddenly shut down
Most of the developed and developing countries’ financial markets were drastically affected by this pandemic. Here we would like to observe and analyse the impact of COVID-19 on certain sectors of the indian economy in the stock market
Vodafone strategic management analysis and business analysis vodafone strategy analysis, poster five forces analysis, porter five forces analysis,competitor analysis,swot nalysis,external and internal environment analysis
This presentation was delivered at the PMA Food Service Conference in Monterey, California, on July 25, 2015. It focused on psychographic segmentation and its application to health, wellness, nutrition and produce growers & sellers
Analysis of stock market after Covid-19 By Anshika SinghAnshikaSingh141
The rapid spread of the unprecedented COVID- 19 pandemic has put the world in jeopardy and changed the global outlook unexpectedly.
As many countries adopt strict quarantine policies to fight with the unseen pandemic, their economic activities are suddenly shut down
Most of the developed and developing countries’ financial markets were drastically affected by this pandemic. Here we would like to observe and analyse the impact of COVID-19 on certain sectors of the indian economy in the stock market
Vodafone strategic management analysis and business analysis vodafone strategy analysis, poster five forces analysis, porter five forces analysis,competitor analysis,swot nalysis,external and internal environment analysis
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...Xenesys
Le presentazioni dell'evento del 15 maggio 2012, organizzato da Xenesys al The Westin Excelsior Hotel di Firenze. Gli argomenti della virtualizzazione degli applicativi core, della protezione dei dati in azienda e del cloud computing affrontati con il contributo degli esperti di EMC, VMware e 9Proof.
SaaS is just a new way of delivering the same software and with that all the associated changes , including billing. The hidden costs like installation, customization, integration still looms large. For the small businesses consumerization of enterprise technologies is still a dream. However,there are some new technologies (like ontology, semantics, AI, cloud computing) that can make this a possibility in the next 2-3 years
Imaginea brings more than 12 years of product engineering and services to software companies from several different industries at any stage of the life-cycle process. Through the use of several technologies and strong, innovative development processes, we deliver dependable software products at a lower cost and fulfill our customer’s business needs.
It is no wonder then that all of our customers, from the startups to the big guys, call on us for comprehensive development of core products and are often return customers!
We provide product engineering services with a very reliable technology partnership to independent software vendors, enterprises and online SaaS businesses. Services are comprehensive and cover the development process from beginning to end.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
5. Simplify installation and configuration,
Reduce system maintenance
Pre-installing software,
Building a complete contact
center platform only need 2
Pre-installed software
hours
Pre-producing configuration
script, Speeding up the
Simplify installation
configuration and reducing the
difficulty of configuration
Reduce
Configured script difficulty of Reducing
configuration ALL-IN-One
and Solution OPEX
maintenance
GUI interface,Graphic
designing and only six
Central Simplify configuration
Configuration
steps to complete the
Sets configuration
B / S architecture, graphic
WAS designing for configuration,
Server monitoring and quality
control
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 5
6. More opening, More flexible
Standard TSAPI interface, easy
to integrate with business
New business
platform
Existing business
system system
Compatible with existing business
system, Protecting customer’s
investment
TSAPI Interface
Easy to integrate with their own
business system, providing a richer
solution
TSAPI Interface
Server
UAP3300
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 6
7. Abundant Function — Meet the
requirements of SMB
Monitor Report
Completely function,
meeting the
A cabinet- requirements of SMB
CTI,IVR
based
Record Routing
solutions
Intelligently
Inspect Huawei’s ALL-IN-One
solution; reducing
ACD,PBX integration work,
improving system
reliability
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 7
8. Voice Conference Record Highlights
High capability
Record real time
Record reliability
Record successful rate
Easy implementation
Conference Low network requirement
room Distributed voice record
Reduce network bandwidth
consumption
High voice quality
Support multiple record format Multiple voice record
format
Support agent voice record
Multiple voice process
capability
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 8
10. For Better Understanding
60 IVR and 60 Agents with full record and 99.999% reliability
MCU: 99.999%
reliability Call
... Distribution S8700 * 2
ACD + Media Server
(IVR, E1 Trunk: PSTN
Recording) MGW with 12 E1
G650
IVR & Recording
UAP3300 Resource
AIR+NICE Recording/…
CTI+IVR
Logic
CTI/Smart CTI AIC+AIR
Support
Applications WFM: IEX
WFM/Work Flow/KBS Work Flow: Remedy/…
...
KBS:…
All the Software License is sold by Software version, not by time.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 10
Page 10
11. Specification(20 Agents)
UAP3300
• PSTN/NGN connection
• Media resources PC Server, IBM X3650M2,
• ACD function 2*Xeon quad-core5504 2.0GHz
8G(4*2G)
Specification
1. One PC Server is used for
1. 20 Agents with voice
CTI/IVR//Monitor/Quality
record
inspection/Jcccbar
2. 40 IVR
2. One PC Server is used for File
3. 60 Trunk
Voice record file storage Server DB/report
=20Agent * 8 Hour * 30 Day * 3
Month/ 97 hour=150G
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 11
12. Specification(50 Agents)
UAP3300
• PSTN/NGN connection PC Server, IBM X3650M2,
• Media resources 2*Xeon quad-core5504 2.0GHz
• ACD function 8G(4*2G)
Specification 1. One PC Server is used for
1. 50 Agents with voice CTI/IVR//Monitor/Quality
record inspection/Jcccbar
2. 70 IVR 2. One PC Server is used for File
3. 120 Trunk Server DB/
Voice record file storage
=50Agent * 8 Hour * 30 Day * 3 3. One PC Server is used for report
Month/ 97 hour=375G
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 12
14. Huawei UAP3300 ACD
Function Specification
Narrowband and Smaller Dimension.
Powerful Capability 6U,250W
broadband integration
All In One Box 2 MCU board slots
equipment
8 service board slots
Abundant media Simple configuration
resource function. 3 type service boards
Flexible network structure.
Flexible network Smooth expansion
structure Telecom Level Reliability
ACD IVR Outbound
FAX TTS Record
PBX ASR Conference
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 14
15. UAP3300-MRS board function
It is controlled by CTI platform and MCU
Call Center Network
File Server TTS/ASR
Platform Management Server It connects to outside network through MCU.
MRS UAP internal network is double plane.
This can ensure the reliability.
One UAP3300 supports 6 MRS boards maximum.
MRS boards are load balance relationship.
MCU MCU
UAP3300 Internal IP
Network MRS Board Function
• Voice announcement
MRS Board • Digital receiving
• Voice record
UAP3300
Internal • Fax ability(T30.T38)
Structure • TTS/ASR integration ability
• Outbound detection ability
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 15
16. CTI Platform-Routing based on preset skill
Number A Agent 1
Telephone Number A Skill 1
Telephone Number B Access Number B
IMS/NGN Skill 2
/PSTN Platform
Telephone Number C Number C
Skill 3
Agent 2
Each agent has multiple skill abilities. This can increase agent utilization
ratio.
If agent has multiple skills, each agent’s skill has different level.
Supports several agent distribution modes, such as optimal skill matching,
average distribution, most skill first, and highest skill level first. Each call can
be distributed to the proper agent.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 16
17. CTI Platform-CTI System Management Tool
The features of the
configuration
console are as
follows:
Providing a wizard
configuration mode
Managing
scheduled tasks
Adding or deleting
configurations in
batches
Providing the
powerful function of
querying
configuration items
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 17
18. CTI Platform-Monitoring Console with Powerful
Functions
The features of the
monitoring console are
as follows:
Monitoring data items
and supporting the
function of customizing
to-be-displayed
diagrams
Supporting the
customization of the
function that key
indexes are displayed
on the scroll bar.
Managing agent seat
diagrams online
Providing the detailed
indexes of the running
of components
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 18
19. CTI Platform-Quality Control Service
1 2 3 4
QC QC Quality Other
Preparation Appraisal Analysis Functions
QC relationship Media recording QC result analysis General query
management management Analysis of Case management
Appraisal item Extraction policy appraisal item …
management management results
Appraisal template QC plan QC volume
management management analysis
… Playback and scoring Analysis of the
of media records number of special
Real-time SNs
supervision …
…
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 19
21. CTI Platform
-Multiple Service Development Tool
OPEN API
JTAPI
CCCBAR
COM/DCOM
ActiveX/DLL
SCE Tool VXML Tool
Abundant interfaces C/JAVE development environment.
Abundant Development Tool Development Supporting Team
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 21
22. Voice Conference Record Solution
File Server
E1 Trunk
Core LAN
File Server
Switch
UAP3300
Agent Access
LAN Switch
Media stream
File transfer stream
Agent phone
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 22
23. Agent framework interface
System provides abundant interfaces for Agent Workplace Development.
› API. ActiveX, CCCBAR, JCCCBAR, JTAPI
SN Area Function
1 Status switch area Show and switch the agent status, such as idle ,connected ,wrap up, busy,etc.
2 Call connection area Hold Call ,Mute Call, Transfer Call and Initial Call
3 Call information area Show the calling party information and call type
4 Operation result area Show the result of an operation performed and display new notes
5 Bulletin and email Handle the bulletin and e-mail message
information area
6 Floating work area After an agent answers a call, the system displays the floating work area according to the
call type.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 23
24. Multiple Service Development Tools
OPEN API
JTAPI
CCCBAR
COM/DCOM
ActiveX/DLL
SCE Tool VXML Tool
Abundant interfaces C/JAVE development environment.
Abundant Development Tool Development Supporting Team
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 24
26. Worldwide Applications for SMEs
Mauritania Mobile
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 26
27. Helping Vodafone Add Real Value to SMEs
Challenges:
Full-service operation: from GSM to 3G, FMC & Internet
Vodafone has more than 85% of SMEs in the enterprise market.
The churn rate is greater than 30%.
The partner control capability is weak.
Huawei Solution:
Business place for developers and partners
Enterprise gateway: office-in-a-box for SMEs to provide
connectivity, security, and services
Benefits to Customers:
Service revenue in addition traffic revenue: increased by 30%
Better partner management, service innovation, and service
creation
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 27
28. Nigeria MTN Case
Number of Subs grows fast
Fast implementation
Smooth expanding to large scale
Nigeria MTN CASE:
•50 seats for first phase.
•Geographic Redundancy.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 28
29. Ordering secretary in Shanghai 021-57575777
Customer Challenges
People has generally accepted the way to order in restaurant
by telephone.
Contact center made by board often overload, even down
when ordering in peak time.
Huawei Solutions
Keep the original brand - access number 021-57575777
Compatible with the original carrier access
Huawei integrated solutions, including carrier-class reliability
ACD, proven anti-surge capability
Customer Value
Protecting the original customer resources by keeping original access number, original habit of using.
Huawei‘s ALL-IN-One solutions eliminate the customer’s worries, customers no longer have to worry about
the peak traffic impact for ordering.
Number of customers’ ordering is rising for the following months
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 29