This document discusses various applications of artificial intelligence in the telecom sector. It begins with an overview of the basics of AI and its present status in telecom. It then discusses using AI to improve network monitoring through drone usage and improve customer experience metrics like quality of experience. Other topics discussed include using AI for customer care applications, disaster management, and detecting fraudulent SIM subscribers through facial recognition. The document emphasizes that AI can help telecom companies deliver better customer experience, introduce new products, and reduce costs through automation.
AI in Telecom: How artificial intelligence is reshaping the vision of telco i...Data Driven Innovation
1) Artificial intelligence is reshaping the telecommunications industry by enabling new customer-centric services and helping telcos compete with over-the-top players.
2) AI can help telcos optimize network infrastructure, improve customer service through predictive analytics, enable personalized marketing, and create self-healing networks.
3) Deep learning techniques are well-suited for the telco domain due to large amounts of network and customer data, distributed computing resources, and the ability to perform online training at network edges.
This document provides an overview of Low Power Wide Area Networks (LPWAN) technologies. It discusses the key characteristics of LPWAN such as operating at a long range of up to 10km using little battery power and transmitting small amounts of data. It summarizes the major LPWAN technologies including LoRaWAN, Sigfox, NB-IoT and LTE-CAT M1. It also outlines the growth in the number of LPWAN devices, networks and applications. Examples of common LPWAN uses cases like smart metering and asset tracking are also highlighted.
The document provides an overview of 3GPP 5G Core network architecture. Some key points:
- It defines a service-based architecture with network functions that expose capabilities via REST APIs.
- Control and user plane functions are separated for independent scalability. Functions are also modularized to enable network slicing.
- The 5G core network supports features like edge computing, network slicing, mobility management, and session management.
- It evolves from previous generations with a cloud-native design, virtualization, and exposure of capabilities via APIs.
Tutorial at IEEE IM 2019.
The tutorial will provide a comprehensive coverage of the Network Automation domain starting with the scope and definitions, introducing the challenges and then developing the different approaches to realize complete future network automation solutions. A special focus will be put on the newly created ETSI ISG ZSM "Zero Touch Network and Service Management" and the standardization landscape.
This presentation covers the challenges with Enterprise WAN, discuss how SD-WAN promise to address the problem and lastly Nuage Network SD-WAN solution, Virtualized Network Services (VNS)..
Qualcomm is developing 5G NR technology to enable a unified 5G air interface that can address diverse spectrum types, services, and deployments. 5G will transform industries and society by connecting billions of devices and delivering new immersive experiences with requirements such as ultra-low latency and ultra-high reliability. Qualcomm is leading innovations for 5G NR such as optimized waveforms, scalable numerology and transmission time interval, efficient spectrum utilization techniques, and support for diverse spectrum bands and deployments.
EMA’s published software-defined wide-area network (SD-WAN) transformation research, based on a survey of 303 enterprise IT professionals, identifies best practices for modernizing the WAN with SD-WAN and other technology.
These slides from the webinar featuring EMA VP of Research Shamus McGillicuddy
- Give results from EMA’s industry-leading research in enterprise WAN strategies by looking at the dos and don’ts of SD-WAN projects
- Explore emerging requirements for secure access service edge (SASE) solutions
- Examine how the COVID-19 pandemic has affected these networks
AI in Telecom: How artificial intelligence is reshaping the vision of telco i...Data Driven Innovation
1) Artificial intelligence is reshaping the telecommunications industry by enabling new customer-centric services and helping telcos compete with over-the-top players.
2) AI can help telcos optimize network infrastructure, improve customer service through predictive analytics, enable personalized marketing, and create self-healing networks.
3) Deep learning techniques are well-suited for the telco domain due to large amounts of network and customer data, distributed computing resources, and the ability to perform online training at network edges.
This document provides an overview of Low Power Wide Area Networks (LPWAN) technologies. It discusses the key characteristics of LPWAN such as operating at a long range of up to 10km using little battery power and transmitting small amounts of data. It summarizes the major LPWAN technologies including LoRaWAN, Sigfox, NB-IoT and LTE-CAT M1. It also outlines the growth in the number of LPWAN devices, networks and applications. Examples of common LPWAN uses cases like smart metering and asset tracking are also highlighted.
The document provides an overview of 3GPP 5G Core network architecture. Some key points:
- It defines a service-based architecture with network functions that expose capabilities via REST APIs.
- Control and user plane functions are separated for independent scalability. Functions are also modularized to enable network slicing.
- The 5G core network supports features like edge computing, network slicing, mobility management, and session management.
- It evolves from previous generations with a cloud-native design, virtualization, and exposure of capabilities via APIs.
Tutorial at IEEE IM 2019.
The tutorial will provide a comprehensive coverage of the Network Automation domain starting with the scope and definitions, introducing the challenges and then developing the different approaches to realize complete future network automation solutions. A special focus will be put on the newly created ETSI ISG ZSM "Zero Touch Network and Service Management" and the standardization landscape.
This presentation covers the challenges with Enterprise WAN, discuss how SD-WAN promise to address the problem and lastly Nuage Network SD-WAN solution, Virtualized Network Services (VNS)..
Qualcomm is developing 5G NR technology to enable a unified 5G air interface that can address diverse spectrum types, services, and deployments. 5G will transform industries and society by connecting billions of devices and delivering new immersive experiences with requirements such as ultra-low latency and ultra-high reliability. Qualcomm is leading innovations for 5G NR such as optimized waveforms, scalable numerology and transmission time interval, efficient spectrum utilization techniques, and support for diverse spectrum bands and deployments.
EMA’s published software-defined wide-area network (SD-WAN) transformation research, based on a survey of 303 enterprise IT professionals, identifies best practices for modernizing the WAN with SD-WAN and other technology.
These slides from the webinar featuring EMA VP of Research Shamus McGillicuddy
- Give results from EMA’s industry-leading research in enterprise WAN strategies by looking at the dos and don’ts of SD-WAN projects
- Explore emerging requirements for secure access service edge (SASE) solutions
- Examine how the COVID-19 pandemic has affected these networks
IIoT Digital Transformation for Plant Equipment MonitoringYokogawa1
This presentation discusses Yokogawa's IIoT solutions for plant equipment monitoring using wireless sensors and artificial intelligence. It introduces their "Sushi sensor" for vibration and temperature monitoring, which uses LoRaWAN for long-range communication. The presentation explains how the sensors and Yokogawa's GA10 gateway can be used to automate anomaly detection in equipment using AI algorithms. This helps shift maintenance from time-based to condition-based approaches by enabling early failure prediction. Case studies show the sensors detected a pump abnormality weeks before failure through automated machine learning of sensor data trends.
This document provides an overview of low-power wide-area networks (LPWAN) for internet of things (IoT) applications. It introduces different LPWAN technologies including LoRa, Sigfox, and NB-IoT and compares their characteristics such as data rates, power consumption, range, and security features. The document also discusses LPWAN standards from various standards bodies and the benefits of using LPWAN networks, concluding that each technology is suited for different IoT use cases depending on cost, battery life, range, and communication needs.
Mavenir: Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enter...Mavenir
Dean Bubley, Founder of Disruptive Analysis and well known industry analyst, and Aniruddho Basu, Mavenir SVP/GM of Global Emerging Business, showcase the future of Private LTE & 5G Networks. Presentation from the "Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enterprises" webinar.
Private 5G Networks at the Queen's Funeral and ElsewhereKieran Kunhya
This document discusses the use of private 5G networks for broadcast production, including their use to provide remote camera feeds for coverage of Queen Elizabeth II's funeral. Key points:
- Private 5G networks can provide dedicated high-bandwidth, low-latency connections for applications like remote camera feeds without relying on public networks.
- A demonstration of a private 5G network was used to provide remote camera feeds from the Pitlochry Highland Games in Scotland.
- When additional remote camera coverage was needed at short notice for the Queen's funeral, the same private 5G network technology was deployed to provide feeds from the airport.
- The funeral coverage demonstrated the potential for private 5G networks to provide primary
This document discusses the intersection of 5G networks and open reference platforms. Open reference platforms using disaggregated RAN architectures and open interfaces can offer new user experiences through edge computing and adaptive analytics. Challenges include developing principles for graph abstraction of radio networks and understanding service layers and multi-tenancy in open and democratized architectures. Open source communities and standards bodies are collaborating on initiatives like O-RAN and ONAP to define open interfaces and platforms that enable a more programmable radio access network.
Emerging Trends in Hybrid-Cloud & Multi-Cloud StrategiesChaitanya Atreya
As Cloud Computing rapidly evolves, newer deployment strategies such as Hybrid-Cloud, Multi-Cloud and On-Prem Cloud are emerging. More and more enterprise solution providers are offering support for a combination of these deployment targets. It is imperative that the larger organizations have a clear Hybrid-Cloud and Multi-Cloud strategy to avoid cloud lock-in and to de-risk business decisions.
What do each of these terminologies mean? What is the scope of each and overlap if any? We will discuss the emerging best-practices across these interdisciplinary trends, especially in the context of Modern Data and Analytics Platforms and Enterprise Self-Service.
This document summarizes the evolution of Swisscom's network analytics capabilities from 2015 to the present. It discusses moving from basic network monitoring to a data mesh architecture enabling closed-loop network operations. Key developments include onboarding more platforms and metrics, anomaly detection, visualization, and collaborating with IETF on standards like BGP Monitoring Protocol, IPFIX, and YANG push notifications. The goal is network visibility to make informed decisions and recognize service interruptions before customers. Future work involves standardizing extensions for additional RIB coverage, segment routing, and route policies.
The document discusses security considerations for 5G networks. It notes that security has been built into 5G from the start of its development. It advocates for a multi-layered security approach beyond 3GPP specifications to secure the radio access network, software-defined networking, multi-access edge computing, hybrid multi-cloud deployments, and continuous integration/continuous delivery pipelines. It also emphasizes the need for collaboration between stakeholders like mobile operators, cloud providers, and system integrators to define security roles and responsibilities as 5G integrates with other technologies and moves to cloud-native network functions.
With the Ericsson 5G Core System we have built an architecture that is highly flexible, modular, and scalable. It supports a much higher degree of programmability and is ready to exist in a cloud-based environment. We help you to quickly react to new challenges and capture any business opportunity that arise.
5G is going mainstream across the globe, and this is an exciting time to harness the low latency and high capacity of 5G to enable the metaverse. A distributed-compute architecture across device and cloud can enable rich extended reality (XR) user experiences. Virtual reality (VR) and mixed reality (MR) are ready for deployment in private networks, while augmented reality (AR) for wide area networks can be enabled in the near term with Wi-Fi powered AR glasses paired with a 5G-enabled phone. Device APIs enabling application adaptation is critical for good user experience. 5G standards are evolving to support the deployment of AR glasses at a large scale and setting the stage for 6G-era with the merging of the physical, digital, and virtual worlds. Techniques like perception-enhanced wireless offer significant potential to improve user experience. Qualcomm Technologies is enabling the XR industry with platforms, developer SDKs, and reference designs.
Check out this webinar to learn:
• How 5G and distributed-compute architectures enable the metaverse
• The latest results from our boundless XR 5G/6G testbed, including device APIs and perception-enhanced wireless
• 5G standards evolution for enhancing XR applications and the road to 6G
• How Qualcomm Technologies is enabling the industry with platforms, SDKs, and reference designs
1) 5G shared spectrum technologies pioneered by Qualcomm such as LTE-U, LAA, LWA and MulteFire can unlock unused spectrum and improve spectrum utilization.
2) Qualcomm has contributed significantly to shared spectrum standards like CBRS and is a founder of alliances to develop shared spectrum technologies.
3) 5G New Radio is being designed by Qualcomm to support flexible deployment in shared, licensed, and unlicensed spectrum bands using technologies like LAA and MulteFire.
The number of internet-connected devices is growing exponentially, enabling an increasing number of edge applications in environments such as smart cities, retail, and industry 4.0. These intelligent solutions often require processing large amounts of data, running models to enable image recognition, predictive analytics, autonomous systems, and more. Increasing system workloads and data processing capacity at the edge is essential to minimize latency, improve responsiveness, and reduce network traffic back to data centers. Purpose-built systems such as Supermicro’s short-depth, multi-node SuperEdge, powered by 3rd Gen Intel® Xeon® Scalable processors, increase compute and I/O density at the edge and enable businesses to further accelerate innovation.
Join this webinar to discover new insights in edge-to-cloud infrastructures and learn how Supermicro SuperEdge multi-node solutions leverage data center scale, performance, and efficiency for 5G, IoT, and Edge applications.
L&T offers private 5G network solutions for various industrial uses. Private 5G networks provide dedicated wireless connectivity within a defined area, with lower latency and increased reliability compared to private 4G. L&T's offerings include turnkey private 5G networks bundled with services for healthcare, sports and entertainment streaming, industrial automation at ports and manufacturing plants, and public safety services across a city. The solutions provide benefits like remote access to experts, real-time monitoring, cost savings, security and improved emergency response.
1) The document discusses 5G and its rapid rollout globally, with over 60 countries having launched commercial 5G networks by 2020 and over 170 countries having released national digital strategies emphasizing 5G and AI.
2) It outlines challenges around 5G deployment and building the 5G business ecosystem, and presents Huawei's solutions to address technical challenges through continuous innovation and help operators succeed in 5G business through ecosystem construction.
3) Huawei is committed to long-term technology leadership through the largest R&D investment in the industry and has developed 10 leading 5G product solutions to empower operators with 5G.
During the OpenStack Tokyo Summit we provided an overview on how Workday started the production deployment with a very robust and efficient CI/CD process that it explained here.
Overview of standardisation status and 3GPP technology evolution trend3G4G
Presented by Sylvia Lu, Senior Engineer, Cellular Technology, u-blox UK at Cambridge Wireless event Radio technology for 5G – making it work on 18 Sep 2018
*** SHARED WITH PERMISSION ***
This document outlines several potential 5G use cases including AR/VR gaming, virtual/augmented reality, monitoring and surveillance, fixed wireless access to homes, connected cars providing in-vehicle infotainment, connected stadiums providing multiple camera views and virtual experiences to fans, connected factories, vehicle-to-everything communications to enable autonomous vehicles, remote surgery, and further reading on additional use cases.
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable SolutionsRadisys Corporation
View these slides, presented by Prakash Siva, VP, Technology & Strategy, hosted by Intel Network Builders, around the subject of Mobile Edge Computing.
Making 5G New Radio a Reality - by QualcommAydin Karaer
Qualcomm is developing 5G NR technology to enable a unified 5G air interface that can address diverse spectrum types, services, and deployments. 5G will transform industries and society by connecting billions of devices and delivering new immersive experiences with requirements such as ultra-low latency and ultra-high reliability. Qualcomm is leading innovations for 5G NR such as advanced channel coding, massive MIMO, and mobilizing mmWave to achieve the speed, capacity, and low latency goals of 5G over the next decade.
This document summarizes a webinar on fraud management and compliance. The webinar covered several topics:
- A CFCA survey that found global fraud losses increased 15% in 2013, with revenue share fraud as the largest threat.
- The TM Forum's fraud classification model and survey, which found revenue share fraud is driving other fraud types.
- Account takeover fraud, where fraudsters manipulate customer service processes to gain access to accounts. Pressure points like authentication and sales incentives enable this fraud.
- Fighting fraud through cyber intelligence techniques like monitoring dark web sites and forums where fraudsters share tactics and stolen customer information.
Using machine learning algorithms to detect frauds in telephone networks during pandemic
Telephone fraud costs companies billions each year. This document proposes using machine learning algorithms to analyze voice traffic data from telephone networks to detect fraud. It involves collecting call data records, preprocessing the data, applying dimension reduction techniques and machine learning models like logistic regression and random forests to identify fraudulent calls. Implementing these algorithms could help telecom companies reduce financial losses, detect fraud earlier, and prevent network congestion from fraudulent traffic.
IIoT Digital Transformation for Plant Equipment MonitoringYokogawa1
This presentation discusses Yokogawa's IIoT solutions for plant equipment monitoring using wireless sensors and artificial intelligence. It introduces their "Sushi sensor" for vibration and temperature monitoring, which uses LoRaWAN for long-range communication. The presentation explains how the sensors and Yokogawa's GA10 gateway can be used to automate anomaly detection in equipment using AI algorithms. This helps shift maintenance from time-based to condition-based approaches by enabling early failure prediction. Case studies show the sensors detected a pump abnormality weeks before failure through automated machine learning of sensor data trends.
This document provides an overview of low-power wide-area networks (LPWAN) for internet of things (IoT) applications. It introduces different LPWAN technologies including LoRa, Sigfox, and NB-IoT and compares their characteristics such as data rates, power consumption, range, and security features. The document also discusses LPWAN standards from various standards bodies and the benefits of using LPWAN networks, concluding that each technology is suited for different IoT use cases depending on cost, battery life, range, and communication needs.
Mavenir: Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enter...Mavenir
Dean Bubley, Founder of Disruptive Analysis and well known industry analyst, and Aniruddho Basu, Mavenir SVP/GM of Global Emerging Business, showcase the future of Private LTE & 5G Networks. Presentation from the "Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enterprises" webinar.
Private 5G Networks at the Queen's Funeral and ElsewhereKieran Kunhya
This document discusses the use of private 5G networks for broadcast production, including their use to provide remote camera feeds for coverage of Queen Elizabeth II's funeral. Key points:
- Private 5G networks can provide dedicated high-bandwidth, low-latency connections for applications like remote camera feeds without relying on public networks.
- A demonstration of a private 5G network was used to provide remote camera feeds from the Pitlochry Highland Games in Scotland.
- When additional remote camera coverage was needed at short notice for the Queen's funeral, the same private 5G network technology was deployed to provide feeds from the airport.
- The funeral coverage demonstrated the potential for private 5G networks to provide primary
This document discusses the intersection of 5G networks and open reference platforms. Open reference platforms using disaggregated RAN architectures and open interfaces can offer new user experiences through edge computing and adaptive analytics. Challenges include developing principles for graph abstraction of radio networks and understanding service layers and multi-tenancy in open and democratized architectures. Open source communities and standards bodies are collaborating on initiatives like O-RAN and ONAP to define open interfaces and platforms that enable a more programmable radio access network.
Emerging Trends in Hybrid-Cloud & Multi-Cloud StrategiesChaitanya Atreya
As Cloud Computing rapidly evolves, newer deployment strategies such as Hybrid-Cloud, Multi-Cloud and On-Prem Cloud are emerging. More and more enterprise solution providers are offering support for a combination of these deployment targets. It is imperative that the larger organizations have a clear Hybrid-Cloud and Multi-Cloud strategy to avoid cloud lock-in and to de-risk business decisions.
What do each of these terminologies mean? What is the scope of each and overlap if any? We will discuss the emerging best-practices across these interdisciplinary trends, especially in the context of Modern Data and Analytics Platforms and Enterprise Self-Service.
This document summarizes the evolution of Swisscom's network analytics capabilities from 2015 to the present. It discusses moving from basic network monitoring to a data mesh architecture enabling closed-loop network operations. Key developments include onboarding more platforms and metrics, anomaly detection, visualization, and collaborating with IETF on standards like BGP Monitoring Protocol, IPFIX, and YANG push notifications. The goal is network visibility to make informed decisions and recognize service interruptions before customers. Future work involves standardizing extensions for additional RIB coverage, segment routing, and route policies.
The document discusses security considerations for 5G networks. It notes that security has been built into 5G from the start of its development. It advocates for a multi-layered security approach beyond 3GPP specifications to secure the radio access network, software-defined networking, multi-access edge computing, hybrid multi-cloud deployments, and continuous integration/continuous delivery pipelines. It also emphasizes the need for collaboration between stakeholders like mobile operators, cloud providers, and system integrators to define security roles and responsibilities as 5G integrates with other technologies and moves to cloud-native network functions.
With the Ericsson 5G Core System we have built an architecture that is highly flexible, modular, and scalable. It supports a much higher degree of programmability and is ready to exist in a cloud-based environment. We help you to quickly react to new challenges and capture any business opportunity that arise.
5G is going mainstream across the globe, and this is an exciting time to harness the low latency and high capacity of 5G to enable the metaverse. A distributed-compute architecture across device and cloud can enable rich extended reality (XR) user experiences. Virtual reality (VR) and mixed reality (MR) are ready for deployment in private networks, while augmented reality (AR) for wide area networks can be enabled in the near term with Wi-Fi powered AR glasses paired with a 5G-enabled phone. Device APIs enabling application adaptation is critical for good user experience. 5G standards are evolving to support the deployment of AR glasses at a large scale and setting the stage for 6G-era with the merging of the physical, digital, and virtual worlds. Techniques like perception-enhanced wireless offer significant potential to improve user experience. Qualcomm Technologies is enabling the XR industry with platforms, developer SDKs, and reference designs.
Check out this webinar to learn:
• How 5G and distributed-compute architectures enable the metaverse
• The latest results from our boundless XR 5G/6G testbed, including device APIs and perception-enhanced wireless
• 5G standards evolution for enhancing XR applications and the road to 6G
• How Qualcomm Technologies is enabling the industry with platforms, SDKs, and reference designs
1) 5G shared spectrum technologies pioneered by Qualcomm such as LTE-U, LAA, LWA and MulteFire can unlock unused spectrum and improve spectrum utilization.
2) Qualcomm has contributed significantly to shared spectrum standards like CBRS and is a founder of alliances to develop shared spectrum technologies.
3) 5G New Radio is being designed by Qualcomm to support flexible deployment in shared, licensed, and unlicensed spectrum bands using technologies like LAA and MulteFire.
The number of internet-connected devices is growing exponentially, enabling an increasing number of edge applications in environments such as smart cities, retail, and industry 4.0. These intelligent solutions often require processing large amounts of data, running models to enable image recognition, predictive analytics, autonomous systems, and more. Increasing system workloads and data processing capacity at the edge is essential to minimize latency, improve responsiveness, and reduce network traffic back to data centers. Purpose-built systems such as Supermicro’s short-depth, multi-node SuperEdge, powered by 3rd Gen Intel® Xeon® Scalable processors, increase compute and I/O density at the edge and enable businesses to further accelerate innovation.
Join this webinar to discover new insights in edge-to-cloud infrastructures and learn how Supermicro SuperEdge multi-node solutions leverage data center scale, performance, and efficiency for 5G, IoT, and Edge applications.
L&T offers private 5G network solutions for various industrial uses. Private 5G networks provide dedicated wireless connectivity within a defined area, with lower latency and increased reliability compared to private 4G. L&T's offerings include turnkey private 5G networks bundled with services for healthcare, sports and entertainment streaming, industrial automation at ports and manufacturing plants, and public safety services across a city. The solutions provide benefits like remote access to experts, real-time monitoring, cost savings, security and improved emergency response.
1) The document discusses 5G and its rapid rollout globally, with over 60 countries having launched commercial 5G networks by 2020 and over 170 countries having released national digital strategies emphasizing 5G and AI.
2) It outlines challenges around 5G deployment and building the 5G business ecosystem, and presents Huawei's solutions to address technical challenges through continuous innovation and help operators succeed in 5G business through ecosystem construction.
3) Huawei is committed to long-term technology leadership through the largest R&D investment in the industry and has developed 10 leading 5G product solutions to empower operators with 5G.
During the OpenStack Tokyo Summit we provided an overview on how Workday started the production deployment with a very robust and efficient CI/CD process that it explained here.
Overview of standardisation status and 3GPP technology evolution trend3G4G
Presented by Sylvia Lu, Senior Engineer, Cellular Technology, u-blox UK at Cambridge Wireless event Radio technology for 5G – making it work on 18 Sep 2018
*** SHARED WITH PERMISSION ***
This document outlines several potential 5G use cases including AR/VR gaming, virtual/augmented reality, monitoring and surveillance, fixed wireless access to homes, connected cars providing in-vehicle infotainment, connected stadiums providing multiple camera views and virtual experiences to fans, connected factories, vehicle-to-everything communications to enable autonomous vehicles, remote surgery, and further reading on additional use cases.
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable SolutionsRadisys Corporation
View these slides, presented by Prakash Siva, VP, Technology & Strategy, hosted by Intel Network Builders, around the subject of Mobile Edge Computing.
Making 5G New Radio a Reality - by QualcommAydin Karaer
Qualcomm is developing 5G NR technology to enable a unified 5G air interface that can address diverse spectrum types, services, and deployments. 5G will transform industries and society by connecting billions of devices and delivering new immersive experiences with requirements such as ultra-low latency and ultra-high reliability. Qualcomm is leading innovations for 5G NR such as advanced channel coding, massive MIMO, and mobilizing mmWave to achieve the speed, capacity, and low latency goals of 5G over the next decade.
This document summarizes a webinar on fraud management and compliance. The webinar covered several topics:
- A CFCA survey that found global fraud losses increased 15% in 2013, with revenue share fraud as the largest threat.
- The TM Forum's fraud classification model and survey, which found revenue share fraud is driving other fraud types.
- Account takeover fraud, where fraudsters manipulate customer service processes to gain access to accounts. Pressure points like authentication and sales incentives enable this fraud.
- Fighting fraud through cyber intelligence techniques like monitoring dark web sites and forums where fraudsters share tactics and stolen customer information.
Using machine learning algorithms to detect frauds in telephone networks during pandemic
Telephone fraud costs companies billions each year. This document proposes using machine learning algorithms to analyze voice traffic data from telephone networks to detect fraud. It involves collecting call data records, preprocessing the data, applying dimension reduction techniques and machine learning models like logistic regression and random forests to identify fraudulent calls. Implementing these algorithms could help telecom companies reduce financial losses, detect fraud earlier, and prevent network congestion from fraudulent traffic.
Managing & Securing the Online and Mobile banking - Chew Chee SengKnowledge Group
Mobile devices are increasingly used for both personal and work purposes. As mobile connectivity grows, security risks have also increased, necessitating new authentication methods. One-time passwords (OTPs), which have been used for over 25 years, are now obsolete and insecure due to vulnerabilities like man-in-the-middle attacks targeting SMS OTPs. New solutions using public key infrastructure (PKI) certificates on mobile devices can eliminate these attacks by uniquely identifying devices for two-factor authentication. Mobile PKI provides a secure authentication method that leverages the ubiquity of mobile phones and can be used across multiple applications and services.
The document discusses fraud risks in e-banking and provides recommendations to address them. It summarizes the evolution of e-banking in India, benefits and vulnerabilities. Examples of major data breaches globally and in India are provided. Common e-banking fraud types like phishing, malware attacks etc. are described along with their characteristics. The document recommends controls that can be implemented by banks and users to enhance security of e-banking transactions and detect frauds.
The document discusses the need to develop a cyber security center. It notes that cyber crimes are increasing, with identity theft, computer sabotage, and credit card fraud among the most common. The document provides statistics showing high percentages of reported intrusions, financial losses from breaches, and organizations detecting security breaches. It outlines target audiences for cyber security including individual users, devices, and different types of networks. The document also discusses national cyber security strategy and regional needs, mentioning how a cyber security center could provide forensic training, litigation support, and help financial institutions and healthcare organizations with security requirements.
The Rise of Card Not Present Crime in Contact CentersEckoh
Card Not Present Fraud has seen a dramatic rise in the past few years. In the U.S., it is predicted to see losses exceed $7 Billion by 2020. In this slideshare we explore merchant weaknesses which allow this crime to take place, and potential ways of preventing this type of crime.
AI Applications in telecommunication industryAtefe Shahrokhi
The document discusses AI applications in the telecommunications industry. It notes that 31.5% of telecom organizations are utilizing current infrastructure with AI, while 63.5% are investing in new AI-driven systems. Some key applications of AI discussed include predictive maintenance, network optimization, fraud detection, and subscriber management. Subscriber churn prediction is highlighted as an important use of AI, with the goal of predicting when customers will switch providers in order to increase customer retention rates.
Top 10 and Insight into IT Strategic challenges Presented at the IT Strategy Forum organized by IIRME in Dubai, UAE, presented by Jorge Sebastiao for eSgulf
Understanding the Card Fraud Lifecycle : A Guide For Private Label IssuersChristopher Uriarte
With credit card fraud dramatically on the rise, particularly in the form of card-not-present (CNP) fraud across Internet and Mail Order/Telephone Order (MOTO) channels, it is important for private label issuers to understand the depth of this problem and how it affects their merchant portfolio and their ability to accept private label cards. Private label cards were often considered to be “low risk”, relative to traditional bank cards, but our current analysis has shown the contrary: fraudsters are increasingly using private label cards as the payment instrument in CNP channels and merchants are at great risk if specific strategies are not put in place to stop it.
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
This document reviews fraud detection in electronic payment gateways. It begins with an abstract that discusses how credit card fraud has increased with the rise of electronic commerce and online payments. It then provides background on payment gateways and discusses common types of credit card fraud like stolen cards, phishing, and internal theft. The literature review covers previous research on using techniques like hidden Markov models, support vector machines, and fingerprint recognition for fraud detection. The proposed system would add an additional layer of security to online transactions by generating a secret code and one-time password for each transaction and only proceeding if the user provides the correct code and password. This is intended to help verify the authenticity of transactions and reduce fraudulent activity.
The document discusses how AI and machine learning can help detect, predict, and prevent fraud by analyzing large amounts of transaction data using predictive models, which can identify patterns and behaviors across different business lines to more accurately detect fraudulent activities in real time. It also highlights the challenges of fraud detection including data silos, data overload from multiple channels and fraud types, and the need for a platform to provide collaboration and a single view of insights.
Mobile Commerce meets the Real World - Mobile TicketingMasabi
The document discusses how mobile technology can enable new capabilities but must provide clear benefits to users and businesses. It notes that users will only adopt new technologies for regular activities if the old way is painful, and the new way is better. The document then outlines examples of mobile solutions for payments, ticketing, and security that provide benefits to both customers and corporations by reducing costs, increasing sales, and usability.
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...Alan Quayle
To remain competitive in the digital transformation context, telcos are leveraging on APIs to increase their agility and the efficiency of their products and services with which they adapt to the technological revolution. Consumers are expecting telco services to be embedded in a range of platforms and by opening up services for reach, engagement and monetisation, telcos are capitalising on this business opportunity to maintain its relevancy.
Richard Im from Apigate will be sharing on Apigate’s transformative journey; as inhouse initiative which is continuously evolving from its primary focus in enhancing the performance of Axiata OpCos to becoming a revolutionary solution that stretches out to the emerging digital markets. With the consolidation of 2 businesses – ApigateMint & ApigateAXP – Apigate has created an integrated platform that provides payment solutions and rich adjacent services to enable MNOs to digitise. We have a suite of educational and enablement programmes – ApigateGO with the main objective to gather early stage companies, developers and students to the API economy to elevate the awareness of APIs alongside its benefits; henceforth increasing adoption.
Trends in electronic crimes and its impact on businesses like yoursMotherGuardians
The USSS discusses its dual mission of presidential protection and investigating financial crimes such as counterfeiting, identity theft, and cyber crimes. It outlines current cyber crime trends like skimming devices, network intrusions, point of sale breaches, targeted malware, and data breaches. It then provides a case study of how a network intrusion investigation may proceed, from initial detection to identifying compromised systems and retrieving stolen data.
Mobile Commerce meets the Real World - Mobile TicketingMasabi
Mobile ticketing provides a better way for customers than traditional methods by allowing ticket purchases directly from mobile phones using barcodes or contactless payments. This avoids long lines and issues with current infrastructure. However, for companies to adopt new mobile technologies, it must address real problems simply and profitably without large upfront costs. Masabi's mobile ticketing solutions allow easy one-time and repeat ticket purchases on any mobile device without usernames or passwords. Their applications are optimized for usability on different mobile platforms with security validated by governments. Case studies show significant customer satisfaction and increased sales over traditional methods.
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
This document proposes a system that uses triangular location detection with IoT, OpenCV, and Zigbee hardware for user authentication during ATM cash loading for improved security. The system uses three Zigbees connected to the delivery vehicle, user's mobile phone, and ATM. When all three are within range, indicating the vehicle is at the ATM, an OTP is generated and verified between the vehicle and ATM Zigbees. In addition to OTP, user signature is verified using OpenCV after cash is loaded into the ATM, providing multi-factor authentication. This integrated system aims to provide more reliable and effective security compared to existing signature or PIN-based authentication alone.
Fraud Management Industry Update Webinar by cVidyacVidya Networks
This document summarizes key findings from fraud surveys and industry discussions on fraud trends. It highlights that fraud is increasing globally by 15% based on the CFCA survey. Major fraud methods identified include subscription fraud, international revenue share fraud, and SIM box gateways. The TM Forum proposes a fraud classification model to standardize naming and analysis of fraud types. There is also a shift towards viewing fraud management as a cybersecurity issue given rises in online fraud forums and dark web markets trading in stolen data and fraud guides. Industry groups and companies are responding by bringing fraud teams closer to security functions.
Linas Eriksonas, Market for mobile biometricsLinas Eriksonas
Presentation given at the lunch-time workshop for IT experts and developers as part of the dissemination activities of the project PIDaaS (Private Identity as a Service)
Similar to AI Use-cases in Telecom sector - Part-2.pptx (20)
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...APCO
The Radar reflects input from APCO’s teams located around the world. It distils a host of interconnected events and trends into insights to inform operational and strategic decisions. Issues covered in this edition include:
Discover timeless style with the 2022 Vintage Roman Numerals Men's Ring. Crafted from premium stainless steel, this 6mm wide ring embodies elegance and durability. Perfect as a gift, it seamlessly blends classic Roman numeral detailing with modern sophistication, making it an ideal accessory for any occasion.
https://rb.gy/usj1a2
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Final ank Satta Matka Dpbos Final ank Satta Matta Matka 143 Kalyan Matka Guessing Final Matka Final ank Today Matka 420 Satta Batta Satta 143 Kalyan Chart Main Bazar Chart vip Matka Guessing Dpboss 143 Guessing Kalyan night
How to Implement a Real Estate CRM SoftwareSalesTown
To implement a CRM for real estate, set clear goals, choose a CRM with key real estate features, and customize it to your needs. Migrate your data, train your team, and use automation to save time. Monitor performance, ensure data security, and use the CRM to enhance marketing. Regularly check its effectiveness to improve your business.
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...Neil Horowitz
On episode 272 of the Digital and Social Media Sports Podcast, Neil chatted with Brian Fitzsimmons, Director of Licensing and Business Development for Barstool Sports.
What follows is a collection of snippets from the podcast. To hear the full interview and more, check out the podcast on all podcast platforms and at www.dsmsports.net
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...Aleksey Savkin
The Strategy Implementation System offers a structured approach to translating stakeholder needs into actionable strategies using high-level and low-level scorecards. It involves stakeholder analysis, strategy decomposition, adoption of strategic frameworks like Balanced Scorecard or OKR, and alignment of goals, initiatives, and KPIs.
Key Components:
- Stakeholder Analysis
- Strategy Decomposition
- Adoption of Business Frameworks
- Goal Setting
- Initiatives and Action Plans
- KPIs and Performance Metrics
- Learning and Adaptation
- Alignment and Cascading of Scorecards
Benefits:
- Systematic strategy formulation and execution.
- Framework flexibility and automation.
- Enhanced alignment and strategic focus across the organization.
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfthesiliconleaders
In the recent edition, The 10 Most Influential Leaders Guiding Corporate Evolution, 2024, The Silicon Leaders magazine gladly features Dejan Štancer, President of the Global Chamber of Business Leaders (GCBL), along with other leaders.
Best practices for project execution and deliveryCLIVE MINCHIN
A select set of project management best practices to keep your project on-track, on-cost and aligned to scope. Many firms have don't have the necessary skills, diligence, methods and oversight of their projects; this leads to slippage, higher costs and longer timeframes. Often firms have a history of projects that simply failed to move the needle. These best practices will help your firm avoid these pitfalls but they require fortitude to apply.
Digital Marketing with a Focus on Sustainabilitysssourabhsharma
Digital Marketing best practices including influencer marketing, content creators, and omnichannel marketing for Sustainable Brands at the Sustainable Cosmetics Summit 2024 in New York
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.AnnySerafinaLove
This letter, written by Kellen Harkins, Course Director at Full Sail University, commends Anny Love's exemplary performance in the Video Sharing Platforms class. It highlights her dedication, willingness to challenge herself, and exceptional skills in production, editing, and marketing across various video platforms like YouTube, TikTok, and Instagram.
Building Your Employer Brand with Social MediaLuanWise
Presented at The Global HR Summit, 6th June 2024
In this keynote, Luan Wise will provide invaluable insights to elevate your employer brand on social media platforms including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok. You'll learn how compelling content can authentically showcase your company culture, values, and employee experiences to support your talent acquisition and retention objectives. Additionally, you'll understand the power of employee advocacy to amplify reach and engagement – helping to position your organization as an employer of choice in today's competitive talent landscape.
SATTA MATKA SATTA FAST RESULT KALYAN TOP MATKA RESULT KALYAN SATTA MATKA FAST RESULT MILAN RATAN RAJDHANI MAIN BAZAR MATKA FAST TIPS RESULT MATKA CHART JODI CHART PANEL CHART FREE FIX GAME SATTAMATKA ! MATKA MOBI SATTA 143 spboss.in TOP NO1 RESULT FULL RATE MATKA ONLINE GAME PLAY BY APP SPBOSS
Easily Verify Compliance and Security with Binance KYCAny kyc Account
Use our simple KYC verification guide to make sure your Binance account is safe and compliant. Discover the fundamentals, appreciate the significance of KYC, and trade on one of the biggest cryptocurrency exchanges with confidence.
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesHolger Mueller
Holger Mueller of Constellation Research shares his key takeaways from SAP's Sapphire confernece, held in Orlando, June 3rd till 5th 2024, in the Orange Convention Center.
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
AI Use-cases in Telecom sector - Part-2.pptx
1.
2. Topics of Discussion:
Basics of AI - Present status of AI in Telecom Sector
Network Vs Subscriber View- QoE
AI + Drone Cell Tower Monitoring and EMF Audits
Customer Care Applications and Portals - Call Drop, QoS
analysis
ASTR (अस्त्र) and its impact
3. Traditional Programming vs ML, DL &AI
Computer
Data
Program
Output
Traditional
Programming
Computer
Data
Output
Program
ML, DL and
AI
4. Why Artificial Intelligence?
Present day and Future Considerations –Data Generation and its 5 V’s -
Velocity, Volume, Value, Variety and Veracity – beyond human brain’s
processing powers.
Technological advances – more data processing powers and storage
Will provide capabilities beyond problem solving
5. AI in telecom sector-Present situation
• Summary Report -76 TSPs, operating in 51 countries.
• 18% have adopted AI for their products and services.
6. AI in telecom sector – Driving factors
Major Driving Force for AI in your organization?
For delivering betters
Customer Experience
For selling new
products to existing
Customers
Reducing OpEx by
using automation
7. Network Versus vs Customer View: QoE
•
How TSPs
Manage ?
Customers’
View
• It takes me around 10s to open a website
page.
• I cannot receive my email
• It takes a long time to connect to customer
care executive.
• My phone is showing the network but I
cannot access internet.
How does TSP do Network Management
• KPIs Statistics
• Dashboard
• Alarm identification – equipment's
monitoring The big question
is: how to make
customer QoS
experience an
integral part of
NMS?
8. AI+Drone enabled Cell Tower Monitoring
• Verizon and AT&T - for monitoring their cell sites
• Tower inspection algorithms for checking assets - 6,000 videos, > 1 million cell
tower photos as datasets – 200 elements identified
• Telecom tower sites located in remote areas are usually left unattended.
• Fuel and expensive telecom equipment
on these sites - susceptible to theft
and fiddling.
• Drones provide a bird’s view eye
• Can be very effective during
disaster management.
• Helpful for inspecting surroundings
9. Lat/long of mobile towers- available on Tarang Sanchar portal.
AI + Drone based monitoring of mobile towers - lat/long, radius details to
drone
EMF emission data of telecom towers may be collected with these AI
enabled drones
Like Air Quality Index - Safe, Critical, Bad, hazardous to eradicate fear of
radiations levels among Public - Real time data may be fed to LED
displays
Data pushed to a centralized server for mapping emission levels to different
categories for EMF Compliance purposes
AI for EMF emissions audits and public awareness
of EMF emission
10. Present setup for grievances redressal
Access
• Contact to any TSP’s Customer Care is – through Call or email
or SMS
Time Delay
• Time taken by any subscriber to reach to customer care
executive after wading through IVRS is more than 60s
• Unnecessary wastage of resources, public telecom network
• Poor QoS experienced by subscriber even during lodging
complaints/grievances
Chatbot
• Some TSPs websites have implemented interactive chatbots
• TSP downloads its APP on user mobile device
11. AI enabled Chatbots & self-assessment APPs
TSP App may have an inbuilt
button of Health Check wherein
following parameters will be
automatically checked for
identifying issue:
i. Type of network and technology
ii. Signal strength
iii. Data speed – uplink and downlink
iv. Location
Datasets of all subscribers:
•To be used for finding subscriber
receiving worst service;
• A benchmark may be set as a
threshold value.
• If that criteria is not fulfilled, the App
will make an automatic call to call
centre where the grievance may be
directly routed to the customer care
executive.
The datasets may be used for machine learning for taking better decisions.
12. AI for Disaster Management
IMD issues warnings and alerts for natural hazards & disasters
Common Alert Protocol (CAP), an indigenous application
designed by C-DOT, is being used for sending alert SMSs to the
subscribers present in affected areas of expected disaster
Number of people dialing the helpline codes increases
exponentially – results in network congestion
CAP and EWS + Location Based System (CQAS) - extract
information about approx. count of people in area - evacuation
13. NextGen Digital Intelligence Tool
for
ASTR (अस्त्र ) : AI and Facial Recognition powered Solution
for Telecom SIM Subscriber VeRification
Detecting and
weeding out
fake/forged SIMs
before used for
cyber crime and
frauds
Prevention
of cyber
crimes and
frauds
Catalyzing
the
investigation
of cyber
crimes
By:- Naveen Jakhar, ITS
ADG (AI & DIU)
DoT HQ
15. Fake SIMs and Problem of Cyber Frauds, Crimes
> 11 lakh complaints on
NCRP in last 3 years
Huge Vulnerable Attack
Surface of 1.16 billion
telecom subscribers
50000 Cyber-crimes
cases in 2020,
52974 cases in 2021
Pendency of cases > 70%
by end of 2020
Fake SIMs - Direct Threat to Digital Economy and Digital Inclusion
30142 cases of
financial frauds ~ 60%
India lost Rs 1.25 Lakh
crores due to cyber crimes
in last 3 years.
Major cyber crime
syndicates - from
Jamtara and Mewat.
Direct threat to national
security, public law & order
and safety
> 2.5 lakh SIMs
involved in cyber crimes
16. Nexus b/w Cyber Crimes and Fake SIMs
Why cyber crime
investigation is
complex ?
• Anonymity, Untraceability,
Trans border syndicates
•70% cases pending
investigation
• <5% conviction rate
Fake SIMs in financial frauds,
cyber crimes, extortion, dacoity,
kidnapping, hoax, threat calls,
advanced crimes like sextortion
17. Cyber crime hotspots in India
Mewat - Haryana
Jamtara -Bihar Jharkhand
Jammu Kashmir
North Eastern States
Rajasthan
West Bengal & Kolkata
Odisha
Assam
Punjab
Delhi NCR
Gujarat
Uttar Pradesh
18. SIM Subscription Process in India
Paper Digital -KYC E-KYC using
Aadhaar
SIMs – 18 crore,
13.5% of total
SIMs – 63 crore,
47% of total
SIMs – 53 crore,
39.5% of total
Total SIMs in India as on 31.12.2022 – 134 crores
Photo,
KYC – Name,
DOB, PoI/PoA,
Tele-verification
Live Image
Live Photo,
KYC – Name,
DOB, PoI/PoA,
Live Image
19. Existing SIM Subscriber Verification - Limitations
No centralized SIM Database, TSPs - individual database
> 30 PoI/PoA documents – for connection
No online mechanism for PoI/PoA verification for SIM activation
Text Based Analysis by LEAs and DoT LSA field units
Creation of fake/forged PoI and PoA by fraudsters
0.1% and 0.2% sample CAFs audit by DoT LSA units
20. Existing SIM Subscriber Verification - Limitations
Consequence: Mostly SIMs found compliant in conventional audit/investigation for individual
case –
so even after being reported by citizens / LEAs, cyber crime gangs and their SIMs remain
functional
LEA reports to
DoT
Mob Num
involved in
cyber crime -
xxxxxx9380
DoT carries out
CAF compliance
for this number.
Details on CAF
match with
PoI/PoA used
Mobile
Number
Found
Compliant
Expertise level of the fraudsters in creation of fake Proof of Identity/Address documents
Can never be detected by human beings by analyzing single case in isolation
22. ASTR: NextGen Digital Intelligence Tool
Live Image
Live Image
Fake PoI/PoA-
Aadhaar
Fake PoI/PoA-
Aadhaar
Name - Atul Name - Raju
Fraudulent subscribers –
SAME Face but different
names other details
68 facial landmarks
detected
68 facial landmarks
detected
Cosine product
comparison, face
matches at
99.25%
Name Similarity Check, matches
38% - different Names
23. ASTR: NextGen Digital Intelligence Tool
Fraudulent subscribers –
SAME Face but different
names other details
Individual
Subscribers >
prescribed count
Face comparison with very high grade
accuracy
ASTR – agnostic to PoI/PoA
Naveen
Navien
Norman
Nakeem
Quantum jump from 0.1% to 100% SIM
verification – 1000 times
24. Presenting the Power of ASTR: 7 SIMs, 3 Names
Male and Female – One Person in Mewat, Haryana
Sample Case -1
25. ASTR: Impact in Cybercrime hotspots
Sample Case -2
213 SIMs across
different TSPs
100 Names
100 Forged PoI/PoA
ASTR detects Fraud
ONE PERSON
26. ASTR: Impact in
Cybercrime hotspots
52 SIMs, 29 Names
Male and Female
29 Forged PoI/PoA
ASTR detects Fraud
- One Person
Sample Case -3
28. ASTR – for Breaking the Chain
of Cyber Crimes and Frauds SIMs on
fake/forged
Docs or in 3rd
parties Name
Bank accounts,
social media
handles-
Whatsapp,
Facebook,
Telegram Payment
APPs
Vishing,
Phishing,
SMiShing
Attack for
Financial
Fraud
Instant Money
Withdrawal by
Fraudsters
Un
Traceability
and
Anonymity in
SIMs during
investigation
Breaking the
Chain
Cyber
Crimes/Frauds
Cycle
A tool to curb cyber
crimes/frauds
Pro active Analysis and
Communication
Intelligence using ASTR
-
Detecting and weeding
out the fraudulent SIMs
even before they are
used to carry out any
cyber crime/fraud
29. AI for Subscriber On-boarding
For checking whether the Point of Sale are working as per
instructions
Sudden rise in SIM sale in an area, Ghost PoS
Inputs to the Activation Officer before SIM Activation
In Subscriber on-boarding APP – live human face detection, de-
duplication of subscriber using KYC details and image
30. “I believe this artificial intelligence is going to be our partner. If we
misuse it, it will be a risk. If we use it right, it can be our partner.”
--Mashayoshi Son
Thank You !!
Your queries please.
Editor's Notes
According to the father of Artificial Intelligence, John McCarthy, it is “The science and engineering of making intelligent machines, especially intelligent computer programs”.
From SIRI and Google Assistant to self-driving autonomous cars, from IBM Watson’s language question answer machine to Chess Playing applications – AI is encompassing every domain
South Korea Telecom has deployed TANGO, an AI-assisted network operation system with big data analytics and machine learning capabilities, on mobile networks to improve customer experience
According to the father of Artificial Intelligence, John McCarthy, it is “The science and engineering of making intelligent machines, especially intelligent computer programs”.
From SIRI and Google Assistant to self-driving autonomous cars, from IBM Watson’s language question answer machine to Chess Playing applications – AI is encompassing every domain
South Korea Telecom has deployed TANGO, an AI-assisted network operation system with big data analytics and machine learning capabilities, on mobile networks to improve customer experience
According to the father of Artificial Intelligence, John McCarthy, it is “The science and engineering of making intelligent machines, especially intelligent computer programs”.
From SIRI and Google Assistant to self-driving autonomous cars, from IBM Watson’s language question answer machine to Chess Playing applications – AI is encompassing every domain
South Korea Telecom has deployed TANGO, an AI-assisted network operation system with big data analytics and machine learning capabilities, on mobile networks to improve customer experience
According to the father of Artificial Intelligence, John McCarthy, it is “The science and engineering of making intelligent machines, especially intelligent computer programs”.
From SIRI and Google Assistant to self-driving autonomous cars, from IBM Watson’s language question answer machine to Chess Playing applications – AI is encompassing every domain
South Korea Telecom has deployed TANGO, an AI-assisted network operation system with big data analytics and machine learning capabilities, on mobile networks to improve customer experience
According to the father of Artificial Intelligence, John McCarthy, it is “The science and engineering of making intelligent machines, especially intelligent computer programs”.
From SIRI and Google Assistant to self-driving autonomous cars, from IBM Watson’s language question answer machine to Chess Playing applications – AI is encompassing every domain
South Korea Telecom has deployed TANGO, an AI-assisted network operation system with big data analytics and machine learning capabilities, on mobile networks to improve customer experience
According to the father of Artificial Intelligence, John McCarthy, it is “The science and engineering of making intelligent machines, especially intelligent computer programs”.
From SIRI and Google Assistant to self-driving autonomous cars, from IBM Watson’s language question answer machine to Chess Playing applications – AI is encompassing every domain
South Korea Telecom has deployed TANGO, an AI-assisted network operation system with big data analytics and machine learning capabilities, on mobile networks to improve customer experience
According to the father of Artificial Intelligence, John McCarthy, it is “The science and engineering of making intelligent machines, especially intelligent computer programs”.
From SIRI and Google Assistant to self-driving autonomous cars, from IBM Watson’s language question answer machine to Chess Playing applications – AI is encompassing every domain
South Korea Telecom has deployed TANGO, an AI-assisted network operation system with big data analytics and machine learning capabilities, on mobile networks to improve customer experience
According to the father of Artificial Intelligence, John McCarthy, it is “The science and engineering of making intelligent machines, especially intelligent computer programs”.
From SIRI and Google Assistant to self-driving autonomous cars, from IBM Watson’s language question answer machine to Chess Playing applications – AI is encompassing every domain
South Korea Telecom has deployed TANGO, an AI-assisted network operation system with big data analytics and machine learning capabilities, on mobile networks to improve customer experience