This private and confidential document presents the vision, mission, values, organization structure, collaboration with Singapore R&D companies, product portfolio, and proposed mobile phone models of BDFone, a Brunei technology company. The document contains confidential information and reproduction requires written consent from BDFone management.
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfForgeRock
The document discusses how digital identity is at the center of digital transformation and relationship management. It argues that as more "things" and devices get connected through IoT, managing digital identities for users, services, and devices/things will become essential. It presents ForgeRock's identity platform as a solution for providing end-to-end security, identity, and access management across users, services, devices/things on the edge and in the cloud.
The document discusses cybersecurity and Cisco's threat intelligence and security solutions. It provides information about Cisco's Talos threat intelligence group, including that it analyzes over 1.5 million malware samples daily. It also summarizes Cisco's security portfolio, including the Cisco Umbrella cloud security solution, Cisco Stealthwatch for network visibility and threat detection, and Cisco Cloud Email Security for protection against email threats.
John Hawley from CA Technologies and Bill Sieglein from CISO Executive Network discuss how security needs to evolve from protecting the network perimeter to focusing on identity management. As applications move to the cloud and users access systems from anywhere, the traditional network perimeter is no longer sufficient. Security functions must adapt to focus on controlling identity and access management across cloud services, mobile users, partners, and more. The top lesson is for security professionals to stay relevant by understanding executive priorities and reporting on issues important to business leaders rather than technical details.
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...CA Technologies
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi Monitoring
For more information on DevOps: Agile Operations, please visit: http://ow.ly/nJd450g61PN
Title: A Snapshot of DevOps
Abstract:
DevOps is like a camera. We focus on what's important, we capture the good times, we develop from the negatives, and if things don't work out, we take another shot. Many teams establishing working best practices for their tools improve their time to deliver and ability to scale. However, the real challenges exist outside of tools and technology and many teams today still have questions about DevOps. So, join this session to learn the fundamentals of shaping a DevOps culture. We'll discuss key attributes around people, process, and technology, likening you and DevOps to pro photographers and cameras.
Presented by Tiffany Jachja.
Tiffany Jachja is a technical evangelist at Harness. She is an advocate for better software delivery, sharing applicable practices, stories, and content around modern technologies. Before joining Harness, Tiffany was a consultant with Red Hat's Consulting practice. There she used her experience to help customers build their software applications living in the cloud.
https://www.meetup.com/Data-on-Kubernetes-community/events/276332406/
Airheads main conference slideshare v1.0Jason Boud
The document describes the evolution of wireless networks (Wi-Fi) in large enterprises from 2007-2013. It discusses how early Wi-Fi networks had strict controls and barriers due to security concerns, but growing user demands and the rise of BYOD led to a gradual opening up of networks. The challenges of different stakeholder needs are reviewed in planning a new consolidated wireless solution that balanced security with usability.
Plastindustrien 15 juni_2018_01 finn hunnechePlastindustrien
The document discusses Blackbird, a company that provides wireless hardware and cloud-based software for collecting data from legacy equipment. Blackbird's solutions allow companies to gather production data in real-time without disrupting operations. The data is analyzed using tools in Blackbird's cloud software to improve processes and enable predictive maintenance. Blackbird aims to help companies make better data-driven decisions to optimize processes and efficiency.
The document provides information about Ruckus Wireless, including:
1. Ruckus Wireless is a networking company that has over 44,000 customers, 100+ patents, and was founded in 2004 based in Sunnyvale, CA.
2. Key technologies developed by Ruckus include BeamFlex adaptive antenna arrays, ChannelFly for adaptive WiFi channel selection, SmartMesh for reliable mesh networking, and SmartCast for prioritizing different types of network traffic.
3. The document discusses these technologies and how they provide benefits like improved signal strength, capacity, and reliability compared to competitors' products that rely on standard technologies.
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfForgeRock
The document discusses how digital identity is at the center of digital transformation and relationship management. It argues that as more "things" and devices get connected through IoT, managing digital identities for users, services, and devices/things will become essential. It presents ForgeRock's identity platform as a solution for providing end-to-end security, identity, and access management across users, services, devices/things on the edge and in the cloud.
The document discusses cybersecurity and Cisco's threat intelligence and security solutions. It provides information about Cisco's Talos threat intelligence group, including that it analyzes over 1.5 million malware samples daily. It also summarizes Cisco's security portfolio, including the Cisco Umbrella cloud security solution, Cisco Stealthwatch for network visibility and threat detection, and Cisco Cloud Email Security for protection against email threats.
John Hawley from CA Technologies and Bill Sieglein from CISO Executive Network discuss how security needs to evolve from protecting the network perimeter to focusing on identity management. As applications move to the cloud and users access systems from anywhere, the traditional network perimeter is no longer sufficient. Security functions must adapt to focus on controlling identity and access management across cloud services, mobile users, partners, and more. The top lesson is for security professionals to stay relevant by understanding executive priorities and reporting on issues important to business leaders rather than technical details.
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi ...CA Technologies
Case Study: Fujitsu Ensures a Reliable Customer Experience with Modern Wi-Fi Monitoring
For more information on DevOps: Agile Operations, please visit: http://ow.ly/nJd450g61PN
Title: A Snapshot of DevOps
Abstract:
DevOps is like a camera. We focus on what's important, we capture the good times, we develop from the negatives, and if things don't work out, we take another shot. Many teams establishing working best practices for their tools improve their time to deliver and ability to scale. However, the real challenges exist outside of tools and technology and many teams today still have questions about DevOps. So, join this session to learn the fundamentals of shaping a DevOps culture. We'll discuss key attributes around people, process, and technology, likening you and DevOps to pro photographers and cameras.
Presented by Tiffany Jachja.
Tiffany Jachja is a technical evangelist at Harness. She is an advocate for better software delivery, sharing applicable practices, stories, and content around modern technologies. Before joining Harness, Tiffany was a consultant with Red Hat's Consulting practice. There she used her experience to help customers build their software applications living in the cloud.
https://www.meetup.com/Data-on-Kubernetes-community/events/276332406/
Airheads main conference slideshare v1.0Jason Boud
The document describes the evolution of wireless networks (Wi-Fi) in large enterprises from 2007-2013. It discusses how early Wi-Fi networks had strict controls and barriers due to security concerns, but growing user demands and the rise of BYOD led to a gradual opening up of networks. The challenges of different stakeholder needs are reviewed in planning a new consolidated wireless solution that balanced security with usability.
Plastindustrien 15 juni_2018_01 finn hunnechePlastindustrien
The document discusses Blackbird, a company that provides wireless hardware and cloud-based software for collecting data from legacy equipment. Blackbird's solutions allow companies to gather production data in real-time without disrupting operations. The data is analyzed using tools in Blackbird's cloud software to improve processes and enable predictive maintenance. Blackbird aims to help companies make better data-driven decisions to optimize processes and efficiency.
The document provides information about Ruckus Wireless, including:
1. Ruckus Wireless is a networking company that has over 44,000 customers, 100+ patents, and was founded in 2004 based in Sunnyvale, CA.
2. Key technologies developed by Ruckus include BeamFlex adaptive antenna arrays, ChannelFly for adaptive WiFi channel selection, SmartMesh for reliable mesh networking, and SmartCast for prioritizing different types of network traffic.
3. The document discusses these technologies and how they provide benefits like improved signal strength, capacity, and reliability compared to competitors' products that rely on standard technologies.
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityOptiv Security
Optiv is committed to guiding the cybersecurity industry through these shifting times by providing strategies to keep your organization and employees secure while ensuring business continuity. Whether your concerns focus on technology or people, Optiv has outlined specific actions you can take to build confidence in this more connected world. To read our response to the COVID-19 pandemic, as well as other resources and actionable checklists, please visit optiv.com/covid-19-response.
Talk: How to Get CI/CD Right in 2021: A Guide to CI and CD
Software delivery is a top priority for organizations that own software, yet it remains one of the most challenging problems enterprises face today. Continuous integration (CI) and continuous delivery (CD) are software practices that allow organizations and teams to deliver code to customers quickly, safely, and repeatedly. Whether it's to improve development, operations, or security, CI/CD pipelines give engineers and teams more time to work on things that matter and less time struggling with the risk, standards, and velocity of deployments. Join this session to learn about the components of CI/CD and how to build and scale pipelines for the future.
https://www.youtube.com/watch?v=zSJcuWSyysM
The document describes how Cisco technology can enable connected customer experiences through presence detection, engagement, and personalized services. Key capabilities include onboarding users, providing concierge services and indoor mapping, facilitating purchases and deliveries, and showing targeted advertising. The system aims to streamline interactions and transactions across physical and digital channels.
The document discusses different types of cloud deployment models including private, public, hybrid and shared clouds. It also mentions revenue generating apps, public cloud apps, and on-demand services that can be deployed across these cloud models. Connectivity methods such as PSTN, SIP, 3G/4G, and WAN are listed that allow communication from devices to these cloud environments.
Cyber Security For Your Mobile Devices! Secure Up To 5 Devices Per License Annually For Only $99 + Tax! (Monthly agreement available for businesses only)
Newtec SATCOM HUB NAB 2019 - Paul Scardino (Speedcast)Newtec
The document discusses Speedcast and the services it provides to the media industry. It summarizes that Speedcast offers a global managed media services network that provides fast, robust, and flexible delivery of video content. Key aspects of its services include a commitment to customers, tailored solutions, a highly reliable global network, industry expertise, content management platforms, multi-platform processing, systems integration, and security solutions to enable delivery of video content anywhere in the world.
This document discusses a student project on virtual private networks (VPNs). It introduces VPNs and their benefits like hiding private information, preventing data throttling, and accessing geo-blocked services. It describes how VPNs work by encrypting traffic and hiding IP addresses. The project involves connecting a device to a VPN server, passing internet traffic through the VPN, and changing the device's online location and IP address. It concludes that VPNs provide a secure private network solution for companies that need internet access while prioritizing security and saving costs compared to other options.
Topic: Wearable Technologies Enabling the Next Wave of Internet of Things Innovation
Speaker: Ting Wei,Li (Senior Vice Present of Sales President of Greater China Broadcom)
Корпоративные сети через 5 лет: что нас ждет? Cisco Russia
The document discusses trends in next generation IT networks, including mobility, BYOD, cloud computing, and video collaboration. It notes that networks now need to support more devices, more traffic, and new types of applications. The network is becoming more critical for delivering applications. The presentation discusses Cisco's strategy to help customers address these trends through solutions that provide simple, secure networks with reduced total cost of ownership. These include unified access, identity services, network programmability, and next-generation platforms.
This document discusses AMD's Radeon FreeSync and FreeSync 2 technologies for stutter- and tear-free gaming. It provides an overview of FreeSync's history and adoption by monitor partners. FreeSync 2 is introduced as the next step, enabling HDR rendering and brightness/color beyond sRGB for a more immersive experience on compatible displays. Examples are given of how FreeSync 2 provides benefits like automatic mode switching, low latency, and support for low frame rates.
Linux Foundation Live Webinar: Applying Governance to CI/CDTiffany Jachja
In the SolarWinds hack of 2020, FireEye, a cybersecurity vendor, announced an intrusion that resulted in the theft of over 300 proprietary security tools offered by the vendor. SolarWinds, an IT monitoring vendor, had pushed malicious code to over 18,000 customers, including Fortune 500 companies and large federal agencies, including the U.S. Department of Homeland Security (DHS), Microsoft, and NASA. Following this announcement, security experts launched an investigation into the hack, putting the Software Development Life Cycle (SDLC) and all its processes under review. Join this webinar session as we discuss:
The role of CI/CD and its potential impacts on events like the SolarWinds hack
How to apply IT Governance principles and practices to CI/CD pipelines
And how to use these CI/CD capabilities to the reduce and mitigate software risks
Amazing inventions, real and valuable opportunities for partnership, benefits and grow. JOIN US!
"noHouse, noCar, noPeople, ... noGov, noPub, noBiz ... with "no igNic`invent :)"
SUPPLY CHAIN MANAGEMENT (SCM) IS TO MANAGE STRATEGICALLY AND IN INTEGRATED MANNER FLOW OF MATERIALS EFFICIENTLY AND ECONOMICALLY,FROM A CHAIN OF SUPPLIERS,
TO/THROUGH ANOTHER CHAIN OF INTERNAL SUPPLIERS & INTERNAL CUSTOMERS OF ‘THE ENTERPRISE’ AND
FINALLY THE FINISHED PRODUCT IN RIGHT QUANTITY, OF RIGHT QUALITY, AT RIGHT PRICE AND IN RIGHT TIME TO A CHAIN OF EXTERNAL CUSTOMERS.
The document discusses how digital infrastructure and the Internet of Everything can redefine urban mobility through innovation. It notes that digital technologies can enable 1-2% fuel savings and double passenger capacity for trains. Predictive maintenance, passenger Wi-Fi, route optimization, and onboard security are examples of digital innovations for trains. The Internet of Everything will connect 50 billion smart devices by 2020, with 90% of data created in just the past two years. Security is crucial with this growth in connected devices and data. The digital economy is driving changes across many industries as new digital business models and experiences emerge.
Presentation by the Head of Consumer Product Development at Cambridge Consultants. Topics covered include:
Why are we interested in wearable technology?
A wearables ecosystem
Why now?
How to make it real?
What’s next?
MidCo Fest 2012 is a technology and security trade show taking place on September 20th from 11:00am to 6:00pm. The event will feature displays and seminars from leading telecom, data, and security manufacturers on topics like VoIP, mobility, security cameras, access control, and networking. Attendees can enter to win prizes by visiting manufacturer booths. The trade show is sponsored by companies like Exacq, Gunnebo, HID, S2 Security, and Anixter. Registration is available online.
This document discusses several concepts related to software defined networking (SDN) and the "Information Core." It begins with an overview of how SDN could enable capabilities like automated provisioning, global visibility, and continuity of government. It then describes several proof-of-concept projects demonstrating SDN capabilities, including on-demand cloud/network provisioning, encryption policy enforcement, and live VM migration between data centers while maintaining network traffic. The overall aim is to develop a globally orchestrated "Information Core" through SDN to improve agility, security and mission support.
Digital customer experience: transforming the aviation industry - Rafi katanashoSITA
Frequent commuting between major cities should be getting easier, not harder. Our innovative door-to-door subscription will get you from home to the interstate office efficiently and without the usual hassles and pain points experienced on commercial airlines.
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...SORACOM,INC
20170131
FiSH 2017 (Fukuoka International Startup Hub)
http://www.f2ff.jp/fish/
「SORACOM The secure, scalable, simple platform for your internet of things」
Yuta Imai
Solution Architect, SORACOM,INC
Mike gives us his view on “Digital Identity’s Next Act” as digital transformation, regulations, and the Internet of Things change the way organizations do business.
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityOptiv Security
Optiv is committed to guiding the cybersecurity industry through these shifting times by providing strategies to keep your organization and employees secure while ensuring business continuity. Whether your concerns focus on technology or people, Optiv has outlined specific actions you can take to build confidence in this more connected world. To read our response to the COVID-19 pandemic, as well as other resources and actionable checklists, please visit optiv.com/covid-19-response.
Talk: How to Get CI/CD Right in 2021: A Guide to CI and CD
Software delivery is a top priority for organizations that own software, yet it remains one of the most challenging problems enterprises face today. Continuous integration (CI) and continuous delivery (CD) are software practices that allow organizations and teams to deliver code to customers quickly, safely, and repeatedly. Whether it's to improve development, operations, or security, CI/CD pipelines give engineers and teams more time to work on things that matter and less time struggling with the risk, standards, and velocity of deployments. Join this session to learn about the components of CI/CD and how to build and scale pipelines for the future.
https://www.youtube.com/watch?v=zSJcuWSyysM
The document describes how Cisco technology can enable connected customer experiences through presence detection, engagement, and personalized services. Key capabilities include onboarding users, providing concierge services and indoor mapping, facilitating purchases and deliveries, and showing targeted advertising. The system aims to streamline interactions and transactions across physical and digital channels.
The document discusses different types of cloud deployment models including private, public, hybrid and shared clouds. It also mentions revenue generating apps, public cloud apps, and on-demand services that can be deployed across these cloud models. Connectivity methods such as PSTN, SIP, 3G/4G, and WAN are listed that allow communication from devices to these cloud environments.
Cyber Security For Your Mobile Devices! Secure Up To 5 Devices Per License Annually For Only $99 + Tax! (Monthly agreement available for businesses only)
Newtec SATCOM HUB NAB 2019 - Paul Scardino (Speedcast)Newtec
The document discusses Speedcast and the services it provides to the media industry. It summarizes that Speedcast offers a global managed media services network that provides fast, robust, and flexible delivery of video content. Key aspects of its services include a commitment to customers, tailored solutions, a highly reliable global network, industry expertise, content management platforms, multi-platform processing, systems integration, and security solutions to enable delivery of video content anywhere in the world.
This document discusses a student project on virtual private networks (VPNs). It introduces VPNs and their benefits like hiding private information, preventing data throttling, and accessing geo-blocked services. It describes how VPNs work by encrypting traffic and hiding IP addresses. The project involves connecting a device to a VPN server, passing internet traffic through the VPN, and changing the device's online location and IP address. It concludes that VPNs provide a secure private network solution for companies that need internet access while prioritizing security and saving costs compared to other options.
Topic: Wearable Technologies Enabling the Next Wave of Internet of Things Innovation
Speaker: Ting Wei,Li (Senior Vice Present of Sales President of Greater China Broadcom)
Корпоративные сети через 5 лет: что нас ждет? Cisco Russia
The document discusses trends in next generation IT networks, including mobility, BYOD, cloud computing, and video collaboration. It notes that networks now need to support more devices, more traffic, and new types of applications. The network is becoming more critical for delivering applications. The presentation discusses Cisco's strategy to help customers address these trends through solutions that provide simple, secure networks with reduced total cost of ownership. These include unified access, identity services, network programmability, and next-generation platforms.
This document discusses AMD's Radeon FreeSync and FreeSync 2 technologies for stutter- and tear-free gaming. It provides an overview of FreeSync's history and adoption by monitor partners. FreeSync 2 is introduced as the next step, enabling HDR rendering and brightness/color beyond sRGB for a more immersive experience on compatible displays. Examples are given of how FreeSync 2 provides benefits like automatic mode switching, low latency, and support for low frame rates.
Linux Foundation Live Webinar: Applying Governance to CI/CDTiffany Jachja
In the SolarWinds hack of 2020, FireEye, a cybersecurity vendor, announced an intrusion that resulted in the theft of over 300 proprietary security tools offered by the vendor. SolarWinds, an IT monitoring vendor, had pushed malicious code to over 18,000 customers, including Fortune 500 companies and large federal agencies, including the U.S. Department of Homeland Security (DHS), Microsoft, and NASA. Following this announcement, security experts launched an investigation into the hack, putting the Software Development Life Cycle (SDLC) and all its processes under review. Join this webinar session as we discuss:
The role of CI/CD and its potential impacts on events like the SolarWinds hack
How to apply IT Governance principles and practices to CI/CD pipelines
And how to use these CI/CD capabilities to the reduce and mitigate software risks
Amazing inventions, real and valuable opportunities for partnership, benefits and grow. JOIN US!
"noHouse, noCar, noPeople, ... noGov, noPub, noBiz ... with "no igNic`invent :)"
SUPPLY CHAIN MANAGEMENT (SCM) IS TO MANAGE STRATEGICALLY AND IN INTEGRATED MANNER FLOW OF MATERIALS EFFICIENTLY AND ECONOMICALLY,FROM A CHAIN OF SUPPLIERS,
TO/THROUGH ANOTHER CHAIN OF INTERNAL SUPPLIERS & INTERNAL CUSTOMERS OF ‘THE ENTERPRISE’ AND
FINALLY THE FINISHED PRODUCT IN RIGHT QUANTITY, OF RIGHT QUALITY, AT RIGHT PRICE AND IN RIGHT TIME TO A CHAIN OF EXTERNAL CUSTOMERS.
The document discusses how digital infrastructure and the Internet of Everything can redefine urban mobility through innovation. It notes that digital technologies can enable 1-2% fuel savings and double passenger capacity for trains. Predictive maintenance, passenger Wi-Fi, route optimization, and onboard security are examples of digital innovations for trains. The Internet of Everything will connect 50 billion smart devices by 2020, with 90% of data created in just the past two years. Security is crucial with this growth in connected devices and data. The digital economy is driving changes across many industries as new digital business models and experiences emerge.
Presentation by the Head of Consumer Product Development at Cambridge Consultants. Topics covered include:
Why are we interested in wearable technology?
A wearables ecosystem
Why now?
How to make it real?
What’s next?
MidCo Fest 2012 is a technology and security trade show taking place on September 20th from 11:00am to 6:00pm. The event will feature displays and seminars from leading telecom, data, and security manufacturers on topics like VoIP, mobility, security cameras, access control, and networking. Attendees can enter to win prizes by visiting manufacturer booths. The trade show is sponsored by companies like Exacq, Gunnebo, HID, S2 Security, and Anixter. Registration is available online.
This document discusses several concepts related to software defined networking (SDN) and the "Information Core." It begins with an overview of how SDN could enable capabilities like automated provisioning, global visibility, and continuity of government. It then describes several proof-of-concept projects demonstrating SDN capabilities, including on-demand cloud/network provisioning, encryption policy enforcement, and live VM migration between data centers while maintaining network traffic. The overall aim is to develop a globally orchestrated "Information Core" through SDN to improve agility, security and mission support.
Digital customer experience: transforming the aviation industry - Rafi katanashoSITA
Frequent commuting between major cities should be getting easier, not harder. Our innovative door-to-door subscription will get you from home to the interstate office efficiently and without the usual hassles and pain points experienced on commercial airlines.
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...SORACOM,INC
20170131
FiSH 2017 (Fukuoka International Startup Hub)
http://www.f2ff.jp/fish/
「SORACOM The secure, scalable, simple platform for your internet of things」
Yuta Imai
Solution Architect, SORACOM,INC
Mike gives us his view on “Digital Identity’s Next Act” as digital transformation, regulations, and the Internet of Things change the way organizations do business.
1. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
Wireless to the Future…...
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
Corporate Presentation
2. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE VISION STATEMENT :
Grow from a local Brunei Technology Company to a B$50 Million
Company within 5 years, in the field of OEM / ODM business &
Manufacturing services.
Be the FIRST BRUNEI, Research & Development (R&D) Centre, that
will DEVELOP & PRODUCE NEW Technological Products, with
labelled as “Made in Brunei”.
- Vision of BDFone Entreprise Management
3. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE MISSION STATEMENT :
Invest in core skill-sets expertise in Technology
Provide the avenue for the development of high skill-set workforce
Ensure that Brunei has the foundation for the development of Technology
requirement within its own rich cultural background
Creating an interesting and entrepreneurial environment; that is fun to be
working with.
Focus in delivering High Quality & Reliable services to
our customers
Cost , Quality and Time to market (ETM – Early to market cycle time)
Supply Chain Management (SCM) for its Material Management and Sales
Distribution network.
4. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE CORE VALUES :
RESPECT , TRUST , COMPETENCY are the
basic principle of the Company culture and
foundation.
“We aim to put in maximum effort to ensure that our commitment
will produce the desired results which will place us as a Key
Technology provider on the Global scene.”
- Commitment by BDFone Board of Directors
5. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE ORGANISATION STRUCTURE
PARTNERS
EXECUTIVE
PARTNER
6. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE OPERATION STRUCTURE
7. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE TECHONOLOGY COLLABORATION WITH
SINGAPORE R&D COMPANY
8. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
Wireless to the Future…...
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE PRODUCT & SERVICES
9. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE MOBILE HANDSET
10. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE VOIP PHONE (WLAN)
11. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE WIRELESS EMERGENCY ALERT SYSTEM
12. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE GSM/GPS VEHICLE TRACKING DEVICE
13. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE DESIGN SERVICES
14. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE DESIGN SERVICES
15. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE FACTORY PLAN
16. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE PRODUCTION PROCESS
17. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE PRODUCTION PROCESS FOR A FLIP
PHONE ASSEMBLY
18. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE PRODUCTION TEST EQUIPMENT
Zebra Barcode
printer Xi4
Agilent Mobile
Communications
DC Sources – 66309D Agilent Digital
Multimeter – HP 3478A
Rohdes & Schwarz
CMU200 Universal Radio Communication
Tester
Agilent Bluetooth Test Set
– E1852DAgilent Spectrum Analyzer
– 8594E
Oscilloscope
19. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE ENGINEERING SUPPORT LAB
20. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
Wireless to the Future…...
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PROPOSED MODELS
21. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE MOBILE MODEL – OT 203
22. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE MOBILE MODEL – OT 305
23. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE MOBILE MODEL – OT 606
24. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE MOBILE MODEL – OT 710
25. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE MOBILE MODEL – OT 800
26. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE MOBILE MODEL – OT 880
27. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
BDFONE MOBILE MODEL – OT 909
28. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
ADVANTAGES OF PROPOSITION
1. Revenue through Subscriber Fees.
2. Revenue through hardware device sale (Mobile Handset).
3. Revenue through DATA application.
4. Revenue through contents applications.
5. Revenue through Video On Demands (VOD).
29. Wireless to the future…..PRIVATE CONFIDENTIAL INFORMATION.
ALL RIGHTS RESERVE BY CHRISTEL.
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
PRIVATE & CONFIDENTIAL - THIS PRESENTATION IS NOT TO BE COPIED OR OTHERWISE
REPRODUCED WITHOUT THE WRITTEN CONSENT OF BDFONE MANAGEMENT
Return Material
Authorisation
(RMA) Process