I presented at a recent sales conference for a large security / IT solution provider on the evolution of the telco industry and the role security and protection plays in that evolution.
In summary: customer data, trust, security and protection are critical for operators to get right in this emerging environment.
Operators need an integrated security and protection layer, not point solutions for each service as is the case today. Protection from malware across all network services e.g. IP, SMS, MMS, WAP push, widgets, apps, etc. Protection in the network, in devices and in services.
SDP vendors need integrated security solution across network, services and end-points, which means a partnership with security / IT providers is key. Its a rapidly growing problem as its a highly profitable and more importantly safe criminal business compared to drugs smuggling or prostitution; hence a specialist security/protection partner is essential.
I presented at a recent sales conference for a large security / IT solution provider on the evolution of the telco industry and the role security and protection plays in that evolution.
In summary: customer data, trust, security and protection are critical for operators to get right in this emerging environment.
Operators need an integrated security and protection layer, not point solutions for each service as is the case today. Protection from malware across all network services e.g. IP, SMS, MMS, WAP push, widgets, apps, etc. Protection in the network, in devices and in services.
SDP vendors need integrated security solution across network, services and end-points, which means a partnership with security / IT providers is key. Its a rapidly growing problem as its a highly profitable and more importantly safe criminal business compared to drugs smuggling or prostitution; hence a specialist security/protection partner is essential.
A 2004 report I wrote for a global handset manufacturer on how to survive in an over-the-top world. Whilst I didn't get everything right, and I would present it differently today, it was pretty insightful for its time.
I'd appreciate if you leave a comment on the slideshow. You are free to use to use the information as long as you mention the source although I would not be able to share the originals with you since it is not under my ownership alone.
In this e-zine, we’ve assembled fresh thinking and ideas about the solutions and services that create revenue opportunities and support emerging business models for providers.
IT Mailing Contacts specializes in providing highly-responsive mailing lists, email lists and telemarketing lists from the most targeted and valued sources.
Slides for a workshop session on "Preparing for Tomorrow’s World: Helping University Information Services Respond to Technological, Economic and Political Change" facilitated by Brian Kelly at the Information Services 2014 conference held on 24 June 2014 at the University of Brighton.
For further information see
http://ukwebfocus.wordpress.com/events/preparing-for-tomorrows-world/
A basic handout of a computer system provides operating system overview, hardware operations and basic functions of a computer system as a comprehensive entity.
A 2004 report I wrote for a global handset manufacturer on how to survive in an over-the-top world. Whilst I didn't get everything right, and I would present it differently today, it was pretty insightful for its time.
I'd appreciate if you leave a comment on the slideshow. You are free to use to use the information as long as you mention the source although I would not be able to share the originals with you since it is not under my ownership alone.
In this e-zine, we’ve assembled fresh thinking and ideas about the solutions and services that create revenue opportunities and support emerging business models for providers.
IT Mailing Contacts specializes in providing highly-responsive mailing lists, email lists and telemarketing lists from the most targeted and valued sources.
Slides for a workshop session on "Preparing for Tomorrow’s World: Helping University Information Services Respond to Technological, Economic and Political Change" facilitated by Brian Kelly at the Information Services 2014 conference held on 24 June 2014 at the University of Brighton.
For further information see
http://ukwebfocus.wordpress.com/events/preparing-for-tomorrows-world/
A basic handout of a computer system provides operating system overview, hardware operations and basic functions of a computer system as a comprehensive entity.
1ª parte del Taller impartido por Digital Learning sobre Internet y la Búsqueda de Empleo. Todas las presentaciones y material adicional puede consultarse y descargarse gratuitamente en http://digitallearning.es/online.
Este 1ª parte, se centra en la búsqueda/obtención de información en Internet: distintas tipologías de buscadores y uso más avanzado de Google, marcadores sociales, alertas-RSS, breve intro a Internet, navegador Firefox/complementos y algunas herramientas de utilidad en este área.
Changing Your Enterprise Architecture - Mobile is Not an Add-OnWheatstone
A presentation given by Peter George at the 2004 Wireless LAN Event. The presentation discusses some of the considerations an enterprise must make when planning to introduce mobile working as part of its mission critical processes.
EMM ESS is a key supplier of IT infrastructure, Wireless links, Surveillance and Business application associated services to small and large scale organizations. It is the preferred partner to private and public enterprise in India for rendering its services in the mentioned forte.
EMM ESS follows a rigorous business process to ensure that our products and services are of the highest standards. Our key aim is to enhance the competitiveness of our clients through providing them with timely, reliable and cost-effective solutions. This is a value that is deeply embedded in the ethos of the Parsec group of companies. To achieve this high standard EMM ESS constantly ensures that we are certified to deliver the required standards of business and technical excellence through continued improvement of our business operations, processes, product knowledge and employee expertise, while maintaining excellent relationships with our supplier partners.
The presentation covers emerging wireless technology and ifs\' application to the home care industry. The presentation was delivered on November 19, 2008 at the Profit from Technology in Home Care conference in Orlando, Florida.
This presentation is about our company, Airlink Wireless. It is also a guide to secure and safe wireless networking, keeping in mind the mandates suggested by the Governments all over the world.
Enabling Telcos to lead Digital Transformation using 5GRahul Tyagi
One of the most discussed topic amongst CSPs/DSPs and IT service providers is – How can Telcos enable 5G for their customers, use cases and monetization. A Collective effort towards industry 4.0
I tried to answer (or at least address) all these pressing questions in this article. Also, talked about 5G concepts and business fitment of 5G into Telcos.
Basic understanding of MVNO. Providing information on architecture of MVNO and how do they operate. List of services provided by mvne. If you have any suggestions or comments i would be glad to hear from you.
The series of presentations contains the information about "Management Information System" subject of SEIT for University of Pune.
Subject Teacher: Tushar B Kute (Sandip Institute of Technology and Research Centre, Nashik)
http://www.tusharkute.com
A session on "Digitalization of Agriculture" at Entrepreneurship Conclave organized by Shailesh J. Mehta School of Management, Indian Institute of Technology Bombay.
Digitization to enable trust, transparency and traceability for better compli...Deepak Pareek
Sharing presentation from my talk delivered at "Roundtable Meeting on Supporting Farmers with Quality Crop Protection Products: Challenges and Opportunities" organised by FICCI at Hotel Le Meridien, New Delhi on 15th Feb 2019. The topic was "Digitization to enable Trust, Transparency and Traceability for Better Compliance and Enforcement".
Demystify Agribusiness - Partnering to Succeed, Scaling Up through CollaborationDeepak Pareek
The talk was delivered at AgriWorld 2018 during the session "Growing through partnering with industry and farmers". It briefly describes the key challenges faced by AgriTech startups and deciphers how startups can leverage partnerships with different stakeholders to overcome the key challenges.
5G: The Catalyst to Digital Revolution in IndiaDeepak Pareek
Presentation delivered at The Institution of Electronics and Telecommunication Engineers on occasion of Foundation Day, The talk covered how 5G can play a key role in leapfrogging India's growth.
Presentation delivered at the Vibrant Gujarat Startup and Technology Summit, Gandhinagar on 10th October 2018. The presentation was delivered in TedX format covering the latest technology developments in the field of agriculture including hydroponics to drones to machine learning to vertical farming.
Food 4.0: Data Driven Agri-Food SystemsDeepak Pareek
Presentation delivered as Expert Speaker on "Food 4.0: Technology to make food and agriculture sector SAFE for Consumers EFFICIENT for Stake Holders and PROFITABLE for Growers" at CTO Forum focused on the "Impact of Artificial Intelligence" hosted by Tamil Nadu Technology Development & Promotion Centre at CII South Zone Headquarters on 16th November 2018.
#AgriTechIndia - Current Scenario of Agri & Food StartupsDeepak Pareek
A presentation delivered on Enabling Next Generation Revolution Through Emerging New Technology Wave by Deepak Pareek at All India AgriStartup Convention and Awards 2018 in session on "Current Scenario of Agri & Food Startups".
Agri-Technopreneurs Align for Success - Lessons Learned & UnlearnedDeepak Pareek
Presentation delivered by Deepak Pareek, CEO, MyCrop at 1st All India Agri Startups Convention and Awards 2018 organized by Indian Council of Food and Agriculture at Delhi on 21st - 22nd Feb 2018.
A Sustainable Palm Oil Platform - Technology to Empower FarmersDeepak Pareek
Keynote Presentation by Mr. Deepak Pareek, CEO & Founder Deepak delivered this presentation at Grow Asia 2018 held on 23rd April at Singapore. He is talking about enabling a transformation of Palm Oil ecosystem through Data Innovation without Disruption.
ARTIFICIAL INTELLIGENCE, BLOCK CHAIN AND BIG DATA - EMERGING TECHNOLOGIES AND...Deepak Pareek
Deepak Pareek, CEO of MyCrop addressed Geospatial World Forum 2018 at Hyderabad on 18th January 2018.
The world is getting larger, by 2050, the global population will reach 9.6 billion people. This means within one generation, there will be more people added on the planet than there were at the beginning of the 20th century. Feeding the growing world population poses an unprecedented challenge to human ingenuity. By 2050, food production must increase by 70% to keep pace.
Achieving the level of agricultural productivity necessary to meet the immensely risen world demand for food, fiber and fuel by 2050 will be a challenge. Meeting this challenge is made even more daunting by a number of stringent constraints including environmental challenges, limitation of resources and need to make benefits of development reach all especially the smallholder farmers.
While Advance Technologies for Precision Agriculture and Business Models around Platforms/Ecosystems have been in circulation for more than few decades but have been confined to the developed and the rich due to prohibitive cost and marginal value it brought to the table. Further complexity of the concept made it difficult or repulsive to smallholder farmers the core of agriculture ecosystem in developing world.
However more evolved business models and disruptive technologies like Artificial Intelligence, Block Chain and Big Data have suddenly changed this equation. The impact is so profound that what seemed to be the muse of the elite has suddenly become a rage for the underserved. This talk takes you through a complete set of reasons and facts which are driving revolution in AgTech and the resulting adoption of the same by smallholder farmers.
MyCrop - Platform Vision For Sustainable Agriculture, Farmer Empowerment By O...Deepak Pareek
MyCrop is a Technology enabled initiative for farmers that empower them through Farmer Mitra (a village level entrepreneur, VLE) delivering them Information, Expertise, and Resources, to increase their Productivity & Profitability hence improving their Standard of Living.
MyCrop is a collaborative platform that strives to combine Cutting Edge technology (Big Data, Artificial Intelligence, Sensors, etc.), Innovative Business Model (Agriculture Platform, Products, Services Delivery through Farmer Mitras), and Focused Human efforts to empower smallholder farmers.
The vibrant startup challenge - HnyB Technologies LimitedDeepak Pareek
HnyB is a platform helping
Individuals to access and manage all their social activities across multiple social networking sites easily from ONE DASHBOARD
Brands & Corporations to connect, listen, analyze and engage with their audience across multiple social assets from ONE DASHBOARD
Application & Site Developers to create engaging applications with socially enabled user experience from ONE DASHBOARD
Helping Students discover & Learn - Business & ManagementDeepak Pareek
IF YOU CAN READ THIS, THANK A TEACHER
While this slogan takes us to the heart of what society has expected from its teachers for centuries, However The World Has Changed
We must understand that the development of “Human Capital” is the real source of prosperity, and different societies are being stressed in similar ways by increased demands on “Human Capital”.
We have moved into a more demanding cognitive age, compelling people to become better at Absorbing, Processing and Combining information. Emphasis and focus should be on the processes that Foster Learning - Psychology, Culture and Pedagogy.
Today young people need more Innovative Thinking Skills, Cultural Awareness, Higher-order Cognitive Skills, Sophisticated Communication & Collaboration Skills than ever before.
Transformation is Happening - CAN TEACHERS MAKE A DIFFERENCE!
I believe in the power of words - Deepak Pareek, Author ProfileDeepak Pareek
A new breed of Author is emerging
Deepak is one of those author where you know you have a "winner“, not only from observation of his talents, knowledge and results, but from the feedback you receive from his audience.
Deepak’s writing provide guidance that are revenue oriented and designed to help companies grow their business and their bottom line.
Deepak is an extremely hard working author who is excellent at researching the topics which he covers, is result-focused, and delivers what he promises.
Books written by Deepak are true diamonds in the rough, key is Deepak’s constant focus on being accountable, having ownership of every, and word he writes being responsible for it.
Deepak’s articles are strategic in nature and guides audience about the subject in-depth and provides insights which is unmatched.
Reports authored by Deepak embody the true meaning of knowledge resource and achieves the highest level of reader satisfaction as it covers topic in depth while giving brisk insights.
Shift Happens - It is Happening Now Make it Rewarding, Evolving Telecommunica...Deepak Pareek
Telecom an Industry in Transition
Over the next Ten Years radical Technology, User Experience & Business Transformations will revolutionize Telecommunications Sector and its importance in Personal, Social, and Economic Activities.
The impact will be disruptive not only for Existing Players (Vendors, Regulators, Fixed-Line & Mobile Service Providers, Others) but also for New Entrants.
It is important for Players in Telecom Sector to Rethink Strategy & Structure for a more Open, Transparent and Competitive World.
Swarnim Gujarat - Social Media as Bridge between CM (Common Man) & CM (Chief...Deepak Pareek
Governance Need Shift
Government which promotes use of collaborative web 2.0 technology to solve collective problems across all government. city, province, country, international.
Government stripped down to it’s core, rediscovered, re-imagined.
Government which has moved from the “Need To Know” mindset to the “Need To Share” mindset.
Government acting as a Platform for Engagement and Collaboration.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Essentials of Automations: Optimizing FME Workflows with Parameters
Mobile Opportunity Outsourcing In The Mobile Communication
1. Mobile is still the "IT" sector in the telecom landscape. Mobile Opportunity: Outsourcing in the Mobile Communication. Presented by – Deepak Pareek
2. xDSL RFID (V)XML Nanotech HSDPA WiMAX FTTx UDDI GRID IPv6 The future Human beings are nomadic or mobile by essence
3. Two to tango.. COMPUTING TELECOM Applications Applications CPU Memory /Storage Access Core The ability for Telecommunications and Computing are reshaping business in a way never seen before. Anywhere/anytime access to Web and company or personal data facilitates a present day knowledge worker that doesn't have to wait for answers.
4. The Digital Networked Economy Where connectivity has no more boundaries Connections, any time, any place, any device
5. Mobility Overview Expansive market for wireless networks: Government, Commercial, Enterprise, Military, Healthcare, and Academic markets. Mobility has become integral in supporting business functions and has fallen under most IT domains with 802.11, WLANs, and 3G Systems: Mobile Executives Field Sales Field Services Mobile devices used by the Enterprise user have changed over time: Present PagersBlackberriesCell PhonesHandhelds (PIM)Laptops/Tablet PCs Future Converged Devices such as Video conferencing/PIM/Phone Devices Higher resolution screens for conveying graphical data more efficiently Computing devices will evolve to smaller, and faster while Wireless integrated devices will become more prevalent
6. Mobility Overview Future mobility will be provided with higher data rates and Ubiquitous access This implies the need for seamless wide area and office coverage Future remote access techniques will mirror existing to protect current investments Higher data rates and better coverage will be realized using disparate types of Wireless Technologies Mobility across disparate networks is a significant change to the paradigm of current mobile networks. Mobility is attributed to L2 and L1 abstraction through use of IP (Mobile IP). Data Rates and Ranges of Wireless Technologies SOURCE: ITU Mobility will increase IT departments responsibilities as remote access and devices increase.
7. Which applications will become popular and when M – Commerce Applications WASP Games Job Dispatch Music CRM Advertising Video Supply chain Integration Auctions Telemetry Telematics Healthcare Shopping Info Provisioning Broking M-payment Reservations Ticketing E-salary E-bill Banking Info Management Security SMS SMS Toolkit WAP GPRS EDGE UMTS 1998 2000 2001 2002 2003 2004 1999 SMS IM Chat E - mail PIM UIM Customer care M – Commerce Enabling Applications
33. Fleet ManagementCommunications-enabling solutions Wireless Solutions Enterprise want high quality office solutions…..but seek to complement these with business-focused solutions which have a clear ROI
34.
35. Providing value to the end user Applications Session Mobility Voice Service Network Intelligence Interactive Multimedia Identity Location Service Edge Service Edge Service Edge Service Edge Converged Networks Private Internet Cellular PSTN
36. Service Convergence PSTN PLMN ISDN features GSM Fax #7 features #7 inter-working ADSL- connections Broadband connections Document transfer Mobilenet-work IPtelephony Converged network CompressionEncryption Internet features Data trafficMobile IP IP appli-cations E-mail IP traffic t INTER NET An increasing number of both voice & non-voice technologies are influencing products and services
37. Network & Service Provider ClassicalValue Chain Customer Customer New Value Chain NetworkProvider Service Provider Provider Split & Hardware-Services Decoupling Content Provider Applications Supplier Content Supplier OAM Supplier Access Equipment Supplier Retailer Changing Business Model Divergence in the Provider Value Chain
38. Mobile network Internet PSTN CATV CATV IP IWU Changing Business Model Today Vertically integrated businesses Layered businesses Tomorrow Service layer Open interface Network layer Mobile PSTN IWU IWU The Architecture - The increasing demand for value added services leads to a separation in network and service provisioning.
39. Wireless Marketplace Application Developers Content Providers End-User Consumer Network Operators Retail VAR Exchanges Between Links Infrastructure Provider Device Manufacturers Information Partnership Cash-flow Exchange Value of Exchanges Between Supply Chain Links
40. Applications provide efficient access to content Application Developers Content Providers Content sites must develop brand and drive greater accessibility Content must meet target customer segments needs Network Operators need applications to enhance services Infrastructure supports applications End-User Consumer Network Operators Consumer agrees on service contract VARs sell devices as middleman VARs sell service contracts as middleman Retail VAR Infrastructure facilitates network management Device must gain network access Users must be able to operate device Infrastructure Provider Device Manufacturers Air interface compatibility Wireless Marketplace Links Are Consummated on Exchanges
66. Wireless Market Place Device Manufacturer Network Operator Many Content Enabler Infrastructure Provider Application Provider Few Content Provider Attractive Unattractive Industry Structure: 5 Force Analysis
117. NTT Do Co N/A Wireless Market Place Upstream Downstream Wireless Device Supply Chain (Horizontal/Modular?)
118. Customer Value The handheld device together with its operating system. Reduced Costs Mobile Device and Device O/S Product & Service Diff The end user solution, ERP, CRM, Sales, and Field Force Automation. Enterprise Applications & Services Wireless Enabled Enterprise Business and Systems Integration New Business & Models Platform for the delivery of business functionality to the handheld device Service Delivery Platform Provide the connectivity and, depending upon the operator, various levels of functionality. Mobile/Wireless Network Infrastructure Pervasive Solution Integrate all the different components to deliver value to the enterprise
119. Enterprise Home AAA Server WLAN Gateway, HA, FA Corporate LAN Ethernet VPN Firewall 802.11 Access Points IP Backbone/ Internet GSM/UMTSWSP CDMA WSP PDSN/FA/HA/Firewall WLAN Gateway & FA GGSN/FA/HA/ Firewall Public WLAN SGSN PCF Ethernet MSC/RNC BSC BS CGF BS BS BS 802.11 Access Points Multi-mode terminal w/MobileIP client & IPSec Client Future of Mobility Mobile devices can connect to office networks anytime from anywhere…. Architecture of Seamless Enterprise Connectivity
130. Insufficient bandwidthNetwork Evolution The Evolutionary Path allows for a smooth migration including investment protection, service flexibility and network scalability
131. Communities of Interest Remote Workers Global Locations Outsourced Applications Partners Customers Suppliers The New Business Imperatives Enterprise boundaries blurring Business cycles accelerating Expectations rising Complexity increasing
134. Exodus, DigexNewServices Enterprises are beginning to purchase solutions(based on SLAs), not simply commodity network transport. Fundamental Market Dynamic
135. End-to-end Solutions Service enablers Networks Devices Operator Content Consumer Mobile systems integration Win - Win Business Models for All
136.
137. Infrastructure management (system administration of the switches, operating the help/trouble desk, handling moves/adds/changes, etc.)
138. Usage management (call accounting including tracking proper usage, allocation of call expenses back to proper departments, etc.) Outsourcing Enables a Dynamic New Management Model
139. Why Outsource? Flexibility and Agility Asset Reduction Single Point of Contact Total Cost Reductions Visibility Systems Capabilities Improved Service Process Change Collaboration Delayed Capital Expense
179. Outsourcing : The biggest opportunity Outsourcing, is not just a good idea, it's an inevitable process as the mobile industry matures and becomes more competitive. Outsourcing represents the biggest opportunity. The mobile sector, is an industry that no longer wants to run and control everything itself. Some of the most ambitious outsourcing efforts are: Infrastructure: Network operations and maintenance (NOM) and Mobile virtual network operator (MVNO) concept Traffic Management: Clearinghouse concept Measure and Compare: Business Benchmarking & QoS concept Design - Original design manufacturing (ODM) concept Value Services - Premium Number concept Synchronisation - Mobile Personal Information Management (mPIM) concept
180. Adopt it - Mobile virtual network operator (MVNO) A Mobile Virtual Network Operator (MVNO) is a mobile operator that does not own its own spectrum and usually does not have its own network infrastructure. Instead, MVNO's have business arrangements with traditional mobile operators to buy minutes of use (MOU) for sale to their own customers. To date, MVNO's are mostly a European, GSM phenomenon. With many simple resellers in the United States gaining popularity, it is likely that the concept will catch on in the US and other parts of the world as well for the Mobile Virtual Network Operator (MVNO). Many are familiar with simple resellers of telecom services such as long distance, local exchange, and mobile network services. In contrast, MVNO's typically add value such as brand appeal, distribution channels, and other affinities to the resale of mobile services.
181. Clear it - Traffic Management: Clearinghouse concept Originally mobile operators--often incumbent-owned--designed their networks and business models with the old fixed line network in mind: traffic which must pass between mobile networks is therefore carefully counted and exchanged with an accompanying settlement payment, just like in the fixed network world. To get to that point, though, mobile operators have to negotiate dozens of bilateral deals with other networks to agree on terms and conditions. This was just about workable when there were just a few dozen mobile networks but as the number of players world-wide has exploded, arranging and managing all the bilaterals has become a costly exercise, especially for a small mobile network operator. Clearinghouse is set up to manage all or some of the commercial agreements between as many players as it can. It then aggregates all the payments in and out into settlements. One such is United Clearing, which has offices in Hong Kong Florida and London and handles roaming, voice, data and m-commerce services.
182. Measure it - Business Benchmarking & QoS concept First generation mobile services, if they competed at all, competed on coverage and network quality. Things have moved on, but quality is an important hygiene factor. Some companies are setting out to build a business benchmarking QoS on mobile networks, thus enabling customers to make informed purchase and usage decisions. In-house quality measures, it says, are not trusted by customers. These company’s say they will test services on a representative sample of routes and locations. These include motorway and train journeys as well as city-center and ad hoc tests. The resulting data enable comparison of the main networks in terms of voice quality, network availability and reliability, billing accuracy and data transmission performance for GPRS services
183. Design it - Traffic Management: Clearinghouse concept Outsourcing product assembly has a long and well-understood history in the IT industry. What hasn't shown up so clearly on the radar so far in the mobile handset market, is the increasing practice of outsourcing the input side--the actual technology development. The growth of ODM (original design manufacturing) is rocketing, from around 7% of the handset market in 2002 to at least 40% of the market by 2005. Popular handsets like Motorola's T191 or C300 were actually developed and produced by Taiwan-based BenQ, while Sony Ericsson's T200 and R600 were developed by another Taiwan specialist, GVC. Big handset brands are able to offer a full product range without extending risk, stretching R&D budgets or falling behind in the race to market. The rise of ODM may also mean that the handset market will fundamentally change. Now you don't actually need to be a traditional mobile player to produce your own handsets. Microsoft, for instance, is already using ODMs to introduce customers to Microsoft-powered handsets and it will no doubt be joined by others.
184. Steal it - Value Services - Premium Number concept Today mobile phones are increasingly being used as fixed line replacements, which means that many users want to make regular international calls from them seeing they have no other service to use. Their ability to do so at a reasonable price, however, is dependent upon the regulations governing mobile operators in their jurisdiction and even in more liberal environments, the right to preselect your international carrier of choice is not yet usually available on mobile networks, but prefix code dialing options sometimes are. As in the fixed market, the problem here is that access codes are messy and introduce another supplier and yet another bill to pay for the customer. One cunning trick gets rid of the billing problem for both supplier and customer by marrying non-geographical service number ranges to international calling. Such services are alive and kicking in the UK, although it's uncertain how much market share they're taking. The mobile user dials a specific premium service access number designated to the country he or she wants to call. The per-minute cost of that service is individually assigned and adjusted according to the rate the service provider is getting to the country destination. Once connected to the service, the user punches in the specific number to connect the call, paying for a per-minute premium service at lower than the international rates available from the mobile network operator. The big advantage for the user is that there is no direct relationship with the service provider and no messy billing to be dealt with--calls will just show up on the conventional mobile bill as premium service calls.
185. Synchronize it - Mobile Personal Information Management (mPIM) concept Synchronization is a service or capability to allow busy people to be highly organized. But we're not and we need help in our multi-gadget world. Synchro services are supposed to be the answer, marrying our fixed and mobile information repositories (i.e. PCs mobiles, laptops and PDAs), and keeping them all up-to-date. This is a contested market with all sorts of slightly differently flavored approaches vying for attention. The idea is to have a standard way of exchanging information so that the calendar and contact database on your mobile phone or PDA is easily synchronized with fixed network 'master' repositories, such as Microsoft Exchange. But mobile network operators aren't that keen on seeing the synchronization market develop separately from the network. For a start, synchronization is something that can be charged for, and if anyone's going to do any significant charging, network operators think it should be them. Secondly, there are obvious long-term threats for network operators from successful underlying synchronization architecture. Hardly surprising that rival synchronization approaches are seeking to build the same functionality (using the same standards) in such a way as to benefit the network operator. The idea is that users will be able to access a central and highly secure repository of their data without having to support their own central server infrastructure--this will be attractive to small-to-medium enterprises.