Telenor is an international provider of telecommunication services operating in 11 markets across Europe and Asia. It has over 180 million mobile subscribers and approximately 40,000 employees. Telenor holds a 39.6% stake in VimpelCom, which operates in 10 additional markets. The mobile industry is experiencing rapid changes including market competition, global players, increased data usage, and shifts to software services. Telenor innovates across three horizons to balance short and long term initiatives. It focuses on customer-driven innovation and open innovation with partners. Opportunities exist in mobile broadband access, social networks, location-based services, augmented reality, financial services, the Internet of Things, and ICT healthcare applications.
Content management for the cloud cloud slam 2011_finalABBYY
This presentation was presented at CloudSlam 2011. In the session, Dean Tang, CEO of ABBYY USA, a leading provider of document recognition, document capture and linguistic technologies, addresses the possibilities and scenarios made possible through OCR and cloud computing. Over the course of the presentation, Tang presents both real-world examples of how this technology may be applied and insight into where the industry is headed. He also discusses how enterprises can remove error-prone, manual data entry processes to intelligently automate the extraction of data from documents anywhere, anytime. He shares key considerations when evaluating the integration of data capture into mobile and cloud scenarios. Lastly, Tang presents how the cloud infrastructure, OCR technology and enhanced mobile devices combine to allow enterprises to capture data immediately at the end point, ultimately driving down costs, increasing efficiency and boosting customer service response capabilities.
Presented in Broadband World Forum 2011, it intends to introduce conceipts about QoS, QoE, related standards and the challenges for service quality measurements and meeting customer expectations
2015 Global Telco Innovation Targets from TC3 2014 Telecom Council
What types of companies are the world’s top telcos looking to partner with? This year’s TC3 service provider keynote presenters told the 400+ executive attendees more about their external innovation focuses for 2015 – they highlighted their innovation programs throughout the ecosystem, opened the door to discuss opportunities for their larger vendor partners, and met entrepreneurs and developers who had potential value to contribute to their networks.
The Telco Innovation Toolbox: Economic Models for Managing Disruption and Rei...Ericsson Russia
Как операторам справится со стремительно меняющимся рынком и усиливающимся влиянием OTT игроков?
В отчете: составляющие успешной экосистемы; асиметричная конкуренция с OTT; во что обойдется ожидание развития событий; методы планирования работы в условиях неопределенности; API как канал дистрибуции; API как способ построения экосистемы вокруг традиционных операторских сервисов;
/Подготовлено Vision Mobile совместно с Ericsson/
Telco Applications are category of applications that are integrated directly with APP CORE, a secure environment within the mobile telecommunication Operator’s Core Network, which provides services to the subscriber that only the telecommunication Operator can provide.
amaysim - The Telco of the Future - MVNO World Congress 2016amaysim
Find out how Aussie MVNO, amaysim, disrupted the telecommunications market to grow the mobile phone company of the future.
Check out the presentation amaysim CEO Julian Ogrin delivered to delegates at the 2016 MVNO World Congress in Amsterdam.
For more information, head to the amaysim website: www.amaysim.com.au
Content management for the cloud cloud slam 2011_finalABBYY
This presentation was presented at CloudSlam 2011. In the session, Dean Tang, CEO of ABBYY USA, a leading provider of document recognition, document capture and linguistic technologies, addresses the possibilities and scenarios made possible through OCR and cloud computing. Over the course of the presentation, Tang presents both real-world examples of how this technology may be applied and insight into where the industry is headed. He also discusses how enterprises can remove error-prone, manual data entry processes to intelligently automate the extraction of data from documents anywhere, anytime. He shares key considerations when evaluating the integration of data capture into mobile and cloud scenarios. Lastly, Tang presents how the cloud infrastructure, OCR technology and enhanced mobile devices combine to allow enterprises to capture data immediately at the end point, ultimately driving down costs, increasing efficiency and boosting customer service response capabilities.
Presented in Broadband World Forum 2011, it intends to introduce conceipts about QoS, QoE, related standards and the challenges for service quality measurements and meeting customer expectations
2015 Global Telco Innovation Targets from TC3 2014 Telecom Council
What types of companies are the world’s top telcos looking to partner with? This year’s TC3 service provider keynote presenters told the 400+ executive attendees more about their external innovation focuses for 2015 – they highlighted their innovation programs throughout the ecosystem, opened the door to discuss opportunities for their larger vendor partners, and met entrepreneurs and developers who had potential value to contribute to their networks.
The Telco Innovation Toolbox: Economic Models for Managing Disruption and Rei...Ericsson Russia
Как операторам справится со стремительно меняющимся рынком и усиливающимся влиянием OTT игроков?
В отчете: составляющие успешной экосистемы; асиметричная конкуренция с OTT; во что обойдется ожидание развития событий; методы планирования работы в условиях неопределенности; API как канал дистрибуции; API как способ построения экосистемы вокруг традиционных операторских сервисов;
/Подготовлено Vision Mobile совместно с Ericsson/
Telco Applications are category of applications that are integrated directly with APP CORE, a secure environment within the mobile telecommunication Operator’s Core Network, which provides services to the subscriber that only the telecommunication Operator can provide.
amaysim - The Telco of the Future - MVNO World Congress 2016amaysim
Find out how Aussie MVNO, amaysim, disrupted the telecommunications market to grow the mobile phone company of the future.
Check out the presentation amaysim CEO Julian Ogrin delivered to delegates at the 2016 MVNO World Congress in Amsterdam.
For more information, head to the amaysim website: www.amaysim.com.au
This report presents an in-depth analysis about the promising technology LTE taking into account not only technology aspects but also business aspects. In detail, it points out the key drivers that are continuously changing the Telecom market and analyzes LTE and its evolution, LTE Advanced, as technological response to the emerging market needs. In addition, it provides an overview of current trends in spectrum allocation, global status of the LTE ecosystem and worldwide initiatives to date. Finally, it explores LTE business case implications for incumbent and greenfield mobile operators through an accurate scenario and sensitivity analysis.
If you want to know more about it, please visit http://payment.witech.it/report.php
World Communication Awards 2012 Winners and FinalistsTotal Telecom
There's been lot's of coverage of who won at this years WCA, but this slide show gives an easy recap and also shows who the finalists were in each category and who was highly commended.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
What's hot in the mobile world? Dagfinn Myhre, SVP & Head of Research Agenda, Telenor Group
1. What's hot in the mobile world?
VERDIKT, 1 November 2010
Dagfinn Myhre
SVP & Head of Research Agenda
Telenor Group
2. Our industry is experiencing a rare expansion in
the importance of our services
3. Among the largest mobile operators in the world
More than 180 million mobile subscribers*
Aproximately 40 000 employees
Present in markets with 2 billion people
Nordic
Vimpelcom
Norway
Sweden Russia
Denmark Ukraine
Kazakhstan
Georgia
Uzbekistan
Tajikistan
Central and Armenia
Eastern Europe Asia
Kyrgyzstan
Thailand Cambodia
Hungary Malaysia Vietnam
Serbia
Montenegro Bangladesh
Pakistan
India
Telenor Group is an international provider of tele, data and media communication services
• Mobile operations in 11 markets across the • Among the top performers on Dow Jones
Nordic region, Central and Eastern Europe Sustainability Indexes
and Asia
• A stake of close to 40% in VimpelCom Ltd, • Revenues 2009: NOK 98 bn
operating in 10 markets
• Headquartered in Norway • Listed on the Oslo Stock Exchange
4. Telenor Group mobile operations
Nordic
Norway
Sweden
Denmark
VimpelCom Ltd.
Russia
Ukraine
Kazakhstan
Central and Georgia
Eastern Europe Asia
Uzbekistan
Tajikistan
Hungary Thailand
Armenia
Serbia Kyrgyzstan
Malaysia
Cambodia
Montenegro Vietnam
Bangladesh
Telenor Group holds 39.6% of the economic
ownership in VimpelCom Ltd.
Pakistan
India
6. Industry changes will create continued
opportunities for growth
Our industry has changed…
• From monopoly to market competition
• From national to global players
• From telecom to data technology
• High growth
Yesterday Today Tomorrow
…and the change will continue
at high speed
• Growth flattening
• Increased competition
• Continued technological development with
explosion in mobile data traffic
• Stronger focus on partnerships and the enabler role
• Software based services
• Customer power will grow
• Communities and social networks
7. Growth is driven by technology shifts, innovative
services and changing customer behavior
Evolution in site capacity from GSM to LTE Five-year evolution in device prices
- downlink, sum of voice and data
Total capacity per site (Mbps)
96 Internet/
Voice-only Feature phones
smartphones
45
28
SE w595 Nokia N97 iPhone
9 Nokia 1112 Nokia 6300
1 4,5
Plain GSM GSM/EDGE 3G Rel.99 Turbo-3G LTE 1800 LTE 2600 50% 30% 20%
Year 1995 Year 2010 (15MHz) (HSPA) (10 MHz) (20 MHz)
(10 MHz) (10 MHz) (15MHz)
Changes in customer behavior: Social networks and the
New services way young people communicate
-
8. New competitive dynamics and
interdependencies
Device User experience
Online Content
Operating User Communi- Services Market
Hardware
System Interface cation Device Apps
apps market
Example: Apple App store
Device
vendors Core competence Recent moves
Example: Google Android
Internet Recent Core
companies moves competence
Example: Orange App shop
Mobile Recent
Core competence
operators moves
9. Google: Mobile first
• Most important segment for
internet companies in the
future
Three important trends
1. Improvements of hardware in
mobile devices
2. Increased number of
connections between services
Eric Schmidt – CEO Google
February 2010 3. New services in the cloud
10. Changing mobile industry
– usefulness and user experience important
• Major players lead the way
• Mobile applications important
• Large memory, high quality screens, music, camera, 3G, WiFi, GPS …
11. Innovation is key to our future
We innovate in services that will change the shape of communication
and our business - and we do this in close cooperation with our
customers and partners in an open landscape of research and
exploration
12. Innovation across three horizons
- balance between shorter and longer term initiatives
Horizon 3
Uncertainty
Horizon 2 Create options
for future
Horizon 1 business
Develop new
business
Expand and
defend core
business
Time horizon
13. Customer driven innovation
‒ Customer and brand
experience
‒ Based on the daily need of
people and business
‒ Co-creation and open
innovation processes with
customers
17. Network effects
When the customers value from a
product depends on who else has
adopted the product we speak of a
network effect
M. Katz and C. Shapiro, AER, 1985
19. Social networks go mobile
• Facebook and Twitter dominate
• Comprehensive service
innovation for social networking
on mobile phones
• More than 200 mobile operators
in 60 countries offer mobile
Facebook solutions*
• There are more than 150 million
active users currently accessing
Facebook through their mobile
devices*
• People that use Facebook on
their mobile devices are twice as
active on Facebook than non-
mobile users*
* Facebook 2010
20. Telenor research shows that you want what
your friends want
• Understand social
influences on service
adoption
• Better user experience
• Better service offering
21. Creating value through service innovation
Access to the Internet
The mobile broadband opportunity
• Consumers will gradually embrace the mobile Internet,
with large country differences
• Access to the Internet will contribute significantly to
productivity, FDI, GDP growth, job creation and
government revenues
Internet users (% of population)
South Korea 96.8%
Norway 85.7%
North America 73.9%
Europe 50.1%
World average 24.7%
Asia 18.5%
India 7%
-
22. Access to the Internet
It’s about access anywhere, anytime
23. Access to the Internet
A broad range of social benefits
Increasing Internet use has
extensive social benefits:
• Education
• Healthcare
• Access to government services
• Rural development
Source: The Boston Consulting Group
24. Creating value through service innovation
Open innovation
Innovation with partners
• Opening up fixed and mobile networks through
significant investments
• Opening up the value chain
• Partnering spanning from enabling new applications to
close cooperation on innovations
26. Open innovation
Location based services
TV2 Skattelisten Darkslide.
Shows register of Shows all public
taxplayers based Flickr pictures at
on your location a given location
28. Creating value through service innovation
Financial services
The financial services opportunity
• Telecom and banks/card companies are increasingly
teaming up to create new services
• Serving the unbanked - low and variable cost structure
through telecom distribution
• Telenor has positioned itself to launch innovative
services with high impact in one of the most untapped
markets in the developing world
Example: Pakistan
• Telenor Pakistan purchased 51% of Tameer bank, a
microfinance bank, in 2008
• Enabling Telenor Pakistan to offer branchless banking
30. Creating value through service innovation
Internet of Things
The IoT opportunity
• Internet of Things a potentially significant market
• Telenor becomes a vital part of the customers’ own
product offering
Example:
• Global M2M connectivity provider with dedicated
organization, product and services - supporting national
OpCo value chains
• Separate entity with global focus established in 2008
32. Internet of Things
ICT in healthcare
• Healthcare systems
• Medical sensors
• Automatic warning aid
• Smart house
• Robots
• Tracking technologies
33. Internet of Things
Telenor Home Monitoring Trial
• Identify drivers and inhibitors
• Identify organizational effects
and potential for cost
reductions
• Evaluate the system’s impact
on the client’s and close
relatives’ well being
• Identify aspects crucial to user
accept and adoption
34. Further research challenges
- who will take part?
• Understanding the markets,
customers and brand positions to
deliver excellent customer
experience
• Open innovation in the new
converged landscape – service
innovation
• Internet of Things – platforms,
ecosystems and business models
• ICT in healthcare – services,
platforms and cost benefit
• Mobile payment - how to make
payment more convenient and
secure
• SFI/NFR application together with
NHH and several large partners:
– Center for Service Innovation - CSI