• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 23
  • 20
  • 13
  • 6
  • 6
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 82
  • 27
  • 23
  • 22
  • 17
  • 15
  • 11
  • 11
  • 11
  • 9
  • 8
  • 7
  • 7
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

A new Content Distribution Network architecture - PlentyCast

Cao, Wei Qiu January 2004 (has links)
Content Distribution Networks have existed for some years. They involve the following problem domains and have attracted attention both in academic research and industry: content replica placement, content location and routing, swarm intelligence, and overlay network self-organization for this type of distributed system. In this project, we propose a novel Content Distribution Network architecture – PlentyCast. This study focuses on improving access latency, network scalability, high content availability, low bandwidth consumption, and improving infrastructure performance for Content Distribution Networks. Outstanding problems such as: Flash crowd, DoS, and difficulty of traffic engineering due to Peer-to-Peer are addressed. / Mediadistributionsnätverk har funnits några år. De har fått uppmärksamhet i både akademisk forskning och i industrin och kännetecknas av följande frågor: placering av innehållskopior, lokalisering av innehåll och routing, svärm intelligens, överlagrade nätverks självorganisering för denna typ av fördelade system. I denna rapport studeras en ny nätverksarkitektur för innehållsfördelning - PlentyCast. Denna studie fokuserar på tillgångslatens, nätverksskalbarhet, hög innehållstillgång, låg bandbreddskonsumtion, och förbättrad infrastrukturprestanda för Innehållsfördelningsnätverk.
62

Proposition de nouveaux mécanismes de protection contre l'usurpation d'identité pour les fournisseurs de services Internet / Proposal for new protections against identity theft for ISPs

Biri, Aroua 25 February 2011 (has links)
De plus en plus d’organisations sont informatisées et plus une organisation est grande, plus elle peut être la cible d’attaques via Internet. On note également que les internautes utilisent de plus en plus Internet pour faire des achats sur des sites de commerce électronique, pour se connecter à l’administration en ligne, pour voter de manière électronique, etc. Par ailleurs, certains d’entre eux ont de plus en plus d'équipements électroniques qui peuvent être raccordés à Internet et ce dans divers sites (domicile, voiture, lieu de travail, etc.). Ces équipements forment ce qu’on appelle un réseau personnel qui permet la mise en place de nouvelles applications centrées sur l’internaute. Les fournisseurs de services Internet peuvent ainsi étoffer leurs offres de services en présentant une offre de sécurisation de ce genre de réseau. Selon le rapport du cabinet « Arbor Networks » intitulé « Worldwide Infrastructure Security Report », les menaces identifiées comme les plus sévères sont relatives aux attaques de déni de service distribué. Ce type d’attaque a pour but de rendre indisponible un service en empêchant les utilisateurs légitimes de l'utiliser. Il utilise la technique de l’usurpation d’identité qui consiste en la création de paquets (de type IP, ARP, etc.) avec une adresse source forgée et ce dans le but d’usurper un système informatique ou d’usurper l’identité de l’émetteur. La technique de l’usurpation d’identité permet ainsi de rendre un service indisponible, d’écouter, de corrompre, de bloquer le trafic des internautes ou de nuire au bon fonctionnement des protocoles de routage et des réseaux personnels des clients. De plus, la technique de l’usurpation d’identité est également utilisée pour des activités interdites par la loi « Hadopi » en rigueur en France comme le téléchargement illégal. De ce fait, les fournisseurs de services Internet se doivent de prémunir leurs clients des attaques basées sur la technique de l’usurpation d’identité. Ces dits fournisseurs comptent sur les protocoles de routage qu’ils déroulent pour participer au bon acheminement des données de leurs clients. Cependant, le protocole intra-domaine OSPF et le protocole inter-domaine BGP sont vulnérables aux attaques utilisant la technique de l’usurpation d’identité qui peuvent conduire à l’acheminement des paquets vers des destinataires non légitimes ou au déni de service. Nous proposons donc deux mécanismes dédiés respectivement au protocole intra-domaine OSPF et au protocole inter-domaine BGP. D’une part, afin de protéger les routeurs OSPF contre les attaques utilisant la technique d’usurpation d’identité, nous avons préconisé le stockage de l’identité et du matériel cryptographique dans un coffre-fort électronique que sont les cartes à puce. Les cartes déroulent ensuite un algorithme de dérivation de clés avec les cartes des routeurs voisins ainsi qu’avec celle du routeur désigné. Les clés dérivées entre les cartes à puce servent à signer les messages OSPF et à authentifier le niveau MAC. Nous avons décrit par la suite la plateforme du démonstrateur et les scénarios de tests adoptés pour évaluer les performances de notre prototype et les comparer avec ceux du logiciel Quagga sur la base de trois critères : le temps requis pour traiter une annonce d'état de liens, le temps de convergence ainsi que le temps de re-calcul d’une table de routage après un changement. Ces temps augmentent peu avec l’introduction de la carte à puce implémentant les fonctions de sécurité proposées. Ainsi, cette solution permet de renforcer la sécurité du protocole OSPF avec un impact raisonnable sur les performances. D’autre part, afin de protéger les routeurs BGP contre les attaques utilisant la technique d’usurpation d’identité, nous avons préconisé la « clustérisation » des domaines Internet et la sécurisation des liens entre les clusters ainsi qu’au sein de chacun d’eux grâce aux paradigmes de « web of trust » et de la cryptographie sans certificats […] / More and more organizations are computerized and more an organization is great, plus it can be the target of Internet attacks. Moreover, some of them have a growing number of electronic equipments that can be connected to the Internet from various locations (home, car, workplace, etc.). These devices form a so-called personal area network that allows the development of new applications centered on users. The ISPs can then expand their service offerings by providing a secure supply of such networks. According to the report of the firm “Arbor Networks”, entitled "Worldwide Infrastructure Security Report ", the most severe threats are related to distributed denial of service. This type of attack aims to make available a service by preventing legitimate users from using it. It uses the technique of identity theft that involves the creation of packages (like IP, ARP, etc.) with a forged source address and that in order to usurp the Identity of the issuer or of the computer system. Thus, the technique of identity theft allows to render a service unavailable, to listen, to corrupt, to block traffic from Internet users or to undermine the legitimate operation of routing protocols and personal networks. Moreover, the technique of identity theft is also used for prohibited activities by "HADOPI" law in France and related to illegal downloading issues. Thus, the ISPs have a duty to protect their customers from attacks based on the technique of identity theft. The mechanisms of protection against spoofing attacks for access networks are crucial for customer adoption of new applications offered by Internet service providers. This part of the doctoral thesis is part of the European project “MAGNET Beyond" whose vision is to put into practice the concept of personal networks, with the ultimate objective to design, develop, prototype and validate the concept. In the context of user equipment’s access to the network of an Internet services provider from a public place, we proposed a cross-layer protocol based on the principles of information theory. This protocol fixes the security hole not addressed by other proposals that is the attack of identity theft that occurs at the beginning of communication and thus protects users against the middle man attacks. We proposed that the person who wants to have secure access to the Internet must be on a specific circle has been called "RED POINT" so that the attacker is not able to be on the same circle at the same time. The proposed cross-layer protocol can be divided into three phases: the phase of checking the position of the user, the extraction phase of the shared secret of the physical layer and the phase of the derivation of the shared key at the MAC layer. We subsequently validated our solution through a formal tool AVISPA and presented the results of its implementation. In a private context, communication between devices convey users' personal data which may be confidential, so we must prevent equipment not belonging to the legitimate user to access its network. Thus, we proposed two mechanisms of protection against attacks based on spoofing so that illegitimate equipment is unable to impersonate legitimate equipment. The first phase will be dedicated to personal networks and the second will be dedicated to the particular case of medical networks. Regarding the mechanism dedicated to personal networks, we have proposed the use of a protocol based on out-of-band channel in order to provide certificates to user equipments. We derive bilateral key for personal network’s equipments of the same site and between equipments at remote sites. Concerning the particular case of medical networks, we proposed to cover their deployment phases and their operational phases. This proposal was submitted to the IEEE 802.15.6 working group that conducts research for the standardization of medical networks […]
63

Hardware Implementation of Learning-Based Camera ISP for Low-Light Applications

Preston Rashad Rahim (17676693) 20 December 2023 (has links)
<p dir="ltr">A camera's image signal processor (ISP) is responsible for taking the mosaiced and noisy image signal from the image sensor and processing it such a way that an end-result image is produced that is informative and accurately captures the scene. Real-time video capture in photon-limited environments remains a challenge for many ISP's today. In these conditions, the image signal is dominated by the photon shot noise. Deep learning methods show promise in extracting the underlying image signal from the noise, but modern AI-based ISPs are too computationally complex to be realized as a fast and efficient hardware ISP. An ISP algorithm, BLADE2 has been designed, which leverages AI in a computationally conservative manner to demosaic and denoise low-light images. The original implementation of this algorihtm is in Python/PyTorch. This Thesis explores taking BLADE2 and implementing it on a general purpose GPU via a suite of Nvidia optimization toolkits, as well as a low-level implementation in C/C++, bringing the algorithm closer to FPGA realization. The GPU implementation demonstrated significant throughput gains and the C/C++ implementation demonstrated the feasibility of further hardware development.</p>
64

Net Neutrality - Do We Care? : A study regarding Swedish consumers' point-of-view upon Net Neutrality / Nätneutralitet - Vem bryr sig? : En studie rörande svenska konsumenters syn på Nätneutralitet

Patriksson, Andreas January 2017 (has links)
Net Neutrality implicates that all data being transmitted online is treated equal by Internet Service Providers. In 2016, the public debate regarding Net Neutrality in Sweden started growing as two major Mobile Network Operators were investigated by the Swedish Post and Telecom Authority for violation of European Union Net Neutrality regulations. Several studies have been conducted regarding Net Neutrality, most of them written in a legal, financial or technological perspective. This study takes another direction, aimed at understanding the consumer’s point of view regarding Net Neutrality. This study investigates whether or not consumers are aware of the subject and if so, how they value it. To measure this, an online survey was constructed, containing a total of 12 questions and statements. 77 people participated in the survey and out of these, 10 people participated in qualitative follow-up interviews. The interviews were semi-structured and individually designed according to each participant’s answers in the survey. This was done in order to gain a deeper understanding of the consumer’s reasoning while answering the survey. The results show that consumers lack knowledge regarding Net Neutrality. A major part of the consumers had not heard of the term or did not know the meaning of it, making it hard to determine whether or not the consumers value NN. However, when given a more concrete example of the implications of Internet Traffic Management from ISPs, the participants had a better understanding of what kind of implications NN could have on their Internet usage. They valued the implications of Net Neutrality, even though they did not know the theory of the term itself. The study also revealed that consumers have a big confidence in National Regulatory Authorities when it comes to looking after the openness of the Internet. Therefore, it is likely that National Regulatory Authorities must inform and educate consumers in the matter of Net Neutrality for them to value it and see its long-term implications. / Nätneutralitet innebär kortfattat att all data som skickas över Internet ska behandlas likvärdigt utav Internetleverantörer (ISP). Under 2016 växte debatten kring nätneutralitet i Sverige då två stycken mobiloperatörer utreddes utav Post- och Telestyrelsen. Båda dessa mobiloperatörer lanserade kampanjer till sina kunder som ansågs strida mot EU:s förordning 2015/2120 rörande nätneutralitet. Ett antal studier har redan gjorts på ämnet nätneutralitet, dock har de flesta haft en infallsvinkel där man tittat på juridiska, finansiella eller tekniska perspektiv. Den här studien har en annan infallsvinkel och riktar sig istället mot konsumenters syn på nätneutralitet. Den ämnar undersöka huruvida konsumenter känner till begreppet nätneutralitet och om de gör det, hur värderar de konceptet? För att undersöka detta konstruerades en online-enkät, innehållandes 12 frågor. 77 personer deltog i enkäten och utav dessa så deltog 10 personer i uppföljande, kvalitativa intervjuer. Intervjuerna var semi-strukturerade och individuella med frågor baserade på individens svar i enkäten. Dessa intervjuer var till för att ge en fördjupad förståelse av konsumenternas syn på nätneutralitet och deras resonemang kring svaren under enkäten. Resultaten visar att konsumenter, deltagande i den här studien, har låg kunskap kring nätneutralitet. Majoriteten utav deltagarna hade inte hört termen eller kände inte till dess mening, vilket gjorde det svårt att dra några slutsatser kring huruvida konsumenterna värderar konceptet. Men när konsumenterna fick ett mer konkret exempel på hur Internetleverantörers datahantering påverkar kundernas Internetanvändande så tycktes konsumenterna förstå vilka implikationer nätneutralitet kan ha på deras eget Internetanvändande. De tycktes således värdera innebörden av nätneutralitet, även om de inte förstod teorin kring konceptet. Studien påvisade också att konsumenter har en stor tilltro till vederbörande myndighet, Post- och Telestyrelsen här i Sverige, när det gäller att se efter Internets öppenhet och mångfald. Det är därför troligt att Post- och Telestyrelsen kommer att behöva informera och utbilda konsumenter rörande nätneutralitet för att få konsumenter att se värdet av och de långsiktiga implikationerna utav det.
65

Socio-economic Impact of Fiber to the Home in Sweden

Xiong, Ziyi January 2013 (has links)
Fiber-to-the-Home (FTTH) has been talked about since the introduction of fiberin the 1970s. It is nowadays shaping up to be the foundation of our newdigital society, bringing economic prosperity and a multitude of business,social, and entertainment opportunities to its users. The increased consumerdemand for high-speed network accessibility is being taken more and moreseriously and a fiber-based network is able to cope with these growing demandsdue to its wide bandwidth and reliability. Today there is a practical need forquantitative analysis regarding the socio-economic impacts of fiber-basedaccess networks. This analysis could be used as an indicator/reference for allthe stakeholder entities as they consider future investments anddevelopments. Sweden is a suitable target country for this analysis since ithas adopted fiber for some years and the benefits that FTTH has brought seemto already be tangible. The primary value of this thesis lies ininvestigation of its quantified evidence of the socio-economic impacts of FTTHdeployment in Sweden. This has been achieved based on data from the SwedishPost and Telecommunications Authority (PTS), Statistics Sweden (SCB), previousrelated studies, and information collected on-line from operators involved inthe fiber market, along with empirical analysis based on multivariateregression models. The results of the study show that fiber penetrationhas had a significant impact on the population’s evolution, specially the netamount of migration into a municipality, which indicates the attractiveness ofmunicipalities per se. It is therefore reasonable to suggest that localgovernment and local authorities take fiber deployment into consideration, ifthey want to attract people to stay for further local development. The studyalso analyzed the competition in fiber-based open networks and the prices ofsubscribing for 10/10 Mbps symmetrical Internet Service. Study findingsrevealed that networks with multiple competing service providers have a widerrange of services and a lower price: the more ISPs competing in a fibernetwork, the lower consumer prices. Specifically, for each new serviceprovider present in the network, there will be 5 SEK per month decrease of theaverage price of the Internet services, and an approximately 7 SEK per monthreduction in the lowest price. Nevertheless, a number of socio-economicimpacts remain unquantifiable as of the current time and due to the limitedavailable data. It is recommended to incorporate more socio-economic effectsin future research in order to draw a more complete picture for all theinterested sectors, and to supplement the data with recent figures for 2012and 2013. / Fiber till hemmet (Fiber-to-the-Home, FTTH) har talats om sedan fiberintroducerades på 1970-talet. Det håller numera på att bli grunden för vårtnya digitala samhälle, och bidra till ekonomiskt välstånd och medföra en mängdaffärsmässiga, sociala och underhållningsmässiga möjligheter tillslutanvändare. Den ökade efterfrågan på höghastighetsnät tas mer och mer påallvar och ett fiberbaserat nät kan hantera dessa ökade krav på grund av dessbreda bandbredd och tillförlitlighet. Idag finns ett praktiskt behov avkvantitativ analys av de socioekonomiska effekterna av fiberbaseradeaccessnät. Denna analys kan användas som en indikator och referens för allaintressenter när de överväger framtida investeringar. Sverige är ett lämpligtmålland för denna analys eftersom den har antagit fiber i några år och defördelar som FTTH har fört verkar redan vara synliga. Det huvudsakligavärdet av denna avhandling ligger i utredningen av kvantifierade bevis för desocioekonomiska effekterna av FTTH utbyggnad i Sverige. Detta har uppnåtts pågrundval av uppgifter från den Post- och telestyrelsen (PTS), Statistiskacentralbyrån (SCB), tidigare liknande studier och information som samlats inpå nätet från aktörer inom fiber, tillsammans med empirisk analys baserad påmultivariate regressionsmodeller. Resultatet visat att fiber har haft enbetydande inverkan på befolkningens utveckling, speciellt netto in- ochutflyttning till en kommun, vilket indikerar attraktionskraft kommunerna isig. Det är därför rimligt att föreslå att kommunerna och de lokalamyndigheterna överväger fiber driftsättning på allvar om de vill lockainvånare att stanna för ytterligare lokal utveckling. Studien analyserar ocksåkonkurrensen på fiberbaserade öppna nät och priserna på 10/10 Mbps symmetriskInternet-tjänst. Resultaten visar att nätverk med flera konkurrerandetjänsteleverantörer har ett bredare utbud av tjänster och ett lägre pris: jufler Internetleverantörer i ett fibernät, desto lägre konsumentpriser. Merspecifikt, för varje ny tjänsteleverantör som finns i nätverket, minskar detgenomsnittliga priset med 5 kronor per månad, och det lägsta priset med cirka7 kronor per månad. Ändå förblir ett antal socioekonomiska effekteromätbara på grund av begränsade tillgängliga data. Rekommendationen är attinförliva fler socioekonomiska effekter i framtida forskning för att dra enmer komplett bild för alla berörda sektorer, och att komplettera data medfärska siffror för 2012 och 2013.
66

Právní odpovědnost poskytovatelů služeb informačních společností / Liability of the providers of information society services

Bošiak, Martin January 2013 (has links)
The primary aim of this thesis is to summarize the legal framework relating to the legal responsibility of Information Service Providers (ISP). This field is regulated by the Directive 2000/31/EC ('Directive on electronic commerce') and the Czech Act No. 480/2004 Coll., on certain information society services. The secondary purpose of this thesis is to compare these two legal frameworks, consider the differences between them and identify their consequences. The legal definition of ISP is fully analyzed in this thesis however this basically means any provider of information society service, i.e service provided at a distance, by electronic means, at the individual request of a recipient of services and normally provided for remuneration. The thesis is composed of four chapters dealing with different issues. The first chapter is the short introduction into legal responsibility as a legal instrument. The main attention is given to the article 420 of the Act No. 40/1964 Coll. (Civil Code) and the changes which will be brought by the Act No. 89/2012 Coll., i.e. the "new" Civil Code effective from 1.1.2014. The second chapter deals with the first rulings concerning the ISP liability abroad (Godfrey v. Demon Internet, LICRA v. Yahoo, A&M Records v. Napster). In my point of view, these judgments are, even...
67

Odpovědnost poskytovatele služeb informační společnosti za ukládání obsahu informací poskytovaných uživatelem / Liability of information society services provider for the storage of information provided by a recipient of the service

Jirovský, Jakub January 2018 (has links)
Thesis title: Liability of information society services provider for the storage of information provided by a recipient of the service This paper deals with a special liability rules for service providers that play a key role in the Internet environment and provide hosting services. Objectives of this paper are to specify the concept of the ISP, describe related current issues and above all to present and analyse the drafted legislation, which was presented by the European Commission at the end of 2016 and which has the potential to significantly influence the elaborated issues. In order to achieve the aforementioned objectives, the thesis identifies the legislation dealing with this issue and describes the relationship between the European and Czech regulations. It also further specifies the essential conditions for the attainment and subsequent preservation of a Safe Harbour, which excludes the application of general liability rules. It also deals with the ISP's no obligation to monitor the information they store. In connection with the above-mentioned matter, this thesis analyses important decision- making practice, which presents advanced interpretation of the issue and the development of SDEU's approach to the status of ISP in general. In its practical part, this paper focuses on the...
68

Third-Party TCP Rate Control

Bansal, Dushyant January 2005 (has links)
The Transmission Control Protocol (TCP) is the dominant transport protocol in today?s Internet. The original design of TCP left congestion control open to future designers. Short of implementing changes to the TCP stack on the end-nodes themselves, Internet Service Providers have employed several techniques to be able to operate their network equipment efficiently. These techniques amount to shaping traffic to reduce cost and improve overall customer satisfaction. <br /><br /> The method that gives maximum control when performing traffic shaping is using an inline traffic shaper. An inline traffic shaper sits in the middle of any flow, allowing packets to pass through it and, with policy-limited freedom, inspects and modifies all packets as it pleases. However, a number of practical issues such as hardware reliability or ISP policy, may prevent such a solution from being employed. For example, an ISP that does not fully trust the quality of the traffic shaper would not want such a product to be placed in-line with its equipment, as it places a significant threat to its business. What is required in such cases is third-party rate control. <br /><br /> Formally defined, a third-party rate controller is one that can see all traffic and inject new traffic into the network, but cannot remove or modify existing network packets. Given these restrictions, we present and study a technique to control TCP flows, namely triple-ACK duplication. The triple-ACK algorithm allows significant capabilities to a third-party traffic shaper. We provide an analytical justification for why this technique works under ideal conditions and demonstrate via simulation the bandwidth reduction achieved. When judiciously applied, the triple-ACK duplication technique produces minimal badput, while producing significant reductions in bandwidth consumption under ideal conditions. Based on a brief study, we show that our algorithm is able to selectively throttle one flow while allowing another to gain in bandwidth.
69

Third-Party TCP Rate Control

Bansal, Dushyant January 2005 (has links)
The Transmission Control Protocol (TCP) is the dominant transport protocol in today?s Internet. The original design of TCP left congestion control open to future designers. Short of implementing changes to the TCP stack on the end-nodes themselves, Internet Service Providers have employed several techniques to be able to operate their network equipment efficiently. These techniques amount to shaping traffic to reduce cost and improve overall customer satisfaction. <br /><br /> The method that gives maximum control when performing traffic shaping is using an inline traffic shaper. An inline traffic shaper sits in the middle of any flow, allowing packets to pass through it and, with policy-limited freedom, inspects and modifies all packets as it pleases. However, a number of practical issues such as hardware reliability or ISP policy, may prevent such a solution from being employed. For example, an ISP that does not fully trust the quality of the traffic shaper would not want such a product to be placed in-line with its equipment, as it places a significant threat to its business. What is required in such cases is third-party rate control. <br /><br /> Formally defined, a third-party rate controller is one that can see all traffic and inject new traffic into the network, but cannot remove or modify existing network packets. Given these restrictions, we present and study a technique to control TCP flows, namely triple-ACK duplication. The triple-ACK algorithm allows significant capabilities to a third-party traffic shaper. We provide an analytical justification for why this technique works under ideal conditions and demonstrate via simulation the bandwidth reduction achieved. When judiciously applied, the triple-ACK duplication technique produces minimal badput, while producing significant reductions in bandwidth consumption under ideal conditions. Based on a brief study, we show that our algorithm is able to selectively throttle one flow while allowing another to gain in bandwidth.
70

有線寬頻服務產業競爭策略分析

林茂陽, Lin, Mao-Yang Unknown Date (has links)
由於數位化技術的啟動、網際網路的應用、電訊傳播政策的解禁,使得傳播產業、通訊產業發生「典範轉移」,將原本完全獨立的電信產業、有線電視產業與網際網路產業匯流合而為一,而寬頻的驅力更促使匯聚與整合。 有線電視與電信服務的互跨經營、新固網業者的加入,在這「競爭」的寬頻網路服務產業,匯聚使得市場形貌改變,也產生管理的典範轉移。典範轉移後的策略思考與策略規劃就成為寬頻服務經營者必須加以思索並具體因應。 本研究主要探討,寬頻服務產業現況發展,機會與威脅、新固網加入後,寬頻服務產業競爭分析,其相對優劣勢、寬頻服務產業未來發展形貌、寬頻服務產業關鍵成功因素、寬頻服務經營者策略模式分析;結論如下: 寬頻服務經營者需建置一啟動網路效應產生價值的整合服務平台,平台機制的完善、提供多元創新加值的服務為關鍵成功因素。寬頻服務經營者所提供的服務可以IDC為寬頻服務後勤系統,以此為寬頻入口,不斷蓄積更多服務,以內容為驅力,吸引寬頻服務用戶續留於此,不斷累積並創造價值。 寬頻服務具有規模經濟與範疇經濟的特性,實體傳輸網路建設成本高,唯有擴大經營規模,獲取邊際成本遞減的效益,才能充分降低成本。另一方面,服務項目的增加,並不會大幅改變其所投入的建設成本,若有線電視與電信事業兩者相互經營合作,將促使其服務、技術更進步,更節省架設網路、人事管理與行銷等經營成本,同時也將提供更多樣化的服務,進而擴大其經營績效。 發展以電視為作業平台的寬頻服務,掌握電視與有線電視的普及率,是有線寬頻服務經營者的發展的利基。關鍵在於視訊轉換盒(Set-Top-Box)與操作環境。發展以「遙控器」「電視」為思考操作介面環境,更為接近人性化寬頻服務,以「家庭用戶」「數位娛樂影音服務」的寬頻服務,區分以「鍵盤」「PC」「數據服務」的電信寬頻服務。 另核心能力的運用,動態能耐的轉移也是關鍵。以過去核心能力轉移至寬頻服務的能力,整合寬頻內容服務提供者,提供多元寬頻服務內容以內容為驅力作為發展策略依據。未來寬頻服務一定是合作大於競爭,集團合作發揮綜效,共享資源與價值活動。唯有上下游整合的完整寬頻服務提供體系,才能在大者恆大的市場競局中存活。

Page generated in 0.0265 seconds