• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 2
  • 1
  • Tagged with
  • 8
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Transformation of Telco business strategy driven by over-the-top services such as WhatsApp, Skype and Netflix: The case of the Czech Republic. / Transformation of Telco business strategy driven by over-the-top services such as WhatsApp, Skype and Netflix: The case of the Czech Republic

Kabusheva, Sabina January 2015 (has links)
The following thesis aims to describe the transformation of telco operators' business strategy evoked by the growing popularity and usage of Internet services like WhatsApp, Skype and Netflix, also known as over-the-top services. The thesis provides comprehensive overview of transformations in the telecom industry that have been taking place globally, explaining the drivers that led to inception of free or cheaper Internet-based services, their business models. It then narrows down to the thorough analysis of the Czech market, capturing the implications that over-the-top services have on business strategy of the major Czech telco players. The analysis is strongly supported by industry reports, statistics and quantitative research. The primary research adds in telco customers' perspectives, usage and value perception of over-the-top services, as well as their satisfaction with respective telco services and their pricing. Derived findings identify major developments and trends in the Czech telco market; they also suggest compelling observations for related businesses.
2

Entre oportunidades e recursos: a estrat?gia competitiva de uma operadora no mercado regulado das telecomunica??es / Between opportunities and resources: an The competitive strategy of an operator in the regulated market of Telecommunications

Caldas, Celia Regina de Souza 14 December 2016 (has links)
Submitted by Celso Magalhaes (celsomagalhaes@ufrrj.br) on 2018-03-15T12:12:02Z No. of bitstreams: 1 2016 - Celia Regina de Souza Caldas.pdf: 2562125 bytes, checksum: 963804d7cc59b2a3215a6dfd314fe5b0 (MD5) / Made available in DSpace on 2018-03-15T12:12:02Z (GMT). No. of bitstreams: 1 2016 - Celia Regina de Souza Caldas.pdf: 2562125 bytes, checksum: 963804d7cc59b2a3215a6dfd314fe5b0 (MD5) Previous issue date: 2016-12-14 / The avalanche of new services available on platforms that enable voice-over-data technologies such as Internet TV, streaming technology videos and WhatsApp communication have become part of consumers' daily lives, which overwhelm telecommunications and wireless carriers Competitiveness in the market. The scenario refers to a necessary change of behavior in the sector, parallel to an essential revision of the existing regulation. This study analyzes the impacts of the regulated telecommunications market in the process of convergence with the IT industry, where regulation has a dual influence on the industry: ensuring order in telecommunication services and, on the other hand, an offensive risk of disadvantage in the Competitiveness and restraint of innovation in a digital economy. Based on the contributions of the VBM and VBR theories, an exploratory research was developed, carried out through a single case study and bibliographic review, under the lens of the regulatory impacts on competitiveness. Data were collected through semi-structured interview of the strategic body of a telecom operator, being treated in a qualitative way. The analysis pointed to a finding: regulation as a strong influencer in strategic positioning can be harmful to the competitiveness and deflagration of the industry when it can not keep up with the evolution and dynamism of the sector. With this, the operator under study proposes a new business model based on a strategy of aggregation of IT services over telecom, indicating an alternative to innovate within a regulated market. It is understood that an operator model, lighter, agile and digital, is necessary in the consolidation of a "Telco Digital". It is hoped, with the strategy outlined, to successfully face the process of transformation of the industry and to maintain in the market a viable and sustainable model of operator in the digital economy. / A avalanche de novos servi?os disponibilizados em plataformas que viabilizam tecnologias de voz sobre dados, como a TV por internet, v?deos em tecnologia streaming e a comunica??o WhatsApp passaram a fazer parte do cotidiano dos consumidores, o que sobrecarregam as redes das operadoras de telecomunica??es e acirra a competitividade no mercado. O cen?rio remete a uma necess?ria mudan?a de comportamento no setor, paralelo a uma essencial revis?o da regulamenta??o existente. Este estudo analisa os impactos do mercado regulado das telecomunica??es em pleno processo de converg?ncia com a ind?stria de TI, onde a regulamenta??o exerce dupla influ?ncia sobre a ind?stria: garantir a ordem nos servi?os de telecomunica??es e, por outro lado, um risco ofensor de desvantagem na competitividade e freio da inova??o em uma economia digital. Com base nos aportes das teorias de VBM e VBR, desenvolveu-se uma pesquisa de car?ter explorat?rio, realizada atrav?s de estudo de caso ?nico e revis?o bibliogr?fica, sob a lente dos impactos regulat?rios na competitividade. Os dados foram coletados atrav?s de entrevista semiestruturada do corpo estrat?gico de uma operadora de telecom, sendo tratados de forma qualitativa. As an?lises apontaram para uma descoberta: a regulamenta??o como forte influenciadora no posicionamento estrat?gico, pode ser nociva ? competitividade e deflagra??o da ind?stria quando n?o consegue acompanhar a evolu??o e o dinamismo do setor. Com isso, a operadora em estudo prop?e um novo modelo de neg?cio pautado numa estrat?gia de agrega??o de servi?os de TI sobre telecom, indicando uma alternativa de inovar dentro de um mercado regulado. Entende-se que um modelo de operadora, mais leve, ?gil e digital, ? necess?rio na consolida??o de uma ?Telco Digital?. Espera-se, com a estrat?gia delineada, enfrentar com ?xito o processo de transforma??o da ind?stria e manter no mercado um modelo vi?vel e sustent?vel de operadora na economia digital
3

Collaborative Planning in Modern Supply Chain / Collaborative Planning in Modern Supply Chain

Nýdlová, Olga January 2009 (has links)
This master thesis describes and proves how companies can improve their operational performance and supplier relationships by using modern collaborative and planning practices, specifically the Collaborative Planning Forecasting and Replenishment (CPFR) concept. The theoretical part depicts main developments in supply chain planning over time, shows common challenges in the world of supply chain and offers possible solutions in terms of collaborative supply chain planning practices. The practical part analyzes the CPFR process between one of the leading providers of telecommunications services T-Mobile and its major mobile handset supplier Nokia. The concluding part defines gaps between an ideal to-be process of supply chain collaboration and the status quo process. Status quo benefits of current CPFR processes are described as well.
4

Aplikace CVM v telekomunikační společnosti / CVM Application in Telco Company

Machander, Aleš January 2010 (has links)
Obsahem práce je téma Customer Value Management (CVM) v oblasti telekomunikací. Z důvodu poměrně velké saturace tohoto trhu nabývá na důležitosti navyšování tržeb plynoucí ze stávající zákaznické báze. Za hlavní cíle jsem vytyčil zpracování komplexního teoretického základu CVM a studie zabývající se nastavením efektivního retenčního procesu. V teoretické části čtenáře seznamuji se základními aspekty CVM - hodnota zákazníka (CLV), Campaign Management System, odchozí a příchozí komunikační kampaně a kontaktní strategie. Nedílnou součástí je popis Business Intelligence nástrojů -- prediktivní modely a zákaznická segmentace. Praktická část spočívá ve vypracování zmíněné studie. V reálném prostředí telekomunikační společnosti jsem analyzoval současný stav retenčního procesu a na základě zjištěných informací jsem navrhl nové CVM aktivity, které vedou ke zvýšení hodnoty zákaznické báze. Hlavními přínosy práce jsou poskytnutí teoretického základu o oblasti CVM, který slouží jako dostačující informační zdroj pro potřeby v akademickém i business prostředí a navržená studie CVM aktivit v retenčním procesu vhodná pro použití i ve společnostech mimo telekomunikační odvětví.
5

Mobilní webová analytika - Nástroj pro analýzu návštěvnosti mobilního portálu / Mobile web analytics - tool for analysis of the mobile portal traffic

Joha, Miroslav January 2011 (has links)
This thesis analyses tools for mobile web portal logs processing which could be used for reporting of required metrics. The area covers not only web analytics, but also mobile web and mobile handsets capabilities. The objective is to analyze possibilities of existing products which can be used to process web logs and choose appropriate existing or propose proprietary solution. This solution should comply with requirements and limitations given by the portal platform limitations. Theoretical part introduces the web analytics domain and the mobile web environment. Basic concepts and metrics are described as well as the fundamental data collection methods and mobile internet basic specifics. The knowledge of the web analytics and mobile web basics are crucial to be able to eruditely assess the tools capabilities introduced in the second part of this thesis. In the practical part, there are technical details on the mobile portal operating environment described. The requirements for the tool outputs are defined there and the prospective ready-to-use solutions are researched. The final part of the text addresses the final solution for the mobile portal reporting tool including the operational data processing. The secondary output of this thesis comprises of explanation of the mobile web analytics area for the broader audience. The main output of the practical part is analysis and specification of the requirements for mobile portal reporting tool and design of the solution with the supervision of the implementation and deployment within the production environment.
6

Performance evaluation of security mechanisms in Cloud Networks

Kannan, Anand January 2012 (has links)
Infrastructure as a Service (IaaS) is a cloud service provisioning model which largely focuses on data centre provisioning of computing and storage facilities. The networking aspects of IaaS beyond the data centre are a limiting factor preventing communication services that are sensitive to network characteristics from adopting this approach. Cloud networking is a new technology which integrates network provisioning with the existing cloud service provisioning models thereby completing the cloud computing picture by addressing the networking aspects. In cloud networking, shared network resources are virtualized, and provisioned to customers and end-users on-demand in an elastic fashion. This technology allows various kinds of optimization, e.g., reducing latency and network load. Further, this allows service providers to provision network performance guarantees as a part of their service offering. However, this new approach introduces new security challenges. Many of these security challenges are addressed in the CloNe security architecture. This thesis presents a set of potential techniques for securing different resource in a cloud network environment which are not addressed in the existing CloNe security architecture. The thesis begins with a holistic view of the Cloud networking, as described in the Scalable and Adaptive Internet Solutions (SAIL) project, along with its proposed architecture and security goals. This is followed by an overview of the problems that need to be solved and some of the different methods that can be applied to solve parts of the overall problem, specifically a comprehensive, tightly integrated, and multi-level security architecture, a key management algorithm to support the access control mechanism, and an intrusion detection mechanism. For each method or set of methods, the respective state of the art is presented. Additionally, experiments to understand the performance of these mechanisms are evaluated on a simple cloud network test bed. The proposed key management scheme uses a hierarchical key management approach that provides fast and secure key update when member join and member leave operations are carried out. Experiments show that the proposed key management scheme enhances the security and increases the availability and integrity. A newly proposed genetic algorithm based feature selection technique has been employed for effective feature selection. Fuzzy SVM has been used on the data set for effective classification. Experiments have shown that the proposed genetic based feature selection algorithm reduces the number of features and hence decreases the classification time, while improving detection accuracy of the fuzzy SVM classifier by minimizing the conflicting rules that may confuse the classifier. The main advantages of this intrusion detection system are the reduction in false positives and increased security. / Infrastructure as a Service (IaaS) är en Cloudtjänstmodell som huvudsakligen är inriktat på att tillhandahålla ett datacenter för behandling och lagring av data. Nätverksaspekterna av en cloudbaserad infrastruktur som en tjänst utanför datacentret utgör en begränsande faktor som förhindrar känsliga kommunikationstjänster från att anamma denna teknik. Cloudnätverk är en ny teknik som integrerar nätverkstillgång med befintliga cloudtjänstmodeller och därmed fullbordar föreställningen av cloud data genom att ta itu med nätverkaspekten.  I cloudnätverk virtualiseras delade nätverksresurser, de avsätts till kunder och slutanvändare vid efterfrågan på ett flexibelt sätt. Denna teknik tillåter olika typer av möjligheter, t.ex. att minska latens och belastningen på nätet. Vidare ger detta tjänsteleverantörer ett sätt att tillhandahålla garantier för nätverksprestandan som en del av deras tjänsteutbud. Men denna nya strategi introducerar nya säkerhetsutmaningar, exempelvis VM migration genom offentligt nätverk. Många av dessa säkerhetsutmaningar behandlas i CloNe’s Security Architecture. Denna rapport presenterar en rad av potentiella tekniker för att säkra olika resurser i en cloudbaserad nätverksmiljö som inte behandlas i den redan existerande CloNe Security Architecture. Rapporten inleds med en helhetssyn på cloudbaserad nätverk som beskrivs i Scalable and Adaptive Internet Solutions (SAIL)-projektet, tillsammans med dess föreslagna arkitektur och säkerhetsmål. Detta följs av en översikt över de problem som måste lösas och några av de olika metoder som kan tillämpas för att lösa delar av det övergripande problemet. Speciellt behandlas en omfattande och tätt integrerad multi-säkerhetsarkitektur, en nyckelhanteringsalgoritm som stödjer mekanismens åtkomstkontroll och en mekanism för intrångsdetektering. För varje metod eller för varje uppsättning av metoder, presenteras ståndpunkten för respektive teknik. Dessutom har experimenten för att förstå prestandan av dessa mekanismer utvärderats på testbädd av ett enkelt cloudnätverk. Den föreslagna nyckelhantering system använder en hierarkisk nyckelhantering strategi som ger snabb och säker viktig uppdatering när medlemmar ansluta sig till och medlemmarna lämnar utförs. Försöksresultat visar att den föreslagna nyckelhantering system ökar säkerheten och ökar tillgänglighet och integritet. En nyligen föreslagna genetisk algoritm baserad funktion valet teknik har använts för effektiv funktion val. Fuzzy SVM har använts på de uppgifter som för effektiv klassificering. Försök har visat att den föreslagna genetiska baserad funktion selekteringsalgoritmen minskar antalet funktioner och därmed minskar klassificering tiden, och samtidigt förbättra upptäckt noggrannhet fuzzy SVM klassificeraren genom att minimera de motstående regler som kan förvirra klassificeraren. De främsta fördelarna med detta intrångsdetekteringssystem är den minskning av falska positiva och ökad säkerhet.
7

Can dinosaurs generate unicorns? : -A corporate approach for early stage idea validation

Filomena, Melissa, Sarkar, Protik January 2018 (has links)
Companies are always trying to increase their sales and revenue, but nowadays due to technology advancement, competence and the fast moving economy this task becomes more difficult as time goes by. This is where innovation walks in, to find new ways to add value to customers, increasing profit and even find new potential markets. As part of implementing innovative practices, many companies have added corporate entrepreneurship to their structure, to look for new business models that reach diverse customers within the same industry. Getting in the mind of customers, trying to decipher unspoken needs and matching problems to new solutions is part of the insighting process that has to be done when attempting idea incubation. This research seeks to provide a methodology to make the insighting process for early idea validation, in a corporate environment, less manual and more mechanical. For this purpose the Stockholm division of Telia Company was used as study case and main source of data recollection, which brings the research results to a practical use and analysis.
8

Study on reducing the overhead of equipment management in telco cloud infrastructure / Studie om resursutnyttjande hos utrustningshantering i molninfrastruktur för telekom

Sörensen, Alexander January 2022 (has links)
This thesis has been carried out on behalf of the department of Digital Services - SDI at Ericsson. Ericsson Software Defined Infrastructure (SDI) is a telco grade hardware management solution for cloud infrastructure. In datacenter deployments, the extra management equipment needed by the solution becomes insignificant due to the amount of equipment it manages. But the closer to the cloudedge you get, the smaller in size the deployments become, thus making the management equipment an ever-increasing share of the total deployment seize leading to inefficient resource utilization, so called overhead. Especially with Distributed Radio Access Networks (RAN) many small deployments, often only consisting of a single compute-server used to process radio, will be deployed at radio sites and/or in buildings around cities to deliver cell service. In this type of usage, the overhead of equipment management builds up cumulatively due to the numerous amounts of deployments. This overhead leads to excessive maintenance, power usage, space needs for equipment, costs, and electronic waste. The goal of this thesis was to evaluate how to reduce the overhead of equipment management in a scenario involving numerous small-capacity widely-distributed sites which are common in the 5G telco cloud. The idea was to determine if the overhead could be reduced by exploiting Baseboard Management Controllers (BMC), this was tested by designing a low-footprint and lightweight proof of concept equipment management solution and implementing a prototype of it. By testing, verifying, and analyzing the proof-of-concept solution, it was concluded that by exploiting the BMC to run a custom software service that phoned home to a centralized management server it was possible to drastically reduce the overhead in such scenarios. It also became clear that BMCs could have even more usage areas and provide even greater value if support to run third partyapplications existed among them. / Detta examensarbete har utförts på uppdrag av avdelningen Digital Services - SDI på Ericsson. Ericsson Software Defined Infrastructure (SDI) är en hårdvaruhanteringslösning av telekomkvalitetför molnifrastruktur. I datacenterinstallationer blir den extra hanteringsutrustning som behövs av lösningen obetydlig på grund av mängden utrustning den hanterar. Men ju längre ut till molnkanten du kommer, desto mindre blir storleken på installationerna, vilket gör att hanteringsutrustning blir en ständigt ökande andel av den totala installationsstorleken som leder till ineffektivt resursutnyttjande, så kallat overhead. Speciellt med Distribuerade Radio Access Nätverk (RAN) så kommer många små installationer, ofta endast bestående av en enda server som utför radiolänksberäkningar, att vara fysiskt utplacerade vidbasstationer och/eller i byggnader runt städer för att leverera och tillhandage mobiltjänster. Vid denna typ av användning ökar overheadet för utrustningshanteringen kumulativt på grund av antalet installationer. Detta overhead leder till mer underhåll och elektroniskt avfall, större utrymmesbehov för utrustning samt högre strömförbrukning och kostnader. Målet med detta examensarbete var att utvärdera hur man kan minska overheadet hosutrustningshantering när det tillämpas på ett stort antal, små decentraliserade distribuerade installationer, vilket är förekommande i telekommoln. Idén var att undersöka om overheadet kunde minskas genom att utnyttja Baseboard Management Controllers (BMC), detta testades genom att designa en liten och lättviktigt konceptlösning för utrustningshantering samt implementera en prototyp av den. Genom att testa, verifiera och analysera konceptlösningen drogs slutsatsen att det var möjligt att drastiskt minska overheaden i sådana scenarion genom att utnyttja BMC att köra en egen mjukvarutjänst, som automatiskt anslöt till en central hanteringsserver. Genom arbetet blev det också tydligt att BMC:er skulle kunna ha ännu fler användningsområden och ge ännu större värde om stödet för att köra tredjepartsapplikationer på dem var mer utbrett

Page generated in 0.0411 seconds