Month: February 2016

Convergence – Intelligent System, Mobile Data Charging, AI and PCRF
Deep packet inspection (DPI) to gain actionable intelligence on traffic flows. Policy rules to define how to manage traffic based on information gathered through DPI, network resources, subscriber profiles, and offered services. Policy enforcement to implement policy at a granular level in real-time across the network, applying policy rules to DPI data.

Mobile Payments – Need, Opportunity or Myth
Mobile payments can be defined as any payment transactions, whether in close proximity or remote. Payments can happen through Internet, proximity technologies charge back or can be executed on mobile devices. Mobile payments market potential, as well as the different trends in business models and technologies that are shaping the global payments and mobile payments evolution are visible as opportunities to be taken up. Decision makers in banks and other financial or even out side traditional

PCRF the Liberator for Mobile Data Charging
HSS basically plays its main function of authenticating the LTE subscribers with IMSI as the primary key for SAE-HSS and IMPU (IMS Public ID) + IMPI (IMS Private ID) for IMS VoLTE authentication. SPR is the repository for the subscriber’s policies and profiles for QoS management. Both HSS and SPR are the front-end elements because the back-end element, i.e., UDR, is the database that stores all information.

MNO Charging & Billing Systems
Telecom subscribers are getting smarter (so it’s not only the handset which is getting smarter haan!!!), demanding more and more and, at the same time many new players are entering the marketplace. To compete in this environment, operators have to not only maintain but also grow their part of the new value chain to gain loyal customers and adding new blended services which are ridding on their investment/infrastructure made during all those time

Privacy Hell, Also Known As The Internet Of Things
IoT (Internet of Things) is a network of physical objects embedded with software, sensors and connectivity. The “things” within this network, can sense, process and share data with each other. What we need today is the SECaaS (security as a service) model, which is still gray and distorted as applications, software, storage, and infrastructure run remotely. #AILabPage