EGUIDE:
Telekom Malaysia has been driving automation efforts across the company, not only to serve customers more efficiently, but also to improve a slew of back office functions. Learn more about why they are the telecommunications project of the year.
PRESENTATION:
In this presentation from our CW500 event, director of digital architecture and transformation Chris Boyd explains how Telefonica tackled the challenges of delivering people, cultural and organisational change.
EZINE:
In this handbook, focused on enterprise 5G in the Asia-Pacific region, Computer Weekly looks at what the technology means for enterprises across the region.
ESSENTIAL GUIDE:
This survey of business leaders by the Economist Intelligence Unit for Pegasystems finds that businesses are mostly confident they will reach their digital transformation agendas, but senior business leaders need to be more closely involved.
WHITE PAPER:
Read this paper to learn more about the emerging trend of digital billboard advertising and how it can enhance responsiveness, flexibility and profits.
PRESENTATION TRANSCRIPT:
Learn how BroadSoft and AudioCodes have tackled the critical concerns making it possible for carriers of all sizes to be a success in delivering and managing a superior, cost effective IP voice network that is simple to deploy.
WHITE PAPER:
This white paper is intended to provide service providers with IBM's point of view on the power of collaboration in a Web 2.0 environment and to introduce a new IBM solution that can help telecoms to use collaboration as a tool for enabling innovation.
DATA SHEET:
This paper discusses how Intel and Neusoft took advantage of the performance and scalability of Intel® Xeon® processor 7500 series-based servers to address some of the critical challenges in the telecom industry.
PRODUCT LITERATURE:
Unlicensed mobile access (UMA) technology provides access to GSM and GPRS mobile services over unlicensed spectrum technologies, including Bluetooth and 802.11 (WiFi).
EGUIDE:
In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.