Prompt

You have not logged in or are not authorized!

Remember my choice for next time?

Issue 59(03/2011)

Let us COMMUNICATE beyond technology and together understand the latest industry trends, analyze successful cases, find out about leading technologies and much more.
download PDF subscribe

Editorial

The third wave is already on the way. With everything connected, productivity will grow, and people’s lives improve. Huawei is ready to work with the whole industry to bring this connected world to reality...
Download(179KB)

Experts' Forum

Toshihiko Yumoto, Vice President, General Manager of Mobile Network Development Division at KDDI: Japanese operators are currently strengthening their mobile infrastructure to gear up for the coming data explosion. Toshihiko Yumoto of KDDI discusses the operator’s mobile network development strategy and LTE plan...
Download(151KB)

President of Huawei Core Network Product Line, Cai Liqun: Operators today are worried that MBB will lead to a price war in the same way voice did. It is clear that we need to find a balance between providing quality services and sustaining profit...
Download(168KB)

Huawei Chief Strategy & Marketing Officer, Yu Chengdong: To simultaneously support GSM, UMTS, and LTE, traditional models call for three sets of equipment and three networks, placing major pressure on operators. The solution lies in addressing the true requirements of MBB...
Download(209KB)

Main Topic

Service-aware charging and control has been the focal point of the billing and packet core industry for some time. What are the most important factors to consider in relation to them...
Download(180KB)

Seamless MPLS networking greatly reduces cooperation between different network layers when services are deployed, allows operators to quickly provide services, and lowers deployment costs. Also, reliability/OAM detection can be deployed easily...
Download(200KB)

Introduction of IPSec and the approach of transmission devices using permanent IP addresses enable tracking back to sources at the network layer, and thereby provide an end-to-end solution for network security...
Download(149KB)

According to a recent survey, there are only 252 million free IPv4 addresses, and these will be used up soon. Industry insiders recognize that IPv6 is the most likely solution to the IPv4 address shortage...
Download(194KB)

How to Operate

An increasing number of entrepreneurs and individuals in the US and other parts of the world are using smartphone card readers for their daily transactions, increasing the growth momentum of Near-Field Communications (NFC) technology...
Download(152KB)

Operators are searching for a new business model to offset increasing competition. An optimal solution is to provide end-to-end ICT solutions to enterprises based on their IT and communication needs...
Download(165KB)

With the rise of mobile Internet, traffic has increased significantly. If operators are to take advantage of this, they must transform from being simply voice-based businesses to smart traffic operations, like China Telecom Inner Mongolia...
Download(210KB)

Storage & Security

The computer has changed the course of human history and is now part of people's everyday lives. With computer technologies advancing, the SSD will probably change the world again by changing the computer system...
Download(167KB)

With the rapid growth in Internet usage, network threats are on rise. Traditional firewalls and unified threat management (UTM) products can no longer withstand various malicious threats at the application and file layers...
Download(168KB)

Non-structured file-type data is increasing at the fastest rate and predicted to occupy 80% of total storage capacity by next year. Finding a solution for data storage has thus become increasingly important for enterprise users...
Download(285KB)

According to Gartner, 40% of companies that suffer a catastrophic data loss become unable to continue operations. Thus, an efficient data backup solution is required to meet the growing service and data volume...
Download(226KB)

The efficiency of an IT ecological process is determined by whether or not the storage system, the source of data for the entire IT ecological chain, is able to effectively transmit data...
Download(223KB)