SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Outsourcing small cell
deployment – How process
automation tools can enable 3rd
parties
Justin Paul
Head of Marketing
Amdocs OSS Division
July 23rd 2014
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs2
Agenda
● Small cells
● Deployment challenges
● New Players
● Outsourcing models
● Limitations of today’s planning tools
● Managing 3rd parties
● Smarter tools and processes
● Q&A
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs3
Small Cells
(Images courtesy of Alcatel Lucent)
● Small cellular base stations
● Licensed spectrum
● Targeted coverage & capacity
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs4
Small Cell Deployment - The challenges
●  Operators can’t keep up with the
rapid introduction of new technology
while continuously expanding
network capacity
●  High complexity and sheer volume
of tasks mean operators cannot
meet their time, cost, and quality
targets
●  Some operators are planning to
deploy 1,000s of small cells per
month!
●  They need to manage 100s of
related projects simultaneously
using low-cost, low-skilled human
resources to install the equipment
High Cost
Volume
Lack of
Automation
Complexity
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs5
Backhaul Complexity - Examples
SC Controller
New 3G, 4G LTE + WiFi
CoreNetwork
Aggregation&Access
Wireless Hub
(P2MP)
SC Controller
Satellite
Rural Small Cell
Fibre
3rd Party
Leased Line
PoP
LoS
PoP
Fibre Fibre Fibre
Outdoor/Indoor
Small Cells
Wireless
P2P
Urban Small Cells
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs6
Small Cells – New Players
Multi-Services
Operators
(MSOs, Cable
Companies)
Fixed Network
Operators (e.g.
Traditional
Telcos)
Tower
Companies
(such as
American
Towers,
Goodman, B&V)
Municipalities,
Advertising and
Public Transport
Companies
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs7
Outsourcing Models
Outsourcing:
The transfer of day-to-day management
responsibility as a strategic method
for increasing the effectiveness and
efficiency of network build and
operations
1. Site Acquisition or Leasing 2. Network plan and build services
3. Backhaul as a service4. Small Cells as a Service
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs8
Managing the End-to-End Process
Finance Planning Design Construction
Create
Project
Validate
Backhaul Solution
Initial
Solution
Approval
Conduct
Kick-Off
Create
Location
Site
Walk
Network
Design
Project
approvals
Establish Initial
Backhaul Options
Install
Equipment
Provision
Inventory
Telco
Ready
Order
Transport
Project
Close Out
Validate
Address
Project /
Task Management
Sites & Estates Partner Management
Initiation Planning Design Construction Optimization
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs9
Limitations of Today’s Planning
Tools and Processes
Lack of end-end orchestration across
multiple systems and organizational groups
Inability to scale effectively across tens
of thousands small cells
Lack of agility to handle in-flight
project changes
Lack of centralised information for network
resources – (single source of truth)
Lack of integrated technical design
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs10
1st Poll Question
Poll #1
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs11
Challenges of Managing 3rd parties
Who, when and where?
Contractual obligations
Accountability
3rd Party Management
Process
Governance and SLA
management
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs12
Speeds time
to market for
Small Cells
Need for Smarter Tools and Processes
Reduces
rollout cost
through
increased
efficiency
Enables large
scale projects
(1000s small
cells per
month)
Limits
project risk
and human
error across
3rd parties
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs13
Initiation Construction OptimizationDesignPlanning
Validate
Backhaul Solution
Initial
Solution
Approval
Conduct
Kick-Off
Create Location
Site Walk
Network
Design
Project
approvals
Establish Initial
Backhaul Options
Install
Equipment
Provision
Inventory
Telco
Ready
Order
Transport
Create
Project
Project
Close Out
Validate
Address
Automating the Rollout Process
Smart Cell
Placement
Where to locate
small cells?
Dynamic process
and project management
Plan and Design Installation
Guided Field-Force
Tasks
Import
cell
locations
Assign
field user
tasks
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs14
Related Components
A catalog driven ‘factory’ approach
Catalog - Driven Rollout Factory “Design once, deploy many times”
Information Security Level 2 – Sensitive
© 2012 – Proprietary and Confidential Information of Amdocs
Decomposi)on	
  and	
  
Plan	
  Genera)on	
  
Network	
  Design	
  Blocks	
  
Project	
  Flow	
  Blocks	
  
Re-­‐usable	
  
Network	
  Design	
  
Automa)c	
  End-­‐End	
  
Plan	
  Genera)on	
  
Network and
Project Profile
Requirements
Modular,
reusable,
Building
Blocks
‘The Factory’
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs15
Benefits of Dynamic Plan Management
Rapid plan generation
for each small cell
•  Project plan and
network design
automatically built
from requirements
•  Highly repeatable
Easier to maintain
•  Plan templates for
each small cell type
stored in catalog
•  BPEL ‘building
blocks’ easy to
create
More flexible –
‘on-demand’
•  In-flight project
changes
•  Workarounds and
plan updates without
disrupting project
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs16
Stages of outsourcing
Consultation and
strategy
•  Scoping, Framing,
Risk Analysis,
Planning
Technical design
services
•  Radio Planning, Cell
Placement, Network
Design, IT
Archictecture
Partnerships and
alliances
•  Shared Risk,
Combined expertise,
Domain Knowhow
Full Project
Management
and Governance
•  Project planning and
execution,
monitoring/tracking,
escalation and
problem resolution
Outsourcing
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs17
2nd Poll Question
Poll #2
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs18
Summary
•  Operator challenges
•  Complexity, Volume, Lack of Automation and
Cost
•  New Players
•  More opportunities to outsource
•  Need for smarter tools
•  With common information and processes
•  Amdocs’ catalog driven approach to process
management
•  Helps resolve project complexity and
scalability across 3rd parties
•  Stages of Outsourcing
From consultancy to full Project Management
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs19
Thank You
Questions and Answers
Information Security Level 1 – Confidential
© 2014 – Proprietary and Confidential Information of Amdocs20
Who to contact?
● Justin Paul, Head of Marketing, Amdocs OSS Division
●  justin.paul@amdocs.com
● Phil Bull, Solutions Marketing Manager
●  philip.bull@amdocs.com
● Visit our website at:
http://www.amdocs.com/Products/OSS/network-planning/Pages/
small-cell-solution.aspx

Weitere ähnliche Inhalte

Was ist angesagt?

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...Digital Bond
 
Network operations center (noc)
Network operations center (noc)Network operations center (noc)
Network operations center (noc)Elena Benson
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420Steve Goeringer
 
Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMSCharles Stevenson
 
Presnell David_2017 - Resume
Presnell David_2017 - ResumePresnell David_2017 - Resume
Presnell David_2017 - ResumeDavid G. Presnell
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2KBIZEAU
 
Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...Real-Time Innovations (RTI)
 
Best practices for building network operations center
Best practices for building  network operations centerBest practices for building  network operations center
Best practices for building network operations centerSatish Chavan
 
Nuevo estándar para diseño de data center ANSI/BICSI-002
Nuevo estándar para diseño de data center ANSI/BICSI-002Nuevo estándar para diseño de data center ANSI/BICSI-002
Nuevo estándar para diseño de data center ANSI/BICSI-002Data Center Consultores
 
IIOT on Variable Frequency Drives
IIOT on Variable Frequency DrivesIIOT on Variable Frequency Drives
IIOT on Variable Frequency Drivesmuthamizh adhithan
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITPrecisely
 
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...Digital Bond
 
Network operation center
Network operation centerNetwork operation center
Network operation centerMapYourTech
 

Was ist angesagt? (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
 
Network operations center (noc)
Network operations center (noc)Network operations center (noc)
Network operations center (noc)
 
Durmaz Technology
Durmaz TechnologyDurmaz Technology
Durmaz Technology
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
 
Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMS
 
Slides_Goeringer Steve
Slides_Goeringer SteveSlides_Goeringer Steve
Slides_Goeringer Steve
 
venky 123
venky 123venky 123
venky 123
 
Presnell David_2017 - Resume
Presnell David_2017 - ResumePresnell David_2017 - Resume
Presnell David_2017 - Resume
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2
 
Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...
 
Best practices for building network operations center
Best practices for building  network operations centerBest practices for building  network operations center
Best practices for building network operations center
 
Nuevo estándar para diseño de data center ANSI/BICSI-002
Nuevo estándar para diseño de data center ANSI/BICSI-002Nuevo estándar para diseño de data center ANSI/BICSI-002
Nuevo estándar para diseño de data center ANSI/BICSI-002
 
IIOT on Variable Frequency Drives
IIOT on Variable Frequency DrivesIIOT on Variable Frequency Drives
IIOT on Variable Frequency Drives
 
David regner CV
David regner CV David regner CV
David regner CV
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
 
Scott A Boggs
Scott A BoggsScott A Boggs
Scott A Boggs
 
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
 
Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids 	Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids
 
Network operation center
Network operation centerNetwork operation center
Network operation center
 

Andere mochten auch

Red Hat Developer Day London: Advanced Java & JBoss in the Cloud
Red Hat Developer Day London: Advanced Java & JBoss in the Cloud Red Hat Developer Day London: Advanced Java & JBoss in the Cloud
Red Hat Developer Day London: Advanced Java & JBoss in the Cloud Eric D. Schabell
 
Demystifying the Path to a JBoss Intelligent, Integrated Enterprise
Demystifying the Path to a JBoss Intelligent, Integrated EnterpriseDemystifying the Path to a JBoss Intelligent, Integrated Enterprise
Demystifying the Path to a JBoss Intelligent, Integrated EnterpriseEric D. Schabell
 
EY Real Estate & Facilities Management Outsourcing Poin of View 2016
EY Real Estate & Facilities Management Outsourcing Poin of View 2016EY Real Estate & Facilities Management Outsourcing Poin of View 2016
EY Real Estate & Facilities Management Outsourcing Poin of View 2016Henrik Jarleskog
 
Six Key Trends in Outsourcing
Six Key Trends in Outsourcing Six Key Trends in Outsourcing
Six Key Trends in Outsourcing taimurl
 
ITIL v3 - Manual Tecnico en Español
ITIL v3 - Manual Tecnico en EspañolITIL v3 - Manual Tecnico en Español
ITIL v3 - Manual Tecnico en EspañolSeto Joseles
 
Managing risks and opportunities in strategic fm outsourcing 3
Managing risks and opportunities in strategic fm outsourcing 3Managing risks and opportunities in strategic fm outsourcing 3
Managing risks and opportunities in strategic fm outsourcing 3amfacilities
 

Andere mochten auch (6)

Red Hat Developer Day London: Advanced Java & JBoss in the Cloud
Red Hat Developer Day London: Advanced Java & JBoss in the Cloud Red Hat Developer Day London: Advanced Java & JBoss in the Cloud
Red Hat Developer Day London: Advanced Java & JBoss in the Cloud
 
Demystifying the Path to a JBoss Intelligent, Integrated Enterprise
Demystifying the Path to a JBoss Intelligent, Integrated EnterpriseDemystifying the Path to a JBoss Intelligent, Integrated Enterprise
Demystifying the Path to a JBoss Intelligent, Integrated Enterprise
 
EY Real Estate & Facilities Management Outsourcing Poin of View 2016
EY Real Estate & Facilities Management Outsourcing Poin of View 2016EY Real Estate & Facilities Management Outsourcing Poin of View 2016
EY Real Estate & Facilities Management Outsourcing Poin of View 2016
 
Six Key Trends in Outsourcing
Six Key Trends in Outsourcing Six Key Trends in Outsourcing
Six Key Trends in Outsourcing
 
ITIL v3 - Manual Tecnico en Español
ITIL v3 - Manual Tecnico en EspañolITIL v3 - Manual Tecnico en Español
ITIL v3 - Manual Tecnico en Español
 
Managing risks and opportunities in strategic fm outsourcing 3
Managing risks and opportunities in strategic fm outsourcing 3Managing risks and opportunities in strategic fm outsourcing 3
Managing risks and opportunities in strategic fm outsourcing 3
 

Ähnlich wie Outsourcing Small Cell Deployment with Process Automation

Software-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StorySoftware-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StoryCisco Enterprise Networks
 
C3DNA-Presentation
C3DNA-PresentationC3DNA-Presentation
C3DNA-Presentationrmikkilineni
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueDan Mårtensson
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Digital Bond
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaCodeOps Technologies LLP
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...TheAnfieldGroup
 
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...SolarWinds
 
Standardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2MStandardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2MNicolas Damour
 
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-SegmentationGuardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-SegmentationCSNP
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13Cohesive Networks
 
CDM NOMAD Intelligent Systems
CDM NOMAD Intelligent SystemsCDM NOMAD Intelligent Systems
CDM NOMAD Intelligent SystemsSteven Stenton
 
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable SolutionsGetting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable SolutionsRadisys Corporation
 
Spirent Corporate Presentation_2014
Spirent Corporate Presentation_2014Spirent Corporate Presentation_2014
Spirent Corporate Presentation_2014Lee Goodenough
 
Cloud computing & dbms
Cloud computing & dbmsCloud computing & dbms
Cloud computing & dbmsZaid Shabbir
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startupsSekhar Mohanty
 
Build wireless M2M solutions easily
Build wireless M2M solutions easilyBuild wireless M2M solutions easily
Build wireless M2M solutions easilyNicolas Damour
 

Ähnlich wie Outsourcing Small Cell Deployment with Process Automation (20)

Software-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StorySoftware-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success Story
 
C3DNA-Presentation
C3DNA-PresentationC3DNA-Presentation
C3DNA-Presentation
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
 
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
Cross Domain Cyber Situational Awareness in a Multi Cloud, Multi-Network Fede...
 
Standardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2MStandardized Service Layering for IoT in oneM2M
Standardized Service Layering for IoT in oneM2M
 
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-SegmentationGuardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
 
Emad farahzadi feb 2017
Emad farahzadi   feb 2017Emad farahzadi   feb 2017
Emad farahzadi feb 2017
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
CDM NOMAD Intelligent Systems
CDM NOMAD Intelligent SystemsCDM NOMAD Intelligent Systems
CDM NOMAD Intelligent Systems
 
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable SolutionsGetting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
 
Spirent Corporate Presentation_2014
Spirent Corporate Presentation_2014Spirent Corporate Presentation_2014
Spirent Corporate Presentation_2014
 
Cloud computing & dbms
Cloud computing & dbmsCloud computing & dbms
Cloud computing & dbms
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
Build wireless M2M solutions easily
Build wireless M2M solutions easilyBuild wireless M2M solutions easily
Build wireless M2M solutions easily
 
Santhi Vinnakota_Resume
Santhi Vinnakota_ResumeSanthi Vinnakota_Resume
Santhi Vinnakota_Resume
 
Coming Soon
Coming SoonComing Soon
Coming Soon
 

Mehr von David Chambers

Multi-operator small cell solutions for In-building wireless
Multi-operator small cell solutions for In-building wirelessMulti-operator small cell solutions for In-building wireless
Multi-operator small cell solutions for In-building wirelessDavid Chambers
 
Small Cell State of the Nation 2017
Small Cell State of the Nation 2017Small Cell State of the Nation 2017
Small Cell State of the Nation 2017David Chambers
 
ThinkSmallCell Analyst Spotlight December 2016
ThinkSmallCell Analyst Spotlight December 2016ThinkSmallCell Analyst Spotlight December 2016
ThinkSmallCell Analyst Spotlight December 2016David Chambers
 
3G and LTE Enterprise Small Cell Architecture 2016
3G and LTE Enterprise Small Cell Architecture 20163G and LTE Enterprise Small Cell Architecture 2016
3G and LTE Enterprise Small Cell Architecture 2016David Chambers
 
Webinar: Laying the foundations of phase timing
Webinar: Laying the foundations of phase timingWebinar: Laying the foundations of phase timing
Webinar: Laying the foundations of phase timingDavid Chambers
 
Thinksmallcell MWC 2016
Thinksmallcell MWC 2016 Thinksmallcell MWC 2016
Thinksmallcell MWC 2016 David Chambers
 
Thinksmallcell Analyst Spotlight Webinar Jan 2016
Thinksmallcell Analyst Spotlight Webinar Jan 2016Thinksmallcell Analyst Spotlight Webinar Jan 2016
Thinksmallcell Analyst Spotlight Webinar Jan 2016David Chambers
 
Overcoming high deployment costs of synchronizing Enterprise Small Cells
Overcoming high deployment costs of synchronizing Enterprise Small CellsOvercoming high deployment costs of synchronizing Enterprise Small Cells
Overcoming high deployment costs of synchronizing Enterprise Small CellsDavid Chambers
 
Choosing an enterprise wireless solution
Choosing an enterprise wireless solutionChoosing an enterprise wireless solution
Choosing an enterprise wireless solutionDavid Chambers
 
ThinkSmallCell Analyst Spotlight Webinar Dec 2014
ThinkSmallCell Analyst Spotlight Webinar Dec 2014ThinkSmallCell Analyst Spotlight Webinar Dec 2014
ThinkSmallCell Analyst Spotlight Webinar Dec 2014David Chambers
 
Cellular Enterprise Architecture Solutions
Cellular Enterprise Architecture SolutionsCellular Enterprise Architecture Solutions
Cellular Enterprise Architecture SolutionsDavid Chambers
 
The Enterprise Unlocked webinar
The Enterprise Unlocked webinarThe Enterprise Unlocked webinar
The Enterprise Unlocked webinarDavid Chambers
 
Het nets up close - Webinar with ThinkSmallCell and IXIA
Het nets up close - Webinar with ThinkSmallCell and IXIAHet nets up close - Webinar with ThinkSmallCell and IXIA
Het nets up close - Webinar with ThinkSmallCell and IXIADavid Chambers
 
Webinar: Small Cells Going to Volume
Webinar: Small Cells Going to VolumeWebinar: Small Cells Going to Volume
Webinar: Small Cells Going to VolumeDavid Chambers
 
ThinkSmallCell Analyst Forecast Spotlight 2014
ThinkSmallCell Analyst Forecast Spotlight 2014ThinkSmallCell Analyst Forecast Spotlight 2014
ThinkSmallCell Analyst Forecast Spotlight 2014David Chambers
 
Small Cell Timing and Sync Presentation SCA 2013
Small Cell Timing and Sync Presentation SCA 2013Small Cell Timing and Sync Presentation SCA 2013
Small Cell Timing and Sync Presentation SCA 2013David Chambers
 
Enterprise small cell architecture webinar
Enterprise small cell architecture webinarEnterprise small cell architecture webinar
Enterprise small cell architecture webinarDavid Chambers
 
ThinkSmallCell 4G spectrum pricing UK results
ThinkSmallCell 4G spectrum pricing UK resultsThinkSmallCell 4G spectrum pricing UK results
ThinkSmallCell 4G spectrum pricing UK resultsDavid Chambers
 
Telco evangelist 23 jan 2013
Telco evangelist 23 jan 2013Telco evangelist 23 jan 2013
Telco evangelist 23 jan 2013David Chambers
 
SmallCell Analyst Forecast Shootout
SmallCell Analyst Forecast ShootoutSmallCell Analyst Forecast Shootout
SmallCell Analyst Forecast ShootoutDavid Chambers
 

Mehr von David Chambers (20)

Multi-operator small cell solutions for In-building wireless
Multi-operator small cell solutions for In-building wirelessMulti-operator small cell solutions for In-building wireless
Multi-operator small cell solutions for In-building wireless
 
Small Cell State of the Nation 2017
Small Cell State of the Nation 2017Small Cell State of the Nation 2017
Small Cell State of the Nation 2017
 
ThinkSmallCell Analyst Spotlight December 2016
ThinkSmallCell Analyst Spotlight December 2016ThinkSmallCell Analyst Spotlight December 2016
ThinkSmallCell Analyst Spotlight December 2016
 
3G and LTE Enterprise Small Cell Architecture 2016
3G and LTE Enterprise Small Cell Architecture 20163G and LTE Enterprise Small Cell Architecture 2016
3G and LTE Enterprise Small Cell Architecture 2016
 
Webinar: Laying the foundations of phase timing
Webinar: Laying the foundations of phase timingWebinar: Laying the foundations of phase timing
Webinar: Laying the foundations of phase timing
 
Thinksmallcell MWC 2016
Thinksmallcell MWC 2016 Thinksmallcell MWC 2016
Thinksmallcell MWC 2016
 
Thinksmallcell Analyst Spotlight Webinar Jan 2016
Thinksmallcell Analyst Spotlight Webinar Jan 2016Thinksmallcell Analyst Spotlight Webinar Jan 2016
Thinksmallcell Analyst Spotlight Webinar Jan 2016
 
Overcoming high deployment costs of synchronizing Enterprise Small Cells
Overcoming high deployment costs of synchronizing Enterprise Small CellsOvercoming high deployment costs of synchronizing Enterprise Small Cells
Overcoming high deployment costs of synchronizing Enterprise Small Cells
 
Choosing an enterprise wireless solution
Choosing an enterprise wireless solutionChoosing an enterprise wireless solution
Choosing an enterprise wireless solution
 
ThinkSmallCell Analyst Spotlight Webinar Dec 2014
ThinkSmallCell Analyst Spotlight Webinar Dec 2014ThinkSmallCell Analyst Spotlight Webinar Dec 2014
ThinkSmallCell Analyst Spotlight Webinar Dec 2014
 
Cellular Enterprise Architecture Solutions
Cellular Enterprise Architecture SolutionsCellular Enterprise Architecture Solutions
Cellular Enterprise Architecture Solutions
 
The Enterprise Unlocked webinar
The Enterprise Unlocked webinarThe Enterprise Unlocked webinar
The Enterprise Unlocked webinar
 
Het nets up close - Webinar with ThinkSmallCell and IXIA
Het nets up close - Webinar with ThinkSmallCell and IXIAHet nets up close - Webinar with ThinkSmallCell and IXIA
Het nets up close - Webinar with ThinkSmallCell and IXIA
 
Webinar: Small Cells Going to Volume
Webinar: Small Cells Going to VolumeWebinar: Small Cells Going to Volume
Webinar: Small Cells Going to Volume
 
ThinkSmallCell Analyst Forecast Spotlight 2014
ThinkSmallCell Analyst Forecast Spotlight 2014ThinkSmallCell Analyst Forecast Spotlight 2014
ThinkSmallCell Analyst Forecast Spotlight 2014
 
Small Cell Timing and Sync Presentation SCA 2013
Small Cell Timing and Sync Presentation SCA 2013Small Cell Timing and Sync Presentation SCA 2013
Small Cell Timing and Sync Presentation SCA 2013
 
Enterprise small cell architecture webinar
Enterprise small cell architecture webinarEnterprise small cell architecture webinar
Enterprise small cell architecture webinar
 
ThinkSmallCell 4G spectrum pricing UK results
ThinkSmallCell 4G spectrum pricing UK resultsThinkSmallCell 4G spectrum pricing UK results
ThinkSmallCell 4G spectrum pricing UK results
 
Telco evangelist 23 jan 2013
Telco evangelist 23 jan 2013Telco evangelist 23 jan 2013
Telco evangelist 23 jan 2013
 
SmallCell Analyst Forecast Shootout
SmallCell Analyst Forecast ShootoutSmallCell Analyst Forecast Shootout
SmallCell Analyst Forecast Shootout
 

Kürzlich hochgeladen

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Outsourcing Small Cell Deployment with Process Automation

  • 1. Outsourcing small cell deployment – How process automation tools can enable 3rd parties Justin Paul Head of Marketing Amdocs OSS Division July 23rd 2014
  • 2. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs2 Agenda ● Small cells ● Deployment challenges ● New Players ● Outsourcing models ● Limitations of today’s planning tools ● Managing 3rd parties ● Smarter tools and processes ● Q&A
  • 3. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs3 Small Cells (Images courtesy of Alcatel Lucent) ● Small cellular base stations ● Licensed spectrum ● Targeted coverage & capacity
  • 4. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs4 Small Cell Deployment - The challenges ●  Operators can’t keep up with the rapid introduction of new technology while continuously expanding network capacity ●  High complexity and sheer volume of tasks mean operators cannot meet their time, cost, and quality targets ●  Some operators are planning to deploy 1,000s of small cells per month! ●  They need to manage 100s of related projects simultaneously using low-cost, low-skilled human resources to install the equipment High Cost Volume Lack of Automation Complexity
  • 5. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs5 Backhaul Complexity - Examples SC Controller New 3G, 4G LTE + WiFi CoreNetwork Aggregation&Access Wireless Hub (P2MP) SC Controller Satellite Rural Small Cell Fibre 3rd Party Leased Line PoP LoS PoP Fibre Fibre Fibre Outdoor/Indoor Small Cells Wireless P2P Urban Small Cells
  • 6. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs6 Small Cells – New Players Multi-Services Operators (MSOs, Cable Companies) Fixed Network Operators (e.g. Traditional Telcos) Tower Companies (such as American Towers, Goodman, B&V) Municipalities, Advertising and Public Transport Companies
  • 7. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs7 Outsourcing Models Outsourcing: The transfer of day-to-day management responsibility as a strategic method for increasing the effectiveness and efficiency of network build and operations 1. Site Acquisition or Leasing 2. Network plan and build services 3. Backhaul as a service4. Small Cells as a Service
  • 8. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs8 Managing the End-to-End Process Finance Planning Design Construction Create Project Validate Backhaul Solution Initial Solution Approval Conduct Kick-Off Create Location Site Walk Network Design Project approvals Establish Initial Backhaul Options Install Equipment Provision Inventory Telco Ready Order Transport Project Close Out Validate Address Project / Task Management Sites & Estates Partner Management Initiation Planning Design Construction Optimization
  • 9. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs9 Limitations of Today’s Planning Tools and Processes Lack of end-end orchestration across multiple systems and organizational groups Inability to scale effectively across tens of thousands small cells Lack of agility to handle in-flight project changes Lack of centralised information for network resources – (single source of truth) Lack of integrated technical design
  • 10. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs10 1st Poll Question Poll #1
  • 11. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs11 Challenges of Managing 3rd parties Who, when and where? Contractual obligations Accountability 3rd Party Management Process Governance and SLA management
  • 12. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs12 Speeds time to market for Small Cells Need for Smarter Tools and Processes Reduces rollout cost through increased efficiency Enables large scale projects (1000s small cells per month) Limits project risk and human error across 3rd parties
  • 13. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs13 Initiation Construction OptimizationDesignPlanning Validate Backhaul Solution Initial Solution Approval Conduct Kick-Off Create Location Site Walk Network Design Project approvals Establish Initial Backhaul Options Install Equipment Provision Inventory Telco Ready Order Transport Create Project Project Close Out Validate Address Automating the Rollout Process Smart Cell Placement Where to locate small cells? Dynamic process and project management Plan and Design Installation Guided Field-Force Tasks Import cell locations Assign field user tasks
  • 14. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs14 Related Components A catalog driven ‘factory’ approach Catalog - Driven Rollout Factory “Design once, deploy many times” Information Security Level 2 – Sensitive © 2012 – Proprietary and Confidential Information of Amdocs Decomposi)on  and   Plan  Genera)on   Network  Design  Blocks   Project  Flow  Blocks   Re-­‐usable   Network  Design   Automa)c  End-­‐End   Plan  Genera)on   Network and Project Profile Requirements Modular, reusable, Building Blocks ‘The Factory’
  • 15. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs15 Benefits of Dynamic Plan Management Rapid plan generation for each small cell •  Project plan and network design automatically built from requirements •  Highly repeatable Easier to maintain •  Plan templates for each small cell type stored in catalog •  BPEL ‘building blocks’ easy to create More flexible – ‘on-demand’ •  In-flight project changes •  Workarounds and plan updates without disrupting project
  • 16. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs16 Stages of outsourcing Consultation and strategy •  Scoping, Framing, Risk Analysis, Planning Technical design services •  Radio Planning, Cell Placement, Network Design, IT Archictecture Partnerships and alliances •  Shared Risk, Combined expertise, Domain Knowhow Full Project Management and Governance •  Project planning and execution, monitoring/tracking, escalation and problem resolution Outsourcing
  • 17. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs17 2nd Poll Question Poll #2
  • 18. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs18 Summary •  Operator challenges •  Complexity, Volume, Lack of Automation and Cost •  New Players •  More opportunities to outsource •  Need for smarter tools •  With common information and processes •  Amdocs’ catalog driven approach to process management •  Helps resolve project complexity and scalability across 3rd parties •  Stages of Outsourcing From consultancy to full Project Management
  • 19. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs19 Thank You Questions and Answers
  • 20. Information Security Level 1 – Confidential © 2014 – Proprietary and Confidential Information of Amdocs20 Who to contact? ● Justin Paul, Head of Marketing, Amdocs OSS Division ●  justin.paul@amdocs.com ● Phil Bull, Solutions Marketing Manager ●  philip.bull@amdocs.com ● Visit our website at: http://www.amdocs.com/Products/OSS/network-planning/Pages/ small-cell-solution.aspx