Telecom
Case 1 - Large Cellular Operator, Mexico
Case 2 - A Major Telecom Service Provider
in India
Case 3 - US Broadband Internet Access
Provider
Case 1:
Customer:
Large Cellular Operator, Mexico
Technology: Business Intelligence
The Customer
The customer is one of the largest cellular service
providers in Mexico with 700,000 customers and more than one million
connections across 11 cities in Mexico, offering a variety of
prepaid and postpaid services. The customer also distributes mobile
handsets from various vendors through direct and indirect sales
channels.
The Challenge
With massive expansion plans on the cards, the
customer needed a Business Intelligence solution that would help
it to use its operational data effectively to retain customers
and increase their market share and airtime. The customer needed
a system that could assist them in analyzing the usage patterns
of customers based on various factors like rate plans, origin
and destination of calls and types of calls. The analysis would
assist them in understanding customer preferences, equipping them
with information needed to broaden their customer base and increase
market share and revenue.
The Solution
Tata Infotech has a telecom-specific Business
Intelligence solution - BI4tel (Business Intelligence for Telecom).
The solution offers key advantages, such as a telecom-centric
data model, reduced costs and quick results. The implementation
of BI4tel involved the effectuation of KPIs in call usage and
churn areas. The Call Usage KPIs help in analyzing airtime in
terms of number of calls, real and billed seconds, while the Churn
KPIs enable auditing of customer cancellations. BI4tel also provides
for dynamic generation of standard reports in a matter of seconds.
The Benefits
With the BI4tel solution in place, the customer
is now in a position to create attractive rate plans to increase
airtime and revenues. It can concentrate on improving product
sales by identifying those products preferred by customers. Further,
it is in a position to determine the usage and cancellation patterns
of different segments of customers, and the reasons for the same,
thereby enabling them to take timely precautionary measures.
Top
Case
2:
Customer: A Major Telecom Service Provider in
India.
Technology: Network Security Audit
The Customer
The customer is a major telecom service provider
in India. It has around 450 nodes running through the length and
breadth of the country. The customer has deployed a National Internet
backbone (NIB) for providing Internet Access Points (IAPs) to
private ISPs and Points of Presence (POP's).
Services offered are PPP dial-up access (PSTN and ISDN), e-mail
and dedicated leased lines. The customer follows a three-tier
architecture. Nodes are categorized as "A", "B"
and "C" depending on the capacity and configuration
of equipment.
The Challenge
The NIB grew out of a need to connect remote
Indian cities to the net. Primary focus was on operations and
network maintenance, as a result, network security was accorded
a low priority.
In the course of operations, the customer realized
to keep their network running, they had to prevent it from internal
and external attacks through a network security audit.
The service provider's primary aim was to get
NIB audited for network and system security and to have a network
security plan developed. The scope of work:
-
To determine if
the network infrastructure components and servers were secured
from the configuration and operational perspective.
-
To evaluate the
effectiveness of management practices and operation tools.
-
To recommend improvements
for managing security, operation practices and tools
The Solution
Tata Infotech's audit covered an independent
and detailed security review of internal procedures, the network
topology, access controls, applications, databases, operating
systems, network security inspections and other software and utilities.
The audit was conducted through interviews with the customer's
staff and a detailed verification of key security parameters using
Tata Infotech's proprietary network security methodologies . Through
the audit, Tata Infotech identified current security measures
taken by the customer and gaps in security, which exposed the
customer to security risks.
Tata Infotech recommended modifications such as enhanced router
security, consolidation of access restrictions, system-wide security
policy modifications, and system software and firmware upgrades,
which would improve data control in the organization.
Tata Infotech also provided the customer with
a network security design and plan.
The Benefits
A security assessment, which identified security
threats to the network and solutions on how, these could be resolved.
Top
Case 3:
Customer: US broadband Internet access provider
Technology: eBusiness
The Customer
The Customer is a telecommunications company
in USA that provides broadband internet access service to home
internet users and small and medium-sized businesses for connecting
to the net. The service is ultra-fast, affordable and "always
on" and is based on DSL technology.
The Challenge
Traditionally the customer sold its services
through channel partners. However, when it decided to expand its
distribution channels, it opted to make use of its channel partners'
websites. The website used to receive order requests from end-users,
which needed to be fulfilled very quickly via the customer's internal
systems.
The channel partners belonged to six categories.
The categories were based on their technological and user interface
requirements. Our customer had to redesign the web-based storefront
in order to sell DSL services to retail customers. From the user
interface perspective, the solution had to feature the reusable
design of a storefront that would be easy-to-use and enable to
client to create multiple partner sites.
The Solution
Tata Infotech designed and implemented the interface
and connection to the internal systems, while Human Factors, created
the user interface design.
The new system simplified the order process while
facilitating orders through provision of DSL-related information.
The XML-based application-programming interface
(API) enables "flow-through DSL provisioning" between
the company and its channels partners to create a seamless supply
chain. Channel partners can quickly and easily add DSL to their
product portfolio, a feature critical for scaling up business.
Through xLink Server API, the solution could
talk to the customer's internal business systems. The middle tier
included a Java Servlet that could talk to the xLink API, a Log
Handler for analysis of end user logs and a template engine to
serve dynamically generated pages.
The Benefits
The solution is modular so that the customer
can reuse most components in the future. It also helps the customer's
marketing team to sell the co-branding idea to channel partners.
Top