Training Catalogue 2019

Total Page:16

File Type:pdf, Size:1020Kb

Training Catalogue 2019 ITU Centres of Excellence for Europe Table of Content OVERVIEW OF CoE INITIATIVE ............................................................................................ 3 CENTRE OF EXCELLENCE FOR EUROPE ................................................................................. 3 SCOPE ................................................................................................................................. 4 TRAININGS OFFERED BY ITU CoEs FOR EUROPE .................................................................. 5 STRATEGIC ASPECTS FOR INTERNET GOVERNANCE AND INNOVATIONS .................................... 6 WIRELESS ACCESS TECHNOLOGIES TO INTERNET NETWORK ...................................................... 7 CYBERSECURITY TECHNIQUES .................................................................................................... 8 GOVERNING CYBER SECURITY AT THE NATIONAL LEVEL: Best practices and lessons learned ..................... 9 BUILDING BROADBAND TELEMEDICINE NETWORKS AND PROVIDING E-HEALTH SERVICES AT THE LOCAL, REGIONAL AND NATIONAL LEVELS .............................................................................................................. 10 LEGAL AND REGULATORY BARRIERS TO THE INTRODUCTION OF CLOUD SERVICES IN THE EU .... 11 FEATURES OF 5G TECHNOLOGY IMPLEMENTATION AT THE LOCAL (SOME TOWNS), REGIONAL (DISTRICT, REGION) AND NATIONAL LEVEL ................................................................................................................... 12 NGN EVOLUTION, FUTURE NETWORKS AND ULTRA-BROADBAND INTERNET ............................. 13 CYBER INCIDENT RESPONSE ...................................................................................................... 14 CODATA/RDA RESEARCH DATA SCIENCE SUMMER SCHOOL ....................................................................... 15 CODATA/RDA ADVANCED WORKSHOP ON IoT AND BIG-DATA ANALYTICS ................................................ 16 SECURITY AND QoS IN INTERNET NETWORK .............................................................................. 17 TECHNICAL ASPECTS OF WIRELESS SOLUTIONS FOR THE INTERNET OF THINGS (IoT) ................................ 18 INCIDENT RESPONSE PRACTICE: Hands-on scenario-based training .......................................................... 19 TECHNICAL, BUSINESS AND REGULATORY ASPECTS OF 5G NETWORKS ..................................... 20 AUTOMATION OF BROADBAND NETWORKS DESIGNING: Selecting the most appropriate solutions to build network ........................................................................................................................................................ 21 QoS TECHNOLOGIES AND REGULATION FOR FIXED AND MOBILE NETWORKS .......................................... 22 INTERNET OF THINGS (IoT) ENTREPRENEURSHIP ........................................................................................ 23 THE USE OF ADAPTIVE TECHNOLOGIES TO TRANSMIT VIDEO OVER RADIO CHANNELS ............................. 24 CODATA/RDA/ICTP/TWAS Research Data Science Summer School in West Africa ..................................... 25 WIRELESS AND MOBILE ULTRA-BROADBAND: LTE-A PRO, WLAN, AND 5G NR ........................... 26 2 ITU Centres of Excellence for Europe OVERVIEW OF CoE INITIATIVE The Centres of Excellence (CoE) programme was launched by the International Telecommunication Union (ITU) in 2000, aiming to support capacity building in the field of information and communication technologies (ICTs). Designed to offer continuous education to ICT professionals and executives in the public and private spheres through face-to-face or distance learning programmes, the Centres serve as regional focal points for professional development, research, and knowledge sharing, as well as provide specialist training services to external clients. With the support from multilateral and regional organizations, CoE networks have been established in all ITU regions. The current network is composed of 31 Centres across the globe, six each in Africa, the Americas, Arab States and Asia-Pacific regions, five in the Europe region and three in the CIS region. CENTRE OF EXCELLENCE FOR EUROPE The second cycle of the new Centre of Excellence programme started in January 2019 and will end in December 2022. A total of 31 institutions were selected to operate as Centres of Excellence during this period. The following institutions were selected in Europe to provide trainings in particular six priority areas. Name of Institution Country Priority areas A. S. Popov Odessa National Ukraine Wireless & Fixed Academy of Telecommunications Broadband (ONAT) Digital Broadcasting Faculty of Electrical Engineering North Wireless & Fixed and Information Technologies, Ss. Macedonia Broadband Cyril and Methodius University, Skopje (FEEIT) Institute for Security and Safety Germany Cybersecurity (ISS) at the Brandenburg University of Applied Sciences National Institute of Poland Internet Governance Telecommunications (NIT) Wireless & Fixed Broadband NRD Cyber Security (NRD CS) Lithuania Cybersecurity The Abdus Salam International Italy Internet of Things Centre for Theoretical Physics Big Data & Statistics (ICTP) 3 ITU Centres of Excellence for Europe SCOPE This catalogue has been produced by the ITU Office for Europe in collaboration with five ITU Centres of Excellence in Europe to highlight and promote the capacity building courses provided by the centres. While participation is open to participants from all countries, stakeholders from the Member States of the Europe region (as defined at ITU) are primarily encouraged to participate in the courses. These countries are Albania, Andorra, Austria, Belgium, Bosnia and Herzegovina, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Georgia, Greece, Hungary, Iceland, Ireland, Israel, Italy, Latvia, Liechtenstein, Lithuania, Luxembourg, Malta, North Macedonia, Moldova, Monaco, Montenegro, Netherlands, Norway, Poland, Portugal, Romania, San Marino, Serbia, Slovak Republic, Slovenia, Spain, Sweden, Switzerland, Turkey, Ukraine, Vatican City State and the United Kingdom. The courses aim to increase participants’ understanding, knowledge and awareness in the following areas: • Wireless & fixed broadband • Digital broadcasting • Cybersecurity • Internet governance • Big data & statistics • Internet of things Courses are provided either face to face or online – via the ITU Academy e-learning platform. All courses have a test component. A certificate of achievement is given to candidates who successfully complete the end-of-course assessment(s). Information on the registration process and payment methods can be found on the ITU Academy website: academy.itu.int Changes in course dates may occur and are reflected on the ITU Academy website: academy.itu.int 4 ITU Centres of Excellence for Europe TRAININGS OFFERED BY ITU CoEs FOR EUROPE In 2019 the ITU Centres of Excellence for Europe is offering 21 trainings. Two different kind of courses are provided. Face-to-face courses (in blue) and online courses (in purple). Trainings are presented in chronological order. NO TRAINING COURSE TOPIC COE DATES VENUE TRAINING TYPE OF FEE TRAINING 1 Strategic Aspects for Internet NIT 4-11 March Online 150 USD Online Governance and Innovations 2 Wireless Access Technologies to NIT 8-15 April Online 150 USD Online Internet Network 3 Cybersecurity Techniques ISS May- Online: Self- 250 USD Online December paced 4 Governing Cyber Security at the NRD CS 7-10 May Vilnius, 800 USD Face-to-face National Level: Best practices and Lithuania lessons learned 5 Building broadband telemedicine ONAT 16-17 May Odessa, 150 USD Face-to-face networks and providing Ukraine e-health services at the local, regional and national levels 7 Legal and regulatory barriers to the NIT 20-27 May Online 150 USD Online introduction of cloud services in the EU 6 Features of 5G technology ONAT 23-24 May Odessa, 150 USD Face-to-face implementation at the local (some Ukraine towns), regional (district, region) and national level 8 NGN Evolution, Future Networks and FEEIT 28 May – 24 Online 150 USD Online Ultra-broadband Internet June 9 Cyber Incident Response (Self-Paced ISS June- Online: Self- 250 USD Online Course) December paced 10 CODATA/RDA Research Data Science ICTP 12-16 August Trieste, Italy 500 USD Face-to-face Summer School 11 CODATA/RDA Advanced Workshop on ICTP 19-23 August Trieste Italy 500 USD Face-to-face IoT and Big-Data Analytics 12 Security and QoS in Internet Network NIT 26 August- Online 150 USD Online 2 September 13 Technical Aspects of Wireless Solutions ICTP 2-4 September Trieste, Italy 500 USD Face-to-face for the Internet of Things (IoT) 14 Incident Response Practice: Hands-on NRD CS 17-20 Vilnius, 800 USD Face-to-face scenario-based training September Lithuania 15 Technical, business and regulatory NIT 30 September Online 150 USD Online aspects of 5G Networks 7 October 16 Automation of broadband networks ONAT October Ashgabat, Free Face-to-face designing. Selecting the most Turkmenistan (in appropriate solutions to build network Russian) 17 QoS Technologies and Regulation for NIT 24-25 October Warsaw, 500 USD Face-to-face Fixed and Mobile Poland 18 IoT Entrepreneurship ICTP 6-8 November Trieste, Italy 500 USD Face-to-face 19 The use of adaptive technologies to ONAT 7-8 November Odessa, Free Face-to-face transmit video over radio channels Ukraine (in Russian) 20 CODATA/RDA/ICTP/TWAS Research ICTP 18-22 Nigeria 300 USD Face-to-face Data Science Summer School
Recommended publications
  • LNS Is a Game Changer ������������������������������������������������7
    MOBILE : MOBILE MESSAGING EXCHANGE EXTENDING THE REACH OF TWO-WAY TEXT MESSAGING AND VOICE MOBILE : MOBILE MESSAGING EXCHANGE TABLE OF CONTENTS The background . 3 The problem . 3 The options . 4 A smarter, more powerful solution . 5 The opportunity . 6 Why Tata Communications’ mobile LNS is a game changer . 7 Creating a New World of Communication™ through innovation . 7 For more information, visit us at www.tatacommunications.com. © 2015 Tata Communications. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. MOBILE : MOBILE MESSAGING EXCHANGE THE BACKGROUND There are two key conditions necessary for communications networks to function efficiently. First, as many end points as possible should be connected to the network. Second, multiple networks must be able to connect with each other. Global, inter-connected communications networks enable multiple individuals to inter-connect. Generally, their connections can be completed regardless of the originating or terminating network, its geography and the type of handset used at both ends of the link. The arrival of new communications methods enabled by over the top (OTT) service providers challenges this model. These services take a more ‘closed community’ approach that does not pro- vide for connectivity across the broader global communications environment. THE PROBLEM These OTT-enabled services have resulted in communication options that are more fragmented than they were ten years ago – with individuals often communicating within a closed community of similarly connected users. The fact that OTT apps for voice and messaging services are generally free to use is an attractive proposition. However, the service is only free if one user is sending a message or having a voice conversation with another user via the same application.
    [Show full text]
  • FCC 11-107.Pdf
    Federal Communications Commission FCC 11-107 Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) Amending the Definition of Interconnected VoIP ) GN Docket No. 11-117 Service in Section 9.3 of the Commission’s Rules ) ) PS Docket No. 07-114 Wireless E911 Location Accuracy Requirements ) ) WC Docket No. 05-196 E911 Requirements for IP-Enabled Service ) Providers ) ) NOTICE OF PROPOSED RULEMAKING, THIRD REPORT AND ORDER, AND SECOND FURTHER NOTICE OF PROPOSED RULEMAKING Adopted: July 12, 2011 Released: July 13, 2011 Comment Date: [60 days after publication in the Federal Register] Reply Comment Date: [90 days after publication in the Federal Register] By the Commission: Chairman Genachowski and Commissioners Copps, McDowell, and Clyburn issuing separate statements. TABLE OF CONTENTS Heading Paragraph # I. INTRODUCTION.................................................................................................................................. 1 II. BACKGROUND.................................................................................................................................... 5 III. THIRD REPORT AND ORDER ......................................................................................................... 13 A. Unitary Location Accuracy Standard............................................................................................. 13 1. Outdoor Location Accuracy Testing ....................................................................................... 24 2. Legal Authority
    [Show full text]
  • Softphone Apps: SIP Clients for Ios and Android
    collapse Buy - CounterPath Bria VISIT THE for Windows, Mac and iOS/Android Devices COUNTERPATH Interested in buying Bria for PRODUCTSSTORESOLUTIONS PARTNERS BLOG yourSUPPORT Macintosh? STORE Buy Now BRIA MOBILE. THE OFFICE FOR Sales Request Form THE ANYWHERE Home » Products »WORKER.Softphone Clients » Bria Mobile Contacts, Meetings, Instant SoftphoneMessaging. Apps: SIP Clients forYou're iOS and Android CounterPath’scovered. mobile VoIP app is the industry’s most reliable and feature-rich communication applications for Apple iOS and Android. Based on SIP and Open Standards, CounterPath’s mobile softphone app clients become an extension to your company’s PBX and feature a multitude of communication options, superior security and encryption and advanced audio codecs. Bria Mobile for iOS With you wherever you go. Developed for the Apple iPhone, iPad and iPod touch, Bria Mobile for iOS lets you take the power of your Bria desktop softphone with you wherever you go. Leveraging the device’s native contact list or your corporate directory, you can make voice and video calls, send messages and see users’ presence, all in one application. BUY NOW LEARN MORE Bria Mobile for Android The Bria experience right to your Android. Bria Mobile for Android brings the Bria experience right to your Android supported device. With Bria's intuitive user interface you can leverage the contacts you already have in your Android smartphone or tablet, make voice and video calls, send messages, and see other user’s presence status while at work, at home or on the go. BUY NOW LEARN MORE Cloud Solutions for Smartphones Fully loaded applications.
    [Show full text]
  • IP Phones, Software Voip, and Integrated and Mobile Voip
    Chapter 2 IP Phones, Software VoIP, and Integrated and Mobile VoIP Abstract In order to establish their technical, communication, and service affordances, this chapter explores and three types of VoIP tools: 1) IP Phones, 2) software VoIP, and 3) mobile and integrated VoIP. Type 1: IP Phones Another reply to my e-mail list call-out came from consul- tant Susan Knoer, who reflected: VoIP is an old technology now, and many people didn’t even realize that their “new” phone lines are VoIP. Even the smaller corporations I work with have ReportsLibrary Technology gone over. It might be more interesting to talk to campuses that don’t have VoIP and find out why.1 Figure 5 Cisco Ip phone handset. Excellent point, Susan. The first VoIP type I explore is the most institutionally established yet least obvious hardware externals they are also virtually indistinguish- form of networked calling: the mass-market carrier IP able from older phones (figure 5). Broadband IP calls are phones sitting inconspicuously on desks at a growing initiated with either specially made IP handsets or head- number of offices and homes. Digital voice is becoming sets or with existing handsets converted with adapters. standard for schools, organizations, and business, which Unlike the small-scale startup culture of software VoIP, still tend to rely on fixed-location communication. As IP IP phones tend to follow a more traditional provider- www.alatechsource.org phones are bundled with high-speed Internet and televi- subscriber customer service model. These characteristics sion subscriptions, individual consumers still interested make IP calling an easier conceptual leap for users who in landline service are steadily adopting them, as well.
    [Show full text]
  • Development of Voice Over Wifi by Integrating Mobile Networks”, OECD Digital Economy Papers, No
    Please cite this paper as: OECD (2005-04-14), “Development of Voice over WiFi by Integrating Mobile Networks”, OECD Digital Economy Papers, No. 93, OECD Publishing, Paris. http://dx.doi.org/10.1787/232404312851 OECD Digital Economy Papers No. 93 Development of Voice over WiFi by Integrating Mobile Networks OECD Unclassified DSTI/ICCP/TISP(2004)9/FINAL Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 14-Apr-2005 ___________________________________________________________________________________________ _____________ English - Or. English DIRECTORATE FOR SCIENCE, TECHNOLOGY AND INDUSTRY COMMITTEE FOR INFORMATION, COMPUTER AND COMMUNICATIONS POLICY Unclassified DSTI/ICCP/TISP(2004)9/FINAL Working Party on Telecommunication and Information Services Policies DEVELOPMENT OF VOICE OVER WIFI BY INTEGRATING MOBILE NETWORKS English - Or. English JT00182445 Document complet disponible sur OLIS dans son format d'origine Complete document available on OLIS in its original format DSTI/ICCP/IE(2004)17/FINAL FOREWORD The TISP Working Party discussed this report at its meeting on 29-30 November, 2004 and recommended its declassification by the ICCP Committee, which agreed to this at its meeting in March 2005. The report was prepared by Mr. Sung-il Ahn, of the OECD Secretariat. It is published under the responsibility of the Secretary-General. Copyright OECD, 2005. Applications for permission to reproduce or translate all or part of this material should be made to: Head of Publications Service, OECD, 2 rue André-Pascal, 75775 Paris Cedex 16, France. 2 DSTI/ICCP/TISP(2004)9/FINAL TABLE OF CONTENTS FOREWORD................................................................................................................................................... 2 DEVELOPMENT OF VOICE OVER WIFI BY INTEGRATING MOBILE NETWORKS ......................... 4 Main points..................................................................................................................................................
    [Show full text]
  • How Does Voip Work?
    VoIP (Voice over Internet Protocol) VoIP (Voice over IP) includes communication protocols, technologies and techniques of transmission used for multimedia sessions and voice communication via IP networks. Other terms used synonymously with ‘Voice over IP’ include broadband phone, voice over broadband and Internet telephony. How Does VoIP Work? VoIP calls require media channel setup, analog voice signal digitalization, encoding, packeting and transmission of IP packets via packet-switched network. On the receiving end, there will also be packet-decoding, conversion of analog signals to digital signals, and IP packets reception. VoIP uses audio codecs that encode speech and allow transmission via IP network. Network bandwidth and application requirements will determine which codec will be used. Some implementations use high fidelity stereo codecs, whereas others use compressed speech. Internet devices can use VoIP, meaning that people who use portable devices other than phones can make calls and send text messages via Wi-Fi or 3G. VoIP works by converting analog voice calls into data packets that travel via Internet or any other IP network. You can call both cell phones and landlines, or make computer-to- computer calls. Connecting to a VoIP service provider requires you to have a VoIP phone. You can use a dedicated VoIP phone that is directly connected to the network using wireless Wi-Fi or wired Ethernet. These phones resemble regular digital business phones. Analog telephone adapters implement the firmware and electronics to operate a regular analog phone attached through a phone jack. Some cable modems come with this function. A softphone (VoIP software) is used in computers.
    [Show full text]
  • Mobile Futures -TIGS
    . .......... Mobile Futures By Faris Yakob Talent Imitates, Genius Steals Web: http://farisyakob.com Twitter: http://twitter.com/faris Linkedin: http://www.linkedin.com/in/farisyakob 2 WWW.FARISYAKOB.COM . DISCLAIMER This is a work of stolen genius. Everything substantive contained herein has been stolen from somewhere, aggregated and analysed, dissected and displayed. Where possible I have cited sources when I knew that I was using them. Often, however, I steal things without realizing. If I have stolen any of your thoughts and not credited you, I will happily post the correction if you let me know. .......... The point of this document is to help you be a little more informed about mobile technologies that are probably going to be quite important soon, if they aren’t already. The future is mobile it would seem. I hope you find it useful. Like any piece of technology-based future-gazing, it becomes out of date immediately it is written, and I wrote this a while ago. Forgive any irrelevance and thanks for your time. Bestest, Faris . CONTENTS DISCLAIMER............................................................................. 1 Trends ........................................................................................ 3 5 TRENDS FOR NOW AND SOON...................................... 3 SHORT TERM – 12-18 MONTHS ........................................ 3 MEDIUM TERM – 3-5 YEARS.............................................. 3 Bandwidth.................................................................................. 5 4G standards
    [Show full text]
  • Mobile Voice Off-Load
    Mobile Voice Off-Load An AdvOSS Solution White Paper Latest version of this white paper can always be found at: http://advoss.com/resources/whitepapers/mobile-voice-offload.pdf For more information, contact [email protected] Mobile Voice Off-load over Wi-Fi Networks Similar to data off-load, an important emerging use case for mobile operators is the offloading of voice traffic over a companion Wi-Fi network. This service, if provided by mobile operators enables subscribers to seamlessly use a Wi-Fi network in the vicinity of the mobile device for sending and receiving voice calls using Voice over IP (VoIP) protocols. The proliferation of Smart-Phones has made this type of service possible on a mass scale since Smart-Phones are able to run the client side software for VoIP such as SIP based dialers and Soft-Phones. Millions of mobile consumers are already using many Over The Top (OTT) applications such as Skype, Tango, viber etc. The Wi-Fi network in this scenario may be provided by the mobile operator itself, or through a Wi-Fi service providing partner. This later case is more common since Wi-Fi hot-spot operators specializing in this access technology are emerging that provide complete metropolitan level coverage via their mesh of hot-spot networks for data connectivity at wholesale rates. Key Benefits of using Wi-Fi over other offload technologies Although, voice traffic can be offloaded using Femtocell technology and others such as Wi-Max that are used for data traffic offload, there are significant advantages of using Wi-Fi over these technologies.
    [Show full text]
  • Voip GSM Terminal User Manual
    GULFSIP GSM GATEWAY VoIP GSM Terminal User Manual 【Content】 1.Introduction .............................................................................................................. 1 2.Function description ................................................................................................ 1 3.Parts list................................................................................................................... 1 4.Dimension : 30x28x4 cm ......................................................................................... 2 5.Chart of the device .................................................................................................. 3 6.Web Page Setting.................................................................................................... 4 7.System Information.................................................................................................. 5 8. Route ...................................................................................................................... 5 8.1 Mobile TO LAN Settings.................................................................................... 6 8.2 Call Back Service (50 sets) **New feature** ..................................................... 8 8.3 Mobile to LAN Speed Dial Settings ................................................................... 9 8.4 LAN to Mobile Settings.................................................................................... 10 9.Mobile ...................................................................................................................
    [Show full text]
  • Voice Over LTE for Dummies, Sonus Special Edition
    These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Voice over LTE Sonus Special Edition By Pat Hurley These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Voice over LTE For Dummies®, Sonus Special Edition Published by John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2014 by John Wiley & Sons, Inc. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/ permissions. Trademarks: Wiley, the Wiley logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies.com, Making Everything Easier, and related trade dress are trade- marks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. Sonus and the Sonus logo are registered trademarks of Sonus. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.
    [Show full text]
  • Mobile Voip (Mvoip) Application
    POLYTECHNIC OF NAMIBIA SCHOOL OF INFORMATION TECHNOLOGY DEPARTMENT OF SOFTWARE ENGINEERING TITLE: Research and Development of a mobile voice over IP application which is hosted by open source software running on inexpensive backend servers Thesis presented in partial fulfilment of the requirements for the degree of Master of Information Technology at the Polytechnic of Namibia. Presented by: Veiko Muronga (9864431) Supervisor: Prof. Hippolyte Nsung-Nza Muyingi Second Supervisor: None. March 2013 DECLARATION I, Veiko Mpareke Muronga, hereby declare that the work contained in the mini–thesis, entitled: ”Research and Development of a mobile voice over IP application which is hosted by open source software running on inexpensive backend servers”, is my own original work and that I have not previously in its entirety or in part submitted it at any University or other higher education institution for the award of a degree. Signature:……………………….. Date:………………………….. RETENTION AND USE OF THESIS I, Veiko Mpareke Muronga, being a candidate for the degree of Master of Information Technology accepts the requirements of the Polytechnic relating to the retention and use of Master’s theses/ mini-theses deposited in the Library. In terms of these conditions, I agree that the original of my thesis/mini-thesis deposited in the Library will be accessible for purpose of study and research, in accordance with the normal conditions established by the Librarian for the care, loan or reproduction of theses/mini-theses. Signature:……………………….. Date:………………………….. 2 ABSTRACT Voice over IP has been driven by the convergence of voice and data on a single transport medium. This means cheaper service usage fees for the user if the offering is costed properly.
    [Show full text]
  • Fixed and Mobile Networks: Substitution, Complementarity and Convergence”, OECD Digital Economy Papers, No
    Please cite this paper as: OECD (2012-10-08), “Fixed and Mobile Networks: Substitution, Complementarity and Convergence”, OECD Digital Economy Papers, No. 206, OECD Publishing, Paris. http://dx.doi.org/10.1787/5k91d4jwzg7b-en OECD Digital Economy Papers No. 206 Fixed and Mobile Networks SUBSTITUTION, COMPLEMENTARITY AND CONVERGENCE OECD Unclassified DSTI/ICCP/CISP(2011)11/FINAL Organisation de Coopération et de Développement Économiques Organisation for Economic Co-operation and Development 08-Oct-2012 ___________________________________________________________________________________________ English - Or. English DIRECTORATE FOR SCIENCE, TECHNOLOGY AND INDUSTRY COMMITTEE FOR INFORMATION, COMPUTER AND COMMUNICATIONS POLICY Unclassified DSTI/ICCP/CISP(2011)11/FINAL Working Party on Communication Infrastructures and Services Policy FIXED AND MOBILE NETWORKS: SUBSTITUTION, COMPLEMENTARITY AND CONVERGENCE English - Or. English JT03328116 Complete document available on OLIS in its original format This document and any map included herein are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. DSTI/ICCP/CISP(2011)11/FINAL FOREWORD This report was presented to the Working Party on Communication, Infrastructures and Services Policy (CISP) in December 2011. It was recommended to be made public by the Committee for Information, Computer and Communications Policy (ICCP) in March 2012. The report was prepared by Mr. Rudolf
    [Show full text]