Essays about: "management in telecom"
Showing result 1 - 5 of 98 essays containing the words management in telecom.
-
1. Private-Public Collaboration in Sweden’s Civil Preparedness
University essay from FörsvarshögskolanAbstract : Recent developments in Sweden’s security policy have prompted the rearmament of the total defence. The total defence comprises both military and civil defence. The civil defence, in conjunction with crisis preparedmess, forms Sweden’s civil preparedness. READ MORE
-
2. A Qualitative Analysis of the Impact of Artificial Intelligence (AI) Adoption (Focusing on Machine Learning (ML)) on the Organizational Capabilities of the Telecom Industry in Sweden and Finland
University essay from Blekinge Tekniska Högskola/Institutionen för industriell ekonomiAbstract : The German government's "Industry 4.0" paradigm transforms technology application across domains using real-time data and connectivity. The telecom sector's reliance on digital, software-driven infrastructure for real-time data and connectivity is paramount. READ MORE
-
3. Informal Knowledge Sharing : Grasping the Complexity of Sharing Knowledge in Ericsson’s Software Development
University essay from Linköpings universitet/Projekt, innovationer och entreprenörskapAbstract : Many organizations have realized the importance of managing what they know in a proper way, with the sharing of knowledge as one of the most central aspects. However, the practices of knowledge sharing are seldom fully understood, and thus implementations of technical systems intended to improve knowledge sharing have less effect than expected. READ MORE
-
4. Estimating Impacts Using LCA in Procurement Processes : A case study for a multinational networking and telecommunications company
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This thesis investigates how a company can implement life cycle analysis (LCA) into procurement. The thesis also explores the potential synergies between the LCA and procurement. A single casestudy was utilized for this purpose. It uses LCAs using a simplified methodology, interviews, and a literature review to carry out the study. READ MORE
-
5. Advanced Secret Handling in Kubernetes Application with HashiCorp Vault
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the era of microservices and cloud-based systems, safeguarding sensitive credentials has become a critical concern for modern businesses. This thesis delves into the application of HashiCorp Vault, a prominent tool for secure secret management, within the domain of telecommunication networks, renowned for managing tens of thousands of nodes. READ MORE