Please wait a minute...
Computer & Telecommunication  2015, Vol. 1 Issue (7): 54-55    DOI:
Current Issue | Archive | Adv Search |
Research on the External Operation of Operator’s Big Data
Qiu Jundong,Yao Zenan
China Mobile Communications Group Guangdong co., LTD. Shantou Branch
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Big data has become a very popular topic in the current social, which value is widely accepted in all walks of life. Big data era has arrived, and telecom operators also ushered in the big opportunity of big data. This paper analyzes the value of big data and its existing challenges from the angle of operators, studies on the big data business model combining with the demand of market and industry. It puts forward four kinds of external operation business model starting from the point of "cluster data service", and proposes some constructive suggestions for big data information security problems.
Key wordsbig data      operator’s big data      external operation      business mode     
Published: 08 November 2017
ZTFLH:  F626  

Cite this article:

Qiu Jundong, Yao Zenan. Research on the External Operation of Operator’s Big Data. Computer & Telecommunication, 2015, 1(7): 54-55.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2015/V1/I7/54

[1] LIU Hui-fang. Research and Application of Anti-fraud Model Based on Big Data of Communication Operator[J]. 电脑与电信, 2021, 1(7): 46-52.
[2] WANG Jia-hao. Risk Evaluation of Telecom Big Data Application Project Based on AHP-entropy Weight Method[J]. 电脑与电信, 2021, 1(7): 53-55.
[3] YAO Jian-sheng LIU Yan-ling. Teaching Reform and Practice of Smart Tourism Data Science Course[J]. 电脑与电信, 2021, 1(4): 9-11.
[4] SONG Man. Research on Talents Training Program of Big Data Majors in Higher Vocational Colleges ——Taking Guangzhou City Construction College as an Example[J]. 电脑与电信, 2021, 1(4): 16-22.
[5] LI Ai-sheng. Exploration and Practice of Intelligent Training Based on CDL Architecture ——Take the Major of Information Security and Management as an Example[J]. 电脑与电信, 2021, 1(4): 81-85.
[6] YANG Yu XU Wang-ming . Research and Implementation of Real-time Data Processing Platform Based on Storm Technology[J]. 电脑与电信, 2021, 1(1): 51-.
[7] SONG Zhi-yang ZHOU-Chen ZHANG Juan CHEN Ying-ying. Design and Implementation of PositionAnalysis System of Recruitment Website[J]. 电脑与电信, 2020, 1(9): 6-10.
[8] LIU Yi-xuan. Research on theApplication of MongoDB in Urban Drainage[J]. 电脑与电信, 2020, 1(8): 55-.
[9] ZHENG Dan ZHOU Xiao-long. Research and Exploration on Smart FinancialAid in Colleges and Universities in the Background of Big Data[J]. 电脑与电信, 2020, 1(7): 25-27.
[10] WANG Chen-hao JIAHai-tian. Consumption Behavior Guidance and Risk Prevention of College Students Based on Big Data[J]. 电脑与电信, 2020, 1(7): 51-.
[11] ZHOU Hong-cheng FENG Kai-zheng XIAO Feng . Intelligent Forestry System Design Based on Big Data[J]. 电脑与电信, 2020, 1(4): 56-59.
[12] YAN Si-jing. Research on Online Learning Behavior Elements of Five-year Higher Vocational Nursing Students Based on Big Data[J]. 电脑与电信, 2020, 1(3): 9-11.
[13] ZHOU Xiao-juan. Discussion on the Computer Network Security and Preventive Measures in the Era of Big Data[J]. 电脑与电信, 2020, 1(3): 41-43.
[14] . Design and Key Technology Research onAutomobile Remote Diagnosis System[J]. 电脑与电信, 2020, 1(3): 52-54.
[15] HUANG Xiao-hua. Construction of Wisdom Classroom Evaluation andAssessment System Based on "Dynamic Learning DataAnalysis"[J]. 电脑与电信, 2020, 1(1-2): 25-27.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd