{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"ru":"Продукты","_type":"localeString","en":"Products","de":"die produkte"},"introduction-popover":{"en":"introduction","ru":"внедрения","_type":"localeString"},"partners-popover":{"ru":"партнеры","_type":"localeString","en":"partners"},"update-profile-button":{"en":"Update profile","ru":"Обновить профиль","_type":"localeString"},"read-more-button":{"_type":"localeString","en":"Show more","ru":"Показать ещё"},"hide-button":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"en":"Categories","ru":"Компетенции","_type":"localeString"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"role-user":{"en":"User","ru":"Пользователь","_type":"localeString"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"en":"Partnership with suppliers","ru":"Партнерство с поставщиками","_type":"localeString"},"reference-bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 reference"},"partner-status":{"_type":"localeString","en":"Partner status","ru":"Статус партнёра"},"country":{"ru":"Страна","_type":"localeString","en":"Country"},"partner-types":{"_type":"localeString","en":"Partner types","ru":"Типы партнеров"},"branch-popover":{"en":"branch","ru":"область деятельности","_type":"localeString"},"employees-popover":{"en":"number of employees","ru":"количество сотрудников","_type":"localeString"},"partnership-programme":{"ru":"Партнерская программа","_type":"localeString","en":"Partnership program"},"partner-discounts":{"ru":"Партнерские скидки","_type":"localeString","en":"Partner discounts"},"registered-discounts":{"en":"Additional benefits for registering a deal","ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString"},"additional-advantages":{"ru":"Дополнительные преимущества","_type":"localeString","en":"Additional Benefits"},"additional-requirements":{"ru":"Требования к уровню партнера","_type":"localeString","en":"Partner level requirements"},"certifications":{"_type":"localeString","en":"Certification of technical specialists","ru":"Сертификация технических специалистов"},"sales-plan":{"en":"Annual Sales Plan","ru":"Годовой план продаж","_type":"localeString"},"partners-vendors":{"en":"Partners-vendors","ru":"Партнеры-производители","_type":"localeString"},"partners-suppliers":{"en":"Partners-suppliers","ru":"Партнеры-поставщики","_type":"localeString"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"_type":"localeString","en":"Produced products","ru":"Производимые продукты"},"vendor-implementations":{"ru":"Производимые внедрения","_type":"localeString","en":"Produced deployments"},"supplier-implementations":{"_type":"localeString","en":"Supplied deployments","ru":"Поставляемые внедрения"},"show-all":{"_type":"localeString","en":"Show all","ru":"Показать все"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"schedule-event":{"_type":"localeString","en":"Events schedule","ru":"Pасписание событий"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"register":{"_type":"localeString","en":"Register","ru":"Регистрация "},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"auth-message":{"ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To view company events please log in or register on the sit."},"company-presentation":{"_type":"localeString","en":"Company presentation","ru":"Презентация компании"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"en":"Requests","de":"References","ru":"Мои запросы","_type":"localeString"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить"},"calculate":{"en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString"},"roi_calcs":{"en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString"},"matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети"},"subscribe":{"ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"_type":"localeString","en":"Last, first name","ru":"Имя Фамилия"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"_type":"localeString","en":"Received ROI","ru":"Полученный ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"meta":[{"content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg","name":"og:image"},{"content":"website","name":"og:type"}],"translatable_meta":[{"name":"title","translations":{"en":"Company","ru":"Компания","_type":"localeString"}},{"name":"description","translations":{"ru":"Описание компании","_type":"localeString","en":"Company description"}},{"name":"keywords","translations":{"ru":"Ключевые слова для компании","_type":"localeString","en":"Company keywords"}}],"title":{"ru":"ROI4CIO: Компания","_type":"localeString","en":"ROI4CIO: Company"}}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"cellmining":{"id":3028,"title":"CellMining","logoURL":"https://old.roi4cio.com/uploads/roi/company/CellMining.png","alias":"cellmining","address":"","roles":[{"id":2,"type":"supplier"}],"description":"CellMining provides Mobile Network Operators with a unique toolset for optimizing user experience and network performance based on real-time metrics of subscriber data. The company’s ground-breaking Subscriber Network Analytics technology monitors subscriber experience data, identifies usage patterns, and reconstructs entire call and communication flows for individuals and business customer groups. CellMining has pioneered the integration of SON (Self-Optimizing Networks) with CEM (Customer Experience Management), to provide mobile operators with a world-class solution to optimize their networks for subscriber experience excellence.\r\n\r\nOur Behavior-Based SON™ solution helps wireless network operators to achieve superior network performance KPIs, saving on operational and engineering costs, and reducing subscriber churn.\r\nOur Subscriber Experience Hub provides unparalleled insights into the real-life network quality of experience, calibrated for different subscriber profiles, locations, handset types, roads, business groups, roamers and more.","companyTypes":["supplier"],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[{"id":199,"title":"CellMining CX-DRIVEN SON for MegaFon","description":"Russian operator will deploy CX-based SON\r\nto optimize network and provide superior Quality of Experience\r\n\r\nCaesarea, Israel—December 19, 2016 —CellMining Ltd, a leading provider of Self-Organizing Networks (SON) and subscriber network experience solutions, today announced that leading Russian mobile operator MegaFon has selected its Behavior-Based SON™ solution to optimize its network performance in the Moscow region and to help it to deliver an exemplary subscriber experience.\r\n\r\n“This new contract is a further affirmation that our unique subscriber experience-driven network optimization provides mobile operators with the competitive edge they need to retain customer loyalty,” said Greg Giora Snipper, CEO of CellMining. “With millions of subscribers across its 2G, 3G and 4G networks in Moscow, MegaFon has decided that CellMining offers the industry’s best SON solution, which can be flexibly deployed to deliver the excellent user experience its customers demand.”\r\n\r\n“We are also providing MegaFon with the unique ability to detect low quality calls on 2G and 3G as well as on the VoLTE service it is currently launching,” he added. “We are very pleased that this contract gives us potential for growth.”\r\n\r\n“We are pleased to announce our cooperation with CellMining. Its product offers us considerable flexibility and the ability to customize its algorithms to the needs of our Moscow region network,” said Alexey Semenov, Director of the Stolichny Branch PJSC MegaFon. “I am confident that this technology will help us to provide 24/7 quality management on the scale of the entire network. It means that we will be able to instantaneously react to unexpected network fluctuations, and continuously provide the best voice and data services to our clients.”\r\n\r\nThe decision to place the SON contract with CellMining was taken after an extremely rigorous and lengthy selection process during which products from several leading SON vendors—including network infrastructure vendors—were trialed on the operator’s network. CellMining’s multi-vendor, multi-technology SON capability was a key deciding factor in its selection. Another important consideration was that it provides subscriber-aware energy-saving modules—these deliver a safe way of reducing operating costs by selectively shutting down radio power when traffic levels are low, without risking any degradation in the subscriber experience.","alias":"cellmining-cx-driven-son-for-megafon","roi":0,"seo":{"title":"CellMining CX-DRIVEN SON for MegaFon","keywords":"network, that, CellMining, MegaFon, with, experience, subscriber, leading","description":"Russian operator will deploy CX-based SON\r\nto optimize network and provide superior Quality of Experience\r\n\r\nCaesarea, Israel—December 19, 2016 —CellMining Ltd, a leading provider of Self-Organizing Networks (SON) and subscriber network experience solutions, t","og:title":"CellMining CX-DRIVEN SON for MegaFon","og:description":"Russian operator will deploy CX-based SON\r\nto optimize network and provide superior Quality of Experience\r\n\r\nCaesarea, Israel—December 19, 2016 —CellMining Ltd, a leading provider of Self-Organizing Networks (SON) and subscriber network experience solutions, t"},"deal_info":"","user":{},"supplier":{"id":3028,"title":"CellMining","logoURL":"https://old.roi4cio.com/uploads/roi/company/CellMining.png","alias":"cellmining","address":"","roles":[],"description":"CellMining provides Mobile Network Operators with a unique toolset for optimizing user experience and network performance based on real-time metrics of subscriber data. The company’s ground-breaking Subscriber Network Analytics technology monitors subscriber experience data, identifies usage patterns, and reconstructs entire call and communication flows for individuals and business customer groups. CellMining has pioneered the integration of SON (Self-Optimizing Networks) with CEM (Customer Experience Management), to provide mobile operators with a world-class solution to optimize their networks for subscriber experience excellence.\r\n\r\nOur Behavior-Based SON™ solution helps wireless network operators to achieve superior network performance KPIs, saving on operational and engineering costs, and reducing subscriber churn.\r\nOur Subscriber Experience Hub provides unparalleled insights into the real-life network quality of experience, calibrated for different subscriber profiles, locations, handset types, roads, business groups, roamers and more.","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://cellmining.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CellMining","keywords":"subscriber, experience, network, CellMining, with, groups, business, operators","description":"CellMining provides Mobile Network Operators with a unique toolset for optimizing user experience and network performance based on real-time metrics of subscriber data. The company’s ground-breaking Subscriber Network Analytics technology monitors subscriber e","og:title":"CellMining","og:description":"CellMining provides Mobile Network Operators with a unique toolset for optimizing user experience and network performance based on real-time metrics of subscriber data. The company’s ground-breaking Subscriber Network Analytics technology monitors subscriber e","og:image":"https://old.roi4cio.com/uploads/roi/company/CellMining.png"},"eventUrl":""},"vendors":[{"id":3028,"title":"CellMining","logoURL":"https://old.roi4cio.com/uploads/roi/company/CellMining.png","alias":"cellmining","address":"","roles":[],"description":"CellMining provides Mobile Network Operators with a unique toolset for optimizing user experience and network performance based on real-time metrics of subscriber data. The company’s ground-breaking Subscriber Network Analytics technology monitors subscriber experience data, identifies usage patterns, and reconstructs entire call and communication flows for individuals and business customer groups. CellMining has pioneered the integration of SON (Self-Optimizing Networks) with CEM (Customer Experience Management), to provide mobile operators with a world-class solution to optimize their networks for subscriber experience excellence.\r\n\r\nOur Behavior-Based SON™ solution helps wireless network operators to achieve superior network performance KPIs, saving on operational and engineering costs, and reducing subscriber churn.\r\nOur Subscriber Experience Hub provides unparalleled insights into the real-life network quality of experience, calibrated for different subscriber profiles, locations, handset types, roads, business groups, roamers and more.","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://cellmining.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CellMining","keywords":"subscriber, experience, network, CellMining, with, groups, business, operators","description":"CellMining provides Mobile Network Operators with a unique toolset for optimizing user experience and network performance based on real-time metrics of subscriber data. The company’s ground-breaking Subscriber Network Analytics technology monitors subscriber e","og:title":"CellMining","og:description":"CellMining provides Mobile Network Operators with a unique toolset for optimizing user experience and network performance based on real-time metrics of subscriber data. The company’s ground-breaking Subscriber Network Analytics technology monitors subscriber e","og:image":"https://old.roi4cio.com/uploads/roi/company/CellMining.png"},"eventUrl":""}],"products":[{"id":1492,"logo":false,"scheme":false,"title":"CellMining CX-DRIVEN SON","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"alias":"cellmining-cx-driven-son","companyTypes":[],"description":"It combines Behavior-Based SON™—including Centralized SON (C-SON) features—with the advanced analytics of Subscriber Experience Hub.\r\nThe solution is compliant with 3GPP specifications, and supports NFV/SDN technology paradigms. It delivers the most accurate, comprehensive, real-time/offline network optimization, driven by customer experience. With its open architecture, Behavior-Based SON™ can co-exist with conventional SON products. CEM teams use the unique, comprehensive dashboards to gain insight into their network subscriber experience.\r\nMobile network operators can now realize their vision of delivering dynamic, CX-driven network optimization.\r\n<span style=\"font-weight: bold; \">Advantages</span>\r\n\r\n<ul><li>Revolutionary technology based on innovative subscriber experience analytics</li><li>Probe-free</li><li>Detection of network faults and misconfigurations (e.g crossed cables, PIM and interference, more)</li><li>Detection of poor quality in call and data sessions</li><li>In-depth insight into communications quality of experience (QoE)</li><li>Robust SON features for GSM networks, as well as 3G and 4G</li><li>Optimal GSM – UMTS – LTE traffic management</li><li>Big data analytics supports hundreds of millions of experience events</li><li>Optimizes to meet comprehensive subscriber experience KPIs</li></ul>\r\n<span style=\"font-weight: bold; \">Benefits</span>\r\n\r\n<ul><li>Network-agnostic – simplifies integration efforts and abstracts complexity to support future technologies</li><li>Single underlying technology serves as basis for both SON and subscriber experience insights</li><li>Hassle-free integration via a CDR abstraction layer</li><li>Field-Proven in a live HetNet environment, including multi-vendor GSM, UMTS, LTE and small cells</li></ul>\r\n<span style=\"font-weight: bold; \">SON benefits</span>\r\n\r\n<ul><li>Subscriber-aware – analyzes and makes network decisions based on subscriber usage patterns</li><li>Cost-saving – performs automatic engineering tasks, saves energy and defers capital investment</li><li>Reduced need for physical drive tests (DT) due to Virtual DT features</li><li>Open architecture – supporting deployment alongside conventional SON products</li></ul>\r\n<span style=\"font-weight: bold; \">CEM benefits</span>\r\n<ul><li>Supplements existing customer profile data with network experience insight</li><li>Integrates with CEM systems and applications</li><li>Enables drilling down to subscriber dimensions (VIP, business, inbound roamers) and network dimensions (cells, roads, geographical coverage)</li><li>Handset model compatibility reports</li></ul>","shortDescription":"CellMining offers an integrated SON-CEM solution for mobile operators, based on Subscriber Network Analytics technology, which is powered by patent-pending algorithms.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CellMining CX-DRIVEN SON","keywords":"","description":"It combines Behavior-Based SON™—including Centralized SON (C-SON) features—with the advanced analytics of Subscriber Experience Hub.\r\nThe solution is compliant with 3GPP specifications, and supports NFV/SDN technology paradigms. It delivers the most accurate, ","og:title":"CellMining CX-DRIVEN SON","og:description":"It combines Behavior-Based SON™—including Centralized SON (C-SON) features—with the advanced analytics of Subscriber Experience Hub.\r\nThe solution is compliant with 3GPP specifications, and supports NFV/SDN technology paradigms. It delivers the most accurate, "},"eventUrl":"","translationId":1493,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":331,"title":"Network Management Software","alias":"network-management-software","description":" <span style=\"font-weight: bold; \">Network management software</span> is software that is used to provision, discover, monitor and maintain computer networks. \r\nWith the expansion of the world wide web and the Internet, computer networks have become very large and complex, making them impossible to manage manually. In response, a suite of network management software was developed to help reduce the burden of managing the growing complexity of computer networks. \r\nNetwork management software usually collects information about network devices (which are called Nodes) using protocols like SNMP, ICMP, CDP etc. This information is then presented to network administrators in an easy to understand and accessible manner to help them quickly identify and remediate problems. \r\nSome advanced network control software may rectify network problems automatically. Network management program may also help with tasks involved in provisioning new networks, such as installing and configuring new network nodes etc. Network management tools may also help with maintenance of existing networks like upgrading software on existing network devices, creating new virtual networks etc. \r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Functions</span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Provisioning:</span> Enables network managers to provision new network devices in an environment. Automating this step reduces cost and eliminates chances of human error.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Mapping or Discovery:</span> Enables the software to discover the features of a target network. Some features that are usually discovered are: the nodes in a network, the connectivity between these nodes, the vendor types, the performance characteristics etc.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Monitoring:</span> Enables the network management system to monitor the network for problems and to suggest improvements. The software may poll the devices periodically or register itself to receive alerts from network devices. One mechanism for network devices to volunteer information about itself is by sending an SNMP Trap. Monitoring can reveal faults in the network such as failed or misconfigured nodes, performance bottlenecks, intrusions etc.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Configuration management:</span> Enables the software to ensure that the network configuration is as desired and there is no configuration drift.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Regulatory compliance:</span> Enables the network management system software to ensure that the network meets the regulatory standards and complies with applicable laws.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Change control:</span> Enables the software to ensure that the network changes are enacted in a controlled and coordinated manner. Change control can enable audit trails which has applications during a forensic investigation after a network intrusion.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Software Asset Management:</span>Provides software deployment and patch management.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Cybersecurity: </span>Enabled the software to use all the data gathered from the nodes to identify security risks in an IT environment.</p>","materialsDescription":"<h1 class=\"align-center\">What does Network Inventory Management system mean?</h1>\r\nNetwork inventory management is the process of keeping records of all the IT or network assets that make up the network.\r\nIt enables network administrators/businesses to have a physical record of all IT and network equipment within the organization.\r\nNetwork inventory management is generally performed to through IT asset tracking software that scans, compiles and records data about each device/node over a network.\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Network inventory management software may include:</span></p>\r\n<ul><li>Number of routers, their make, type and place of installation, serial number</li><li>IP addresses of all devices/nodes, IP addressing scheme used</li><li>Number and type of software along with license keys and expiry dates</li></ul>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">This data helps businesses with:</span></p>\r\n<ul><li>Network size estimation</li><li>Network capacity planning</li><li>Network cost/ROI estimation</li><li>Physical network administration (to deal with device/equipment loss and theft)</li></ul>\r\n<h1 class=\"align-center\">What is SNMP Management Software?</h1>\r\n<span style=\"font-weight: bold; \">SNMP (Simple Network Management Protocol) management software</span> is an application or program used to manage and monitor many network devices – such as servers, printers, hubs, switches, and routers – that are SNMP-aware and which an SNMP agent software can poll and receive alert traps when needed.\r\nSNMP network management software is currently considered the best choice by professionals for IP (Internet Protocol) network management, and as a result, SNMP is widely supported and featured in many hardware devices and network management software packages. \r\nSNMP software is designed to be able to be deployed on a large number of network devices, to have minimal impact and transport requirements on the managed nodes and to continue working when most other network applications fail.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_Management_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"},{"id":10,"title":"Ensure Compliance"},{"id":306,"title":"Manage Risks"},{"id":307,"title":"Enhance Competitive Ability"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":370,"title":"No automated business processes"},{"id":366,"title":"IT infrastructure consumes a lot of power"}]}},"categories":[{"id":331,"title":"Network Management Software","alias":"network-management-software","description":" <span style=\"font-weight: bold; \">Network management software</span> is software that is used to provision, discover, monitor and maintain computer networks. \r\nWith the expansion of the world wide web and the Internet, computer networks have become very large and complex, making them impossible to manage manually. In response, a suite of network management software was developed to help reduce the burden of managing the growing complexity of computer networks. \r\nNetwork management software usually collects information about network devices (which are called Nodes) using protocols like SNMP, ICMP, CDP etc. This information is then presented to network administrators in an easy to understand and accessible manner to help them quickly identify and remediate problems. \r\nSome advanced network control software may rectify network problems automatically. Network management program may also help with tasks involved in provisioning new networks, such as installing and configuring new network nodes etc. Network management tools may also help with maintenance of existing networks like upgrading software on existing network devices, creating new virtual networks etc. \r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Functions</span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Provisioning:</span> Enables network managers to provision new network devices in an environment. Automating this step reduces cost and eliminates chances of human error.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Mapping or Discovery:</span> Enables the software to discover the features of a target network. Some features that are usually discovered are: the nodes in a network, the connectivity between these nodes, the vendor types, the performance characteristics etc.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Monitoring:</span> Enables the network management system to monitor the network for problems and to suggest improvements. The software may poll the devices periodically or register itself to receive alerts from network devices. One mechanism for network devices to volunteer information about itself is by sending an SNMP Trap. Monitoring can reveal faults in the network such as failed or misconfigured nodes, performance bottlenecks, intrusions etc.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Configuration management:</span> Enables the software to ensure that the network configuration is as desired and there is no configuration drift.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Regulatory compliance:</span> Enables the network management system software to ensure that the network meets the regulatory standards and complies with applicable laws.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Change control:</span> Enables the software to ensure that the network changes are enacted in a controlled and coordinated manner. Change control can enable audit trails which has applications during a forensic investigation after a network intrusion.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Software Asset Management:</span>Provides software deployment and patch management.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Cybersecurity: </span>Enabled the software to use all the data gathered from the nodes to identify security risks in an IT environment.</p>","materialsDescription":"<h1 class=\"align-center\">What does Network Inventory Management system mean?</h1>\r\nNetwork inventory management is the process of keeping records of all the IT or network assets that make up the network.\r\nIt enables network administrators/businesses to have a physical record of all IT and network equipment within the organization.\r\nNetwork inventory management is generally performed to through IT asset tracking software that scans, compiles and records data about each device/node over a network.\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Network inventory management software may include:</span></p>\r\n<ul><li>Number of routers, their make, type and place of installation, serial number</li><li>IP addresses of all devices/nodes, IP addressing scheme used</li><li>Number and type of software along with license keys and expiry dates</li></ul>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">This data helps businesses with:</span></p>\r\n<ul><li>Network size estimation</li><li>Network capacity planning</li><li>Network cost/ROI estimation</li><li>Physical network administration (to deal with device/equipment loss and theft)</li></ul>\r\n<h1 class=\"align-center\">What is SNMP Management Software?</h1>\r\n<span style=\"font-weight: bold; \">SNMP (Simple Network Management Protocol) management software</span> is an application or program used to manage and monitor many network devices – such as servers, printers, hubs, switches, and routers – that are SNMP-aware and which an SNMP agent software can poll and receive alert traps when needed.\r\nSNMP network management software is currently considered the best choice by professionals for IP (Internet Protocol) network management, and as a result, SNMP is widely supported and featured in many hardware devices and network management software packages. \r\nSNMP software is designed to be able to be deployed on a large number of network devices, to have minimal impact and transport requirements on the managed nodes and to continue working when most other network applications fail.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_Management_Software.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://cellmining.com/cellmining-wins-son-contract-megafon/","title":"Supplier's web site"}},"comments":[],"referencesCount":0}],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"branches":"Information Technology","companyUrl":"http://cellmining.com/","countryCodes":["BRA","ISR","IND","USA"],"certifications":[],"isSeller":true,"isSupplier":true,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CellMining","keywords":"subscriber, experience, network, CellMining, with, groups, business, operators","description":"CellMining provides Mobile Network Operators with a unique toolset for optimizing user experience and network performance based on real-time metrics of subscriber data. The company’s ground-breaking Subscriber Network Analytics technology monitors subscriber e","og:title":"CellMining","og:description":"CellMining provides Mobile Network Operators with a unique toolset for optimizing user experience and network performance based on real-time metrics of subscriber data. The company’s ground-breaking Subscriber Network Analytics technology monitors subscriber e","og:image":"https://old.roi4cio.com/uploads/roi/company/CellMining.png"},"eventUrl":"","vendorPartners":[],"supplierPartners":[],"vendoredProducts":[],"suppliedProducts":[{"id":646,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/CellMining.png","logo":true,"scheme":false,"title":"Subscriber Network Analytics Technology","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"subscriber-network-analytics-technology","companyTitle":"CellMining","companyTypes":["supplier"],"companyId":3028,"companyAlias":"cellmining","description":"Analysis of CDR data that determines the nature of use and reconstructs calls and data flows\r\nPatented methods for analyzing call reconstruction and data flow sessions for the entire subscriber base.\r\n\r\nWhen networked data is used using certain templates, two types of profiles are created:\r\n- network profiles to accurately identify performance issues and opportunities to improve labeling\r\n- subscriber profiles that enrich the CEM and application systems\r\n\r\nProfile data has feedback from the network through OSS interfaces, providing recommendations for a closed and open loop. This ensures that the network is continuously optimized based on the dynamic needs and experience of the subscribers.\r\nUser profiles contain a huge amount of information of individual and group level - phones, routes, places, information about roaming, and much more. All this is available in powerful dashboard formats, and can also be used to inform external applications.","shortDescription":"Subscriber Network Analytics Technology gives the operator an opportunity to analyze the experience of the subscriber network in a unique way. It uses CDRs (Call Detail Records) as the main input for data analysis, cross-references to network counters, KPIs, GIS, network configurations and policy rules. It defines subscriber behavior patterns and usage, service interruption and bad connection quality - no other SON solution or the current network performance system is able to do this. This analytical technology provides mobile operators and MNVOs with valuable information about the experience of their subscribers, and also provides higher quality of service for several technologies.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Subscriber Network Analytics Technology","keywords":"data, profiles, network, that, subscriber, information, used, experience","description":"Analysis of CDR data that determines the nature of use and reconstructs calls and data flows\r\nPatented methods for analyzing call reconstruction and data flow sessions for the entire subscriber base.\r\n\r\nWhen networked data is used using certain templates, two ","og:title":"Subscriber Network Analytics Technology","og:description":"Analysis of CDR data that determines the nature of use and reconstructs calls and data flows\r\nPatented methods for analyzing call reconstruction and data flow sessions for the entire subscriber base.\r\n\r\nWhen networked data is used using certain templates, two ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/CellMining.png"},"eventUrl":"","translationId":1308,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":331,"title":"Network Management Software","alias":"network-management-software","description":" <span style=\"font-weight: bold; \">Network management software</span> is software that is used to provision, discover, monitor and maintain computer networks. \r\nWith the expansion of the world wide web and the Internet, computer networks have become very large and complex, making them impossible to manage manually. In response, a suite of network management software was developed to help reduce the burden of managing the growing complexity of computer networks. \r\nNetwork management software usually collects information about network devices (which are called Nodes) using protocols like SNMP, ICMP, CDP etc. This information is then presented to network administrators in an easy to understand and accessible manner to help them quickly identify and remediate problems. \r\nSome advanced network control software may rectify network problems automatically. Network management program may also help with tasks involved in provisioning new networks, such as installing and configuring new network nodes etc. Network management tools may also help with maintenance of existing networks like upgrading software on existing network devices, creating new virtual networks etc. \r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Functions</span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Provisioning:</span> Enables network managers to provision new network devices in an environment. Automating this step reduces cost and eliminates chances of human error.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Mapping or Discovery:</span> Enables the software to discover the features of a target network. Some features that are usually discovered are: the nodes in a network, the connectivity between these nodes, the vendor types, the performance characteristics etc.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Monitoring:</span> Enables the network management system to monitor the network for problems and to suggest improvements. The software may poll the devices periodically or register itself to receive alerts from network devices. One mechanism for network devices to volunteer information about itself is by sending an SNMP Trap. Monitoring can reveal faults in the network such as failed or misconfigured nodes, performance bottlenecks, intrusions etc.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Configuration management:</span> Enables the software to ensure that the network configuration is as desired and there is no configuration drift.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Regulatory compliance:</span> Enables the network management system software to ensure that the network meets the regulatory standards and complies with applicable laws.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Change control:</span> Enables the software to ensure that the network changes are enacted in a controlled and coordinated manner. Change control can enable audit trails which has applications during a forensic investigation after a network intrusion.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Software Asset Management:</span>Provides software deployment and patch management.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Cybersecurity: </span>Enabled the software to use all the data gathered from the nodes to identify security risks in an IT environment.</p>","materialsDescription":"<h1 class=\"align-center\">What does Network Inventory Management system mean?</h1>\r\nNetwork inventory management is the process of keeping records of all the IT or network assets that make up the network.\r\nIt enables network administrators/businesses to have a physical record of all IT and network equipment within the organization.\r\nNetwork inventory management is generally performed to through IT asset tracking software that scans, compiles and records data about each device/node over a network.\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Network inventory management software may include:</span></p>\r\n<ul><li>Number of routers, their make, type and place of installation, serial number</li><li>IP addresses of all devices/nodes, IP addressing scheme used</li><li>Number and type of software along with license keys and expiry dates</li></ul>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">This data helps businesses with:</span></p>\r\n<ul><li>Network size estimation</li><li>Network capacity planning</li><li>Network cost/ROI estimation</li><li>Physical network administration (to deal with device/equipment loss and theft)</li></ul>\r\n<h1 class=\"align-center\">What is SNMP Management Software?</h1>\r\n<span style=\"font-weight: bold; \">SNMP (Simple Network Management Protocol) management software</span> is an application or program used to manage and monitor many network devices – such as servers, printers, hubs, switches, and routers – that are SNMP-aware and which an SNMP agent software can poll and receive alert traps when needed.\r\nSNMP network management software is currently considered the best choice by professionals for IP (Internet Protocol) network management, and as a result, SNMP is widely supported and featured in many hardware devices and network management software packages. \r\nSNMP software is designed to be able to be deployed on a large number of network devices, to have minimal impact and transport requirements on the managed nodes and to continue working when most other network applications fail.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_Management_Software.png"},{"id":174,"title":"System and Network Management Software","alias":"system-and-network-management-software","description":"System and network management software is used to manage all the computing resources for the end-user, small business, workgroup, or enterprise, including systems, applications, and the network infrastructure. This market does not include storage management and other storage software. System and network management software break down into the following categories: event management, workload scheduling and automation, output management, performance management, change and configuration management, problem management, and network management.\r\nCommercial tools for system and network management can provide numerous desirable features (e.g., graphical network maps, scalability to manage hundreds or thousands of servers or networks, automated long-term collection of performance information, OS health and event log monitoring, alert generation).\r\nAnalysts found that the best solution is a combination of commercial technologies, in combination with internally developed tools, across several large enterprises, and learned that you must consider several important factors when you select commercial management tools. First, make sure that the commercial tool meets the bulk of your requirements. (The product probably won’t meet all your needs, which is why you also need in-house tools.) Second, how easily can you roll out the product, and how much training will your team need before you can capitalize on your investment? Analysts recommend that if you can evaluate demonstration software first, do so. If you can wait to purchase management software until you’ve tested it in your lab, ensured that it will integrate with your existing in-house or third-party tools, and successfully rolled it out to your production environment.","materialsDescription":" <span style=\"font-weight: bold;\">What is the difference between a network operating system and a network-management software?</span>\r\nDifference between network operating system and network management software:\r\n<span style=\"font-weight: bold;\">Network operating system</span>\r\n<ul><li>The network operating system is used to controls computer systems and network devices and permits them to communicate with one another.</li><li>The network operating system performs the same functions for the network as operating system software does for a computer...</li></ul>\r\n<span style=\"font-weight: bold;\">Network management software</span>\r\n<ul><li>Network management software is used to monitor, discover, provision and maintain computer networks.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/_System_and_Network_Management_Software.png"},{"id":479,"title":"System Infrastructure Software","alias":"system-infrastructure-software","description":" System infrastructure software is a type of enterprise software or program designed to increase the IT performance of any organization. It provides various solutions to enterprises such as workforce support, business transactions, and internal services & processes. This software is used by various industry verticals to operate business functions efficiently and smoothly.\r\nAdvancements in cloud technologies and virtualization are expected to boost the market. Further, the rise in demand for automation and integrated approach in the business process is also anticipated to fuel the market. However, high implementation costs and the absence of a standardized framework are expected to hinder the growth of the market. Moreover, the adoption of bringing your own device (BYOD) is a major opportunity for key players in the system infrastructure software market.\r\nThe system infrastructure software market is segmented on the basis of type, application, industry vertical, and geography. Based on the type, the market is divided into system & network management software, security software, storage software, and system software. By application, the market is classified into building management systems, cloud integration, data center infrastructure management, integrated communication, network integration, and others. By industry vertical, the market is categorized into banking, financial services and insurance (BFSI), telecommunications & IT, transportation & logistics, oil & gas, manufacturing, retail, and others. By geography, it is analyzed across North America, Europe, Asia-Pacific, and LAMEA.<br /><br />","materialsDescription":" <span style=\"font-weight: bold;\">System Infrastructure Software Market Key Segments:</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">By Type</span></span>\r\n<ul><li>System & Network Management Software</li><li>Security Software</li><li>Storage Software</li><li>System Software</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">By Application</span></span>\r\n<ul><li>Building Management System</li><li>Cloud Integration</li><li>Data Center Infrastructure Management</li><li>Integrated Communication</li><li>Network Integration</li><li>Others</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">By Industry Vertical</span></span>\r\n<ul><li>Banking, Financial Services and Insurance (BFSI)</li><li>Telecommunications & IT</li><li>Transportation & Logistics</li><li>Oil & Gas</li><li>Manufacturing</li><li>Retail</li><li>Others </li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_System_Infrastructure_Software.png"},{"id":532,"title":"Software","alias":"software","description":" Computer software, or simply software, is a collection of data or computer instructions that tell the computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work. In computer science and software engineering, computer software is all information processed by computer systems, programs, and data. Computer software includes computer programs, libraries and related non-executable data, such as online documentation or digital media. Computer hardware and software require each other and neither can be realistically used on its own.\r\nAt the lowest programming level, executable code consists of machine language instructions supported by an individual processor — typically a central processing unit (CPU) or a graphics processing unit (GPU). A machine language consists of groups of binary values signifying processor instructions that change the state of the computer from its preceding state. For example, an instruction may change the value stored in a particular storage location in the computer—an effect that is not directly observable to the user. An instruction may also invoke one of many input or output operations, for example displaying some text on a computer screen; causing state changes that should be visible to the user. The processor executes the instructions in the order they are provided, unless it is instructed to "jump" to a different instruction, or is interrupted by the operating system. As of 2015, most personal computers, smartphone devices, and servers have processors with multiple execution units or multiple processors performing computation together, and computing has become a much more concurrent activity than in the past.\r\nThe majority of software is written in high-level programming languages. They are easier and more efficient for programmers because they are closer to natural languages than machine languages. High-level languages are translated into machine language using a compiler or an interpreter or a combination of the two. Software may also be written in a low-level assembly language, which has strong correspondence to the computer's machine language instructions and is translated into machine language using an assembler.","materialsDescription":" <span style=\"font-weight: bold; \">What is software?</span>\r\nSometimes abbreviated as SW and S/W, software is a collection of instructions that enable the user to interact with a computer, its hardware, or perform tasks. Without software, most computers would be useless. For example, without your Internet browser software, you could not surf the Internet or read this page. Without an operating system, the browser could not run on your computer. The picture shows a Microsoft Excel box, an example of a spreadsheet software program.\r\n<span style=\"font-weight: bold; \">How do you get software?</span>\r\nSoftware can be purchased at a retail computer store or online and come in a box containing all the disks (floppy diskette, CD, DVD, or Blu-ray), manuals, warranty, and other documentation.\r\nSoftware can also be downloaded to a computer over the Internet. Once downloaded, setup files are run to start the installation process on your computer.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Free software</span></span>\r\nThere are also a lot of free software programs available that are separated into different categories.\r\n<ul><li>Shareware or trial software is software that gives you a few days to try the software before you have to buy the program. After the trial time expires, you'll be asked to enter a code or register the product before you can continue to use it.</li><li>Freeware is completely free software that never requires payment, as long as it is not modified.</li><li>Open-source software is similar to freeware. Not only is the program given away free, but the source code used to make the program is also, allowing anyone to modify the program or view how it was created.</li></ul>\r\n<span style=\"font-weight: bold; \">How do you use computer software?</span>\r\nOnce the software is installed on the computer hard drive, the program can be used anytime by finding the program on the computer. On a Windows computer, a program icon is added to the Start menu or Start screen, depending on your version of Windows.\r\n<span style=\"font-weight: bold;\">How to maintain software?</span>\r\nAfter the software is installed on your computer, it may need to be updated to fix any found errors. Updating a program can be done using software patches. Once updates are installed, any problems that may have been experienced in the program will no longer occur.\r\n<span style=\"font-weight: bold;\">How is software created and how does it work?</span>\r\nA computer programmer (or several computer programmers) writes the instructions using a programming language, defining how the software should operate on structured data. The program may then be interpreted or compiled into machine code.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1492,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/CellMining1.jpg","logo":true,"scheme":false,"title":"CellMining CX-DRIVEN SON","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cellmining-cx-driven-son","companyTitle":"CellMining","companyTypes":["supplier"],"companyId":3028,"companyAlias":"cellmining","description":"It combines Behavior-Based SON™—including Centralized SON (C-SON) features—with the advanced analytics of Subscriber Experience Hub.\r\nThe solution is compliant with 3GPP specifications, and supports NFV/SDN technology paradigms. It delivers the most accurate, comprehensive, real-time/offline network optimization, driven by customer experience. With its open architecture, Behavior-Based SON™ can co-exist with conventional SON products. CEM teams use the unique, comprehensive dashboards to gain insight into their network subscriber experience.\r\nMobile network operators can now realize their vision of delivering dynamic, CX-driven network optimization.\r\n<span style=\"font-weight: bold; \">Advantages</span>\r\n\r\n<ul><li>Revolutionary technology based on innovative subscriber experience analytics</li><li>Probe-free</li><li>Detection of network faults and misconfigurations (e.g crossed cables, PIM and interference, more)</li><li>Detection of poor quality in call and data sessions</li><li>In-depth insight into communications quality of experience (QoE)</li><li>Robust SON features for GSM networks, as well as 3G and 4G</li><li>Optimal GSM – UMTS – LTE traffic management</li><li>Big data analytics supports hundreds of millions of experience events</li><li>Optimizes to meet comprehensive subscriber experience KPIs</li></ul>\r\n<span style=\"font-weight: bold; \">Benefits</span>\r\n\r\n<ul><li>Network-agnostic – simplifies integration efforts and abstracts complexity to support future technologies</li><li>Single underlying technology serves as basis for both SON and subscriber experience insights</li><li>Hassle-free integration via a CDR abstraction layer</li><li>Field-Proven in a live HetNet environment, including multi-vendor GSM, UMTS, LTE and small cells</li></ul>\r\n<span style=\"font-weight: bold; \">SON benefits</span>\r\n\r\n<ul><li>Subscriber-aware – analyzes and makes network decisions based on subscriber usage patterns</li><li>Cost-saving – performs automatic engineering tasks, saves energy and defers capital investment</li><li>Reduced need for physical drive tests (DT) due to Virtual DT features</li><li>Open architecture – supporting deployment alongside conventional SON products</li></ul>\r\n<span style=\"font-weight: bold; \">CEM benefits</span>\r\n<ul><li>Supplements existing customer profile data with network experience insight</li><li>Integrates with CEM systems and applications</li><li>Enables drilling down to subscriber dimensions (VIP, business, inbound roamers) and network dimensions (cells, roads, geographical coverage)</li><li>Handset model compatibility reports</li></ul>","shortDescription":"CellMining offers an integrated SON-CEM solution for mobile operators, based on Subscriber Network Analytics technology, which is powered by patent-pending algorithms.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CellMining CX-DRIVEN SON","keywords":"","description":"It combines Behavior-Based SON™—including Centralized SON (C-SON) features—with the advanced analytics of Subscriber Experience Hub.\r\nThe solution is compliant with 3GPP specifications, and supports NFV/SDN technology paradigms. It delivers the most accurate, ","og:title":"CellMining CX-DRIVEN SON","og:description":"It combines Behavior-Based SON™—including Centralized SON (C-SON) features—with the advanced analytics of Subscriber Experience Hub.\r\nThe solution is compliant with 3GPP specifications, and supports NFV/SDN technology paradigms. It delivers the most accurate, ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/CellMining1.jpg"},"eventUrl":"","translationId":1493,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":331,"title":"Network Management Software","alias":"network-management-software","description":" <span style=\"font-weight: bold; \">Network management software</span> is software that is used to provision, discover, monitor and maintain computer networks. \r\nWith the expansion of the world wide web and the Internet, computer networks have become very large and complex, making them impossible to manage manually. In response, a suite of network management software was developed to help reduce the burden of managing the growing complexity of computer networks. \r\nNetwork management software usually collects information about network devices (which are called Nodes) using protocols like SNMP, ICMP, CDP etc. This information is then presented to network administrators in an easy to understand and accessible manner to help them quickly identify and remediate problems. \r\nSome advanced network control software may rectify network problems automatically. Network management program may also help with tasks involved in provisioning new networks, such as installing and configuring new network nodes etc. Network management tools may also help with maintenance of existing networks like upgrading software on existing network devices, creating new virtual networks etc. \r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Functions</span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Provisioning:</span> Enables network managers to provision new network devices in an environment. Automating this step reduces cost and eliminates chances of human error.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Mapping or Discovery:</span> Enables the software to discover the features of a target network. Some features that are usually discovered are: the nodes in a network, the connectivity between these nodes, the vendor types, the performance characteristics etc.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Monitoring:</span> Enables the network management system to monitor the network for problems and to suggest improvements. The software may poll the devices periodically or register itself to receive alerts from network devices. One mechanism for network devices to volunteer information about itself is by sending an SNMP Trap. Monitoring can reveal faults in the network such as failed or misconfigured nodes, performance bottlenecks, intrusions etc.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Configuration management:</span> Enables the software to ensure that the network configuration is as desired and there is no configuration drift.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Regulatory compliance:</span> Enables the network management system software to ensure that the network meets the regulatory standards and complies with applicable laws.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Change control:</span> Enables the software to ensure that the network changes are enacted in a controlled and coordinated manner. Change control can enable audit trails which has applications during a forensic investigation after a network intrusion.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Software Asset Management:</span>Provides software deployment and patch management.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Cybersecurity: </span>Enabled the software to use all the data gathered from the nodes to identify security risks in an IT environment.</p>","materialsDescription":"<h1 class=\"align-center\">What does Network Inventory Management system mean?</h1>\r\nNetwork inventory management is the process of keeping records of all the IT or network assets that make up the network.\r\nIt enables network administrators/businesses to have a physical record of all IT and network equipment within the organization.\r\nNetwork inventory management is generally performed to through IT asset tracking software that scans, compiles and records data about each device/node over a network.\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Network inventory management software may include:</span></p>\r\n<ul><li>Number of routers, their make, type and place of installation, serial number</li><li>IP addresses of all devices/nodes, IP addressing scheme used</li><li>Number and type of software along with license keys and expiry dates</li></ul>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">This data helps businesses with:</span></p>\r\n<ul><li>Network size estimation</li><li>Network capacity planning</li><li>Network cost/ROI estimation</li><li>Physical network administration (to deal with device/equipment loss and theft)</li></ul>\r\n<h1 class=\"align-center\">What is SNMP Management Software?</h1>\r\n<span style=\"font-weight: bold; \">SNMP (Simple Network Management Protocol) management software</span> is an application or program used to manage and monitor many network devices – such as servers, printers, hubs, switches, and routers – that are SNMP-aware and which an SNMP agent software can poll and receive alert traps when needed.\r\nSNMP network management software is currently considered the best choice by professionals for IP (Internet Protocol) network management, and as a result, SNMP is widely supported and featured in many hardware devices and network management software packages. \r\nSNMP software is designed to be able to be deployed on a large number of network devices, to have minimal impact and transport requirements on the managed nodes and to continue working when most other network applications fail.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_Management_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}