Computaris and HP Secure Eastern European Mobile Operator from Hackers

May 19th, 2015|

Partnership develops easy to install solution to prevent security and privacy breaches

London – May 2015 – Computaris, an R Systems […]

The shared wallet: Pricing shared data plans

May 14th, 2015|

From Airbnb to Uber, the shared economy, or collaborative consumption as it is sometimes known, has rapidly grown in […]

Critical use cases related to billing mediation

April 21st, 2015|

The last decade has brought a revolution to telecommunications markets. Basic offline charged voice and text services were initially […]

How a hub integration architecture can help operators overcome telecom IT system integration challenges

April 7th, 2015|

The idea of a single platform supporting a variety of different information flows is not new, but what system […]

Computaris created a concept logo for MWC Barcelona 2015

March 27th, 2015|

Driven by our stable and sustainable growth, we are preparing for the future through diverse tactics and strategies related […]

Why operators should rethink their integration architecture?

March 17th, 2015|

The last decade has brought a revolution to telecommunications markets. Previously, basic offline charged voice and text services were […]

Meet Computaris and DigitalRoute at MWC Barcelona!

February 18th, 2015|

 

 

Whitepapers

How open policy control platforms enable operators to save costs, make money and launch new data services extremely fast
System […]

Policy Control in 2015: From Enforcement to Agility

February 17th, 2015|

There’s surely no argument that PCRF must now move beyond supporting the requirements of its original, fairly narrow set […]

VoLTE: The Carrier’s Monetization Life-Saver or a Cash-Drainer?

February 17th, 2015|

VoLTE is a significant development, and while it might not be the complete industry game-changer some have touted it […]

Securing Telecoms: Targeting the vulnerabilities on a network

February 13th, 2015|

by Razvan Rusu, Computaris Presales Manager

How secure is your mobile phone? Would it surprise you that it could be […]

Login

To acces all the website content please Login or Register.

Register | Lost your password?