The only publication dedicated to OSS Volume 1, Issue 8 - January 2005 |
|
Outsourcing OSS (cont'd) A third, growing approach takes on a utility computing model where carriers would pay-per-use for access to various OSS applications and transactions. Neustar, for example, which handles LNP provisioning, is one example of a utility-computing type of outsourcer. Utility computing is growing in enterprise circles as an interesting option, but for most OSS functions, the uniqueness from carrier to carrier makes this model challenging, at least in the near term. In fact, IBM's Wiess explains that while any of these three models would seem to make sense as great offerings for the telco sector, this isn't generally true. He says his expectations for OSS outsourcing business are not very high today. This, he says, is largely because the folks making the decisions – operations and IT – run into conflicts and concerns over employment and, once again, a perceived or very real loss of control. One area Wiess says may hold promise is in helping to offload aging Bellcore/Telcordia applications to help free up carrier resources to focus on rolling out new services and infrastructure. Also, smaller carriers that can't afford to build their own new-generation OSS infrastructure are likely takers, though admittedly too small for a large player like IBM. The Upside The source also suggests that with a strong outsourcing relationship a carrier is more likely to succeed in consolidating. The outsourcing partner can provide more reach and resources than a carrier can generally provide itself and should not have to hire. “It was amazing how fast we could act,” says the source, explaining that technical resources abroad are “phenomenal in their savvy and discipline” and that the success of Sprint's national network rollouts has been in no small part due to help from the outside. Positive and Negative
© 2005, All information contained herein is the sole property of Pipeline Publishing, LLC. Pipeline Publishing LLC reserves all rights and privileges regarding the use of this information. Any unauthorized use, such as copying, modifying, or reprinting, will be prosecuted under the fullest extent under the governing law. |