Mobile Number Portability

In: Other Topics

Submitted By amitgoyal12578
Words 273
Pages 2
OK…So your tired of your current service provider. You’re tired of their sloppy customer service. Tired of having to speak to their discourteous customer representatives. Tired of receiving calls from unknown numbers in the middle of an important meeting only to hear “Kabhi Kabhi Aditi … ” being played and a mechanical female voice saying “Press 1 to set it as your callertune”. So…What would u want to do?? Change your service provider of course! Ah…but’re attached to your number! All of us are! Why change the number and put up with the trouble of having to remember a completely new one??

The solution to this seemingly never ending problem arrives in India, early next year in the form of Mobile Number Portability. Wondering what this is all about? can switch between service providers without having to change your number and you can do this irrespective of the technology that you use. In other words, if you have a CDMA mobile and want to switch to GSM network, you can go ahead and do it with glee

Of course, everything comes with a cost. But luckily in this case, the cost isn’t much high!! According to TRAI (Telecom Regulatory Authority of India), subscribers should not be charged more than Rs.19/- for changing their service provider. Mobile services will be disrupted for a few hours when the transfer is in process but this is again a minor hiccup.

This service will initially be available only in metros and selected cities by early 2010. And thus arrives the much expected change in the telecom…...

Similar Documents

Mobile Security

...WHITE PAPER Copyright © 2011, Juniper Networks, Inc. 1 MOBILE DEVICE SECURITY— EMERGING THREATS, ESSENTIAL STRATEGIES Key Capabilities for Safeguarding Mobile Devices and Corporate Assets 2 Copyright © 2011, Juniper Networks, Inc. WHITE PAPER - Mobile Device Security—Emerging Threats, Essential Strategies Table of Contents Executive Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 3536 - Pages: 15


...What Marketing Tools do Mobile Phone Service Use; an Empirical Research Module code: PGBS0142 Submitted to the University of Plymouth as a dissertation for the degree of MSc. in Business and management in the Faculty of Plymouth Business School. Declaration: I certify that all material in this dissertation which is not my own has been identified and none has been submitted previously in support of any degree qualification or course. Signed: Shivender Kaur Student: Shivender Kaur (10271264) Date of submission: 19/08/11 Acknowledgements I take this opportunity to thank all the people who have had a hand in enabling me complete my studies. Lots of gratitude goes to my parents for if it were not for their many encouragements and support I wouldn’t have finished this course. My classmates played a significant role in helping me catch up on what I had not understood in class sessions I sincerely thank them for their support. My tutors in this course should get special thanks for their peculiar role in assisting and guiding me as I came up with this dissertation. For all other persons whom I may not have mentioned but played a significant role in enabling me come up with this research may the good Lord Bless you abundantly. July 2011 Shivendar Kaur Abstract Research developing around the subject of marketing across the lucrative mobile phone service industry continue...

Words: 22038 - Pages: 89


...potential adoption of new mobile applications. The purpose of this research is to study users and non-users of three selected mobile applications, and find out what really drives the intention to use these applications across users and non-users. Design/methodology/approach: The authors measured actual usage of mobile applications in a panel study of 579 Finnish smartphone users, using in-device measurements as an objective way to identify users and non-users. A web-based survey was used in collecting data to test an extended TAM model in explaining intention to use. Findings: Perceived technological barriers negatively affect behavioural control, reflecting people’s assessment of themselves being capable of using the services without trouble. Behavioural control is directly linked to perceived usefulness (except for games) and perceived enjoyment, as hypothesized. Perceived enjoyment and usefulness were generically found to explain intention to use applications for both users and for non-users. Research limitations/implications: With regards to the impact of social norms, the study finds that further research needs to be done in exploring its impact more thoroughly. The dataset of the research, consisting purely of male-dominated, young smartphone users, make the generalization of results difficult. Practical implications: There are differences regarding what drives the usage of different kinds of mobile applications. In this study, map applications and mobile Internet, are......

Words: 10509 - Pages: 43


...Bigla akong tumayo na naninikip ang dibdib.  Sinabi ko sa nanay na namatay na si Rivhard at pupuntahan koagad sa St.'s Peters Chapel kung saan siya nakaburol.  Sa St.'s Peters, sinabi sa information na sa huling silid sa kaliwa naroon ang aking kaibigan.  Sa pagkapasok ko pa lamang sa silid ay nakita ko na agad ang iba naming kabarkada. Puro sila malu-lungkot at halos maiyak-iyak.  Di ko mapigil ang aking luha habang minamasdan ang mukha ni Richard sa loob ng kabaong. May mga tapal ang kanyang pisngi at noo. Lumapit sa aking ang kapatid niyang si Cristine. "Nabundol ang kotseng sinasakyan niya."  "Saan nangyari ito?" ang tanong ko.  "Sa may Magallanes Village, sa Expressway, noong Sabado. Walang ngang nakakita sa plate number nong truck. Hit and run kasi ang nangyari."  "Nanghinga ako nang mabasa ko sa pahayagan ngayong hapon. Nagmamadali nga akong pumarito," wika ko.  Isang mabait at masayang kaibigan si Richard. Marami siyang kaibigan, mahirap at mayaman. Buhat pa ng maliliit kami ay mag kaibigan na at madalas magakasama, nagbabasketball, namamasyal, nagsisimba, at iba pang gawain ng mga bata. ...

Words: 1774 - Pages: 8

Mobile Commerce

...Running Header: Mobile Commerce Mobile Commerce Management Information System December 3rd, 2013 Abstract The popularity of m-commerce devices, especially mobile phones among consumers high-lighted a new source of revenue for businesses. An industry review in mobile commerce found a variety of current trends and business models that will affect future strategic uses from a project management perspective. This paper explores m-commerce technology from a business perspective; how it is similar and differs from e-commerce technically; and tries identifying and exploring potential strategic uses for this new technology. Introduction The Global Mobile Commerce Forum, which came to include over 100 organisations, had its launch in London on 10 November 1997 and Kevin Duffey was elected as the Executive Chairman. Over 100 companies joined the mobile commerce forum within a year, many forming mobile commerce teams of their own, e.g. Mastercard and Motorola. Of these one hundred companies, the first two were Logica and Cellnet. Member organizations’ such as Nokia, Apple, Alcatel, and Vodafone began a series of trials and collaborations. Mobile commerce services were first delivered in 1997, when the first two mobile-phone enabled Coca Cola vending machines were installed in the Helsinki area in Finland. The machines accepted payment via SMS text messages. The first mobile phone-based banking service was launched in 1997 by Merita Bank of Finland, also using SMS. It is......

Words: 3393 - Pages: 14

Mobile Number Portability

...Monarch Project & Finmarkets Ltd MOBILE NUMBER PORTABILITY 05 OCT 2009. * For Private Circulation Only Mobile Number Portability -Keep Single Mobile Number Lifetime Monarch Project & Finmarkets Ltd Mobile Number Portability Mobile number portability enables mobile telephone users to retain their mobile telephone numbers when changing from one network operator to another. It is a very important concept that should be implemented in India where total number of mobile subscribers cross 45 crore mark at the end of August 2009. Number portability is also likely to help new entrants into the Indian mobile-services market, such as the Indian joint ventures of Telenor and Etisalat. The move to introduce the MNP comes as the country's mobile subscriber base is expanding fast, sometimes having an impact on network quality. Presently, MNP is already existing in many developing and developed Number portability is countries across the world. likely to help new entrants into the Indian The MNP option will, however, not lead to a dramatic shift by subscribers from one operator to another, as quality of service and netmobile services market work coverage are not significant differentiators in the Indian market. The introduction of number portability in other countries did not lead to a significant shift by subscribers from one operator to another, and in India too there will be an initial churn of up to 20 percent of subscribers, which will then taper off. Usually, customers do...

Words: 3307 - Pages: 14


...Mobile Banking “Making Cash, Checks, Credit Cards Obsolete” Abstract With the growing and widespread use of smartphones applications for both the iPhone and Android there is very little you can’t do virtually. From banking to shopping, in-person visits to Skype and face time, putting a key in your car to start it to remotely starting your car and setting the temperature, being at home turning on lights and adjusting your thermostat to doing the same functions remotely using a smartphone. Smartphone applications have offered instantaneous, real-time efficiencies in our day-to-day life. Two generations ago you had to physically get up to change the channel on your television. Now you can talk into the remote control for channel changes and special programming. The same goes for banking. Everything is about speed of transaction and efficiency. Cash and credit card transactions are becoming obsolete with the advent of smartphone applications. Today you can shop, make purchases, and make bank deposits and transfers without leaving the comfort of your home. This paper explores how new technology and smartphone applications are used for mobile banking rendering cash, checking and credit card transactions obsolete. Keywords: Mobile Banking, Security, Cost and Benefits, Future Technology Mobile Banking “Making Cash, Checks, Credit Cards Obsolete” Mobile banking is becoming increasingly popular with over a billion mobile devices in use today. If you are a smartphone......

Words: 5012 - Pages: 21

Challenges of Mobile Computing

...Challenges of mobile computing: An Overview Mobile computing encompasses a number of technologies and devices, such as wireless LANs, notebook computers, cell and smart phones, tablet PCs and PDAs. Basically, any electronic device that helps you organizes your life, communicate with coworkers or friends, or do your job more efficiently is part of mobile computing, the combination of wireless communication infrastructure and portable computing devices has put the background for new computing ,which allows users access information and working With each others, when they move. Mobility can find e the form of users moving between specific terminals in the world. The constraints of mobile computing: mobile device constraints: are small size according to its processor speed ,the capacity of storage space and monitor resolution. Network constraint: the network of mobile wireless is not full reliable when to compare wired. Mobility constraints: mobile parts are very important for each one , the storage is the one of which makes mobile to save a lot of information. Wireless communication is very hard to Automate as wired communication because of the interaction of surrounding environment with the message. Mobility is the capacity to alternate one position when connected to the network increases the stability of some information. Portability there is a lot of problems for moving mobile from one location to another such as low power can’t find enough electricity to charge your......

Words: 281 - Pages: 2


...Jiuxiao Wang, Pinga Benjamin Francis Guided research Jan 30, 2015 Mobile Advertising Outline I. Introduction * The introduction of advertising * What is the mobile advertising II. The mobile Internet advertising spending share and its allocation 1.Horizontal comparison of mobile advertising 2. Vertical comparison of mobile advertising III. Popularization of mobile equipment and development of mobile advertising platform * The popularization of the mobile phone * Examples of Apple and Samsung IV. The efficiency of the mobile advertising * The speed * The quantity V. The decay of traditional advertising media * Television * Newspaper and Magazine * Classic advertising case VI. The limitations of the mobile advertising * Disorder * Emerging industry * The occupation of traditional advertising VII. Conclusion I. Introduction One definition of advertising is: “Bringing a product (or service) to the attention of potential and current customers. Advertising is focused on one particular product or service. Thus, an advertising plan for one product might be very different than that for another product.” With the development of hundreds of years, the types of advertising are various. For examples, the television advertising, online advertising, press advertising, street advertising, billboard advertising and the mobile advertising. There are so many choices for the business company, so which one......

Words: 2418 - Pages: 10

Mobile Computing

...ABSTRACT In the context of the rapid growth of mobile computing penetration in developing countries, mobile telephony is currently considered to be particularly important for such development. Yet, until recently, very little systematic evidence was available that shed light on the developmental impacts of mobile computing. The objective of this paper is to evaluate the problems and prospects of mobile computing in Nigeria. The paper will be analyzed by theme in order to provide a thematic overview as well as a comparative analysis of the development role of mobile computing. In exploring the evidence from completed projects as well as the foci of new projects, the paper summarizes and critically assesses the key findings and suggests possible avenues for future research. CHAPTER ONE INTRODUCTION The fusion of computer and telecommunication technologies has heralded the age of information superhighway over wire-line and wireless networks. Mobile cellular communication systems and wireless networking technologies are growing at an ever-faster rate, and this is likely to continue in the foreseeable future. Wireless technology is presently being used to link portable computer equipment to corporate distributed computing and other sources of necessary information. Wide-area cellular systems and wireless LANs promise to make integrated networks a reality and provide fully distributed and ubiquitous mobile communications, thus bringing an end to the tyranny of geography.......

Words: 8346 - Pages: 34


...Mobile phone bane or boon Is a knife useful instrument or a perilous weapon? It depends on how it is used. Same implies with the case of technology. The greatest invention are those which affect the mass of people; and of those greatest invention is cell phones .It would be very ungrateful on our parts not to recognise how imperative are they to us. Cell phones have revolutionised the human existence .This is possible only because they are getting cheaper and cheaper day by day. Discounted cell phones accessories have made it even easier to keep the phone intact and give it a longer life. Undoubtedly , if cell phones are in right hands ,then they are a marvel ! Firstly they are proved to be a gratuity on the account of uniting not only the country but the entire planet as a “global village”. No matter how far we are sitting we can gossip anytime anywhere! In fact it’s bliss to the parents as well as children .Parents can every time monitor their children and children are also safe. If anyone is in any kind of danger s/he can call for help immediately . It arrests mishaps. The delight of watching favourite tv shows, songs, etc is unmatched; as now cell phones are embedded with all high tech features. Also discounted cell phone accessories have added cherry on the top. Accessories such as wireless Bluetooth handset (can be used to talk without even locating the cell phone ) , cases and pouches (keeping the phone intact and out of harm's way ) , charger ,adapter battery...

Words: 986 - Pages: 4


...What’s a mobile phone virus? A mobile phone virus or mobile malware - malicious mobile software - is a computer virus specifically adapted for the mobile phone environment and designed to spread from one vulnerable phone to another. A virus is a program code that replicates by being copied to another program. Viruses can be transmitted as attachments to an email or in a download file. Some viruses take effect as soon as their code is executed; other viruses can lie dormant. A virus that replicates by resending itself as an email attachment or as a part of a network message is known as a worm. Viruses can range from benign to quite harmful; they can erase data from the infected phone or send fake messages purporting to be from the phones owner. How prevalent are mobile phone viruses? The current security risk from mobile phone viruses and worms is low. Until many more smart phones or PDAs are in use, and users of these phones are regularly exchanging executable files, the risk will remain low. The mobile industry takes the threat of viruses very seriously and is continually monitoring its networks and working to protect users from any future risk from mobile phone viruses. There are also some simple measures that individual users can implement to protect themselves. What can I do to protect my phone? The following tips can help prevent problems with viruses on your phone: 1. Switch to Bluetooth hidden mode. If your phone has Bluetooth capability,......

Words: 3609 - Pages: 15

Mobile Technology

...Mobile technology is a term used to describe various types of cellular communication technology. It is especially relevant in this time and age as mobile usage is becoming widespread with more over 70% of the world’s population now having a mobile phone, over 5 billion mobile subscribers worldwide, and in places like the United States, with 9 out of 10 people owning a mobile phone (United Nations, 2011). Apple has sold almost 60 million iPhones world wide, while Google’s Android OS is growing at 886% year on year and now activating over 160,000 devices a day, across 60 devices in over 40 countries (St Thomas University, 2012). Mobile technology has also evolved by leaps and bounds just over the last decade – so much so that they are now more than just phones used to make calls. They can now go online with a web browser, have a GPS navigation system embedded inside and even function as game consoles. The many functions of new smartphones in mobile technology leads experts to saying that their wireless functions will be the future of information exchange. The next generation of smartphones will be able to keep track of your personal data and analyse it according to your needs, translate words by just scanning a signboard and tell you information about any location at which you point your phone. So of course, with all these wonderful capabilities, Man has found a way to use smartphone mobile technologies in the field of medicine too, to help people. In this paper, I will......

Words: 1999 - Pages: 8

Mobile Forensics in Healthcare

...2009 Eighth International Conference on Mobile Business Mobile Forensics in Healthcare Connie Justice, Huanmei Wu Computer & Information Technology Purdue School of Engineering and Technology Indiana University Purdue University Indianapolis 799 W. Michigan St., ET 301 Indianapolis, IN 46202 {cjustice, hw9} Abstract -- Mobile communication has been heavily applied in the current healthcare system for health information exchange. Patient information security has become a major concern, especially with the wide adoption of electronic medical records. Mobile Forensics has been utilized by law enforcement to systematically procure and preserve mobile evidence. However, the adoption of mobile forensics in the healthcare lags behind. The goal of our project is to examine the options and to provide recommendations for adoption and customization of mobile forensics in the healthcare field. An open-ended survey of local healthcare and related facilities around Indianapolis has been explored to examine the current status of Mobile Forensics in the healthcare field. The results have been evaluated using statistical analysis. A methodology is being proposed that would use mobile forensics procedures taking into account the regulatory measures that have to be instituted due to the Health Insurance Portability and Accountability Act (HIPAA) of 1996. Keywords-mobile forensics, healthcare. Evelyn Walton Informatics Indiana University Purdue University Indianapolis 799 W.......

Words: 4340 - Pages: 18


...Mountain Division. Your battalion will deploy to Iraq within six months. The battalion commander approved your unit’s METL. The METL identifies critical tasks for each platoon and now it is time for squad leaders to select tasks to train that support the platoon’s critical tasks. 2. The platoon’s critical tasks are as follows: a. Conduct unit operations. b. Guard detained prisoners of war. c. Treat casualties. d. Perform in a Chemical, Biological, Radiological, and Nuclear (CBRN) environment. e. Implement combat survival techniques in area of operation. 3. Use the class reference material to select the appropriate tasks for your squad to train that support the platoon’s critical tasks. Record your answers (title and task number) in the comment box. Conduct Unit operations 071-326-3013 Conduct a Tactical Road March.......................................... 3-158 071-720-0015 Conduct an Area Reconnaissance by a Platoon ...................3-161 091-CTT-4001 Supervise Maintenance Operations..................................... 3-242 181-101-4001 Conduct a Search/Seizure ................................................... 3-245 Guard detained prisoners of war 181-101-2023 Enforce the Uniform Code of Military Justice (UCMJ).......... 3-1 181-105-2001 Enforce the Law of War and the Geneva and Hague Conventions ............... 3-6 181-105-2002 Conduct Combat Operations According to the Law............................ 3-10 ......

Words: 278 - Pages: 2

Akindo Sei no Little Peso | I segreti di Twin Peaks | Download Now