Voice over WiMax: Minimise the Risks

New offerings like Voice over WiMax often prompt a lot of concern from revenue assurance people. The trick is to remember that there will be a few different risks whilst many of the fundamentals will be unchanged. So monitoring for indicators of fraud or checking completeness of EDRs are basically the same for Voice over WiMax, but some of the technology used may differ. This article about the risks of leakage for Voice over WiMax scores 9 out of 10 for being well-written and balanced. It would have been 10 out of 10 apart from the fact that the author is from ECtel, ECtel sell IP probes, and the major piece of advice is that people should buy IP probes…

Eric Priezkalns
Eric Priezkalnshttp://revenueprotect.com

Eric is the Editor of Commsrisk. Look here for more about the history of Commsrisk and the role played by Eric.

Eric is also the Chief Executive of the Risk & Assurance Group (RAG), an association of professionals working in risk management and business assurance for communications providers. RAG was founded in 2003 and Eric was appointed CEO in 2016.

Previously Eric was Director of Risk Management for Qatar Telecom and he has worked with Cable & Wireless, T‑Mobile, Sky, Worldcom and other telcos. He was lead author of Revenue Assurance: Expert Opinions for Communications Providers, published by CRC Press.

Related Articles

1 COMMENT

  1. Actually the definition of fraud may also morph. In the past, simultaneous usage of a user ID would be considered fraud since a user is often billed on a flat monthly subscription (MRC). But, Earthlink has taken a unique approach with its municipal Wi-Fi deployments. Rather than considering simultaneous usage as fraud, they are charging customers for the privilege. The rationale is that with the mobility afforded by muni Wi-Fi, simultaneous usage is bound to happen, for example when you leave your desktop logged in at home and walk out the door to take a call with your Wi-Fi enabled handset. BTW – the charging schemes with overlapping blocks of usage are not trivial, and provide their own revenue assurance and auditing challenges.

Comments are closed.

Get Our Weekly Newsletter by Email