When you don't have anything nice to say, well then perhaps its time consider a career as an analyst.
Users with identities (telco issued or not) use devices (telco bound or not) on networks (telco owned or not) to access applications (telco hosted or not).
Posted via email from Pre(posterous)
Nice architecture :)You also need to take into account that there are different processes that are all connected to a customer: CRM, Provisioning (not user provisioning, but providing hardware, sims and phone numbers) and billing. In many cases these are silos. And then mobile can also be post-paid (subscription based) and pre-paid, both with complete different billing models.I used this model to analyse user management at a telco: http://id-use.blogspot.nl/2012/09/identity-management-and-crm.htmlThis is not usable like your model, because it doesn't show the identity flow like your model.
Post a Comment