{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:18:17Z","timestamp":1729678697526,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/icton.2011.5970936","type":"proceedings-article","created":{"date-parts":[[2011,8,4]],"date-time":"2011-08-04T01:55:34Z","timestamp":1312422934000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Trends in the telecom industry and opportunities for service providers"],"prefix":"10.1109","author":[{"given":"Muneer","family":"Zuhdi","sequence":"first","affiliation":[]},{"given":"Elisabeth T.","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Teixeira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Reverse Engineering Google's Innovation Machine","author":"iyer","year":"2008","journal-title":"Harvard Business Review"},{"key":"ref11","article-title":"Creating Competitive Advantage from an FMC Strategy in a Traditional Telecoms Environment","volume":"2","author":"mellin","year":"2009"},{"article-title":"Neilson's Law of Internet Bandwidth","year":"2010","author":"neilson","key":"ref12"},{"article-title":"From Cave Paintings to the Internet","year":"2011","author":"norman","key":"ref13"},{"key":"ref14","article-title":"Internet Trends","author":"stanly","year":"2010","journal-title":"Research Report"},{"article-title":"30 Million People on Skype","year":"2011","author":"parkes","key":"ref15"},{"key":"ref16","article-title":"Utilization of FTTH as Blue Ocean Strategy to Gain Competitive Advantage","author":"zuhdi","year":"2010","journal-title":"IEEE ICTON"},{"journal-title":"Cisco Research Report","article-title":"Cisco Visual Networking Index: 2009-2014","year":"0","key":"ref4"},{"year":"0","key":"ref3","article-title":"Next Generation IP Core Network"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1177\/030630700503100105","article-title":"Adapt or adapt: Lessons for Strategy from the US Telecoms Industry","volume":"31","author":"eunni","year":"2005","journal-title":"Journal of General Management"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2202\/1446-9022.1170"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON.2010.5549139"},{"journal-title":"Facebook Statistics","year":"0","key":"ref7"},{"journal-title":"Strategy White Paper","article-title":"Assessing Cloud Computing: Challenges and Opportunities","year":"0","key":"ref2"},{"journal-title":"Strategy White Paper","article-title":"Toward a Converged Backbone","year":"0","key":"ref1"},{"key":"ref9","article-title":"The Role of Telcos in Cloud Computing","author":"hall","year":"2010","journal-title":"Ovum Research Report"}],"event":{"name":"2011 13th International Conference on Transparent Optical Networks (ICTON)","start":{"date-parts":[[2011,6,26]]},"location":"Stockholm, Sweden","end":{"date-parts":[[2011,6,30]]}},"container-title":["2011 13th International Conference on Transparent Optical Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5959844\/5970761\/05970936.pdf?arnumber=5970936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T18:58:57Z","timestamp":1560452337000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5970936\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icton.2011.5970936","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}