Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Great Telecom Meltdown

Buy
The economic boom of the late 1990s included huge investments in the telecommunications
industry and related sectors. It was followed by a downturn of
unusual severity, which reduced total paper wealth by trillions of dollars, cost
many thousands of jobs, and saw some of the biggest bankruptcies in history.
While there certainly was a general business cycle at work, the downturn in telecom
was not just a cyclical correction, itself a healthy event that routinely shakes
out the weakest players. The downturn was unusually severe, impacting many
well-established as well as young companies; the price pressures that resulted
from so many distressed vendors then put an impossible squeeze on the profit
margins of many of their stronger competitors. These conditions led investors to
avoid anything remotely resembling telecom; the resulting capital squeeze further
hurt the remaining survivors. This was not just a low point in the business
cycle; it was economic metastasis, an epic failure, a full-bore meltdown.

Analysts, reporters, and other pundits have frequently sought to identify
the cause of the telecom industry crash. So have industry participants themselves,
both market participants and their regulators, eager to pin the blame on
someone else. At the top of many commentators’ lists is the Telecommunications
Act of 1996, which opened up local telephone service to competition
across the United States. The Act led to the creation of a huge number of new
companies, many of which went public quickly and visibly, and which failed,
equally visibly, not long afterwards. The Act became law just as the boom was
beginning, and in many ways set the direction of the industry, making it an
obvious culprit.
(HTML tags aren't allowed.)

The Mathematica GuideBook for Programming
The Mathematica GuideBook for Programming

This comprehensive, detailed reference provides readers with both a working knowledge of Mathematica in general and a detailed knowledge of the key aspects needed to create the fastest, shortest, and most elegant implementations possible. It gives users a deeper understanding of Mathematica by instructive implementations, explanations, and...

Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project

There’s a good reason project risk management is one of the most vital of the nine content areas of the Project Management Body of Knowledge®. Important projects tend to be time constrained, pose huge technical challenges, and suffer from a lack of adequate resources. It’s no wonder that project managers are increasingly focusing...

Ten Questions About Human Error: A New View of Human Factors and System Safety (Human Factors in Transportation)
Ten Questions About Human Error: A New View of Human Factors and System Safety (Human Factors in Transportation)
The text is extremely straightforward....it will be a valuable read for anyone interested in system safety-no matter what their field. Interesting reading and thought provoking discussions.

IEEE EMBS Journal

Ten Questions About Human Error asks the type of questions frequently posed in
...

Handbook of Pattern Recognition & Computer Vision
Handbook of Pattern Recognition & Computer Vision

The area of pattern recognition and computer vision, after over 35 years of continued development, has now reached its maturity. The theories, techniques and algorithms are mostly well developed. There are a number of applications which are still being explored. New approaches motivated by applications and new computer architectures...

Domain-Driven Design Using Naked Objects
Domain-Driven Design Using Naked Objects

Domain-driven design (DDD) focuses on what matters in enterprise applications: the core business domain. Using object-oriented principles, you can develop a domain model that all team members-including business experts and technical specialists-can understand. Even better, this model is directly related to the underlying...

Beacon Technologies: The Hitchhiker's Guide to the Beacosystem
Beacon Technologies: The Hitchhiker's Guide to the Beacosystem

Learn the key standards―iBeacon, Eddystone, Bluetooth 4.0, and AltBeacon―and how they work with other proximity technologies. Then build your understanding of the proximity framework and how to identify and deploy the best solutions for your own business, institutional, or consulting needs.

Proximity technology―in...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy