Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Alcatel-Lucent(Strategic 100 2010)

Telecommunications equipment vendor Alcatel-Lucent returned to profitability and grew its revenue in the third quarter, a different story from the first quarter of the year.

Global leader: Ben Verwaayen, CEO

Website: www.alcatel-lucent.com

Local leader: Rajeev Singh-Molares, President of Alcatel-Lucent, APAC

Core Activity: Telecommunications and network equipment

Revenue: US$19.72 billion (FY2009)

Key Customers: Air New Zealand, Telecom New Zealand, ASB Bank

Employees: 77,000

Telecommunications equipment vendor Alcatel-Lucent returned to profitability and grew its revenue in the third quarter, a different story from the first quarter of the year. The Networks, Applications and Services segments all saw revenue grow, boosted by demand for faster IP routers, as operators cope with growing traffic. It is entering the mobile advertising market with Optism, a hosted platform for mobile operators that will send personalised ads to subscribers. Using a technology called mobile smart loading developed by Bell Labs, Alcatel-Lucent will let mobile operators and content providers push video content to smartphones while taking network capacity and battery life into account.

Jack Loo and Mikael Ricknäs, IDGNS

Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: strategic 100 2010
Whitepapers
  • The F5 DDoS Protection Reference Architecture part 1 of 3
    Distributed denial of service attacks (DDoS) attempt to make a machine or network resource unavailable to its intended users, with a wave of crippling attacks on enterprises since 2012. This whitepaper offers guidance to security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks.
    Learn more »
  • Avoiding Common Pitfalls of Evaluating and Implementing DCIM Solutions
    While many who invest in Data Centre Infrastructure Management (DCIM) software benefit greatly, some do not. Research has revealed a number of pitfalls that end users should avoid when evaluating and implementing DCIM solutions. Choosing an inappropriate solution, relying on inadequate processes, and a lack of commitment / ownership / knowledge can each undermine a chosen toolset’s ability to deliver the value it was designed to provide. This paper describes these common pitfalls and provides practical guidance on how to avoid them.
    Learn more »
  • IBM X-Force Threat Intelligence
    In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Recent comments