Empirix IntelliSight and E-XMS Fully Compatible with Huawei’s FusionSphere Network Functions Virtualization (NFV) Infrastructure. Empirix is thrilled to share the news about our IntelliSight and E-XMS technologies being certified for integration with Huawei’s NFV environment. The certification involved extensive interoperability testing for functions including data acquisition, mediation, advanced troubleshooting, real-time monitoring and data analytics, and […]
Service providers are demanding more from their customer experience and service assurance solutions because they have a keen awareness of the richness and value of the information that flows across their networks. Reliably and accurately extracted, this information can be used to help manage not just the network, but also the services offered and the devices deployed. Insights can be also be gained around the performance of providers’ vendors and—most significantly—the experiences and value of their customers.
Designed for use by a service provider to manage the performance of all mobile devices on its network—2G, 3G or 4G—the solution generated interest from not only service providers, but also from network equipment vendors who are in the process of investigating not only the next generation in network technology but, more significantly, user or application devices capable of hosting next-generation services.
2013 has been a year of ginormous communications changes, from the mind-blowing growth of smartphone usage to the game-changing addition of WebRTC. Organizations have been increasingly focusing on improving customer service, recognizing that while voice is still king, customers need to know that they can reach companies in other ways too, like through social media or video chat or instant messaging. Big data has made it possible to begin anticipating issues and improving and personalizing communications.
Since the introduction of VoIP, the service or underlying technology (based on the SIP protocol) has been susceptible to multiple fraud scenarios. In particular, by exploiting some of the features of VoIP, such as three way call and call transfer, hackers can inject call signals into the network and effectively hijack calls. The result is significant non-billable revenue for the Service Provider. Since commands associated with VoIP technology are often sent un-encrypted and without authorization for each command, this is an easy technique to carry out.
“Key Performance Indicators” (KPIs) is a term commonly heard within the Service Assurance domain. KPIs are used by most Service Providers use to align their internal departmental goals and metrics with the experience delivered to their customers or subscriber base. That said, there is much debate as to how effective KPIs are, even those that are […]
For both fixed and mobile service providers, maximizing the effective use of network capacity is becoming key to increasing revenues and assuring the quality of experience for customers.
As soon as Buffer realized it had been hacked, the company sent out an apology and informational email. The company also responded quickly to emails, social media posts, and comments on its blog. There was no hiding or keeping silent. This earned the organization huge kudos in the eyes of its customers.
Today’s communications environments are very complex. If you’re not monitoring your systems on a consistent and constant basis, you will undoubtedly run into trouble. At the same time, a comprehensive solution has to have a variety of functionalities in order to successfully monitor this type of environment.
LTE Direct is a device-to-device platform that enables true “continuous” proximity based discovery. LTE Direct is a synchronous system operating in licensed spectrum under the control of the Mobile Service Provider, where devices monitor for service layer announcements (also known as expressions). The synchronous nature of the system allows devices to stay on for an extremely short duration to announce and monitor these announcements. This results in minimal battery drains enabling truly autonomous location discovery.