Empirix Business Assurance Platform is Now Certified for Huawei’s FusionSphere Cloud Operating System

Posted on
Cloud Computing

Empirix IntelliSight and E-XMS Fully Compatible with Huawei’s FusionSphere Network Functions Virtualization (NFV) Infrastructure. Empirix is thrilled to share the news about our IntelliSight and E-XMS technologies being certified for integration with Huawei’s NFV environment. The certification involved extensive interoperability testing for functions including data acquisition, mediation, advanced troubleshooting, real-time monitoring and data analytics, and […]

Top 5 Communications Trends of 2013

Posted on
Communication Trends

2013 has been a year of ginormous communications changes, from the mind-blowing growth of smartphone usage to the game-changing addition of WebRTC. Organizations have been increasingly focusing on improving customer service, recognizing that while voice is still king, customers need to know that they can reach companies in other ways too, like through social media or video chat or […]

Fraud Within a VoIP Environment

Posted on
Hacker

Since the introduction of VoIP, the service or underlying technology (based on the SIP protocol) has been susceptible to multiple fraud scenarios. In particular, by exploiting some of the features of VoIP, such as three way call and call transfer, hackers can inject call signals into the network and effectively hijack calls. The result is significant […]

KPI Conformance, not Performance

Posted on
KPI Conformance

“Key Performance Indicators” (KPIs) is a term commonly heard within the Service Assurance domain. KPIs are used by most Service Providers use to align their internal departmental goals and metrics with the experience delivered to their customers or subscriber base. That said, there is much debate as to how effective KPIs are, even those that are […]

Understanding Network Characterization: The Clear Benefits

Posted on
Understanding Network Characterization

For both fixed and mobile service providers, maximizing the effective use of network capacity is becoming key to increasing revenues and assuring the quality of experience for customers. Driving bandwidth consumption are services such as Voice over IP (VoIP or Internet telephony), video on demand (VoD), and the more conventional data services such an internet […]

3 Contact Center Lessons Learned from the Buffer Hack

Posted on
Lesson Learned

Over the weekend, Buffer, a company that lets you automate your social media sharing process, was hacked. However, the company handled it like a champ, sending out emails and putting up blog post updates that provided information on a regular basis. Here are three lessons I took away from this incident. #1 Immediately Acknowledge There’s […]

3 Key Points About Big Data Analytics

Posted on
Darts

Last week the WNCG (Wireless Networking Communications Group) of the University of Texas hosted its annual Wireless Summit, aka Texas Wireless Summit. This year’s focus was “Disrupting Wireless through Big Data Analytics.” The academic discussion is something the wizards at Empirix are experts on, so we were excited to be sponsoring the event. Read: Dear […]

Introducing LTE Direct

Posted on
Introduction

The rise of mobile apps has exploded over the last few years. Autonomous, proximity-based applications now represent the latest trend in the mobile app space. Although there is much excitement around proximity-based applications, they have seen limited mainstream adoption. Why is this so? Well, there are a number of reasons. The Challenges of Proximity-based Applications Many […]

Take a Closer Look: What is Network Function Virtualization

Posted on
Closer Look at Network Function Virtualization

Network Function Virtualization (NFV) is top of mind for many companies these days, because of the potential savings it can produce. But what exactly is NFV? And how does it produce these cost-saving benefits? Network Function Virtualization NFV is the migration of software from hardware to a hypervisor (aka, virtual machine). Such software could include […]