Empirix Introduces Conference Bridge Monitoring Solution
July 25, 2014
Share this

Empirix introduced a conference bridge monitoring application that ensures top voice performance and bridge reliability by duplicating customers' experiences during conference calls then using them as the key measurement of quality.

The Conference Bridge Monitoring Solution's voice-based conference quality management model is a significant departure from conventional conference bridge monitoring. Where standard tools monitor network data feeds for packet loss, jitter, etc., the Empirix solution approaches monitoring from the user's perspective. It tests exactly what the user is hearing during conference calls by evaluating voice clips as they play through conference bridges.

"Ensuring trouble-free conferences requires a level of visibility that conventional monitoring solutions can't provide," said Empirix CEO John D'Anna. "Do the access numbers work? Are conferences bleeding together? Do callers drop off? Packet flows don't provide that kind of insight, which is why we designed a new monitoring method that uses the customer experience as the baseline. Companies conduct billions of dollars of business over conference bridges. Our Conference Bridge Monitoring Solution provides the quality and reliability assurances they expect for such an important business tool."

The Conference Bridge Monitoring Solution verifies conference server availability, performance, uptime and participants' voice quality. It performs three essential quality and reliability management functions that enable conference bridge service providers to create consistently positive customer experiences. They are:

- Alarming and notification for bridge application and voice quality issues during conference calls;

- Real-time reporting for critical Key Performance Indicators (KPIs) that provide business intelligence; and

- Decreased mean time to recognize problems and ensuring that collaboration tools are performing as expected.

The heart of the Conference Bridge Monitoring Solution's capabilities is its voice-based testing model. The solution automatically sets up conference bridges of up to eight participants, dials into the conference, and plays audio clips. The solution captures the audio on the other side of the bridge and evaluates it for degradation using the industry-standard PESQ (Perceptual Evaluation of Speech Quality) algorithm. Dashboard alarms alert network management staff to irregularities with a KPI that may signal a quality problem.

The Conference Bridge Monitoring Solution provides out-of-the-box functionality for monitoring the most important conference call KPIs with minimal customization. The KPIs include:

- Call pass\fail and length;

- Hung call metrics;

- Time-to-connect to conference;

- Interactive voice response menu and system response times; and

- Participant voice latency and delay.

The solution provides network operations staff with active, real-time performance alerts and passive monitoring of network data. This combination enables staff to respond to performance issues immediately and remediate their root causes. Using data collected through network probes, the Conference Bridge Monitoring Solution provides a logical drill down that helps network operators pinpoint if a specific phone number, carrier, location, or conference bridge server is having a problem.

The Conference Bridge Monitoring Solution can work as a stand-alone solution or integrate with existing network management infrastructures. It is available immediately.

Share this

The Latest

October 21, 2019

An effective breakpoint strategy helps deliver sharp, properly sized images, which are some of the most compelling pieces of content on a web page. Lack of such a strategy can lead to jagged images or ones that take too long to render due to excessive size, potentially reducing the overall effectiveness of web pages — and driving down the quality of the user experience. In this blog, we will explore just how significant image breakpoints are to businesses, and some important device-related factors to consider in image breakpoint decisions to deliver the optimally-sized web image every time ...

October 17, 2019

As the data generated by organizations grows, APM tools are now required to do a lot more than basic monitoring of metrics. Modern data is often raw and unstructured and requires more advanced methods of analysis. The tools must help dig deep into this data for both forensic analysis and predictive analysis. To extract more accurate and cheaper insights, modern APM tools use Big Data techniques to store, access, and analyze the multi-dimensional data ...

October 16, 2019

Modern enterprises are generating data at an unprecedented rate but aren't taking advantage of all the data available to them in order to drive real-time, actionable insights. According to a recent study commissioned by Actian, more than half of enterprises today are unable to efficiently manage nor effectively use data to drive decision-making ...

October 15, 2019

According to a study by Forrester Research, an enhanced UX design can increase the conversion rate by 400%. If UX has become the ultimate arbiter in determining the success or failure of a product or service, let us first understand what UX is all about ...

October 10, 2019

The requirements of an APM tool are now much more complex than they've ever been. Not only do they need to trace a user transaction across numerous microservices on the same system, but they also need to happen pretty fast ...

October 09, 2019

Performance monitoring is an old problem. As technology has advanced, we've had to evolve how we monitor applications. Initially, performance monitoring largely involved sending ICMP messages to start troubleshooting a down or slow application. Applications have gotten much more complex, so this is no longer enough. Now we need to know not just whether an application is broken, but why it broke. So APM has had to evolve over the years for us to get there. But how did this evolution take place, and what happens next? Let's find out ...

October 08, 2019

There are some IT organizations that are using DevOps methodology but are wary of getting bogged down in ITSM procedures. But without at least some ITSM controls in place, organizations lose their focus on systematic customer engagement, making it harder for them to scale ...

October 07, 2019
OK, I admit it. "Service modeling" is an awkward term, especially when you're trying to frame three rather controversial acronyms in the same overall place: CMDB, CMS and DDM. Nevertheless, that's exactly what we did in EMA's most recent research: <span style="font-style: italic;">Service Modeling in the Age of Cloud and Containers</span>. The goal was to establish a more holistic context for looking at the synergies and differences across all these areas ...
October 03, 2019

If you have deployed a Java application in production, you've probably encountered a situation where the application suddenly starts to take up a large amount of CPU. When this happens, application response becomes sluggish and users begin to complain about slow response. Often the solution to this problem is to restart the application and, lo and behold, the problem goes away — only to reappear a few days later. A key question then is: how to troubleshoot high CPU usage of a Java application? ...

October 02, 2019

Operations are no longer tethered tightly to a main office, as the headquarters-centric model has been retired in favor of a more decentralized enterprise structure. Rather than focus the business around a single location, enterprises are now comprised of a web of remote offices and individuals, where network connectivity has broken down the geographic barriers that in the past limited the availability of talent and resources. Key to the success of the decentralized enterprise model is a new generation of collaboration and communication tools ...