Author archive: Ibrahim Sajid Malick

Articles
Amazon-Google Feud
December 6, 2017
0
,
Are you following Google-Amazon feud? Google has decided to remove YouTube from all Fire TV products and the Echo Show apparently after Amazon’s decided to delist new Nest products. Amazon claims that “Google is setting a disappointing precedent by selectively blocking customer access to an open website.” Amazon has also refused to sell Google products […]
Articles Featured
Privacy: Can WiFi data be anonymous?
October 19, 2017
0
, ,
While in the past, mobility traces were only available to mobile phone carriers, the advent of smartphones and other means of data collection has made these broadly available. Last year Transport for London (TfL) launched trial to gather “de-personalised WiFi connection data collected at 54 London Underground stations within Zones 1-4 to help improve the […]
Articles Featured
KRACK Attack: Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
October 17, 2017
0
, , , ,
We are all exposed to the Krack Wi-Fi security vulnerability—a flaw that puts any person using wireless internet at risk of being hacked. The Krack security exploit was discovered by Mathy Vanhoef, a cybersecurity expert at Belgian university KU Leuven, who will present his research at the Computer and Communications Security (CCS) conference later this […]
Articles Featured
Priceless Product Placement of FireEye Cyber Threat Map
September 30, 2017
0
, , , , , ,
It appears Department of Homeland Security has put it's trust on FireEye (NASDAQ: FEYE), the intelligence-led security company. VICE feature on Cybersecurity gave us a glimpse of DHS control room. Of course, I spotted the security product and an oraganic product promotion.
Articles Featured
Artificial Intelligence is Slowly Transforming Contact Centers
March 14, 2017
0
, , , ,
An intelligent network, however, has the power to pick up on the tonal differences and speech pattern changes that indicate a heightened emotional state. The system then notifies the contact center agent about the client's emotional status to enable a positive result to an interaction that may have otherwise taken a negative path.
Articles Featured
Cisco CUIC for Actionable Insights Into Contact Center Operations
January 16, 2017
0
, , , , , , , ,
Business-centric analysis of contact center data increases insight into the customer experience. Detailed reporting of application performance should include call data, agent performance, SLAs and more. Stakeholders should have everything they need to optimize efficiency and performance, real-time metrics, reporting and call monitoring.