Click here to close now.

SYS-CON MEDIA Authors: Pat Romanski, William Schmarzo, Elizabeth White, Carmen Gonzalez, JP Morgenthal

News Feed Item

Carrier iQ Announces Breakthrough Machine-Learning Algorithms for Next-Generation Customer Care

New iQ Care Technologies Automatically Identify, Diagnose and Solve Battery and Data Drain Issues on Mobile Devices

BARCELONA, Spain, Feb. 24, 2014 /PRNewswire/ -- MOBILE WORLD CONGRESS -- Carrier iQ, a pioneer in mobile intelligence, today announced new machine learning algorithms designed to enable the future of customer care. These new technologies are part of the most recent release of Carrier iQ's iQ Care solution, a suite of analytics and applications designed to help Mobile Network Operators (MNOs) reduce customer care costs, increase subscriber satisfaction, and reduce churn.

(Logo: http://photos.prnewswire.com/prnh/20140224/NY69917LOGO )

Typical customer care solutions too often rely on individual technical skills of customer service representatives (CSRs) to diagnose customer experience issues.  iQ Care shifts this paradigm by automatically detecting the existence of customer experience issues and diagnosing the root cause. Using machine-learning algorithms, iQ Care automatically diagnoses customer experience issues, such as short battery life, high data usage and poor voice quality, and communicates the results using explicit, precise and actionable alert messages to CSRs, dramatically cutting down the time to resolution of customer issues.

iQ Care Introduces Two Ground-breaking Features:

  • Find Resource-Hungry Applications: It is easy to identify applications that consume resources because of long usage duration. It is difficult to isolate applications that have high rate of resource consumption, even if users do not use them often. Using advanced inferencing algorithms to examine applications from millions of devices, iQ Care is able to find the poor-performing applications that drain a disproportionally high amount of battery, CPU, or data.  When they receive alert messages from iQ Care, CSRs can advise consumers about such applications.
  • Prevent Unnecessary Device Returns: Many customer issues such as short battery life or poor voice quality have multiple possible causes, often difficult to diagnose. Using advanced algorithms from our big data platform, iQ Care is able to examine symptoms from millions of devices to determine the actual causes, such as whether each issue is device-related or network-related. Armed with these powerful insights, CSRs can narrow the scope of their investigation and avoid accepting device returns for issues caused by the network.

"iQ Care revolutionizes customer care for mobile subscribers, with capabilities that were never thought possible. In addition to revolutionizing customer care, Carrier iQ's patented technologies pave the path for proactive care and, ultimately, for self-care. They are the expression of our technology and thought leadership in advanced big data mobile analytics, that leverage the insights gained from millions of subscriber devices," said Bruce Lacey, VP Engineering, Carrier iQ.

Schedule a demonstration of iQ Care at Mobile World Congress in Barcelona, Spain from February 24-27 at the Carrier iQ stand in Hall 1, Booth C36.

About iQ Care
iQ Care is a suite of analytics and applications that delivers individual user experience knowledge to customer care agents of mobile operators and device vendors.  Scaling up to 50 million reporting devices per installation, iQ Care is delivered as Software-as-a-Service, allowing rapid deployment with minimal integration requirements.

About Carrier iQ
Carrier iQ, founded in 2005, is a privately held mobile software company headquartered in Sunnyvale, CA. As the market leader in mobile intelligence, Carrier iQ provides mobile operators and device vendors with actionable analytics and insights into the real experience their customers face when using smartphones, tablets, or other mobile devices. Carrier iQ's big data platform offers proven scalability, with over 12 petabytes of data processed each month and more than  200 million mobile devices deployed to date. Backed by committed investors, the Carrier iQ team serves Tier-1 mobile network operators and device vendors from its offices in Sunnyvale, Boston, London and Kuala Lumpur. A network of global and regional partners extends the Carrier iQ reach to all markets.

© Carrier iQ 2014

SOURCE Carrier iQ

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
There is no question that the cloud is where businesses want to host data. Until recently hypervisor virtualization was the most widely used method in cloud computing. Recently virtual containers have been gaining in popularity, and for good reason. In the debate between virtual machines and containers, the latter have been seen as the new kid on the block – and like other emerging technology have had some initial shortcomings. However, the container space has evolved drastically since coming on...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential. The DevOps Summit at Cloud Expo – to be held June 3-5, 2015, at the Javits Center in New York City – will expand the DevOps community, enable a wide...
The web app is Agile. The REST API is Agile. The testing and planning are Agile. But alas, Data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes which force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software orga...
The world is at a tipping point where the technology, the device and global adoption are converging to such a point that we will see an explosion of a world where smartphone devices not only allow us to talk to each other, but allow for communication between everything – serving as a central hub from which we control our world – MediaTek is at the heart of both driving this and allowing the markets to drive this reality forward themselves. The next wave of consumer gadgets is here – smart, con...
Cloud Expo, Inc. has announced today that Andi Mann returns to DevOps Summit 2015 as Conference Chair. The 4th International DevOps Summit will take place on June 9-11, 2015, at the Javits Center in New York City. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great team at ...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
CA Technologies has announced it has signed a definitive agreement to acquire Rally Software Development Corp. for $19.50 per share, which equates to approximately $480 million, net of cash acquired. The transaction has been unanimously approved by both Boards of Directors, and is expected to close in the second quarter of CA’s fiscal 2016. Based in Boulder, CO, Rally has approximately 500 employees across four continents and FY 2015 sales of $88 million. “Software applications are changing the...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
Enterprises are fast realizing the importance of integrating SaaS/Cloud applications, API and on-premises data and processes, to unleash hidden value. This webinar explores how managers can use a Microservice-centric approach to aggressively tackle the unexpected new integration challenges posed by proliferation of cloud, mobile, social and big data projects. Industry analyst and SOA expert Jason Bloomberg will strip away the hype from microservices, and clearly identify their advantages and d...
The OpenStack cloud operating system includes Trove, a database abstraction layer. Rather than applications connecting directly to a specific type of database, they connect to Trove, which in turn connects to one or more specific databases. One target database is Postgres Plus Cloud Database, which includes its own RESTful API. Trove was originally developed around MySQL, whose interfaces are significantly less complicated than those of the Postgres cloud database. In his session at 16th Cloud...
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enter...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...