<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>telecommunications Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/telecommunications/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/telecommunications/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Thu, 20 Aug 2020 11:41:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>AWS announces AI tools to assist contact center workflows</title>
		<link>https://www.aiuniverse.xyz/aws-announces-ai-tools-to-assist-contact-center-workflows/</link>
					<comments>https://www.aiuniverse.xyz/aws-announces-ai-tools-to-assist-contact-center-workflows/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Thu, 20 Aug 2020 11:41:29 +0000</pubDate>
				<category><![CDATA[Amazon Lex]]></category>
		<category><![CDATA[AI tools]]></category>
		<category><![CDATA[AWS announces]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Laboratories]]></category>
		<category><![CDATA[telecommunications]]></category>
		<category><![CDATA[various aspects]]></category>
		<category><![CDATA[workflows]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=11089</guid>

					<description><![CDATA[<p>Source:-siliconangle Amazon Web Services Inc. today debuted a suite of Contact Center Intelligence services that customers can use to add more intelligence to their contact center operations. <a class="read-more-link" href="https://www.aiuniverse.xyz/aws-announces-ai-tools-to-assist-contact-center-workflows/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/aws-announces-ai-tools-to-assist-contact-center-workflows/">AWS announces AI tools to assist contact center workflows</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source:-siliconangle</p>



<p>Amazon Web Services Inc. today debuted a suite of Contact Center Intelligence services that customers can use to add more intelligence to their contact center operations.</p>



<p>AWS CCI is a combination of services that enables companies to bring machine learning capabilities including text-to-speech, language comprehension, translation, enterprise search, business intelligence and chatbots to their contact centers. These capabilities can be used to help with tasks such as self-service, live-call analytics and agent assist, and post-call analytics, Amazon said.</p>



<p>In a blog post, AWS developer advocate Alejandra Quetzalli said the AWS CCI services are being made available through partners such as Genesys Telecommunications Laboratories, Inc., Vonage Holdings Corp. and UiPath Inc. and integrated with existing enterprise contact center systems.</p>



<p><strong>The services are designed to aid companies in various aspects of their contact center workflows, Quetzalli said.</strong></p>



<p>For example, the Self-Service solution is meant to help companies create chatbots and interactive voice response systems that can handle some of the most common queries contact centers receive, enabling human operators to focus on other tasks. Quetzalli said customers will need to employ this capability with the company’s Amazon Lex service for building chatbots, and Amazon Kendra, an enterprise search service the chatbots can use to find the answers to people’s queries.</p>



<p>“The novelty of this solution is that Lex + Kendra not only fulfills transactional queries (i.e. book a hotel room or reset my password), but also addresses the long tail of customers questions whose answers live in enterprises knowledge systems,” Quetzalli said.</p>



<p>Meanwhile, Live Call Analytics &amp; Agent Assist enables contact center staff to get a better understanding of what a caller is asking for. The service relies on Amazon Transcribe for real-time speech transcription and Amazon Comprehend to analyze conversations to detect caller’s sentiments and any key phrases that might be pertinent. In addition, Live Call Analytics &amp; Agent Assist can tap into Amazon Translate if the caller is unable to speak the operator’s language.</p>



<p>Finally, the Post-Call Analytics tool carries out automatic analysis of call center conversations and provides insights that can be used to improve the service they offer. It also leverages Amazon Transcribe and Amazon Comprehend, as well as Amazon Kendra.</p>
<p>The post <a href="https://www.aiuniverse.xyz/aws-announces-ai-tools-to-assist-contact-center-workflows/">AWS announces AI tools to assist contact center workflows</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/aws-announces-ai-tools-to-assist-contact-center-workflows/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New defense method enables telecoms, ISPs to protect consumer IoT devices</title>
		<link>https://www.aiuniverse.xyz/new-defense-method-enables-telecoms-isps-to-protect-consumer-iot-devices/</link>
					<comments>https://www.aiuniverse.xyz/new-defense-method-enables-telecoms-isps-to-protect-consumer-iot-devices/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Tue, 04 Aug 2020 12:44:34 +0000</pubDate>
				<category><![CDATA[Internet of things]]></category>
		<category><![CDATA[BGU]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[telecommunications]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=10688</guid>

					<description><![CDATA[<p>Source: helpnetsecurity.com Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, Ben-Gurion University of the Negev (BGU) and National <a class="read-more-link" href="https://www.aiuniverse.xyz/new-defense-method-enables-telecoms-isps-to-protect-consumer-iot-devices/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/new-defense-method-enables-telecoms-isps-to-protect-consumer-iot-devices/">New defense method enables telecoms, ISPs to protect consumer IoT devices</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source: helpnetsecurity.com</p>



<p>Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, Ben-Gurion University of the Negev (BGU) and National University of Singapore (NUS) researchers have developed a new method that enables telecommunications and internet service providers to monitor these devices.</p>



<p>According to their new study, the ability to launch massive DDoS attacks via a botnet of compromised devices is an exponentially growing risk in the Internet of Things (IoT). Such attacks, possibly emerging from IoT devices in home networks, impact the attack target, as well as the infrastructure of telcos.</p>



<p>“Most home users don’t have the awareness, knowledge, or means to prevent or handle ongoing attacks,” says Yair Meidan, a Ph.D. candidate at BGU. “As a result, the burden falls on the telcos to handle. Our method addresses a challenging real-world problem that has already caused challenging attacks in Germany and Singapore, and poses a risk to telco infrastructure and their customers worldwide.”</p>



<p>Each connected device has a unique IP address. However, home networks typically use gateway routers with NAT functionality, which replaces the local source IP address of each outbound data packet with the household router’s public IP address. Consequently, detecting connected IoT devices from outside the home network is a challenging task.</p>



<p>The researchers developed a method to detect connected, vulnerable IoT models before they are compromised by monitoring the data traffic from each smart home device. This enables telcos to verify whether specific IoT models, known to be vulnerable to exploitation by malware for cyberattacks are connected to the home network. It helps telcos identify potential threats to their networks and take preventive actions quickly.</p>



<p>By using the proposed method, a telco can detect vulnerable IoT devices connected behind a NAT, and use this information to take action. In the case of a potential DDoS attack, this method would enable the telco to take steps to spare the company and its customers harm in advance, such as offloading the large volume of traffic generated by an abundance of infected domestic IoT devices. In turn, this could prevent the combined traffic surge from hitting the telco’s infrastructure, reduce the likelihood of service disruption, and ensure continued service availability.</p>



<p>“Unlike some past studies that evaluated their methods using partial, questionable, or completely unlabeled datasets, or just one type of device, our data is versatile and explicitly labeled with the device model,” Meidan says. “We are sharing our experimental data with the scientific community as a novel benchmark to promote future reproducible research in this domain.” This dataset is available here.</p>



<p>This research is a first step toward dramatically mitigating the risk posed to telcos’ infrastructure by domestic NAT IoT devices. In the future, the researchers seek to further validate the scalability of the method, using additional IoT devices that represent an even broader range of IoT models, types and manufacturers.</p>



<p>“Although our method is designed to detect vulnerable IoT devices before they are exploited, we plan to evaluate the resilience of our method to adversarial attacks in future research,” Meidan says. “Similarly, a spoofing attack, in which an infected device performs many dummy requests to IP addresses and ports that are different from the default ones, could result in missed detection.”</p>
<p>The post <a href="https://www.aiuniverse.xyz/new-defense-method-enables-telecoms-isps-to-protect-consumer-iot-devices/">New defense method enables telecoms, ISPs to protect consumer IoT devices</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/new-defense-method-enables-telecoms-isps-to-protect-consumer-iot-devices/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
