Abstract:
A service robot may be autonomous, with respect to a portion of a customer service task, and coordinated, with respect to another portion of a customer service task. A resource, such as another robot or an agent (human or automated), may monitor or interact with the robot and, in such a combination, perform a customer service task. The robot may be instructed to pause or delay initiation of a robot portion to allow for a resource to become available at a common time that the interaction portion is to be performed to minimize delay and promote better customer service. Should the delay be beyond an acceptable threshold, the robot may engage in a delay task (e.g., slow down, pause, etc.). The delay task may include a social interaction with a human at a service location.
Abstract:
A service robot may be autonomous, with respect to a portion of a customer service task, and coordinated, with respect to another portion of a customer service task. A resource, such as another robot or an agent (human or automated), may monitor or interact with the robot and, in such a combination, perform a customer service task. The robot may be instructed to pause or delay initiation of a robot portion to allow for a resource to become available at a common time that the interaction portion is to be performed to minimize delay and promote better customer service. Should the delay be beyond an acceptable threshold, the robot may engage in a delay task (e.g., slow down, pause, etc.). The delay task may include a social interaction with a human at a service location.
Abstract:
Embodiments are directed to using a three-dimensional sound space to analyze security surveillance information. According to one embodiment, the three-dimensional sound space can comprise part of a security surveillance system in which sound sources related to security surveillance information can be presented and a user can efficiently navigate even a large number of sound sources in the three-dimensional sound space. Effective audio surveillance relies on the ability of the surveillance personnel to efficiently identify calls that need further analysis and calls that need no further analysis without introducing too many false negative or false positive conditions. Utilization of three-dimensional space described herein can increase the ease with which security analysts review audio content and identify relevant audio content that requires further analysis.
Abstract:
A service robot is provided to communicate with other devices of a service location, such as another robot. A first and second robot may be tasked with performing a customer service task requiring a physical interaction. The first robot may determine that the second robot lacks instructions to perform the customer service task. Upon making the determination, the first robot retrieves physical interaction instructions and causes the second robot to load and execute the physical interaction instructions. The second robot is then transformed, by the first robot, into a configured robot able to perform the customer service task.
Abstract:
Media files are often tagged, such as by XML or other tagging paradigms, in order to indicate aspects of certain portions of the media file. Disclosed herein, security policy tagging is provided that supports a logically nested or hierarchical structure. Tags may be time- and/or event-altered, such as when a user who is denied access at one point in time may be granted access at a later point in time. The need to amend the security policy based upon the passage of time is reduced or eliminated as portions, or sub-portions, of a media file that may be selectively tagged with security tags may be presented or downloaded based upon the security policy. The a security policy may incorporate rules that change permissions upon the passage of time or the occurrence of an event, without requiring the modification of the presentation, the security tags of the presentation portion, or the security tag associated with a parent portion of the presentation or the presentation itself.
Abstract:
Associating callers of a contact center with their social media identity may provide mutual benefits to the caller and contact center. For example, a business operating a contact center can receive information about their current and potential customers and customers can receive additional information, incentives, or other perks by allowing access to their social media profile. When a caller initially calls a contact center, they are prompted, and possibly incentivized, to provide a social media identity. The social media identity may or may not have an affinity with an organization on the social media website. If not, the caller is provided with the opportunity to establish the affinity. If the caller does establish the affinity, the call may be identified as having a positive sentiment or negative sentiment if the caller does not do so. The call, or future calls, with the caller may then be processed accordingly.
Abstract:
A dialog aggregator provided by a contact center communication system for text-based interaction chains is described along with various methods and mechanisms for administering the same. The dialog aggregator produces a summary, in real-time, of questions posed and existing answers in the interaction chain while identifying outstanding questions that have not been answered for display to an agent. The display includes any current answer the agent is working on as well as completed items and additionally executes rules based on the status of the remaining questions. The display in canonical form of the summary and outstanding question set enables a contact center agent or other observer of the interaction to quickly and efficiently assess the interaction history.
Abstract:
A social media network is monitored for postings of a control group. The control group is a group of one or more individuals that posts on a particular topic. The postings of the control group may cover all the postings of each member of the control group for a period of time. A first relative social media score is calculated for the postings of the control group on the social media network. A social media score is calculated for a social media posting of a user or entity on the social media network. The relative social media score for the control group is compared to the social media score for the user or entity to see if there is a significant difference. If there is a significant difference, an agent in a contact center to is identified respond to the social media posting of the user or entity.
Abstract:
Conferences comprise a number of listening, viewing, and/or speaking participants. A conference participant may ask a question or make a statement that can be answered or verified against an authoritative source. A reference validity checker is provided to receive the conference content, recorded or in real-time, determine that a question or statement was made that can be answered or verified, query a knowledgebase, and present indicia of the response. The indicia may be an indicator (e.g., true/false, verified, etc.) and/or a link to a source, such as a particular entry in a knowledgebase. The knowledgebase may be selected from internal sources or external sources depending on factors, such as the type of question/statement or topic associated therewith. The indicia may annotate a transcript or recording of the conference so that a subsequent review may have the ability to locate the source of the answer/response as desired.
Abstract:
An event associated with a communication session between a first party and a second party is detected. The event is related to the communication session. For example, the event may be a phrase spoken in the communication session or a presentation of a call progression screen to a contact center agent. At this point, the communication session is analyzed for a period of non-communication that meets a defined threshold during a monitoring period associated with the event. If a period of non-communication is detected that is longer than the threshold during the monitoring period, the period of non-communication is flagged. The flagged period of non-communication can then be used to evaluate how a contact center agent is performing.