Abstract:
A method, apparatus and computer program product in which a computer system functions as a mesh point (MP) and provides scheduled service periods in wireless mesh networks is presented. The MP enters a light sleep mode. The MP determines peers of itself and determines beacons for the peers of itself. The MP then enters an Awake state for the beacons of its peers.
Abstract:
A system for selecting an agent during initial routing based on all the media capabilities associated with a customer and their current device. The system includes a data mining module to mine one or more media capabilities on a device of a customer. The system further includes a customer profile module to build a customer profile based on the one or more mined media capabilities on the device. The system further includes a mapping module to map the customer profile with an agent profile. The system further includes a selection module to select an agent for the customer based on the mapping.
Abstract:
A mechanism for avoidance of one or more resources for work assignment based on nodes and relationships within an attribute tree of a graph based contact center is described along with various methods and mechanisms for administering the same. Avoidance methods are disclosed that allow an administrator to set up a graph database operable to automatically block work assignment to certain resources based on set rules and conditions. The graph database is additionally designed as a learning system that can adapt and respond to changing rules and conditions over time, including historically successful and unsuccessful interactions, attribute changes for customers and agents, and changes in desired results. Agent matching and customer satisfaction are improved with the avoidance of inappropriate or undesirable resources.
Abstract:
The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.
Abstract:
A method and system for determining occupancy of an agent in a multimodal contact center are provided. The method includes monitoring, by a processor, a plurality of multimodal contacts simultaneously handled by an agent. For each contact of the plurality of multimodal contacts, a media capability of a contact may be determined and one or more parameters based on the media capability and the agent may be determined. A multimodal occupancy score for the agent based on the one or more parameters for each of the plurality of multimodal contacts.
Abstract:
Contact centers often record customer-agent communications for training, quality control, and other purposes. Supervisors often contribute to the communications in the form of voice messages only the agent can hear (e.g., whisper mode) and/or text messages displayed on a screen and optionally documents or other content that may be provided or shared by the supervisor to the agent. Capturing the supervisor's contribution to a communication is provided to enable later playback or review of the communication to include all inputs and enable a more complete understanding of the actions that were or were not taken.
Abstract:
Methods and systems for presenting information regarding multiple categories of content are provided. In addition, methods and systems that suggest activities by a user in relation to content and determined affinity for content in relation to user contacts are provided. A user interface application is provided that operates to display status and/or historical information regarding content, suggested activities, and suggested contacts. The user can interact with the interface to access detailed information and to act on suggestions. In addition the user can interact with the interface to share content to other users, including users participating in real time communication sessions.
Abstract:
Embodiments disclosed herein provide systems and methods for a scalable videoconference system. In a particular embodiment, a method provides receiving a video stream from a party on a videoconference over a communication network. The method further provides transferring the video stream to a processing device of a plurality of processing devices located on one of a plurality of processing boards operatively coupled to each of one or more server processors. The method further provides processing the video stream to generate a processed video stream and transferring the processed video stream for distribution to other parties on the videoconference.
Abstract:
Systems, methods, and computer-readable storage media for predicting escalation risks in customer support contexts. A system implementing the example method can identify instances of customer escalation from a corpus of customer support sales, customer support, and product software development data, and determine, for the instances of customer escalation, sets of trigger conditions that were at least partially responsible for respective instances of customer escalation. Then the system can classify each of the instances of customer escalation by problem type based on the set of trigger conditions to yield classifications, and add the classifications, the sets of trigger conditions, and the instances of customer escalation to a database. Then the system can compare the database to support data to identify customers or support tasks that are likely to be escalated, and the system or a user can allocate additional support resources to proactively prevent escalations.