Abstract:
Application of enterprise policies to Web Real-Time Communications (WebRTC) interactive sessions using an enterprise Session Initiation Protocol (SIP) engine, and related methods, systems, and computer-readable media are disclosed. In one embodiment, a method comprises receiving, by session token converter of enterprise device, an incoming WebRTC session description token. The method comprises generating, by session token converter, outgoing SIP request message. The method comprises sending, by session token converter, outgoing SIP request message to enterprise SIP engine and applying, by enterprise SIP engine, enterprise policies based on outgoing SIP request message. The method comprises, responsive to applying enterprise policies, sending incoming SIP request message to enterprise device. The method comprises converting, by session token converter, incoming SIP request message into outgoing WebRTC session description token, and sending outgoing WebRTC session description token to a target device.
Abstract:
An agent assisting system for providing assistance to agents of contact center during calls is provided. The agent assisting system includes a monitoring module configured to monitor parameters of a call coming to the contact center. The agent assisting system further includes a sentiment detector module configured to detect sentiments of a user during the call. The agent assisting system further includes a pattern matching module configured to determine a script for an agent handling the call, based on the parameters of the call and the sentiments of the user during the call, wherein the script providing instructions to the agent to improve handling of the call. The agent assisting system further includes a script publishing module configured to publish the script to the agent handling the call.
Abstract:
In order to provide a survey that reflects details of a communication session between two parties, content of an established communication session between the parties is monitored. One or more topics in the content of the communication session are identified. For example, a voice communication between a customer and a call center agent can be monitored to identify a specific topic, such as a discussion about car insurance. Based on the identified topic, a survey is generated by incorporating the topic into the survey. For example, the survey can include a question regarding the customer's car insurance of his four wheel drive SUV, which was discussed during the call. The survey is then presented to or sent to a party of the communication session.
Abstract:
Customer assistance is provided by leveraging certain contact center infrastructure components to a retail setting. Often contact centers have a wealth of information regarding individual products and services a retail setting may offer. The information, as provided herein, may then be delivered to the customer in the form of a dialogue. The dialogue may be based, in part, on a contact center dialogue for the same or similar item. The customer may then be instructed to perform an act, such as retrieving another item at a certain location. Unlike a contact center, the physical presence of the customer provides an opportunity to receive feedback in the form of monitor the customer's actions to determine if the customer complied with instructions. Optionally, a follow up activity may be imitated based on the customer's compliance.
Abstract:
A microprocessor executable resource monitor operable to determine that a less skilled and/or qualified resource has been assigned to service a work item or is servicing the work item, wherein a more skilled and/or qualified resource exists but is not currently available to service the work item, monitor at least one of a level of service provided by the less qualified resource to the work item and/or a customer associated with the work item and an availability of the more skilled and/or qualified resource to service the work item, and, in response to the monitoring step and while the work item is being serviced, transfer the work item to the more skilled and/or qualified resource for servicing.
Abstract:
A server executing a social media identity and discovery application and method are provided that scan social networking sites for communications. The target content is found with content indicators when communications are put on a social networking site. The content is recorded and evaluated. If the identified content is contextually significant, the alias and the user account data and/or user data from public records are correlated based on keywords and/or events, and a notification of the correlation is sent to an agency, agent, or a contact center system. The agent or agency may verify that the identity of a poster has been accurately correlated with a customer record in the database or with user data from public records. The agent, the agency, or the system has the opportunity to respond to the communication, despite the anonymity of the poster on the social networking site.
Abstract:
System and method to detect misconfiguration in a contact center, the method including: assigning, by a processor coupled to a memory, a workstation IP address to an agent workstation in the contact center; receiving a workstation login request from an agent; associating the workstation IP address to the agent; receiving an application program login request from an agent; extracting a source IP address for the application program login request; comparing the workstation IP address to the source IP address for the application program login request; and allowing agent access if the workstation IP address matches the source IP address for the application program login request.
Abstract:
A method, system and computer readable medium for advertising and interoperating Layer 2 VPN services from an access node to a core network. The method can include executing, using one or more processors, a routing protocol on an access node to establish adjacency with a core network node in an access mode. The method can also include mapping, using the one or more processors, an access network Layer 2 service identifier to a core network service identifier. The method can further include advertising, using the one or more processors, a mapping for the L2VPN service to the core network node. The method can also include sending, using the one or more processors, network traffic from the access node to the core network node without core network encapsulation.
Abstract:
A network management and monitoring application employs diagnostic messages for confirming network path connectivity and identifying and locating connectivity faults. Diagnostic messages similar to conventional “ping” and “traceroute” messages traverse the network along a prescribed path for which diagnostic feedback is desired. The application receives and analyzes return messages sent from network entities along the path to ascertain connectivity issues on the path. The application receives layer 3 identifiers such as IP addresses, however performs diagnostic operations such as continuity checks based on layer 2 identifiers such as MAC (Media Access Control) identifiers because certain network entities operate on L2 identifiers and would otherwise evade a continuity check based on layer 3 identifiers. The monitoring application therefore performs continuity diagnostics such as ping and traceroute operations using L2 identifiers, therefore pinpointing problems with an L2 network forwarding entity such as a bridge that lies between L3 entities such as routers.
Abstract:
A conferencing system is disclosed in which a participant to a conference call can program the embodiment to listen for one or more “keywords” in the conference call. The keywords might be a participant's name or words associated with him or her or words associated with his or her area of knowledge. The embodiments uses speech recognition technology to listen for those words. When the embodiments detects that those words have been spoken, the embodiment alerts the participant—using audible, visual, and/or tactile signals—that the participant's attention to the call is warranted. When the keywords are chosen wisely, the benefit can be great.