摘要:
In one embodiment, a Media Analysis and Delivery System obtains a set of media delivery rules, wherein the set of media delivery rules includes one or more triggers, each of the triggers identifying a topic of interest. The Media Analysis and Delivery System examines a media stream for at least one of the one or more triggers in accordance with the set of media delivery rules. The Media Analysis and Delivery System provides at least a portion of the media stream in response to at least one of the triggers in accordance with at least one of the set of media delivery rules.
摘要:
A method for recording automatic call distributor calls includes receiving from a caller a call for distribution to one of a plurality of agents and distributing the call to a first agent of the plurality of agents for handling. The method includes creating a call signature associated with the call for recording verification and recording communications of the call to a recording file. The method also includes embedding the call signature in the recording file.
摘要:
A method for recording automatic call distributor calls includes receiving from a caller a call for distribution to one of a plurality of agents and distributing the call to a first agent of the plurality of agents for handling. The method includes creating a call signature associated with the call for recording verification and recording communications of the call to a recording file. The method also includes embedding the call signature in the recording file.
摘要:
A system and method for protecting confidential user information employed in an electronic transaction. The system and method provide for associating an expiration time/time period, use or other use-limiting authorization indicator with a credit card or other user information to be transferred to a user information recipient, in conjunction with a product/service payment or other business transaction with a hosted contact center. Embodiments of the invention further provide for forming a limited-use indicator, such as a use-limiting token, by associating a transaction agent indicator and a use-limiting indicator with the user information, and for verifying a limited use indicator received from a contact center agent and determining according to such indicator, in addition to any ordinary verification that might also be conducted, whether the use limitation has been met and whether the transaction should be authorized in accordance with the use limitation.
摘要:
A method and apparatus to provide speaker selection in a multi-party conference call is described. The method may comprise processing a speaker queue for at least one new speaker and monitoring when a number of active speakers is less than a predetermined number of active speakers. When less than the predetermined number, the method automatically, without human intervention, adds a new speaker from the speaker queue. A request for a new speaker may be received via a communication channel independent of a voice communication channel of the multi-party conference call. The request may be received from the conference endpoint via a voice communication channel of the multi-party conference call. In an example embodiment, new speakers in the speaker queue may be prioritized based a class of service associated with each new speaker. Priority may be given to a new speaker with a higher associated class of service.
摘要:
The present invention includes methods and devices for providing. According to some implementations, radio frequency identification (“RFID”) tags are positioned at various locations throughout a building. Building locations can be determined from the RFID tags. Emergency service providers may be equipped with a portable device that includes at least one RFID reader for reading the RFID tags. Some implementations involve transmitting the RFID tag data to a control center from which the emergency services are coordinated. The emergency service workers' current and prior locations can be determined by the portable devices and/or at the control center. In preferred implementations, emergency service provider location information can be provided to control center personnel and to emergency service providers in real time.
摘要:
Methods and devices are provided for automating a login process and user/device associations. A user's preferred device settings and/or functions may be provisioned automatically. Some implementations provide an automated log out or “sleep” when a user leaves one or more of the devices. Users may be automatically identified and associated. The “presence” of members of a user group may be determined as required for one or more actions to be taken. Some user groups control devices according to which members of a group may have access to certain functions, information, etc., and which may not.
摘要:
The present invention includes methods and devices for providing. According to some implementations, radio frequency identification (“RFID”) tags are positioned at various locations throughout a building. Building locations can be determined from the RFID tags. Emergency service providers may be equipped with a portable device that includes at least one RFID reader for reading the RFID tags. Some implementations involve transmitting the RFID tag data to a control center from which the emergency services are coordinated. The emergency service workers' current and prior locations can be determined by the portable devices and/or at the control center. In preferred implementations, emergency service provider location information can be provided to control center personnel and to emergency service providers in real time.
摘要:
Methods and devices are provided for automating a login process and user/device associations. A user's preferred device settings and/or functions may be provisioned automatically. Some implementations provide an automated log out or “sleep” when a user leaves one or more of the devices. Users may be automatically identified and associated. The “presence” of members of a user group may be determined as required for one or more actions to be taken. Some user groups control devices according to which members of a group may have access to certain functions, information, etc., and which may not.
摘要:
A system and method for reserving a network resource for a multipoint conference includes receiving a list of participants scheduled to participate in the conference, a scheduled start time, and estimated duration for the conference. A plurality of communication paths are predicted, each communication path corresponding to at least one of the participants. A network resource along the communication paths is reserved for a predetermined period of time beginning at approximately the scheduled start time. In accordance with the particular embodiment, the network resource includes bandwidth.