Abstract:
Call center personnel, i.e., company agents may be monitored and information from monitoring the call center agents may be presented on a portable device. The information from monitoring the call center agents may include various key performance indexes (KPIs) that enable the performance of the call center agents to be assessed. The KPIs may be updated in near-real time based on monitoring pending calls handled by the agents. Sound analytics may also be performed on the calls. Information regarding the call center agents may be graphically organized by the portable device so that call centers agents who may need assistance may be easily identified. The portable device may join a call. For example, a setting for a session associated with the call may be modified to include the manager device in the session.
Abstract:
A computing device obtains call data for multiple calls received at a call center and plots individual calls of the multiple calls, based on the call data, against three behavioral measures related to agent activities. The computing device identifies an optimal zone, among the plotted individual calls, for a selected performance metric value over the three behavioral measures. The computing device also plots a particular agent's calls, based on the call data, against the three behavioral measures and identifies an agent's zone, among the plotted agent's calls, for the selected performance metric value. The computing device generates a visual model of the optimal zone and the agent's zone within the context of the three behavioral measures.
Abstract:
A method may include monitoring calls and/or traffic on a network and identifying behavior associated with each of a plurality of user devices with respect to activity on the network. The method may also include aggregating information about the behavior associated with the user devices, determining whether the aggregated information corresponds to an anomaly with respect to usage of the network and determining, when the aggregated information corresponds to the anomaly, whether the anomaly meets a threshold based on a type of anomaly and a number of user devices affected by the anomaly. The method may further include identifying, when the aggregated information corresponds to the anomaly, user devices in an area corresponding to the anomaly, generating a notification in response to determining that the aggregated information corresponds to the anomaly and transmitting the notification to the identified user devices in the area corresponding to the anomaly.
Abstract:
A method may include monitoring calls and/or traffic on a network and identifying behavior associated with each of a plurality of user devices with respect to activity on the network. The method may also include aggregating information about the behavior associated with the user devices, determining whether the aggregated information corresponds to an anomaly with respect to usage of the network and determining, when the aggregated information corresponds to the anomaly, whether the anomaly meets a threshold based on a type of anomaly and a number of user devices affected by the anomaly. The method may further include identifying, when the aggregated information corresponds to the anomaly, user devices in an area corresponding to the anomaly, generating a notification in response to determining that the aggregated information corresponds to the anomaly and transmitting the notification to the identified user devices in the area corresponding to the anomaly.
Abstract:
A device may receive information associated with a user request to access a service using a first device. The information may include a user credential. The device may identify a second device associated with the user credential. The device may provide a notification, associated with the user request to access the service, to the second device, and may receive a response from the second device. The response may indicate to permit access to the service. The device may provide an instruction to permit the first device to access the service. The device may provide information that identifies services for which access has been permitted for the user credential. The device may receive an indication to prevent further access, for the user credential, to at least one service. The device may provide an instruction to prevent further access to the at least one service for the user credential.
Abstract:
An authentication device may provide an authentication code to a third party device. The third party device may provide a third party service to which a client device has requested access. The authentication device may receive the authentication code from a mobile device that is different from the client device. The authentication device may determine a third party device identifier included in the authentication code. The third party device identifier may identify the third party device that provides the third party service. The authentication device may determine a transaction identifier included in the authentication code. The authentication device may selectively provide the transaction identifier to the third party device, identified by the third party device identifier, to cause the third party device to selectively permit the client device to access the third party service.
Abstract:
An approach is provided for enabling a subscriber to establish rules for controlling user interaction with a resource based on the activity of the user. A reactive control platform monitors a current activity of a user of a device, one or more services, or a combination thereof associated with a subscriber during access by the user to a network of a subscriber. The status of the user is determined based on the monitoring, profile information associated with the user, or a combination thereof. A request for input from the subscriber for specifying one or more rules to be enforced for affecting a use of the device, the one or more services, the network of the subscriber, or a combination thereof by the user is then generated based on the determination.
Abstract:
A method, a device, and a non-transitory storage medium having instructions stored thereon provide for the provisioning and management of user profiles of any given system by indicating the identity of the user as a set of properties and properties values rather than indicating the identity of the user by the functions that the user can and cannot do. The method, the device, and the non-transitory storage medium include attribute data that define permissions and non-permissions. A user profile is created based on a configurable mapping of the properties, properties values, and the attribute data. The method, the device, and the non-transitory storage medium allows an end user to create a user profile by selecting properties and properties values, and attributes are automatically linked to such selected properties and properties values.
Abstract:
Systems, methods, devices, and non-transitory storage media provide a web-based graphical user interface to allow a user to control a softphone of a user device. A context handler operates on the user device and manages a page context of the web-based graphical user interface. A call manager operates as a RESTful web service on the user device. The context handler and the call manager communicate using JavaScript Object Notation with Padding (JSONP) messages. The call manager includes a finite state machine that indicates a current state of the softphone. The call manager generates application programming interface calls to the softphone in response to receiving JSONP messages. The user interface is updated to reflect the current state of the softphone based on execution of user selections by the softphone. The context handler chunks data into multiple JSONP messages if data exceeds a data size limitation of the JSONP.
Abstract:
A network device issues a globally unique identifier (GUID) to an application for use in a database read/write session. The network device determines a session key based on the GUID. The network device determines a total number of database nodes available to handle a read/write session with the application, and determines one of the database nodes to route a session to based on applying a modulo function to the session key and to the determined total number of database nodes. The network device, when determining the one of the database nodes to route the session to, applies the function (X mod Y)+1, where X is the session key and Y is the total number of database nodes available to handle the read/write session with the application.
Abstract translation:网络设备向应用程序发出全局唯一标识符(GUID)以用于数据库读/写会话。 网络设备基于GUID确定会话密钥。 网络设备确定可用于处理与应用的读/写会话的数据库节点的总数,并且基于对会话密钥应用模函数和确定的总数确定数据库节点之一以路由会话 的数据库节点。 网络设备当确定数据库节点之一来路由会话时,应用函数(X mod Y)+1,其中X是会话密钥,Y是可用于处理读/写的数据库节点的总数, 与应用程序进行会话。