Abstract:
A contact center system can receive messages from consumers. The system can then interact with the consumer or customer using a dialog. Before conducting the session with the consumer, past interactions using the dialog are reviewed to determine words, phrases, and other information that caused the dialog to be successful. The information is stored as norms. Upon beginning a new interaction with the dialog, the norms and the past successful dialogs are retrieved and compared to the active dialog while the interaction is on-going. The comparison is then used to ensure that the present active dialog will lead to a successful outcome or to resolve any issued if the outcome is not likely to be successful.
Abstract:
Systems and methods for determining and providing call disposition information for outgoing calls are provided. More particularly, the disposition of a call placed from a communication device is determined, and associated with a call log for that communication device. The call disposition information is displayed or otherwise output to a user when the call log is accessed by the user. The call disposition information can be determined by a call disposition application running on a communication server that provides the call disposition information to a communication device for display by that communication device.
Abstract:
Methods and apparatus are disclosed for authenticating a user based on the geo-location history of a geo-location-enabled wireless device (e.g., a GPS-enabled wireless telecommunications terminal, a smart card, an RFID tag, etc.). In a first illustrative embodiment, a user of a geo-location-enabled wireless telecommunications terminal (e.g., a GPS-enabled cell phone, a GPS-enabled notebook computer, etc.) who attempts to access a restricted resource is challenged with one or more questions that are generated from the terminal's geo-location history. In a second illustrative embodiment, a user of a data-processing system who attempts to access a restricted resource is asked to provide a username Z. The user is then challenged with one or more questions that are generated from the geo-location history of a wireless device that is associated with username Z (e.g., a cell phone that belongs to the user whose username is Z, etc.).
Abstract:
Disclosed herein are systems, methods, and computer-readable storage media for identifying and remediating risky source files. An example system configured to practice the method can gather data describing each file in a source code repository, and generate, using a weighted algorithm based on empirical relationships between the data and customer-found defects, a risk score for each file in the source code repository, wherein the weighted algorithm prioritizes factors based on predictiveness of defects. Then the system can generate a list of files having risk scores above a threshold, and make risk-mitigation recommendations based on the risk scores. A file can include a single file or a collection of files such as a module. The system can identify, for each file in the list of files having risk scores above the threshold, a respective risk type, and make the risk-mitigation recommendation for each file based on the respective risk type.
Abstract:
Techniques to dynamically generate real time frequently asked questions from forum data are described. In one embodiment, for example, an apparatus may comprise a preprocessor, a validator, a data module, and a list regenerator. The preprocessor may be operative to receive a user entry to a forum and to generate a processed entry. The validator may be operative to receive the processed entry, to receive an accuracy rating for the processed entry from a data module, and to forward the processed entry for inclusion in an existing frequently-asked-questions (FAQ) list based on the accuracy rating and rules. The data module may be operative to receive the processed entry and to determine the accuracy rating of the processed entry. The list regenerator may be operative to receive the processed entry and to regenerate the existing FAQ list into an updated FAQ list including the processed entry. Other embodiments are described and claimed.
Abstract:
A transaction is received in a contact center. The transaction can be an email, an incoming call, an outgoing call, a video call, a text message, and/or the like. A best agent is determined to handle the transaction. A time is determined for the best agent to handle the transaction. The time can be based on a projected time that the agent will be able to handle the transaction, based on a callback time or any criteria. A schedule of the best agent is searched. The schedule of the best agent contains a movable event. A movable event can be any event that can be rescheduled, such as a break. When it is determined that the time for the best agent to handle the transaction is during and/or close to the movable event, the movable event is rescheduled to allow the best agent to handle the transaction.
Abstract:
The sentiment of a message may not be obtainable from the message itself. However, many messages have an associated context that provides information useful in determining the sentiment of a message. Messages may include links to other resources, such as graphics or videos, which in turn include titles, comments, viewer ratings or other attributes that may provide a sentiment of the message.
Abstract:
An automatic ambient environmental detection and lockout system that recognizes unacceptable background noise for agents and a method that requires agents and/or supervisors to take corrective action on detected noise issues prior to work assignment facilitates an effective and efficient environment appropriate for agents to handle contact center work.
Abstract:
The system and method allow enhanced capabilities for Session Initiation Protocol (SIP) dialogs (communication sessions) between SIP devices. The SIP dialogs have applications that are inserted into the SIP dialog such as a Back-to-Back User Agent (B2BUA) or a proxy application. After the initial dialog is established and these applications fail or become unavailable, the system and method allow the applications to be bypassed or have the SIP dialog redirected to an alternative application. This provides a better user experience because the SIP dialog (e.g., a SIP telephone call) will not be dropped if the application fails mid-dialog.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for processing media highlights. A first method includes displaying a real-time media event to a user, and, upon receiving a first indication from the user at a first time, generating a highlight of the real-time media event based on the first time, the highlight being associated with a portion of the real-time media event at the first time, and associating, in a highlight database, the highlight with an individual profile of the user. The highlight can include parameters for media content and/or duration. The highlight duration can be based on an analysis of content of the real-time media event. Highlights can be assigned to specific highlight categories. Other aspects disclosed herein apply to playback of media highlights during playback of a recorded media event, and managing stored highlights.