Abstract:
Contact centers, such as outbound call centers, are provided with means by which they may attempt to contact individuals at a time and via a channel preferred by the contact. A history of prior contact interactions is used as one means to establish a preferred contact time and channel. With a preferred contact time and/or channel established, the contact center may attempt to reach the contact with a decreased likelihood of the attempt being consider a nuisance.
Abstract:
A contact center, methods, and mechanisms are provided for assigning work items to resources using attributes that conditionally expand a selectable pool of resources. The work item is first analyzed for any required, preferred, and conditional attributes and then queued in multiple resource attribute sets for work assignment. Work items are assigned to resources by considering a match between the analyzed attributes of a work item and a resource while observing alternative assignment conditions. When met, the alternative assignment conditions cause the work item to be queued in additional resource attribute sets thereby expanding the pool of selectable resources. Once assigned, the work item may be removed from queues not selected in the work assignment.
Abstract:
A system is provided for configuring a Session Initiation Protocol (SIP) device. The system includes at least one SIP server in communication with the SIP device over an Internet Protocol (IP) network. The at least one SIP server includes a database that stores SIP device configuration data and a receiver that receives a first SIP message to initiate SIP device configuration. The at least one SIP server also includes a transmitter that transmits configuration data to the SIP device in response to receiving the first SIP message. The receiver also receives a second message from the SIP device indicating whether the SIP device was successfully configured based on the configuration data.
Abstract:
A method is presented that uses steganographic codeword(s) carried in a speech payload in such a way that (i) the steganographic codeword(s) survive compression and/or transcoding as the payload travels from a transmitter to a receiver across at least one diverse network, and (ii) the embedded steganographic codeword(s) do not degrade the perceived voice quality of the received signal below an acceptable level. The steganographic codewords are combined with a speech payload by summing the amplitude of a steganographic codeword to the amplitude of the speech payload at a relatively low steganographic-to-speech bit rate. Advantageously, the illustrative embodiment of the present invention enables (i) steganographic codewords to be decoded by a compliant receiver and applied accordingly, and (ii) legacy or non-compliant receivers to play the received speech payload with resultant voice quality that is acceptable to listeners even though the steganographic codeword(s) remain in the received speech payload.
Abstract:
Route asymmetry is detected in a network by running a route tracing program to trace routes between a first element of the network and a second element of the network. The route tracing program need be run at only a single network element, such as the first network element. Forward and reverse routes between the first and second network elements are identified as asymmetric if performance data from the route tracing program indicates a significant deviation from an expected monotonic characteristic as a function of time-to-live values of respective packets transmitted by the route tracing program.
Abstract:
A method for orchestrating peer authentication during a call (e.g., a telephone call, a conference call between three or more parties, an instant messaging [IM] chat session, etc.) is disclosed. In particular, a user is first authenticated in order to participate in a call (e.g., via entering a password, etc.), and subsequently during the call the user may be peer authenticated. In accordance with the illustrative embodiment, a user who participates in a call might be prompted to authenticate another user on the call based on particular events or user behavior during the call.
Abstract:
A diagnostic tool for speech recognition applications is provided, which enables a administrator to collect multiple recorded speech sessions. The administrator can then search for various failure points common to one or more of the recorded sessions in order to get a list of all sessions that have the same failure points. The invention allows the administrator to playback the session or replay any portion of the session to see the flow of the application and the recorded utterances. The invention provides the administrator with information about how to maximize the efficiency of the application which enables the administrator to edit the application to avoid future failure points.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for managing communications mode neutrally using widgets. The method includes presenting via a graphical user interface (GUI) a set of connected graphical elements representing a communication session comprising at least two communicating users, wherein each graphical element representing a user further comprises at least one graphical sub-element indicating user communication details, receiving user input associated with the set of connected graphical elements, the user input having an action associated with the communication session, and performing the action based on the received user input. The graphical sub-elements can indicate a communication mode through which an associated user connects to the communication session and/or available communication modes for an associated user. The graphical sub-elements can include a telephone, mobile phone, instant message, camera, video camera, microphone, text-message, document, headset, or email icon.
Abstract:
Methods for analyzing an interactive voice response (IVR) system are disclosed. In the methods, prompts are issued from the IVR system and user input made in response to the prompts from the IVR system is received. One method involves displaying the prompts issued by the IVR system to an operator; and receiving input data from the operator, the data defining whether any change to the IVR system is recommended and/or any recommended changes to the IVR system. Another method involves detecting the occurrence of an unexpected event by comparing the user input against a predefined set of rules, each rule being associated with one or more of the unexpected events; and taking a predefined action in response to the detection of one or more of the unexpected events.
Abstract:
A call processing system includes a call processing server. The call processing server processes calls for an internal network that employs SIP features and functions. The call processing server can receive calls from or send calls to one or more external communication endpoints that are not part of the internal network. However, the call processing server can associate a floating user agent with the communication from the external communication endpoint and lock the floating user agent to a gateway. After locking onto a gateway and initiating the call, the floating user agent can then publish call event status and receive SIP primitives similar to other SIP-enabled devices.