Abstract:
Embodiments disclosed herein provide methods, systems, and computer readable storage media for indicating eye tracking information during a real-time communication session. In a particular embodiment, a method provides receiving first eye tracking information captured by a first computing system operated by a first user during the communication session with a second computing system operated by a second user, wherein the first eye tracking information represents a first location on a display of the first computing system to where eyes of the first user are directed. The method further provides determining a second location on a display of the second computing system that corresponds to the first location and instructing the display of the second computing system to display a first indication of the second location in real-time with the communication session.
Abstract:
A parameters modification system for a contact center is provided. The parameters modification system includes an input module for enabling a user to provide an input indicating one or more parameters required to be modified. The parameters modification system further includes a determination module for determining a surface based on key performance indicators (KPIs) associated the one more parameters. The determination module further determines an optimal path in the determined surface. The parameters modification system further includes a modification module for modifying the one or more parameters along the determined optimal path so that key performance indicators associated with the one or more parameters remain within a predetermined threshold.
Abstract:
Embodiments disclosed herein provide systems and methods for acoustically transferring information between systems. In a particular embodiment, a method provides identifying information for acoustic transfer and determining an amount of time corresponding to the information. The method further provides acoustically transmitting a signal at a first time and, upon the amount of time elapsing since the first time, acoustically transmitting the signal at a second time.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for predicting the subject, logistics, and resources of associated with a communication event. Predictions and suggestions can occur prior to, during, or in response to communication events. The user can confirm the prediction or suggestion via user input such as a click or a voice command. The system can analyze past behavior patterns with respect to the subject, logistics and resources of communication events, followed by preparing ranked listings of which subjects, logistics, and resources are most likely to be used in a given situation. The predicted logistics may then include people to invite, time and date of the meeting, its duration, location, and anything else useful in helping potential participants gather together. The resources may include files attached, files used, communication event minutes, recordings made, Internet browsers and other programs which may be utilized by the user.
Abstract:
A communication system, method, and components are described. Specifically, a communication system having the ability to accommodate communication preferences for multiple users sharing a common line appearance is described. An application sequence can be determined and invoked based on communication preferences of the multiple users sharing a common line appearance.
Abstract:
A legitimate voice or video communication application modifies data in a communication session to produce a watermark. The watermark is a piece of information that is part of a communication session that is not readily observable, but can be verified later on. The purpose of a watermark is to verify that the communication session is a legitimate communication session and does not pose a security breach. The video or audio communication session is monitored for a watermark. In response to determining that the communication session contains the watermark, the communication session is allowed continue. In response to determining that the communication session does not contain the watermark, the communication session is identified as a potential security breach. If the communication session is identified as a potential security breach, the communication session can be dropped and a user can be notified of the potential security breach.
Abstract:
A resource allocation system of an enterprise is disclosed for allocating resources for a work request in an enterprise. The resource allocation system includes a monitor module configured to monitor the work request and availability of the resources in the enterprise, wherein the work request is characterized by one or more attributes. The resource allocation system further includes a resource matching module configured to match the attributes of the work request with the resources to determine one or more first type and second type of resources. The resource allocation system further includes an assignment module configured to assign the first type of resources to the work request while the second type of resources are unavailable, and re-assign the second type of resources to the work request when the second type of resources become available.
Abstract:
A collaboration system for information sharing in an enterprise is disclosed. The collaboration system includes a monitoring module configured to monitor a communication for one or more parameters. The collaboration system further includes an information management module configured to select one or more data items from one or more databases based on the one or more parameters, wherein each of the data items includes an associated score. The collaboration system further includes a ranking module configured to score the one or more selected data items. The collaboration system further includes a database management module configured to update the one or more databases with the score of the one or more selected data items.
Abstract:
Contact centers strive to match the demands and preferences of their customers with the skills and abilities of the agents who process work items associated with the customers (e.g., contacts). However, the preferred agent may be unavailable, non-existent, backlogged or otherwise ineligible to accept the work item. An agent who is non-preferred but still qualified may be utilized to process the work item, such as an agent with adequate skills with respect to a particular attribute of the work item. Reports for the selection of the non-preferred but qualified agents are provided herein. A contact center may then utilize such reporting to identify underserved areas of their customer base.