Abstract:
A microprocessor executable resource monitor operable to determine that a less skilled and/or qualified resource has been assigned to service a work item or is servicing the work item, wherein a more skilled and/or qualified resource exists but is not currently available to service the work item, monitor at least one of a level of service provided by the less qualified resource to the work item and/or a customer associated with the work item and an availability of the more skilled and/or qualified resource to service the work item, and, in response to the monitoring step and while the work item is being serviced, transfer the work item to the more skilled and/or qualified resource for servicing.
Abstract:
A server executing a social media identity and discovery application and method are provided that scan social networking sites for communications. The target content is found with content indicators when communications are put on a social networking site. The content is recorded and evaluated. If the identified content is contextually significant, the alias and the user account data and/or user data from public records are correlated based on keywords and/or events, and a notification of the correlation is sent to an agency, agent, or a contact center system. The agent or agency may verify that the identity of a poster has been accurately correlated with a customer record in the database or with user data from public records. The agent, the agency, or the system has the opportunity to respond to the communication, despite the anonymity of the poster on the social networking site.
Abstract:
System and method to detect misconfiguration in a contact center, the method including: assigning, by a processor coupled to a memory, a workstation IP address to an agent workstation in the contact center; receiving a workstation login request from an agent; associating the workstation IP address to the agent; receiving an application program login request from an agent; extracting a source IP address for the application program login request; comparing the workstation IP address to the source IP address for the application program login request; and allowing agent access if the workstation IP address matches the source IP address for the application program login request.
Abstract:
Conferences are a popular way to hold meetings and presentations when the participants are not required to be physically together. However, the quality of a conference can vary based on a particular user's endpoint configuration, connection, network, conference content, and other factors. Providing a user with the ability to indicate a quality issue, as determined by the user, allows other users and systems to become aware that a user is experiencing quality issues and optionally take action to correct the issue.
Abstract:
Contact centers often have a significant pool of troubleshooting information related to devices that a customer may own or have access to. Connecting the device to a resource of the contact center presents challenges as customers and device manufacturers are reluctant to provide direct connectivity from the device to a public network, such as the Internet. A customer communication device, such as a smart phone, with an application allows a user to broker a communication between a resource of a contact center and a device. As a benefit, the customer can see and control the types of communication occurring and approve or deny according to their comfort level. When the resource-device session is concluded, the link is terminated and cannot be resumed without again obtaining approval.
Abstract:
A social media network is monitored for postings of a control group. The control group is a group of one or more individuals that posts on a particular topic. The postings of the control group may cover all the postings of each member of the control group for a period of time. A first relative social media score is calculated for the postings of the control group on the social media network. A social media score is calculated for a social media posting of a user or entity on the social media network. The relative social media score for the control group is compared to the social media score for the user or entity to see if there is a significant difference. If there is a significant difference, an agent in a contact center to is identified respond to the social media posting of the user or entity.
Abstract:
A method, system and computer readable medium for advertising and interoperating Layer 2 VPN services from an access node to a core network. The method can include executing, using one or more processors, a routing protocol on an access node to establish adjacency with a core network node in an access mode. The method can also include mapping, using the one or more processors, an access network Layer 2 service identifier to a core network service identifier. The method can further include advertising, using the one or more processors, a mapping for the L2VPN service to the core network node. The method can also include sending, using the one or more processors, network traffic from the access node to the core network node without core network encapsulation.
Abstract:
A method, apparatus and computer program product for providing the use of an external metric as the primary tie-breaker in ISIS route selections is presented. A set of routes are identified that are to be advertised by the router as external routes within a network. The routes are advertised by the router using a Type Length Variable (TLV), wherein the TLV contains metric information to be used as a first tiebreaker when selecting routes. The network is running an Intermediate System To Intermediate System (ISIS) protocol. The TLV includes a 32-bit or a 64-bit administrative tag sub-TLV, the TLV comprising TLV#135, TLV#235, TLV#236, and TLV#237.
Abstract:
A communication system, method, and components are described. Specifically, a communication system having the ability to carry a transitive context and communicate the transitive context to new participant user agents for continuity through all related call dialogs is disclosed. The transitive context communication is possible through the use of a newly created SIP dialog using a REFER message and/or an INVITE message for all call flows and topology change operations.
Abstract:
A mobile service observing integration system efficiently utilizes multi-functional smart devices providing operating system support for native applications and application programming interface support for third-party applications, allowing seamless mobile communication between a contact center and its agents and supervisors.