Abstract:
A switch device can be configured to operate in a manner that was not originally intended. For example, a switch device can be a Broadcom XGS type of device that is configured with a packet-processing unit to perform line speed lookups in accordance with a default configuration. The default configuration can include classifying and forwarding received packets to an upstream interface based on VLAN information. The default configuration can be overwritten such that the switch device operates in a different manner than originally intended. For example, the switch device can be reconfigured to include mapping rules that specify different QoS data to be assigned to different type of received packets. Subsequent to utilizing the maps to identify QoS information for received packets, the reconfigured switch device uses the QoS information to forward the packets to queues in an upstream interface.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for software turret phone functionalities. A system can display, via a graphical user interface, graphical elements grouped according to a common attribute. Each of the graphical elements can represent an open communication line connecting a first device associated with a first user with a second respective device associated with a second respective user. The system can receive a selection of a graphical element of the graphical elements from the first user, the selection indicating a selected user associated with a respective device. Based on the selection, the system can manipulate a corresponding open communication line connecting the first device associated with the first user with the respective device associated with the selected user.
Abstract:
Techniques disclosed herein include systems and methods that extend Protocol Independent Multicast (PIM) protocols to Shortest Path Bridging (SPB) technology. This includes connecting an IP multicast domain across an SPB network. SPB edge routers, also known as Backbone Edge Bridges, form virtual adjacencies with each other. As such, SPB edge routers maintain such PIM adjacency without sending Hello messages. Backbone Edge Bridges (BEBs) are discovered using null Intermediate System To Intermediate System (IS-IS) Internet Protocol Multicast (IPMC) type-length-value (TLV) control messages. Each PIM-enabled BEB records other PIM-enabled BEBs as an adjacent PIM-router in response to receiving a NULL IPMC TLV from those BEBs. Accordingly, PIM-enabled BEBs form a full mesh virtual adjacency between each other and can thereby encapsulate PIM control messages sent and received between two access networks connected to the SPB network.
Abstract:
A presentation pacing system includes a monitor module for monitoring a time spent by a speaker on one or more slides while presenting a presentation, the presentation having a plurality of slides. The presentation pacing system further includes a compare module for comparing the monitored time with a pre-recorded time associated with the slides. The presentation pacing system further includes a notification module for notifying the speaker for changing pace of the presentation based at least on the comparison. The presentation pacing system further includes a query module for scheduling and presenting queries of audience to the speaker of the presentation during a slide transition.
Abstract:
When a customer communicates with a contact center, a history of the communication is stored. The communication from the customer can be in various media, such as a voice call, a video call, an email, an Instant Message (IM), a text message, and/or a blog posting. The history includes a context such as a reason for the communication and a time of the communication. The history of the communication is used to determine a pattern of the communication based on the context. Using the pattern, a time that the customer will communicate with the contact center is predicted. An agent associated with the customer is scheduled to be available at the predicted time. The predicted time can also be based on future events such as a product release or an event such as a political event, a sports event, and/or a convention.
Abstract:
A contact center is provided that includes a plurality of agents for servicing incoming contacts and an a performance analysis module that compares a proposed contact center configuration and/or change in secondary contact center performance parameter against a set of contact center templates, the contact center templates defining a historical contact center configuration as of respective points in time and, based on the results of this operation, predicts an impact on a primary contact center performance parameter if the proposed contact center configuration and/or change in secondary performance parameter were to be implemented.
Abstract:
An authentication string, such as a password, consists of characters. Each of the characters in the authentication string is randomly associated with a defined location on a device. For example, an area on a touch screen can be associated with a character in the authentication string. When a user selects a location associated with the character, feedback is provided that identifies the character. When the user selects a location that is not associated with the character, feedback is provided that does not identify the character.If the user responds by indicating that the associated location matches the character, the character is authenticated. If the user responds by indicating that a location not associated with the character is a match, the character is not authenticated. This process is then repeated for each character in the authentication string.
Abstract:
A contact center is described along with various methods and mechanisms for administering the same. The contact center proposed herein provides the ability to, among other things, mark a work item as interruptible. The work item may receive an interruptible marking when the work item is assigned to an adequately-matched agent rather than a well-matched. Processing of the work item by the adequately-matched agent may be interrupted if the well-matched agent becomes available prior to the work item being completed by the adequately-matched agent.
Abstract:
A method and apparatus for routing multicast data across multiple multicast routing domains connected by a shortest path bridging (SPB) network is presented. A Shortest Path Bridging (SPB) edge router of an SPB network connected to a PIM network is configured as a Rendezvous Point (RP). A message is received at the RP, and in response, the RP forms a first data structure including multicast sender information. The RP floods the SPB network with a second message containing the first data structure, allocates an Identifier to the multicast stream, and sends a second data structure with sender information. An edge router with multicast receive interest responds with the second data structure with multicast receive interest information. As a result, a receiver in a second network has knowledge of devices in a first network such that multicast traffic is able to be routed between different networks connected to the SPB network.
Abstract:
A contact center is described along with various methods and mechanisms for administering the same. Work assignment methods are disclosed that place tasks in bins by time intervals and are processed within a delta queue ring buffer. The delta queue ring buffer can assign the tasks by seconds and order tasks by interval for efficient handling, and then loop around to use the same bins. By using fixed intervals and a moving queue pointer, the scheduling delta queue solution allows for fast selection of the queue to insert and fast processing of the queues on timeout. The scheduling delta queue solution allows for the processing of at least, but not limited to one million tasks with only memory as a constraint.