Abstract:
The present disclosure is related to a meeting scheduling system that can apply an enterprise rule to determine one or more requirements for a scheduled meeting.
Abstract:
A device, system, and method gives temporary control of a user device using location based grants. The method performed by a control server of a third party is performed when the user device is in a predetermined area. The method includes transmitting authentication data to the user device, the authentication data configured to authenticate the third party to the user device, the predetermined area being associated with the third party. The method includes receiving a request from the user device for command data, the command data configured to be executed on the user device to provide the third party with a limited control over the user device while the user device remains in the predetermined area. The method includes transmitting the command data to the user device.
Abstract:
At least one social media channel includes a plurality of user messages, which are accessible via a communication network. At least some of the stored messages are retrieved from the at least one social media channel via the communication network, and a collection of frequently asked questions (FAQ) is generated or updated by analyzing the retrieved messages to form a plurality of topical issue clusters. Each topical issue cluster is associated with at least one topic parameter from among a plurality of topic parameters, each topic parameter relates to at least one of use, installation or maintenance of a product or service, and each topical issue cluster includes at least one issue identified by a community of users and at least one resolution of the issue identified by the community of users. The generated or updated FAQ is uploaded to a storage location accessible to the community of users.
Abstract:
Techniques for efficiently allocating ports and bandwidth in a communication system configured to establish interactive, real time communication sessions between endpoints are described. Requests are received at a server, from a requester endpoint device, to initiate an interactive, real time communication voice and/or video session requiring access to an interactive session resource. In an embodiment, the communication system is a contact center and the interactive session resource is an available contact center agent. Pending availability of the interactive session resource, a requester is assigned a place in a queue or otherwise scheduled to receive access to the interactive session resource. In the meantime, a data channel is established between the server and the requester's endpoint device. Resources, which can include an executable program and/or information operative to enable the endpoint device to emulate an active on-hold voice connection period, are downloaded to the endpoint device.
Abstract:
Systems are provided to manage pauses, including on-hold, conditions in communications, such as text-based communications. Users may be provided with messages at a pace that, among other things, allows a particular cadence of messages to be maintained, even if a reply has been created. Accordingly, resources of a contact center may be better allocated to other matters requiring attention without causing undue customer dissatisfaction or the burden of handling additional messages. While voice-based “hold” conditions may be managed with messages or music on hold, text-based communications may be managed with social messaging content and/or comfort messages.
Abstract:
Associating callers of a contact center with their social media identity may provide mutual benefits to the caller and contact center. For example, a business operating a contact center can receive information about their current and potential customers and customers can receive additional information, incentives, or other perks by allowing access to their social media profile. When a caller initially calls a contact center, they are prompted, and possibly incentivized, to provide a social media identity. The social media identity may or may not have an affinity with an organization on the social media website. If not, the caller is provided with the opportunity to establish the affinity. If the caller does establish the affinity, the call may be identified as having a positive sentiment or negative sentiment if the caller does not do so. The call, or future calls, with the caller may then be processed accordingly.
Abstract:
Techniques for aiding an email recipient in the management of inbound email by detecting, and configurably responding to, dynamically variable patterns of activity and behavior are described. Characteristics are extracted from new email messages originated by senders and intended for a recipient. One or more patterns of sender activity, recipient message management behavior, and/or message response behavior, relating to treatment of messages from individual senders and/or plural senders in the aggregate, are identified. The patterns are identified by analyzing statistics collected by the extraction of characteristics from email messages previously received by the recipient. Before the recipient reads a new email, a determination is made as to whether any deviation from an identified pattern exists; and, if so, a pre-existing rule for treatment of the new message is enforced and/or a new rule specifying treatment of at least some messages from the sender of the email is proposed.
Abstract:
Contact centers may incorporate automated agents to respond to inquiries. The inquiries may solicit a substantive response, for example, by providing a time when the inquiry asks for the departure time for a flight. Such responses omit the normal conversational subject matter used to embellish person-to-person conversations and appear are very machine-like. Herein, a source of user context, such as a social media website, customer database, or other data, is accessed. Certain aspects of the customer may then be identified and used to embellish the reply with additional and/or alternative content. As a result, the reply may be more conversational.
Abstract:
Embodiments disclosed herein provide systems and methods for dynamically guiding a user to a target conversation area with a communication device. In a particular embodiment, a method provides receiving a call request to establish a call with a communication device and determining a location of the communication device. The method further provides determining a target conversation area for a user of the communication device to participate in the call based on the location of the communication device. The method also provides directing the user to the target conversation area.
Abstract:
Systems and methods for dynamically responding to requests for information, derived from one or more data sources, relating to at least one event participant. A notification of a scheduled event is received at a server. The notification identities a plurality of individuals invited to attend or participate in an event. Data attributes relating to the event participants are retrieved from one or more data sources and stored. The data attributes can include personal attributes, professional attributes, and social interaction attributes. Before, during or after an event, requests are received and processed to provide event participants and other interested parties access to contextual information relating event participants to one another, the identities of event participants possessing one or more attributes, and lists of attributes for one or more known event participants. The requests can include images and sound recordings captured during the event.