摘要:
Embodiments of the present invention provides systems and methods for pooled IP recording. An exemplary method of the present invention comprises monitoring a user's logon, associating a communication device to the user, assigning an interface to a recorder associated with the communication device, and recording data from the communication device sent over the interface. Another exemplary method of the present invention comprises detecting a recorder failure and dynamically routing an interface associated with the failed recorder to at least one other recorder.
摘要:
Included are embodiments for determining an extension-to-channel mapping. At least one embodiment includes receiving first data associated with a communication from at least one communications device and receiving second data from a recording resource. Some embodiments include determining whether the at least one communications device is coupled to a recording resource. Some embodiments include matching the communications device to a recording resource and in response to matching, creating an association of the at least one communications device to the recording resource.
摘要:
Included are embodiments for determining an extension-to-channel mapping. At least one embodiment includes determining, at a first time, a first extension-to-channel mapping configuration, the first extension-to-channel mapping configuration including an indication that at least one extension is coupled to a first recording channel. Similarly, some embodiments include determining, at a second time, a second extension-to-channel mapping configuration, the second extension-to-channel mapping configuration including an indication that the at least one extension is coupled to a second recording channel. Similarly, some embodiments include creating an extension-to-channel map, the extension-to-channel map indicating a configuration of the at least one extension, the first recording channel, and the second channel during a time period between the first time and the second time.
摘要:
Included are embodiments for determining an extension-to-channel mapping. At least one embodiment includes determining, at a first time, a first extension-to-channel mapping configuration, the first extension-to-channel mapping configuration including an indication that at least one extension is coupled to a first recording channel. Similarly, some embodiments include determining, at a second time, a second extension-to-channel mapping configuration, the second extension-to-channel mapping configuration including an indication that the at least one extension is coupled to a second recording channel. Similarly, some embodiments include creating an extension-to-channel map, the extension-to-channel map indicating a configuration of the at least one extension, the first recording channel, and the second channel during a time period between the first time and the second time.
摘要:
A method for discovering customer center information includes receiving a plurality of customer center information from a plurality of respective information sources, and correlating the plurality of customer center information to determine an identity of a customer center agent accessing customer center resources.
摘要:
A method for discovering customer center information includes receiving a plurality of customer center information from a plurality of respective information sources, and correlating the plurality of customer center information to determine an identity of a customer center agent accessing customer center resources.
摘要:
A method for discovering customer center information includes receiving a plurality of customer center information from a plurality of respective information sources, and correlating the plurality of customer center information to determine an identity of a customer center agent accessing customer center resources.
摘要:
Systems and methods for protecting information provided to an agent via a communication network are provided. In this regard, a representative method comprises, receiving information related to a transaction, wherein the information includes video. Additionally, the method includes initiating a recording of the video and identifying visual content in the video that is to be protected. The method further comprises preventing unauthorized access to the visual content during replay of the recording of the video.