Abstract:
A robotic customer service agent (“robot”) is provided to a service location. The robot may present a number of security concerns that, whether realized or not, present barriers to acceptance. A robot is provided that is determined to be in compliance with a security criteria. The security criteria may be related to software (e.g., running anti-virus software), hardware (e.g., an added camera is secure), communication (e.g., no unexpected communications), or other aspect. Should the robot be in compliance, it may operate in a secure mode, such as to perform or access more sensitive information. If the robot is not in compliance, the robot is operated in a non-secure mode, such as to block data transmissions, information capturing, or other process or operation that may present a security risk.
Abstract:
Acceptance of robotic service agents may be improved if robots are compliant with a monitoring program of a third party. A robot may be allowed to perform certain operations if monitored or prevented from such operations if unmonitored. If authorized, a robot may be able to perform certain operations unmonitored; however, the third party may report the authorized exception. Should the robot be unmonitored, and absent unauthorized exception, the robot performs only those operations approved for unmonitored mode. Otherwise, the robot is enabled to perform tasks approved for monitored and unmonitored mode. The third party may report the monitoring, lack of monitoring, and compliance with a monitoring program accordingly.
Abstract:
A customer service robot may be limited to a maximum physical ability, such as speed of travel, speed of a robotic arm, etc. However, certain customers may be uncomfortable with a robot operating at the maximum capacity. Accordingly, a customer may have an attribute associated with a performance-limiting criteria. The criteria then limits the robot to operations within operational parameters associated with the performance-limiting criteria. As a benefit, a robot may be transformed to provide a better customer service experience by working quickly to address a customer service task, but within the confines of what a particular customer, or customer type, may consider comfortable or acceptable.
Abstract:
Robotic customer service agents are provided such that, when properly configured, they are operable to perform a customer service task. A contact center may dispatch a robot, an accessory for a customer-owned robot, or instructions to transform an unconfigured robot, such as a generic robot, into a configured robot operable to perform the task. The robot may provide certain data to a contact center or a third-party to ensure compliance with operating practices to protect persons, property, and data and reduce the unnecessary acquisition of sensitive data, as well as, execute on-board risk mitigation applications.
Abstract:
First communication information is received from a first communication session in a first communication medium. The first information has an associated first topic identifier. The first communication information may be a media stream, such as a voice media stream. Second communication information is received from a second communication session in a second communication medium associated with the first topic identifier. The first and second communication mediums are different communication mediums. The second communication session occurs after the first communication session has ended. For example, the second communication medium may be an email that occurs after a voice call has completed. The first information and the second information are stored in a first topic record based on the first topic identifier. A user can then access the topic record to view the first and second communication information for the topic.
Abstract:
Embodiments are directed to using a three-dimensional sound space to analyze security surveillance information. According to one embodiment, the three-dimensional sound space can comprise part of a security surveillance system in which sound sources related to security surveillance information can be presented and a user can efficiently navigate even a large number of sound sources in the three-dimensional sound space. Effective audio surveillance relies on the ability of the surveillance personnel to efficiently identify calls that need further analysis and calls that need no further analysis without introducing too many false negative or false positive conditions. Utilization of three-dimensional space described herein can increase the ease with which security analysts review audio content and identify relevant audio content that requires further analysis.
Abstract:
According to one embodiment, audio and non-audio data can be represented as sound sources in a three-dimensional sound space adapted to also provide visual data. Non-audio data can be associated with audio sound sources presented in the sound space. Navigation within this combined three-dimensional audio/visual space can be based primarily on the audio aspects of the sound sources with the details of the non-audio data being presented on demand, for example, when the listener navigates through the combined three-dimensional audio/visual space to a particular sound source at which point the non-audio data associated with that sound source can be presented.
Abstract:
Allocation of resources utilized by a contact center remains a balancing act between the burden of having resources that are generally underutilized and underperforming due to resource constraints. Many contact centers support a variety of communication types (e.g., audio-video, audio, text, email, etc.) associated with a respective communication channel. Communications may be dynamically incentivized or allocated from one communication channel having greater resource demands to another communication channel having lesser resource demands. Additionally, the resources of the contact center may be shared by customers of clients utilizing the contact center. As a result, one customer having a spike in demand may have their, and/or another customer's, communications reallocated to the less demanding channel to manage contact center resource utilization.
Abstract:
Even with the best efforts to design and deliver accurate systems with usable interfaces, customers often encounter difficulties in completing a task using an electronic device, such as completing a form on a web page, using a software application, or navigating an interface. This may be due to a programming error, inaccurate instructions, or an unusual situation not contemplated by the programmers or designers. Without interaction with a human agent, a cue may be provided to the user upon detection of an issue for completing the task. A co-browse operation may be automatically initiated to provide a cue selected in accord with the issue that thereby allows the user to complete the task.
Abstract:
Contact centers employ agents to provide services to customers. In particular, artificial agents are provided that have a rich background and continuing life with the realm of social media. The artificial agent's profile is selected in accord with the profiles of current or prospective customers. As the customers age and progress in life, the artificial agent profile is updated in accord with the customers' changing profiles and similarly ages and progresses in life. When a customer desires to interact with artificial agent, for a purpose provided by a contact center, a human agent may be provided the profile and/or history of the artificial agent so as to impersonate the artificial agent and promote the relationship with the customer.