Abstract:
Systems, methods, and computer program products are for managing access to a femtocell coverage area. An exemplary method includes storing in a memory component a first identifier corresponding to a subscribed service of a communication device and a second identifier corresponding to a user of the communication device, and granting access to the femtocell coverage area using the second identifier.
Abstract:
Techniques provide for converged wireline and wireless services in part by employing a set-top box (STB) with machine-to-machine (M2M) communication. The STB, associated with an access point, such as a femtocell, can be used to send/receive messages, including video, to/from user equipment (UE) via a core network. A monitoring system includes a sensor component that is triggered under specified conditions, and the STB records events in response to the trigger, where a recorded event can be sent as a message to the UE. The STB or associated remote control can indicate a received message to a user, who can view the message on the STB, remote control, or associated television. A meter component is associated with the STB via the femtocell or other desired connection. The STB can receive and store utility meter readings for validation or dispute by the user.
Abstract:
A method includes receiving a request related to a set top box, the request having a public identifier of the set top box and a user account identifier. The public identifier is accessible by a user associated with the set top box. The method also includes accessing a user record, corresponding to a location, from a database of user records. The method further includes determining, from the user record, a private identifier of the set top box corresponding to the public identifier of the set top box, wherein the private identifier is unique to the set top box among a set of set top boxes associated with the user record and the private identifier is inaccessible by the user and using the private identifier to perform an action related to the set top box in response to the request.
Abstract:
An intelligent virtual service agent implemented on a computer platform with a processor and a memory is assigned a responsibility to automatically interact with different users via different mediums across a communication network when a predetermined characteristic of content provided by the users is identified. Content provided by a user is received over the communication network. The content provided by the user is analyzed to determine whether the content provided by the user possesses the predetermined characteristic. A determined is made, based on the analyzing, that the content possesses the predetermined characteristic. The intelligent virtual service agent is assigned to automatically interact with the user based on determining that the content possesses the predetermined characteristic.
Abstract:
Systems and methods are provided for contact channel redirection to improve agent routing/assignment efficiency and customer experience. For example, the system may redirect a customer, waiting in a queue for an agent for telephonic communications, to a chat agent for online chat.
Abstract:
A method includes receiving a request at a provisioning system to enable a set-top box device to function at a temporary location. The method includes authenticating the request at the provisioning system. The method includes identifying, at the provisioning system, a broadband service associated with the set-top box device that is available at the temporary location when the request is authenticated. The method also includes sending a configuration message from the provisioning system to the set-top box device to enable the set-top box device to configure the set-top box to receive the broadband service.
Abstract:
A method includes receiving a request related to a set top box, the request having a public identifier of the set top box and a user account identifier. The public identifier is accessible by a user associated with the set top box. The method also includes accessing a user record, corresponding to a location, from a database of user records. The method further includes determining, from the user record, a private identifier of the set top box corresponding to the public identifier of the set top box, wherein the private identifier is unique to the set top box among a set of set top boxes associated with the user record and the private identifier is inaccessible by the user and using the private identifier to perform an action related to the set top box in response to the request.
Abstract:
Concepts and technologies disclosed herein are directed to interpretation workflows for machine learning-enabled event tree-based diagnostic and customer problem resolution. According to one aspect, a system can receive a workflow construction specification derived from a machine learning-enabled event tree (“MLET”). The MLET can be generated for use by a customer service agent to resolve a customer problem. The workflow construction specification can include a plurality of objects, each of which represents a navigation path through the MLET. The system can traverse the workflow construction specification and can create a set of workflow creation commands based upon at least one policy. The system can generate a workflow visualization interpretation file based upon the set of workflow creation commands. The workflow visualization interpretation file can identify how the MLET derived a root cause of the customer problem. The system can then present the workflow visualization interpretation file to the customer service agent.
Abstract:
A processing system including at least one processor may obtain a first ontology of a first type of data pipeline component, map the first ontology to a second ontology for a second type of data pipeline component that is stored in a catalog of data pipeline component types, provide a second data schema for the second type of data pipeline component as a template for a first data schema for the first type of data pipeline component, and add the first type of data pipeline component to the catalog of data pipeline component types, where the adding comprises storing the first ontology and the first data schema for the first type of data pipeline component in the catalog of data pipeline component types.
Abstract:
A processing system may obtain a request to deploy a service comprising a first virtual network function (VNF) to a multi-cloud environment comprising cloud infrastructures, the request including metadata associated with the service, decompose the service into a plurality of modules comprising: a plurality of VNFs and/or a plurality of components of the first VNF, select at least a first deployment model for the service from among a plurality of deployment models, based upon the metadata, each deployment model comprising rules for assigning the plurality of modules to cloud infrastructures, and deploy a first module to a first cloud infrastructure and a second module to a second cloud infrastructure.