Abstract:
Embodiments of the present technology provide out-of-band captive portal devices, networks, and methods. An example of a method includes executing a redirection of a client request for network access to a captive portal login, initiating an association between the wireless controller and the client, receiving authentication credentials of client from the captive portal login, negotiating a change of authorization with a wireless controller in accordance with RFC 5176 protocol, wherein the controller includes a mapping to a captive portal Internet Protocol (IP) address, and redirecting the client to a URL specified in the client request for network access.
Abstract:
An endpoint adaptor and methods of operating the same are provided. The endpoint adaptor provides a single persistent view of a mobile communication device to a network and network-based applications. Moreover, the ability to leverage the endpoint adapter to transition a communication session to include additional media types while the communication session is in-progress is also disclosed.
Abstract:
A communication system, method, and components are described. Specifically, a communication system that supports dynamic device pairing of communication devices is described. Such pairing is accomplished using a feature or pairing server, without requiring modification to associated communication endpoints. Moreover, sequenced applications can be applied for all communication endpoints when pairing is in effect.
Abstract:
A customer uses an in store kiosk to establish a communication session, such as a video communication session between the kiosk and an agent in a contact center. The customer can transfer the communication session to the customer's personal mobile communication device by selecting to transfer the communication session at the kiosk. A presence of the customer's personal mobile communication device is detected. The presence of the customer's personal mobile communication device can be detected by the use of various technologies, such as Near Field Communications or scanning a code on the kiosk from the mobile communication device. In response to detecting the presence of the mobile communication device the communication session is transferred from the kiosk to the mobile communication device using a communication application in the mobile communication device.
Abstract:
A contact manager system for generating an agent's script is disclosed. The contact manager system includes a monitoring module configured to determine one or more browsing activities and related context information of at least one customer. The contact manager system further includes a script generation module configured to generate the at least one agent script based on the one or more determined browsing activities. The contact manager system further includes a display module configured to display the at least one agent script to one or more agents. The contact manager system further includes a verification module configured to validate the agent's script.
Abstract:
A contact center, methods, and mechanisms are provided for dynamically assembling a team of resources to handle a work item. The work item is analyzed for any needs and a suitable team of resources is selected based at least partially on those needs. Each of the resources can be reserved and applied to a work item for a duration of time that the work item is being handled. As the workflow associated with the work item progresses, the needs of the work item are reevaluated for any changes that may require a modification to the team of resources. When the changes require modification, the team of resources can be adjusted on the fly to suit the changing needs of the work item.
Abstract:
A call manager system for managing resource allocation for a call in an enterprise is disclosed. The call manager system includes a monitoring module configured to monitor one or more parameters of the call, wherein each parameter of the one or more parameters comprises a parameter value. The call manager system further includes a computing module configured to generate a justification value based on the parameter value of the monitored parameters. The call manager system further includes an allocating module configured to allocate one or more resources to the call based on the justification value. The call manager system further includes a display module configured to display one or more visual representations for a current status of the parameter values of the monitored parameters.
Abstract:
A method, system and computer readable medium for advertising and interoperating Layer 2 VPN services from an access node to a core network. The method can include executing, using one or more processors, a routing protocol on an access node to establish adjacency with a core network node in an access mode. The method can also include mapping, using the one or more processors, an access network Layer 2 service identifier to a core network service identifier. The method can further include advertising, using the one or more processors, a mapping for the L2VPN service to the core network node. The method can also include sending, using the one or more processors, network traffic from the access node to the core network node without core network encapsulation.
Abstract:
A geo-spatial grammar comprises rules, syntax, and other means by which a data input is determined to have a meaning associated with a particular event. The event may then be provided to an application, such as a calendaring or messaging application. As a benefit, an input, such as a user speaking the phrase, “I'll be there in an hour,” may be interpreted, via the geo-spatial grammar, as an event (e.g., “I'll be in the office,” “I'll join you for dinner,” “I'll be home,” etc.). An application may then perform an action based upon the event (e.g., reschedule the meeting that starts in five minutes, present directions to the restaurant on the user's car's navigation system, notify the user's spouse, etc.).
Abstract:
A method, system, and telephony adjunct are provided that enable a user of a telephony device to receive caller identification information even though the user of the telephony device has one or more special accessibility requirements. The caller identification information is provided to a computational device also in proximity to the user, but separate and distinct from the telephony device, and the computational device is used to present the caller identification information to the user in a format that accommodates the user's one or more special accessibility requirements. Moreover, the computational device is unable to exert control over servers and other components that are facilitating the communication functionality of the telephony device, thereby enhancing overall security of the system.