Abstract:
Systems and methods described herein enable call center managers to identify behavioral drivers for improving call agents' performance. A computing device obtains call data for multiple calls received at a call center and plots individual calls of the multiple calls, based on the call data, against three behavioral measures related to agent activities. The computing device identifies an optimal zone, among the plotted individual calls, for a selected performance metric value over the three behavioral measures. The computing device also plots a particular agent's calls, based on the call data, against the three behavioral measures and identifies an agent's zone, among the plotted agent's calls, for the selected performance metric value. The computing device generates a visual model of the optimal zone and the agent's zone within the context of the three behavioral measures.
Abstract:
The device may receive user information associated with a user. The device may generate a user profile for the user that stores user information and authentication confirmation information. The device may provide a particular cryptographic key and information identifying the user profile. The device may receive a request to authenticate a secure session for a user device from an application server. The device may obtain, based on the user identifier, the authentication confirmation information associated with the user from a data structure storing one or more user profiles. The device may validate the particular response to the particular challenge code based on the authentication confirmation information. The device may provide information to the application server indicating that the secure session is validated for the user device based on validating the authentication information.
Abstract:
A device may receive an authentication request generated based on a request to access a service. The authentication request may include a user identifier. The device may identify a mobile device associated with the user identifier. The device may authenticate the mobile device, and may generate an access notification based on authenticating the mobile device. The access notification may include information relating to the request to access the service. The device may provide the access notification to the mobile device, and may receive an access response from the mobile device. The access response may indicate whether to permit access to the service. The device may cause access to the service to be permitted when the access response indicates to permit access to the service, or may cause access to the service to be denied when the access response indicates to deny access to the service.
Abstract:
A method may include identifying diverse applications associated with supervision of agent work stations. The method may include generating a unified view interface based on supervisory communications associated with the diverse applications and receiving a request for the unified view interface from a supervisory interface device. The method may include exporting the unified view interface to the supervisory interface device. The method may further include receiving notifications associated with the diverse applications, and sending the notifications to the supervisory interface device.
Abstract:
A computing device obtains call data for multiple calls received at a call center and plots individual calls of the multiple calls, based on the call data, against three behavioral measures related to agent activities. The computing device identifies an optimal zone, among the plotted individual calls, for a selected performance metric value over the three behavioral measures. The computing device also plots a particular agent's calls, based on the call data, against the three behavioral measures and identifies an agent's zone, among the plotted agent's calls, for the selected performance metric value. The computing device generates a visual model of the optimal zone and the agent's zone within the context of the three behavioral measures.
Abstract:
A proxy device intercepts requests from client devices to access message data through a message data device, such as accessing e-mail messages through a mail server implementing post office protocol (POP) or other messaging protocol. The proxy device determines to authenticate of a client device when, for example, the client device, is located within certain areas that differ from a geographic region associated with a message account holder. Authentication of the client device may include collecting additional information, such as a universal identifier that may be used by the client device to access various services. The proxy device may further forward a notification message to the client device indicating the access to the message data is pending until the client device is authenticated. If the client device is successfully authenticated, the proxy device forwards the request to the message data device to enable the client device to access the message data.
Abstract:
A device may receive network traffic information, associated with multiple transactions, that indicates, for each transaction of the multiple transactions, a credential and a source device identifier associated with the transaction. The device may determine, based on the network traffic information, a quantity of times that a common credential was used in two transactions occurring at different times and originating from different source devices. The device may provide information that identifies the quantity of times and the different source devices. The device may determine whether to block network traffic associated with a source device, of the different source devices, based on the quantity of times and/or user input received based on providing the information that identifies the quantity of times and the different source devices. The device may selectively provide an instruction to block the network traffic associated with the source device based on this determination.
Abstract:
A method may include identifying diverse applications associated with supervision of agent work stations. The method may include generating a unified view interface based on supervisory communications associated with the diverse applications and receiving a request for the unified view interface from a supervisory interface device. The method may include exporting the unified view interface to the supervisory interface device. The method may further include receiving notifications associated with the diverse applications, and sending the notifications to the supervisory interface device.
Abstract:
A device may receive an authentication request generated based on a request to access a service. The authentication request may include a user identifier. The device may identify a mobile device associated with the user identifier. The device may authenticate the mobile device, and may generate an access notification based on authenticating the mobile device. The access notification may include information relating to the request to access the service. The device may provide the access notification to the mobile device, and may receive an access response from the mobile device. The access response may indicate whether to permit access to the service. The device may cause access to the service to be permitted when the access response indicates to permit access to the service, or may cause access to the service to be denied when the access response indicates to deny access to the service.
Abstract:
A method includes receiving a request associated with a secondary event orchestrator to schedule a secondary event to be concurrently broadcast with a primary video program. The secondary event is based on the primary video program. The method includes scheduling, by a processing device, the secondary event in an interactive media guide (IMG). The method also includes receiving requests or subscriptions for the secondary event from at least one user device based on the scheduled secondary event in the IMG, and providing support for the concurrent broadcast of the secondary event.