The present invention is directed generally to contact center administration and specifically to improving contact center routing.
Contact centers are employed by many enterprises to service customer contacts. A typical contact center includes a switch and/or server to receive and route incoming packet-switched and/or circuit-switched contacts and one or more resources, such as human agents and automated resources (e.g., Interactive Voice Response (IVR) units), to service the incoming contacts. Contact centers distribute contacts, whether inbound or outbound, for servicing to any suitable resource according to predefined criteria. In many existing systems, the criteria for servicing the contact from the moment that the contact center becomes aware of the contact until the contact is connected to an agent are customer-specifiable (i.e., programmable by the operator of the contact center), via a capability called vectoring. Normally in a present-day automatic call distributor (ACD), when the ACD system's controller detects that an agent has become available to handle a contact, the controller identifies all predefined contact-handling queues for the agent (usually in some order of priority) and delivers to the agent the highest-priority oldest contact that matches the agent's highest-priority queue. Generally, the only condition that results in a contact not being delivered to an available agent is that there are no contacts waiting to be handled. This type of contact distribution is generally known as skill-based routing.
One of the major costs of a contact center is associated to its human resources. Even with the fact that the involved technology is very often expensive, it is usually part of a business plan which recovers the initial investment over time. Other than the regular maintenance cost, employee costs are still the major recurring component of the general contact center cost. It is thus very important to assure that each resource/skill is fully applied to the benefit of the enterprise goals.
Several different algorithms have been deployed in order to make sure that customers are serviced by the agent who can best attend their needs. A common approach, as noted above, is called skill-based routing. This method collects data about the calling customer via IVRs or any other method and uses that extra information to establish what skills are required to properly handle a given contact. Ideally, there are going to be agents available with that same set of skills that match the contact skill requirements. The successful match between the contact required skills and the agent skills is what will lead the customer to a pleasant contact center experience.
Contact centers equipped with skill-based routing components are usually efficient at distributing contacts, but are ill equipped to help supervisors determine if an agent is ready to be transitioned from a backup role to a primary role for a particular skill or vice-versa. This problem is magnified by the fact that most contact center supervisors are required to supervise a large number of agents. Thus, most supervisors are not able to devote the amount of time required to individually analyze the development of each agent.
These and other needs are addressed by the various embodiments and configurations of the present invention. The present invention is directed generally to an evolutionary routing method and systems for supporting the same. In accordance with at least some embodiments of the present invention, a communication method is provided that comprises:
receiving a contact at a contact center; and
applying an evolutionary routing algorithm to assign a first resource in the contact center to the contact.
Evolutionary computing and evolutionary routing algorithms attempt to understand the biological evolutionary models, extracted from the interaction of individuals inside different biological species, and applies those concepts to enhance/optimize man made systems. Several papers provide definitions on this area. For a contact center specific case, the principles of Natural Selection are applied to the contact center environment in order to identify the most successful individuals and take advantage of such information while enhancing the contact routing strategies and the contact center in general.
A few components can be selected in order to bring the Natural Selection models into the contact center environment. The chosen ones include, but are not limited to: Species, Competition, Evolution Cycles and their Natural Disasters, Survivors (Heroes) and Deaths (Anomalies).
The Species can be mapped to individual teams or the entire contact center. It urges to find the fittest agents in order to survive. The survival of the contact center species would be dependent on external factors such as the customer satisfaction and its cost to the organization. Finding the fittest individuals would allow supervisors to create role models and make sure that most of the agents work as close as possible to those standards. Finding the most capable individuals (Heroes) is just as important as finding Anomalies. The removal of Anomalies is just as important because if it is untreated, it could spread weaknesses into the Species.
As a Species, it is important to take under consideration the internal interactions among individuals. Assuming that agents can be friends with each other and that they can talk to friends of their friends, that is how good or bad behaviors spread. It is crucial to create a healthy environment and make sure that role models are reverenced and anomalies are removed. This approach would lead to the evolution of the Species by evolving it into a stronger team. Providing tools that allow contact centers to evolve in this direction is a goal of the evolutionary routing mechanism of the present invention.
A contact center is not a simulated environment where anyone could play God and see his/her species evolving. The competition for Natural Selection takes place during the work hours. The daily service delivered to the enterprise customers is the battlefield where Heroes will be born and worst prepared soldiers will fall. These continuous battles will be limited inside Evolutionary Cycles. This would be another arbitrary measure of the system; it is the period of evaluation of the Species. Short-term campaigns such as Promotional Telemarketing could have its Evolutionary Cycles configured for a few hours; long-term campaigns such as Customer Assistance Services could have their cycle set for weeks or months.
From the computational perspective, Heroes will be the agents which are identified as the longest successful survivors on their current roles (skill sets). The successful part needs to be highlighted because a high survival rate alone is not enough to define a Hero. It could also indicate an Anomaly. Other criteria such as agent behavior or the outcome of the handled contacts may be required in order to find a proper classification.
The ideal contact center would be composed only by Heroes. That would be the stop criteria for the evolution. Since the criteria for a Hero is arbitrary and highly dependent of the Enterprise needs, the dynamic nature of the business will always challenge the contact center structure creating different needs and different kinds of Heroes over time. The evolutionary routing mechanism intends facing this challenge and providing tools which will allow the continuous evolutions of the contact center according to the enterprise dynamics. A couple examples on how Heroes could be so different depending on where in the business they belong are outlined in the following:
These are two different battlefields with two different types of Heroes. The enterprise is free to set what Hero it needs based on its own business model.
Just as important, the Anomalies could be seen as agents that not only provide poor service but they remain unnoticed doing it for several Evolutionary Cycles. Anomalies can damage the entire Species, preventing the contact center from achieving the desired results. They have been able to identify weaknesses in their environment and use them for their own benefit. It could get even worse if they pass on their knowledge and induce other agents to follow the same behavior. Depending on the case, an Anomaly could be assigned for recycling or even cut from the workforce.
Fortunately, current technology already offers some mechanisms for finding Anomalies before they cause too much damage. Business Intelligence tools allow supervisors to describe bad behavior and keep track of the agent activities. Here are a couple samples of Agent misbehaviors:
These two scenarios show how anomaly can silently rise. If the Anomaly remains unnoticed, one agent tells another agent how to avoid new contacts and, in no time, the entire species starts suffering with bad customer service and poor Contact Center results.
The last item on this introduction is the Evolutionary Cycles and their Natural Disasters. In the contact center context, the Evolutionary Cycle is represented by a period of time where Natural Disasters are randomly or arbitrarily inserted into the system in order to find new talents/mutations and make the species stronger. Up to this point, finding Heroes and Anomalies would be just a different data-mining approach on the top of the current contact center data. The insertion of Evolution Cycles and Natural Disasters into the system is one aspect of the Evolutionary Routing mechanism.
Natural Disasters have a set of intensity levels and could go from green or safe to red or unsafe as explained later and it just means how aggressive the evolution must happen. Faster evolution could cause more programs with traditional contact center performance counters since more contacts would be connected to lower skilled agents. However, new talents could be found faster. Less aggressive evolution would emphasize the contact center performance parameters and find new talents in a slower pace.
During a Natural Disasters cycle, a customer contact whose personality has been previously identified by its history is routed to an agent which is not the best qualified resource for its assistance. The agent potential will be tested in order to evaluate his/her evolutionary state. At the end, the customer will be invited to provide his feedback about the agent and the entire information about the contact will be recorded for comparison with the Heroes/Anomalies behaviors. Based on the outcome of such comparison, the agent will be nominated for promotion of skills or for recycling. This will assure that good agents get recognized and Anomalies get eliminated.
This special routing structure will supply a new set of reports where the current level of evolution for each agent will be detailed. Suggestions for improvement could be added to the reports in order to reinforce the Hero behaviors and prevent the Anomaly ones.
Here are a few possibilities of unusual contact routing strategies that would be used during Evolutionary Cycles as Natural Disasters:
Traditionally, the assignment of skills to agents has been the main variable for routing decisions. This new approach brings to the table another set of qualifiers that can be used to reflect the enterprise dynamics into the contact routing. One expectation is that the additional evolutionary state factor brings more distinction among the several agents and provides a better contact routing strategy.
As can be appreciated by one of skill in the art, a contact is understood herein to include but is not limited to voice calls, emails, chat, video calls, fax, voicemail messages and combinations thereof. Accordingly, a contact center may be equipped to handle any one or a number of the above-noted contact types.
These and other advantages will be apparent from the disclosure of the method(s) and apparatus(es) contained herein. The above-described embodiments and configurations are neither complete nor exhaustive. As will be appreciated, other embodiments of the invention are possible utilizing, alone or in combination, one or more of the features set forth above or described in detail below.
As used herein, “at least one”, “one or more”, and “and/or” are open-ended expressions that are both conjunctive and disjunctive in operation. For example, each of the expressions “at least one of A, B and C”, “at least one of A, B, or C”, “one or more of A, B, and C”, “one or more of A, B, or C” and “A, B, and/or C” means A alone, B alone, C alone, A and B together, A and C together, B and C together, or A, B and C together.
The invention will be illustrated below in conjunction with an exemplary communication system. Although well suited for use with, e.g., a system having an ACD or other similar contact-processing switch, the invention is not limited to any particular type of communication system switch or configuration of system elements. Those skilled in the art will recognize that the disclosed techniques may be used in any communication application in which it is desirable to provide improved contact processing and other similar functions.
The exemplary systems and methods of this invention will also be described in relation to analysis software, modules, and associated analysis hardware. However, to avoid unnecessarily obscuring the present invention, the following description omits well-known structures, components and devices that may be shown in block diagram form, are well known, or are otherwise summarized.
For purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the present invention. It should be appreciated, however, that the present invention may be practiced in a variety of ways beyond the specific details set forth herein.
The term “switch” or “server” as used herein should be understood to include a PBX, an ACD, an enterprise switch, or other type of communications system switch or server, as well as other types of processor-based communication control devices such as media servers, computers, adjuncts, etc.
Referring to
The switch 130 and/or server 110 can be any architecture for directing contacts to one or more communication devices. In some embodiments, the switch 130 may perform load-balancing functions by allocating incoming or outgoing contacts among a plurality of logically and/or geographically distinct contact centers. Illustratively, the switch and/or server can be a modified form of the subscriber-premises equipment disclosed in U.S. Pat. Nos. 6,192,122; 6,173,053; 6,163,607; 5,982,873; 5,905,793; 5,828,747; and 5,206,903, all of which are incorporated herein by this reference; Avaya Inc.'s Definity™ Private-Branch Exchange (PBX)-based ACD system; MultiVantage™ PBX, CRM Central 2000 Server™, Communication Manager™, S8300™ media server, SIP Enabled Services™, and/or Avaya Interaction Center™. Typically, the switch/server is a stored-program-controlled system that conventionally includes interfaces to external communication links, a communications switching fabric, service circuits (e.g., tone generators, announcement circuits, etc.), memory for storing control programs and data, a processor (i.e., a computer) for executing the stored control programs to control the interfaces and the fabric, and to provide automatic contact-distribution functionality. The switch and/or server typically include a network interface card (not shown) to provide services to the serviced communication devices. Other types of known switches and servers are well known in the art and therefore not described in detail herein.
As can be seen in
Referring to
The first communication devices 134-1, . . . 134-N are packet-switched and can include, for example, IP hardphones such as the Avaya Inc.'s, 4600 Series IP Phones™, IP softphones such as Avaya Inc.'s, IP Softphone™, packet-based wireless phones, Personal Digital Assistants or PDAs, Personal Computers or PCs, laptops, packet-based H.320 video phones and conferencing units, packet-based voice messaging and response units, packet-based traditional computer telephony adjuncts, peer-to-peer based communication devices, and any other communication device.
The second communication devices 138-1, . . . 138-M are circuit-switched. Each of the communication devices 138-1, . . . 138-M corresponds to one of a set of internal extensions Ext1, . . . ExtM, respectively. These extensions are referred to herein as “internal” in that they are extensions within the premises that are directly serviced by the switch. More particularly, these extensions correspond to conventional communication device endpoints serviced by the switch/server, and the switch/server can direct incoming calls to and receive outgoing calls from these extensions in a conventional manner. The second communication devices can include, for example, wired and wireless telephones, PDAs, H.320 videophones and conferencing units, fax machines, analog and DCP digital phones, voice messaging and response units, traditional computer telephony adjuncts, and any other communication device.
It should be noted that the invention does not require any particular type of information transport medium between switch or server and first and second communication devices, i.e., the invention may be implemented with any desired type of transport medium as well as combinations of different types of transport channels.
The packet-switched network 162 can be any data and/or distributed processing network, such as the Internet. The network 162 typically includes proxies (not shown), registrars (not shown), and routers (not shown) for managing packet flows.
The packet-switched network 162 is in communication with an external first communication device 174 via a gateway 178, and the circuit-switched network 154 with an external second communication device 180. These communication devices are referred to as “external” in that they are not directly supported as communication device endpoints by the switch or server. The communication devices 174 and 180 are an example of devices more generally referred to herein as “external endpoints.”
In one configuration, the server 110, network 162, and first communication devices 134 are Session Initiation Protocol or SIP compatible and can include interfaces for various other protocols such as the Lightweight Directory Access Protocol or LDAP, H.248, H.323, Simple Mail Transfer Protocol or SMTP, IMAP4, ISDN, E1/T1, and analog line or trunk.
It should be emphasized that the configuration of the switch, server, user communication devices, and other elements as shown in
As will be appreciated, the central server 110 is notified via LAN 142 of an incoming contact by the communications component (e.g., switch 130, fax server, email server, web server, and/or other server) receiving the incoming contact. The incoming contact is held by the receiving communications component until the server 110 forwards instructions to the component to forward or route the contact to a specific contact center resource, such as the IVR unit 122, the voice mail server 118, and/or first or second communication device 134, 138 associated with a selected agent, which may include an agent remotely connected to the LAN via a WAN-type connection. The server 110 distributes and connects these contacts to communication devices of available agents based on the predetermined criteria noted above. When the central server 110 forwards a voice contact to an agent, the central server 110 also forwards customer-related information from databases 114 to the agent's computer work station for previewing and/or viewing (such as by a pop-up display) to permit the agent to better serve the customer. The agents process the contacts sent to them by the central server 110.
According to at least one embodiment of the present invention, an evolutionary router 232 is provided. The evolutionary router 232 is stored either in the main memory or in a peripheral memory (e.g., disk, CD ROM, etc.) or some other computer-readable medium of the center 100. In accordance with at least one embodiment of the present invention, the evolutionary router 232 is operable to support and enhance the skill-based routing decisions made by the agent and contact selector 220. In such an embodiment, the evolutionary router 232 may receive feedback from serviced contacts to determine the efficacy of an agent or agents. Based on this feedback, the evolutionary router 232 may be adapted to dynamically update the agent skill queues 212a-N by assigning agents new skills or revoking certain skills from agents.
In accordance with at least one embodiment of the present invention, the evolutionary router 232 may treat each of the agent skill queues 212a-N as separate “species” where each agent in that queue is a member of the species. In such an embodiment, the “skills” of the agents in the queue 212 may be characterized as either Hero, non-Hero, or Anomaly. These classifications may be made based on each agent's performance as compared to a set of predefined performance criteria (which may also be based on the performance of a particular Hero agent). This is a significant departure from traditional skill-based routing where each agent is given a skill level for certain contact types or subject matter and where that skill level is assigned to the agent by his/her supervisor. Thus, the evolutionary router 232 provides a mechanism to augment and enhance traditional skill-based routing or replace traditional skill-based routing with evolutionary routing algorithms. In either use the evolutionary router 232 may be operable to create “Natural Disasters” that are aimed at testing agents in the queues (e.g., agents that are a part of a particular Species) and determining an evolutionary factor for each agent and the species as a whole.
Although the server 110 is depicted as having the evolutionary router 232 work in connection with traditional skill-based agent queues 212a-N, one skilled in the art will appreciate that the server 110 may comprise agent groups that are referred to as Species in addition or in lieu of the skill-based agent queues 212a-N, where each Species is provided to serve a particular business function. While applying a pure evolutionary routing algorithm, the evolutionary router 232 may route contacts to each Species based on the determined difficulty of the received contact as well as other evolutionary routing parameters that will be discussed in further detail below. Alternatively, while applying a hybrid skill-based/evolutionary routing algorithm, the evolutionary router 232 may augment the agent skills with determined evolutionary factors for the agents and the collection of agents.
Referring now to
In accordance with at least some embodiments of the present invention, the evolutionary router 304 may comprise a routing module 308 for making evolutionary routing decisions. The evolutionary router 304 may further include an analysis module 312 for analyzing the contact handling performance of agents. Based on how well an agent handles a particular contact or a natural disaster contact, the analysis module 312 may determine an evolutionary factor for that agent. The evolutionary factor for each agent or a collection of agents (e.g., a Species) may be based on a set of predetermined performance criteria and/or a comparison of how well the agent serviced a contact versus how well a Hero and/or Anomaly agent handled a contact having a similar difficulty and/or content. The analysis module 312 may also provide the evolutionary router 304 with the ability to dynamically and automatically update skills that are assigned to certain agents in a skill-based or hybrid routing scheme.
The evolutionary routing decisions made by the routing module 308 may be based on evolutionary factors determined by the analysis module 312. The routing module 308 may alternatively assist skill-based routing based on such evolutionary factors.
The evolutionary router 232, 304 is an additional layer of logic, targeting the enhancement of the traditional skill-based routing approach. The skill settings are usually defined during the deployment of the system and require lots of maintenance from the supervisors in order to be kept up to date.
The evolutionary router 232, 304 starts from the initially configure set of skills and respective skill levels. However, it adds the evolutionary factor which indicates how effective that agent is when compared against the role models of the company.
During initial setup, system administrators may define what the role models for Heroes and Anomalies are. They would have tools to set rules like the ones shown in
In order to keep the contact center safe and stable, a few external parameters may be included in or imposed on the system 100. There may be a need to set how long the Evolutionary Cycles are going to be and how hard its Natural Disasters are going to hit the Species. Another important piece of information is a classification of the Customers. Agents will have to use their own perceptions in order to provide hints about the customer's personality. Those are external factors used to prevent the traditional contact center metrics from getting negatively affected by experimentations conducted during the Evolutionary Cycles.
With reference now to
The Natural Disaster level field 504 describes the magnitude of Natural Disaster that is allowable during the corresponding time period defined in the period field 508. During such a time period, Natural Disasters of the identified magnitude may and likely will be inflicted on the system. Practically speaking, it may be desirable to limit or completely restrict the occurrence of Natural Disasters during peak hours (e.g., between 8 AM and 12 PM). Accordingly, such a time period may be restricted to a Natural Disaster level of GREEN, which means that only slight Natural Disasters should be imposed and therefore most difficult contacts should go to possible Heroes whereas most easy contacts can be sent to either Anomalies or routed according to skill-based routing if a hybrid routing approach is desired.
Alternatively, there may be certain time periods, such as non-peak time periods, that are most suitable for imposing Natural Disasters of greater magnitude. During these time periods, contacts may be delivered ad hoc to any agent without any regard for the difficulty of the contact. Thus, it is equally likely that a Hero and Anomaly will receive a difficult contact. These types of large Natural Disasters are meant to help the Species evolve and can further expedite the identification of Heroes and Anomalies.
All contacts are monitored and recorded in special reporting cabinets for each Evolutionary Cycle. It is anticipated that for real customer environments, filters could be added to the system in order to prevent the overflow of the database 114.
After each contact, the evolutionary router 232, 304 will make calculations based on the contact trace information and check how close to the role models the specific agent is. That Evolutionary State sample will be stored into the agent profile and at the end of each Evolutionary Cycle, an average will be calculated and assigned to the agent as its new evolutionary state.
This Evolutionary state means to the Evolutionary Routing Mechanism how close this agent is from becoming a Hero or an Anomaly. In other words, it means how effective that agent is to the business according to the predefined standards.
The evolutionary router 232, 304 might be adapted to operate in two modes, Assistant and Automatic. In the Assistant mode, the evolutionary router 232, 304 might allow the system to suggest and implement changes in the agent skill levels based on the fluctuation of the agent's evolutionary state. This mode would work as a Supervisor assistant and it would be enabled only in arbitrary periods of time for evaluation of the CC agents. Supervisors would collect the feedback and use the information according to their needs. CC would use pure skill-based routing at the most of the time.
In the Automatic mode, supervisors could configure the evolutionary routing rules and all contact routing would be executed based on such rules. As shown in
The evolutionary router 232, 304 takes advantage of statistical data and real-time experimentation in order to provide better routing rules. Its objective could be as simple as providing factual information so that supervisors can review their team skills; and it can also be as complex as providing a complete different routing mechanism where agents are classified by their effectiveness instead of the skill levels. It is important to highlight that agents with similar skill levels have behavior particularities that make them more or less effective than others. Identifying these particularities and using then in advantage of the contact center performance is what is brought to life by this new algorithm.
Referring now to
The method continues by determining the difficulty associated with the contact (step 612). The difficulty of a contact may be determined based on customer contact history, the subject-matter of the contact, and/or analyzing other known contact parameters that provide an indication of contact difficulty. The evolutionary router 232, 304 and/or the skill-based routing agent 220 may be adapted to make this determination. An IVR may also be used to obtain information about the subject-matter of the contact to further assist the system in determining the difficulty of the contact. The customer initiating the contact may also be asked to provide an indication of his/her perceived difficulty of the contact.
Once the difficulty of the contact has been determined, the method continues by applying the evolutionary routing rules to the contact (step 616). The evolutionary routing rules may take into consideration the difficulty of the contact as well as the time of day and the permissible level of Natural Disasters. Alternatively, the routing rules may be purely skill-based or a hybrid skill-based/evolutionary routing rules. In accordance with at least some embodiments of the present invention, the evolutionary router 232, 304 may make the determination as to the routing rules and thus restrict or limit its own activity in the routing process as well as restrict or limit the level of interaction that the skill-based routing agent 220 has with the contact.
Referring now to
The method begins after a contact has been serviced (step 704). This may be after a contact has been either partially or completely serviced. Following completion of the contact servicing step, the method continues with the evolutionary router 232, 304 determining the difficulty associated with the contact (step 708). Of course, other contact center elements may be capable of determining the difficulty associated with the contact.
With the difficulty of the contact determined, the method continues by analyzing the agent statistics associated with the completed contact (step 712). More specifically, the evolutionary router 232, 304 may utilize the analysis module 312 to determine performance metrics for the recently serviced contact. Examples of the types of performance metrics that may be determined by the analysis module 312 may vary depending upon the nature of the contact. More specifically, for a collections-type contact, the analysis module 312 may determine whether the agent closed or collected from the contact, whether a discount was given by the agent, the amount of time that it took to wrap-up the contact, and the amount of time that the contact took to service from beginning to end. On the other hand, if the contact was related to a customer-service type contact, then the analysis module 312 may determine the level of customer satisfaction associated with the serviced contact, whether a consultation was needed by the agent, and other factors in addition to the factors that are determined for a collections-type contact.
Once the agent statistics associated with servicing the contact have been determined, the analysis module 312 continues by comparing the agent statistics with the Hero/Anomaly parameters (step 716). The Hero/Anomaly parameters that are compared to the actual agent statistics may be retrieved from the data structure 400 or may retrieved from real-time actual statistics for identified Heroes and/or Anomalies that have serviced a similar contact within the same Evolutionary Cycle. The method continues by determining whether the Evolutionary Cycle has completed (step 720). This determination may be made by referencing a timer associated with the Evolutionary Cycle and/or whether any Natural Disasters are currently being applied to the contact center.
In the event that the Evolutionary Cycle is not complete, then the method continues by determining whether any additional contacts have been received (step 724). If no additional contacts have been received, then the method returns to step 720. On the other hand, if a new contact has been received within the same Evolutionary Cycle, then the method returns to step 704.
If, however, the Evolutionary Cycle has completed, then the analysis module 312 will continue by determining the evolutionary factor for the agent and/or the collection of agents that just underwent the Natural Disaster(s) during the Evolutionary Cycle (step 728). The evolutionary factor may be calculated by comparing how well the agent did compared to actual Heroes and/or Anomalies during that Evolutionary cycle and/or how well the agent did compared to Hero/Anomaly parameters. Additionally, the analysis module 312 may also consider whether the agent has progressed toward Hero status or regressed toward Anomaly status since the last Evolutionary Cycle in determining the agent's evolutionary factor. The evolutionary factor may then be stored in the agent's evolutionary history to track the progression of the agent's skills (step 732). In accordance with at least one embodiment of the present invention, all of the statistics recovered during the Evolutionary Cycle for the agent may also be stored in the database 114. Alternatively, all of the collected statistics may be passed through a database filter 340 before they are stored as the agent's evolutionary information.
With reference now to
The method continues with the evolutionary router 232, 304 indexing the agents based on their past effectiveness (step 816). In other words, the evolutionary router 232, 304 may upgrade an agent's skill level or assign the agent a new skill if it is determined that the skill level currently assigned to that agent is too low or non-existent (based on the agent's evolutionary factor). Alternatively, the evolutionary router 232, 304 may downgrade an agent's skill level or revoke a particular skill if it is determined that the skill level currently assigned to that agent is too high (based on the agent's evolutionary factor). In this way, the evolutionary router 232, 304 may be adapted to provide an automated feedback to the skill-based routing agent 220 if a hybrid routing approach is being employed. If, however, a pure evolutionary routing scheme is being employed, then the need for feedback to the skill-based routing agent 220 may not be necessary since only Evolutionary Routing decisions are made (which are not skill-based). Also in this step, the evolutionary router 232, 304 may assign Hero/Anomaly titles to the appropriate agents if a new Hero/Anomaly was identified. Similarly, the evolutionary router 232, 304 may revoke Hero/Anomaly titles from certain agents if necessary.
After the agents have been appropriately indexed and the skill-levels of those agents have been updated, the method continues with the routing module 308 applying the evolutionary routing scheme to newly received contacts either in a pure evolutionary routing scheme or in a hybrid routing scheme (step 820). Thereafter the method ends (step 832). Of course, the method may also start again at step 804.
Referring back to step 808, if it is determined that an assisted mode is to be employed, then the evolutionary router 232, 304 will utilize the analysis module 312 to prepare an evolutionary factors report (step 824). The evolutionary factors report may report on the evolutionary progress of a single agent or collection of agents. Additionally, the evolutionary factors report may provide information regarding whether a particular agent or collection of agents have attained or lost the status of Hero/Anomaly.
After the report has been prepared by the evolutionary router 232, 304, the report is provided to the appropriate supervisor (step 828). The supervisor may use the report to determine if training or other corrective measures should be taken to address a decrease in an agent's evolutionary factor. Additionally, the report can be used to identify agents that should receive praise or recognition based on their performance. The supervisor may also make the determination as to whether any agent skills should be altered, added, or revoked. Thereafter, the method continues by utilizing the pure skill-based routing scheme (step 832). The method then ends in step 832 or may go-back to step 804.
While the above-described flowcharts have been discussed in relation to a particular sequence of events, it should be appreciated that changes to this sequence can occur without materially effecting the operation of the invention. Additionally, the exact sequence of events need not occur as set forth in the exemplary embodiments. The exemplary techniques illustrated herein are not limited to the specifically illustrated embodiments but can also be utilized with the other exemplary embodiments and each described feature is individually and separately claimable.
The systems, methods and protocols of this invention can be implemented on a special purpose computer in addition to or in place of the described communication equipment, a programmed microprocessor or microcontroller and peripheral integrated circuit element(s), an ASIC or other integrated circuit, a digital signal processor, a hard-wired electronic or logic circuit such as discrete element circuit, a programmable logic device such as PLD, PLA, FPGA, PAL, a communications device, such as a server, personal computer, any comparable means, or the like. In general, any device capable of implementing a state machine that is in turn capable of implementing the methodology illustrated herein can be used to implement the various communication methods, protocols and techniques according to this invention.
Furthermore, the disclosed methods may be readily implemented in software using procedural or object-oriented software development environments that provide portable source code that can be used on a variety of computer or workstation platforms. Alternatively, the disclosed system may be implemented partially or fully in hardware using standard logic circuits or VLSI design. Whether software or hardware is used to implement the systems in accordance with this invention is dependent on the speed and/or efficiency requirements of the system, the particular function, and the particular software or hardware systems or microprocessor or microcomputer systems being utilized. The analysis systems, methods and protocols illustrated herein can be readily implemented in hardware and/or software using any known or later developed systems or structures, devices and/or software by those of ordinary skill in the applicable art from the functional description provided herein and with a general basic knowledge of the communication arts.
Moreover, the disclosed methods may be readily implemented in software that can be stored on a storage medium, executed on a programmed general-purpose computer with the cooperation of a controller and memory, a special purpose computer, a microprocessor, or the like. In these instances, the systems and methods of this invention can be implemented as program embedded on personal computer such as an applet, JAVA® or CGI script, as a resource residing on a server or computer workstation, as a routine embedded in a dedicated communication system or system component, or the like. The system can also be implemented by physically incorporating the system and/or method into a software and/or hardware system, such as the hardware and software systems of a communications device or system.
It is therefore apparent that there has been provided, in accordance with the present invention, systems, apparatuses and methods for efficiently routing contacts in a contact center architecture. While this invention has been described in conjunction with a number of embodiments, it is evident that many alternatives, modifications and variations would be or are apparent to those of ordinary skill in the applicable arts. Accordingly, it is intended to embrace all such alternatives, modifications, equivalents and variations that are within the spirit and scope of this invention.
Number | Name | Date | Kind |
---|---|---|---|
4163124 | Jolissaint | Jul 1979 | A |
4567323 | Lottes et al. | Jan 1986 | A |
4737983 | Frauenthal et al. | Apr 1988 | A |
4797911 | Szlam et al. | Jan 1989 | A |
4894857 | Szlam et al. | Jan 1990 | A |
5001710 | Gawrys et al. | Mar 1991 | A |
5097528 | Gursahaney et al. | Mar 1992 | A |
5101425 | Darland | Mar 1992 | A |
5155761 | Hammond | Oct 1992 | A |
5164983 | Brown et al. | Nov 1992 | A |
5206903 | Kohler et al. | Apr 1993 | A |
5210789 | Jeffus et al. | May 1993 | A |
5274700 | Gechter et al. | Dec 1993 | A |
5278898 | Cambray et al. | Jan 1994 | A |
5291550 | Levy et al. | Mar 1994 | A |
5299260 | Shaio | Mar 1994 | A |
5309513 | Rose | May 1994 | A |
5335268 | Kelly, Jr. et al. | Aug 1994 | A |
5335269 | Steinlicht | Aug 1994 | A |
5390243 | Casselman et al. | Feb 1995 | A |
5436965 | Grossman et al. | Jul 1995 | A |
5444774 | Friedes | Aug 1995 | A |
5469503 | Butensky et al. | Nov 1995 | A |
5469504 | Blaha | Nov 1995 | A |
5473773 | Aman et al. | Dec 1995 | A |
5479497 | Kovarik | Dec 1995 | A |
5500795 | Powers et al. | Mar 1996 | A |
5504894 | Ferguson et al. | Apr 1996 | A |
5506898 | Costantini et al. | Apr 1996 | A |
5530744 | Charalambous et al. | Jun 1996 | A |
5537470 | Lee | Jul 1996 | A |
5537542 | Eilert et al. | Jul 1996 | A |
5544232 | Baker et al. | Aug 1996 | A |
5546452 | Andrews et al. | Aug 1996 | A |
5592378 | Cameron et al. | Jan 1997 | A |
5592542 | Honda et al. | Jan 1997 | A |
5594726 | Thompson et al. | Jan 1997 | A |
5606361 | Davidsohn et al. | Feb 1997 | A |
5611076 | Durflinger et al. | Mar 1997 | A |
5627884 | Williams et al. | May 1997 | A |
5642515 | Jones et al. | Jun 1997 | A |
5684872 | Flockhart et al. | Nov 1997 | A |
5684874 | Yagyu et al. | Nov 1997 | A |
5684964 | Powers et al. | Nov 1997 | A |
5689698 | Jones et al. | Nov 1997 | A |
5703943 | Otto | Dec 1997 | A |
5713014 | Durflinger et al. | Jan 1998 | A |
5724092 | Davidsohn et al. | Mar 1998 | A |
5740238 | Flockhart et al. | Apr 1998 | A |
5742675 | Kilander et al. | Apr 1998 | A |
5748468 | Notenboom et al. | May 1998 | A |
5749079 | Yong et al. | May 1998 | A |
5751707 | Voit et al. | May 1998 | A |
5752027 | Familiar | May 1998 | A |
5754639 | Flockhart et al. | May 1998 | A |
5754776 | Hales et al. | May 1998 | A |
5754841 | Carino, Jr. | May 1998 | A |
5757904 | Anderson | May 1998 | A |
5790677 | Fox et al. | Aug 1998 | A |
5794250 | Carino, Jr. et al. | Aug 1998 | A |
5796393 | MacNaughton et al. | Aug 1998 | A |
5802282 | Hales et al. | Sep 1998 | A |
5818907 | Maloney et al. | Oct 1998 | A |
5825869 | Brooks et al. | Oct 1998 | A |
5828747 | Fisher et al. | Oct 1998 | A |
5838968 | Culbert | Nov 1998 | A |
5839117 | Cameron et al. | Nov 1998 | A |
5875437 | Atkins | Feb 1999 | A |
5880720 | Iwafune et al. | Mar 1999 | A |
5881238 | Aman et al. | Mar 1999 | A |
5884032 | Bateman et al. | Mar 1999 | A |
5889956 | Hauser et al. | Mar 1999 | A |
5897622 | Blinn et al. | Apr 1999 | A |
5903641 | Tonisson | May 1999 | A |
5903877 | Berkowitz et al. | May 1999 | A |
5905793 | Flockhart et al. | May 1999 | A |
5915012 | Miloslavsky | Jun 1999 | A |
5926538 | Deryugin et al. | Jul 1999 | A |
5930786 | Carino, Jr. et al. | Jul 1999 | A |
5937051 | Hurd et al. | Aug 1999 | A |
5937402 | Pandit | Aug 1999 | A |
5940496 | Gisby et al. | Aug 1999 | A |
5943416 | Gisby | Aug 1999 | A |
5948065 | Eilert et al. | Sep 1999 | A |
5960073 | Kikinis et al. | Sep 1999 | A |
5963635 | Szlam et al. | Oct 1999 | A |
5963911 | Walker et al. | Oct 1999 | A |
5970132 | Brady | Oct 1999 | A |
5974135 | Breneman et al. | Oct 1999 | A |
5974462 | Aman et al. | Oct 1999 | A |
5982873 | Flockhart et al. | Nov 1999 | A |
5987117 | McNeil et al. | Nov 1999 | A |
5991392 | Miloslavsky | Nov 1999 | A |
5996013 | Delp et al. | Nov 1999 | A |
5999963 | Bruno et al. | Dec 1999 | A |
6000832 | Franklin et al. | Dec 1999 | A |
6011844 | Uppaluru et al. | Jan 2000 | A |
6038293 | McNerney et al. | Mar 2000 | A |
6044144 | Becker et al. | Mar 2000 | A |
6044205 | Reed et al. | Mar 2000 | A |
6044355 | Crockett et al. | Mar 2000 | A |
6049547 | Fisher et al. | Apr 2000 | A |
6052723 | Ginn | Apr 2000 | A |
6055308 | Miloslavsky et al. | Apr 2000 | A |
6064730 | Ginsberg | May 2000 | A |
6064731 | Flockhart et al. | May 2000 | A |
6084954 | Harless et al. | Jul 2000 | A |
6088441 | Flockhart et al. | Jul 2000 | A |
6115462 | Servi et al. | Sep 2000 | A |
6128380 | Shaffer et al. | Oct 2000 | A |
6151571 | Pertrushin | Nov 2000 | A |
6154769 | Cherkasova et al. | Nov 2000 | A |
6163607 | Bogart et al. | Dec 2000 | A |
6173053 | Bogart et al. | Jan 2001 | B1 |
6175564 | Miloslavsky et al. | Jan 2001 | B1 |
6178441 | Elnozahy | Jan 2001 | B1 |
6185292 | Miloslavsky | Feb 2001 | B1 |
6192122 | Flockhart et al. | Feb 2001 | B1 |
6215865 | McCalmont | Apr 2001 | B1 |
6226377 | Donaghue, Jr. | May 2001 | B1 |
6229819 | Darland et al. | May 2001 | B1 |
6230183 | Yocom et al. | May 2001 | B1 |
6233333 | Dezonmo | May 2001 | B1 |
6240417 | Eastwick | May 2001 | B1 |
6259969 | Tackett et al. | Jul 2001 | B1 |
6263359 | Fong et al. | Jul 2001 | B1 |
6272544 | Mullen | Aug 2001 | B1 |
6275806 | Pertrushin | Aug 2001 | B1 |
6275812 | Haq et al. | Aug 2001 | B1 |
6275991 | Erlin | Aug 2001 | B1 |
6278777 | Morley | Aug 2001 | B1 |
6292550 | Burritt | Sep 2001 | B1 |
6295353 | Flockhart et al. | Sep 2001 | B1 |
6353810 | Petrushin | Mar 2002 | B1 |
6356632 | Foster et al. | Mar 2002 | B1 |
6366668 | Borst et al. | Apr 2002 | B1 |
6389028 | Bondarenko et al. | May 2002 | B1 |
6389132 | Price | May 2002 | B1 |
6389400 | Bushey et al. | May 2002 | B1 |
6408066 | Andruska et al. | Jun 2002 | B1 |
6424709 | Doyle et al. | Jul 2002 | B1 |
6426950 | Mistry | Jul 2002 | B1 |
6427137 | Pertrushin | Jul 2002 | B2 |
6430282 | Bannister et al. | Aug 2002 | B1 |
6434230 | Gabriel | Aug 2002 | B1 |
6449356 | Dezonno | Sep 2002 | B1 |
6449358 | Anisimov et al. | Sep 2002 | B1 |
6449646 | Sikora et al. | Sep 2002 | B1 |
6453038 | McFarlane et al. | Sep 2002 | B1 |
6463148 | Brady | Oct 2002 | B1 |
6463346 | Flockhart et al. | Oct 2002 | B1 |
6463415 | St. John | Oct 2002 | B2 |
6480826 | Pertrushin | Nov 2002 | B2 |
6490350 | McDuff et al. | Dec 2002 | B2 |
6535600 | Fisher et al. | Mar 2003 | B1 |
6535601 | Flockhart et al. | Mar 2003 | B1 |
6560330 | Gabriel | May 2003 | B2 |
6560649 | Mullen et al. | May 2003 | B1 |
6560707 | Curtis et al. | May 2003 | B2 |
6563920 | Flockhart et al. | May 2003 | B1 |
6597685 | Miloslavsky et al. | Jul 2003 | B2 |
6614903 | Flockhart et al. | Sep 2003 | B1 |
6650748 | Edwards et al. | Nov 2003 | B1 |
6697457 | Petrushin | Feb 2004 | B2 |
6704409 | Dilip et al. | Mar 2004 | B1 |
6707903 | Burok et al. | Mar 2004 | B2 |
6754333 | Flockhart et al. | Jun 2004 | B1 |
6766013 | Flockhart et al. | Jul 2004 | B2 |
6766014 | Flockhart et al. | Jul 2004 | B2 |
6947543 | Alvarado et al. | Sep 2005 | B2 |
7035927 | Flockhart et al. | Apr 2006 | B2 |
7072966 | Benjamin et al. | Jul 2006 | B1 |
7177316 | Pilecek | Feb 2007 | B1 |
7899179 | Kadashevich | Mar 2011 | B2 |
20020114432 | Shaffer et al. | Aug 2002 | A1 |
20020194002 | Petrushin | Dec 2002 | A1 |
20030174830 | Boyer et al. | Sep 2003 | A1 |
20030177017 | Boyer et al. | Sep 2003 | A1 |
20030206622 | Foster | Nov 2003 | A1 |
20040203878 | Thomson | Oct 2004 | A1 |
20060233346 | McIlwaine et al. | Oct 2006 | A1 |
20060245579 | Bienfait et al. | Nov 2006 | A1 |
20070121800 | Rodkey et al. | May 2007 | A1 |
20070133781 | Febonio et al. | Jun 2007 | A1 |
20070291922 | Matteo et al. | Dec 2007 | A1 |
20080002823 | Fama et al. | Jan 2008 | A1 |
20080192908 | O'Keefe et al. | Aug 2008 | A1 |
Number | Date | Country |
---|---|---|
2143198 | Jan 1995 | CA |
2174762 | Mar 1996 | CA |
0501189 | Sep 1992 | EP |
0740450 | Oct 1996 | EP |
0772335 | May 1997 | EP |
0829996 | Mar 1998 | EP |
0855826 | Jul 1998 | EP |
0863651 | Sep 1998 | EP |
0866407 | Sep 1998 | EP |
899673 | Mar 1999 | EP |
998108 | May 2000 | EP |
1091307 | Apr 2001 | EP |
1150236 | Oct 2001 | EP |
2273418 | Jun 1994 | GB |
2290192 | Dec 1995 | GB |
WO 9607141 | Mar 1996 | WO |
WO 9728635 | Aug 1997 | WO |
WO 9856207 | Dec 1998 | WO |
Entry |
---|
Ahmed, Sarah, “A Scalable Byzantine Fault Tolerant Secure Domain Name System,” thesis submitted to Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, Jan. 22, 2001, 101 pages. |
Avaya, Inc. Business Advocate Options, at http://www.avaya.com, downloaded on Feb. 15, 2003, Avaya, Inc. 2003. |
Avaya, Inc. Business Advocate Product Summary, at http://www.avaya.com, downloaded on Feb. 15, 2003, Avaya, Inc. 2003, 3 pages. |
Avaya, Inc. CentreVu Advocate, Release 9, User Guide, Dec. 2000. |
Avaya, Inc., “Better Implementation of IP in Large Networks,” Avaya, Inc. 2002, 14 pages. |
Avaya, Inc., “The Advantages of Load Balancing in the Multi-Call Center Enterprise,” Avaya, Inc., 2002, 14 pages. |
Avaya, Inc., “Voice Over IP Via Virtual Private Networks: An Overview,” Avaya, Inc., Feb. 2001, 9 pages. |
Bellsouth Corp., “Frequently Asked Questions—What is a registrar?,” available at https://registration.bellsouth.net/NASApp/DNSWebUI/FAQ.jsp, downloaded Mar. 31, 2003, 4 pages. |
Chavez, David, et al., “Avaya MultiVantage Software: Adapting Proven Call Processing for the Transition to Converged IP Networks,” Avaya, Inc., Aug. 2002. |
Coles, Scott, “A Guide for Ensuring Service Quality in IP Voice Networks,” Avaya, Inc., 2002, pp. 1-17. |
Dawson, “NPRI's Powerguide, Software Overview” Call Center Magazine (Jun. 1993), p. 85. |
Doo-Hyun Kim et al. “Collaborative Multimedia Middleware Architecture and Advanced Internet Call Center,” Proceedings at the International Conference on Information Networking (Jan. 31, 2001), pp. 246-250. |
E. Noth et al., “Research Issues for the Next Generation Spoken”: University of Erlangen-Nuremberg, Bavarian Research Centre for Knowledge-Based Systems, at http://www5.informatik.uni-erlangen.de/literature/psdir/1999/Noeth99:RIF.ps.gz, printed Feb. 10, 2003; 8 pages. |
Foster, Robin, et al., “Avaya Business Advocate and its Relationship to Multi-Site Load Balancing Applications,” Avaya, Inc., Mar. 2002, 14 pages. |
Geotel Communications Corporation Web site printout entitled “Intelligent CallRouter Optimizing the Interaction Between Customers and Answering Resources.”, 1998, 6 pages. |
John H.L. Hansen and Levent M. Arsian, Foreign Accent Classification Using Source Generator Based Prosodic Features, IEEE Proc. ICASSP, vol. 1, pp. 836-839, Detroit USA (May 1995). |
L.F. Laurel and J.L. Gauvain, Language Identification Using Phone-Based Acoustic Likelihood, ICASSP-94, date unknown; 4 pages. |
Levent M. Arsian and John H.L. Hansen, Language Accent Classification in American English, Robust Speech Processing Laboratory, Duke University Department of Electrical Engineering, Durham, NC, Technical Report RSPL-96-7, revised Jan. 29, 1996. pp. 1-16. |
Levent M. Arsian, Foreign Accent Classification in American English, Department of Electrical Computer Engineering, Duke University, Thesis, pp. 1-200 (1996). |
MIT Project Oxygen, Pervasive, Human-Centered Computing (MIT Laboratory for Computer Science) (Jun. 2000) pp. 1-15. |
Presentation by Victor Zue, The MIT Oxygen Project, MIT Laboratory for Computer Science (Apr. 25-26, 2000) 9 pages. |
Stevenson et al.; “Name Resolution in Network and Systems Management Environments”; http://netman.cit.buffalo.edu/Doc/DStevenson/NR-NMSE.html; printed Mar. 31, 2003; 16 pages. |
“Applications, NPRI's Predictive Dialing Package,” Computer Technology (Fall 1993), p. 86. |
“Call Center Software You Can't Outgrow,” Telemarketing® (Jul. 1993), p. 105. |
“Domain Name Services,” available at http://www.pism.com/chapt09/chapt09.html, downloaded Mar. 31, 2003, 21 pages. |
“eGain's Commerce 2000 Platform Sets New Standard for eCommerce Customer Communications,” Business Wire (Nov. 15, 1999)., 3 pages. |
“Internet Protocol Addressing,” available at http://samspade.org/d/ipdns.html, downloaded Mar. 31, 2003, 9 pages. |
“Product Features,” Guide to Call Center Automation, Brock Control Systems, Inc., Activity Managers Series™, Section 5—Company B120, p. 59, 1992. |
“Product Features,” Guide to Call Center Automation, CRC Information Systems, Inc., Tel-ATHENA, Section 5—Company C520, p. 95, 1992. |
“VAST™, Voicelink Application Software for Teleservicing®,” System Manager User's Guide, Digital Systems (1994), pp. ii, vii-ix, 1-2, 2-41 through 2-77. |
“When Talk Isn't Cheap,” Sm@rt Reseller, v. 3, n. 13 (Apr. 3, 2000), p. 50. |
Definity Communications System Generic 3 Call Vectoring/Expert Agent Selection (EAS) Guide, AT&T publication No. 555-230-520 (Issue 4, Sep. 1995). |
Background of the above-captioned application (previously provided). |
“Avaya IP Telephony Implementation Guide,” Communication Manager 3.0, Avaya Labs, 2005, 78 pages. |
TMCnet: On the Web, Jan. 26, 2008, available at https://web.archive.org/web/20080126235650//http:/www.tmcnet.com/, 2 pages. |
Workforce Management: information on employment law, human resource development, Oct. 26, 2008, available at https://web.archive.org/web/20071026100342/http://workforce.com/, 3 pages. |