Abstract:
Methods for dynamically switching communications to text interactions are provided. In one example, a method includes the steps of receiving a phone call and determining a voice queue wait time exceeds a predetermined threshold. The phone call is routed to a speech-to-text queue based on the determination, and an audio signal associated with the phone call is converted to an instant message interaction.
Abstract:
Methods for dynamically switching communications to text interactions are provided. In one example, a method includes the steps of receiving a phone call and determining a voice queue wait time exceeds a predetermined threshold. The phone call is routed to a speech-to-text queue based on the determination, and an audio signal associated with the phone call is converted to an instant message interaction.
Abstract:
A system and method are presented for key management and user authentication. Secure SSH access may be performed through a public/private set of SSH keys where a user uploads a public SSH key to a key management application. The private SSH key remains with a device associated with a user. The public SSH key is distributed across multiple regions to instances and is region agnostic. Public SSH keys may be distributed and synchronized in a large cloud computing environment where public SSH keys associated with users may be added or removed in order to rebuild system security.
Abstract:
A system and method are presented for key management and user authentication. Secure SSH access may be performed through a public/private set of SSH keys where a user uploads a public SSH key to a key management application. The private SSH key remains with a device associated with a user. The public SSH key is distributed across multiple regions to instances and is region agnostic. Public SSH keys may be distributed and synchronized in a large cloud computing environment where public SSH keys associated with users may be added or removed in order to rebuild system security.
Abstract:
Methods for dynamically switching communications to text interactions are provided. In one example, a method includes the steps of receiving a phone call and determining a voice queue wait time exceeds a predetermined threshold. The phone call is routed to a speech-to-text queue based on the determination, and an audio signal associated with the phone call is converted to an instant message interaction.
Abstract:
Methods for enhancing call experiences through personal rules are provided. In one example, a method includes the steps of receiving a phone call and caller identification information associated with the phone call and routing the phone call to an interactive voice response system. A caller profile is developed based on a comparison of the caller identification information and one or more data stores. The caller profile is matched with a predetermined personal rule, and a dynamic message is generated in the interactive voice response system based on the matching predetermined personal rule.