Shared VRU. A Key Link in Your Customer Service Chain Kyle Shadday, Director, Voice Response Strategy
|
|
- Gerald King
- 8 years ago
- Views:
Transcription
1 Shared VRU A Key Link in Your Customer Service Chain Kyle Shadday, Director, Voice Response Strategy
2 Agenda Voice response within FIS Telephone banking today FIS shared VRU roadmap Speech recognition Unleash the power of the human voice Speaker verification The case for stronger authentication Take a test drive Questions and answers 2
3 Voice Response within FIS
4 The Reach of FIS ebanking Multi-Channel Sales and Service Multi-channel care incorporates the telephone, call center, , chat, online and branch Customers expect consistency in service across channels automated and live Full range of banking capabilities is expected in every channel Increasing expectations for integration across channels Consumer 4
5 Telephone Banking Today
6 Telephone Banking Factors to Consider Call Volume Trends Increase Services In-House or Outsource Reduce Expenses Reliability/Availability Analog / Digital / VoIP Contact Center Branding Wasn t Internet Banking supposed to replace Telephone Banking? Will Mobile Banking replace Telephone Banking? Regulatory Updates Caller Experience Multi-Factor Authentication Ongoing Enhancements Multi-Language Support Speech Recognition 6
7 FIS Shared VRU Call Volume Trends Filtered for clients with activity from 2007 to present Jan 07 Mar 07 May 07 Jul 07 Sep 07 Nov 07 Jan 08 Mar 08 May 08 Jul 08 Sep 08 Nov 08 Jan 09 Mar 09 May 09 Jul 09 Sep 09 Nov 09 Jan 10 Mar 10 7
8 FIS Shared VRU Call Volume Trends Filtered for Clients with Activity from 2007 to Present Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec 8
9 FIS Shared VRU Call Volume Trends 2009 Client Call Volume 30K to 90K calls per month 100,000 90,000 80,000 70,000 60,000 50,000 40,000 30,000 20,000 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec 9
10 FIS Shared VRU Roadmap
11 FIS Shared VRU 230+ shared VRU clients Handle approximately 3.0M calls per month Capacity to handle spikes in call volume (tax time, holidays, etc.) Disaster recovery built into the infrastructure Active-active strategy Production traffic handled by production and DR facilities Support for multiple telephony options Traditional toll-free, outbound VoIP and full VoIP 11
12 FIS Shared VRU Defined product roadmap Core banking DTMF Core banking speech premium offering beginning Q Speaker verification premium offering beginning Q Configurable via selectable options and parameter settings Professional services are available Integrated to core using e-delivery (ConnectWare) Integrated with BIC for statistical reporting 12
13 FIS Shared VRU FIS maintains competency Voice response, speech recognition and voice authentication technology FIS owns and maintains the infrastructure Hardware, licensing, maintenance Partnered with industry leaders Convergys and Nuance Dedicated development and 2 nd tier support staff On-premise deployment is also available 13
14 FIS Shared VRU Topology Traditional Traditional Toll-Free Toll-Free provided by FIS leveraging AT&T Callers are transferred to contact center via AT&T when additional assistance is required. 14
15 FIS Shared VRU Topology Outbound VoIP Full VoIP Toll-Free provided by client Calls received at client location Communication with FIS via VoIP Gateway (inbound / outbound) 15
16 FIS Shared VRU Topology Full VoIP Full VoIP Toll-Free provided by client Calls received at client location Communication with FIS via VoIP Gateway (inbound / outbound) 16
17 FIS Shared VRU Product Roadmap Touchtone
18 FIS Shared VRU Product Roadmap Touchtone Goals for 2010 Enhance the FIS Shared VRU framework and refresh the caller experience Q2 scheduled and planned projects Core Banking DTMF Certification CTI Integration Framework Reg E 18
19 FIS Shared VRU Product Roadmap Touchtone Q3 planned and candidate projects Core banking DTMF release - (GA) Begin VRU framework migration project ATM / branch locator Rate enhancements Q4 planned and candidate projects Complete VRU framework migration project Strengthen PIN based authentication Intraday cardbase activity 19
20 FIS Shared VRU Product Roadmap Speech Recognition
21 FIS Shared VRU Product Roadmap Speech Recognition Goals for 2010 Deliver a Speech Recognition VRU offering leveraging the new FIS Shared VRU Framework Q1 completed projects Core Banking Speech Tuning Review Phase 1 Q2 scheduled and planned projects Core banking speech tuning recommendations phase 1 CTI integration framework Reg E Shortcuts Barge-in Confidence based confirmation 21
22 FIS Shared VRU Product Roadmap Speech Recognition Q3 planned and candidate projects Core banking speech tuning phase 2 Core banking speech release (GA) ATM / branch locator Rate enhancements Q4 planned and candidate projects Strengthen PIN based authentication Intraday cardbase activity 22
23 FIS Shared VRU Roadmap Speaker Verification
24 FIS Shared VRU Product Roadmap Speaker Verification Goals for 2010 Deliver a speech speaker verification solution to provide enhanced security and true multi-factor authentication via the VRU Q1 completed projects Speaker verification tuning review phase 1 Q2 scheduled and planned projects Speaker verification tuning recommendations phase 2 Leverage phone numbers in CIS DB for authentication Q3 planned and candidate projects Speaker verification tuning phase 2 Speaker verification (GA) 24
25 Speech Recognition Unleash the Power of the Human Voice
26 Why Consider Speech Recognition? The evolution of the phone has made the human voice a more user-friendly interface. Bans and restrictions on texting and cell phone use while driving (Governors Highway Safety Association April 2010) 21 states have banned texting while driving 6 states have banned hand-held cell phone use while driving Many local governments are restricting use as well 26
27 Why Consider Speech Recognition? Advancement of speech recognition technology Recognition rates have greatly improved Tools, standards and techniques have evolved World Wide Web Consortium (W3C) - XML, VXML, SCXML, CCXML, MRCP, etc. Caller expectations are better understood Call containment rates within the VRU have increased Limits the number of callers transferring to live agents Some features are limited or not feasible with touchtone Speech-enabled bill pay (when coupled with multi-factor authentication) 27
28 How Well Does Speech Recognition Work? Type of order? Pickup What station? Temple What time? 13:30 hours Track number? 105 How many cars? Nine First car? BNSF And the last car? CN Position? At end 28
29 Why FIS Speech Recognition? Built upon the FIS shared VRU framework Regulatory changes and enhancements Customization opportunities FIS maintains competency Speech technology FIS maintains infrastructure Hardware, licensing, maintenance Partnered with industry leaders Convergys and nuance 29
30 Speaker Verification The Case for Stronger Authentication
31 The Case for Stronger Authentication Privacy concerns with using Social Security Number Negatively viewed by a growing number of customers States limiting usage of SSN / TIN as form of identification Identify Theft continues to be a threat FFIEC Guidance Authentication in an Internet Banking Environment Current authentication methods limit new features Movement of money outside of banking relationship Limitations may become more stringent 31
32 Identity Theft Continues to Rise The Bad News Number of victims increased 12.1% Annual fraud amount increased 12.5% The Good News Average fraud amount remained steady Mean consumer cost decreased 25% $800 $600 $400 $200 $- US Adult Victims of Identity Fraud (Millions) Mean Consumer Cost Identify Fraud Survey Report February
33 The FFIEC and Multi-Factor Authentication Authentication in an Internet Banking Environment Issued August 8, 2001 The Agencies caution financial institutions that single factor authentication alone may not be commercially reasonable or adequate for high risk applications and transactions, instead, multifactor techniques may be necessary Update issued October 12, 2005 The Agencies consider single-factor authentication, as the only control mechanism, to be inadequate for high-risk transactions involving access to customer information or the movement of funds to other parties Issued August 15, 2006 Does the guidance apply to telephone banking systems? While the guidance focuses on Internet banking systems, its principles apply to all forms of electronic banking, including telephone banking systems. Does the guidance apply to call centers? The principles of the guidance apply if a financial institution permits high-risk services to be performed through its call center 33
34 Multi-Factor Authentication How Speaker Verification Can Help Something the user knows Account information Personal identification number Challenge question and response Something the user has Automatic number identification (ANI) the caller s telephone number Something the user is Voice biometrics and voice verification 34
35 What is Speaker Verification? Leading edge technology Allows for automated verification of a caller s identity based on unique voice characteristics by comparing a speech utterance with a known, existing voice print captured during an enrollment process Voice print is an encrypted, digital representation of the caller s unique voice characteristics it is not a recorded.wav file Immune to playback attacks and mimics Not affected by colds or other voice-altering conditions Technology is secure, tuning is key Requires consumer education Acceptance is growing as identity theft and concerns over privacy increase If you have doubts over customer acceptance, consider a customer survey before implementation 35
36 FIS Speaker Verification Enrollment First time users must complete an enrollment process Enrollment First time authentication leverages traditional authentication Account number and PIN Phone number lookup performed Repeat a sequence of digits (three times) Register a hint and response For use as additional verification step if future authentication is suspect If enrollment is successful, spoken digits are translated into a digital voiceprint and stored in an encrypted format it s not a recording 36
37 FIS Speaker Verification Authentication Authentication after Successful Enrollment A phone number lookup is performed. If not provided, the caller is prompted for their phone number The caller speaks a requested sequence of digits If the verification step meets acceptable thresholds, the caller is authenticated and may proceed with the call Additional steps may be required if authentication score falls below acceptable thresholds Multiple callers with the same registered phone number are handled 37
38 Why FIS Speaker Verification? Integrated with the FIS Shared VRU Framework FIS maintains competency Speech technology and voice biometrics FIS maintains infrastructure Hardware, licensing, maintenance Partnered with the industry leader Nuance 38
39 Take a Test Drive 39
40 We Invite You to Take a Test Drive We invite you to try our Demo system at your convenience If you are interested in, please leave a business card leave your contact information send an to kyle.shadday@fisglobal.com Your feedback is appreciated 40
41 Thank You Kyle Shadday
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationVoice biometrics. Advait Deshpande. 2002-2013 Nuance Communications, Inc. All rights reserved. Page 1
Voice biometrics Advait Deshpande 2002-2013 Nuance Communications, Inc. All rights reserved. Page 1 Imagine a world without PINS/Passwords 2002-2013 Nuance Communications, Inc. All rights reserved. Page
More informationCase 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
More informationAnalysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
More informationVoice Authentication On-Demand: Your Voice as Your Key
Voice Authentication On-Demand: Your Voice as Your Key Paul Watson, Vice President Relationship Technology Management Voice Search Conference March 2-4, 2009 Convergys Corporation A Global Leader in Relationship
More informationcustomer care solutions
customer care solutions from Nuance enterprise white paper :: Voice Biometrics Industry Solutions Overview Nuance s voice biometrics products are designed to meet the dynamic security needs of the world
More informationEnhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
More informationMeasuring Performance in a Biometrics Based Multi-Factor Authentication Dialog. A Nuance Education Paper
Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog A Nuance Education Paper 2009 Definition of Multi-Factor Authentication Dialog Many automated authentication applications
More informationCAFIS REPORT 2015.10
CAFIS REPORT 2015.10 INDEX Message CAFIS Inbound 03-06 07-08 CAFIS Arch 09-10 CAFIS Brain 11-12 CAFIS Global 13-14 What We Do 15-16 About CAFIS 17-18 Services for Member Stores 19-34 Services for Card
More informationConsumer ID Theft Total Costs
Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially
More informationManaging Open Source Code Best Practices
Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate
More informationOpen Source Solution for IVI: Tizen IVI. Brett Branch Tizen IVI Product Marketing
Open Source Solution for IVI: Tizen IVI Brett Branch Tizen IVI Product Marketing Agenda The Connected Car ecosystem Connected Car Usages what drives us? Key Requirements Tizen in Automotive Open Standards
More informationVoice Processing Standards. Mukesh Sundaram Vice President, Engineering Genesys (an Alcatel company)
Voice Processing Standards Mukesh Sundaram Vice President, Engineering Genesys (an Alcatel company) Agenda Interactive Voice Response Speech Processing Computer Telephony Integration IP Telephony Standards
More informationcustomer care solutions
Your BANK Account balance: $2,345 Next payment due: 1/30/09 customer care solutions from Nuance Is it Time to Transform Your Contact Center? Migrate your Legacy IVR to Drive Your Bottom Line executive
More informationUsing Service Oriented Architecture (SOA) for Speaker-Biometrics Applications
Using Service Oriented Architecture (SOA) for Speaker-Biometrics s Ken Rehor & Judith Markowitz Co-chairs Speaker Biometrics Committee Forum Biometrics in Web Services Biometric Consortium 2006 Baltimore,
More information12 months 4 quarters 1 goal
12 months 4 quarters 1 goal You know you need to whip your digital marketing game into shape. But you also know budgets are tight. If you're ready to take your online marketing to the next level without
More informationARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS
ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS ImpostorMaps is a methodology developed by Auraya and available from Auraya resellers worldwide to configure,
More informationPursuing Compliance with the FFIEC Guidance Risk Assessment 101 KPMG RISK ADVISORY SERVICES
Pursuing Compliance with the FFIEC Guidance Risk Assessment 101 KPMG RISK ADVISORY SERVICES Contents PART I An Increasing Threat: Identity Theft The FFIEC Response Risk Assessment Fundamentals The FFIEC
More informationAUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
More informationFFIEC CONSUMER GUIDANCE
FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their
More informationIntelligent Contact Management with. Flexible cloud services from VoltDelta. Contact centre Self service Customer insight
R Intelligent Contact Management with Flexible cloud services from VoltDelta >> >> >> Contact centre Self service Customer insight Contact centre out of the cloud Intelligently manage every contact channel
More informationOPERATIONS SERVICE UPDATE
OPERATIONS SERVICE UPDATE EXECUTIVE SUMMARY Policy Processing At the June 24 Citizens Board of Governors meeting, Staff committed to achieving year end policy processing service goals by September 1, 24.
More informationcustomer care solutions
customer care solutions from Nuance case study :: Invesco Trimark Provides Personalized Service Using a Nuance Voice Verification Solution for Caller Identification and Authentication NUANCE :: customer
More informationAshley Institute of Training Schedule of VET Tuition Fees 2015
Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-
More informationIT S ALL ABOUT THE CUSTOMER FORECASTING 101
IT S ALL ABOUT THE CUSTOMER FORECASTING 101 Ed White CPIM, CIRM, CSCP, CPF, LSSBB Chief Value Officer Jade Trillium Consulting April 01, 2015 Biography Ed White CPIM CIRM CSCP CPF LSSBB is the founder
More informationChoosing a Cell Phone Plan-Verizon
Choosing a Cell Phone Plan-Verizon Investigating Linear Equations I n 2008, Verizon offered the following cell phone plans to consumers. (Source: www.verizon.com) Verizon: Nationwide Basic Monthly Anytime
More informationContact Center Automation
Frequently Asked Questions on Contact Center Automation Summary Uniphore Software Systems, a pioneer in providing voice-based mobility solutions has integrated its Contact Center Automation solutions to
More informationSEO Presentation. Asenyo Inc.
SEO Presentation What is Search Engine Optimization? Search Engine Optimization (SEO) : PPC and Organic Results Pay Per Click Ads The means of achieving top search engine results without having to incur
More information2015-16 BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun 29 30 Jul 1 2 3. Full Force Calc
July 2015 CM Period 1501075 July 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 August 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
More informationReacting to the Challenges: Business Strategies for Future Success. Todd S. Adams, Chief Executive Officer Adams Bank & Trust Ogallala, Nebraska
Reacting to the Challenges: Business Strategies for Future Success Todd S. Adams, Chief Executive Officer Adams Bank & Trust Ogallala, Nebraska Adams Bank & Trust Family Owned for 95 Years $525 Million
More informationPowerSteering Product Roadmap Your Success Is Our Bottom Line
Drive strategy. Accelerate results. cloud-based program & portfolio management software PowerSteering Product Roadmap Your Success Is Our Bottom Line Jay Hoskins Director of Product Management PowerSteering
More informationHitachi ID Password Manager Telephony Integration
Hitachi ID Password Manager Telephony Integration 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Functional integration 2 2.1 Self-service password reset....................................
More informationHere are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online.
Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online. FFIEC BUSINESS ACCOUNT GUIDANCE New financial standards will assist credit
More informationCENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR
JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf
More informationIVR CRM Integration. Migrating the Call Center from Cost Center to Profit. Definitions. Rod Arends Cheryl Yaeger BenchMark Consulting International
IVR CRM Integration Migrating the Call Center from Cost Center to Profit Rod Arends Cheryl Yaeger BenchMark Consulting International Today, more institutions are seeking ways to change their call center
More informationSpeech-Enabled Interactive Voice Response Systems
Speech-Enabled Interactive Voice Response Systems Definition Serving as a bridge between people and computer databases, interactive voice response systems (IVRs) connect telephone users with the information
More informationCommittee of the Whole. January 22, 2014
Committee of the Whole January 22, 2014 Drivers for 2003 IT Outsourcing Cost savings - privatization model ($2- $3MM/year) Cost avoidance Data center lease with County expiring ($3.5MM) Disaster recovery
More informationAgenda. Introduction Terry Othick, 2 min. Project Overview and Budget...Steve Garcia, 4 min. Project Objectives and Goals Tomas Taylor, 4 min.
Agenda Introduction Terry Othick, 2 min. Project Overview and Budget...Steve Garcia, 4 min. Project Objectives and Goals Tomas Taylor, 4 min. IV & V...Terry Othick, 5 min. Current IVR System Received a
More informationVoice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India rahulrsharma999@gmail.com Abstract: Voice authentication system captures the
More informationMitel MiContact Center Enterprise & Business
Mitel MiContact Center Enterprise & Business For The MiVoice Business Platform Strengthen customer relationships while protecting the bottom line Your contact center is the primary interface to your organization,
More informationWhat does it take to deliver the most technologically advanced Games ever?
What does it take to deliver the most technologically advanced Games ever? Enzo Sacco, Quang Tu October 20, 2015 Purpose of today s session To share our experiences and lessons learned in securing the
More informationImproving the Customer Experience for Utilities Consumers Lowering Costs for a Strategic Imperative
Improving the Customer Experience for Utilities Consumers Lowering Costs for a Strategic Imperative INTRODUCTION Across the utilities industry, several factors are making customer service a strategic priority
More informationSTATE OF THE IVR: INDUSTRY EXPERTS WEIGH IN Insights and best practices for getting the most out of your IVR interactions.
tech line / nov 2013 STATE OF THE IVR: INDUSTRY EXPERTS WEIGH IN Insights and best practices for getting the most out of your IVR interactions. By Ken Barton, Strategic Contact Inc. Pipeline Articles www.contactcenterpipeline.com
More informationWalton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit
Page 1 Walton Centre Monitoring & Audit Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt Page 2 Table of Contents Section Contents 1 Introduction 2 Responsibilities Within This
More informationVoice XML: Bringing Agility to Customer Self-Service with Speech About Eric Tamblyn Voice XML: Bringing Agility to Customer Self-Service with Speech
Voice XML: Bringing Agility to Customer Self-Service with Speech Author: Eric Tamblyn, Director of Voice Platform Solutions Engineering, Genesys Telecommunications Laboratories, Inc. About Eric Tamblyn
More informationProposal to Reduce Opening Hours at the Revenues & Benefits Coventry Call Centre
Proposal to Reduce Opening Hours at the Revenues & Benefits Coventry Call Centre Proposal To change the opening hours of the Revenues & Benefits Call Centre to 9am until 5pm Monday to Friday with effect
More informationPerkhidmatan Kerajaan Pintar : Meningkatkan Kepuasan Pelanggan
Perkhidmatan Kerajaan Pintar : Meningkatkan Kepuasan Pelanggan 14 th Oct 2014 AUDITORIUM A, TINGKAT 5, KOMTAR Penang By Chan Kee Siak, CEO of Exabytes Questionnaires : ) How many of you are in IT Function?
More informationUnderstanding It s Me 247 Security. A Guide for our Credit Union Clients and Owners
Understanding It s Me 247 Security A Guide for our Credit Union Clients and Owners October 2, 2014 It s Me 247 Security Review CU*Answers is committed to the protection of you and your members. CU*Answers
More informationBuilding an Effective Roadmap
Building an Effective Roadmap Jason Tanner Senior Consultant, Enthiosys Motivated from Within Thank you to our sponsors 2 Agenda What is an effective roadmap? What are roadmap benefits? Why do roadmaps
More information10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
More informationAvaya Media Processing Server 500
Avaya Media Processing Server 500 Set new standards for superior customer service Processing Server 500 can be a vital component of your self-service strategy. As a business evolves, increasing demands
More informationWhite Paper. Speech-enabled applications can provide better customer service at 1/12th the cost of live agents. Nuance. Speech. Understanding. Action.
White Paper 1005 Hamilton Court Menlo Park, CA 94025 Phone 650.847.0000 Fax 650.847.7979 www.nuance.com Speech-enabled applications can provide better customer service at 1/12th the cost of live agents
More informationOregon s Experience Accepting Online Credit and Debit Payments
Oregon s Experience Accepting Online Credit and Debit Payments Statistical Charts and Examples Page 1 of 8 How Oregon s Case Validation Works Semi-Technical Speak As part of their process, a vendor using
More informationDescription: Objective: Upon completing this course, the learner will be able to meet these overall objectives:
Course: Deploying Cisco Unified Contact Center Express Software v9.0 Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,695.00 Learning Credits: 37 Description: Deploying Cisco Unified Contact Center
More information6 Months ending December 2009 Do some of the preliminary work. Set up work teams. Set up control mechanisms. Securities systems.
SADC Payment System Integration Roadmap and Constraints Tim Masela 19 August 2011 Protea Balalaika Hotel, Sandton, South Africa SADC Payment System Project Project Vision Each SADC country has : An efficient
More informationDeploying Cisco Unified Contact Center Express - Digital
Course Code: CUCCX Vendor: Cisco Course Overview Duration: 5 RRP: 2,396 Deploying Cisco Unified Contact Center Express - Digital Overview This course provides you with hands-on experience and knowledge
More information2014 Direct Drive, Inc. All rights reserved.
2014 Direct Drive, Inc. All rights reserved. Overview Direct Drive offers a complete range of capabilities with IVR speech and touchtone recognition, and blended agent / IVR hybrid solutions customized
More informationCouncil, 6 February 2014. IT Report. Executive summary and recommendations. Introduction
Council, 6 February 2014 IT Report Executive summary and recommendations Introduction The report sets out the main activities of the IT Department since the last meeting of Council. It includes statistical
More informationSpecialty Answering Service. All rights reserved.
0 Contents 1 Abstract... 2 2 About ACD & Its Relationship with Call Centers... 3 2.1 How ACD Software Routes Calls Based on Topic... 3 2.2 How ACD Reduces Operator Talk Time... 3 3 ACD and Call Reporting...
More informationAutomatic Speaker Verification (ASV) System Can Slash Helpdesk Costs
Solutions White Paper Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs Table of Contents Executive Summary............................. 1 Business Challenge.............................
More informationRBC Insurance Fetes Online Auto/Home Insurance Growth
Case Studies, K. Harris Research Note 29 October 2002 RBC Insurance Fetes Online Auto/Home Insurance Growth RBC Insurance's e-business successes are generating greater than $3 million in premiums per month.
More informationV O C A L C O M H E R M E S I V R. H e r m e s I V R. I n t e r a c t i v e V o i c e R e s p o n s e
H e r m e s I V R I n t e r a c t i v e V o i c e R e s p o n s e W h a t i s I V R? IVR stands for Interactive Voice Response and it uses one of the most widely accepted and versatile devices Available
More informationIAMUCLA 2.0 SSO Updates
IAMUCLA 2.0 SSO Updates Common Systems Group Meeting July 27, 2015 IAMUCLA 2.0 Projects Password Security Concerns Technology Evolution Health Systems SSO Support Departmental/Service Accounts Testing
More informationWhite Paper. FFIEC Authentication Compliance Using SecureAuth IdP
White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by
More informationCenters of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of
More information- 2013 FINANCIAL INDUSTRY TRENDS REPORT - Cashing in on the Customer Experience: 7 Steps to Revolutionize Your Bank s Customer Service Strategy
Cashing in on the Customer Experience: 7 Steps to Revolutionize Your Bank s Customer Service Strategy Financial institutions must take action to adapt to a post-crisis era. Banks and credit unions face
More informationCisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
More informationDeploying Cisco Unified Contact Center Express Volume 1
Deploying Cisco Unified Contact Center Express Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional References Your Training Curriculum General Administration
More informationSigMo Platform based approach for automation of workflows in large scale IT-Landscape. Tarmo Ploom 2/21/2014
SigMo Platform based approach for automation of workflows in large scale IT-Landscape 2/21/2014 Agenda Starting situation Problem Solution variants Friction of project based approach Platform approach
More informationInterest Rates. Countrywide Building Society. Savings Growth Data Sheet. Gross (% per annum)
Interest Rates (% per annum) Countrywide Building Society This is the rate of simple interest earned in a year (before deducting tax). Dividing by 12 gives the monthly rate of interest. Annual Equivalent
More informationCustom Software Development Portfolio. Innovation Collaboration Evolution Results
Phonecierge SOFTEL Verifier First Responder Innovation Collaboration Evolution Results Bespoke Custom Software Portfolio SOFTEL Communications Complete Customized Software Services Designing software that
More informationP/T 2B: 2 nd Half of Term (8 weeks) Start: 24-AUG-2015 End: 18-OCT-2015 Start: 19-OCT-2015 End: 13-DEC-2015
2015-2016 SPECIAL TERM ACADEMIC CALENDAR For Scranton Education Online (SEOL), Masters of Business Administration Online, Masters of Accountancy Online, Health Administration Online, Health Informatics
More informationCONTACT CENTER SOLUTIONS
BROCHURE CONTACT CENTER SOLUTIONS STRENGTHEN CUSTOMER RELATIONSHIPS WHILE PROTECTING THE BOTTOM LINE. Your contact center is the primary interface to your organization, for your most valuable asset your
More informationELECTRONIC AUTHENTICATION. Understanding the New. Multi-factor authentication and layered security are
Understanding the New ELECTRONIC AUTHENTICATION Multi-factor authentication and layered security are helping assure safe Internet transactions for credit unions and their members. Assuring Your Online
More informationDate updated: Nov. 30, 2012
Landon State Office Building Phone: 785-296-3981 900 SW Jackson Street, Room 900-N Fax: 785-296-4813 Topeka, KS 66612 www.kdheks.gov/hcf/ Robert Moser, MD, Secretary Kari Bruffett, Director Sam Brownback,
More informationBuying Guide: On-Demand vs. On-Premise IVR Systems
White Paper Buying Guide: On-Demand vs. On-Premise IVR Systems Selecting a Deployment Platform for Voice-Based Services NOVEMBER 2008 1310 Villa Street Mountain View, CA 94041 T: 650.930.9000 clients@tellme.com
More informationI. Application Development
Best Practices This document contains adapted portions of a document developed by the VoiceXML Forum Speaker Biometrics Committee (2008). The document uses a FAQ approach. I. Application Development A
More informationMoving a Call Center to the Cloud
Moving a Call Center to the Cloud Arthur Brant Director, Enterprise Infrastructure Abilene Christian University Abilene Christian University Master s Level Private Residential University 4,500 Students
More informationPhishing with Asterisk PBX
Phishing with Asterisk PBX Agenda Background The Concept: Our Phishing Technique The Tools Basic Monitoring Technique Building Blocks Advanced Phishing PBX System Preventing PBX Phishing Background Why
More information8x8 Virtual Contact Center
8x8 8x8 services include: Multimedia contact management including phone, chat, email, voicemail, and third-party Internet fax Powerful, easy to use hosted call center solution 8x8 is a hosted call center
More informationCisco IOS Voice XML Browser
Cisco IOS Voice XML Browser Cisco Unified Communications is a comprehensive IP communications system of voice, video, data, and mobility products and applications. It enables more effective, more secure,
More informationOutsource or Excellence?
Path to IT Effectiveness: Outsource or Excellence? David Boyles Group Managing Director, Technology and Services ANZ Banking Group Limited 1 st March 2002 2002 Financial Services CIO Summit Today s agenda
More informationContact Center Solutions
OVERVIEW MITEL Contact Center Solutions Strengthen Customer Relationships While Protecting the Bottom Line Your contact center is the primary interface to your organization, for your most valuable asset
More informationTelecom Market Highlights Regulatory Perspectives
Telecom Market Highlights Regulatory Perspectives Dr. Amr Badawi Executive President Outline Convergence Re-Structuring Broadband Challenges of Restructuring Broadband WiMAX VOIP Market Overview Fixed
More informationCall Center Glossary. Call Center Resources
Call Center Resources Call Center Glossary after-call work (ACW) The work that an agent completes after a call ends. It can include entering activity codes, completing forms or sending an outbound communication.
More informationKNOWLEDGE-BASED AUTHENTICATION USE CASE EBOOK
KNOWLEDGE-BASED AUTHENTICATION USE CASE EBOOK Learn about the many ways in which organizations like yours are using dynamic knowledge-based authentication to protect their customers and streamline business
More informationNHS BLOOD AND TRANSPLANT MARCH 2009 RESPONDING EFFECTIVELY TO BLOOD DONOR FEEDBACK
09/26 NHS BLOOD AND TRANSPLANT MARCH 2009 RESPONDING EFFECTIVELY TO BLOOD DONOR FEEDBACK EXECUTIVE SUMMARY From April 2009 an NHS wide common approach to complaint handling comes in to effect. This provides
More informationBT Retail Social Media making it easy for our customers
BT Retail Social Media making it easy for our customers Dawn Walton, GM Central Planning Nigel Elliott, Social Media Channel Manager Kerry Gulloch, Social Media Communities Manager Agenda o How we ended
More informationSIP-Based Solutions in the Contact Center: Using Dialogic Media Gateways with the Genesys Voice Platform
-Based Solutions in the Contact Center: To stay competitive and keep their customers happy and loyal, companies are working hard to enhance customer service as costeffectively as possible. Contact centers
More informationUsing Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment
Using Voice Biometrics in the Call Center Best Practices for Authentication and Anti-Fraud Technology Deployment This whitepaper is designed for executives and managers considering voice biometrics to
More informationTHE FFIEC CHALLENGE A Call for Reliable Authentication
THE FFIEC CHALLENGE A Call for Reliable Authentication March 14, 2006 ISACA LOS ANGELES RISK ADVISORY SERVICES INFORMATION RISK MANAGEMENT Agenda The FFIEC Challenge Current/Future Authentication Scenarios
More informationQUICK FACTS. Establishing a Telephony Service Desk System to Enhance Telecommunications Support. TEKsystems Global Services Customer Success Stories
[ Retail, Support Services ] TEKsystems Global Services Customer Success Stories Client Profile Industry: Retail Revenue: $50.7 billion Employees: Approximately 167,000 Geographic Presence: Headquartered
More informationLong Term Data Center Facilities Program
Long Term Data Center Facilities Program ISAC Briefing December 2012 Overview: The Long Term Data Center Facilities Program is an initiative of the approved data center strategic plan to consolidate Citizens
More informationSchools Interoperability Framework (SIF) Project Overview
Schools Interoperability Framework (SIF) Project Overview Agenda Introductions Quick review of past successes and challenges Overview of refined strategy Timeline Questions and answers 2 Review of Past
More informationComputing & Telecommunications Services Monthly Report March 2015
March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex helpdesk@wright.edu www.wright.edu/cats/ Last Modified
More informationSpeaker Identification and Verification (SIV) Introduction and Best Practices Document
Speaker Identification and Verification (SIV) Introduction and Best Practices Document Internal Working Draft February 13, 2006 VoiceXML Forum Speaker Biometrics Committee Authors: Valene Skerpac, ibiometrics,
More informationACTIVE MICROSOFT CERTIFICATIONS:
Last Activity Recorded : May 30, 2014 Microsoft Certification ID : 375009 SUSANNE SCHNEIDER KAISERSTRASSE 53 REUTLINGEN, 72764 DE SUSANNE.SCHNEIDER@KIT-KOM.DE *Charter- Certification that was achieved
More information