This document discusses best practices for building world-class voice applications (IVRs). It begins by explaining why people dislike IVRs and argues that people dislike bad automation, not self-service itself. It then outlines three key challenges with IVRs: they impose themselves on users, have a constrained voice interface, and must simulate human behavior. The document advocates for a "Caller First" philosophy of rapid development, leveraging caller and application data, and intelligent behavior. Examples of intelligent behavior include avoiding main menus, prioritizing options, and bypassing automation for unhappy callers. The presentation concludes by emphasizing the importance of data and putting the caller first.
Mobile Originated Call Process in Simple WordsAssim Mubder
Call Setup
Different procedures are necessary depending on the initiating and terminating party:
Mobile Originating Call MOC: Call setup, which are initiated by an MS
Mobile Terminating Call MTC: Call setup, where an MS is the called party
Mobile Mobile Call MMC: Call: setup between two mobile subscribers; MMC thus consists of the execution of a MOC and a MTC one after the other.
Mobile Internal Call MIC: a special case of MMC; both MSs are in the same MSC area, possibly even in the same cell.
Interactive Voice Response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipient.
Interactive Voice Response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipient. An IVR system (IVRS) accepts a combination of voice telephone input and touch-tone keypad selection and provides appropriate responses in the form of voice, fax, callback, e-mail and perhaps other media.
An IVR system consists of telephony equipment, software applications, a database and a supporting infrastructure. Common IVR applications include:
Bank and stock account balances and transfers
Surveys and polls
Office call routing
Call center forwarding
Simple order entry transactions
Selective information lookup (movie schedules, etc.)
An IVR application provides pre-recorded voice responses for appropriate situations, keypad signal logic, access to relevant data and, potentially, the ability to record voice input for later handling. Using computer telephony integration (CTI), IVR applications can hand off a call to a human being who can view data related to the caller at a display.
'Interactive Voice Response (IVR)' is part of the:
Call centers Glossary
Internet applications Glossary
Internet technologies Glossary
Software applications Glossary
Telecom Glossary
Interactive voice response (IVR) is a technology that allows a computer to interact with humans through the use of voice and DTMF tones input via keypad.
For the detection of lost mobile SNIFFER plays a vital role.The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection .
Security challenges of smart phone & mobile device
Visualizing mobile security
Attacks moving to mobile – why?
What your phone knows & what it shares
Smart phone & mobile device the threats
Countermeasures
Mobile security best practices
Recently in telecommunications, several industry-wide measures have been introduced to detect and mitigate losses, yet International Revenue Share Fraud (IRSF) is increasing on a global scale.
This webinar by Colin Yates, independent consultant and advisor to multiple industry bodies and ex-Vodafone Head of Group Risk, discussed best practices for executing a strategy for the prevention of IRSF fraud.
Covered in the webinar:
- About IRSF and the extent of global fraud losses today
- What measures can be taken to mitigate fraud losses
- What controls can be put in place to predict and detect IRSF attacks
- Industry guidelines and best practice used to address IRSF
- How technology can help a CSPs Fraud detection and prevention capability
Automated Voice And Audio Quality Test Measurementguest5a90cfc
AQuA is a simple but powerful tool to provide perceptual voice quality testing and audio files comparison. This is the easiest way to compare two sound signals and test voice quality between original and degraded files.
Mobile Originated Call Process in Simple WordsAssim Mubder
Call Setup
Different procedures are necessary depending on the initiating and terminating party:
Mobile Originating Call MOC: Call setup, which are initiated by an MS
Mobile Terminating Call MTC: Call setup, where an MS is the called party
Mobile Mobile Call MMC: Call: setup between two mobile subscribers; MMC thus consists of the execution of a MOC and a MTC one after the other.
Mobile Internal Call MIC: a special case of MMC; both MSs are in the same MSC area, possibly even in the same cell.
Interactive Voice Response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipient.
Interactive Voice Response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipient. An IVR system (IVRS) accepts a combination of voice telephone input and touch-tone keypad selection and provides appropriate responses in the form of voice, fax, callback, e-mail and perhaps other media.
An IVR system consists of telephony equipment, software applications, a database and a supporting infrastructure. Common IVR applications include:
Bank and stock account balances and transfers
Surveys and polls
Office call routing
Call center forwarding
Simple order entry transactions
Selective information lookup (movie schedules, etc.)
An IVR application provides pre-recorded voice responses for appropriate situations, keypad signal logic, access to relevant data and, potentially, the ability to record voice input for later handling. Using computer telephony integration (CTI), IVR applications can hand off a call to a human being who can view data related to the caller at a display.
'Interactive Voice Response (IVR)' is part of the:
Call centers Glossary
Internet applications Glossary
Internet technologies Glossary
Software applications Glossary
Telecom Glossary
Interactive voice response (IVR) is a technology that allows a computer to interact with humans through the use of voice and DTMF tones input via keypad.
For the detection of lost mobile SNIFFER plays a vital role.The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection .
Security challenges of smart phone & mobile device
Visualizing mobile security
Attacks moving to mobile – why?
What your phone knows & what it shares
Smart phone & mobile device the threats
Countermeasures
Mobile security best practices
Recently in telecommunications, several industry-wide measures have been introduced to detect and mitigate losses, yet International Revenue Share Fraud (IRSF) is increasing on a global scale.
This webinar by Colin Yates, independent consultant and advisor to multiple industry bodies and ex-Vodafone Head of Group Risk, discussed best practices for executing a strategy for the prevention of IRSF fraud.
Covered in the webinar:
- About IRSF and the extent of global fraud losses today
- What measures can be taken to mitigate fraud losses
- What controls can be put in place to predict and detect IRSF attacks
- Industry guidelines and best practice used to address IRSF
- How technology can help a CSPs Fraud detection and prevention capability
Automated Voice And Audio Quality Test Measurementguest5a90cfc
AQuA is a simple but powerful tool to provide perceptual voice quality testing and audio files comparison. This is the easiest way to compare two sound signals and test voice quality between original and degraded files.
Example Call Center Work/Information Flow DiagramEquilibria, Inc.
There are bound to be times when your customer support team encounters a problem dealing with customers. You have no control over what customers say or do, but you do have control over how team members respond to questions or complaints in an efficient and productive way. With a combination of competent team members, well-written scripts and the right technology, your business can attract and retain happy and loyal customers.
Process maps (flowcharts) are one tool companies use to ensure team members know how to address customer support questions, escalate issues, and route calls. In this presentation, we begin with a process map given to employees working in a call center to screen job candidates. If you enjoy working with flowcharts, you’ll love this method to investigate your own customer service model. More process map templates are available for download at www.eqbsystems.com/shop. Thanks for watching!
2015 Mastering SAP Tech - Enterprise Mobility - Testing Lessons LearnedEneko Jon Bilbao
Lessons learned from a large enterprise mobility roll-out project for an Asset Management and maintenance workforce. Managing User expectations, testing tools, gotcha areas and what we did about them. Presentation from Mastering SAP Technology conference 2015.
Standard Bank: Agile, DevOps, Engineering Transformation and the Role of AppD...AppDynamics
Standard Bank's goal is to be the leading financial services organization in, for, and across Africa. We are investing heavily in a global digital strategy oriented around omni-channel capability delivered through self-service channels.
This strategy requires that we frequently deliver new functionality to customers across countries, channels, and business domains. To support this we must adopt sound engineering practices such as DevOps, test-driven development, and Agile.
In this session, we will highlight some of the key Agile engineering practices that support the journey and the role that AppDynamics has played in enabling these practices.
Key takeaways:
o How AppDynamics unblocks delivery and help to deliver quality software to our customers
o AppDynamics as a DevOps enabler, helping bridge the gap between operations and development
o Scenarios in which AppDynamics has prevented outages and reduced the amount of time it would take to restore service
For more information, go to: www.appdynamics.com
This webinar talks about data collection in political polling and expanding your reach by using a multimode platform.
We will talk about the use of phone, online, and SMS to invite voters and let their voice be heard.
We also talk about techniques to measure ad messaging satisfaction before these media spots go public so that they can be refined before hitting the airwaves.
Lastly, we will talk about reporting the results in your polling project.
Slide deck for Spoken Communciations webinar Four IVR Pitfalls and How to Avoid Them, presented by Bill Price of Driva Solutions and Heidi Miller of Spoken Communications on Nov. 16, 2010
Standard Bank: How APM Supports DevOps, Agile and Engineering Transformation ...AppDynamics
Standard Bank's goal is to be the leading financial services organisation in, for, and across Africa. They’re investing heavily in their omni-channel capability delivered through self-service channels that sit on a modern software stack. Their strategy requires that they frequently deliver new functionality to customers across countries, channels, and business domains. To support this, Standard Bank has moved to modern engineering practices, including DevOps, test-driven development, and Agile. In this session, Andrew and Lenro from Standard Bank will outline their journey and discuss how APM has helped their teams, promoted a DevOps culture and driven transformation. They’ll cover:
-How we structure our development teams and what DevOps means to us
-How APM unblocks delivery and help deliver quality software to our customers
-APM as a DevOps enabler, helping bridge the gap between operations and development
To learn more, visit: www.appdynamics.com
Hosted UC and Cloud UC Are Here to Stay
In order for partners to successfully implement this technology, you need to take steps to ensure success.
Doug Tolley will walk through the methodology and explain how this managed service revenue will help your bottom line.
In my presentation we will talk about what is User Experience (UX) and why it is important nowadays.
Also we will briefly talk about Usability of a product and how to contact some easy Usability tests.
Finally we will learn the 10 Heuristics of Nielsen and revers-engineer our way back to designing thoughtful User Interfaces (UI) based on those rules of thumb.
Disclaimer: I am not a UX researcher or expert! I am a UX enthusiast. I am trying to study and learn as much as I can about UX (workshop, seminars, uni classes, articles etc.) and all I am trying to de here is to make people understand the importance of it, through what I have learned so far.
Voice presents a unique opportunity for brands to become a seamless component of their customers’ day-to-day lives. Nearly every industry is dipping its toes into the voice pool, but few brands have been able to develop experiences with true lasting power. In fact, only 6% of voice experiences are retained by users after the first week of use, according to VoiceLabs.
While still a hit-or-miss venture, many companies and industries are realizing increased revenue, differentiation, and engagement by investing in voice as a first-class citizen alongside their traditional digital assets. Emerson Sklar provides an overview of the companies and industries leading the way, the steps they have taken to make them successful, and how you should approach your voice-first strategy.
The Shortest Path to Value for Business Mobile Apps Catavolt, Inc.
Is your organization ready to go mobile but wants to do it in the simplest and quickest way possible? This Catavolt presentation explains how small apps have an opportunity to provide a huge impact for your business.
Materi Membangun Aplikasi Mobile Berkualitas yang disampaikan pada acara Bimbingan Teknis Entrepreneurship Kreatif Digital (Mobile Application dan Game) 16-17 September 2016 oleh Dr. Eng. Herman Tolle yang diadakan oleh Badan Ekonomi Kreatif (Bekraf) bekerjasama dengan Universitas Brawijaya Malang
Webinar: Why Are You Still Paying for Retired Applicationspanagenda
Webinar recording: http://pan.news/AVnr30gV2Qr
Optimization is a great way to realize immediate cost savings across your IBM Notes and Domino infrastructure and drive IT efficiency.
panagenda offers software solutions and the necessary expertise for all phases of your optimization project.
Join us and learn how to identify the business value of your existing infrastructure, what you’re paying for that isn’t used, what’s worth your time to retain, how to identify dependencies and more to ensure a smooth and cost efficient operations.
Learn how to automate client-side changes ranging from analyzing the client landscape, reducing disk space, removing archived applications, to seamless updating IBM Notes and deploying browser clients.
Come hear what others have learned in their IT optimization efforts, to ensure yours is as successful as possible. Results you can measure, savings you can prove!
Operating a Highly Available Cloud ServiceDepankar Neogi
Operating a highly available cloud service is not just about technology and architecture. It has a lot to do with people and processes. Everything fails all the time. So, how do you ensure you have the right people and the right processes in the right places to run a highly available web service. This talk covers people, processes and technology and tools required to run a highly available web service.
This talk was done in Feb 2020. Sergey and I co-presented at CTO Forum on Microservices and Service Mesh (how they relate, requirements, goals, best practices and how DevOps and Agile has had convergence in the set of features for Service Mesh and gateways around observability, feature flags, etc.)
Moving from design of unimodal speech-enabled applications to multi- modal smartphone applications is not always straightforward. Bouzid highlights fundamental differences between these contexts and how we can transfer what we have learned from telephony-based IVR space to build highly usable voice solutions on the smartphone platform. Kelly discusses how understanding users, their environments, their devices, and available software tools can allow organizations to create powerful, engaging multimodal designs.
Natural User Interface Design for SmartphonesAhmed Bouzid
The smartphone presents a set of usability challenges that can be solved only with a combination of all input and output modalities available to the user. In this workshop, we review some basic principles for building highly usable, multimodal applications. The principles will be illustrated through concrete implementation examples.
Do Smartphone spell the end of IVRs as we know them? Ahmed Bouzid discussed the topic in his Speech Technology Magazine Webinar presentation on November 11, 2010.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
IVR Best Practices
1. Be an IVR Rock Star:Be an IVR Rock Star:
Best Practices For Building World-Class Voice Applications
Dr. Ahmed Bouzid
Director of Product, Angel
2. Angel Company Overview
• Founded in 1999 as a BU of MicroStrategy (NASDAQ: MSTR)
• Patented IVR Technology: 25+ granted
• Over 1,000 customers in 20 different industries
• Over 10,000 applications deployed including many of nation’s top
consumer brands
11/26/20102
• Industry Awards for Technology Excellence:
3. Agenda
1. Introduction
– Why people hate IVRs
– Why IVRs – For the enterprise and callers
– People don’t hate self-service, they hate bad automation
2. The Three Challenges of IVR
– Automation is imposed on the user
– There is a constrained nature of VUI
11/26/20103
– System is simulating uniquely human behavior
3. The Caller First Philosophy
– Rapid development allowing for design and testing
– Leveraging data about callers
– Leveraging data about the application
4. Intelligent Behavior
– Examples of intelligent behavior
– Some scenarios
4. Why People Don’t Like IVRs
1. You are asked by the agent to repeat information that you already provided to the IVR.
2. You can’t tell what option in the menu is the right one to choose.
3. It gives you a long menu when you always ask for the same thing.
4. You are made to wait a long time only to be routed to voice mail.
5. You wait a long time only to discover that you are in the wrong queue.
11/26/20104
6. You are bounced around from one IVR system to another IVR system.
7. You are made to listen to several minutes of nonsense before you are offered anything
that you care about.
8. The IVR system asks you to call at a later time and then hangs up on you.
5. Why IVRs: For the Enterprise
Handle volume: Never enough people to staff a call center.
Reduce costs: Deflect calls from expensive agents.
Increase revenue: Systematic up-selling, cross-selling.
Increase agent satisfaction: push complex tasks to agents.
11/26/20105
Systematic tracking of calls/activities: What services, products selected.
Customer Satisfaction: Serving the client off hours.
Scalability: crisis, peaks.
6. Why IVRs: For Callers
No waiting: empowering self-service.
Facilitate task completion: logging notes into CRM by speaking.
Privacy: sensitive information (test results).
Security: Providing credit card information.
11/26/20106
Security: Providing credit card information.
24x7x365: Convenience of access.
Being able to take your time: not rushed by human
Speed of task completion: When you know what to do and just need to do it.
Not being sold by a human: Turning down computer is easier.
9. • ATMs – Haven’t evolved much
• NOT attractive or highly branded
• They can cost you money!
• NOT well-designed
– Language choice every time
Automation People Like… Why?
– Language choice every time
– Doesn’t learn my behavior
– Sometimes bugs me with ads
11/26/20109
10. • One ATM similar to the next
• High exposure – ATMs are
everywhere
• Sets clear expectations
• People make a choice to use it
Learning from the ATM
• They know it will be faster than
talking to a human
11/26/201010
11. • Automation is imposed on the user
• Constrained nature of interface
• System is simulating uniquely human behavior
Three Fundamental Challenges with IVR
11/26/201011
• System is simulating uniquely human behavior
12. IVR imposes itself on the caller
• Starting on the wrong note….
• Humans are seldom given a choice with IVRs
11/26/201012
13. Constrained nature of VUI
• Time linear
– You must patiently listen
to one word before you
can hear the one that
follows it
• Unidirectional
– When you hear
something, you can’t
11/26/201013
something, you can’t
easily go back and listen
to it again
• Non-visible
– You can't easily figure
out where precisely you
are in the interaction and
what exactly the system
expects you to do next
14. Simulating Human Behavior
Spoken language interaction is charged with meaning
• Disrespect
• Inconsistency
• Thoughtlessness
11/26/201014
• Thoughtlessness
15. Disrespect….
• Space: verbose prompts
• Freedom: not letting them get to human
• Truth: lying to them about getting to a human
• Responsibility: blaming them for failure
11/26/201015
17. Thoughtlessness….
• Who is the caller?
• What does the caller like?
• What does the caller know?
• What does the caller want?
11/26/201017
• How is the caller feeling?
19. • Calling retail store phone number on a Sunday afternoon
• They made a purchase two days ago
• It is afternoon, they called two hours ago about a trouble ticket. The
ticket was originally opened the day before. The ticket is not
resolved yet
• 80% of the caller’s calls are about getting account balance
Some Scenarios
11/26/201019
• Calling the power company after a power outage
• 75% of callers were at web before going to IVR
• Caller has a history of zero-ing out immediately
• Caller gave poor marks to the last agent they spoke with
• ISP service went down 10 minutes ago….
21. Traditional IVR Build Process vs.
Caller First Iterative Approach
Develop
Deploy
Test
Define
Build
TestRefine
11/26/201021
Measure
Review
REPEAT!
Measure
Traditional IVR means millions in up front
investment and months of deployment,
testing, and getting it wrong…
Angel’s Site Builder enables iterations in days vs.
months, enabling organizations to focus on strategic
aspects of business and successively getting it right…
22. • Reduced deployment times and costs
• Real-time updates and changes to
voice applications
• Iterative fine-tuning and testing of voice
applications
Rapid Voice Application Development
11/26/201022
applications
• Easy integration with backend systems
and data
• Full transparency; Site Builder is used
by Angel Professional Services,
partners, and customers alike
23. • Requirements Gathering and Analysis
Understand the problems that need to be solved, and know the calling population that will be
using the applications
– Conduct expert review of existing functionality
– Listen to live calls in the call center, debrief with live agents
• Uncover pain points and monotonous calls
• Listen for terminology used
The Design Process: Step 1
• Understand why agents “say it that way”
– Interview key stakeholders about the underlying business objectives
• Brand considerations
• Legal considerations
– Match business goals with caller goals
– Identify available customer data to drive interactions
11/26/201023
Angel gains enough knowledge about your business to apply our creativity,
prior experience, and best practices to designing the right application.
24. • High Level Design
Convey the design vision for the application in a format that can be easily socialized throughout
the client organization.
– Provide a complete set of call flow diagrams
• Microsoft Visio diagrams
• Every “page” or step in the application depicted
• Connectors to show what callers say to navigate to the next step
– Create a representative set of sample calls
The Design Process: Step 2
– Create a representative set of sample calls
• Show what a typical call to the application would sound like
• “System says…” “Caller says…”
• Show the actual language that the application will use
• Illustrate the most common paths through the application
11/26/201024
High-level design: Allows Angel to convey our vision to customers, and
allows customers to socialize our vision amongst their team.
25. • Detailed Design
Add the final level of detail to the high level design once the overall vision is agreed upon.
– Provide a detailed design document
• Separate set of prompts for every block in the call flow diagrams
• Show every prompt needed to support the design
• All no-match prompts, no-input prompts transfer prompts, etc.
• Final recording list is generated from this spreadsheet
The Design Process: Step 3
• Final recording list is generated from this spreadsheet
• Every word must have a purpose!
11/26/201025
Detailed Design: Everything the developer needs to build the application
using the Site Builder toolkit.
26. • Audio Production
Create a full set of recorded prompts for the application.
– Choose voice talent to represent the brand
– Coach voice talent to convey meaning/persona
– Record all prompts needed for a complete application
• Application prompts (text from detailed design doc)
• All prompts for information play out (digit strings, dates, currency)
The Design Process: Step 4
• All prompts for information play out (digit strings, dates, currency)
• Any non-speech audio (audio icons, branded audio)
11/26/201026
Angel designers work with voice talents to ensure that our carefully crafted
prompts are conveyed accurately, while extending your company’s brand.
27. • Call Analysis
Post deployment: Observe the application in action to measure and improve success rates
– Quantitative analysis – how are callers using it?
• Usage statistics
• Most common failure points
• Containment rates
– Qualitative analysis – full call recordings
The Design Process: Step 5
– Qualitative analysis – full call recordings
• Design listens to recorded calls (both sides of the conversation)
• Measure success rates (Did they accomplish their task?)
• Identify areas for improvement
11/26/201027
The tuning phase gives us a chance to iterate on the original design and
improve the application.
28. Data is Key….
• Data about the callers
• Data about the application
11/26/201028
29. • User Profile
• Recent User Activity
• Call Initiation Context
• Call Population Distribution
Data Connectivity
11/26/201029
30. • Value to the Enterprise
• Experience using the system
• Disposition towards using the system
• Age/Gender
User Profile
11/26/201030
• Age/Gender
• Language
• Emotional state
31. • Past reasons for calling
• Resolution outcome of last
transaction
• Agent spoken with last time
Recent Call Activity
11/26/201031
• Agent spoken with last time
• How long they waited last time?
• Were they satisfied with call
outcome?
32. • Where are they calling from (zip
code, area code, lat-long)
• What medium are they using: land
line, cell, desktop (e.g., Skype)
• Calling into a number that was
Call Initiation Context
11/26/201032
• Calling into a number that was
advertised in a billboard, web site,
billing slip, TV/Radio commercial
• Calling from noisy train station
33. • Most frequent requests
across caller population
• Request distribution across
profiles
• Time-sensitive requests
Call Population Distribution
11/26/201033
• Time-sensitive requests
• Event-triggered requests
• Call context distribution
across callers: most callers
were in web?
34. Data About the Application
11/26/201034
• Automation rates
• Hang ups
• No input/No match
• Zero outs
• Long calls
• Short calls
37. • Avoid “Main Menu”
– “Are you calling to change your address?”
• When you provide a menu, order options
intelligently
Informed First Option Offering
11/26/201037
• When you provide a menu, keep list to 3
items
38. • Don’t offer nonsensical options:
– New prospect being offered option to talk to billing
• Offer options the caller cares about:
– Telling callers with a large checking account balance about the
newly launched high-yield CD
– Over draft protection for callers with a dangerously low balance
Offer Only Relevant Options
11/26/201038
– Over draft protection for callers with a dangerously low balance
39. • Event triggered
• Most recent action
Volunteering Relevant Information
11/26/201039
• Most likely across callers: the 80/20 rule
40. Wording, Pacing, and Persona
• No more and no less than what needs to be said
• Slow down or speed up prompt pace
• Right persona for right profile
11/26/201040
42. • Caller is probably irritated or
unhappy, in distress
• Caller has a history of doing
badly with the application
Bypass Automation
11/26/201042
badly with the application
• Caller is calling from a noisy
environment
43. • Knows who you are…
• Caters to your preferences…
A Caller FirstSM
IVR:
Putting the Caller FirstSM
11/26/201043
Kate, your
anniversary is
next week.
Send a gift?
888-692-6435
• Anticipates your needs…
• Serves you fast!
• Respects your time…
44. Thanks for joining us. After the webinar
you will each receive the Angel White
Paper: “Driving Performance with
Embedded BI in Your Voice Application”
Q & A
11/26/201044
Ahmed Bouzid
Director of Product
bouzid@angel.com
888-662-4955
Q & ASchedule a Demo:
http://www.angel.com/schedule-demo.jsp