In my previous post about password security, I looked at the setting commonly found on password-protected systems, namely the number of incorrect login attempts. In this post, I will look at password complexity.
Most of us, at some point, have had an intended password rejected by the system for not meeting password complexity requirements. But, are so called “strong” passwords really more secure?
Security is, at the end of the day, a function of time. How long would it take to perform a brute-force (keep guessing until you get it right) attack. The more passwords we have to go through, the [...]
Security is a key component of many modern computer systems and our Customer Interaction Center (CIC) solution is no exception. Sadly, too often we in the IT world don’t really understand the entire security issue, and as a result, produce a system that is easily compromised. There are two components to consider for good security – the technology and the people. If we don’t consider the latter and make their lives easier, they will take steps to work around the technical measures we put in place.
In this post, I want to focus on a single security setting, the number [...]
This question came up in class the other day, so I decided to look into it and document a solution. The student posed the following dilemma – you are a call center supervisor, and you want to know when anyone in your work group spends more than five minutes on an interaction. They wanted to know whether an alert could be set up for that condition within Customer Interaction Center.
The answer I came up with is to set up an alert in Interaction Center Business Manager monitoring the agent’s on phone status and pop a desktop alert to the [...]
How important is mobility to your utility customers? Today, customers expect convenience, customization and self-service – wherever and whenever! Expectations have been set by other industries that this ease of access translates to mobile access. This will continue to be a market force in the utility industry that will challenge those without apps to deploy them – and those with apps to keep improving them.
As an IT Manager at a utility, your objectives are many. In addition to improving the customer experience, you are also being tasked with building and maintaining theses mobile apps in a way that allows [...]
Three years ago I wrote a blog titled Why you will never take away my desktop phone, which mentioned a report by Gartner that said desktop phones will be replaced by mobile phones by 2011. Back then, it looked like RIM and Apple were going to dominate the mobile market and Google was nowhere to be seen.
Well, here we are at the end of 2012 and the majority of organizations are still using desktop phones. Surprising? Not at all. But in looking back over the past three years, there has been a lot of change in the way we [...]
When setting up a route for Interaction Gateway or Interaction SIP Proxy you use Perl regular expressions to define the route patterns.
My classroom environment in Indianapolis has over 100 IC servers, each with its own range of phone numbers. My 4.0 servers, for example, each have 20,000 different phone numbers assigned. I really don’t want to have to create one route for each phone number on each server!
Let’s take a single server as an example. ICServer01a needs to receive calls to 1317201xxxx, 317201xxxx, 201xxxx, 1702201xxxx, and 702201xxxx where xxxx is the range 0000-9999. If I were to set [...]
We have finally reached the end of another year and as usual, for me, it’s a time to reflect on how the year went and look forward to the New Year. 2011 saw us release a number of service updates:
3 Service Updates for CIC 3.0 1 Service Update for Dialer 2.4 2 Service Updates for Interaction Gateway 2 Service Updates for Dialer 3.0 2 Service Updates for SIP Proxy
We also saw the release of CIC 4.0 which was a fairly major undertaking. On all fronts, 4.0 showcases our ability to innovate and 2012 is the year where most [...]
The Get DS Parameter tool step can be very useful in situations where you want to set the value of a variable within a handler by setting the value of a Server Parameter in Interaction Administrator. This allows you to change the behavior of a handler without having to open the handler, modify the variable definition, save the handler, and publish it again.
You could use the Get DS Attr tool step instead, but the Get DS Parameter tool step offers a couple of advantages which make it a more attractive option.
An example use might be to [...]
Interaction Attendant hasn’t had much attention thrown at it for a while. But the tide is changing and there some really nice enhancements added to it lately. Let look at the top 10 features you probably were not aware of:
Read-Only Mode (SU12)
Previously if you needed to review your Attendant configuration, there was a good chance that you would be stealing the lock from another user if they had Attendant open as well. As of SU12, you can now load the attendant tree in read only mode without having any issues with stealing locks. Attendant can be launched using [...]
These days..it is getting harder to get a standalone fax machine. If you like getting hard copies of your faxes and don’t have a fax machine anymore, there a solution which is pretty straight forward and doesn’t involved getting your hands dirty with handlers. Open your fax station in Interaction Administrator and add the following custom attributes:
The attribute PRINTER points to the UNC path of the printer we are going to print our fax to. ICAdmin account must have rights to use this printer otherwise it will fail. PRINTSTYLE can be used to set how the page will [...]