H04L41/5083

SYSTEM AND METHOD FOR AUTOMATED END-TO-END WEB INTERACTION TESTING
20220255887 · 2022-08-11 ·

A system for flexible and scalable automated end-to-end chat-based contact center testing, having a test case management platform, a chat cruncher, a contact center manager, a chat classifier, a desktop automation engine, and headless browser-based virtual agents and customers. The test case management platform allows a user to configure operation of the system. The chat cruncher operates a plurality of virtual customers. The contact center manager operates a plurality of virtual agents to participate in chat session with virtual customers.

SYSTEM AND METHOD FOR TESTING OF AUTOMATED CONTACT CENTER CUSTOMER RESPONSE SYSTEMS
20220321512 · 2022-10-06 ·

A system and method for testing of automated contact center customer response systems using a customer response testing system and a real time conversation engine, wherein the customer response testing system generates simulated human queries using persona profiles, sends test cases containing those queries to a contact center under test, and receives and analyzes the responses to determine whether the contact center's automated response systems understand the queries and respond appropriately.

System and method for testing of automated contact center customer response systems
11290400 · 2022-03-29 · ·

A system and method for testing of automated contact center customer response systems using a customer response testing system and a real time conversation engine, wherein the customer response testing system generates simulated human queries using persona profiles, sends test cases containing those queries to a contact center under test, and receives and analyzes the responses to determine whether the contact center's automated response systems understand the queries and respond appropriately.

Authentication to network-services using hosted authentication information

Systems and methods are described for facilitating authentication of hosted network services to other services. A target service, such as a database, may require specific authentication information, such as a username and password, to access the target service. While this information could be manually specified in the hosted network service, de-centralized storage of authentication information is generally discouraged by security best practices. This disclosure provides an authentication proxy system that reduces or eliminates a need for hosted network services to store authentication information for target services. Rather, the authentication proxy system can obtain authentication information for the hosted network service that is provided by a hosting system, and authenticate the hosted network service using that authentication information. If authenticated, the proxy system can retrieve authentication information for the target service, and pass operations from the hosted network service to the target service using the authentication information for the target service.

System and method for production readiness verification and monitoring

Systems and methods for production readiness verification and monitoring are disclosed. A set of compliance requirements including one or more required-asset identifiers and a set of minimum deployment requirements for each required-asset identifier is received. Each of the one or more required-asset identifiers are associated with a cloud asset required for deployment of a target application. One or more probing messages are generated to determine an availability of each cloud asset associated with the one or more required-asset identifiers, at least one probing response is received from at least one cloud, and the cloud environment is identified as one of compliant or non-compliant for application deployment. The cloud environment is identified as compliant when each cloud asset meets each of minimum deployment requirements and non-compliant when a cloud asset fails to meet one of the minimum deployment requirements. The target application is deployed when the cloud environment is compliant.

Rendering a web application in a cloud service

Methods, devices, and computer-readable media for providing access to a web-based application from a remote computing device having a software environment that is incompatible with the web application are presented. In some embodiments, a virtual server may receive from a client device, a request to execute a web application, where at least a first portion of the web application may be hosted by the virtual server and a second portion of the web application may be hosted by a second server. In response to the request by the client device, the web application may be executed at the virtual server. Then a user interface of the web application may be sent to the client device to be presented in a local browser at the client device.

Predicting condition of a host for cybersecurity applications

For a plurality of hosts, observe first time-varying characteristics including network throughput, central processing unit (CPU) usage, and/or memory usage; second time-varying characteristics including software configuration; and time-invariant characteristics including hardware configuration, at a plurality of timestamps. Construct a restricted HMM configured to predict actual host states, wherein the first time-varying characteristics include observed variables. The current observed variables depend on current values of the hidden variables and prior timestamp distribution of the observed variables. The former in turn depend on prior timestamp values of the hidden variables, the time-invariant characteristics of the hosts. and current timestamp values of the second time-varying characteristics. Estimate parameters of the restricted HMM; run the restricted HMM with the estimated parameters for each of the hosts; analyze the results to identify at least one of the hosts which has a potential cybersecurity issue; and take at least one remedial action.

Resource access provisioning for on-premises network client devices
11063930 · 2021-07-13 · ·

A managed directory service receives, from a computer system operated in a first network, a request to obtain a set of credentials usable to access resources in a second network. In response to the request, the managed directory service determines, based at least in part on a first set of permissions in a directory maintained in the second network, that the computer system is authorized to receive the set of credentials. The managed directory service provides the set of credentials to the computer system, which enables use of the set of credentials to identify a second set of permissions for accessing resources in the second network.

Method for automatic management of capacity and placement for global services

Systems and methods for providing web service instances to support traffic demands for a particular web service in a large-scale distributed system are disclosed. An example method includes determining a peak historical service load for the web service. The service load capacity for each existing web service instance may then be determined. The example method may then calculate the remaining service load after subtracting the sum of the service load capacity of the existing web service instances from the peak historical service load for the web service. The number of web service instances necessary in the large-scale distributed system may be determined based on the remaining service load. The locations of the web service instances may be determined and changes may be applied to the large-scale system based on the number of web service instances necessary in the large-scale distributed system.

System and method for testing of automated contact center customer response systems
11863507 · 2024-01-02 · ·

A system and method for testing of automated contact center customer response systems using a customer response testing system and a real time conversation engine, wherein the customer response testing system generates simulated human queries using persona profiles, sends test cases containing those queries to a contact center under test, and receives and analyzes the responses to determine whether the contact center's automated response systems understand the queries and respond appropriately.