Call Management Method and Apparatus
20170308361 · 2017-10-26
Inventors
- Andrew M. Brezinsky (New Berlin, WI, US)
- Andrew L. Ortlieb (Wauwatosa, WI, US)
- Thomas J. Kells (Brookfield, WI, US)
- Brian D. Moe (Milwaukee, WI, US)
Cpc classification
H04M2203/355
ELECTRICITY
H04M3/527
ELECTRICITY
G06F9/485
PHYSICS
G06F9/50
PHYSICS
G06F9/455
PHYSICS
International classification
H04M7/00
ELECTRICITY
H04M3/527
ELECTRICITY
Abstract
A system and method for handling calls at a call facility wherein each call is handled by a distinct call container instance, the system comprising a platform server programmed to perform the steps of maintaining an idle container inventory for handling new incoming calls, upon receiving a new call, assigning the new call to one of the idle containers in the inventory, upon completion of a call within one of the containers, causing the container that completed the call to be killed, monitoring the idle container inventory and stage instantiation of additional idle containers to replenish the idle container inventory as containers complete calls and are killed off.
Claims
1. A system for handling calls at a call facility wherein each call is handled by a distinct call container instance, the system comprising: a platform server programmed to perform the steps of: maintaining an idle container inventory for handling new incoming calls; upon receiving a new call, assigning the new call to one of the idle containers in the inventory; upon completion of a call within one of the containers, causing the container that completed the call to be killed; monitoring the idle container inventory; and stage instantiation of additional idle containers to replenish the idle container inventory as containers complete calls and are killed off.
2. The system of claim 1 wherein the platform server is further programmed to operate a state monitoring container where the state monitoring container monitors the idle container inventory and stages instantiation of additional idle containers to replenish the inventory.
3. The system of claim 2 wherein the state monitoring container also manages killing of containers that complete calls.
4. The system of claim 3 wherein the state monitoring container is further programmed to maintain a minimum number of idle containers in the idle container inventory.
5. The system of claim 4 wherein the minimum number of idle containers is a set number of idle containers.
6. The system of claim 4 wherein the state monitoring container tracks the number of active containers handling ongoing calls and wherein the minimum number of idle containers is dynamic and is based at least in part on the number of active containers.
7. The system of claim 6 wherein the number of idle containers maintained is a percentage of active containers.
8. The system of claim 4 wherein the state monitoring container is further programmed to kill off containers that complete calls.
9. The system of claim 4 wherein the container that handles a call is programmed to report out to the state monitoring container when the container becomes active to handle a call.
10. The system of claim 4 wherein each container that handles a call performs an application program to handle the call and wherein the application program includes a container kill code segment to automatically kill the container at the end of the application program.
11. The system of claim 4 wherein the minimum number of idle containers maintained in the idle container inventory depends at least in part on historical call volume at different times of the day.
12. The system of claim 2 wherein the state monitoring container is a first state monitoring container, the system further including a second state monitoring container that performs identical redundant functions simultaneously with the first state monitoring container.
13. The system of claim 1 wherein the step of assigning a new call to one of the idle containers in inventory includes, upon receiving a new call, using the called number to identify a client call routing table, using the call routing table to identify an IT application associated with the called number, activating one of the idle containers and downloading the identified IT application to the activated container.
14. The system of claim 1 wherein the state monitoring container instantiates additional idle containers in groups.
15. The system of claim 2 wherein the state monitoring container monitors active containers to identify containers that have ceased working and performs a process to kill those containers.
16. The system of claim 15 wherein the process to kill a container that has ceased working includes obtaining state information from the container that has ceased working, activating a new container from the idle container inventory, downloading an IT application and the state information to the newly active container and killing the container that ceased working.
17. A system for handling calls at a call facility wherein each call is handled by a distinct call container instance, the system comprising: a platform server programmed to perform the steps of: instantiating a state monitoring container that performs the steps of: (i) maintaining an idle container inventory for handling new incoming calls; (ii) upon receiving a new call: (a) using the called number to identify an application program to be used to handle the new call; (b) activating one of the idle containers; (c) downloading the identified application program to the activated container; (d) monitoring the container for completion of the call; (e) upon completion of the call, causing the container that handled the call to be killed; (iii) monitoring the idle container inventory; and (iv) staging instantiation of additional idle containers to replenish the idle container inventory as containers complete calls and are killed off.
18. The system of claim 17 wherein each of the application programs includes code for indicating completion of a call and wherein the step of monitoring containers for call completion includes receiving indications of call completion from containers.
19. A method for handling calls at a call facility wherein each call is handled by a distinct call container instance, the method comprising the steps of: using a platform server to perform the steps of: maintaining an idle container inventory for handling new incoming calls; upon receiving a new call, assigning the new call to one of the idle containers in the inventory; upon completion of a call within one of the containers, causing the container that completed the call to be killed; monitoring the idle container inventory; and stage instantiation of additional idle containers to replenish the idle container inventory as containers complete calls and are killed off.
Description
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
[0021]
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
DETAILED DESCRIPTION OF THE DISCLOSURE
[0042] The various aspects of the subject disclosure are now described with reference to the drawings, wherein like reference numerals correspond to similar elements throughout the several views. It should be understood, however, that the drawings and detailed description hereafter relating thereto are not intended to limit the claimed subject matter to the particular form disclosed. Rather, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the claimed subject matter.
[0043] As used herein, the terms “component,” “system” and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computer and the computer can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers or processors.
[0044] The word “exemplary” is used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects or designs.
[0045] Furthermore, the disclosed subject matter may be implemented as a system, method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer or processor based device to implement aspects detailed herein. The term “article of manufacture” (or alternatively, “computer program product”) as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. For example, computer readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips . . . ), optical disks (e.g., compact disk (CD), digital versatile disk (DVD) . . . ), smart cards, and flash memory devices (e.g., card, stick). Additionally it should be appreciated that a carrier wave can be employed to carry computer-readable electronic data such as those used in transmitting and receiving electronic mail or in accessing a network such as the Internet or a local area network (LAN). Of course, those skilled in the art will recognize many modifications may be made to this configuration without departing from the scope or spirit of the claimed subject matter.
[0046] Referring now to the drawings wherein like reference numerals correspond to similar elements throughout the several views and, more specifically, referring to
[0047] Referring still to
[0048] Client server 14 is operated by a telephony client (e.g., a service provider's customer) and may perform various processes and run various software programs required for the client to run its business. For instance, in the case of a full service automotive dealer, the software programs may manage automobile inventory, a service department, a parts department, a sales department, an accounting department, a procurement department, etc. As another instance, in the case of a bank, the software programs may manage customer saving accounts, bank loan accounts, real estate assets, legal matters, security, etc. Server 14 generates data while running programs and that data is stored in client database 20. The data in database 20 is accessed by server 14 for various purposes.
[0049] Client interface 15 can be any type of computer including a desktop, a laptop, a tablet type computing device, a smart phone, etc. The exemplary device 15 includes a keyboard for entering information and also a display screen 22. Device 15 is linked to client server 14 and can be used to run various applications required to manage the client's business. In addition to running business management applications, interface 15 may also be used by a client's employee or a third party contractor (hereinafter “a client developer”) working for the client to develop an interactive telephony application. To this end, a client developer may use interface 15 to link to platform server 12 and access a browser based application development interface via screen 22 that can be used to specify a complete IT application as will be described in detail hereafter.
[0050] Referring still to
[0051] Platform server 12 is also linked to platform database 18 which stores development programs for developing tenant IT applications, applications specified using the development programs and data generated using the development programs and data generated when running the IT applications as well as other software used to manage overall server operation. To this end, database 18 stores application development programs 30 used by tenant developers to develop customized IT applications. The application development programs include functional modules collectively identified by numeral 31 that can be used by a developer to specify pre-canned functions for an application. For instance, if a developer wants an IT application to annunciate a greeting and initial instructions when a call is received, a “say” functional module 31 may be instantiated as part of an application where text entered into the functional module after selection is converted into a voice message when that functional module occurs in the flow of the application. As another instance, if a developer wants to collect a number entered into a keypad on a customer's device 16, a “gather digit” functional module 31 may be instantiated to obtain an entered digit and provide the digit to the application program for further processing. The functional modules are designed to be intuitive and will, in at least some cases, be limited in number so that learning how to use the modules is a trivial task for most client employees.
[0052] Referring still to
[0053] Application column 40 lists a separate application for each of the numbers in column 36. For instance, an “IVR Application 1” corresponds to number “1111” in column 36, an “IVR Application 2” corresponds to number “1222” in column 36 and so on. Each of the applications is associated with a different interactive telephony process.
[0054] Data column 42 includes data that has been entered by a tenant application developer for each of the applications in column 40 where the data is useable to modify application functionality without altering the application itself. For instance, the data in column 42 can be used to specify a language (e.g., English, Spanish, etc.) to be used by the application, to set parameters to be used when the application is run, etc. For example, for the first instance of IVR Application 2 in column 40, the data in column 42 specifies the English language, for the first instance of Advanced App 1 in column 40, data in column 42 specifies two variable values Foo and Bar and for the second instance of Advanced App 1 in column 40 data in column 42 specifies that a male voice should be used when voice messages are broadcast. As shown in
[0055] Referring again to
[0056] By storing the IT application code files independent of identity of the developing client, IT applications may be used by more than one client. For instance, a service provider may want to enable a second client to use a first application developed by a first client. In this case, the service provider may simply enter the unique application ID for the first application (e.g., the application developed by the first client) into an application table associated with the second client. This action makes the first application available for the second client to use but, in at least some cases, will disable the second client from being above to edit the first application.
[0057] Referring yet again to
[0058] While
[0059] Referring again to
[0060] Referring still to
[0061] Referring still to
[0062] Any executable application code file will include commands that are part of the LUA or other programming language as well as other commands that were specified by a client developer or that result from actions by a client's customer linked to a call. Any code commands that were specified by a client developer or result from actions by a client's customer are considered un-trusted. All un-trusted code is passed through the sandbox API 63 where the un-trusted code is run in a secure manner that prohibits actions that are not known and supported by the system. To this end, the sandbox API performs security checks on the un-trusted code and makes sure the code is using API functions correctly. Where un-trusted code cannot be deciphered, the code is ignored and an error message may be generated. Where un-trusted code is understood, the code is either passed on to one of the voice control, the utilities or the web services APIs 64, 65 or 71, respectively, to be processed, or the function specified by the code is mapped into correctly formatted API calls that the system can use and the correctly formatted calls are passed on to API's 64, 65 or 71. For example, if executable code includes the command “channel.play (‘filename.mp3’)”, a LUA interpreter running the code would pass the play command on to the sandbox API. In the sandbox API, the play command is performed which takes in the argument ‘filename.mp3’ and makes sure that the file specified by the argument exists. If the file specified does not exist, the command is ignored. If the file specified exists, the sandbox API maps the command to the voice control API that actually plays the file.
[0063] Utilities API 65 is used to perform functions that have been defined by other sources such as a third party. For instance, a date parser functional module may be provided by a third party to be called via a utility API. A program to convert HTML documents to another form may be provided by another third party to be called via an API. Other utilities APIs are contemplated.
[0064] Web services API 71 is used to control web service calls to external services. For instance, if an application requires retrieval of data managed by a client server 14, a web service call may be generated using API 71 to link to server 14 to access the required data. As another instance, if a client customer wants to transfer money from one account to another, API 71 may be used to update or alter at least some data in a client's database 20 to reflect the transfer. The web services API may also be used to obtain data or change data maintained by a third party.
[0065] Referring now to
[0066] Referring again to
[0067]
[0068] Referring now to
[0069] Visual flow space 164 is a space in which the developer can create the visual flow of an IT application by adding programming functions to the space, connecting the functions and adding properties to the functions. A set of functions are represented as separate blocks in tool bar 160 including a “Play” block 166, a “Say” block 168, a “Gather Digit” block 170, a “Gather Voice” block 172, a “Transfer” block 174, a “Web Service” block 176 and a “Hang-up” block 178. Other function blocks are contemplated and, where a full set of function blocks cannot be presented in the tool bar 160, a vertical scrolling tool 180 may be provided to scroll through the blocks.
[0070] Each of the blocks 166 through 178 can be selected to instantiate an instance of the associated function within visual flow space 164 to add the associated function to the application being developed. Block selection may include selecting a block with cursor 200 and dragging the block into space 164, double clicking on a block to create an instance of the block in space 164, etc. Once a block instance has been created, the block can be moved about in space 164, can be linked to other blocks, can be deleted, etc. At least some of the blocks can be customized by setting different characteristics as will be explained in greater detail below.
[0071] Referring still to
[0072] The web service block 176 can be used by server 12 to access other functions performed by other servers. For instance, referring again to
[0073] In addition to being useful for retrieving data, a web service call may be used to modify, delete or add to data maintained by a third party. For instance, a customer may use an IT application to change a delivery data for furniture being delivered to the customer's home. Here, a web service call may be used to alter data in a delivery database. Other web services are contemplated.
[0074] Hang-up block 178 causes platform server 12 to hang up a customer call.
[0075] Connector tool toolbar 162 includes connector tools that can be used to link function block instances within space 164 together to form a visual flow. Only one exemplary connector tool 182 is shown but other tools are contemplated. Here, once a tool 182 is selected, cursor 200 takes on additional functionality and may be used to draw lines between blocks to specify process flow.
[0076] Publish icon 190 is selectable to submit the visual flow within space 164 to server 12 to be compiled into LUA execution code. Quit icon 192 can be selected to exit the developer's software program.
[0077] Referring again to
[0078] In other embodiments, instead of expanding a placed cell to indicate additional properties that may be set, other interface tools may be used. For instance, in some cases when some additional information is required for a function like text to be voiced, upon placing the block a sub-window may be opened requesting entry of the text to be voiced or other required information. In other cases a sub-window may be opened upon clicking on a block instance or upon hovering cursor 200 over the instance to access tools for setting properties.
[0079] Referring again to
[0080] Referring to
[0081] Referring again to
[0082] To deploy application code for use, a developer has to push the executable code to the platform server for storage. When a developer attempts to push new code to the platform server, the server 12 requires the developer to securely log into the system and add the application and an associated number to the tenant's call routing table (see again
[0083] In
[0084] Referring again to
[0085] Exemplary LUA execution code that may be published from a visual flow or may be directly entered via the LUA scripting interface that corresponds to the simple process shown in
[0086] Referring now to
[0087] While a simple process is described above in relation to
[0088] Referring to
[0089] In at least some embodiments it is contemplated that as a client developer uses one of the interfaces to specify a telephony application, the developer may be able to run the application in intermediate form to experience what a customer would experience when using the system. To run an application, an application code file has to be generated. Thus, when the GUI interface is used, the visual flow of an application has to be compiled prior to testing. In the case of the scripting interface, the code file already exists and therefore no compilation is required.
[0090] Referring to
[0091] Referring again to
[0092] Referring again to
[0093] A new interactive telephony or interactive voice recognition telephony system has been described where client developers can use either a GUI interface or a scripting language interface to develop LUA code or other familiar language code to specify customized and complex interactive telephony applications. Pre-developed functional modules are provided by a service provider that facilitate routinely useful functions which can be called via API calls from within applications. The telephony application programs are not run by clients themselves. Rather, after deployment, the application programs are stored and run by a platform server maintained by a telephony service provider. The service provider receives calls to the telephony client and facilitates client specified applications so the client need not dedicate substantial resources to facilitate interactive telephony services. The service provider uses web services to access client stored data and/or to change client stored data when necessary.
[0094] While the invention may be susceptible to various modifications and alternative forms, specific embodiments have been shown by way of example in the drawings and have been described in detail herein. However, it should be understood that the invention is not intended to be limited to the particular forms disclosed. For example, while the system is described above as one where a telephony client can develop an interactive telephony application using a browser based interface provided by a platform server operated by a service provider independent of the client, in other embodiments it is contemplated that a client may use a local LUA scripting interface that is independent of the service provider to develop LUA code. Here, the client developer can should be familiar with a set of API calls used to access code for performing functional sub-processes that are supported by the system so that those calls can be used within the LUA code. After a complete LUA code file is specified using the local interface, the client developer can push the code file to the service provider's server for storage, association with numbers in the client's routing table and ultimate deployment to be used to field calls from customers.
[0095] As another example, as briefly discussed above, the processes and functions performed by the platform server 12 may be distributed and performed by a set of cooperating servers. For instance, application development may be handled by one server, data storage may be handled by another server, running application code may be facilitate by a third server and so on. One important aspect here is that none of the platform server operations are performed by the telephony client.
Additional Features
[0096] Referring again to
[0097] In at least some embodiments it is contemplated that a software tool called Docker may be used to provide call containers 60 (see
[0098] In general, Docker containers work well for companies that run a relatively small number of programs (e.g., 5-10) where program startup time need not be extremely fast (e.g., a few seconds start up time is acceptable) and where the programs need to be isolated and run for long periods of time. For instance, a company may open 10 containers and persistently run ten application programs, one in each of the 10 containers. Here, if an eleventh container is needed for some reason, an eleventh container can be instantiated for use, typically within a short period. Container instantiation includes a container staging process (e.g., a staging state) at the end of which a container is in an idle (i.e., ready) state and available for activation to run an application program.
[0099] In the case of a telephony service provider operating a platform server as described above, one problem is that call volume fluctuates wildly at times and can be unpredictable. For instance, during the course of a day, call volume may fluctuate from high to low several times and, at times, may fluctuate from high to low and back within a matter of just a few seconds. Here, if containers are instantiated just in time when required for newly received calls, telephony client customers can experience an objectionable delay in IVR performance when a large number of containers need to be staged at substantially the same time.
[0100] One solution to the staging associated delay is to maintain large number of surplus idle containers ready for immediate activation when new calls are received so that there are always available idle containers to handle call volume spikes. For instance, a telephony service provider may have a rule of thumb that the provider wants to maintain at least 20% more idle containers available for use over their highest number of previously simultaneously handled calls. For example, where a maximum number of calls simultaneously handled by platform server 12 in the past has been 10,000, the provider may maintain at least 12,000 containers active or idle all the time. Here, after a container completes a call application (e.g., after a client customer ends a call process), the container may be returned to the idle state inventory for subsequent use in handling another received call.
[0101] Unfortunately, maintaining idle containers requires hardware overhead and therefore there is an appreciable cost associated with systems that maintain excessively large idle container inventories. For instance, while 10,000 or more call containers may be needed during high volume periods, less than 1,000 containers may be needed during low volume periods and therefore, where 12,000 containers are maintained idle or active at all times, during low volume periods 11,000 containers may be idle.
[0102] One other problem with container based systems is that container reuse can cause one call process to contaminate and cause a malfunction in a subsequent call process that is handled by the same container. For instance, in at least some cases, at least a sub-set of data from a first call may persist within an idle container or an application state may persist in an idle container after a call application has been completed and when a subsequent call application is performed by the same container. Not surprisingly, this data or application state persistence can causes errors in handling of subsequent calls.
[0103] One solution for handling the data/state persistence problem associated with reuse of a container that is consistent with at least some embodiments of the present disclosure is to “kill” the container after a single call application has been completed (e.g., after the application enters a “finished” state). Here, instead of reusing a previously “used” container (e.g., a container that has already run a call application for a single call) for a subsequent call, each call would be handled by an entirely new and unused container so that data and application state persistence would be impossible.
[0104] One solution for handling the problems associated with an excessively large idle container inventory is to monitor container states and dynamically control the number of idle containers in the idle container inventory so that there is always an idle container ready to handle a newly received call but where the total number of idle containers in inventory does not exceed the number required to handle an anticipated large spike in simultaneous calls.
[0105] The process for dynamically controlling the idle container inventory size can take many different forms. For instance, instead of following a rule of thumb to maintain 20% more idle containers available for use over a highest number of previously simultaneously handled calls, a different rule of thumb may be to maintain the greater of 300 idle containers and 20% more idle containers available for use over a current number of ongoing calls. Here, at least 300 idle containers would be maintained at all times but the number of idle containers would be increased if the total number of currently on going calls exceeds 1500 (e.g., 20% of 1501 is greater than 300). As another instance a different inventory requirement may require that the total number of idle containers in an inventory be tied temporally to historical call volume requirements. For instance, if it is known that a call spike occurs every morning from 8 AM to 10 AM, the inventory size may automatically be ramped up just prior to 8 AM to a level required to handle the anticipated spike. As one other instance, another inventory requirement may tie the number of idle containers in inventory to the maximum rate of call volume increase in the past, during a specific time period, a specific period during a day, during a specific sub-period during a week, to a specific sub-period of a year, etc. For instance, one inventory rule may be that the inventory during a 4 AM to 8 AM period be tied to the maximum rate of call volume increase in the past during the 4 AM to 8 AM time slot while the inventory during the 8 AM to 10 AM period is tied to the maximum rate of call volume increase in the past during the 8 AM to 10 AM time slot. In some cases the inventory requirement may change over time as a system server learns from real time control how an inventory number should change and be controlled to meet the ultimate goal of minimizing inventory size while still ensuring that idle containers exist in the inventory for every new call received. As one other instance, a very simple inventory requirement may be that at least 400 idle containers should be maintained in inventory at all times based on a monitored idle inventory count.
[0106] In still other cases some other condition associated with container states may be used as a trigger to increase idle container inventory. For instance, in some cases the state monitoring container may only increase idle container inventory whenever a new call requires staging of a new container to handle the call. Thus, for example, where an initial inventory of 300 idle containers is eventually used up or active to handle existing calls, when a 301st call is received and a new container has to be staged to handle the call, the state monitoring container may be programmed to stage another 300 containers to replenish the inventory. Here, while some calls may experience some delays, most calls would not as the inventory would only require staging of a new container for an already received call some of the time.
[0107] Another inventory rule may simply require that the state monitoring container count the number of activated containers and always maintain a running idle container count that exceeds the activated container count by a set number of containers (e.g., 300) without tracking the number of killed containers. Here, the inventory would always be 300. Many other inventory requirements or target rules are contemplated.
[0108] In some cases, the number of idle containers and the number of total open containers (e.g., staged, idle, active and finishing (e.g., at the end of an application)) may be tracked and compared to determine when additional idle containers need to be opened and when existing unused idle containers should be closed. For instance, each time one idle container is activated to run an application to handle a received call, the numbers of idle and open containers may be compared and the number of idle containers adjusted to meet a dynamic idle container inventory target. As another instance, each time one active container completes a call application and is killed, the numbers of idle and open containers may be compared to determine how to adjust (e.g., stage or kill) the number of idle containers in inventory.
[0109] To regulate the idle container inventory size, in at least some embodiments, at least one persistent state monitoring container (hereinafter “the state monitoring container”) may be instantiated to run a special call management application that tracks container states and manages staging new containers and killing unnecessary idle containers pursuant to a dynamic idle container number target, rule or requirement. Here, each call container may be programmed to track its own state and to report any or at least a subset of state changes to the state monitoring container immediately upon its occurrence. For instance, each application may include code causing a container to report out application initiation to the state monitoring container at the beginning of the application code so that the monitoring container knows when a container moves from the idle state to an active state. As another instance, each application may include code causing an associated container to report out when an application ends and that the container has again entered an idle state and should be killed off. Here, where the number of idle containers exceeds a dynamic goal, the state monitoring container may request that at least a sub-set of idle containers be killed (e.g., closed). Where the number of idle containers is less than a dynamic number target, the state monitoring container may cause the platform processor 12 to stage instantiation of additional idle containers for subsequent use.
[0110] When idle containers are to be killed, the state monitoring container can kill the containers in any of several different ways. For instance, the monitoring container may transmit a specific “kill” message to each separate idle container that is to be killed. As another instance, the state monitoring container may transmit a group message to a subset of containers (e.g., 300) indicating that if a receiving container is in the idle state, the container should be killed off. Here, where an initial group message achieves an idle container target number, the process of monitoring the goal would continue. Where an initial group message does not achieve a container goal within some pre-defined time period (e.g., some of the containers that receive the initial message are not idle and therefore do not act on the kill command), the monitoring container may transmit another group message to a different subset of containers requesting that idle containers be killed off within that subset. This triage process would continue until an instantaneous dynamic idle container inventory target is achieved.
[0111] In particularly advantageous embodiments, as described above, each container is only used once to perform a single call application after which the container is immediately killed. Here, where a “used” container is killed off, idle container number reduction can be accomplished by simply not staging new containers as applications are completed. In this case, the state monitoring container would still track the idle container number and compare that number to an idle container goal so that if the idle container number drops below an instantaneous goal, new containers could be staged rapidly to continually replenish the idle container inventory and meet the inventory number target. In some cases used containers would be killed pursuant to a command from the state monitoring container. In other cases it is contemplated that each application program could include a container killing code segment to automatically kill off the container at the end of an application program.
[0112] One advantage associated with a system where used containers are killed off automatically after an associated application is completed is that the problem of data persistence among consecutive applications run within the same container is entirely avoided. Thus, here, because applications are only performed in new and previously unused containers, there is no possibility of data, application state or code from a prior application contaminating a new application.
[0113] Referring once again to
[0114] While some systems may have a single state monitoring container 61 that monitors container states and numbers for all CCS's (e.g., 56a through 56d in
[0115] Referring now to
[0116] Once a new call is received at block 524, control passes to block 526 where the called number is used to identify a client call routing table (see again
[0117] At decision block 532 the number of idle containers in inventory 500 is compared to the low end of the idle container inventory target range (e.g., to the value 300 and 20% of the total number M of open containers). When the number of idle containers in inventory is greater than or equal to this low end range value, control passes to block 536. When the number of idle containers in inventory is less than the low end range value, control passes to block 534 where state monitoring container 61 stages a new idle container which is added to inventory 500. As shown, the low end of the inventory range is the greater of 300 and 20% of the total open (e.g., active and staging) containers. While only one container is staged at process block 534, in other embodiments it is contemplated that a plurality (e.g., 50 or some percentage (e.g., 15%) of the instantaneous number of open containers) of containers may be staged whenever the inventory target is not achieved at decision block 532.
[0118] Referring still to
[0119] Referring still to
[0120] In at least some cases a container running a call application will get hung up and run in an endless cycle for some reason. Here, in at least some embodiments it is contemplated that when an application stops progressing for some reason, the state monitoring container may recognize the hung up condition and perform some process to deal with the condition. For instance, in some cases, once some threshold level of certainty is reached that an application has ceased working is achieved, the state monitoring container may send a kill message to the container associated with the application causing the application to be killed or closed out. When a container handling a call is killed in this fashion, the call is simply ended and the client customer has to call back into the system and start the application process over in a new container.
[0121] In other cases it is contemplated that the state monitoring container may cause any hung up call to be rerouted to a different container in which a call cancel notification application is run. For instance, when a call gets hung up in one container, the calling customer may be linked to a new container in which an application simply plays the message “An error has occurred, please call back for service. Thank you.” Once the call is redirected to the new container, the container associated with the application that got hung up could be killed. Once the cancel notice message has been broadcast and the related application has ended, the container associated with the cancel notification can be killed.
[0122] In still other cases it is contemplated that each call application may track and store state information during a call which could be used to inform another instance of the application about application state when an application becomes hung up and that information could be used to drive the new instance of the application so that an associated call does not have to be reinitiated. For instance, an application may track the current step in the application process to which a customer progressed as well as data associated with customer's interactions with the application process up to the point at which the application became hung up. Here, when a first instance of the application gets hung up, upon the state monitoring container recognizing the hung up state, the monitoring container may open a new or second instance of the hung up application in a new container and then use the state and data from the first instance of the application to move to a point in the second instance of the application at which the hang up occurred so that the customer could proceed from that point instead of requiring the customer to call back into the system and restart the process anew. In at least some cases the application state information stored may include state information just prior to the time at which a hang up occurs so that if the hang up was due to the most recently developed state information in the first instance of the application, that information would not be ported to the second instance of the application.
[0123] In still other cases where an application gets hung up for some reason prior to completion of a call, the state monitoring server may simply start a second instance of the hung up application in a new second container and then kill the first container, thereby requiring the customer to restart the application process without having to recall into the system. Here, in some cases an intermediate container (e.g., one that operates after the initial container and prior to the second container) may be activated and the call routed thereto to provide some guiding instruction like “An error occurred, this process will start again from the beginning”, prior to routing the call to the second container to restart the application process.
[0124]
[0125] Thus, the invention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the following appended claims. For instance, while the system is described above as one where a state monitoring container monitors all container states and regulates idle container inventory to a target number or range, in other cases it is contemplated that some other system operating characteristic may be monitored and factored into the decision of when to stage new containers. For instance, in some cases, the state monitoring container may simply monitor the number of calls received by a system and may tie new container staging to that operating characteristic as opposed to an actual inventory count. Thus, where 500 new calls are received in a few second period, the monitoring container may stage 500 or more new containers to be added to the idle inventory. As another instance, the state monitoring container may only stage new containers once an inventory has been depleted without consideration of the states of any other open containers. Thus, here, the monitoring container would only track the current inventory number and not all container states and replenishment would be based on inventory condition alone as opposed to states of all containers.
[0126] While the systems described above include a monitoring container that essentially always monitors for an event or condition that warrants a change (e.g., staging or killing) in the number of idle containers, in at least some embodiments it is contemplated that the monitoring container may only operate periodically to assess inventory condition and rejigger the number of idle containers in the inventory. For instance, the monitoring container may only check inventory level every 10 minutes. In some cases the frequency with which inventory is checked may change as a function of temporally proximate system operating characteristics. For instance, if high volume fluctuations are occurring during a period, the monitoring container may reduce the interval between inventory assessment and re-jiggering activities.
[0127] To apprise the public of the scope of this invention, the following claims are made: