Feeds

Can HPC methods yield 92% help desk satisfaction?

It's all about personal compatibility

  • alert
  • submit to reddit

Remote control for virtualized desktops

You know how when you call a help desk or customer service number they have that short ‘this call may be recorded’ message? Have you ever wondered what they do with the recordings?

I always figured they played them at company parties as jokes, or that they had ‘Can you top this?’ contests with one another: “OK, get this: Last week this guy calls saying his printer is printing too light. I told him it’s an o/s and hard drive problem, and to call me back after he reformatted C: and reinstalled Windows… haha!”

Turns out there are also some folks doing smart things with this data. A recent Forbes article discusses how ELoyalty, a smallish provider of call center gear, has come up with a way to categorize callers into six distinct personality types and tmatch them to a staffer with the same personality.

ELoyalty analyzed 600 million conversations to come up with two million speech patterns that identify the caller as one of their six types. It found that having people deal with like-types results in shorter calls with better results. In one test, the personality-matched calls lasted about five minutes and were 92 per cent successful, while deliberately mismatched calls lasted more than 10 minutes and were successful only about half of the time.

I’m not so sure I’m down with this new technology. I can barely stand myself most of the time, and would hate to put up with my imprecise, obscenity-packed conversational style when I’m pissed off about some product or service. Confronting someone in my own mold would probably prolong the calls as we hurl enraged insults at each other.

While we’re not likely to arrive at a solution to the problem, at least the calls would be the hit of the next holiday party: ”Wait! Play that back! Did he REALLY just say that about your mother?!? And all of this is because his SSD is slowing down? Wow…” ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.