NativeMinds Awarded Patent on Key Technology for Creating Virtual Service Agents
Example Verification Functionality Accelerates Implementation of Virtual Service Agents and Ensures Accuracy of Conversational Responses
San Francisco, CA - 2001-08-20 - NativeMinds, Inc., a leading provider of online customer service software for creating virtual representatives, today announced that the U.S. Patent and Trademark Office assigned patent number 6,259,969 to NativeMinds for its Example Verification technology. Example Verification -- a key component of NativeMinds' flagship product, NeuroServer® -- automates the testing of new information added to a virtual representative's knowledge base. The technology makes it easier to create smarter online service agents who can field customer questions and reduce call center and e-mail response costs.
Businesses are increasingly adopting virtual representatives as part of their online self-service initiatives. With rising contact center costs, as high as $33 per call and $10 per e-mail according to Forrester Research, more companies are turning to the Web to provide 24x7 customer self-service options. Created with NeuroServer, virtual representatives, or vReps™, are automated online service agents that answer customers' frequently asked questions via natural language dialog, preempting the need for more expensive human intervention. NativeMinds' patented technology gives the company a distinct competitive advantage by helping to increase the accuracy of vRep responses.
Bringing Virtual Agents into the Frontline of Web Customer Service
Unlike traditional natural language search engines that scan Web sites and return long lists of results, NativeMinds vReps analyze customer questions based on question type, tone, and customer history, and answer precisely with highly accurate, personalized replies. These capabilities enable vReps to handle relatively complex questions such as, "What does my insurance policy cover?" or "How do I open a checking account?"
The testing of vReps during the creation and maintenance processes is critical to ensuring a successful online customer experience. The patented Example Verification technology eliminates the need for costly, time-intensive manual testing of the vRep's "intelligence." Automated testing includes:
• Ensuring accurate vRep responses to questions
• Identifying answers that might be in conflict with one another
• Providing descriptions of any errors and why they occurred
• Guiding the vRep administrator directly to any errors so they can be fixed quickly
"When we started developing NeuroServer, our main focus was to help Fortune 1000 companies save money while improving the online customer service experience," said Walter Tackett, NativeMinds chief executive officer and co-founder. "In addition to speeding the development of new vReps, Example Verification is critical to making sure virtual service agents give accurate, relevant answers to customer questions. The technology has a direct impact on the vRep's ability to sustain conversations with real customers, offloading live agents for other tasks."
For more information, contact Verity at info@verity.com or at World Wide Web site http://www.verity.com or call 408-541-1500.
Verity and the Verity logo are registered trademarks or trademarks of Verity, Inc.
Summary: ...from the VHA. In the case of complaints, the OMI’s response depends on the nature of the case. Some are resolved with little more than a phone call. At the other end of the spectrum, the OMI might send up to a half dozen clinicians to perform an on-site investigation. The number and type of records...
Summary: ...Excellence Overseeing some of the nation’s largest collaborative studies and clinical trials, UCSF’s Prevention Sciences Group faces three serious challenges in its quest for continued excellence in medical research: 1. Managing Complexity: UCSF studies can last several years, involve participants...
Summary: ...which of the over 600 American Express form templates matches the processed forms. Next, using a patented multiple-engine recognition technology, the software “reads” the hand-printed information from the form, and the data is then verified according to rules created in the form template. According...
Summary: ...sector performance and accountability. The Auditor-General’s mandate extends to all Australian Government agencies, authorities, companies and subsidiaries. The nature of this organisation’s broad ranging role has given it extensive powers of access to Commonwealth documents and information. Managing...
Summary: ...address the full range of government environmental responsibilities. The end result of two separate waves of mergers over almost four years, DECCW brings together a wide range of related responsibilities including climate change and greenhouse issues; conservation of natural resources; control of pollution;...
Summary: ...its success within the Queensland Government, powering sites such as Queensland Health, Emergency Services and Natural Resources and Mines, and after extensive testing of all offerings we indeed followed suit,” said Dr. Rainbird. “TeamSite impressed us not only with its wide band of delighted users...
Summary: ...and TRIM software are fit-for-purpose. An intuitive interface satisfies BIS‘s need for a user-friendly solution. To boost software performance, HP tested the solution extensively and conducted two migration dress-rehearsals, which allowed BIS to launch Matrix Two with minimal disruption. Savings, productivity,...
Summary: ...for any application, as well as built-in data protection. Altynikov, working through HP partner, One1, met with HP and Microsoft storage experts at HP’s offices in Ra’anana, Israel. “It was nice to have actual storage experts available to answer our questions,” Altynikov notes. “The HP AiO system...
Summary: ...cs_genpact_20080815 communities where users can easily find documents and guidance for specific problems without having to call for additional assistance,” says Pulijala. “If someone doesn’t know the answer to a particular question, they can find policies and procedures documents and other information...
Summary: ...OF&P’s entire data store— 50 gigabytes of data, more than 800,000 documents in all—in only 26 hours. Two weeks of pre-rollout training were supplemented by a specialized Interwoven trainer who walked the floor for the frst week to answer questions and make sure everyone was on board. Atul Bhagat,...
Summary: ...without manual intervention,” said Frejik. “Most importantly, I can sleep easy at night knowing that all of our data is backed up on Autonomy’s servers, thanks to their Web portal verification.” “The LiveVault installation was a breeze,” added Frejik. “All we had to do was download the solution...
Summary: ...Miami-Dade County - Case Study. However, because of Miami-Dade’s existing decentralized organizational structure, Online Services believed that the County’s 40 independently-managed departments might be reluctant to embrace a system that imposed central control over their pages’ look and feel. The...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...of each and every question, whatever language or slang is used, and retrieve the most conceptually relevant answer or answers from a database of approved responses. Questions that cannot be answered automatically by the system within a specified confidence interval or that contain questions or concepts...
Summary: ...combine Boolean and Proximity operators to form simple or complex Boolean expressions Parametric search Users can search for items by certain field values. When they provide fixed values in parametric fields, the parametric search returns consistent values in the non-fixed parametric fields. For example,...
Summary: ...Assessment: Investigation and Analytics Autonomy’s advanced analytics engine enables researchers to rapidly search across terabytes of data using the most advanced concept search technology to answer the question, “Is there a case?” Being able to develop an informed initial case strategy is crucial...
Summary: ...location, as soon as it becomes available. Active folders can be trained by example, such as by dragging and dropping a document into the folder or by natural language query. Multiple data formats are available in a single folder, and results are downloadable for offline viewing. Enterprise Class Security...
Summary: ...An Agent represents a user’s persistent interests and can be defined or trained either explicitly with a natural language description or Boolean expression. Most powerfully, an Agent can be trained or re-trained by example, simply by being shown a document, video, or verbal conversation that matches...
Summary: ...can be remotely deployed and managed for use in offices with little to no IT staff. Highly efcient and intelligent deduplication technology Data Protector software deduplication is powered by the HP StoreOnce engine. This patented technology, developed by HP Labs, is portable, flexible, and scalable....
Summary: ...is compounded by the nature of electronic communications; people use a variety of communication tools to carry on a single conversation. When IM, email, and phone conversations occur simultaneously, legacy technologies may review and tag each item differently, resulting in a risk of exposure or failure...
Summary: ...moved offsite to secure, mirrored data centers without manual IT intervention. LiveVault saves organizations time on backup and recovery and allows organizations to focus more on mission-critical projects for the business. The LiveVault service protects both physical and virtual machines. It removes the...
Summary: ...moved offsite to secure, mirrored data centers without manual IT intervention. LiveVault saves organizations time on backup and recovery and allows organizations to focus more on mission-critical projects for the business. The LiveVault service protects both physical and virtual machines. It removes the...
Summary: ...verification against user, group and role level entitlement and advanced user authentication, including the facility for an administrator to disable a remote Active Folder if authentication is not received, for example, in the case of a stolen or lost laptop. Advanced Search and Retrieval Built on the...
Summary: ...questions such as “why are they phoning the call center when they are trying to open a checking account online or are in the midst of the checkout process for a pair of shoes” can be answered definitively based on a conceptual understanding of both the call content and the web pages visited. This...
Summary: ...send out hold notices and interview forms create unnecessary risk. They do not provide an effective legal hold. Custodian Self-Collection is Not the Answer Even if the solution provides the ability for custodian self-collection, it does not mitigate risk as self-collection is frequently challenged and...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...may be questions that cannot be fully explored in the interviews, the ERM program team could be left with the risk of making assumptions. It is much better to organize workshops allowing stakeholders to provide answers to questions from those impacted by the change. Verification workshops provide a forum...
Summary: ...you to test different versions of web copy to find out which versions resonate best. And the results are backed by customer response data, so you don’t have to guess or go by opinion. Testing provides you the customer feedback you need to understand what provokes action and what doesn’t. Even learning...
Summary: ...digital communications systems. Claude Shannon stated that information could be treated as a quantifiable value in communications. Natural languages contain a high degree of redundancy or nonessential content. For example, a conversation in a noisy room can be understood even when some of the words cannot...
Summary: ...to be more agile without increasing their workload. MTV: We have a corporate performance management wiki project in our BPX community where that same question is being discussed – how to tie them up together, what is important and what is not. It’s not a question with a single answer. This is a part...
Summary: ...Frost & Sullivan Moving to Next-Generation Speech Analytics - White Paper. Natural language analysis approaches human conversations by letting users pose questions rather than keying in specific words to get answers. It only recognizes precise questions and stored matching answers. This is a major shortcoming...
Summary: ...data based on the user’s unique physical characteristics to provide the highest levels of security. Autonomy also has the ability to not provide support or answer questions for anyone who calls in without the appropriate authentication credentials. Data Location & Privacy – Organizations of all types...
Summary: ...had no immediate visibility into the scope or depth of the risk. Technology’s Role The fundamental issue is one of technology. To date, risk management systems have taken a segmented, passive, after-the-fact approach. Audits are periodically verified, control processes are tested and executed, and data...
Summary: ...Frequently, companies undertake Voice of the Customer (VoC) projects to better understand what customers want and, hopefully, will pay for. Until now, these projects have been myopic in nature and constrained by technology. No longer - the paradigm has changed. Going forward, Voice of the Customer will...
Summary: ...expanded, “Other systems often have a centralized proprietary verification and reporting architecture, or are standalone PCs that will only track clients at a single clinic. In the centralized, proprietary types of systems, you might have to wait hours or even days for a report to be faxed or sent,...
Summary: ...www.etalk.com today. For more information on the Payment Card Industry Data Security Standards, visit https://www.pcisecuritystandards.org/tech/index.htm. 5 1 Gartner Report, “The Truth Behind Identity Theft Numbers,” February 28, 2007, by Avivah Litan 2 Gartner Report, “Answers to Common Questions...
Summary: ...Social Media and Information Compliance - Autonomy whitepaper. There is no question that additional cases will be tested under the SCA, potentially with conflicting results. However, two Federal Circuits appear to have solid precedent that the SCA is relevant to many forms of electronic communication,...
Summary: ...to imply a purely subjective 26 Griffith at 12. 27 Id. (citations omitted). 28 Id. at 5 (quoting In re Walt Disney Co. Derivative Litig, 2005 WL 2056651 (Del. Aug. 9, 2005) (emphasis added). 29 Id. 30 In re Walt Disney Co. Deriv. Litig, 825 A.2d 275 (Del. Ch. 2003). 31 Id. (quoting Official Comm. Of Unsecured...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.