US20140278641A1 - Systems and methods for incident queue assignment and prioritization - Google Patents
Systems and methods for incident queue assignment and prioritization Download PDFInfo
- Publication number
- US20140278641A1 US20140278641A1 US13/840,476 US201313840476A US2014278641A1 US 20140278641 A1 US20140278641 A1 US 20140278641A1 US 201313840476 A US201313840476 A US 201313840476A US 2014278641 A1 US2014278641 A1 US 2014278641A1
- Authority
- US
- United States
- Prior art keywords
- incident
- queue
- handling system
- highest priority
- next highest
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06316—Sequencing of tasks or work
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06311—Scheduling, planning or task assignment for a person or group
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06311—Scheduling, planning or task assignment for a person or group
- G06Q10/063114—Status monitoring or status determination for a person or group
Definitions
- ATM automated teller machine
- An ATM may be out of cash, its screen may be broken, or its software may have malfunctioned.
- ATM automated teller machine
- FIG. 1A schematically depicts an illustrative networked architecture for incident queue assignment and prioritization in accordance with one or more embodiments of the disclosure.
- FIG. 1B schematically depicts an illustrative incident handling system in accordance with one or more embodiments of the disclosure.
- FIG. 2 schematically depicts an illustrative incident handling server in accordance with one or more embodiments of the disclosure.
- FIGS. 3-7 are process flow diagrams depicting illustrative methods for incident queue assignment and prioritization in accordance with one or more embodiments of the disclosure.
- FIGS. 8-9 illustrate presentations of information associated with incident queue assignment and prioritization in accordance with one or more embodiments of the disclosure.
- An incident handling system as described herein may support highly customizable and automated assignment of incidents to incident queues and prioritization of the incidents within the queues. Both the assignment and prioritization of incidents may be based at least in part on a combination of definitions, rules, and scoring algorithms. Such a system may help ensure that incident resolution personnel are able to work on the next highest priority incident.
- Incident queues may comprise dynamic sets of incidents assigned to or associated with them. Incidents associated with incident queues may be prioritized. While some incident queues may drive automated workflow processing, other incident queues may drive issue resolution by incident resolution agents. While an incident may be initially assigned to a particular incident queue and given a particular priority within that incident queue, the incident may be subsequently re-assigned to a second incident queue, have its priority changed, have its status changed, or be removed from the incident queue. An incident may also be assigned to more than one queue simultaneously, and may be removed from all the queues with which it is associated after it has been resolved in the context of one queue.
- An incident queue may be an association of incidents that satisfy an incident queue assignment rule.
- An incident queue may be a non-transient data construct or, in some embodiments, a transient data construct. In some embodiments, incident queues may be dynamically generated and discarded.
- Incidents may be created and stored in one or more incident repositories. Incident attributes may be modified by any of several sub-systems of the incident handling system or entities over the life-cycle of the incident.
- an incident resolution agent may subscribe to one or more incident queues simultaneously.
- the incident handling system may obtain the “next highest priority” incident from a specific incident queue or across all subscribed incident queues.
- an incident may be serially assigned to more than one incident resolution agent during its course of resolution.
- the incident may be assigned to an agent only when the agent has it “locked” (e.g., is actively working on it). If the agent does not completely resolve the issue in the current session, he or she may route, re-assign, or otherwise release the incident. When the incident is released, it may once again be eligible for assignment to the next agent requesting the “next highest priority” incident for a queue holding that incident. Once an incident is ultimately closed, it may be removed from all the queues in which it appeared.
- an agent may escalate an incident (e.g., change its service level or other attribute), which may cause it to be assigned to another queue.
- FIG. 1A schematically depicts an illustrative networked architecture 100 for facilitating the assignment and prioritization of incidents in incident queues in accordance with one or more embodiments of the disclosure.
- FIG. 1B schematically depicts an illustrative architecture for an incident handling system 110 . It should be appreciated that numerous other suitable configurations beyond the illustrative configurations depicted in FIGS. 1A-1B are within the scope of this disclosure.
- FIG. 2 schematically depicts an incident handling server 200 in accordance with one or more embodiments of the disclosure. The illustrative methods depicted in FIGS. 3-7 will be described in the context of the illustrative configurations shown in FIGS. 1A-1B and the illustrative incident handling server depicted in FIG. 2 .
- the illustrative networked architecture 100 may include an incident handling system 110 that may include one or more incident handling sub-system 106 ( 1 )- 106 (N) (generically referred to herein as incident handling sub-system(s) 106 ) and one or more local datastores 108 .
- the networked architecture 100 may further include one or more external device(s) 102 and one or more networks 104 .
- the one or more networks 104 may include, but not be limited to, a wireless fidelity (Wi-Fi) network, a Wi-Fi Direct network, an NFC connection, a radio network, a cellular network, the Internet, a GPS network, a ZigBee® connection, a Bluetooth® channel, a dial-up connection over a public telephone system, a private network (both wide area and local area), proprietary protocol connections, and other wireless links, as well as hardwired connections, serial link connections, parallel link connections, or combinations thereof.
- Wi-Fi wireless fidelity
- Wi-Fi Direct Wireless Fidelity
- the incident handling sub-system(s) 106 may execute on one or more suitable computing devices including, but not limited to, one or more server computers, mainframe computers, workstation computers, personal computing devices, mobile computing devices, and so forth. It should be appreciated that the incident handling system 110 may further include various other components such as routers, gateways, switches, other computing devices, communicative links, or any other suitable components.
- an external device 102 that hosts or otherwise provides access to an external event reporting platform 102 A is also depicted in FIG. 1A .
- the incident handling system 110 may receive a report comprising data associated with an event 116 from the external event reporting platform 102 A.
- An event may include, but is not limited to, a software error condition or fault reported from an external event reporting platform 102 A, a user service issue reported from an external event reporting platform 102 A, and/or a hardware error condition or fault reported from an external event reporting platform 102 A or the external device 102 itself (e.g., via firmware).
- reporting devices may not be just external devices; they may also comprise devices co-hosted with the incident handling system 110 .
- Examples of software error condition or user service issue events reported by the external event reporting platform 102 A may include software failures (e.g., abnormal terminations or “aborts”), failure to meet service levels, and reporting of a product or service issue on behalf of a user of the external device 102 .
- Examples of hardware error condition events that may be reported by the external device 102 or the external event reporting platform 102 A may include a device out of cash condition, a device out of paper condition, a dispensing problem (e.g., paper or cash jam), a processing problem (e.g., of a card), or the like.
- Examples of external devices 102 that may report events 116 may include any type of computing platform (e.g., mobile device, laptop, or the like), a network-connect computer peripheral, an ATM, a kiosk, a smart safes, a branch teller terminal, a cash recycling machine, or any of a wide variety of specialized devices (e.g., medical diagnostic, manufacturing plant machine or robot, controller, or the like).
- computing platform e.g., mobile device, laptop, or the like
- a network-connect computer peripheral e.g., an ATM, a kiosk, a smart safes, a branch teller terminal, a cash recycling machine, or any of a wide variety of specialized devices (e.g., medical diagnostic, manufacturing plant machine or robot, controller, or the like).
- events 116 may be reported by devices co-hosted with the incident handling system 110 (e.g., within the entity running the incident queue assignment and prioritization sub-system), possibly in communication with an internal event reporting platform (e.g., depicted as 122 in FIG. 1B ).
- an internal event reporting platform e.g., depicted as 122 in FIG. 1B .
- the internal event reporting platform may not be needed.
- the external event reporting platform may not be needed.
- the incident handling system 110 may include one or more incident handling sub-systems 106 and one or more local datastores 108 .
- the incident handling sub-systems may include but are not limited to an event collection and management sub-system 120 , and incident creation and management sub-system 130 , an incident queue assignment and prioritization sub-system 140 , an administration sub-system 160 , and an incident resolution sub-system 170 .
- the one or more local data stores 108 may include but are not limited to a queue definitions repository 142 , an assignment rules repository 144 , a tag definitions repository 146 , an incident queues repository 148 , an incidents repository 150 , and/or an events repository (not shown).
- An internal event reporting platform 122 may be in communication with an event collection and management sub-system (ECMS) 120 .
- the ECMS 120 may receive an event 116 from one or more event reporting platforms 102 A, 122 , or from an external device 102 or similar internal device.
- the ECMS 120 may be in communication with an incident creation and management sub-system (ICMS) 130 .
- ICMS incident creation and management sub-system
- the ICMS 120 may receive an event 116 from the ECMS 120 , determine whether to create an incident 117 based at least in part on the received event 116 .
- the ICMS 130 may store the incident 117 in an incident repository 150 .
- the ICMS 130 may be in communication with the incident queue assignment and prioritization sub-system (IQAPS) 140 .
- the IQAPS 140 may receive the incident 117 from the ICMS 130 and associate the incident 117 with one or more incident queues 118 , which may in turn be stored in the incident queues repository 148 .
- the IQAPS 140 may also be in communication with one or more local datastores 108 to facilitate incident queue 118 assignment and prioritization.
- the one or more local datastore 108 may include, but are not limited to, a queue definition repository 142 , a queue assignment rules repository 144 , a tag definitions repository 146 , and/or an incident queues repository 148 . Additionally, each or all of the local datastores 108 may be in communication with an administration sub-system 160 and/or an incident resolution sub-system 170 .
- An administration sub-system 160 with one or more user interfaces may allow system administration personnel to create, modify, and/or delete queue definitions, tag definitions, and rules, as well as modify incidents and queues (e.g., change an incident's queue assignment, prioritization, status, or remove the incident from the incident queue).
- UI user interfaces
- An incident resolution sub-system 170 with one or more user interfaces may allow incident resolution agents to subscribe to particular incident queues, request the next highest priority incident within a queue, and modify or remove an incident 117 responsive to incident resolution activity.
- UI user interfaces
- the ECMS 120 may receive events 116 , process events 116 , and provide them to the ICMS 120 .
- the events 116 may be received by the ICMS 130 directly.
- the ECMS 120 may communicate with one or more event sources.
- events 116 may be either “pushed” from sources, whereas in other embodiments they may be “pulled” from sources. If events 116 are pushed from sources, the ECMS 120 may receive the events 116 and associated information.
- the ECMS 120 may host a web service that may be called to report an event 116 , host a message queue that may receive events 116 , receive batch files in well-defined locations via well-defined communication mechanisms, or the like. If events 116 are “pulled” from sources, the ECMS 120 may actively direct the polling and retrieval, in accordance with operational configurations (e.g., schedules, network locations, interprocess communication mechanisms, or the like).
- the ECMS 120 may transform events 116 that have been received or obtained. For example, events 116 may be normalized into one or more well-defined formats that subsequent sub-systems can process. Received event data may be enhanced (e.g., to include time of receipt).
- the ECMS 120 may be stored in one or more event repositories.
- the event repositories may store events 116 that may be accessed and/or processed at a later time.
- events 116 are maintained in event repositories for historical purposes, such as statistical analysis and data mining.
- the ECMS 120 may deliver the events 116 to the ICMS 130 .
- the ECMS 120 may notify the ICMS 130 of a received or obtained event 116 .
- the ECMS 120 may notify the ICMS 130 after the event 116 has been transformed by the ECMS 120 .
- the method by which the event 116 was received by the ECMS 120 may be different from the way the event 116 is delivered to the ICMS 130 .
- an event source may be polled on a regular schedule for events 116 and any available events 116 may be retrieved asynchronously.
- each event 116 may be delivered immediately to the ICMS 130 via an application program interface (API) call.
- API application program interface
- the ICMS 130 may receive and process an event 116 to determine if an incident 117 should be created.
- an incident 117 is similar to a “ticket” associated with an issue that needs to be resolved (e.g., by automated processing, external support entities, or by an incident resolution agent).
- An incident 117 may be generated responsive to the ICMS 130 receiving an event 116 .
- rules-based processing of the ICMS 130 may create incidents for only a subset of received events 116 . Rules relating to incident creation may be hardcoded in the ICMS 130 software or may be accessed from an appropriate rules data repository.
- multiple events 116 may be associated with a single incident 117 (e.g., multiple like events from different sources or multiple distinct events received in close proximity from a single source).
- the ICMS 130 may create new incidents 117 as appropriate.
- a data structure of the incident 117 may be created based at least in part on event attributes and/or other supplemental information.
- the ICMS 130 may store and manage incidents 117 .
- incidents 117 may be stored in one or more repositories 150 , from which they may subsequently be accessed and/or processed.
- the one or more repositories 150 may be used for historical purposes (e.g., statistical analysis and data mining).
- the ICMS 130 may automatically handle and/or dispatch incidents based at least in part on one or more incident handling rules. In some embodiments, the ICMS 130 may trigger fully automated incident resolution or transmission of the incident 117 to a party other than an incident resolution agent. For example, a hardware incident may be transmitted to an external entity providing hardware support.
- the ICMS 130 may monitor the status of incidents 117 . If automated resolution for an incident 117 is not possible or fails, or an incident resolution service level agreement has not been met (e.g., slow response from an external entity providing support), the incident 117 may be transmitted to the IQAPS 140 for handling by an incident resolution agent, as described below.
- the ICMS 130 may encompass ECMS 120 functionality if sources connect directly to the ICMS 130 .
- the ICMS 130 may trigger incident queue assignment and prioritization by the IQAPS 140 for an incident 117 with an associated status indicating the incident requires attention.
- the incident queue assignment and prioritization may be invoked via an API, database trigger, message queue, or the like.
- the IQAPS 140 may poll the one or more incident repositories 150 to identify new incidents 117 .
- the IQAPS 140 may manage and optimize incident assignment for incident resolution agents. In some embodiments, the IQAPS 140 may process each incident 117 based at least in part on incident queue definitions and incident queue assignment rules. In some embodiments, the IQAPS 140 may process each incident 117 based also on tag definitions and tag assignment rules The IQAPS 140 may process an incident 117 to place it in one or more incident queues 118 . In some embodiments, an incident 117 may be prioritized within the incident queue it is associated with based at least in part on one or more prioritization or scoring rules and/or scoring calculations. In some embodiments, an incident 117 may be associated with more than one incident queue 118 . When an incident has been resolved, an incident resolution agent may mark the incident 117 as closed. The “closed” status of the incident indicates that the incident is closed with regards to all incident queues associated with the incident.
- An incident 117 may be assigned or associated with an incident queue 118 .
- the IQAPS 140 may “score” the incident based at least in part on one or more prioritization and/or scoring rules.
- the prioritization and/or scoring rules may be stored in one or more rules repositories.
- factors that may be used to score an incident 117 may include, but are not limited to, an incident categorization, one or more fault codes that drove the creation of the incident 117 , the organization identified by the incident handling system 110 as being the primary servicer for the incident 117 , a service level of the incident, and any tags that may be associated with the incident.
- Each of the factors associated with prioritization in the incident queue 118 may be assigned a priority level, which may drive scoring of the incident 117 for inclusion and/or prioritization of the incident within an incident queue 118 .
- the factors may be classified as (1) High Priority, (2) Medium Priority, (3) Low Priority, or (4) Exclude.
- Inclusion and/or prioritization rules may evaluate the priority levels for all factors associated with an incident in combination to determine inclusion of an incident within an incident queue and/or one of a small number of discrete priorities for the incident within the incident queue. In these calculations, some factors may be given more weight than others (e.g., one factor with a priority level of “Exclude” may cause the incident to not be included in the incident queue, irrespective of other factor priority levels).
- the IQAPS 140 may process one or more incidents 117 . Processing the one or more incidents 117 may involve applying all the prioritization and/or scoring rules associated with the incident queue 118 to an incident 117 . More than one rule may be applied based on various incident attribute and/or tag values. In some embodiments, the association of tags to incidents may need to occur prior to the assignment and prioritization of incidents associated with an incident queue. In some embodiments, scoring may be based on a point system. Multiple rules may effectively add or subtract from a total number of points associated with the incident 117 and then the IQAPS 140 may order the incidents based on their respective scores.
- Prioritization/scoring rules or the sum total of points may map to one of a small number of discrete priorities (e.g., Very High, High, Low, and Very Low). Multiple prioritization/scoring rules yielding a same priority (e.g., High) may not necessarily increase the incident 117 to a higher priority. However, multiple rules yielding different priorities may cause an overall priority to increase or decrease.
- the age of an incident 117 may be factored into prioritization (e.g., as a tie breaker if two incidents are identified as equivalent priority in association with an incident queue). Note that an incident assigned to different incident queues may have a different priority within each incident queue, in accordance with respective prioritization/scoring rules or calculations.
- Incident assignment and prioritization may be performed on newly obtained or received incidents 117 , pending incidents, or incidents that have already been assigned and/or prioritized. For example, if a new incident queue 118 is established or a new assignment rule is created, it may be desirable to re-evaluate all or some subset of incidents 117 , potentially causing pending incidents to be associated with the new incident queue.
- incident processing may only be performed on incidents 117 that are eligible for optimization. Incidents that can be resolved by fully automated incident resolution, incidents that have been dispatched to entities other than an incident resolution agent, and/or incidents that are still within service level agreement periods may not be eligible for such processing.
- FIG. 2 depicts an illustrative architecture 200 of an incident handling server 200 in accordance with one or more embodiments of the disclosure.
- the incident handling server 200 may be an instance of any suitable computing device, examples of which were identified in relation to the discussion of FIG. 1A .
- the incident handling server 200 may comprise one or more processors 202 and one or more memories 204 (generically referred to herein as memory 204 ).
- the processor(s) 202 may include any suitable processing unit capable of executing stored computer-executable instructions to receive or retrieve data from one or more data repositories, I/O devices, and/or network entities; process data; generate output data; store data in one or more data repositories; transmit data to I/O devices or network entities; and/or control the operation or use of various hardware resources or other components associated with the incident handling server 200 .
- the computer-executable instructions may be stored, for example, in the memory 204 and may include operating system software, application software, and so forth.
- the processor(s) 202 may be configured to execute the computer-executable instructions to cause various operations to be performed.
- the processor(s) 202 may include any type of processing unit including, but not limited to, a central processing unit, a microprocessor, a Reduced Instruction Set Computer (RISC) microprocessor, a microcontroller, an Application Specific Integrated Circuit (ASIC), and so forth.
- RISC Reduced Instruction Set Computer
- ASIC Application Specific Integrated Circuit
- the memory 204 may store program instructions that are loadable and executable by the processor(s) 202 , as well as data manipulated and generated by the processor(s) 202 during execution of the program instructions.
- the memory 204 may be volatile memory (memory that maintains its state when supplied with power) such as random access memory (RAM) and/or non-volatile memory (memory that maintains its state even when not supplied with power) such as read-only memory (ROM), flash memory, and so forth.
- the memory 204 may include multiple different types of memory, such as static random access memory (SRAM), dynamic random access memory (DRAM), unalterable ROM, and/or writeable variants of ROM such as electrically erasable programmable read-only memory (EEPROM), flash memory, and so forth.
- SRAM static random access memory
- DRAM dynamic random access memory
- EEPROM electrically erasable programmable read-only memory
- flash memory and so forth.
- the incident handling server 200 may further include additional data storage 218 such as removable storage and/or non-removable storage including, but not limited to, magnetic storage, optical disk storage, and/or tape storage.
- Data storage 218 may provide non-volatile storage of computer-executable instructions and other data.
- the non-volatile instances of memory 204 and/or the data storage 218 , removable and/or non-removable, are examples of computer-readable storage media (CRSM).
- CRSM computer-readable storage media
- the incident handling server 200 may further include communications connection(s) 222 that allow the incident handling server 200 to communicate with other network entities, which may be remote computing devices and/or software components, forming part of the networked architecture 100 depicted in FIG. 1A .
- the incident handling server 200 may utilize the network interface(s) 222 to communicate with the external event reporting platform 102 A, the network(s) 104 , the internal event reporting platform 122 , and so forth.
- the incident handling server 200 may additionally include one or more input/output (I/O) interfaces 220 , such as a keyboard, a keypad, a mouse or other pointing device, a pen, a voice input device, a touch input device, a display, speakers, a camera, a microphone, a printer, and so forth, for receiving user input and/or providing output to a user.
- I/O input/output
- the memory 204 may include various program modules comprising computer-executable instructions that upon execution by the processor(s) 202 cause the incident handling server 200 to perform various operations.
- the memory 204 may have loaded therein an operating system (O/S) 206 that provides an interface between other application software executing on the incident handling server 200 and hardware resources of the incident handling server 200 .
- the O/S 206 may include a set of computer-executable instructions for managing hardware resources of the incident handling server 200 and for providing common services to other application programs (e.g., managing memory allocation among various application programs).
- the O/S 206 may include any operating system now known or which may be developed in the future including, but not limited to, a Microsoft Windows® operating system, an Apple OSXTM operating system, Linux, Unix, a mainframe operating system such as Z/OS, a mobile operating system, or any other proprietary or freely available operating system.
- the memory 204 may further include a database management system (DBMS) 208 for accessing, retrieving, storing, and/or manipulating data stored in one or more datastores.
- DBMS database management system
- the DBMS 208 may use any of a variety of database models (e.g., relational model, object model, etc.) and may support any of a variety of query languages.
- the memory 204 may further include various program modules comprising computer-executable instructions that upon execution by the processor(s) 202 cause the incident handling server 200 to perform various operations.
- various program/application modules comprising computer-executable instructions that upon execution by the processor(s) 202 cause the incident handling server 200 to perform various operations.
- the memory 204 may additionally include various other program modules that may support various associated functionality.
- the memory 204 may include an incident creation module 210 , an incident assignment and prioritization module 212 , and an incident resolution module 214 . Functionality supported by these various modules will be described in more detail through reference to the various illustrative methods depicted in the process flow diagrams of FIGS. 3-7 .
- the incident creation module 210 may provide functionality directed to receiving and processing an event 116 to determine if an incident 117 should be created and creating a new incident 117 as appropriate.
- the incident creation module 210 may also provide functionality directed to the storage and management of incidents 117 .
- the incident assignment and prioritization module 212 may provide functionality directed to manage and optimize incident 117 assignment to one or more incident queues 118 .
- the incident assignment and prioritization module 212 may also provide functionality directed to processing all the incidents 117 associated with an incident queue 118 .
- the processing may be based at least in part on one or more prioritization rules.
- the one or more prioritization rules may be used to identify the next highest priority incident to be returned to a requesting incident resolution agent.
- the incident assignment and prioritization module 212 may provide functionality directed to the generation and management of incident queues 118 .
- the incident resolution module 214 may provide functionality directed to facilitating resolution of an identified incident.
- the incident resolution module 214 may aid an incident resolution agent in identifying the next highest priority incident, obtaining data associated with the resolution of the incident, and modifying a status associated with the incident.
- the incident resolution module 214 may permit an incident resolution agent to mark the incident as “resolved.” If the incident cannot be resolved, the incident resolution module 214 may permit the incident resolution agent to release the incident so that the incident is still active in the one or more incident queues 118 it may populate.
- the incident resolution module 214 may also support the escalation and/or re-assignment of an incident to another incident resolution agent or supervisor.
- the illustrative networked architecture 100 depicted in FIG. 1A the illustrative incident handling system depicted in FIG. 1B , and the illustrative incident handling server 200 depicted in FIG. 2 are provided by way of example only. Numerous other operating environments, system architectures, and device configurations are within the scope of this disclosure. Various embodiments of the disclosure may include fewer or greater numbers of components and/or devices than those depicted in FIGS. 1A , 1 B, and 2 may incorporate some or all of the functionality described with respect to the illustrative architecture 100 depicted in FIG. 1A , the illustrative incident handling system depicted in FIG. 1B , illustrative incident handling server depicted in FIG. 2 , or additional functionality.
- any of the components of the architecture 100 may include alternate and/or additional hardware, software or firmware components beyond those described or depicted without departing from the scope of the disclosure. More particularly, it should be appreciated that software, firmware or hardware components depicted as forming part of any of the components of the architecture 100 are merely illustrative and that some components may not be present or additional components may be provided in various embodiments. While various program modules have been depicted and described with respect to various illustrative components of the architecture 100 , it should be appreciated that functionality described as being supported by the program modules may be enabled by any combination of hardware, software, and/or firmware.
- each of the above-mentioned modules may, in various embodiments, represent a logical partitioning of supported functionality. This logical partitioning is depicted for ease of explanation of the functionality and may not be representative of the structure of software, firmware and/or hardware for implementing the functionality. Accordingly, it should be appreciated that functionality described as being provided by a particular module may, in various embodiments, be provided at least in part by one or more other modules. Further, one or more depicted modules may not be present in certain embodiments, while in other embodiments, additional modules not depicted may be present and may support at least a portion of the described functionality and/or additional functionality. Further, while certain modules may be depicted and described as sub-modules of another module, in certain embodiments, such modules may be provided as independent modules.
- FIG. 3 is a process flow diagram depicting an illustrative method 300 for event collection and management, incident creation and management, and incident queue assignment and prioritization prior to an incident resolution action in accordance with one or more embodiments of the disclosure.
- FIG. 4 is a process flow diagram depicting an illustrative method 400 for processing to assign one or more tags to an incident in accordance with one or more embodiments of the disclosure.
- FIG. 5 is a process flow diagram depicting an illustrative method 500 for processing to assign an incident to one or more incident queues.
- FIG. 6 is a process flow diagram depicting an illustrative method 600 for processing to prioritize an incident within each incident queue to which it is assigned.
- FIG. 7 is a process flow diagram depicting an illustrative method 700 for incident assignment and prioritization in response to receiving a request on behalf of an incident resolution agent for a next highest priority incident.
- the illustrative methods 300 - 700 will be described through reference to the illustrative networked architecture depicted in FIG. 1A , the illustrative architecture of an incident handling system 110 , and the illustrative configuration and implementation of a incident handling server 200 as depicted in FIG. 2 .
- the illustrative methods 300 - 700 may be performed in connection with any networked architecture and configuration within the scope of this disclosure. Further, while various operations are depicted in the process flow diagrams depicted in FIGS.
- any of the depicted operations are optional and that, in various embodiments, any of the operations may not be performed. Depicted operations may also be performed in a different order. Further, in various embodiments, additional operations may be performed beyond those which are depicted.
- incident handling system 110 may receive data associated with an event 116 .
- the incident handling system 110 may generate an incident based at least in part on the event.
- the incident handling system 110 may optionally associate one or more tags with the incident.
- the incident handling system 110 may associate the incident with an incident queue.
- the incident handling system 110 may process the one or more incidents in the incident queue.
- the incident handling system 110 may receive data associated with an event 116 .
- the event 116 may be a software error condition reported from an event reporting platform 102 A, 122 , a customer or user service issue reported from an event reporting platform 102 A, 122 , and/or a hardware error condition reported from a device 102 or an event reporting platform 102 A, 122 .
- the incident handling system 110 may generate an incident 117 based at least in part on the event 116 .
- the incident handling system 110 may evaluate the event 116 to determine whether an incident 117 should be created. If the incident handling system 110 determines that an incident 117 should be created, the incident handling system 110 may create a data structure of the incident 117 from the data associated with the event 116 .
- an identity of an incident 117 may be received from the ICMS 130 .
- the IQAPS 140 may receive the identity of the incident 117 from the ICMS 130 .
- the identity of the incident 118 may be a referential identifier to an incident 117 stored in a repository 150 .
- the identity of the incident 117 may be a data structure comprising all the attributes associated with the incident 117 .
- the incident 117 and its attributes may be identified for subsequent processing.
- this process flow specifies a single incident, the process flow may also be for multiple incidents.
- the method 300 may be performed iteratively as necessary (e.g., to process an incoming stream of requests, a message queue, or even a batch file).
- the incident handling system 110 may optionally associate one or more tags with the incident 117 .
- a tag may be a convenient way of referencing or grouping incidents.
- Incident queue assignment rules may reference tags as well as incident attributes. Tags may effectively aggregate a variety of similar but distinct fault codes, add flexibility to queue assignment, and support short-term needs to partition certain categories of incidents 117 .
- a tag may be a way of reference a or grouping certain incidents. Then, the queue assignment rules may reference tags as well as incident attributes. Tags may effectively aggregate a variety of similar but distinct fault codes, add flexibility to queue assignments, and support short-term needs to partition certain categories of incidents.
- tag definitions may comprise a set of attributes that may include, but are not limited to, a name identifying the tag, one or more incident attribute and value pair(s) identifying incidents 117 to be assigned or associated with the tag, one or more rules identifying incidents 117 to be assigned or associated with the tag, one or more identifiers associated with one or more tag definition rules, a visual element (e.g., color or graphical icon) to be associated with the tag in certain user interfaces or presentations and/or reports, and the like.
- attributes may include, but are not limited to, a name identifying the tag, one or more incident attribute and value pair(s) identifying incidents 117 to be assigned or associated with the tag, one or more rules identifying incidents 117 to be assigned or associated with the tag, one or more identifiers associated with one or more tag definition rules, a visual element (e.g., color or graphical icon) to be associated with the tag in certain user interfaces or presentations and/or reports, and the like.
- a tag may be a non-hierarchical keyword, value, or term associated with an incident.
- a tag definition may be named “Georgia” and all incidents that are within the geographic boundaries of Georgia may be associated with the tag.
- a tag definition may be named “ATM” and all incidents that are generated or associated with an ATM issue may be associated with the tag.
- a tag definition may be named “High Priority” and all incidents that are associated with a particular fault code may be associated with the “High Priority” tag.
- Tags may enable the system to filter or identify all incidents based on the specified tag to be identified and in some embodiments, only those incidents associated with a tag may be used processed for assignment and prioritization for an incident queue.
- tag definitions may be stored in and retrieved from a tag definitions repository 146 .
- tag assignment rules if independent of tag definitions, may be stored in and retrieved from an assignment rules repository 144 .
- tag definitions may need to be evaluated prior to incident queue assignment and prioritization.
- tag definitions may be evaluated and relevant tag assignment rules may be applied to associate one or more tags with the incident 117 . Further details associated with this process are described below in relation to FIG. 4 .
- the incident handling system 110 may associate the incident 117 with an incident queue 118 .
- queue definitions may be evaluated and relevant queue assignment rules may be applied to associate the incident 117 with one or more incident queue(s) 118 .
- the queue assignment rules may reference tags as possible conditions for assignment.
- the identity of the incident 117 may be used to associate the incident with an incident queue 118 . Further details associated with this process are described below in relation to FIG. 5 .
- the incident handling system 110 may process the one or more incidents 117 in the one or more incident queues 118 with which the incident 117 is associated.
- the incident handling system 110 may process the one or more incident queues 118 based at least in part on one or more prioritization or scoring rules and/or scoring calculations to prioritize the incident within the respective incident queues 118 .
- the prioritization or scoring rules and/or scoring calculations may reference tags as possible conditions for prioritization. Further details associated with this process are described below in relation to FIG. 6 .
- FIG. 4 is a process flow diagram depicting an illustrative method 400 for processing to associate one or more tags to an incident 117 in accordance with one or more embodiments of the disclosure.
- the incident handling system 110 may increment a pointer to the next tag definition.
- the incident handling system 110 may determine whether the processing has reached the end of the tag definitions. If it is determined that the end of the tag definitions has been reached, then the process end. If it is determined that the end of the tag definitions has not been reached, then at block 415 , a pointer may be incremented to the next tag assignment rule. The incident handling system 110 may determine whether the process has reached the end of tag assignment rules.
- the process may return to block 405 . If the incident handling system 110 determines that the end of the tag assignment rules has not been reached, then at block 425 , the incident handling system then may evaluate whether the current tag assignment rule applies. If the incident handling system 110 determines that the current tag assignment does not apply, then the process may return to block 415 . If the incident handling system 110 determines that the current tag assignment rule applies, then at block 430 , the tag may be associated with the incident 117 . Once a tag has been associated with an incident 117 , the processing may return to block 405 .
- FIG. 5 is a process flow diagram depicting an illustrative method 500 for processing to associate an incident 117 to one or more incident queues 118 .
- the incident handling system 110 may increment a pointer to the next incident queue definition.
- all the incident queue definitions may be evaluated to ensure assigned of an incident to all appropriate incident queues. If the processing of incidents 117 occurs in response to a request from an incident resolution agent, then only incident queue definitions associated with the incident queue 118 associated with the incident resolution agent may be evaluated.
- a subset of incident queues definitions (less than all of the available incident queue definitions) may be evaluated.
- the subset of the incident queue definitions may be evaluated in association with a set of incident queues being restructured or reestablished.
- the incident handling system 110 may evaluate whether the process has reached the end of the incident queue definitions. Reaching the end of the incident queue definitions may be an indication that all the incident queue definitions have been processed and the process may end. If the incident handling system 110 determines that the process has not reached the end of the incident queue definitions, then at block 515 , the incident handling system 110 may increment a pointer to the next incident queue assignment rule associated with the current incident queue definitions. At block 520 , the process may determine whether the incident queue assignment rules have been reached. If the end of the incident queue assignment rules have been reached, then the process may return to block 505 .
- the incident handling system 110 may determine whether the incident queue assignment rule applies. If the incident queue assignment rule does not apply, then the process may return to block 515 . If the incident queue assignment rule does apply, then at block 530 , the incident 117 may be associated with the current incident queue 118 . In some embodiments, the incident 117 may be excluded from the current incident queue 118 based at least in part on the incident queue assignment rule. Upon associating or excluding the incident 117 from the incident queue 118 , the process may return to block 505 . In some embodiments, queue definitions may be stored in and retrieved from a queue definitions repository 142 and/or queue assignment rules may be stored in and retrieved from an assignment rules repository 144 .
- an incident queue 118 may comprise a set of prioritized incidents 117 that have a common element or attributes.
- an incident queue may be stored in and retrieved from an incident queues repository 148 .
- Queue definitions may comprise a set of attributes that may include, but are not limited to, a name identifying the incident queue 118 , one or more identifiers of queue assignment rules that control assignment or association of an incident 117 to the incident queue 118 , one or more identifiers of prioritization and/or scoring rules that control prioritization of an incident 117 associated with an incident queue 118 , and the like.
- Incident queues may be a way to effectively partition incident resolution activity.
- a particular incident queue may be associated with one or more teams of incident resolution agents, each team possibly having expertise with particular types of incidents.
- a financial institution may establish three ATM-related queues as follows: Incident Queue 1: easy incidents for new/inexperienced incident resolution agents; Incident Queue 2: cash-related incidents for incident resolution agents experienced with such issues; and Incident Queue 3: complex non-cash incidents requiring attention by other experienced incident resolution agents.
- incident queues may be stable once established. Additional incident queues 118 may be created for short periods of time to address particular needs. For example, the financial institution may utilize the three Incident Queue examples identified above. The financial institution may then note an increase of network-related incidents (e.g., a subset of complex incidents assigned to Incident Queue 3). The financial institution may create a new incident queue for just these incidents and assign a team of incident resolution agents to address these in a prioritized manner. Then this new incident queue may be discarded after the network-related incident(s) have been resolved and the surge in such incidents has diminished.
- network-related incidents e.g., a subset of complex incidents assigned to Incident Queue 3
- the financial institution may create a new incident queue for just these incidents and assign a team of incident resolution agents to address these in a prioritized manner. Then this new incident queue may be discarded after the network-related incident(s) have been resolved and the surge in such incidents has diminished.
- incident queue assignment rules may be based on incident attributes, which may include one or more assigned tags.
- the type of an event 116 or the type of an event source may directly determine association of the incident 117 with a particular incident queue 118 . For example, if the value associated with an event 116 is 12345, an incident queue assignment rule may associate the incident with Incident Queue A, whereas if an event source is ATM, another incident queue assignment rule may associate the incident with Incident Queue B.
- Queue assignment rules may involve Boolean operations, dynamic evaluations, conditional logic, and the like.
- each queue assignment rule may be associated with an identifier that may then be included in appropriate queue definitions.
- a particular rule may be associated with more than one incident queue.
- FIG. 6 is a process flow diagram depicting an illustrative method 600 for processing to prioritize an incident 117 within each incident queue 118 to which it is assigned.
- a pointer may be incremented to the next incident queue 118 the incident 117 to which the incident 117 has been assigned.
- the incident handling system 110 may determine whether the end of the incident queues 118 associated with the incident 117 have been reached. If the end of the incident queues 118 associated with the incident 117 have been reached, the process may terminate.
- a pointer may be incremented to the next prioritization and/or scoring rule associated with the current incident queue 118 .
- the incident handling system 110 may determine, at block 620 , whether the end of the prioritization rules has been reached. If the end of the prioritization rules have been reached, then the process may convert the score associated with the incident 117 to a priority at block 635 . In some embodiments, block 635 may be optional. Block 625 may not be necessary if the prioritization/scoring rules define discrete priorities in the first place, or if the system 110 operates on a score within a range rather than a finite set of discrete priorities.
- the rule may establish or modify a point score or assign a discrete priority. Unlike the application of tag assignment rules or incident queue assignment rules, the processing may not stop after the first applicable prioritization/scoring rule is encountered for an incident queue 118 . Additional applicable prioritization/scoring rules may modify a score up or down, so all rules must be evaluate/executed and applied as appropriate.
- the incident queue assignment and prioritization may be triggered in response to a request from an incident resolution agent for the “next highest priority” incident.
- the ICMS 130 may not trigger the IQAPS 140 after an incident 117 is created and placed in an appropriate incidents repository 150 .
- An incident queue 118 may not be a non-transient data structure. Rather, an incident queue may be created afresh every time an incident resolution agent requests a “next highest priority” incident. The incident queue 118 may be discarded after an incident 117 is assigned to the incident resolution agent.
- a single incident queue 118 may be dynamically generated (and the incidents therein prioritized) at a time.
- Another incident resolution agent subscribed to a different incident queue 118 may trigger the dynamic generation of a second incident queue 118 .
- the same incident 117 may appear in both the first incident queue and the second incident queue.
- mechanisms e.g., database locking
- FIG. 7 is a process flow diagram depicting an illustrative method 700 for incident assignment and prioritization.
- the incident handling system 110 may receive a request for the “next highest incident.” The request may have been generated on behalf of an incident resolution agent via the incident resolution sub-system 170 .
- the incident handling system 110 may identify an incident queue 118 .
- the incident queue 118 may be identified based at least in part on the received request.
- an incident resolution agent may only subscribe to one incident queue 118 at a time, so the incident resolution agent session may be associated with a particular incident queue 118 .
- an incident resolution agent may subscribe to multiple incident queues 118 . In such scenarios, a particular incident queue 118 may be identified in association with the received request. For example, the incident resolution agent may have specified a particular queue using an interface of the incident handling system 110 .
- the incident handling system 110 may generate an incident queue 118 .
- a process of the incident handling system 110 may dynamically generate the identified queue. In effect, this may be a pass of a portion of FIG. 5 across all incidents (or conceivably some subset) in the context of just the identified queue.
- the IA'S 140 functionality may be leveraged to generate the identified queue 118 .
- the queue definitions for the identified queue may be retrieved the queue definitions repository 142 and may be used to determine associated queue assignment rules, which may be retrieved from the assignment rules repository 144 .
- all available incidents 117 may be processed to generate a transient incident queue 118 in memory 204 .
- Available incidents 117 may include incidents that (1) have not been processed automatically, resolved, or closed, (2) are not being handled by an external entity and still within a service level agreement response period, and/or (3) are not currently assigned to another incident resolution agent. Each incident 117 may be processed, such as by a method as described in FIG. 5 . In some embodiments, if tags are utilized by the incident handling system 110 , tags may have been assigned to the incidents 117 prior to the generation of incident queues 118 .
- the incident handling system 110 may process the incident queue 118 to identify the next highest incident.
- a process may prioritize each incident 117 within the incident queue 118 , such as by a pass of a portion of FIG. 6 for just the identified queue (skipping blocks 605 and 610 and associated looping).
- the incident handling system 110 may assign the next highest priority incident to an incident resolution agent.
- the “next highest priority” incident within the transient incident queue may be identified and assigned to the incident resolution agent who sent the request. If more than one incident has the same priority/score, one or more rules may be applied to determine the “next highest priority” incident (e.g., the oldest incident may be selected as a tie-breaker).
- the incident handling system may transmit the next highest incident to the incident resolution agent.
- a response comprising an indication of the “next highest priority” incident may be transmitted for presentation to the incident resolution agent.
- FIG. 8 depicts an illustrative embodiment 800 of an incident associated with an incident queue viewed by an incident resolution agent.
- Incident queues may aid incident resolution agents to request the next prioritized incident from the incident handling system 110 , which may save them time in searching for and identifying priority incidents that require attention.
- element 802 indicates the status of a current incident.
- Element 806 is a message that may be displayed to an incident resolution agent regarding the current status of an incident. If the incident resolution agent selects the next incident button 804 , the incident resolution sub-system 170 may generate a request to the incident handling system 110 for the next highest priority incident.
- FIG. 9 also depicts an illustrative embodiment 900 of an incident associated with an incident queue viewed by an incident resolution agent.
- the incident resolution sub-system 170 may present the agent with a drop down menu 904 to select a particular incident queue 118 from which to request the next highest priority incident. Displayed in the drop down menu 904 is an incident queue named “Incident Q3” 902 . If the incident resolution agent selects the incident queue “Incident Q3,” 902 the incident handling system 110 may identify the next highest priority incident from the incidents associated with the incident queue.
- CRSM programmable random access memory
- SRAM programmable random access memory
- DRAM dynamic random access memory
- RAM random access memory
- ROM electrically erasable programmable read-only memory
- flash memory or other memory technology
- CD-ROM compact disc read-only memory
- DVD digital versatile disc
- computer-readable communication media may include computer-readable instructions, program modules, or other data transmitted within a data signal, such as a carrier wave, or other transmission.
- Examples of computer-readable communication media, whether modulated using a carrier or not, include, but are not limited to, signals that a computer system or machine hosting or running a computer program can be configured to access, including signals downloaded through the Internet or other networks.
- the distribution of software may be an Internet download.
- CRSM does not include computer-readable communication media.
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Operations Research (AREA)
- Game Theory and Decision Science (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Educational Administration (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Debugging And Monitoring (AREA)
- Telephonic Communication Services (AREA)
Abstract
Systems, methods and computer-readable media for incident queue assignment and prioritization are disclosed. An incident handling system may receive a request for a next highest priority incident. An incident requiring resolution may be identified. The incident may be associated with an incident queue based at least in part on a queue assignment rule. The incident queue may comprise one or more incidents. The incident queue may be processed based at least in part on a prioritization rule to identify, from the one or more incidents associated with the incident queue, the next highest priority incident. The incident handling system may transmit the next highest priority incident associated with the incident queue.
Description
- Many institutions may have a computing ecosystem consisting of a variety of different types of devices and platforms. One example of such a device or platform may be an automated teller machine (ATM). An ATM may be out of cash, its screen may be broken, or its software may have malfunctioned. However, due to the large number of ATMs located in different geographic areas, it may be difficult to identify all the issues associated with the ATMs, much less resolve the issues quickly.
- The detailed description is set forth with reference to the accompanying drawings. Use of the same reference numerals indicates similar or identical components or elements; however, similar components or elements may also be designated with different reference numerals. Various embodiments of the disclosure may utilize elements or components other than those illustrated in the accompanying drawings and some elements and/or components may not be present in one or more embodiments. It should be appreciated that while singular terminology may be used to describe various components or elements, a plural number of such components or elements is also within the scope of the disclosure.
-
FIG. 1A schematically depicts an illustrative networked architecture for incident queue assignment and prioritization in accordance with one or more embodiments of the disclosure. -
FIG. 1B schematically depicts an illustrative incident handling system in accordance with one or more embodiments of the disclosure. -
FIG. 2 schematically depicts an illustrative incident handling server in accordance with one or more embodiments of the disclosure. -
FIGS. 3-7 are process flow diagrams depicting illustrative methods for incident queue assignment and prioritization in accordance with one or more embodiments of the disclosure. -
FIGS. 8-9 illustrate presentations of information associated with incident queue assignment and prioritization in accordance with one or more embodiments of the disclosure. - Systems and methods in accordance with various embodiments of the present disclosure are directed to incident queue assignment and prioritization. An incident handling system as described herein may support highly customizable and automated assignment of incidents to incident queues and prioritization of the incidents within the queues. Both the assignment and prioritization of incidents may be based at least in part on a combination of definitions, rules, and scoring algorithms. Such a system may help ensure that incident resolution personnel are able to work on the next highest priority incident.
- Incident queues may comprise dynamic sets of incidents assigned to or associated with them. Incidents associated with incident queues may be prioritized. While some incident queues may drive automated workflow processing, other incident queues may drive issue resolution by incident resolution agents. While an incident may be initially assigned to a particular incident queue and given a particular priority within that incident queue, the incident may be subsequently re-assigned to a second incident queue, have its priority changed, have its status changed, or be removed from the incident queue. An incident may also be assigned to more than one queue simultaneously, and may be removed from all the queues with which it is associated after it has been resolved in the context of one queue.
- An incident queue may be an association of incidents that satisfy an incident queue assignment rule. An incident queue may be a non-transient data construct or, in some embodiments, a transient data construct. In some embodiments, incident queues may be dynamically generated and discarded.
- Incidents may be created and stored in one or more incident repositories. Incident attributes may be modified by any of several sub-systems of the incident handling system or entities over the life-cycle of the incident.
- In some embodiments, an incident resolution agent may subscribe to one or more incident queues simultaneously. In some embodiments, the incident handling system may obtain the “next highest priority” incident from a specific incident queue or across all subscribed incident queues.
- In some embodiments, an incident may be serially assigned to more than one incident resolution agent during its course of resolution. The incident may be assigned to an agent only when the agent has it “locked” (e.g., is actively working on it). If the agent does not completely resolve the issue in the current session, he or she may route, re-assign, or otherwise release the incident. When the incident is released, it may once again be eligible for assignment to the next agent requesting the “next highest priority” incident for a queue holding that incident. Once an incident is ultimately closed, it may be removed from all the queues in which it appeared. In some embodiments, an agent may escalate an incident (e.g., change its service level or other attribute), which may cause it to be assigned to another queue.
-
FIG. 1A schematically depicts an illustrativenetworked architecture 100 for facilitating the assignment and prioritization of incidents in incident queues in accordance with one or more embodiments of the disclosure.FIG. 1B schematically depicts an illustrative architecture for anincident handling system 110. It should be appreciated that numerous other suitable configurations beyond the illustrative configurations depicted inFIGS. 1A-1B are within the scope of this disclosure.FIG. 2 schematically depicts anincident handling server 200 in accordance with one or more embodiments of the disclosure. The illustrative methods depicted inFIGS. 3-7 will be described in the context of the illustrative configurations shown inFIGS. 1A-1B and the illustrative incident handling server depicted inFIG. 2 . - The illustrative
networked architecture 100 may include anincident handling system 110 that may include one or more incident handling sub-system 106(1)-106(N) (generically referred to herein as incident handling sub-system(s) 106) and one or morelocal datastores 108. Thenetworked architecture 100 may further include one or more external device(s) 102 and one ormore networks 104. - The one or
more networks 104 may include, but not be limited to, a wireless fidelity (Wi-Fi) network, a Wi-Fi Direct network, an NFC connection, a radio network, a cellular network, the Internet, a GPS network, a ZigBee® connection, a Bluetooth® channel, a dial-up connection over a public telephone system, a private network (both wide area and local area), proprietary protocol connections, and other wireless links, as well as hardwired connections, serial link connections, parallel link connections, or combinations thereof. - The incident handling sub-system(s) 106 may execute on one or more suitable computing devices including, but not limited to, one or more server computers, mainframe computers, workstation computers, personal computing devices, mobile computing devices, and so forth. It should be appreciated that the
incident handling system 110 may further include various other components such as routers, gateways, switches, other computing devices, communicative links, or any other suitable components. - An
external device 102 that hosts or otherwise provides access to an externalevent reporting platform 102A is also depicted inFIG. 1A . As will be described in more detail later in this disclosure, theincident handling system 110 may receive a report comprising data associated with anevent 116 from the externalevent reporting platform 102A. An event may include, but is not limited to, a software error condition or fault reported from an externalevent reporting platform 102A, a user service issue reported from an externalevent reporting platform 102A, and/or a hardware error condition or fault reported from an externalevent reporting platform 102A or theexternal device 102 itself (e.g., via firmware). It should be noted that reporting devices may not be just external devices; they may also comprise devices co-hosted with theincident handling system 110. Examples of software error condition or user service issue events reported by the externalevent reporting platform 102A, may include software failures (e.g., abnormal terminations or “aborts”), failure to meet service levels, and reporting of a product or service issue on behalf of a user of theexternal device 102. Examples of hardware error condition events that may be reported by theexternal device 102 or the externalevent reporting platform 102A may include a device out of cash condition, a device out of paper condition, a dispensing problem (e.g., paper or cash jam), a processing problem (e.g., of a card), or the like. Examples ofexternal devices 102 that may reportevents 116 may include any type of computing platform (e.g., mobile device, laptop, or the like), a network-connect computer peripheral, an ATM, a kiosk, a smart safes, a branch teller terminal, a cash recycling machine, or any of a wide variety of specialized devices (e.g., medical diagnostic, manufacturing plant machine or robot, controller, or the like). - In some embodiments,
events 116 may be reported by devices co-hosted with the incident handling system 110 (e.g., within the entity running the incident queue assignment and prioritization sub-system), possibly in communication with an internal event reporting platform (e.g., depicted as 122 inFIG. 1B ). In some embodiments, for certain hardware error condition events, the internal event reporting platform may not be needed. In some embodiments, for certain faults from external devices, the external event reporting platform may not be needed. - Now referring to
FIG. 1B , an illustrative architecture for anincident handling system 110 is depicted in accordance with one or more embodiments of the disclosure. In brief overview, theincident handling system 110 may include one or moreincident handling sub-systems 106 and one or morelocal datastores 108. The incident handling sub-systems may include but are not limited to an event collection andmanagement sub-system 120, and incident creation andmanagement sub-system 130, an incident queue assignment andprioritization sub-system 140, anadministration sub-system 160, and anincident resolution sub-system 170. The one or morelocal data stores 108 may include but are not limited to aqueue definitions repository 142, an assignment rulesrepository 144, atag definitions repository 146, anincident queues repository 148, anincidents repository 150, and/or an events repository (not shown). An internalevent reporting platform 122 may be in communication with an event collection and management sub-system (ECMS) 120. TheECMS 120 may receive anevent 116 from one or moreevent reporting platforms external device 102 or similar internal device. TheECMS 120 may be in communication with an incident creation and management sub-system (ICMS) 130. TheICMS 120 may receive anevent 116 from theECMS 120, determine whether to create anincident 117 based at least in part on the receivedevent 116. TheICMS 130 may store theincident 117 in anincident repository 150. TheICMS 130 may be in communication with the incident queue assignment and prioritization sub-system (IQAPS) 140. TheIQAPS 140 may receive theincident 117 from theICMS 130 and associate theincident 117 with one ormore incident queues 118, which may in turn be stored in theincident queues repository 148. TheIQAPS 140 may also be in communication with one or morelocal datastores 108 to facilitateincident queue 118 assignment and prioritization. The one or morelocal datastore 108 may include, but are not limited to, aqueue definition repository 142, a queueassignment rules repository 144, atag definitions repository 146, and/or anincident queues repository 148. Additionally, each or all of thelocal datastores 108 may be in communication with anadministration sub-system 160 and/or anincident resolution sub-system 170. - An
administration sub-system 160 with one or more user interfaces (UI(s)) may allow system administration personnel to create, modify, and/or delete queue definitions, tag definitions, and rules, as well as modify incidents and queues (e.g., change an incident's queue assignment, prioritization, status, or remove the incident from the incident queue). - An
incident resolution sub-system 170 with one or more user interfaces (UI(s)) may allow incident resolution agents to subscribe to particular incident queues, request the next highest priority incident within a queue, and modify or remove anincident 117 responsive to incident resolution activity. - The
ECMS 120 may receiveevents 116,process events 116, and provide them to theICMS 120. In some embodiments, theevents 116 may be received by theICMS 130 directly. TheECMS 120 may communicate with one or more event sources. In some embodiments,events 116 may be either “pushed” from sources, whereas in other embodiments they may be “pulled” from sources. Ifevents 116 are pushed from sources, theECMS 120 may receive theevents 116 and associated information. For example, theECMS 120 may host a web service that may be called to report anevent 116, host a message queue that may receiveevents 116, receive batch files in well-defined locations via well-defined communication mechanisms, or the like. Ifevents 116 are “pulled” from sources, theECMS 120 may actively direct the polling and retrieval, in accordance with operational configurations (e.g., schedules, network locations, interprocess communication mechanisms, or the like). - In some embodiments, the
ECMS 120 may transformevents 116 that have been received or obtained. For example,events 116 may be normalized into one or more well-defined formats that subsequent sub-systems can process. Received event data may be enhanced (e.g., to include time of receipt). - In some embodiments, the
ECMS 120 may be stored in one or more event repositories. The event repositories may storeevents 116 that may be accessed and/or processed at a later time. In some embodiments,events 116 are maintained in event repositories for historical purposes, such as statistical analysis and data mining. - In some embodiments, the
ECMS 120 may deliver theevents 116 to theICMS 130. TheECMS 120 may notify theICMS 130 of a received or obtainedevent 116. In some embodiments, theECMS 120 may notify theICMS 130 after theevent 116 has been transformed by theECMS 120. In some embodiments, the method by which theevent 116 was received by theECMS 120 may be different from the way theevent 116 is delivered to theICMS 130. For example, an event source may be polled on a regular schedule forevents 116 and anyavailable events 116 may be retrieved asynchronously. However, eachevent 116 may be delivered immediately to theICMS 130 via an application program interface (API) call. - The
ICMS 130 may receive and process anevent 116 to determine if anincident 117 should be created. In some embodiments, anincident 117 is similar to a “ticket” associated with an issue that needs to be resolved (e.g., by automated processing, external support entities, or by an incident resolution agent). Anincident 117 may be generated responsive to theICMS 130 receiving anevent 116. In some embodiments, rules-based processing of theICMS 130 may create incidents for only a subset of receivedevents 116. Rules relating to incident creation may be hardcoded in theICMS 130 software or may be accessed from an appropriate rules data repository. In some embodiments,multiple events 116 may be associated with a single incident 117 (e.g., multiple like events from different sources or multiple distinct events received in close proximity from a single source). - The
ICMS 130 may createnew incidents 117 as appropriate. In some embodiments, a data structure of theincident 117 may be created based at least in part on event attributes and/or other supplemental information. In some embodiments, theICMS 130 may store and manageincidents 117. For example,incidents 117 may be stored in one ormore repositories 150, from which they may subsequently be accessed and/or processed. In some embodiments, the one ormore repositories 150 may be used for historical purposes (e.g., statistical analysis and data mining). - In some embodiments, the
ICMS 130 may automatically handle and/or dispatch incidents based at least in part on one or more incident handling rules. In some embodiments, theICMS 130 may trigger fully automated incident resolution or transmission of theincident 117 to a party other than an incident resolution agent. For example, a hardware incident may be transmitted to an external entity providing hardware support. - In some embodiments, the
ICMS 130 may monitor the status ofincidents 117. If automated resolution for anincident 117 is not possible or fails, or an incident resolution service level agreement has not been met (e.g., slow response from an external entity providing support), theincident 117 may be transmitted to theIQAPS 140 for handling by an incident resolution agent, as described below. - In some embodiments, the
ICMS 130 may encompassECMS 120 functionality if sources connect directly to theICMS 130. TheICMS 130 may trigger incident queue assignment and prioritization by theIQAPS 140 for anincident 117 with an associated status indicating the incident requires attention. In some embodiments, the incident queue assignment and prioritization may be invoked via an API, database trigger, message queue, or the like. In some embodiments, theIQAPS 140 may poll the one ormore incident repositories 150 to identifynew incidents 117. - The
IQAPS 140 may manage and optimize incident assignment for incident resolution agents. In some embodiments, theIQAPS 140 may process eachincident 117 based at least in part on incident queue definitions and incident queue assignment rules. In some embodiments, theIQAPS 140 may process eachincident 117 based also on tag definitions and tag assignment rules TheIQAPS 140 may process anincident 117 to place it in one ormore incident queues 118. In some embodiments, anincident 117 may be prioritized within the incident queue it is associated with based at least in part on one or more prioritization or scoring rules and/or scoring calculations. In some embodiments, anincident 117 may be associated with more than oneincident queue 118. When an incident has been resolved, an incident resolution agent may mark theincident 117 as closed. The “closed” status of the incident indicates that the incident is closed with regards to all incident queues associated with the incident. - An
incident 117 may be assigned or associated with anincident queue 118. TheIQAPS 140 may “score” the incident based at least in part on one or more prioritization and/or scoring rules. In some embodiments, the prioritization and/or scoring rules may be stored in one or more rules repositories. In some embodiments, factors that may be used to score anincident 117 may include, but are not limited to, an incident categorization, one or more fault codes that drove the creation of theincident 117, the organization identified by theincident handling system 110 as being the primary servicer for theincident 117, a service level of the incident, and any tags that may be associated with the incident. - Each of the factors associated with prioritization in the
incident queue 118 may be assigned a priority level, which may drive scoring of theincident 117 for inclusion and/or prioritization of the incident within anincident queue 118. The factors may be classified as (1) High Priority, (2) Medium Priority, (3) Low Priority, or (4) Exclude. Inclusion and/or prioritization rules (or scoring calculations or algorithms) may evaluate the priority levels for all factors associated with an incident in combination to determine inclusion of an incident within an incident queue and/or one of a small number of discrete priorities for the incident within the incident queue. In these calculations, some factors may be given more weight than others (e.g., one factor with a priority level of “Exclude” may cause the incident to not be included in the incident queue, irrespective of other factor priority levels). - The
IQAPS 140 may process one ormore incidents 117. Processing the one ormore incidents 117 may involve applying all the prioritization and/or scoring rules associated with theincident queue 118 to anincident 117. More than one rule may be applied based on various incident attribute and/or tag values. In some embodiments, the association of tags to incidents may need to occur prior to the assignment and prioritization of incidents associated with an incident queue. In some embodiments, scoring may be based on a point system. Multiple rules may effectively add or subtract from a total number of points associated with theincident 117 and then theIQAPS 140 may order the incidents based on their respective scores. Individual prioritization/scoring rules or the sum total of points may map to one of a small number of discrete priorities (e.g., Very High, High, Low, and Very Low). Multiple prioritization/scoring rules yielding a same priority (e.g., High) may not necessarily increase theincident 117 to a higher priority. However, multiple rules yielding different priorities may cause an overall priority to increase or decrease. In some embodiments, the age of anincident 117 may be factored into prioritization (e.g., as a tie breaker if two incidents are identified as equivalent priority in association with an incident queue). Note that an incident assigned to different incident queues may have a different priority within each incident queue, in accordance with respective prioritization/scoring rules or calculations. - Incident assignment and prioritization may be performed on newly obtained or received
incidents 117, pending incidents, or incidents that have already been assigned and/or prioritized. For example, if anew incident queue 118 is established or a new assignment rule is created, it may be desirable to re-evaluate all or some subset ofincidents 117, potentially causing pending incidents to be associated with the new incident queue. - In some embodiments, incident processing may only be performed on
incidents 117 that are eligible for optimization. Incidents that can be resolved by fully automated incident resolution, incidents that have been dispatched to entities other than an incident resolution agent, and/or incidents that are still within service level agreement periods may not be eligible for such processing. -
FIG. 2 depicts anillustrative architecture 200 of anincident handling server 200 in accordance with one or more embodiments of the disclosure. Theincident handling server 200 may be an instance of any suitable computing device, examples of which were identified in relation to the discussion ofFIG. 1A . Theincident handling server 200 may comprise one ormore processors 202 and one or more memories 204 (generically referred to herein as memory 204). The processor(s) 202 may include any suitable processing unit capable of executing stored computer-executable instructions to receive or retrieve data from one or more data repositories, I/O devices, and/or network entities; process data; generate output data; store data in one or more data repositories; transmit data to I/O devices or network entities; and/or control the operation or use of various hardware resources or other components associated with theincident handling server 200. The computer-executable instructions may be stored, for example, in thememory 204 and may include operating system software, application software, and so forth. The processor(s) 202 may be configured to execute the computer-executable instructions to cause various operations to be performed. The processor(s) 202 may include any type of processing unit including, but not limited to, a central processing unit, a microprocessor, a Reduced Instruction Set Computer (RISC) microprocessor, a microcontroller, an Application Specific Integrated Circuit (ASIC), and so forth. - The
memory 204 may store program instructions that are loadable and executable by the processor(s) 202, as well as data manipulated and generated by the processor(s) 202 during execution of the program instructions. Depending on the configuration and implementation of theincident handling server 200, thememory 204 may be volatile memory (memory that maintains its state when supplied with power) such as random access memory (RAM) and/or non-volatile memory (memory that maintains its state even when not supplied with power) such as read-only memory (ROM), flash memory, and so forth. In various implementations, thememory 204 may include multiple different types of memory, such as static random access memory (SRAM), dynamic random access memory (DRAM), unalterable ROM, and/or writeable variants of ROM such as electrically erasable programmable read-only memory (EEPROM), flash memory, and so forth. - The
incident handling server 200 may further includeadditional data storage 218 such as removable storage and/or non-removable storage including, but not limited to, magnetic storage, optical disk storage, and/or tape storage.Data storage 218 may provide non-volatile storage of computer-executable instructions and other data. The non-volatile instances ofmemory 204 and/or thedata storage 218, removable and/or non-removable, are examples of computer-readable storage media (CRSM). - The
incident handling server 200 may further include communications connection(s) 222 that allow theincident handling server 200 to communicate with other network entities, which may be remote computing devices and/or software components, forming part of thenetworked architecture 100 depicted inFIG. 1A . For example, theincident handling server 200 may utilize the network interface(s) 222 to communicate with the externalevent reporting platform 102A, the network(s) 104, the internalevent reporting platform 122, and so forth. - The
incident handling server 200 may additionally include one or more input/output (I/O) interfaces 220, such as a keyboard, a keypad, a mouse or other pointing device, a pen, a voice input device, a touch input device, a display, speakers, a camera, a microphone, a printer, and so forth, for receiving user input and/or providing output to a user. - The
memory 204 may include various program modules comprising computer-executable instructions that upon execution by the processor(s) 202 cause theincident handling server 200 to perform various operations. For example, thememory 204 may have loaded therein an operating system (O/S) 206 that provides an interface between other application software executing on theincident handling server 200 and hardware resources of theincident handling server 200. More specifically, the O/S 206 may include a set of computer-executable instructions for managing hardware resources of theincident handling server 200 and for providing common services to other application programs (e.g., managing memory allocation among various application programs). The O/S 206 may include any operating system now known or which may be developed in the future including, but not limited to, a Microsoft Windows® operating system, an Apple OSX™ operating system, Linux, Unix, a mainframe operating system such as Z/OS, a mobile operating system, or any other proprietary or freely available operating system. - The
memory 204 may further include a database management system (DBMS) 208 for accessing, retrieving, storing, and/or manipulating data stored in one or more datastores. TheDBMS 208 may use any of a variety of database models (e.g., relational model, object model, etc.) and may support any of a variety of query languages. - The
memory 204 may further include various program modules comprising computer-executable instructions that upon execution by the processor(s) 202 cause theincident handling server 200 to perform various operations. The functionality provided by these various program/application modules will be described in more detail hereinafter through reference to various accompanying drawings. - The
memory 204 may additionally include various other program modules that may support various associated functionality. For example, thememory 204 may include anincident creation module 210, an incident assignment andprioritization module 212, and anincident resolution module 214. Functionality supported by these various modules will be described in more detail through reference to the various illustrative methods depicted in the process flow diagrams ofFIGS. 3-7 . - The
incident creation module 210 may provide functionality directed to receiving and processing anevent 116 to determine if anincident 117 should be created and creating anew incident 117 as appropriate. Theincident creation module 210 may also provide functionality directed to the storage and management ofincidents 117. - The incident assignment and
prioritization module 212 may provide functionality directed to manage and optimizeincident 117 assignment to one ormore incident queues 118. The incident assignment andprioritization module 212 may also provide functionality directed to processing all theincidents 117 associated with anincident queue 118. In some embodiments, the processing may be based at least in part on one or more prioritization rules. The one or more prioritization rules may be used to identify the next highest priority incident to be returned to a requesting incident resolution agent. Additionally, the incident assignment andprioritization module 212 may provide functionality directed to the generation and management ofincident queues 118. - The
incident resolution module 214 may provide functionality directed to facilitating resolution of an identified incident. Theincident resolution module 214 may aid an incident resolution agent in identifying the next highest priority incident, obtaining data associated with the resolution of the incident, and modifying a status associated with the incident. For example, theincident resolution module 214 may permit an incident resolution agent to mark the incident as “resolved.” If the incident cannot be resolved, theincident resolution module 214 may permit the incident resolution agent to release the incident so that the incident is still active in the one ormore incident queues 118 it may populate. Theincident resolution module 214 may also support the escalation and/or re-assignment of an incident to another incident resolution agent or supervisor. - It should be appreciated that software, firmware, or hardware components depicted as forming part of the
illustrative architecture 200, or more particularly, theincident handling server 200, are merely illustrative and that some components may not be present or additional components may be provided in various embodiments. While various program modules have been depicted as being loaded in thememory 204, it should be appreciated that the functionality described as being supported by the program modules may be enabled by any combination of hardware, software, and/or firmware. It should further be appreciated that each of the above-mentioned modules depicted as being loaded into thememory 204 may, in various embodiments, represent a logical partitioning of functionality supported by theincident handling server 200. This logical partitioning is depicted for ease of explanation of the functionality supported and may not be representative of the structure of software, firmware, and/or hardware for implementing the functionality. Accordingly, it should be appreciated that functionality described as being provided by a particular module may, in various embodiments, be provided at least in part by one or more other modules. Further, one or more depicted modules may not be present in certain embodiments, while in other embodiments, additional modules not depicted may be present and may support at least a portion of the described functionality and/or additional functionality. - Those of ordinary skill in the art will appreciate that the illustrative
networked architecture 100 depicted inFIG. 1A , the illustrative incident handling system depicted inFIG. 1B , and the illustrativeincident handling server 200 depicted inFIG. 2 are provided by way of example only. Numerous other operating environments, system architectures, and device configurations are within the scope of this disclosure. Various embodiments of the disclosure may include fewer or greater numbers of components and/or devices than those depicted inFIGS. 1A , 1B, and 2 may incorporate some or all of the functionality described with respect to theillustrative architecture 100 depicted inFIG. 1A , the illustrative incident handling system depicted inFIG. 1B , illustrative incident handling server depicted inFIG. 2 , or additional functionality. - Those of ordinary skill in the art will appreciate that any of the components of the
architecture 100 may include alternate and/or additional hardware, software or firmware components beyond those described or depicted without departing from the scope of the disclosure. More particularly, it should be appreciated that software, firmware or hardware components depicted as forming part of any of the components of thearchitecture 100 are merely illustrative and that some components may not be present or additional components may be provided in various embodiments. While various program modules have been depicted and described with respect to various illustrative components of thearchitecture 100, it should be appreciated that functionality described as being supported by the program modules may be enabled by any combination of hardware, software, and/or firmware. It should further be appreciated that each of the above-mentioned modules may, in various embodiments, represent a logical partitioning of supported functionality. This logical partitioning is depicted for ease of explanation of the functionality and may not be representative of the structure of software, firmware and/or hardware for implementing the functionality. Accordingly, it should be appreciated that functionality described as being provided by a particular module may, in various embodiments, be provided at least in part by one or more other modules. Further, one or more depicted modules may not be present in certain embodiments, while in other embodiments, additional modules not depicted may be present and may support at least a portion of the described functionality and/or additional functionality. Further, while certain modules may be depicted and described as sub-modules of another module, in certain embodiments, such modules may be provided as independent modules. -
FIG. 3 is a process flow diagram depicting anillustrative method 300 for event collection and management, incident creation and management, and incident queue assignment and prioritization prior to an incident resolution action in accordance with one or more embodiments of the disclosure.FIG. 4 is a process flow diagram depicting anillustrative method 400 for processing to assign one or more tags to an incident in accordance with one or more embodiments of the disclosure.FIG. 5 is a process flow diagram depicting anillustrative method 500 for processing to assign an incident to one or more incident queues.FIG. 6 is a process flow diagram depicting anillustrative method 600 for processing to prioritize an incident within each incident queue to which it is assigned.FIG. 7 is a process flow diagram depicting anillustrative method 700 for incident assignment and prioritization in response to receiving a request on behalf of an incident resolution agent for a next highest priority incident. The illustrative methods 300-700 will be described through reference to the illustrative networked architecture depicted inFIG. 1A , the illustrative architecture of anincident handling system 110, and the illustrative configuration and implementation of aincident handling server 200 as depicted inFIG. 2 . However, it should be appreciated that the illustrative methods 300-700 may be performed in connection with any networked architecture and configuration within the scope of this disclosure. Further, while various operations are depicted in the process flow diagrams depicted inFIGS. 3-7 , it should be appreciated that any of the depicted operations are optional and that, in various embodiments, any of the operations may not be performed. Depicted operations may also be performed in a different order. Further, in various embodiments, additional operations may be performed beyond those which are depicted. - Now referring to
FIG. 3 , in brief overview, atblock 305,incident handling system 110 may receive data associated with anevent 116. Atblock 310, theincident handling system 110 may generate an incident based at least in part on the event. Atblock 315, theincident handling system 110 may optionally associate one or more tags with the incident. Atblock 320, theincident handling system 110 may associate the incident with an incident queue. Atblock 325, theincident handling system 110 may process the one or more incidents in the incident queue. - At
block 305, theincident handling system 110 may receive data associated with anevent 116. In some embodiments, theevent 116 may be a software error condition reported from anevent reporting platform event reporting platform device 102 or anevent reporting platform - At
block 310, theincident handling system 110 may generate anincident 117 based at least in part on theevent 116. In some embodiments, theincident handling system 110 may evaluate theevent 116 to determine whether anincident 117 should be created. If theincident handling system 110 determines that anincident 117 should be created, theincident handling system 110 may create a data structure of theincident 117 from the data associated with theevent 116. - In some embodiments, an identity of an
incident 117 may be received from theICMS 130. In some embodiments, theIQAPS 140 may receive the identity of theincident 117 from theICMS 130. The identity of theincident 118 may be a referential identifier to anincident 117 stored in arepository 150. In some embodiments, the identity of theincident 117 may be a data structure comprising all the attributes associated with theincident 117. Theincident 117 and its attributes may be identified for subsequent processing. Although this process flow specifies a single incident, the process flow may also be for multiple incidents. For example, themethod 300 may be performed iteratively as necessary (e.g., to process an incoming stream of requests, a message queue, or even a batch file). - At
block 315, theincident handling system 110 may optionally associate one or more tags with theincident 117. A tag may be a convenient way of referencing or grouping incidents. Incident queue assignment rules may reference tags as well as incident attributes. Tags may effectively aggregate a variety of similar but distinct fault codes, add flexibility to queue assignment, and support short-term needs to partition certain categories ofincidents 117. - In some embodiments, a tag may be a way of reference a or grouping certain incidents. Then, the queue assignment rules may reference tags as well as incident attributes. Tags may effectively aggregate a variety of similar but distinct fault codes, add flexibility to queue assignments, and support short-term needs to partition certain categories of incidents. In some embodiments, tag definitions may comprise a set of attributes that may include, but are not limited to, a name identifying the tag, one or more incident attribute and value pair(s) identifying
incidents 117 to be assigned or associated with the tag, one or morerules identifying incidents 117 to be assigned or associated with the tag, one or more identifiers associated with one or more tag definition rules, a visual element (e.g., color or graphical icon) to be associated with the tag in certain user interfaces or presentations and/or reports, and the like. - In some embodiments, a tag may be a non-hierarchical keyword, value, or term associated with an incident. For example, a tag definition may be named “Georgia” and all incidents that are within the geographic boundaries of Georgia may be associated with the tag. In another example, a tag definition may be named “ATM” and all incidents that are generated or associated with an ATM issue may be associated with the tag. In another example, a tag definition may be named “High Priority” and all incidents that are associated with a particular fault code may be associated with the “High Priority” tag. Tags may enable the system to filter or identify all incidents based on the specified tag to be identified and in some embodiments, only those incidents associated with a tag may be used processed for assignment and prioritization for an incident queue.
- In some embodiments, tag definitions may be stored in and retrieved from a
tag definitions repository 146. In some embodiments, tag assignment rules, if independent of tag definitions, may be stored in and retrieved from an assignment rulesrepository 144. - Since incident queue assignment rules may make use of tags, tag definitions may need to be evaluated prior to incident queue assignment and prioritization.
- In some embodiments, tag definitions may be evaluated and relevant tag assignment rules may be applied to associate one or more tags with the
incident 117. Further details associated with this process are described below in relation toFIG. 4 . - At
block 320, theincident handling system 110 may associate theincident 117 with anincident queue 118. In some embodiments, queue definitions may be evaluated and relevant queue assignment rules may be applied to associate theincident 117 with one or more incident queue(s) 118. The queue assignment rules may reference tags as possible conditions for assignment. In some embodiments, the identity of theincident 117 may be used to associate the incident with anincident queue 118. Further details associated with this process are described below in relation toFIG. 5 . - At
block 325, theincident handling system 110 may process the one ormore incidents 117 in the one ormore incident queues 118 with which theincident 117 is associated. In some embodiments, theincident handling system 110 may process the one ormore incident queues 118 based at least in part on one or more prioritization or scoring rules and/or scoring calculations to prioritize the incident within therespective incident queues 118. The prioritization or scoring rules and/or scoring calculations may reference tags as possible conditions for prioritization. Further details associated with this process are described below in relation toFIG. 6 . -
FIG. 4 is a process flow diagram depicting anillustrative method 400 for processing to associate one or more tags to anincident 117 in accordance with one or more embodiments of the disclosure. Atblock 405, theincident handling system 110 may increment a pointer to the next tag definition. Atblock 410, theincident handling system 110 may determine whether the processing has reached the end of the tag definitions. If it is determined that the end of the tag definitions has been reached, then the process end. If it is determined that the end of the tag definitions has not been reached, then atblock 415, a pointer may be incremented to the next tag assignment rule. Theincident handling system 110 may determine whether the process has reached the end of tag assignment rules. If the process has reached the end of the tag assignment rule, the process may return to block 405. If theincident handling system 110 determines that the end of the tag assignment rules has not been reached, then atblock 425, the incident handling system then may evaluate whether the current tag assignment rule applies. If theincident handling system 110 determines that the current tag assignment does not apply, then the process may return to block 415. If theincident handling system 110 determines that the current tag assignment rule applies, then atblock 430, the tag may be associated with theincident 117. Once a tag has been associated with anincident 117, the processing may return to block 405. -
FIG. 5 is a process flow diagram depicting anillustrative method 500 for processing to associate anincident 117 to one ormore incident queues 118. Atblock 505, theincident handling system 110 may increment a pointer to the next incident queue definition. In some embodiments, if processing of theincidents 117 occurs independent of a request from an incident resolution agent, then all the incident queue definitions may be evaluated to ensure assigned of an incident to all appropriate incident queues. If the processing ofincidents 117 occurs in response to a request from an incident resolution agent, then only incident queue definitions associated with theincident queue 118 associated with the incident resolution agent may be evaluated. In some embodiments, a subset of incident queues definitions (less than all of the available incident queue definitions) may be evaluated. In some embodiments, the subset of the incident queue definitions may be evaluated in association with a set of incident queues being restructured or reestablished. - At
block 510, theincident handling system 110 may evaluate whether the process has reached the end of the incident queue definitions. Reaching the end of the incident queue definitions may be an indication that all the incident queue definitions have been processed and the process may end. If theincident handling system 110 determines that the process has not reached the end of the incident queue definitions, then atblock 515, theincident handling system 110 may increment a pointer to the next incident queue assignment rule associated with the current incident queue definitions. At block 520, the process may determine whether the incident queue assignment rules have been reached. If the end of the incident queue assignment rules have been reached, then the process may return to block 505. If the end of the incident queue assignment rules has not been reached, then atblock 525, theincident handling system 110 may determine whether the incident queue assignment rule applies. If the incident queue assignment rule does not apply, then the process may return to block 515. If the incident queue assignment rule does apply, then atblock 530, theincident 117 may be associated with thecurrent incident queue 118. In some embodiments, theincident 117 may be excluded from thecurrent incident queue 118 based at least in part on the incident queue assignment rule. Upon associating or excluding theincident 117 from theincident queue 118, the process may return to block 505. In some embodiments, queue definitions may be stored in and retrieved from aqueue definitions repository 142 and/or queue assignment rules may be stored in and retrieved from an assignment rulesrepository 144. - In some embodiments, an
incident queue 118 may comprise a set of prioritizedincidents 117 that have a common element or attributes. In some embodiments, an incident queue may be stored in and retrieved from anincident queues repository 148. Queue definitions may comprise a set of attributes that may include, but are not limited to, a name identifying theincident queue 118, one or more identifiers of queue assignment rules that control assignment or association of anincident 117 to theincident queue 118, one or more identifiers of prioritization and/or scoring rules that control prioritization of anincident 117 associated with anincident queue 118, and the like. - Incident queues may be a way to effectively partition incident resolution activity. Typically, a particular incident queue may be associated with one or more teams of incident resolution agents, each team possibly having expertise with particular types of incidents. For example, a financial institution may establish three ATM-related queues as follows: Incident Queue 1: easy incidents for new/inexperienced incident resolution agents; Incident Queue 2: cash-related incidents for incident resolution agents experienced with such issues; and Incident Queue 3: complex non-cash incidents requiring attention by other experienced incident resolution agents.
- In some embodiments, incident queues may be stable once established.
Additional incident queues 118 may be created for short periods of time to address particular needs. For example, the financial institution may utilize the three Incident Queue examples identified above. The financial institution may then note an increase of network-related incidents (e.g., a subset of complex incidents assigned to Incident Queue 3). The financial institution may create a new incident queue for just these incidents and assign a team of incident resolution agents to address these in a prioritized manner. Then this new incident queue may be discarded after the network-related incident(s) have been resolved and the surge in such incidents has diminished. - In some embodiments, incident queue assignment rules may be based on incident attributes, which may include one or more assigned tags. The type of an
event 116 or the type of an event source (e.g., device or software system) may directly determine association of theincident 117 with aparticular incident queue 118. For example, if the value associated with anevent 116 is 12345, an incident queue assignment rule may associate the incident with Incident Queue A, whereas if an event source is ATM, another incident queue assignment rule may associate the incident with Incident Queue B. - In some embodiments, incident queue assignment rules may explicitly identify certain types of incidents that should not be placed in a queue. For example, if [event source=kiosk] the rule may require the incident be excluded from Incident Queue B.
- Queue assignment rules may be more complex, involving more than one attribute in a particular incident. For example, if [event source=ATM] and [event source geography=Georgia] and [event source location=retail mall], the rule may require the incident be associated with Incident Queue C.
- Queue assignment rules may involve Boolean operations, dynamic evaluations, conditional logic, and the like.
- In some embodiments, each queue assignment rule may be associated with an identifier that may then be included in appropriate queue definitions. In some embodiments, a particular rule may be associated with more than one incident queue.
-
FIG. 6 is a process flow diagram depicting anillustrative method 600 for processing to prioritize anincident 117 within eachincident queue 118 to which it is assigned. Atblock 605, a pointer may be incremented to thenext incident queue 118 theincident 117 to which theincident 117 has been assigned. Atblock 610, theincident handling system 110 may determine whether the end of theincident queues 118 associated with theincident 117 have been reached. If the end of theincident queues 118 associated with theincident 117 have been reached, the process may terminate. If theincident handling system 110 determines that the end of theincident queues 118 has not been reached, then atblock 615, a pointer may be incremented to the next prioritization and/or scoring rule associated with thecurrent incident queue 118. Theincident handling system 110 may determine, atblock 620, whether the end of the prioritization rules has been reached. If the end of the prioritization rules have been reached, then the process may convert the score associated with theincident 117 to a priority at block 635. In some embodiments, block 635 may be optional.Block 625 may not be necessary if the prioritization/scoring rules define discrete priorities in the first place, or if thesystem 110 operates on a score within a range rather than a finite set of discrete priorities. - If the end of the prioritization rules have not been reached, then a determination is made at
block 625 as to whether the current prioritization rule applies. If the prioritization/scoring rule applies, then the process may execute the rule atblock 630 and then proceed back to block 615. The rule may establish or modify a point score or assign a discrete priority. Unlike the application of tag assignment rules or incident queue assignment rules, the processing may not stop after the first applicable prioritization/scoring rule is encountered for anincident queue 118. Additional applicable prioritization/scoring rules may modify a score up or down, so all rules must be evaluate/executed and applied as appropriate. - In some embodiments, the incident queue assignment and prioritization may be triggered in response to a request from an incident resolution agent for the “next highest priority” incident. The
ICMS 130 may not trigger theIQAPS 140 after anincident 117 is created and placed in anappropriate incidents repository 150. Anincident queue 118 may not be a non-transient data structure. Rather, an incident queue may be created afresh every time an incident resolution agent requests a “next highest priority” incident. Theincident queue 118 may be discarded after anincident 117 is assigned to the incident resolution agent. Since the request for a “next highest priority” incident may be from a specific incident resolution agent, and in the context of a subscription to aparticular incident queue 118, asingle incident queue 118 may be dynamically generated (and the incidents therein prioritized) at a time. Another incident resolution agent subscribed to adifferent incident queue 118 may trigger the dynamic generation of asecond incident queue 118. Thesame incident 117 may appear in both the first incident queue and the second incident queue. In some embodiments, mechanisms (e.g., database locking) may prevent anincident 117 from being assigned to two different incident resolution agents simultaneously. -
FIG. 7 is a process flow diagram depicting anillustrative method 700 for incident assignment and prioritization. Atblock 705, theincident handling system 110 may receive a request for the “next highest incident.” The request may have been generated on behalf of an incident resolution agent via theincident resolution sub-system 170. - At
block 710, theincident handling system 110 may identify anincident queue 118. In some embodiments, theincident queue 118 may be identified based at least in part on the received request. In some embodiments, an incident resolution agent may only subscribe to oneincident queue 118 at a time, so the incident resolution agent session may be associated with aparticular incident queue 118. In some embodiments, an incident resolution agent may subscribe tomultiple incident queues 118. In such scenarios, aparticular incident queue 118 may be identified in association with the received request. For example, the incident resolution agent may have specified a particular queue using an interface of theincident handling system 110. - At
block 715, theincident handling system 110 may generate anincident queue 118. In some embodiments, a process of theincident handling system 110 may dynamically generate the identified queue. In effect, this may be a pass of a portion ofFIG. 5 across all incidents (or conceivably some subset) in the context of just the identified queue. The IA'S 140 functionality may be leveraged to generate the identifiedqueue 118. The queue definitions for the identified queue may be retrieved thequeue definitions repository 142 and may be used to determine associated queue assignment rules, which may be retrieved from theassignment rules repository 144. In some embodiments, allavailable incidents 117 may be processed to generate atransient incident queue 118 inmemory 204.Available incidents 117 may include incidents that (1) have not been processed automatically, resolved, or closed, (2) are not being handled by an external entity and still within a service level agreement response period, and/or (3) are not currently assigned to another incident resolution agent. Eachincident 117 may be processed, such as by a method as described inFIG. 5 . In some embodiments, if tags are utilized by theincident handling system 110, tags may have been assigned to theincidents 117 prior to the generation ofincident queues 118. - At
block 720, theincident handling system 110 may process theincident queue 118 to identify the next highest incident. In some embodiments, after the transient incident queue is generated, a process may prioritize eachincident 117 within theincident queue 118, such as by a pass of a portion ofFIG. 6 for just the identified queue (skippingblocks - At
block 725, theincident handling system 110 may assign the next highest priority incident to an incident resolution agent. The “next highest priority” incident within the transient incident queue may be identified and assigned to the incident resolution agent who sent the request. If more than one incident has the same priority/score, one or more rules may be applied to determine the “next highest priority” incident (e.g., the oldest incident may be selected as a tie-breaker). - At
block 730, the incident handling system may transmit the next highest incident to the incident resolution agent. In some embodiments, a response comprising an indication of the “next highest priority” incident may be transmitted for presentation to the incident resolution agent. Once the incident resolution agent has received theincident 117 and commences working on it through theincident resolution sub-system 170, theincident queue 118 may be discarded. -
FIG. 8 depicts anillustrative embodiment 800 of an incident associated with an incident queue viewed by an incident resolution agent. Incident queues may aid incident resolution agents to request the next prioritized incident from theincident handling system 110, which may save them time in searching for and identifying priority incidents that require attention. InFIG. 8 ,element 802 indicates the status of a current incident.Element 806 is a message that may be displayed to an incident resolution agent regarding the current status of an incident. If the incident resolution agent selects thenext incident button 804, theincident resolution sub-system 170 may generate a request to theincident handling system 110 for the next highest priority incident. -
FIG. 9 also depicts anillustrative embodiment 900 of an incident associated with an incident queue viewed by an incident resolution agent. Responsive to an incident resolution agent selecting thenext incident button 804, theincident resolution sub-system 170 may present the agent with a drop downmenu 904 to select aparticular incident queue 118 from which to request the next highest priority incident. Displayed in the drop downmenu 904 is an incident queue named “Incident Q3” 902. If the incident resolution agent selects the incident queue “Incident Q3,” 902 theincident handling system 110 may identify the next highest priority incident from the incidents associated with the incident queue. - While various illustrative presentations of the information and types of content have been described in connection with
FIGS. 8-10 , it should be appreciated that numerous other variations, modifications, and so forth are within the scope of this disclosure. Further, although specific embodiments of the disclosure have been described, one of ordinary skill in the art will recognize that numerous other modifications and alternative embodiments are within the scope of the disclosure. For example, any of the functionality and/or processing capabilities described with respect to a particular device or component may be performed by any other device or component. Further, although specific example embodiments have been presented, it should be appreciated that numerous other examples are within the scope of this disclosure. - Additional types of CRSM that may be present in association with any of the components described herein (e.g., any of the components of the networked architecture 100) may include, but are not limited to, programmable random access memory (PRAM), SRAM, DRAM, RAM, ROM, electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, compact disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, solid-state memory devices, or any other medium. Combinations of any of the above are also included within the scope of CRSM.
- Alternatively, computer-readable communication media may include computer-readable instructions, program modules, or other data transmitted within a data signal, such as a carrier wave, or other transmission. Examples of computer-readable communication media, whether modulated using a carrier or not, include, but are not limited to, signals that a computer system or machine hosting or running a computer program can be configured to access, including signals downloaded through the Internet or other networks. For example, the distribution of software may be an Internet download. Note, however, as used herein, CRSM does not include computer-readable communication media.
- Although embodiments have been described in language specific to structural features and/or methodological acts, it is to be understood that the disclosure is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as illustrative forms of embodiments of the disclosure. Conditional language such as, for example, “can,” “could,” “might,” or “may,” unless specifically stated otherwise, or unless otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements, and/or steps. Thus, such conditional language is not generally intended to imply that features, elements, and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements, and/or steps are included or are to be performed in any particular embodiment.
Claims (30)
1. One or more computer-readable media storing computer-executable instructions that responsive to execution by one or more processors cause operations to be performed comprising:
receiving a request for a next highest priority incident;
identifying an incident requiring resolution;
associating the incident with an incident queue based at least in part on a queue assignment rule, wherein the incident queue is associated with one or more incidents, wherein the one or more incidents includes the incident;
processing the incident queue based at least in part on a prioritization rule to identify one of the one or more incidents associated with the incident queue as the next highest priority incident; and
transmitting the next highest priority incident associated with the incident queue.
2. The one or more computer-media medium of claim 1 , wherein the incident is associated with an event that is associated with a software system or a device.
3. The one or more computer-readable media of claim 2 , wherein the event is one of:
i) a software fault,
ii) a hardware fault,
iii) a reported product issue, or
iv) a reported service issue.
4. The one or more computer-readable media of claim 1 , wherein the request is received from an incident resolution agent, and wherein the next highest priority incident is transmitted to the incident resolution agent, and the operations further comprising:
identifying the incident queue based on at least one of the request or the incident resolution agent.
5. The one or more computer-readable media of claim 4 , wherein the incident resolution agent is a first incident resolution agent, and wherein the request is a first request, the operations further comprising:
receiving a release of the next highest priority incident from the first incident resolution agent;
receiving from a second incident resolution agent, a second request for the next highest priority incident; and
transmitting the next highest priority incident to the second incident resolution agent.
6. The one or more computer-readable media of claim 1 , the operations further comprising:
associating a tag with the incident based at least in part on a tag assignment rule.
7. The one or more computer-readable media of claim 6 , wherein associating the incident with the incident queue comprises associating the incident with the incident queue based at least in part on the tag associated with the incident.
8. The one or more computer-readable media of claim 6 , the operations further comprising:
generating the incident queue, wherein the incident queue is based at least in part on at least one of:
i) an incident categorization,
ii) one or more tags,
iii) one or more fault codes,
iv) a primary servicer, or
v) a service level.
9. The one or more computer-readable media of claim 1 , the operations further comprising:
generating, in response to receiving the request for the next highest priority incident, the incident queue based at least in part on a queue definition.
10. The one or more computer-readable media of claim 9 , wherein the incident queue is a first incident queue, the operations further comprising:
generating a second incident queue based at least in part on a second queue definition.
11. The one or more computer-readable media of claim 10 , wherein the queue assignment rule is a first queue assignment rule, the operations further comprising:
associating the incident with the second incident queue based at least in part on a second queue assignment rule; and
processing the second incident queue to identify the next highest priority incident.
12. The one or more computer-readable media of claim 11 , the operations further comprising:
receiving an indication of a status change associated with the incident; and
reprocessing the first incident queue and the second incident queue in response to the indication of the status change.
13. The one or more computer-readable media of claim 1 , the operations further comprising:
generating a respective score associated with each of the one or more incidents associated with the incident queue based at least in part on a scoring rule; and
processing the incident queue based at least in part on the respective score associated with each of the one or more incidents to identify the respective score associated with the next highest priority incident score.
14. The one or more computer-readable media of claim 1 , the operations further comprising:
discarding the incident queue responsive to transmitting the next highest priority incident.
15. The one or more computer-readable media of claim 1 , wherein the incident is a first incident, the operations further comprising:
identifying a second incident requiring resolution; and
associating the second incident with the incident queue based at least in part on the queue assignment rule, wherein the one or more incidents further includes the second incident.
16. A method, comprising:
receiving, by an incident handling system comprising one or more computers, a request for a next highest priority incident;
identifying, by the incident handling system, an incident requiring resolution;
associating, by the incident handling system, the incident with an incident queue based at least in part on a queue assignment rule, wherein the incident queue is associated with one or more incidents, wherein the one or more incidents includes the incident;
processing, by the incident handling system, the incident queue based at least in part on a prioritization rule to identify one of the one or more incidents associated with the incident queue as the next highest priority incident; and
transmitting, by the incident handling system, the next highest priority incident associated with the incident queue.
17. The method of claim 16 , wherein the incident is associated with an event that is associated with a software system or a device.
18. The method of claim 17 , wherein the event is one of:
i) a software fault,
ii) a hardware fault,
iii) a reported product issue, or
iv) a reported service issue.
19. The method of claim 16 , wherein the request is received from an incident resolution agent, and wherein the next highest priority incident is transmitted to the incident resolution agent, further comprising:
identifying, by the incident handling system, the incident queue based on at least one of the request or the incident resolution agent.
20. The method of claim 19 , wherein the incident resolution agent is a first incident resolution agent, and wherein the request is a first request, further comprising:
receiving, by the incident handling system, a release of the next highest priority incident from the first incident resolution agent;
receiving, by the incident handling system, from a second incident resolution agent, a second request for the next highest priority incident; and
transmitting, by the incident handling system, the next highest priority incident to the second incident resolution agent.
21. The method of claim 16 , further comprising:
associating, by the incident handling system, a tag with the incident based at least in part on a tag assignment rule.
22. The method of claim 21 , wherein associating the incident with the incident queue comprises associating the incident with the incident queue based at least in part on the tag associated with the incident.
23. The method of claim 21 , further comprising:
generating, by the incident handling system, the incident queue, wherein the incident queue is based at least in part on at least one of:
i) an incident categorization,
ii) one or more tags,
iii) one or more fault codes,
iv) a primary servicer, or
v) a service level.
24. The method of claim 16 , further comprising:
generating, by the incident handling system, in response to receiving the request for the next highest priority incident, the incident queue based at least in part on a queue definition.
25. The method of claim 24 , wherein the incident queue is a first incident queue, further comprising:
generating, by the incident handling system, a second incident queue based at least in part on a second queue definition.
26. The method of claim 25 , wherein the queue assignment rule is a first queue assignment rule, further comprising:
associating, by the incident handling system, the incident with the second incident queue based at least in part on a second queue assignment rule; and
processing, by the incident handling system, the second incident queue to identify the next highest priority incident.
27. The method of claim 26 , further comprising:
receiving, by the incident handling system, an indication of a status change associated with the incident; and
reprocessing, by the incident handling system, the first incident queue and the second incident queue in response to the indication of the status change.
28. The method of claim 16 , further comprising:
generating, by the incident handling system, a respective score associated with each of the one or more incidents associated with the incident queue based at least in part on a scoring rule; and
processing, by the incident handling system, the incident queue based at least in part on the respective score associated with each of the one or more incidents to identify the respective score associated with the next highest priority incident score.
29. The method of claim 16 , further comprising:
discarding, by the incident handling system, the incident queue responsive to transmitting the next highest priority incident.
30. The method of claim 16 , wherein the incident is a first incident, further comprising:
identifying, by the incident handling system, a second incident requiring resolution; and
associating, by the incident handling system, the second incident with the incident queue based at least in part on the queue assignment rule, wherein the one or more incidents further includes the second incident.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/840,476 US20140278641A1 (en) | 2013-03-15 | 2013-03-15 | Systems and methods for incident queue assignment and prioritization |
US14/639,946 US10346779B2 (en) | 2013-03-15 | 2015-03-05 | Systems and methods for incident queue assignment and prioritization |
US16/412,814 US10878355B2 (en) | 2013-03-15 | 2019-05-15 | Systems and methods for incident queue assignment and prioritization |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/840,476 US20140278641A1 (en) | 2013-03-15 | 2013-03-15 | Systems and methods for incident queue assignment and prioritization |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/639,946 Continuation US10346779B2 (en) | 2013-03-15 | 2015-03-05 | Systems and methods for incident queue assignment and prioritization |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140278641A1 true US20140278641A1 (en) | 2014-09-18 |
Family
ID=51532001
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/840,476 Abandoned US20140278641A1 (en) | 2013-03-15 | 2013-03-15 | Systems and methods for incident queue assignment and prioritization |
US14/639,946 Active US10346779B2 (en) | 2013-03-15 | 2015-03-05 | Systems and methods for incident queue assignment and prioritization |
US16/412,814 Active US10878355B2 (en) | 2013-03-15 | 2019-05-15 | Systems and methods for incident queue assignment and prioritization |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/639,946 Active US10346779B2 (en) | 2013-03-15 | 2015-03-05 | Systems and methods for incident queue assignment and prioritization |
US16/412,814 Active US10878355B2 (en) | 2013-03-15 | 2019-05-15 | Systems and methods for incident queue assignment and prioritization |
Country Status (1)
Country | Link |
---|---|
US (3) | US20140278641A1 (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150372887A1 (en) * | 2014-06-23 | 2015-12-24 | Oracle International Corporation | System and method for monitoring and diagnostics in a multitenant application server environment |
US9342372B1 (en) | 2015-03-23 | 2016-05-17 | Bmc Software, Inc. | Dynamic workload capping |
US20160283135A1 (en) * | 2015-03-23 | 2016-09-29 | Netapp, Inc. | Resource allocation in networked storage systems |
US9680657B2 (en) | 2015-08-31 | 2017-06-13 | Bmc Software, Inc. | Cost optimization in dynamic workload capping |
US9898341B2 (en) | 2016-02-25 | 2018-02-20 | Western Digital Technologies, Inc. | Adjustable priority ratios for multiple task queues |
US9916153B2 (en) | 2014-09-24 | 2018-03-13 | Oracle International Corporation | System and method for supporting patching in a multitenant application server environment |
US9961011B2 (en) | 2014-01-21 | 2018-05-01 | Oracle International Corporation | System and method for supporting multi-tenancy in an application server, cloud, or other environment |
US10250512B2 (en) | 2015-01-21 | 2019-04-02 | Oracle International Corporation | System and method for traffic director support in a multitenant application server environment |
US10318280B2 (en) | 2014-09-24 | 2019-06-11 | Oracle International Corporation | System and method for supporting patching in a multitenant application server environment |
CN110100235A (en) * | 2016-12-15 | 2019-08-06 | 起元技术有限责任公司 | Foreign peoples's event queue |
US10409914B2 (en) * | 2016-08-31 | 2019-09-10 | Accenture Global Solutions Limited | Continuous learning based semantic matching for textual samples |
US20200012990A1 (en) * | 2018-07-06 | 2020-01-09 | Demisto Inc. | Systems and methods of network-based intelligent cyber-security |
CN111880910A (en) * | 2020-07-31 | 2020-11-03 | 北京小米移动软件有限公司 | Data processing method and device, server and storage medium |
CN112040317A (en) * | 2020-08-21 | 2020-12-04 | 海信视像科技股份有限公司 | Event response method and display device |
CN112070369A (en) * | 2020-08-20 | 2020-12-11 | 拉扎斯网络科技(上海)有限公司 | Data processing method and device, storage cabinet, storage medium and electronic equipment |
CN112668854A (en) * | 2020-12-23 | 2021-04-16 | 深圳市科漫达智能管理科技有限公司 | Multi-organization-based efficient event dispatching method and related device |
CN114625098A (en) * | 2020-12-10 | 2022-06-14 | 中国科学院沈阳自动化研究所 | Preemptive fault processing method for underwater robot |
US20220321591A1 (en) * | 2021-04-05 | 2022-10-06 | Bank Of America Corporation | Server-based anomaly and security threat detection in multiple atms |
US20220321592A1 (en) * | 2021-04-05 | 2022-10-06 | Bank Of America Corporation | Atm-based anomaly and security threat detection |
US12143308B2 (en) | 2023-05-26 | 2024-11-12 | Oracle International Corporation | System and method for supporting multi-tenancy in an application server, cloud, or other environment |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150338447A1 (en) | 2014-05-20 | 2015-11-26 | Allied Telesis Holdings Kabushiki Kaisha | Sensor based detection system |
US20150339594A1 (en) * | 2014-05-20 | 2015-11-26 | Allied Telesis Holdings Kabushiki Kaisha | Event management for a sensor based detecton system |
US9779183B2 (en) | 2014-05-20 | 2017-10-03 | Allied Telesis Holdings Kabushiki Kaisha | Sensor management and sensor analytics system |
PH12013000136A1 (en) | 2013-05-23 | 2015-01-21 | De Antoni Ferdinand Evert Karoly | A domain agnostic method and system for the capture, storage, and analysis of sensor readings |
US10084871B2 (en) | 2013-05-23 | 2018-09-25 | Allied Telesis Holdings Kabushiki Kaisha | Graphical user interface and video frames for a sensor based detection system |
US9693386B2 (en) | 2014-05-20 | 2017-06-27 | Allied Telesis Holdings Kabushiki Kaisha | Time chart for sensor based detection system |
US10452450B2 (en) | 2015-03-20 | 2019-10-22 | International Business Machines Corporation | Optimizing allocation of multi-tasking servers |
US10983989B2 (en) * | 2019-06-28 | 2021-04-20 | Atlassian Pty Ltd. | Issue rank management in an issue tracking system |
US11601347B2 (en) | 2020-07-31 | 2023-03-07 | Kyndryl, Inc. | Identification of incident required resolution time |
US12105948B2 (en) | 2021-10-29 | 2024-10-01 | Monday.com Ltd. | Digital processing systems and methods for display navigation mini maps |
US11843530B2 (en) * | 2022-03-08 | 2023-12-12 | Amdocs Development Limited | System, method, and computer program for unobtrusive propagation of solutions for detected incidents in computer applications |
US12056255B1 (en) | 2023-11-28 | 2024-08-06 | Monday.com Ltd. | Digital processing systems and methods for facilitating the development and implementation of applications in conjunction with a serverless environment |
Citations (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5984178A (en) * | 1996-11-29 | 1999-11-16 | Diebold, Incorporated | Fault monitoring and notification system for automated banking machines |
US6249571B1 (en) * | 1998-10-30 | 2001-06-19 | North Coast Logic, Inc. | Telemanagement system with modular features and database synchronization |
US6279826B1 (en) * | 1996-11-29 | 2001-08-28 | Diebold, Incorporated | Fault monitoring and notification system for automated banking |
US20020161875A1 (en) * | 2001-04-30 | 2002-10-31 | Raymond Robert L. | Dynamic generation of context-sensitive data and instructions for troubleshooting problem events in information network systems |
US6556659B1 (en) * | 1999-06-02 | 2003-04-29 | Accenture Llp | Service level management in a hybrid network architecture |
US20030110228A1 (en) * | 2001-12-12 | 2003-06-12 | Ziqiang Xu | Method and apparatus for monitoring activity and presence to optimize collaborative issue resolution |
US20030221123A1 (en) * | 2002-02-26 | 2003-11-27 | Beavers John B. | System and method for managing alert indications in an enterprise |
US20040120250A1 (en) * | 2002-12-20 | 2004-06-24 | Vanguard Managed Solutions, Llc | Trouble-ticket generation in network management environment |
US6845148B1 (en) * | 2000-06-16 | 2005-01-18 | Bellsouth Intellectual Property Corporation | Utilities module for proactive maintenance application |
US20050131943A1 (en) * | 2003-12-12 | 2005-06-16 | Lewis Richard G. | Trouble ticket assignment |
US20050131937A1 (en) * | 2003-12-15 | 2005-06-16 | Parkyn Nicholas D. | System and method for end-to-end management of service level events |
US20060059107A1 (en) * | 2000-03-30 | 2006-03-16 | Kevin Elmore | System and method for establishing eletronic business systems for supporting communications servuces commerce |
US20070294406A1 (en) * | 2006-06-16 | 2007-12-20 | Myles Suer | Automated service level management system |
US7357301B1 (en) * | 2005-12-29 | 2008-04-15 | At&T Corp. | Maintenance support for high priority customers |
US20080155564A1 (en) * | 2006-12-01 | 2008-06-26 | International Business Machines Corporation | Event correlation based trouble ticket resolution system incorporating adaptive rules optimization |
US20080270198A1 (en) * | 2007-04-25 | 2008-10-30 | Hewlett-Packard Development Company, L.P. | Systems and Methods for Providing Remediation Recommendations |
US20080295100A1 (en) * | 2007-05-25 | 2008-11-27 | Computer Associates Think, Inc. | System and method for diagnosing and managing information technology resources |
US20090052329A1 (en) * | 2007-08-21 | 2009-02-26 | Juniper Networks, Inc. | Event problem report bundles in xml format |
US20090055720A1 (en) * | 2007-08-23 | 2009-02-26 | Electronic Data Systems Corporation | Apparatus, and associated method, for generating an information technology incident report |
US20110246378A1 (en) * | 2010-03-30 | 2011-10-06 | Prussack E Fredrick | Identifying high value content and determining responses to high value content |
US20110295898A1 (en) * | 2010-05-28 | 2011-12-01 | International Business Machines Corporation | System And Method For Incident Processing Through A Correlation Model |
US8086907B1 (en) * | 2008-09-30 | 2011-12-27 | Juniper Networks, Inc. | Systems and methods for network information collection |
US20120042318A1 (en) * | 2010-08-10 | 2012-02-16 | International Business Machines Corporation | Automatic planning of service requests |
US20120060163A1 (en) * | 2010-09-07 | 2012-03-08 | Nadeem Khan | Methods and apparatus associated with dynamic access control based on a task/trouble ticket |
US20120069978A1 (en) * | 2010-09-21 | 2012-03-22 | Hartford Fire Insurance Company | Storage, processing, and display of service desk performance metrics |
US20120185290A1 (en) * | 2011-01-13 | 2012-07-19 | Bmc Software, Inc. | Integrating Action Requests from a Plurality of Spoke Systems at a Hub System |
US20120323623A1 (en) * | 2011-06-16 | 2012-12-20 | HCL America Inc. | System and method for assigning an incident ticket to an assignee |
US8458323B1 (en) * | 2009-08-24 | 2013-06-04 | Sprint Communications Company L.P. | Associating problem tickets based on an integrated network and customer database |
US20130176858A1 (en) * | 2010-09-30 | 2013-07-11 | Telefonaktiebolaget L M Ericsson (Publ) | Method for Determining a Severity of a Network Incident |
US20130179736A1 (en) * | 2012-01-11 | 2013-07-11 | International Business Machines Corporation | Ticket consolidation |
US20140032254A1 (en) * | 2012-07-26 | 2014-01-30 | International Business Machines Corporation | Allocation of Agents in a Support Center to Meet Service Levels of Support Requests |
US20140039958A1 (en) * | 2012-08-03 | 2014-02-06 | International Business Machines Corporation | Handling consolidated tickets |
US20140059395A1 (en) * | 2012-08-21 | 2014-02-27 | International Business Machines Corporation | Ticket consolidation for multi-tiered applications |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6574605B1 (en) * | 1998-11-17 | 2003-06-03 | Citibank, N.A. | Method and system for strategic services enterprise workload management |
US7159237B2 (en) * | 2000-03-16 | 2007-01-02 | Counterpane Internet Security, Inc. | Method and system for dynamic network intrusion monitoring, detection and response |
US9436532B1 (en) * | 2011-12-20 | 2016-09-06 | Emc Corporation | Method and system for implementing independent message queues by specific applications |
-
2013
- 2013-03-15 US US13/840,476 patent/US20140278641A1/en not_active Abandoned
-
2015
- 2015-03-05 US US14/639,946 patent/US10346779B2/en active Active
-
2019
- 2019-05-15 US US16/412,814 patent/US10878355B2/en active Active
Patent Citations (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5984178A (en) * | 1996-11-29 | 1999-11-16 | Diebold, Incorporated | Fault monitoring and notification system for automated banking machines |
US6279826B1 (en) * | 1996-11-29 | 2001-08-28 | Diebold, Incorporated | Fault monitoring and notification system for automated banking |
US6249571B1 (en) * | 1998-10-30 | 2001-06-19 | North Coast Logic, Inc. | Telemanagement system with modular features and database synchronization |
US6556659B1 (en) * | 1999-06-02 | 2003-04-29 | Accenture Llp | Service level management in a hybrid network architecture |
US20060059107A1 (en) * | 2000-03-30 | 2006-03-16 | Kevin Elmore | System and method for establishing eletronic business systems for supporting communications servuces commerce |
US6845148B1 (en) * | 2000-06-16 | 2005-01-18 | Bellsouth Intellectual Property Corporation | Utilities module for proactive maintenance application |
US20020161875A1 (en) * | 2001-04-30 | 2002-10-31 | Raymond Robert L. | Dynamic generation of context-sensitive data and instructions for troubleshooting problem events in information network systems |
US20030110228A1 (en) * | 2001-12-12 | 2003-06-12 | Ziqiang Xu | Method and apparatus for monitoring activity and presence to optimize collaborative issue resolution |
US20030221123A1 (en) * | 2002-02-26 | 2003-11-27 | Beavers John B. | System and method for managing alert indications in an enterprise |
US20040120250A1 (en) * | 2002-12-20 | 2004-06-24 | Vanguard Managed Solutions, Llc | Trouble-ticket generation in network management environment |
US20050131943A1 (en) * | 2003-12-12 | 2005-06-16 | Lewis Richard G. | Trouble ticket assignment |
US20050131937A1 (en) * | 2003-12-15 | 2005-06-16 | Parkyn Nicholas D. | System and method for end-to-end management of service level events |
US7357301B1 (en) * | 2005-12-29 | 2008-04-15 | At&T Corp. | Maintenance support for high priority customers |
US20070294406A1 (en) * | 2006-06-16 | 2007-12-20 | Myles Suer | Automated service level management system |
US20080155564A1 (en) * | 2006-12-01 | 2008-06-26 | International Business Machines Corporation | Event correlation based trouble ticket resolution system incorporating adaptive rules optimization |
US20080270198A1 (en) * | 2007-04-25 | 2008-10-30 | Hewlett-Packard Development Company, L.P. | Systems and Methods for Providing Remediation Recommendations |
US20080295100A1 (en) * | 2007-05-25 | 2008-11-27 | Computer Associates Think, Inc. | System and method for diagnosing and managing information technology resources |
US20090052329A1 (en) * | 2007-08-21 | 2009-02-26 | Juniper Networks, Inc. | Event problem report bundles in xml format |
US20090055720A1 (en) * | 2007-08-23 | 2009-02-26 | Electronic Data Systems Corporation | Apparatus, and associated method, for generating an information technology incident report |
US8086907B1 (en) * | 2008-09-30 | 2011-12-27 | Juniper Networks, Inc. | Systems and methods for network information collection |
US8458323B1 (en) * | 2009-08-24 | 2013-06-04 | Sprint Communications Company L.P. | Associating problem tickets based on an integrated network and customer database |
US20110246378A1 (en) * | 2010-03-30 | 2011-10-06 | Prussack E Fredrick | Identifying high value content and determining responses to high value content |
US20110295898A1 (en) * | 2010-05-28 | 2011-12-01 | International Business Machines Corporation | System And Method For Incident Processing Through A Correlation Model |
US20120042318A1 (en) * | 2010-08-10 | 2012-02-16 | International Business Machines Corporation | Automatic planning of service requests |
US20120060163A1 (en) * | 2010-09-07 | 2012-03-08 | Nadeem Khan | Methods and apparatus associated with dynamic access control based on a task/trouble ticket |
US20120069978A1 (en) * | 2010-09-21 | 2012-03-22 | Hartford Fire Insurance Company | Storage, processing, and display of service desk performance metrics |
US20130176858A1 (en) * | 2010-09-30 | 2013-07-11 | Telefonaktiebolaget L M Ericsson (Publ) | Method for Determining a Severity of a Network Incident |
US20120185290A1 (en) * | 2011-01-13 | 2012-07-19 | Bmc Software, Inc. | Integrating Action Requests from a Plurality of Spoke Systems at a Hub System |
US20120323623A1 (en) * | 2011-06-16 | 2012-12-20 | HCL America Inc. | System and method for assigning an incident ticket to an assignee |
US20130179736A1 (en) * | 2012-01-11 | 2013-07-11 | International Business Machines Corporation | Ticket consolidation |
US20140032254A1 (en) * | 2012-07-26 | 2014-01-30 | International Business Machines Corporation | Allocation of Agents in a Support Center to Meet Service Levels of Support Requests |
US20140039958A1 (en) * | 2012-08-03 | 2014-02-06 | International Business Machines Corporation | Handling consolidated tickets |
US20140059395A1 (en) * | 2012-08-21 | 2014-02-27 | International Business Machines Corporation | Ticket consolidation for multi-tiered applications |
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11343200B2 (en) | 2014-01-21 | 2022-05-24 | Oracle International Corporation | System and method for supporting multi-tenancy in an application server, cloud, or other environment |
US9961011B2 (en) | 2014-01-21 | 2018-05-01 | Oracle International Corporation | System and method for supporting multi-tenancy in an application server, cloud, or other environment |
US10742568B2 (en) | 2014-01-21 | 2020-08-11 | Oracle International Corporation | System and method for supporting multi-tenancy in an application server, cloud, or other environment |
US11683274B2 (en) | 2014-01-21 | 2023-06-20 | Oracle International Corporation | System and method for supporting multi-tenancy in an application server, cloud, or other environment |
US9959421B2 (en) * | 2014-06-23 | 2018-05-01 | Oracle International Corporation | System and method for monitoring and diagnostics in a multitenant application server environment |
US20150372887A1 (en) * | 2014-06-23 | 2015-12-24 | Oracle International Corporation | System and method for monitoring and diagnostics in a multitenant application server environment |
US9916153B2 (en) | 2014-09-24 | 2018-03-13 | Oracle International Corporation | System and method for supporting patching in a multitenant application server environment |
US10853055B2 (en) | 2014-09-24 | 2020-12-01 | Oracle International Corporation | System and method for supporting patching in a multitenant application server environment |
US10853056B2 (en) | 2014-09-24 | 2020-12-01 | Oracle International Corporation | System and method for supporting patching in a multitenant application server environment |
US11880679B2 (en) | 2014-09-24 | 2024-01-23 | Oracle International Corporation | System and method for supporting patching in a multitenant application server environment |
US10318280B2 (en) | 2014-09-24 | 2019-06-11 | Oracle International Corporation | System and method for supporting patching in a multitenant application server environment |
US11449330B2 (en) | 2014-09-24 | 2022-09-20 | Oracle International Corporation | System and method for supporting patching in a multitenant application server environment |
US10394550B2 (en) | 2014-09-24 | 2019-08-27 | Oracle International Corporation | System and method for supporting patching in a multitenant application server environment |
US10250512B2 (en) | 2015-01-21 | 2019-04-02 | Oracle International Corporation | System and method for traffic director support in a multitenant application server environment |
US9342372B1 (en) | 2015-03-23 | 2016-05-17 | Bmc Software, Inc. | Dynamic workload capping |
US10643193B2 (en) | 2015-03-23 | 2020-05-05 | Bmc Software, Inc. | Dynamic workload capping |
US20160283135A1 (en) * | 2015-03-23 | 2016-09-29 | Netapp, Inc. | Resource allocation in networked storage systems |
US10078473B2 (en) * | 2015-03-23 | 2018-09-18 | Netapp, Inc. | Resource allocation in networked storage systems |
US10812278B2 (en) | 2015-08-31 | 2020-10-20 | Bmc Software, Inc. | Dynamic workload capping |
US9680657B2 (en) | 2015-08-31 | 2017-06-13 | Bmc Software, Inc. | Cost optimization in dynamic workload capping |
US9898341B2 (en) | 2016-02-25 | 2018-02-20 | Western Digital Technologies, Inc. | Adjustable priority ratios for multiple task queues |
US10409914B2 (en) * | 2016-08-31 | 2019-09-10 | Accenture Global Solutions Limited | Continuous learning based semantic matching for textual samples |
CN110100235A (en) * | 2016-12-15 | 2019-08-06 | 起元技术有限责任公司 | Foreign peoples's event queue |
US20200012990A1 (en) * | 2018-07-06 | 2020-01-09 | Demisto Inc. | Systems and methods of network-based intelligent cyber-security |
CN111880910A (en) * | 2020-07-31 | 2020-11-03 | 北京小米移动软件有限公司 | Data processing method and device, server and storage medium |
CN112070369A (en) * | 2020-08-20 | 2020-12-11 | 拉扎斯网络科技(上海)有限公司 | Data processing method and device, storage cabinet, storage medium and electronic equipment |
CN112040317A (en) * | 2020-08-21 | 2020-12-04 | 海信视像科技股份有限公司 | Event response method and display device |
CN114625098A (en) * | 2020-12-10 | 2022-06-14 | 中国科学院沈阳自动化研究所 | Preemptive fault processing method for underwater robot |
CN112668854A (en) * | 2020-12-23 | 2021-04-16 | 深圳市科漫达智能管理科技有限公司 | Multi-organization-based efficient event dispatching method and related device |
US20220321591A1 (en) * | 2021-04-05 | 2022-10-06 | Bank Of America Corporation | Server-based anomaly and security threat detection in multiple atms |
US20220321592A1 (en) * | 2021-04-05 | 2022-10-06 | Bank Of America Corporation | Atm-based anomaly and security threat detection |
US11750638B2 (en) * | 2021-04-05 | 2023-09-05 | Bank Of America Corporation | Server-based anomaly and security threat detection in multiple ATMs |
US11750639B2 (en) * | 2021-04-05 | 2023-09-05 | Bank Of America Corporation | ATM-based anomaly and security threat detection |
US12143308B2 (en) | 2023-05-26 | 2024-11-12 | Oracle International Corporation | System and method for supporting multi-tenancy in an application server, cloud, or other environment |
Also Published As
Publication number | Publication date |
---|---|
US10346779B2 (en) | 2019-07-09 |
US10878355B2 (en) | 2020-12-29 |
US20190266537A1 (en) | 2019-08-29 |
US20150178657A1 (en) | 2015-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10878355B2 (en) | Systems and methods for incident queue assignment and prioritization | |
CN110310034B (en) | Service arrangement and business flow processing method and device applied to SaaS | |
US10565034B2 (en) | Event-driven serverless function orchestration | |
US8204870B2 (en) | Unwired enterprise platform | |
US11528240B2 (en) | Real-time integration of machine intelligence into client messaging platforms | |
CN110546606A (en) | Tenant upgrade analysis | |
US11461679B2 (en) | Message management using machine learning techniques | |
US9354871B2 (en) | Multi-stage push notifications for software logistic tools | |
CN105378696A (en) | Providing unseen message count across devices | |
US20120197937A1 (en) | Method and system for providing detailed information in an interactive manner in a short message service (sms) environment | |
US11221839B2 (en) | Early software updates for multi-tenant integration service | |
US9176727B2 (en) | Infrastructure software patch reporting and analytics | |
US11308429B2 (en) | Enterprise data mining systems | |
US20110047220A1 (en) | Extending business processes to mobile devices | |
US10819598B1 (en) | Metering multi-tenant, microservice architecture-based integration service in a cloud computing environment | |
US20200211027A1 (en) | Business rules processing framework | |
US20220188705A1 (en) | Interactive digital dashboards for trained machine learning or artificial intelligence processes | |
CN114827280A (en) | Request processing method, device, equipment and medium | |
US20100010979A1 (en) | Reduced Volume Precision Data Quality Information Cleansing Feedback Process | |
CN115373886A (en) | Service group container shutdown method, device, computer equipment and storage medium | |
WO2015111023A1 (en) | An improved method of appraisal system, performance analysis and task scheduling in an organization | |
US10778776B2 (en) | Computing infrastructure scalability assessment | |
BR102020016116A2 (en) | open source tools integration platform | |
US20190158615A1 (en) | Automated mobile device notification routing | |
WO2018191518A1 (en) | System and method for parsing a natural language communication from a user and automatically generating a response |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FISERV, INC., WISCONSIN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KLEEHAMMER, MICHAEL LEE;LOYD, MICHAEL FISHER;JOHNSON, DAVID KEITH;SIGNING DATES FROM 20130327 TO 20130422;REEL/FRAME:030423/0396 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |