The AI-powered contact center, part 1: Create engaging digital experiences

The AI-powered contact center, part 1: Create engaging digital experiences

This article is contributed. See the original author and article here.

Today’s customers expect more engaging, personalized service experiences from the brands they choose. They want intelligent self-service that offers always-on digital convenience. And they expect agents, whether human or virtual, to not just know who they are, but to already have an idea why they are reaching out and how to help.

That’s why we launched the Microsoft Digital Contact Center Platforman open, extensible, and collaborative platform for delivering seamless, omnichannel customer engagement at scalebuilt with AI at its heart, powered by Nuance technologies.

Bringing the power of AI to the contact center

AI is fast becoming an essential part of every contact center strategy, helping improve customer experiences while reducing costs, and helping contact center leaders accomplish their customer acquisition, retention, and revenue goals.

And now, enterprises have even more ways to optimize their digital experience strategy with AI.

The launch of the Microsoft Digital Contact Center Platform shows our commitment to putting our customers first. It brings together innovation from Nuance and Microsoft to power unmatched self-service experiences, live customer engagements, collaborative agent experiences, business process automation, advanced telephony, and fraud prevention capabilities. In this series of articles, we’ll outline how Nuance solutions enable the Microsoft Digital Contact Center Platform to deliver value across every engagement channelstarting with digital.

Creating standout digital experiences

As we enter a new, AI-powered era for the contact center, we look forward to stories from enterprise customers about how they’ve optimized their digital engagement strategies with the capabilities of Nuance’s intelligent engagement solutions and Microsoft Dynamics 365, Microsoft Teams, Microsoft Power Platform, and Azure.

Flexibility and choice, with an open platform

Many enterprises want to augment their digital capabilities to provide intelligent, omnichannel experiences. But they also need to protect the investments they’ve made in their existing customer engagement solutions, contact center platforms, and back-office systems.

The Microsoft Digital Contact Center Platform uses open, vendor-agnostic Nuance digital engagement solutions to offer complete flexibility and investment protection for organizations that want to:

  • Integrate best-of-breed virtual assistant or live chat solutions with a third-party customer relationship management (CRM) from any vendor.
  • Have a third-party virtual assistant, but need to integrate it with an industry-leading live agent platform.
  • Add powerful new messaging capabilities to a third-party agent desktop.
  • Surface third-party product recommendations, next best actions, knowledgebase information, tech support, or order management systems to their agents on a unified desktop.

And now that Microsoft and Nuance innovations are on a single platform, it’s even simpler for organizations currently using the Nuance Digital Engagement Platform to benefit from everything the Microsoft cloud has to offer, including CRM, knowledge management, case management, collaboration tools, and many other services.

A proven track record of increasing self-serviceand driving sales

The Nuance solutions on the Microsoft Digital Contact Center Platform have a strong record of enabling intelligent self-service and increasing containment.

For example, the AI-powered targeting engine behind Nuance Virtual Assistant and Live Assist uses customer profiles and purchase history to engage customers with personalized incentives and relevant offers at the right moment in their journey. That creates more valuable upsell and cross-sell opportunities, helping increase sales in digital channels. Esurance, for instance, generated live chat incremental sales of $4.4 million in just one quarter after implementing Nuance Live Assistand also saw 86 percent increased customer satisfaction with live chat.

Advanced capabilities built on decades of contact center AI experience

The powerful functionality of Nuance digital solutions comes from long experience in delivering AI-powered innovations for all customer engagement channels.

With Nuance AI on the Microsoft Digital Contact Center Platform, organizations can use proactive targeting to deliver the right kind of engagement for each customerat exactly the right time. They can enhance digital experiences by using rich media widgets in messaging channels. They can reduce the time and cost of ramping up new agents by delivering real-time guidance and recommendations straight to the agent desktop. The list goes on.

Plus, Nuance biometric authentication and intelligent fraud prevention solutions help streamline customer experiences and protect every interaction. And everything is delivered through a highly secure, compliant, and capable web interface that meets the stringent data privacy and security standards that regulators, businesses, and customers demand.

A roadmap for the future of the digital contact center

It’s an exciting time to be working with customer engagement leaders. We’re developing an evergreen roadmap for the Microsoft Digital Contact Center Platform, and while we’ll continuously add new capabilities, we’ll also ensure our customers’ existing investments are protected, enabling them to migrate seamlessly to our combined platform at their own pace.

Together with our trailblazing customers, discover how Nuance and Microsoft can offer limitless flexibility, unmatched operational efficiency, amazing customer and agent experiencesand better business outcomes with the Microsoft Digital Contact Center Platform.

The post The AI-powered contact center, part 1: Create engaging digital experiences appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Ten Azure networking tips that may simplify your life

Ten Azure networking tips that may simplify your life

This article is contributed. See the original author and article here.

Hi,


 


Azure networking can sometimes give headaches. Here are a few tips which may make your life easier.


 


1. Private link effect – episode 1 – route tables


 


When enabling Azure Private Link for a given resource, say a Storage Account, you may end up with the following configuration


 


privatelink-effect.png


where you have routed all traffic to Azure Firewall (or an NVA) and noticed that the VM (or anything else) is directly connecting to the private endpoint, bypassing the firewall…This might come as a surprise to you but this is due to the fact that whenever you enable private link for a given resource, a direct (more specific) route is propagated to the underlying NICs. In the above example, Azure will write the 10.1.5.4/32 route to the NIC(s) of the VM pointing directly to the InterfaceEndpoint of the resource. Because this route is more specific than 0.0.0.0/0, the firewall will be bypassed. To overcome this, you have to write a /32 route to the subnet’s route table to overwrite the one written by Azure, which can be itself challenging because of the 400 routes limit per route table. Microsoft wrote a good guidance on that topic.


 


2. Private link effect – episode 2 – route tables


 


Ok, now you think you understood private link routing, right? So what about this?


 


privatelink-effect2.png


You thought Azure was pushing a route to underlying NICs but you realize that the VM in VNET 3 does not have such a route…Why is that? Well, it makes sense but you do not especially think about it. The reason why VNET 3’s VM does not get the route is because VNET 3 is not peered with VNET 1. Because peering is non-transitive, writing such a route would anyway lead to a dead-end. So, if you had a 0.0.0.0/0 UDR on VNET 3’s subnet, this would this time be correctly routed to the firewall…So as you guessed it, if you put a private endpoint in an intermediate VNET:


 


privatelink-effect3.png


this time, the /32 route is propagated to all peered VNETs. Long story short, putting private endpoints into the hub, would propagate into every spoke, and thus, you’d better follow the guidance if you want to route that to the firewall.


 


3. Private link effect episode 3 – Network Security Groups


Ok great, that’s for routing but fortunately, we don’t have to worry about NSGs. Well…


 


privatelink-effect4.png


How come VM2 is able to connect to my private endpoint??? My deny all rule should have kicked in..What’s going on here? Well, for the same reason as before, the InterfaceEndpoint is non-sensitive to NSGs. So, you must make sure to route things correctly to make sure, the InterfaceEndpoint is not used.


 


4. Private link effect episode 4 – forget the first 3 episodes?


 


Well, I’m sorry for you if you read the first 3 episodes because all of that is *almost* part of the past…but you will surely still likely see this for quite a while. Microsoft has revamped the way private link works, and there is a preview (UDR) and preview (NSG) available (not in all regions), which allows you to deal with private link traffic, like with any other type of traffic, but meanwhile, you’d better still understand how it currently works :).


 


5. Private link and outbound traffic


 


Repeat after me:


 – Private link is inbound traffic only


 – Private link is inbound traffic only


 – Private…(well you got it, right?)


 


I still see a huge confusion with many folks about private link, where people think that enabling private link for an app service, APIM, etc. will give them access to the resources sitting in a given VNET. That is wrong, to gain access to such resources, you have to focus on outbound traffic, not inbound!


 


6. Private link and public traffic


 


Remember one rule of thumb: private link does not automatically deny public traffic for all services. It does for some but not for all. So, remember to always double-check that public traffic is indeed correctly denied.


 


7. The propagate gateway routes effect


 


Whenever you establish private connectivity between your datacenter and Azure, you will use the hub vnet to bridge both worlds. You’re likely going to have (not mandatory) a VPN Gateway to establish a S2S and/or Expressroute connection. From there on, each spoke VNET should be able to connect to your on-premises systems and vice-versa. You, of course, want to make sure, traffic is routed through your firewall. If you encounter a different behavior (traffic directly flying from on-prem to spoke and vice versa), you’re likely forgot to deactivate the “propagate gateway routes” property of the route table.


 


proproutes.png 


So, make sure to turn it off :).


 


8. The Kubenet effect of NSGs


Many companies struggle to decide whether they want to implement Azure CNI (now BYO CNI is available) or Kubenet for their AKS clusters. The main reason is the shortage of IP addresses. Kubenet is IP-friendly because it only allocates IPs to nodes, while CNI allocates one IP per pod, which results in many more consumed IPs. You can use Kubenet if you’re willing to fully embrace a programmable network approach such as the use of Service Meshes and internet Network Policies (Calico for ex. which also works with Kubenet).  However, if you plan to rely on Azure networking capabilities, such as using NSGs and the likes, then you’d better switch to CNI. Consider the following scenario:


 


kubeneteffect.png


where you want to share the same cluster for multiple tenants but you want to isolate tenants in their own node pool. So, in the above scenario, you only want system to be able to connect to tenants but tenant 1 and tenant 2 cannot talk together. You do not trust logical isolation (K8s network policies & service meshes) and want to rule this with Network Security Groups instead, or even combine both. Easy, you simply add the following inbound rules to tenant 1 & tenant 2’s NSGs:


 


– Priority: 100 – source IP: 10.0.0.0/28 destination: * – ALLOW (let’s skip the ports for sake of simplicity)


– Priority: 110 – source IP: * destination: * – DENY 


 


So, that way, this should fly…Well, it appears that this won’t fly at all. Why is that? Because Kubenet makes use of network address translation (NAT) to allocate POD CIDRs dynamically, and what the NSGs see are not the subnet ranges but the POD CIDRs…, which can change at any time. Indeed, Azure constantly rewrites the route table associated to the subnets to map POD CIDRs with nodes, whenever the cluster restarts or whenever a node gets added/removed to/from a node pool. Therefore, you can’t predict how this allocation will be done, which defeats the use of NSGs to rule internal traffic. Of course, you could still use them to rule what comes from outside. 


 


9. Localhost in APIM policies


 


Did you know that you can use the keyword localhost in APIM policies? If you have a set of APIs and want APIM to let them call each other while never leaving the boundaries of APIM itself (not resolve again the IP through the DNS), you can use localhost…


 


10. The troubleshooting tool


 


Whenever you encounter a network issue in Azure, I recommend you to use Network Watcher and more specifically, its next hop feature. It helped me already a few times figure out what was misconfigured.

MTC Weekly Roundup – August 5

MTC Weekly Roundup – August 5

This article is contributed. See the original author and article here.

Hello hello, MTC! The first week of August is in the books, so let’s see what went down in the Community.


 


MTC Moments of the Week


 


We had a great AMA in the Community this week that focused on Azure Deployments, featuring @Mark Gray, @adotfrank@stephanieyen, and @stevenjma with @Eric Starker moderating. As a quick reminder, an AMA is a live text-based online event similar to a “YamJam” on Yammer or an “Ask Me Anything” on Reddit, and there is no audio or video component at this time.


 


Over on the blogs, @lucyhitz announced the general availability of Microsoft Viva Goals, “a goal-setting and management solution that aligns teams to your organization’s strategic priorities, driving results and a thriving business.” Head over to the post to watch an overview and learn more!


 


Cecilia_Bergstedt_0-1659737012802.png


 



 We also want to give a shoutout this week to @ScottLamond, a new MTC’er, for providing several helpful responses in the Excel Community! Welcome and keep being awesome! :)


 


Unanswered Questions – Can you help them out?


 


Every week, users come to the MTC seeking guidance or technical support for their Microsoft solutions, and we want to help highlight a few of these each week in the hopes of getting these questions answered by our amazing community!


 


@Jenny_Bruce is seeking advice from the Community about compliance policies and document version history limits in SharePoint Online.


 


Meanwhile, @JohnHogan20224k is encountering an error in the Microsoft 365 admin center having to do with Teams for Organization, so maybe you can help figure out what’s causing it.


 


 


Next Week – Mark your calendars!


 


Lastly, we have no events next week, but check back soon for updates!


 


Have a great weekend, everyone!