How to tell which queue, they meet an Agent?

Hello, what can I do so that when an agent, which is part of several queues, answering a call in the queue, they can see which queue is that they meet on their ipphone? We only use agents ipphone. At present, the cti port number is displayed. I prefer to have it display the cti route point or ideally a name, for example, the queue of WAITING of SERVICE... Please advise...

Gift? t think that your last mentioned solution will be easy to implement, although it might be possible with some direct access to database to callmanager, but seriously not recommended in my humble OPINION.

One thing to consider would be to set a variable, based on the trigger JTAPI who was called, or selections in the quick menus or caled number or anything that fits your needs. Then use this variable to distribute in the field of business data. Given that the company's data will appear on the client, you will be able to achieve your goal, I think...

HTH,

Leo

Tags: Cisco Support

Similar Questions

  • 15 - ay013nr: how to tell which USB 3.0 port when they are not blue?

    How am I supposed to say which USB port is my port 3.0? I thought they were supposed to be blue?

    Laptop model # 15 - ay013nr

    Thank you

    Hello:

    See Chapter 2, page 6 of the laptop user's guide for the location of the port usb3.

    http://h10032.www1.HP.com/CTG/manual/c05114176

  • A way to tell which projects the "used" bits are used?

    Hello

    I have clips that show that parts are 'used' in a project. Is it possible to tell which project they are used in?

    The best

    Elmer

    CClips showing used trademarks apply only to the active project in the timeline panel. Projects switch and used different brands will probably appear.

  • How to tell the difference between recommended, and optional updates long after they have installed bene?

    I have a Vistaprogram of the window running on my Toshiba laptop.

    In the past, I've confirmed that optional udates be installed. Please help: now I want to uninstall optional updates because my computer is slow.  How to tell the difference between recommended, and optional updates long after they have installed bene?

    Hey monkey 44,

    I suggest you view the history in Windows Update:

    http://Windows.Microsoft.com/en-us/Windows-Vista/see-which-Windows-updates-are-installed

    Those listed as recommended is technically optional.

    Before you delete updates the computer, I suggest you try the steps from the following link to improve performance and check if that helps:

    http://Windows.Microsoft.com/en-us/Windows-Vista/ways-to-improve-your-computers-performance

    I hope this helps.

  • When Outlook Express 6 detects emails from a name in the right column indicates the folder in which it is in. How can you tell which folder this folder is located in?

    Column of Outlook Express folder in find

    When Outlook Express 6 detects emails from a name in the right column indicates the folder in which it is in. How can you tell which folder this folder is located in?

    OE does not have the capacity to tell you where the folder is located in the folder hierarchy.  You can select different trees under local folders to find what subfolder is and what kind of tree it is under.  Unless folders.dbx is corrupted (which happens a bit), then OE will not create folders for you.  If folders.dbx is corrupt or not, I would suggest that you backup the files and the registry (see www.oehelp.com/OETips.aspx#6) before things become corrupt, because you seem to have a complex organization from your e-mail folders.

    Steve

  • Messages are not read until after they meet

    Since I was the most recent update, my messages to one of my friends (they read receipts turned on) remain as delivered until after they meet and then it changes as follows. So if they never answer there such as pronounced. If I restart my phone then it shows like reading but this does not solve the problem. On my iPad (since I have my messages there too) it is normal and shows as read on the right when they read. I have not updated my iPad yet so I don't know if the update had nothing to do with him or not. Everyone knows about similar problems?

    How do you restart the phone?

  • How to tell if someone uses remote adjustment to control the use of my computer?

    How to tell if someone uses remote adjustment to control the use of my computer?

    * original title - monitoring computer use *.

    Hello

    Why do you think that someone is watching your computer use? One would have to have
    loaded tracking software (trojan) on your computer or have access to the source of the network
    you use, such as cable, on your leg of it and have very sophisticated equipment.

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be harder to detect as
    the cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/products/malwarebytes_free

    SuperAntiSpyware Portable Scanner - free
    http://www.SUPERAntiSpyware.com/portablescanner.HTML?tag=SAS_HOMEPAGE

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    After the removal of malicious programs:

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Start - type this into the search-> find COMMAND to top box and RIGHT CLICK-
    RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to analyze the log file entries that the Microsoft Windows Resource Checker
    (SFC.exe) program generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Run checkdisk - schedule it to run at the next startup, then apply OK then restart your way.

    How to run the check disk at startup in Vista
    http://www.Vistax64.com/tutorials/67612-check-disk-Chkdsk.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    =======================================

    For extreme cases:

    Norton Power Eraser - eliminates deeply embedded and difficult to remove crimeware
    This traditional antivirus analysis does not always detect. Because the Norton Power Eraser
    uses aggressive methods to detect these threats, there is a risk that it can select some
    legitimate programs for removal. You should use this tool very carefully and only after
    you have exhausted other options.
    http://us.Norton.com/support/DIY/index.jsp

    ================================

    If you are in North America, you can call 866-727-2338 to get infections of virus and spyware. Seehttp://www.microsoft.com/protect/support/default.mspx for more details. For international information, check your subsidiary local Support site.

    I hope this helps.

  • How to use the queue data Structures stack?

    Hi all, you can tell me how to use the queue, stack, the link in the list... Structures of data in the project of BlackBerry? Thanks for any suggestions!

    BlackBerry devices are not java desktop running. you are limited to the blackberry api, basically j2me + rim extensions, based on java 1.3/1.4 (no enums, no generic, many collections not impl etc.).

    Remove your JRE6 and change your code until there is no more error.

  • How to find which version of Windows Live Mail I have?

    The death of my last computer, my beloved Outlook Express died with him.  I was shocked to know that I had to have Windows Live Mail and he did not support by e-mail.  I'm still scratching my head trying to understand why they would take it away from us when WLM is supposed to be better than OE but can't get a response from Microsoft on this one here.  Best buy got Thunderbird a stationery, but I couldn't use it with Windows 7.  So for two years, I didn't have a paper mill.  I recently discovered that I have Thunderbird on Windows 7, I installed it and have all the stationery that I could wish.  However, for ease of use and the folder options I prefer WLM.  Now, someone just told me that WLM 9 supports HTML for stationery.  By that, I mean like in Thunderbird, I can pull up a 'file', (an image or picture) to My Documents or my pictures in a new e-mail message and use it as stationery and can I download WLM 9 and remove WLM 11.


    Firstly, I bought my computer in 2012 so I guess I have WLM 11, but I can't find out how to know which version I.  Does anyone know how to find out who?

    In addition, WLM 11 doesn't have a lot of stuff that's not WLM 9?  I would make a big mistake by changing from 11 to 9?  How can ensure me that all my information is changed in the course of 9?

    Any advice would be appreciated.  I really, really enjoy my stationery in Thunderbird, but it save me a step if I could do it in WLM instead to run two programs of stationery.

    Thank you.

    On Sunday, April 27, 2014 18:59:39 + 0000, CarolHiggins6710 wrote:

    * In my last computer is dead, my Outlook Express beloved died with him.
    I was shocked to know that I had to have Windows Live Mail

    Certainly, you do not have Windows Live Mail. It is quite
    as an option.

    and he has not supported by email.

    He certainly fact e-mail support.

    You have the choice of many e-mail programs, some by Microsoft and some
    by others, some free and others for sale. As far as I am
    concerned, Windows Live Mail is not a very good choice and there is
    many of the better ones. I recommend that you try several and choose the
    the one that you prefer.

  • How to download Adobe connect recorded meeting?

    Hello

    The registered Acrobat Connect Pro can be viewed by using the registration link. But it is still on the local server.

    How can we download such a meeting / session so that it can be listened to offline on the desktop?

    Thank you and best regards,

    Daman

    Only the HOST of the meeting can offer this option.

    The HOST must go into Adobe Conenct Central and access their room. On Connect Central they go to the records under the room tab and select the record. Once selected, they can choose to "Go Public", then "make offline". At this point they will see Connect Add - In for launch and the meeting will play completely from the beginning to the end. He must save this 'read' locally for PC/Mac can be used for something else then that is happening. Once completed, the FLV file is located on the local PC/Mac. This FLV file can be posted anywhere for others to download. You can use the file share POD in a public room to share the file for people to download.

  • How Firefox decides which device to use (when run by mutt mailto links)?

    In Edit > Preferences, Applications, content type "mailto", I chose "Use mutt." When I click on mailto: links, mutt opens in a gnome-terminal. I want the terminal either through the alternatives system using x-terminal-emulator. How Firefox chooses which device to use here?

    You can set via favorite Applications (GNOME > system > personal > preferred Applications > system)

  • How to find which mailbox I dragged by mistake an email to?

    How to find which mailbox I dragged by mistake an email to?

    If you are inferring an operation track drag and drop activity, I don't think there is one. You should be able to get it, however, if you know the subject, content or sender.

  • We have 2 phones and 2 computers and they all sound when the phone rings. How to change that? they all use the same apple ID

    We have 2 phones and 2 computers and they all sound when the phone rings. How to change that? they all use the same apple - ID we buy apps and music coming from the same account. It all works very well, but we don t like any other device to RING eveytime a phone rings.

    Thank you so much: D

    ON both phones, check the settings > phone > call on other devices > Off.

  • How to determine which application has focus in Windows

    Hello all-

    I'm trying to work around the "Labview freezes when there is big data in the Clipboard, known issue" (http://forums.ni.com/t5/LabVIEW/Labview-freeze-when-accessing-a-custom-menu-with-data-on-the/m-p/200...) and a thought is to try to determine if Labview has the focus, and if it then clears the Clipboard.  If Labview has focus, and then let the user use the Clipboard.  It would be a good work around, because it would let users paste the screenshots and notes files and would not risk a nasty Clipboard / menu / gel-crash.

    My initial search for determining windows application focus, came so empty.  This old thread (from 2005) covers pretty well:

    http://forums.NI.com/T5/LabVIEW/is-there-a-simple-way-to-programatically-tell-which-VI-window/m-p/20...

    The "is more"property disobeys.»  I must determine if Labview has the focus, as opposed to Windows, Notepad, firefox, etc.  I also looked at command prompt commands and found nothing immediately useful here either.

    Any ideas?

    Thank you

    Casey

    Hello

    You can use the GetForegroundWindow starting from user32.dll. More information on msdn.

    Christian

  • someone was able to access my laptop remotely today, how would I know if they let any virus or spyware on it.

    someone was able to access my laptop remotely today, how would I know if they let any virus or spyware on it. I have norton 360 virus protection that has not detected any viruses. IM worried about using my computer to stuff order online where they can steal my credit card details / number while im using it

    Hello

    How do you know that someone will access your computer from outside? Allow access and do you
    you know who it was?

    Here is some information that should help you:

    Was it a SCAM phone call that initiated the connection distance:

    Avoid scams to phone for tech support
    http://www.Microsoft.com/security/online-privacy/avoid-phone-scams.aspx

    Its a total scam. Uninstall their software and then perform a system restore before you install.
    Change all your sensitive passwords at all sites - e-mail, Bank, credit cards and others. (Do not
    on the computer compromise and it would be better to do it on the phone or in person.)

    You can even restore your system to factory fresh to make sure their software violates not
    your security. (Ways to re - install Windows Clean - removing everything on the backup drive so all the data
    before hand.)

    It is also possible that they consulted Bank, passwords and information of credit card on your computer. If
    in order to check for malicious software as shown below. Change your passwords. Contact the Bank and credit
    phone card companies. Do the same for any investment or other sensitive professionals or personal
    accounts that may have been violated.

    ====================================================================
    ====================================================================

    In the United States, you can contact the FBI, Attorney general, the police authorities and consumer
    Watch groups. Arm yourself with knowledge.

    No, Microsoft wouldn't you not solicited. Or they would know if errors exist on your
    computer. So that's the fraud or scams to get your money or worse to steal your identity.

    Do not fall for the fake phone Tech Support
    http://blogs.msdn.com/b/securitytipstalk/archive/2010/03/09/Don-t-fall-for-phony-phone-tech-support.aspx

    Avoid scams that use the Microsoft name fraudulently - Microsoft is not unsolicited
    phone calls to help you fix your computer
    http://www.Microsoft.com/protect/fraud/phishing/msName.aspx

    Scams and hoaxes
    http://support.Microsoft.com/contactus/cu_sc_virsec_master?ws=support#tab3

    Microsoft Support Center consumer
    https://consumersecuritysupport.Microsoft.com/default.aspx?altbrand=true&SD=GN&ln=en-us&St=1&wfxredirect=1&gssnb=1

    Microsoft technical support
    http://support.Microsoft.com/contactus/?ws=support#TAB0

    Microsoft - contact technical support
    http://Windows.Microsoft.com/en-us/Windows/help/contact-support

    ===========================================================
    ===========================================================

    Follow these steps carefully:

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be more difficult to detect as the
    cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/products/malwarebytes_free

    SuperAntiSpyware Portable Scanner - free
    http://www.SUPERAntiSpyware.com/portablescanner.HTML?tag=SAS_HOMEPAGE

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    After the removal of malicious programs:

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Start - type this in the search box-> find COMMAND at the top and RIGHT CLICK – RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to fix the system files of Windows 7 with the System File Checker
    http://www.SevenForums.com/tutorials/1538-SFC-SCANNOW-Command-System-File-Checker.html

    How to analyze the log file entries that the Microsoft Windows Resource Checker (SFC.exe) program
    generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Also run CheckDisk, so we cannot exclude as much as possible of the corruption.

    How to run check disk in Windows 7
    http://www.SevenForums.com/tutorials/433-disk-check.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    ======================================

    If necessary AFTER THAT you are sure that the machine is clean of any malware.

    How to do a repair of trouble Windows 7 installation (it's for Windows 7 and there are similar procedures
    for Vista if necessary.)
    http://www.SevenForums.com/tutorials/3413-repair-install.html

    I hope this helps.

    Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle=""><- mark="" twain="" said="" it="">

Maybe you are looking for