ELIZA's key method of operation (copied by chatbot designers ever since) involves the recognition of clue words or phrases in the input, and the output of corresponding pre-prepared or pre-programmed responses that can move the conversation forward in an apparently meaningful way (e.g. by responding to any input that contains the word 'MOTHER' with 'TELL ME MORE ABOUT YOUR FAMILY'). Thus an illusion of understanding is generated, even though the processing involved has been merely superficial. ELIZA showed that such an illusion is surprisingly easy to generate, because human judges are so ready to give the benefit of the doubt when conversational responses are capable of being interpreted as "intelligent".
Although NBC Politics Bot was a little rudimentary in terms of its interactions, this particular application of chatbot technology could well become a lot more popular in the coming years – particularly as audiences struggle to keep up with the enormous volume of news content being published every day. The bot also helped NBC determine what content most resonated with users, which the network will use to further tailor and refine its content to users in the future.
This particular tool also specializes in personalization. Implement ZoConvert and make personalized updates, conversations, interactions with bots minutely picking on the customer behavior, pattern and interaction. With ZoConvert you can Broadcast your messages which results in better open and click rate. You can also create your own flows and make changes depending on your marketing strategies and send personalized updates at the same time.
At Facebook’s F8 Developers Conference, Messenger Bots were announced. These bots are being developed by media corporations and retailers alike and very quickly so which raises the question as to what a Messenger bot is and how it’s useful to so many different types of companies. Even more important to know is what these bots mean for the average user, whether or not they will always be safe or can they present a potential threat if they are developed by anyone with malicious intent. Here’s a the answer to all that and more.