摘要:
Methods and devices are provided for automating a login process and user/device associations. A user's preferred device settings and/or functions may be provisioned automatically. Some implementations provide an automated log out or “sleep” when a user leaves one or more of the devices. Users may be automatically identified and associated. The “presence” of members of a user group may be determined as required for one or more actions to be taken. Some user groups control devices according to which members of a group may have access to certain functions, information, etc., and which may not.
摘要:
A method and system for participant control of privacy during a multiparty communication session includes receiving a request from a first participant to a multiparty communication connection for a sidebar between the first participant and a second participant to the multiparty communication connection. The sidebar is provided by at least substantially eliminating voice streams generated by the first participant and the second participant from conference output streams generated for a set of remaining participants to the multiparty communication connection.
摘要:
A method for transferring an automatic call distributor call includes receiving from a caller a call for distribution to one of a plurality of agents and distributing the call to a first agent of the plurality of agents for handling. The method includes receiving a transfer request to transfer the call to a supervisor and selecting an available supervisor to receive the call. The available supervisor comprises a supervisor not in an uninterruptible state. The method includes transferring the call to the selected available supervisor.
摘要:
A communications system contains a network linking a number of communications devices participating in a communications session. During the communications session, the communications devices share information indicating when participants are speaking. Based on this information, the communications devices control output levels to suppress the output of spurious signals during the communications session.
摘要:
A communication system quarantines text and then automatically transmits the text across a network at the end of a quarantine time period. This text quarantine period gives a user the chance to edit or delete text for a brief amount of time after the text has been entered. This allows editing or deletion of spelling errors, and inadvertent or indiscriminate text responses before the text is sent to a remote user. Since the text characters are automatically transmitted after the quarantine period, normal human communications and interactions are maintained allowing a receiver to interject or interrupt with text comments in the middle of a received text message. Thus, the communication system maintains the interactive advantages of TTY/TDD systems while also providing the editing flexibility of instant messaging systems. In another aspect of the text system, characters are buffered until they form a complete expression. Upon detection of the completed expression, the buffered characters are sent to the destination endpoint.
摘要:
A method for using load information in an instant messaging system includes determining current communication session load information of the user. The method includes blocking from transmission to the user instant message communications based on the current communication session load information of the user.
摘要:
A method for distributing calls includes receiving a plurality of calls each for connection with one of a plurality of agents and storing each of the plurality of calls in a queue. The method includes monitoring the time that each of the plurality of calls has spent in the queue and determining that a first agent is available to receive a call. The method also includes determining, for a first call that has spent the most time in the queue, a first amount of time that the first call has spent in the queue and determining whether the first amount of time has exceeded a service level time. The method includes, if the first amount of time has not exceeded the service level time, distributing the first call to the first agent.
摘要:
The present invention includes methods and devices for providing. According to some implementations, radio frequency identification (“RFID”) tags are positioned at various locations throughout a building. Building locations can be determined from the RFID tags. Emergency service providers may be equipped with a portable device that includes at least one RFID reader for reading the RFID tags. Some implementations involve transmitting the RFID tag data to a control center from which the emergency services are coordinated. The emergency service workers' current and prior locations can be determined by the portable devices and/or at the control center. In preferred implementations, emergency service provider location information can be provided to control center personnel and to emergency service providers in real time.
摘要:
Methods and devices are provided for automating a login process and user/device associations. A user's preferred device settings and/or functions may be provisioned automatically. Some implementations provide an automated log out or “sleep” when a user leaves one or more of the devices. Users may be automatically identified and associated. The “presence” of members of a user group may be determined as required for one or more actions to be taken. Some user groups control devices according to which members of a group may have access to certain functions, information, etc., and which may not.
摘要:
Methods and apparatus are described for replicating a plurality of original packets in a packet flow which follows a first routing path. The packet flow is received with a first device, the first device being included in the first routing path. In the first device, the original packets in the packet flow are identified according to at least one predetermined criterion. In the first device, replicate packets corresponding to the original packets are generated. The original packets are transmitted from the first device along the first routing path. The replicate packets are transmitted from the first device along a second routing path which is different from the first routing path.