Abstract:
A single device that receives communications intended for a user having multiple contact addresses associated with different user roles is provided. The single device can receive communications intended for multiple telephone numbers, email aliases, screen names, aliases, other means of contact, or combinations thereof. Since a user engaged in a particular role might not desire to be interrupted with communications intended for a different role, the communications for the other roles can be maintained until the user is actively engaged in the role for which the communication was intended. In situations where there is an important communication sent to a non-active role, selective convergence between roles is initiated and the important communication is presented to the user.
Abstract:
A facility allows for automatic delegation of incoming real-time communications based on a delegation scheme. The delegation scheme may be rules-based and may be applied to a single real-time communication channel or multiple communication channels, including both real-time and non-real-time communication channels. The delegate information may include rules that indicate under what circumstances a communication should be rerouted, which delegate the communication should be rerouted to, and whether other associated actions should be taken in connection with the rerouting (or lack thereof). In some cases, the context of the incoming communication may play a role in how or whether a communication is rerouted to a delegate.
Abstract:
A bootstrapping technique for wirelessly obtaining white space data that may be used to identify an available white space channel for connecting to a service. Portable wireless devices may collaborate to provide white space data to a device requesting such data. A requesting device transmits a request for the white space data using, for example, an unlicensed band. A device receiving the request may transmit a copy of the data to the requesting device. The transmitted copy may be obtained by the receiving device from a local data store or may be provided from a database server to which the receiving device is connected. In the later case the receiving device acts as a proxy between the database server and the requesting device. Once the white space data is received by the requesting device it may be used to select a channel for communication in the white space.
Abstract:
Enhanced telephony computer user interfaces seamlessly integrate and leverage the features of personal computers and telephones. The manner in which media is presented at a computing system can also be modified automatically in response to detected telephone operations. These modifications can include pausing media in response to a detected telephone call and/or adjusting a volume of the media presentation. The media presentation/volume can also be resumed/restored upon detecting that the telephone call has terminated.
Abstract:
A local user of a local mobile device is allowed to participate in a video conference session with a remote user of a remote mobile device. Live video can be shared between and collaboratively digitally annotated by the local and remote users. An application can also be shared between and collaboratively digitally annotated by the local and remote users. A digital object can also be shared between and collaboratively digitally annotated by the local and remote users.
Abstract:
An enhanced telephony (ET) computer user interface that seamlessly integrates features of a personal computer (PC) and a telephone into a coherent user interface. The user is provided with a rich variety of functionality that leverages the fact that the PC has considerably more processing power and greater access to variety of data than the ordinary telephone. This processing power and data access is used to the user's advantage as the telephone's capabilities and functionality are greatly expanded. In general, the ET user interface includes a plurality of environments for the user to choose. These environments include a My Contacts environment, a communication preferences environment, and a Call History environment. Each of these environments contains certain available processes and features for controlling and managing telephones.
Abstract:
The subject disclosure pertains to anonymous network interaction. More specifically, mechanisms are provided to ensure anonymity with respect network interaction such that third parties are unable to determine the source and/or intent of communications. Accordingly, entities may anonymize all outgoing and/or incoming data packets so as to mitigate outside entities from learning about information being sought and/or provided. For example, a user or corporation may employ an anonymizer with respect to web searching so that outside entities are not able to determine what information is attempted to be accessed and by whom.
Abstract:
The interactive and shared surface technique described herein employs hardware that can project on any surface, capture color video of that surface, and get depth information of and above the surface while preventing visual feedback (also known as video feedback, video echo, or visual echo). The technique provides N-way sharing of a surface using video compositing. It also provides for automatic calibration of hardware components, including calibration of any projector, RGB camera, depth camera and any microphones employed by the technique. The technique provides object manipulation with physical, visual, audio, and hover gestures and interaction between digital objects displayed on the surface and physical objects placed on or above the surface. It can capture and scan the surface in a manner that captures or scans exactly what the user sees, which includes both local and remote objects, drawings, annotations, hands, and so forth.
Abstract:
A method for tagging content. The method includes receiving an initial metadata tag and associating the initial metadata tag with an object of an online repository. Based on the initial metadata tag, a metadata tag knowledgebase is accessed to derive at least one suggested metadata tag. A confirmation regarding the at least one suggested metadata tag is received and the suggested metadata tag is associated with the object. The object is then uploaded to the repository, and the metadata tag knowledgebase is updated to reflect tags associated with the object.
Abstract:
The subject disclosure pertains to anonymous network interaction. More specifically, mechanisms are provided to ensure anonymity with respect network interaction such that third parties are unable to determine the source and/or intent of communications. Accordingly, entities may anonymize all outgoing and/or incoming data packets so as to mitigate outside entities from learning about information being sought and/or provided. For example, a user or corporation may employ an anonymizer with respect to web searching so that outside entities are not able to determine what information is attempted to be accessed and by whom.