Abstract:
Communications, such as emails or other information, in a work setting can be retained in a shared database that operates similar to an Internet social network. As work activities are performed, the content of the work activities can be associated with one or more shared databases based on the individual performing the activities, a common topic or theme associated with the activity and/or a manual entry. As various individuals review information contained in the shared database, notifications relating to who reviewed the content and a time of review can be sent to a contributor of the content to provide for accountability issues.
Abstract:
An enhanced telephony (ET) computer user interface that seamlessly integrates features of a personal computer (PC) and a telephone into a coherent user interface. The user is provided with a rich variety of functionality that leverages the fact that the PC has considerably more processing power and greater access to variety of data than the ordinary telephone. This processing power and data access is used to the user's advantage as the telephone's capabilities and functionality are greatly expanded. In general, the ET user interface includes a plurality of environments for the user to choose. These environments include a My Contacts environment, a communication preferences environment, and a Call History environment. Each of these environments contains certain available processes and features for controlling and managing telephones.
Abstract:
Users are able to subscribe to notifications regarding activity around particular documents (e.g., changes to and/or annotations to the documents). A variety of different notification parameters can be set by the user, allowing him or her to request the type(s) of notifications he or she would like to receive, as well as how frequently notifications are to be received.
Abstract:
In a networked client/server system, media content as well as annotations corresponding to the media content can be transmitted from a server(s) to a client. A user interface is presented to the user to facilitate creating new annotations and viewing annotations. According to one embodiment, the client further assists the user in identifying a temporal range of the media content to which the new annotation is to correspond.
Abstract:
Meeting attendees can have the resources available to participate in an efficient meeting regardless of where the attendees are located (e.g., across from each other or thousands of miles apart). Information can be gathered that relates to the attendees, the subject matter of the meeting or other information. In addition, relationships between attendees, if any, can be determined and displayed to the attendees to show the interrelatedness of the group. Various aspects during the meeting can also be observed and analyzed to allow the attendees to become more aware of the dynamics between individuals as well as the entire team.
Abstract:
As incoming communications are received, a priority or significance level can be assigned to each communication. A communication determined to have a high priority can be presented to a user at substantially the same time as receiving the communication. A communication having a low priority can be placed in a low priority folder or flagged differently from a high priority communication (e.g., different color-coding). Behavior of a user as it relates to a received communication can be observed for learning purposes or to modify one or more classifications or priority levels.
Abstract:
Architecture for completing search queries by using artificial intelligence based schemes to infer search intentions of users. Partial queries are completed dynamically in real time. Additionally, search aliasing can also be employed. Custom tuning can be performed based on at least query inputs in the form of text, graffiti, images, handwriting, voice, audio, and video signals. Natural language processing occurs, along with handwriting recognition and slang recognition. The system includes a classifier that receives a partial query as input, accesses a query database based on contents of the query input, and infers an intended search goal from query information stored on the query database. A query formulation engine receives search information associated with the intended search goal and generates a completed formal query for execution.
Abstract:
The claimed subject matter provides a system and/or a method that facilitates enhancing incoming data communication connectivity within a network. An analyzer component can evaluate a portion of an incoming data communication targeted for a network to identify a context associated with the data communication. A transfer component can direct the incoming data communication to a cluster within the network based at least in part upon the identified context, wherein the cluster includes a physical entity with pre-existing knowledge of the identified context.
Abstract:
A system that incorporates a user context into a computer-based search is provided. To establish the context, the innovation can identify information about a user state or context via a variety of sources and sensors. The state/context information can be used to filter, arrange and/or rank search results so as to facilitate converging on meaningful searches and results. Machine learning systems (implicitly and/or explicitly trained) can be employed to infer a current and/or future context related to user. An identified or inferred user context can be employed to modify an automated or user-defined search input/query. Contextual cues can be considered directly in the construction and use of context of context-sensitive retrieval algorithms that are optimized for identifying and/or ranking of informational items of potential interest or value in different contexts. As well, the context can be employed to intelligently render results of a query (e.g., user/application defined, context-modified query).
Abstract:
Techniques are provided for configuring a device. A token including first information identifying a user is received. The first information is read from the token. The device is configured using the first information in accordance with configuration data for the user.