Abstract:
Social media websites contain posts which may benefit persons affected by an emergency situation or natural disaster. Discovering trustworthy posters of useful information is disclosed such that messages indicating relevant information, and an associated trust value, may be provided to interested parties.
Abstract:
A method, apparatus and computer program product for providing the use of an external metric as the primary tie-breaker in ISIS route selections is presented. A set of routes are identified that are to be advertised by the router as external routes within a network. The routes are advertised by the router using a Type Length Variable (TLV), wherein the TLV contains metric information to be used as a first tiebreaker when selecting routes. The network is running an Intermediate System To Intermediate System (ISIS) protocol. The TLV includes a 32-bit or a 64-bit administrative tag sub-TLV, the TLV comprising TLV#135, TLV#235, TLV#236, and TLV#237.
Abstract:
Methods and systems for providing a composite conference environment are disclosed. More particularly, a virtual reality environment (VRE) that can accommodate the inclusion of a conventional multipoint conference as a registered user or individual participants in a conventional multipoint conference as registered users within a composite conference environment hosted by the VRE is provided. Accordingly, a conference that is spread across multiple servers, namely a virtual reality server and a conventional multipoint conference server, can be created and moderated. Moreover, audio/video streams, features, and control can be provided to all users participating in the composite conference environment.
Abstract:
A method is provided in which the present invention is for a method in which a telecommunications terminal determines whether its user is available to accept an incoming invitation to participate in a telecommunications session based on: (1) a characteristic of the use of a software application, (2) a characteristic of the use of a resource of a terminal, (3) a sensor input, (4) a characteristic of the incoming invitation or (5) any combination of (1), (2), (3), (4), and (5).
Abstract:
An agent login optimization system for optimizing login of agents at communication managers of a contact center is provided. The agent login optimization system includes a monitoring module for monitoring predetermined activities at a plurality of communication managers in the contact center. The monitoring includes monitoring call traffic at the plurality of communication managers and monitoring login requests of agents. The agent login optimization system further includes a determination module configured to determine a suitable communication manager from the plurality of communication managers based upon the monitoring to login an agent. The agent login optimization system further includes an agent login module for logging the agent into the suitable communication manager.
Abstract:
Methods, systems and computer readable media for network migration as described. The method can include receiving, at a processor, an indication to initiate a migrate start. The method can also include initiating, at the processor, a migrate start including forwarding traffic in a first protocol based on a first table while building a second table to forward traffic in a second protocol different from the first protocol. The method can further include performing a migrate cutover when it is determined that one or more MAC addresses for an active session have been learned and stored in the table. The method can also include completing a migration when an indication is received to complete the migration. The method can also include aborting the migration based on a received indication to abort the migration.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for managing a virtual meeting room communication session. The method includes establishing a persistent virtual meeting room communication session, the virtual meeting room communication session including shared resources available to virtual meeting room communication session participants, displaying to meeting participants a set of connected graphical elements representing a structure of the virtual meeting room communication session via a graphical user interface (GUI), receiving from one of the meeting participants input associated with the set of connected graphical elements, the input having an action associated with the virtual meeting room communication session, and performing the action based on received user input. The virtual meeting room communication session can persist when no participants are in the communication session. The persistent virtual meeting room can record changes in session context such as a record of session control events, resource changes, and participant listings.
Abstract:
Equivalence classes are used to determine how groups of call participants are distributed among remotely situated conference rooms. A roster of conference call participants is distributed for display by communication devices the participants bring to a conference room. The distributed roster contains at least one indicium by which the possession of an attribute, by any conference call participant in a room can be confirmed by other conference call participant(s) using a communication device. After entering a room, at least some participants use a communication device to access the roster and indicate, to a server, that at least one other participant on the roster possesses an attribute of significance to conduct of the call. Participants are assigned to groups and the groups are merged based on the presence of participants possessing an attribute or set of linked attributes. The server assigns the participants to respective groups for selective treatment.
Abstract:
A method, apparatus and computer program product for providing a variable tunnel keep-alive interval is presented. A tunnel keep-alive packet for a first tunnel is received at a first switching device. A Quality of Service (QoS) value of the keep-alive packet ishcekce. A determination is made regarding whether the QoS value corresponds to a QoS value of network control traffic, and when the QoS value of the keep-alive packet is lower than the QoS value of the network control traffic then a value of a tunnel keep-alive interval is increased.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing estimated wait times to consumers waiting to communicate with a customer service representative. The system accesses information about the consumer, analyzes that information, and based on that analysis places the consumer into a segment. The system then provides to the consumer an estimated wait time to communicate with a customer service representative based on the segment assigned to the consumer. Access to information about the consumer can be actively granted by the consumer, or passively acquired by a system configured to utilize publically available information.