Abstract:
Techniques for efficiently allocating ports and bandwidth in a communication system configured to establish interactive, real time communication sessions between endpoints are described. Requests are received at a server, from a requester endpoint device, to initiate an interactive, real time communication voice and/or video session requiring access to an interactive session resource. In an embodiment, the communication system is a contact center and the interactive session resource is an available contact center agent. Pending availability of the interactive session resource, a requester is assigned a place in a queue or otherwise scheduled to receive access to the interactive session resource. In the meantime, a data channel is established between the server and the requester's endpoint device. Resources, which can include an executable program and/or information operative to enable the endpoint device to emulate an active on-hold voice connection period, are downloaded to the endpoint device.
Abstract:
Embodiments disclosed herein provide systems and methods for selectively recording high quality media in a videoconference. In a particular embodiment, a method provides receiving a plurality of video streams from a plurality of videoconferencing clients. The method further provides streaming video at a first quality level for the plurality of video streams to a first videoconferencing client of the plurality of video conferencing clients. At a first point in time while streaming the video, the method provides identifying a first video stream of the plurality of video streams that should be recorded at a higher quality level than the first quality level and recording the first video stream at the higher quality level from the first point in time.
Abstract:
A Public Safety Access Point (PSAP) or other system can receive an emergency event. Based on information associated with the emergency event, the PSAP can determine which emergency vehicle can respond to the event. The PSAP may then determine an origination point, a destination, and a route that will be used by the emergency vehicle. The route information may then be communicated to a map server, one or more vehicles that may be affected by the route of the emergency vehicle, and/or other systems, devices, and/or computer systems. The map server, vehicles, etc. can then reroute or change a characteristic of a vehicle's travel to adjust for the travel and route of the emergency vehicles.
Abstract:
Techniques for aiding an email recipient in the management of inbound email by detecting, and configurably responding to, dynamically variable patterns of activity and behavior are described. Characteristics are extracted from new email messages originated by senders and intended for a recipient. One or more patterns of sender activity, recipient message management behavior, and/or message response behavior, relating to treatment of messages from individual senders and/or plural senders in the aggregate, are identified. The patterns are identified by analyzing statistics collected by the extraction of characteristics from email messages previously received by the recipient. Before the recipient reads a new email, a determination is made as to whether any deviation from an identified pattern exists; and, if so, a pre-existing rule for treatment of the new message is enforced and/or a new rule specifying treatment of at least some messages from the sender of the email is proposed.
Abstract:
Embodiments disclosed herein provide systems and methods for dynamically guiding a user to a target conversation area with a communication device. In a particular embodiment, a method provides receiving a call request to establish a call with a communication device and determining a location of the communication device. The method further provides determining a target conversation area for a user of the communication device to participate in the call based on the location of the communication device. The method also provides directing the user to the target conversation area.
Abstract:
Embodiments disclosed herein provide methods and systems for providing presentation delay feedback to a presenter in a web conferencing session. In a particular embodiment, a method includes receiving, from a presenter client, a request to initiate a web conferencing session. The method further includes establishing the web conferencing session between the presenter client and at least one viewing client. During the web conferencing session, the method includes determining delays in presenting a view of the web conferencing session at each of the at least one viewing clients and providing an indication of the delays to a user at the presenter client.
Abstract:
Techniques for aiding an email recipient in the management of inbound email by detecting, and configurably responding to, dynamically variable patterns of activity and behavior are described. Characteristics are extracted from new email messages originated by senders and intended for a recipient. One or more patterns of sender activity, recipient message management behavior, and/or message response behavior, relating to treatment of messages from individual senders and/or plural senders in the aggregate, are identified. The patterns are identified by analyzing statistics collected by the extraction of characteristics from email messages previously received by the recipient. Before the recipient reads a new email, a determination is made as to whether any deviation from an identified pattern exists; and, if so, a pre-existing rule for treatment of the new message is enforced and/or a new rule specifying treatment of at least some messages from the sender of the email is proposed.
Abstract:
An indication of a change in a right to use a service or feature is received. For example, this can be based on an administrator granting access to a previously installed service or feature. In response, a notification is sent to a user of the change of the right to use the service or feature. The notification requests the user to provide a credential to approve the change of the right to use the service or feature. For example, a link may be provided in an email or text message that the user can click on to provide a password/user name. The credential is received and verified. In response to validating the credential, access is allowed according to the change of the right to use the service or feature. The user then has access to the service/feature without the administrator having to know the user's credential.