Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing meeting roster awareness for participants in a conference. An example system configured to practice this method can first identify participants in a conference, and retrieve, from a source external to the conference, information describing relationships between the participants. Then the system can compute, based on the information, a relationship graph assigning a relationship strength for at least two of the participants. The system provides an indication of the relationship strength to one of the participants, such as providing an indication of relationships of which other participants are not aware. Sources external to the conference can include a social network, a communication history, an organizational chart, a directory, or group membership, for example.
Abstract:
Application-to-repository data mapping in data repositories is disclosed herein. Related methods, systems, and computer-readable media are also disclosed. In this regard, in one embodiment, a method for providing application-to-repository data mapping in a data repository is provided. The method comprises receiving, by a data repository, a definition of a named data object from an application. The method further includes generating a mapping of the named data object to a data element stored in the data repository. The method also comprises storing the mapping as application metadata in a predefined data structure in the data repository. The method additionally comprises providing, to the application, access to the data element based on the mapping of the named data object to the data element. The data repository thus provides a metadata architecture minimizing the impact of changes to the data repository, while also simplifying sharing of data among applications.
Abstract:
The system and method identify contact information for a first party. The contact information for the first party includes a plurality of communication endpoints of the first party and a plurality of communication applications for the plurality of communication endpoints of the first party. For example, the plurality of communication endpoints may be a home phone and a cell phone of the first party. The plurality of communication applications may be voice, video, text, and/or virtual reality applications of the first party. An electronic communication request is received from the first party to the second party. In response to receiving the electronic communication request from the first party to the second party, a first communication endpoint of the plurality of communication endpoints for the first party and a first communication application of the plurality of communication applications of the first party is selected based on a rule.
Abstract:
The system and method identify contact information for a first party. The contact information for the first party includes a plurality of communication endpoints of the first party and a plurality of communication applications for the plurality of communication endpoints of the first party. For example, the plurality of communication endpoints may be a home phone and a cell phone of the first party. The plurality of communication applications may be voice, video, text, and/or virtual reality applications of the first party. An electronic communication request is received from the first party to the second party. In response to receiving the electronic communication request from the first party to the second party, a first communication endpoint of the plurality of communication endpoints for the first party and a first communication application of the plurality of communication applications of the first party is selected based on a rule.
Abstract:
Embodiments disclosed provide access to Traversal Using Relays around Network Address Translation (TURN) servers using trusted single-use credentials, and related methods, systems, and computer-readable media. In one embodiment, a method comprises receiving, by a TURN authentication agent, a request for a TURN server credential. Responsive to determining that the request is authorized, the agent generates a trusted single-use credential and transmits it to the requestor. Using this trusted single-use credential allows untrusted clients to access a TURN server without exposing a userid/password combination. In another embodiment, a method comprises receiving, by the TURN server, a request for a TURN service. The server challenges the request, and receives a userid and a password. Responsive to determining that the userid and the password constitute a trusted single-use credential and responsive to determining that the request is authorized, the server provides the TURN service for the requestor.
Abstract:
A connection is made to a first web page. Content of the first web page is displayed to the first user. Information about the first web page is received from the first user. A view of the first web page is modified and presented to the first user based on the information. The information is not sent to the web server associated with the first web page. Instead, the information is stored in a location that is associated with an organization that is associated with the first user. The organization is not associated with the web server. A connection is made to the first web page based on input from a second user. The second user is also associated with the organization. Based on the second user being associated with the organization, the stored information is retrieved and presented to the second user.