Abstract:
Embodiments disclosed herein provide systems, methods, and computer-readable media for accessing a wearable computing system using randomized input origins for user login. In a particular embodiment, a method provides presenting a user with a first origin on which user login information is based, wherein the first origin is randomly selected from a plurality of possible origins. The method further provides, receiving first motion information from the user indicating a first position relative to the first origin that corresponds to a first element of the user login information. Upon receiving the user login information, the method provides determining whether the user login information authorizes the user to access the wearable computing system.
Abstract:
Embodiments disclosed herein provide methods, systems, and computer readable storage media for intelligently presenting surveillance information on a mobile device. In a particular embodiment, a method provides receiving video streams each comprising video captured of a location of a premises under surveillance. The method further provides determining a device location of the mobile device in the premises and selecting at least one video stream of the video streams based on the device location and the location captured in the video of each video stream. The method also provides transferring the at least one video stream to the mobile device.
Abstract:
The present disclosure is directed to systems and methods that include measuring a luminance; comparing the luminance to a predetermined luminance threshold; and if the luminance is below the predetermined luminance threshold, determining a proximity to an external device.
Abstract:
To allow more non-enterprise communication endpoints to communicate without having to allocate an extension for every non-enterprise communication endpoint, a request is received to communicate with an enterprise communication system from a non-enterprise communication endpoint. A temporary password is associated with a dynamic communication address (e.g., from a group of dynamic extensions). The temporary password and the dynamic communication address are sent to the non-enterprise communication endpoint. The non-enterprise communication endpoint registers with the communication system using the temporary password and the dynamic communication address. A communication session is established between the non-enterprise communication endpoint and an enterprise communication endpoint using the dynamic communication address. The temporary password is then disassociated from the dynamic communication address, thus freeing up the dynamic communication address for use with another non-enterprise communication endpoint.
Abstract:
Method to clone a communication session from a first device to a second device, including: receiving a request to identify the communication session; rendering an information message comprising an identification of the communication session, wherein the information message is configured to be transmitted from the first device; acquiring the information message from the second device to clone the communication session onto the second device; bridging the second device to the communication session without dropping the first device from the communication session, to produce a cloned communication session; and sending a confirmation message, wherein no prior association between the first device and the second device is used during the cloning.
Abstract:
To allow more non-enterprise communication endpoints to communicate without having to allocate an extension for every non-enterprise communication endpoint, a request is received to communicate with an enterprise communication system from a non-enterprise communication endpoint. A temporary password is associated with a dynamic communication address (e.g., from a group of dynamic extensions). The temporary password and the dynamic communication address are sent to the non-enterprise communication endpoint. The non-enterprise communication endpoint registers with the communication system using the temporary password and the dynamic communication address. A communication session is established between the non-enterprise communication endpoint and an enterprise communication endpoint using the dynamic communication address. The temporary password is then disassociated from the dynamic communication address, thus freeing up the dynamic communication address for use with another non-enterprise communication endpoint.
Abstract:
Systems, methods, and non-transitory computer-readable storage media for implementing real-time transport control protocol (RTCP) to obtain end-to-end session information. The system receives an RTCP extension that is associated with an RTCP packet in a communication session. The RTCP extension may include an instruction for transmitting RTCP data based on a triggering event. The RTCP extension can be configured to propagate along the communication session. Next, in response to the triggering event, the system can transmit the RTCP data to an address defined by the instruction as a destination address for receiving information associated with the triggering event.
Abstract:
An apparatus and method for improving performance in high-availability systems are disclosed. In accordance with the illustrative embodiment, pages of memory of a primary system that are to be shadowed are initially copied to a backup system's memory, as well as to a cache in the primary system. A duplication manager process maintains the cache in an intelligent manner that significantly reduces the overhead required to keep the backup system in sync with the primary system, as well as the cache size needed to achieve a given level of performance. Advantageously, the duplication manager is executed on a different processor core than the application process executing transactions, further improving performance.