Abstract:
A system and method for enabling an enhanced camp-on feature for a communications device. In an illustrative embodiment, the system includes a first mechanism for providing information pertaining to why a first user of a first communications device is unable to be contacted. A second mechanism enables a second user of a second communications device to make a camp-on selection based on the information. In a more specific embodiment, the information includes state information pertaining to the first communications device. The first means includes a fist module running on the first communications device. The first module is adapted to selectively relay the state information to an entity connected to the network. In the specific embodiment, the entity connected to the network includes Private Branch exchange (PBX) system.
Abstract:
In one embodiment, techniques for manipulating a voice message using a telephone user interface are provided. The telephone user interface receives a mark begin segment command from a telephonic device through a voice modality. The mark begin segment command indicates a beginning point for a voice message segment in the voice message. The telephone user interface then receives a mark end segment command from the telephonic device through the voice modality. The mark segment command indicates an ending point for the voice message segment in the voice message. An action command from the telephonic device is received and an action based on the action command for the voice message segment is performed. The voice message segment is a portion of the voice message determined based on the indicated beginning point of the voice message segment and the indicated ending point of the voice message segment in the voice message.
Abstract:
A method for granting access to secure information includes receiving from a caller a call for connection with one of a plurality of agents, distributing the call to the agent of the plurality of agents, initiating an active communication session between the caller and the agent for handling the call, and granting to the agent access to the secure caller information using a plurality of access authentication information that includes an active communication session between the caller and the agent.
Abstract:
A method for providing a camp-on service for a network service includes detecting a request from a user for access to a network service and detecting that the network service is unavailable. The method includes subscribing the user to a camp-on service for the network service. The method includes detecting that the network service is available and notifying the user that the network service is available.
Abstract:
The present invention includes methods and devices for providing. According to some implementations, radio frequency identification (“RFID”) tags are positioned at various locations throughout a building. Building locations can be determined from the RFID tags. Emergency service providers may be equipped with a portable device that includes at least one RFID reader for reading the RFID tags. Some implementations involve transmitting the RFID tag data to a control center from which the emergency services are coordinated. The emergency service workers' current and prior locations can be determined by the portable devices and/or at the control center. In preferred implementations, emergency service provider location information can be provided to control center personnel and to emergency service providers in real time.
Abstract:
Techniques for scheduling a task include receiving task data and quorum data. Task data describes tasks to be performed by one or more participants. Quorum data indicates a participant set of one or more participants to perform each task. Current user data may also be received. Current user data describes a current task set of one or more tasks currently being performed by a particular participant. Either or both of the task data and the current user data describe interruptibility through a particular medium of a plurality of communications media. A particular time interval to schedule a particular task is determined based at least in part on the interruptibility of the task or the particular participant. These techniques allow either or both unscheduled tasks and previously scheduled tasks to be moved to time intervals that overlap other scheduled tasks, including tasks currently being performed by a participant.
Abstract:
A method for managing conference resources includes receiving from an endpoint of a user a call to join a multipoint conference between a plurality of participants. Each participant communicates on the multipoint conference through a respective endpoint. The method includes determining that an insufficient amount of resources exist to allow the user to communicate on the multipoint conference and determining participation instructions to enable the user to communicate on the multipoint conference. The method also includes communicating the participation instructions. Location information associated with the user and location information associated with at least one of the plurality of participants may be used to determine the participation instructions to enable the user to communicate on the multipoint conference.
Abstract:
Disclosed is an active or dynamic RFID tag that actively provides current status information regarding a particular item, as well as mechanisms for recognizing dynamic RFID information read from such RFID tag. Static identifying information regarding the particular item is provided either by the same active/dynamic RFID tag or by a different passive RFID tag. While the RFID tag may passively or actively provide general identification, the RFID actively provides status information that corresponds to changes in the corresponding item's status. In a first implementation, active RFID tags are positioned next to one or more components within a system so that each active RFID tag is powered and transmitting its RFID information when its corresponding component is operational. In contrast, each active RFID tag is positioned so that it is not powered and not transmitting its RFID information when its component is failing. Accordingly, an RFID reader can then know when a system has a failing component when a one of the component's corresponding active RFID tag is not transmitting its RFID information. In this first implementation, the active RFID either transmits or fails to transmit based on its component's status state. In a second implementation, a dynamic RFID is associated with a specific component, set of components, or system, and the dynamic RFID tag dynamically provides an RFID reader with RFID information that changes with its associated item's changing status state. The status state may correspond to any suitable parameter of the item or product that can change over time. Thus, the dynamic RFID provides different transmission frequencies based on different status states of its component or system.
Abstract:
The present invention includes methods and devices for providing safeguards to the access of certain substances. Some implementations provide alerts and/or other appropriate actions when substances are subject to spoilage or expiration. Some implementations provide responses to potentially dangerous combinations of substances. Other aspects of the invention involve determining the allergies of a user and providing a warning when allergens are, or recently have been, present. One preferred embodiment provides a smart medicine cabinet for helping to provide medication safely to a patient and to provide other related services.
Abstract:
A method for reserving conference resources includes communicating a conference notification to each of a plurality of conference invitees. The conference notification is associated with a multipoint conference. The method includes receiving, from each of a first number of the plurality of conference invitees, a response to the conference notification indicating that the invitee will participate on the multipoint conference. The first number of the plurality of invitees comprises participating invitees. The method includes automatically determining, based on the responses to the conference notifications, a sufficient amount of resources to allow the participating invitees to communicate on the multipoint conference. The method also includes automatically reserving the determined sufficient amount of resources and hosting the multipoint conference between the participating invitees using the reserved resources