Abstract:
A set of collaborative contacts may be selected with an invitation user interface. An invitation to participate in a collaborative activity may be sent to the selected contacts from the invitation user interface or from a collaborative application. The invitation may be received by a collaborative services platform. A user of the collaborative services platform may be presented with the invitation along with an ability to choose one of accept, decline and ignore in response to the invitation. The user may choose to accept, decline or explicitly ignore the invitation, and a response may be sent to the sender of the invitation indicating the user's choice. An application programming interface for a collaborative invitation service of the collaborative services platform may include an invitation element, a send invitation element, a respond to invitation element and a cancel invitation element. The cancel invitation element may be used to cancel issued invitations.
Abstract:
Collaboration between collaborative endpoints may be facilitated by a serverless publication service of a collaborative services platform. The serverless publication service may be configured to accept communicative connections from the collaborative endpoints. Users of the collaborative services platform may publish their associated collaborative presences with the serverless publication service. For example, the collaborative presence of a user may include information with respect to valid collaborative endpoints for the user and collaborative capabilities at those endpoints. Subscriptions to published collaborative presences may be placed through the serverless publication service. A collaborative presence subscribe message may specify a subscription to a collaborative presence of a user. Upon receipt of a presence subscribe message, if there is no subscription policy with respect to the sender, the recipient may be queried for a subscription policy with respect to the sender. The subscription may be accepted in accordance with the subscription policy.
Abstract:
Methods are described that facilitate presence publication which may include authorizing publication of presence at a first endpoint, if the publication is authorized, assembling a presence data structure, and broadcasting the presence data structure from the first endpoint. The method may also include the presence structure including a friendly name, contact information, and endpoint information. The method further including contact information in at least one of XML format, vCard format, and the endpoint information obtained from a peer name resolution protocol. The method may additionally include the presence data structure encoded as at least one of a generic discovery protocol message, a simple service discovery protocol message, and associating a globally unique identifier with the discovery protocol messages. The method may include a user entity authorizing presence publication, the user entity setting at least one of a default parameter authorizing publication of all presence, some presence, or no presence.
Abstract:
A method of identification used for communication within a network includes generating a network identity associated with a user, modifying the network identity according to a user preference to create a modified network identity, identifying the user with the modified network identity within a first network communication for a first network communication application, and identifying the user with the modified network identity within a second network communication for a second network communication application.
Abstract:
The system and method of information or presentation projection allows a user to present information to single or multiple screens without need of additional cables. Universal Plug and Play (UPnP) is used to advertise, find, and control the display devices. A reverse Terminal Service (TS) session is used to connect the display to the user's machine. Attendance at and receipt of the presentation is addressed from both a presenter side and from an attendee side through a subscription model. This subscription model is facilitated and security of the presentation is addressed through the use meeting invitations. These invitations are generated by the presenter, and may be requested by the attendees.
Abstract:
A terminal coupled to an intelligent telecommunication network may invoke dynamically modifiable subscriber services by transmitting information to a switch to which script files, each containing programming script needed to initiate a calling feature or other advanced subscriber service and a criteria statement used for triggering execution of the programming script, were downloaded thereto from a home location register where the script files may be added, deleted or otherwise modified by a system administrator. A program execution module residing at the switch compares the received information to the criteria statement for each script file downloaded thereto and executes the programming script of the script file having a criteria statement which matches the received string of digits. In wireless systems, the script files are downloaded to an MSC whenever a roaming terminal registers therewith.
Abstract:
A data structure that includes pointers to vertex attributes and primitive descriptions is generated and then processed within a general processing cluster. The general processing cluster includes a vertex attribute fetch unit that fetches from memory vertex attributes corresponding to the vertices defined by the primitive descriptions.
Abstract:
A method of reducing glare may include sensing a first light source with a second vehicle, and sensing a second light source with a first vehicle and oscillating a first light source ICF between a substantially opaque state and a substantially clear state on a first schedule. A second windscreen ICF may be oscillating between the substantially opaque state and the substantially clear state on a second schedule different from the first schedule. A position of the light source may be sensed and an eye position of the occupant estimated. An intersecting region of the selectively-darkenable ICF, which is located substantially along a line from the position of the light source to the eye position, is calculated. The intersecting region of the ICF is darkened, such that a reduced amount of light from the light source passes through the intersecting region.
Abstract:
A system, apparatus, method, and computer-readable medium are provided for authorizing a computing node to participate in a group of computing nodes utilizing a shared group password. According to one method described herein, an invitation to join a group is transmitted to a tentative group member node. The invitation is used to establish a connection with a group member node of the group. The tentative group member node generates a hash of a group password and transmits the hash to the group member node. When the group member node receives the hash, the group member node compares the received value to a previously stored hash of the group password. If the previously stored value is identical to the value received from the tentative group member node, then the tentative group member node is authorized as a new member of the group. Otherwise the tentative group member node is not permitted to become a member of the group.
Abstract:
Systems and methods are described that facilitate the management of contact information, at least some of the contact information related to entities in a serverless, peer-to-peer system. A contact store may store information regarding which other entities of a plurality of other entities are authorized to monitor presence of a user entity. Presence of an entity may generally indicate the willingness and/or ability of the entity to communicate and/or collaborate with other entities, for example. The contact store may also store information regarding which other entities of the plurality of other entities the presence of which should be monitored by the system. A user entity may be able to add contacts to and/or delete contacts from the contact store, for example. The user entity may also be able to modify the contact store to modify which other entities are authorized to monitor presence of the user entity and/or which other entities the presence information of which should be monitored by the system, for example.