Abstract:
Systems and methods for identifying participants present in a communication session are disclosed. More particularly, the identification of participants using a shared communication endpoint is enabled. Identification can include receiving information from a first participant that identifies a second participant. The identification of the second participant can include receiving a selection of the second participant from a list of expected conference participants presented to the first participant through a communication device associated with the first participant, after the first participant has been registered as a participant in the communication session.
Abstract:
Authentication of a user initiating a communication may be achieved using a visual indicator of the user. Initiation of a communication may result in the initiator of the communication collecting image data associated with the initiator's identity. Additionally, the initiator may be required to perform a task, wherein a response to the task may be transmitted with the image data to the receiver of the communication. The receipt of the image data may allow a receiver of the communication to reduce spam and verify that the initiator is who it purports to be.
Abstract:
An apparatus and method for improving performance in high-availability systems are disclosed. In accordance with the illustrative embodiment, pages of memory of a primary system that are to be shadowed are initially copied to a backup system's memory, as well as to a cache in the primary system. A duplication manager process maintains the cache in an intelligent manner that significantly reduces the overhead required to keep the backup system in sync with the primary system, as well as the cache size needed to achieve a given level of performance. Advantageously, the duplication manager is executed on a different processor core than the application process executing transactions, further improving performance.
Abstract:
Techniques for efficiently allocating ports and bandwidth in a communication system configured to establish interactive, real time communication sessions between endpoints are described. Requests are received at a server, from a requester endpoint device, to initiate an interactive, real time communication voice and/or video session requiring access to an interactive session resource. In an embodiment, the communication system is a contact center and the interactive session resource is an available contact center agent. Pending availability of the interactive session resource, a requester is assigned a place in a queue or otherwise scheduled to receive access to the interactive session resource. In the meantime, a data channel is established between the server and the requester's endpoint device. Resources, which can include an executable program and/or information operative to enable the endpoint device to emulate an active on-hold voice connection period, are downloaded to the endpoint device.
Abstract:
Techniques for aiding an email recipient in the management of inbound email by detecting, and configurably responding to, dynamically variable patterns of activity and behavior are described. Characteristics are extracted from new email messages originated by senders and intended for a recipient. One or more patterns of sender activity, recipient message management behavior, and/or message response behavior, relating to treatment of messages from individual senders and/or plural senders in the aggregate, are identified. The patterns are identified by analyzing statistics collected by the extraction of characteristics from email messages previously received by the recipient. Before the recipient reads a new email, a determination is made as to whether any deviation from an identified pattern exists; and, if so, a pre-existing rule for treatment of the new message is enforced and/or a new rule specifying treatment of at least some messages from the sender of the email is proposed.
Abstract:
A device, system, and method locates user devices in enterprises. The method performed by an enterprise server of an enterprise includes receiving contact data from an emergency services device, the contact data comprising location related data of a user device and identification data of the user device. The method includes determining if a general location data of the user device is associated with an area data of the enterprise as a function of the location related data. The method includes determining a precise location data of the user device within the area data of the enterprise based on the contact data.
Abstract:
A communication session is established with a contact center. The communication session includes a first concurrent communication session in a first communication medium and a second concurrent communication session in a second communication medium. The first communication medium and the second communication medium are different communication mediums. For example, the first concurrent communication session may be a voice communication session with a user and the second concurrent communication session may be multimedia communication session with the user. A task is identified that needs to be accomplished in the communication session (e.g., in one of first or second concurrent communication sessions). A determination is made if the first communication medium is an optimal communication medium for the task. In response to determining that the first communication medium is the optimal communication medium for the task, the first task is implemented in the first concurrent communication session.
Abstract:
An indication of a change in a right to use a service or feature is received. For example, this can be based on an administrator granting access to a previously installed service or feature. In response, a notification is sent to a user of the change of the right to use the service or feature. The notification requests the user to provide a credential to approve the change of the right to use the service or feature. For example, a link may be provided in an email or text message that the user can click on to provide a password/user name. The credential is received and verified. In response to validating the credential, access is allowed according to the change of the right to use the service or feature. The user then has access to the service/feature without the administrator having to know the user's credential.
Abstract:
Questions are received for a conference call. The questions are submitted electronically, such as by email or Instant Messaging (IM). The questions can be submitted before and/or during the conference call. The questions are clustered into one or more similar categories. The clustered questions are sent to participants of a conference. For example, the questions can be sent to a presenter of the conference call as an agenda to follow for a question and answer section of the conference call. Likewise, the questions may also be sent to the conference participants as an agenda of the question and answer section of the conference call. The presenter can discuss the questions with the conference participants based on the categorization of the submitted questions.
Abstract:
Public safety access points (PSAP), such as 911 and e911 service providers, are often overwhelmed with information coming from a number of callers. As part of an initial assessment, a determination is often made as to whether two or more callers are calling about the same emergent event. If two or more callers are calling about the same emergent event, the callers and PSAP may interact at the same time but differently, such as different content or different media types. As a benefit, on-site activities may be coordinated in a manner that helps reduce the demands on PSAP resources and helps to facilitate a more accurate and appropriate response to the emergent event.