Abstract:
The invention relates to an apparatus and method for improving AC coupling between adjacent signal traces and between plane splits and signals spanning plane splits on circuit boards. A circuit board includes adjacent conductive means and an oxide means interposed there between. The oxide means is a copper oxide, e.g., cupric or cuprous oxide. In one embodiment, the adjacent conductive means are adjacent voltage reference planes with a split interposed between the conductive means. The copper oxide fills the split. In another embodiment, the adjacent conductive means are differential signal traces. The copper oxide fills a gap between the differential signal traces. The copper oxide is a non-conductive material with an increased dielectric constant as compared to other common dielectric materials used as fillers. The increased dielectric constant increases capacitance, in turn, increasing AC coupling.
Abstract:
The bicycle with security features includes a frame, a cable lock, a pedal lock, a motion alarm, a GPS tracker, a solar cell array, a smart phone interface, a battery, and a battery charger. The frame may house anti-theft and rider safety features. The cable lock and the pedal lock may prevent a bicycle from being moved by thieves. The motion alarm may produce an alert if the bicycle is disturbed. The GPS tracker may determine and report the location of the bicycle. The anti-theft and rider safety features may be controlled from a smart phone.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for selectively transcribing messages. Five general approaches are disclosed herein. The first approach is directed to checking for a transcription capable client, which transcribes messages when a client device is capable of receiving transcriptions. The second and third approaches are platform-controlled and user-controlled predefined selective transcription. One aspect of this approach is driven by transcription rules. The fourth approach is user-controlled on-demand selective transcription before the message is stored or deposited for transcription. An example of this is a user transferring an incoming caller to voicemail and indicating that the voicemail be transcribed. The fifth approach is user-controlled on-demand selective transcription after the message is stored. In one embodiment of this approach, a user must specifically request that a stored message be transcribed.
Abstract:
An example method includes performing a telephone number database query at a call session control function server to obtain a first uniform resource identifier for a destination and to obtain a second uniform resource identifier for the destination, establishing a first communication session to the destination based on the first uniform resource identifier, and initiating a second communication session on behalf of a calling device to the destination based on the second uniform resource identifier, the destination to provide content associated with the first communication session via the second communication session.
Abstract:
In one embodiment, the present disclosure is a method and apparatus for dynamically controlling Internet Protocol packet flows in a Voice over Internet Protocol network. In one embodiment, a method for controlling flows of packets in a network includes obtaining a list identifying at least one user element that is authorized to register with the network and dynamically configuring a manner in which at least one border element handles the packets in accordance with the list.
Abstract:
Methods and apparatus to route emergency communication sessions are disclosed. An example method involves querying a gateway node cache in response to a first broadcast probe received at a node of a wireless Internet-based network. When the gateway node cache identifies a first gateway node, a first response is selectively sent to nodes that participated in a search flood associated with the first broadcast probe.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, receiving from a first communication device a message and a message request at a messaging server, selecting a second communication device from a group of other communication devices, providing a notification of the message to the second communication device, providing a message to the second communication device when the second communication device transmits an access request to the messaging server in response to the notification, and establishing a communication session between the first and second communication devices using the messaging server when the second communication device transmits a session request to the messaging server in response to receiving the message. Other embodiments are disclosed.
Abstract:
Systems and methods to monitor and analyze customer premises equipment downtime in a Voice over Internet Protocol service network are disclosed. Example methods for a dynamic host configuration protocol server disclosed herein include assigning a replacement Internet protocol address to a residential gateway, the replacement Internet protocol address to replace a first Internet protocol address assigned to at least one of the residential gateway or customer premises equipment associated with the residential gateway, sending a first address change message to a session border controller, and sending a second address change message to a lost subscriber time server, the first and second address change messages to indicate that the first Internet protocol address has been replaced by the replacement Internet protocol address.
Abstract:
A user is identified based at least in part on a user identification designation associated with an incoming communication. A message recipient is then determined based at least in part on the identified user and one or more address books associated with message recipients by comparing the user identification designation to one or more entries in the one or more recipient databases. The incoming communication is routed to the determined message recipient. Escalation procedures are implemented up to a configured level in the recipient organization based on various criteria. As messages are escalated and deposited in mailboxes associated with the determined message recipients, the determined message recipients are notified of the deposited messages.