摘要:
Disclosed are conferencing systems, devices, architectures, and methods for implementing a trigger-based conferencing system to facilitate increased productivity meeting participation. An exemplary method, in accordance with embodiments, of managing a workflow application in a conference, where the conference includes a plurality of events, can include: (i) creating a trigger by defining a predicate and action for the trigger; (ii) registering the trigger to at least one of a plurality of detection points; (iii) evaluating the trigger's predicate each time any of the detection points against which it is registered are encountered; and (iv) executing actions associated with the trigger if the predicate evaluation is positive, where execution of the actions can result in a state change in the conference.
摘要:
In one embodiment, a Media Analysis and Delivery System obtains a set of media delivery rules, wherein the set of media delivery rules includes one or more triggers, each of the triggers identifying a topic of interest. The Media Analysis and Delivery System examines a media stream for at least one of the one or more triggers in accordance with the set of media delivery rules. The Media Analysis and Delivery System provides at least a portion of the media stream in response to at least one of the triggers in accordance with at least one of the set of media delivery rules.
摘要:
In one embodiment, a Media Analysis and Delivery System obtains a set of media delivery rules, wherein the set of media delivery rules includes one or more triggers, each of the triggers identifying a topic of interest. The Media Analysis and Delivery System examines a media stream for at least one of the one or more triggers in accordance with the set of media delivery rules. The Media Analysis and Delivery System provides at least a portion of the media stream in response to at least one of the triggers in accordance with at least one of the set of media delivery rules.
摘要:
A conferencing system includes a mixer operable to process audio and video packets received from a plurality of endpoint devices, and to transmit a processed audio/video stream back to the endpoint devices. A server connects with the mixer and the endpoint devices. The server is operable to send a first transmission to a first endpoint device that causes the first endpoint device to stop transmitting video packets to the mixer. The server is further operable to send a second transmission to a second endpoint device that causes the second endpoint to start transmitting video packets to the mixer. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
摘要:
A network optimization device may receive a stream of data and identify a selected compression dictionary from among a number of compression dictionaries based on the received stream of data. A receiving network device may be notified regarding the selected compression dictionary. The stream of data may be compressed using the selected compression dictionary and transmitted to the receiving device.
摘要:
A device may receive a packet at a network device, and may retrieve from a table, by using information in a header of the packet as keys, records that include communication performance statistics associated with transport protocols. In addition, the device may select, based on the records, a transport protocol with an optimum communication performance statistics among the transport protocols and send the packet in accordance with the selected transport protocol from the network device.
摘要:
In one embodiment, a first network device receives a control message in a first protocol from a client, the control message in the first protocol being addressed to a second network device. The first network device identifies an existing connection in a second protocol that is associated with the second network device. The first network device establishes a connection in the first protocol with the client according to a status of the existing connection in the second protocol that is associated with the second network device.
摘要:
In one embodiment, a method includes automatically detecting occurrence of an event at an endpoint that suggests checking whether a public safety answering point (PSAP) currently associated with the endpoint is correctly associated with the endpoint. The method further includes, in response to the occurrence of the event, automatically prompting through the endpoint a user to provide input indicating whether data identifying a current location of the endpoint is correct. The method further includes receiving input from the user through the endpoint indicating whether the data is correct and, if the input from the user indicates that the data is not correct, automatically initiating an update of the data to correctly identify the current location of the endpoint.
摘要:
A network device is configured to monitor a data size of data transmitted to a particular destination during a particular time period, determine, based on the monitored data size, an average data size for the particular destination and for the particular time period, establish a data connection toward the particular destination during the particular time period, set an initial data size for the data connection based on the average data size, and transmit data on the data connection in an amount equal to the initial data size.
摘要:
A Real-Time Protocol (RTP) source node of a network operates to send a first data packet of a first size to a destination node over a path of the network that includes a plurality of intermediate nodes, at least one of the intermediate nodes having a maximum transmission unit (MTU) size smaller than the first size such that fragmentation of the first data packet occurs. The destination node sends back to the source node a RTCP report that includes a number of fragments received and a largest minimum data packet size. In response, the source node sends subsequent data packets having a second size less than or equal to the largest data packet size of the fragments. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.