Abstract:
A request to establish a communication session is received. A clone of a communication system object with configuration information is produced and associated with a session identifier for the communication session. The session identifier for the communication session is sent to a client. When an administrator wants to make updates to re-bootable parameter(s) in the configuration information, the re-bootable parameter(s) are updated in the clone of the communication system object based on the session identifier. A message to save the session information with the session identifier is received. In response to receiving the save session information message, the clone with the updates to the re-bootable parameter(s) is sent to the communication system. This results in the communication system rebooting. By updating multiple re-bootable parameters in the clone of the communication system, a single reboot will occur. This reduces the total number of reboots that would have occurred previously.
Abstract:
A concept of Session Description Protocol (SDP) templates and a concept of template modifiers for precise control of media types, codecs and attributes offered by a media server are described along with various methods and mechanisms for administering the same. Applications can solicit offers from media servers that precisely meet the requirements of each session, using one or more media control protocols. The media control protocols may enable applications to reserve media resources, invoke specific functions, respond to events during session initiation, and provide session modification.
Abstract:
To determine the correct media stream to latch onto, the system and method uses a hashing algorithm to uniquely identify a legitimate media stream. A first invite message is received at a Session Border Controller (SBC) to establish a communication session. For example a Session Initiation Protocol (SIP) INVITE is received. The first invite message comprises a first hash of a fingerprint. For example, the hash may be a hashed session key. A media message is received that contains the fingerprint to establish a media stream for the communication session. A second hash is created using the fingerprint in the media message. The first hash is compared to the second hash. In response to the first hash matching the second hash, a Network Address Translator (NAT) latches to an address and/or a port in the media message. Thus, the correct media stream is associated with the communication session.
Abstract:
Providing data resource services within enterprise systems for resource level sharing among multiple applications, and related methods, systems, and computer-readable media are disclosed. In one embodiment, a method for providing a data resource service within an enterprise system is provided. The method includes receiving a user data request from a web application having application logic located outside of an enterprise system to access user data stored in memory within the enterprise system. The method further includes accessing the user data stored in the memory within the enterprise system in response to the user data request from the web application. The method also includes providing access to the user data stored in the memory within the enterprise system to the web application in response to the user data request.
Abstract:
Conferencing applications run a variety of devices, including portable devices, such as smart phones, laptop computers, and tablet computers. A source device may be taking a high-resolution video to provide the video as a conference portion of a conference being viewed by a number of devices. The number of devices displaying the conference may only be displaying the conference portion as a thumbnail image, or other low-data image, or not be currently displaying the conference portion at all. The number of devices viewing the conference may then signal back to the source device to downgrade/terminate the capturing and/or transmission of the video. The source device then provides the video or other conference portion in a data-thrifty format more closely matching the conference portion as it is being displayed on the number of devices.
Abstract:
Components of a telephone system often do not evolve in lock-step with other system improvements. For a variety of reasons, a component in a system may be operational to enable telephone calls utilizing a particular dialing format but be inoperable for calls utilizing a different format. Telephone number formats were initially numeric. The number of digits and format of the digits was often determined based on a country-specific dialing plan. Many countries have moved to more digits or alphanumeric formats (e.g., URIs). By capturing these enhanced addresses and generating an associated unique identifier, internal networks may utilize legacy numbering systems internally and, once the call reaches an edge device, route them based upon the enhanced address.
Abstract:
When a communication session is established, display information is sent to a first window of a communication application. The first window of the communication application displays current status information for the live communication session. For example, the first window may include a mute status (e.g., that the call is currently muted by the user) and call time. When the display of the communication application is switched to a second window that covers the first window, display information for a call dart is sent that displays current status information for the first live communication session over a portion of the second window. For example, the call dart may be a small thumbnail or banner that allows the user to view the current status of the live communication session, such as the mute status of the live communication session and the current duration of the live communication session.
Abstract:
The concept of a centralized communication log is provided. Anchor points, and specifically Session Initiation Protocol (SIP) anchor points, serve as a media and call control point that is established on a per-user basis which can then be leveraged by a communication log application. Such a communication log application is able to determine accurate and real-time communicant information for a communication session and populate a centralized communication log with the same. Such a communication log is, therefore, accurate with respect to multiple users in a system, highly available, and scaled horizontally.
Abstract:
A queueless contact center is described along with various methods and mechanisms for administering the same. The contact center proposed herein provides the ability to, among other things, achieve true one-to-one matching. Solutions are also provided for managing data structures utilized by the queueless contact center. Furthermore, mechanisms for generating traditional queue-based performance views and metrics for the queueless contact center are proposed to help facilitate a smooth transition from traditional queue-based contact centers to the next generation contact centers described herein.
Abstract:
Methods, systems and computer readable media for efficient state change support for hierarchical data models in a virtualized system are described. In some implementations, the method can include determining a system status including a system-level bit masked word having a plurality of bits, each bit corresponding to a status of a different hierarchical level of the system, and receiving a change notification. The method can also include querying an entity at a lower hierarchy level if a cascaded state change is identified for that entity. The method can further include continuing to query one or more entities in successively lower hierarchy levels so long as a cascaded state change is identified for a corresponding entity in a lower hierarchy level. The method can also include determining the current status for one or more entities having a changed status. Identifying a cascaded state change can include performing a logical exclusive OR operation on a previous status bit masked word and a current status bit masked word of an entity.