Abstract:
An apparatus and method for improving performance in high-availability systems are disclosed. In accordance with the illustrative embodiment, pages of memory of a primary system that are to be shadowed are initially copied to a backup system's memory, as well as to a cache in the primary system. A duplication manager process maintains the cache in an intelligent manner that significantly reduces the overhead required to keep the backup system in sync with the primary system, as well as the cache size needed to achieve a given level of performance. Advantageously, the duplication manager is executed on a different processor core than the application process executing transactions, further improving performance.
Abstract:
A device, system, and method gives temporary control of a user device using location based grants. The method performed by a control server of a third party is performed when the user device is in a predetermined area. The method includes transmitting authentication data to the user device, the authentication data configured to authenticate the third party to the user device, the predetermined area being associated with the third party. The method includes receiving a request from the user device for command data, the command data configured to be executed on the user device to provide the third party with a limited control over the user device while the user device remains in the predetermined area. The method includes transmitting the command data to the user device.
Abstract:
Conferences are a popular way to hold meetings and presentations when the participants are not required to be physically together. However, the quality of a conference can vary based on a particular user's endpoint configuration, connection, network, conference content, and other factors. Providing a user with the ability to indicate a quality issue, as determined by the user, allows other users and systems to become aware that a user is experiencing quality issues and optionally take action to correct the issue.
Abstract:
Techniques for efficiently allocating ports and bandwidth in a communication system configured to establish interactive, real time communication sessions between endpoints are described. Requests are received at a server, from a requester endpoint device, to initiate an interactive, real time communication voice and/or video session requiring access to an interactive session resource. In an embodiment, the communication system is a contact center and the interactive session resource is an available contact center agent. Pending availability of the interactive session resource, a requester is assigned a place in a queue or otherwise scheduled to receive access to the interactive session resource. In the meantime, a data channel is established between the server and the requester's endpoint device. Resources, which can include an executable program and/or information operative to enable the endpoint device to emulate an active on-hold voice connection period, are downloaded to the endpoint device.
Abstract:
Embodiments disclosed herein provide systems and methods for selectively recording high quality media in a videoconference. In a particular embodiment, a method provides receiving a plurality of video streams from a plurality of videoconferencing clients. The method further provides streaming video at a first quality level for the plurality of video streams to a first videoconferencing client of the plurality of video conferencing clients. At a first point in time while streaming the video, the method provides identifying a first video stream of the plurality of video streams that should be recorded at a higher quality level than the first quality level and recording the first video stream at the higher quality level from the first point in time.
Abstract:
A Public Safety Access Point (PSAP) or other system can receive an emergency event. Based on information associated with the emergency event, the PSAP can determine which emergency vehicle can respond to the event. The PSAP may then determine an origination point, a destination, and a route that will be used by the emergency vehicle. The route information may then be communicated to a map server, one or more vehicles that may be affected by the route of the emergency vehicle, and/or other systems, devices, and/or computer systems. The map server, vehicles, etc. can then reroute or change a characteristic of a vehicle's travel to adjust for the travel and route of the emergency vehicles.
Abstract:
Embodiments disclosed herein provide systems, methods, and computer readable media for managing bandwidth based on audio power level. In a particular embodiment, a method provides, from a conference system, transferring at least one audio level criterion to a first user system in a communication session. At the conference system, when a level of first audio for the communication session satisfies the at least one audio level criterion at the first user system, the method provides receiving the first audio encoded using first audio codec parameters by the first user system. At the conference system, when the level of the first audio does not satisfy the at least one audio level criterion at the first user system, the method provides receiving the first audio encoded using second audio codec parameters by the first user system.
Abstract:
Techniques for aiding an email recipient in the management of inbound email by detecting, and configurably responding to, dynamically variable patterns of activity and behavior are described. Characteristics are extracted from new email messages originated by senders and intended for a recipient. One or more patterns of sender activity, recipient message management behavior, and/or message response behavior, relating to treatment of messages from individual senders and/or plural senders in the aggregate, are identified. The patterns are identified by analyzing statistics collected by the extraction of characteristics from email messages previously received by the recipient. Before the recipient reads a new email, a determination is made as to whether any deviation from an identified pattern exists; and, if so, a pre-existing rule for treatment of the new message is enforced and/or a new rule specifying treatment of at least some messages from the sender of the email is proposed.