Abstract:
A user is identified based at least in part on a user identification designation associated with an incoming communication. A message recipient is then determined based at least in part on the identified user and one or more address books associated with message recipients by comparing the user identification designation to one or more entries in the one or more recipient databases. The incoming communication is routed to the determined message recipient. Escalation procedures are implemented up to a configured level in the recipient organization based on various criteria. As messages are escalated and deposited in mailboxes associated with the determined message recipients, the determined message recipients are notified of the deposited messages.
Abstract:
Methods and an apparatus for selecting and pushing customized electronic media content are disclosed. An example method includes determining a first capability associated with a first device; determining a second capability associated with a second device; segmenting a piece of media into a first plurality of portions according to the first capability; when the second capability is different from the first capability, segmenting the piece of electronic media into a second plurality of portions according to the second capability, the second plurality of portions to be sized differently than the first plurality of portions; pushing a first one of the first plurality of portions to the first media device prior to the user requesting the first piece of electronic media; and pushing a first one of the second plurality of portion to the second media device prior to the user requesting the first piece of electronic media.
Abstract:
A mechanism controls global synchronization, or registration floods, that may result when a large number of endpoints in a Voice over Internet Protocol (VoIP) network such as an Internet Protocol Multimedia Subsystem (IMS) come online simultaneously after a catastrophic failure. The mechanism allows the Domain Name System (DNS) infrastructure to efficiently control the overload condition by registering user end points with backup border elements, and by staggering and by randomizing the time-to-live (TTL) parameter in registrations with backup border elements.
Abstract:
A system and method of delivering ringback audio content are disclosed. In one embodiment, the method includes receiving a connection request at an originating serving call session control function (S-CSCF) network element. The connection request indicates that a caller device has placed a call to a destination device associated with a ringback audio content service subscriber. The method also includes receiving a plurality of naming authority pointer (NAPTR) records at the originating S-CSCF network element from a telephone number mapping (ENUM) server. The NAPTR records include a plurality of ringback audio uniform resource indicators (URIs) associated with the destination device. The method also includes modifying the connection request to include the plurality of ringback audio URIs.
Abstract:
A mechanism controls global synchronization, or registration floods, that may result when a large number of endpoints in a Voice over Internet Protocol (VoIP) network such as an Internet Protocol Multimedia Subsystem (IMS) come online simultaneously after a catastrophic failure. The mechanism allows the Domain Name System (DNS) infrastructure to efficiently control the overload condition by registering user end points with backup border elements, and by staggering and by randomizing the time-to-live (TTL) parameter in registrations with backup border elements.
Abstract:
An apparatus having an agent that includes a processor and a memory coupled with the processor and communicates with at least one of a fault, configuration, accounting, performance, security module. The processor effectuates operations including determining that a service is operating properly. The processor further effectuates operations including if the service is operating properly and the service is disabled, enabling the service. The processor further effectuates operations including if the service is not operating properly, generating an alarm and if the service is enabled, disabling the service.
Abstract:
A secure payment method includes receiving, by a payment recipient, a transaction request from a party in a transaction. The payment recipient requests a payment that is in a specified form and that is uniquely identified by a unique identification. The method includes receiving, on behalf of the payment recipient and at a payment recipient computer, the payment that is in the specified form. The payment is uniquely identified by the unique identification. The payment recipient authorizes the transaction in response to receiving the payment that is in the specified form and that is uniquely identified by the unique identification. The specified form is issued by a private third party.
Abstract:
In one embodiment, the present invention is a method and apparatus for social networking in a dynamic environment. In one embodiment, a method for social networking in a network includes broadcasting a first set of one or more keywords representing one or more interests of a first user in the network, receiving a response from a second user in the network indicating interest in at least one of the interests of the first user, and connecting to a server in the network, where the server hosts a group for supporting communications between at least the first network user and the second network user.
Abstract:
A method and apparatus performing operations including instantiating at least one vENUM virtual machine instance, wherein the at least one vENUM virtual machine instance responds to a query by determining if at least one of a service and a record is operating; and when the at least one of a service and a record is operating, vENUM initiates an IMSI session for the at least one of a service and a record.
Abstract:
Methods and apparatus to select a dynamically peered voice over Internet protocol (VoIP) border element are disclosed. An example method comprises collecting data representative of a dynamic performance of a voice over Internet protocol network, prioritizing a selection of a peered border element based on the collected data, and modifying a telephone number mapping (ENUM) database based on the prioritized selection.