摘要:
A facility allows for automatic delegation of incoming real-time communications based on a delegation scheme. The delegation scheme may be rules-based and may be applied to a single real-time communication channel or multiple communication channels, including both real-time and non-real-time communication channels. The delegate information may include rules that indicate under what circumstances a communication should be rerouted, which delegate the communication should be rerouted to, and whether other associated actions should be taken in connection with the rerouting (or lack thereof). In some cases, the context of the incoming communication may play a role in how or whether a communication is rerouted to a delegate.
摘要:
A bootstrapping technique for wirelessly obtaining white space data that may be used to identify an available white space channel for connecting to a service. Portable wireless devices may collaborate to provide white space data to a device requesting such data. A requesting device transmits a request for the white space data using, for example, an unlicensed band. A device receiving the request may transmit a copy of the data to the requesting device. The transmitted copy may be obtained by the receiving device from a local data store or may be provided from a database server to which the receiving device is connected. In the later case the receiving device acts as a proxy between the database server and the requesting device. Once the white space data is received by the requesting device it may be used to select a channel for communication in the white space.
摘要:
The subject disclosure pertains to anonymous network interaction. More specifically, mechanisms are provided to ensure anonymity with respect network interaction such that third parties are unable to determine the source and/or intent of communications. Accordingly, entities can anonymize all outgoing and/or incoming data packets so as to mitigate outside entities from learning about information being sought and/or provided. For example, a user or corporation can employ an anonymizer with respect to web searching so that outside entities are not able to determine what information is attempted to be accessed and by whom.
摘要:
A system that can analyze a multi-dimensional input thereafter establishing a search query based upon extracted features from the input. In a particular example, an image can be used as an input to a search mechanism. Pattern recognition and image analysis can be applied to the image thereafter establishing a search query that corresponds to features extracted from the image input. The system can also facilitate indexing multi-dimensional searchable items thereby making them available to be retrieved as results to a search query. More particularly, the system can employ text analysis, pattern and/or speech recognition mechanisms to extract features from searchable items. These extracted features can be employed to index the searchable items.
摘要:
A single device that receives communications intended for a user having multiple contact addresses associated with different user roles is provided. The single device can receive communications intended for multiple telephone numbers, email aliases, screen names, aliases, other means of contact, or combinations thereof. Since a user engaged in a particular role might not desire to be interrupted with communications intended for a different role, the communications for the other roles can be maintained until the user is actively engaged in the role for which the communication was intended. In situations where there is an important communication sent to a non-active role, selective convergence between roles is initiated and the important communication is presented to the user.
摘要:
As incoming communications are received, a priority or significance level can be assigned to each communication. A communication determined to have a high priority can be presented to a user at substantially the same time as receiving the communication. A communication having a low priority can be placed in a low priority folder or flagged differently from a high priority communication (e.g., different color-coding). Behavior of a user as it relates to a received communication can be observed for learning purposes or to modify one or more classifications or priority levels.
摘要:
The system and method of the present invention provides peripheral awareness of information to a user. Once the information to be provided is determined or specified, it is automatically tracked or watched via at least one conventional communications interface for accessing one or more conventional communications sources. Current information is then automatically dynamically provided in an interactive peripheral display which minimizes any potential distraction to the user. The tickets are sharable among users, and may be copied, cut, pasted, saved, transmitted, dragged and dropped from web pages, etc., like any other electronic file using conventional techniques.
摘要:
Systems and methods are disclosed that facilitate identifying messages generated on a mobile device while the device is offline as requiring encryption, storing the messages in a message outbox with a flag indicating that encryption is required, and identifying recipients of the flagged messages to generate a recipient list. The recipient list can be piggybacked on a server synchronization request when the mobile device enters a period of online activity, and a server can return public keys associated with identified recipients to permit an encryption component, such as a secure/multipurpose Internet mail extension protocol (S/MIME) encryption component, in the mobile device to encrypt the messages.
摘要翻译:公开了系统和方法,其便于识别在设备离线时需要加密的在移动设备上生成的消息,将消息存储在具有指示需要加密的标志的消息发件箱中,以及识别标记消息的接收者以生成接收者 列表。 当移动设备进入在线活动期间时,收件人列表可以搭载在服务器同步请求上,并且服务器可以返回与标识的收件人相关联的公钥,以允许加密组件,例如安全/多用途因特网邮件扩展协议( S / MIME)加密组件,在移动设备中加密消息。
摘要:
An enhanced computer telephony integration system that facilitates the interaction and integration of a private branch exchange (PBX) with a client computer on a computer network. An enhanced telephony (ET) server connects to the PBX and to all running instances of an ET client on a user's computers. The ET server acts as a proxy between the ET clients and the PBX. The ET clients register with the ET server for a certain telephone extension. The ET server then can forward telephone action requests (such as placing a telephone call) from the registered ET clients to the PBX servicing the telephone extension. Moreover, the ET server can relay telephone events (such as an incoming call) from the PBX to all registered clients. The ET server facilitates seamless integration of telephone and personal computer features to provide a rich user-controlled computer-telephone integration for a user.
摘要:
A facility allows for automatic delegation of incoming real-time communications based on a delegation scheme. The delegation scheme may be rules-based and may be applied to a single real-time communication channel or multiple communication channels, including both real-time and non-real-time communication channels. The delegate information may include rules that indicate under what circumstances a communication should be rerouted, which delegate the communication should be rerouted to, and whether other associated actions should be taken in connection with the rerouting (or lack thereof). In some cases, the context of the incoming communication may play a role in how or whether a communication is rerouted to a delegate.