摘要:
A method for automatically identifying wireless signal quality of a region includes receiving signal quality information associated with wireless signals received by each of a plurality of mobile endpoints and receiving location information identifying locations of each of the plurality of mobile endpoints. The method also includes, based on the received signal quality information and the received location information, identifying a first region of an area, the first region having a first signal quality.
摘要:
A system includes a first interface to connect with a network, and a second interface to connect with a telephone device of an enterprise. A unit controls a connection between the first and second interfaces for an outgoing call from the telephone device to a remote telephone device connected to the network. A processor subsystem coupled with the unit operates to initiate communications with a telephone device associated with a supervisor having authority to allow or deny the call. The processor subsystem also operates too present the supervisor with information that includes a purpose or reason for the outgoing call. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure.
摘要:
In one embodiment, a conference bridge receives a call initiated by a first caller endpoint. The conference bridge identifies a conference to which the call requests entry and determines whether the conference bridge has available resources to process the call. The conference bridge enables the call to join the conference via a second conference bridge associated with a second caller endpoint participating in the conference according to whether the conference bridge has available resources to process the call.
摘要:
In one embodiment, providing an endpoint access to a locked target includes receiving a virtual key at a grantee endpoint through a wireless link. The virtual key results from a permission from a grantor endpoint, and is operable to unlock a physical lock of the target. The virtual key is wirelessly transmitted to a management system of the target to unlock the lock.
摘要:
In an example embodiment, an automatic warning system that warns users of personal mobile devices (such as cellular telephones and portable music players) when they enter or are near the threshold of a hazardous area while using their mobile device. In an example embodiment, the mobile device is automatically paused upon entering a street and resumes when the user has crossed the street. In a cellular telephone embodiment, calls are automatically put on hold upon entering the hazardous area, optionally the other parties to the call are informed of the reason for the hold, and the call is automatically resumed when all parties have left the hazardous area.
摘要:
In one embodiment, a conference with multiple end points is provided. At the locations, multiple screens may be configured to display video from a portion of the multiple end points. Video from multiple locations is output onto the multiple screens, such as video streams from N different segments are output on N different screens. The video output may be determined based on a first dimension of the floor control algorithm. A push-to-talk input may then be received from a button. A video segment associated with the push-to-talk button is then determined and the video segment is output on one of the multiple screens in response to receiving the push-to-talk input. The push-to-talk input may be used by users that cannot actively participate in the first dimension of the floor control algorithm. For example, users using sign language cannot speak louder and thus by using the push to talk button or hand gestures can indicate their desire to be switched in as one of the displayed segments.
摘要:
A method includes determining a coverage area for each of a plurality of base stations. The method also includes receiving a first location parameter indicative of a mobile unit's location. The method further includes transitioning a first connection between the mobile unit and a first base station of the plurality of base stations to a second connection between the mobile unit and a second base station of the plurality of base stations. The transition is based on the coverage areas of the first base station and the second base station and the first location parameter.
摘要:
In one embodiment, a method includes scanning, by an automated tool, a set of application programs and/or systems associated with a user, the set including one or more action items calendared in a relevant time period that includes one or more days when the user intends to be out of the office. The one or more action items are then presented to the user via a user interface. Responsive to input received, each of one or more delegates correspondingly assigned to the one or more action items is automatically notified of the assignment. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure.
摘要:
A method and an apparatus for inserting an included message into an e-mail message, wherein the e-mail message is transferred through a unified messaging solution have been provided. In one embodiment, the unified messaging solution detects transmission of a voice mail message as the e-mail attachment. The voice mail message is received by a system that facilitates the transfer of the e-mail message. The system associates the included message with the voice mail message. The included message is inserted into the e-mail message. The system sends the e-mail message along with the included message and the attached voice mail message to an intended user. In a preferred embodiment, the included message is an advertising message.
摘要:
In one embodiment, a method includes establishing a call, and continuously monitoring the call from or using a first endpoint associated with the call. Monitoring the call includes identifying when an information element associated with the call has changed. The method also includes determining when the information associated with the call has changed, and storing a representation of the information element in an enhanced directory arrangement associated with the first endpoint when the information associated with the call has changed.