摘要:
Concepts and technologies are described herein for a mechanism by which participants who have been invited to attend a conference event and who are physically present within a conference event environment, such as a meeting room, can provide authentication credentials to join the conference event via a conference event environment system. When an individual attempts to join a conference event via a conference event environment system, the individual is prompted to provide his or her authentication credentials to join the conference event via the conference event environment system to participate in the conference event. The conference event environment system may inherit the individual's permissions, such as in regards to whether or not the individual has been permitted to present content during the conference event. A conference event roster may be used to indicate that the individual has joined the conference via the conference event environment system.
摘要:
A system and method for carrying out network and interface selections across multiple media is disclosed. The disclosed system facilitates automated network interface configuration decision-making that spans a set of networks supporting communications via differing media. A set of media specific modules associated with differing communications media acquire network interface status/capabilities information. A rules engine thereafter applies a designated network selection rule(s) to the acquired network interface status/capabilities information, and any other appropriate parameters attributable to either an interface or network, to select one or more networks and interfaces with which to establish/maintain a connection.
摘要:
Multiple peripheral devices are used for various modes of communication in a unified communication application. Employing standard or custom protocols, connected peripheral devices can be configured automatically and different modes of communication such as audio, video, data, and text, are routed to available or selected peripheral devices. Incoming communication requests can be extended to multiple peripheral devices synchronously and users enabled to switch between peripheral devices seamlessly during a communication session.
摘要:
Aspects of the present invention are directed at allowing users to establish a multimedia network session in which each user is allowed to employ multiple computing devices to exchange data. In this regard, a method is provided for collecting control information from at least two local computing devices associated with the first user that will participate in the network session. Then, an invitation message with the collected control information is sent to a computing device associated with a second user. In response, control information collected from one or more computing devices associated with the second user are obtained. The obtained control information is distributed to the appropriate local computing devices associated with the first user. As a result of exchanging control information in this way, a multimedia network session that allows users to employ a plurality of computing devices may be established.
摘要:
A determination to enable echo cancellation is made in advance of a real-time communication session. A model sample audio file stored in memory on the computer system is played through a loudspeaker connected with the computer system. The sound generated by the loudspeaker is captured by a microphone connected with the computer system to create a captured audio signal. The captured audio signal is correlated with the sample audio signal to determine the presence of any echo effect in the captured audio signal. Characteristics of any echo in the captured audio signal, for example, frequency, delay, and gain, are parameterized and stored as initial values for use by the echo cancellation algorithm. The stored parameters are used by the echo cancellation algorithm at the initiation of a communication session until the algorithm receives enough real-time information to make any necessary ongoing adjustments.
摘要:
Devices connected with a computer system are interrogated to detect whether they are configured and functioning. In an audio device implementation, a known audio sample is output to a loudspeaker. If the loudspeaker is properly configured and functional, an attached microphone will capture the sound corresponding to the audio sample generated by the loudspeaker. If sound corresponding to the audio sample is detected, an indication is provided to the user that the microphone and loudspeaker are operational. If no sound corresponding to the audio sample is detected, an indication is provided to the user that the loudspeaker is not enabled and additional configuration is required.
摘要:
To reduce the power consumption of a wireless communication hardware device, power conservation scheduling algorithms can be implemented. Reoccurring events, including DTIM intervals and listen intervals can be scheduled as awake times. Similarly expected response intervals can be scheduled as awake times based on information, such as round trip time, that can be passed together with data to be transmitted. The wireless communication hardware device can be placed into a doze state unless it is transmitting data, or unless it is expecting a transmission during one of the scheduled awake times.
摘要:
A system and method for facilitating automatic detection of a type of wireless network is provided. In accordance with an aspect of the present invention, wireless network client(s) can automatically detect the “type” of a network (e.g., method of authentication and encryption) without requiring input from the user. For example, unencrypted network, WEP encrypted network requiring a WEP key, WPA encrypted network requiring a pre-shared key, an IEEE 802.1x enabled network supporting WPA and/or an IEEE 802.1x enabled network not supporting WPA. In accordance with an aspect of the present invention, a wireless network detection system having a connection component and a detection component is provided. The connection component facilitates connection of a client system to at least one of a plurality of wireless networks. The detection component identities a type of an available wireless network. Identification can be based, for example, upon information received in an information element and/or iterative probing of the wireless network beacon.
摘要:
Concepts and technologies are described herein for a mechanism by which participants who have been invited to attend a conference event and who are physically present within a conference event environment, such as a meeting room, can provide authentication credentials to join the conference event via a conference event environment system. When an individual attempts to join a conference event via a conference event environment system, the individual is prompted to provide his or her authentication credentials to join the conference event via the conference event environment system to participate in the conference event. The conference event environment system may inherit the individual's permissions, such as in regards to whether or not the individual has been permitted to present content during the conference event. A conference event roster may be used to indicate that the individual has joined the conference via the conference event environment system.
摘要:
An event computer receives video in which one or more local participants of a conferencing event are viewable. The event computer receives head detection information of the local participants and assigns contextual data to the head detection information for each of the local participants for which head detection information is received. The event computer then sends the video, the head detection information, and the contextual data to one or more remote participant computer systems by which one or more remote participants can view the local participants and their corresponding contextual data within the video.