Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller to retrieve a targeted party telephone number, retrieve a telephone number assigned to the communication device, submit to a system at least a portion of the targeted party telephone number and at least a portion of the telephone number assigned to the communication device, receive from the system information indicating a dialing format for the targeted party telephone number, and initiate communications according to the information supplied by the system. Other embodiments are disclosed.
Abstract:
A method and apparatus for improving identification of a party in a communication transaction is disclosed. An apparatus that incorporates teachings of the present disclosure may include, for example, a terminal device having a User Interface (UI) element that presents an image identifier that identifies one among a calling party in at least one among an unanswered call and a voicemail message, and a called party in a dialed call. Additional embodiments are disclosed.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a system having a controller to receive from a first communication device (CD) a telephone number of a second CD, submit a verification code to the second CD, submit a request to the first CD for the verification code, receive the verification code from the first CD, provide the first CD access to update in whole or in part a second contact book of the second CD stored in a contact book account, receive from the first CD one or more entries of a first contact book of the first CD, merge the one or more entries of the first contact book with one or more entries of the second contact book, thereby generating an updated second contact book, and store the updated second contact book in the contact book account. Additional embodiments are disclosed.
Abstract:
Example methods, apparatus and articles of manufacture to determine authorization levels in a virtual private network are disclosed. A disclosed example method includes determining whether a call originated from an originating station associated with a virtual private network, the call originating via a private branch exchange associated with the virtual private network by a first user of a plurality of users associated with the virtual private network, querying a private-number table based on at least one of a switch identifier representing a service switching point, a trunk group identifier representing the private branch exchange, or an originating station identifier representing the originating station to obtain a private number assigned to the first user, and providing an authorization level associated with the private number to the service switching point, the service switching point to process the call according to the authorization level.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller to present a plurality of selectable commodity items, detect one or more selections from the plurality of commodity items, generate a list from the one or more commodity items selected, and transmit the list to a system. The system can be adapted to receive the list from the communication device, determine a selection order for the items in the list based on a location of each item in a store and at least one characteristic of at least one of the items, update the list according to the selection order, and transmit the updated list to a device for conducting commodity shopping according to the adjusted list. Other embodiments are disclosed.
Abstract:
Example methods, apparatus and articles of manufacture to determine authorization levels in a virtual private network are disclosed. A disclosed example method includes determining whether a call originated from an originating station associated with a virtual private network, the call originating via a private branch exchange associated with the virtual private network by a first user of a plurality of users associated with the virtual private network, querying a private-number table based on at least one of a switch identifier representing a service switching point, a trunk group identifier representing the private branch exchange, or an originating station identifier representing the originating station to obtain a private number assigned to the first user, and providing an authorization level associated with the private number to the service switching point, the service switching point to process the call according to the authorization level.
Abstract:
A system and method are disclosed for determining independent authorization levels. A system that incorporates teachings of the present disclosure may include, for example, a controlling element that manages operations of a virtual private network. The controlling element manages operations of a virtual private network (VPN) by validating that a call belongs to an ISDN access type of the VPN, retrieving from a look-up table a private number associated with a switch identifier, a trunk group identifier, and an Originating Station Number (OSN) corresponding to the call in response to determining that the call belongs to the ISDN access type of the VPN, and identifying a first authorization level associated with the private number. Additional embodiments are disclosed.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a set-top box having a controller to present media content at a presentation device as directed by a user, monitor the media content consumed by the user, detect a first behavioral pattern based on the media content consumed by the user, transmit the detected first behavioral pattern to a communication device of the user, receive from the communication device a second behavioral pattern, and identify media content correlating to the second behavioral pattern. The communication device can be adapted to adjust communication operations according to the detected first behavioral pattern. Other embodiments are disclosed.
Abstract:
A system and method are disclosed for determining independent authorization levels. A system that incorporates teachings of the present disclosure may include, for example, a controlling element that manages operations of a virtual private network. The controlling element manages operations of a virtual private network (VPN) by validating that a call belongs to an ISDN access type of the VPN, retrieving from a look-up table a private number associated with a switch identifier, a trunk group identifier, and an Originating Station Number (OSN) corresponding to the call in response to determining that the call belongs to the ISDN access type of the VPN, and identifying a first authorization level associated with the private number. Additional embodiments are disclosed.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller to retrieve from an address book a communication identifier for each of a plurality of participants, determine from the address book a conferencing type for each of the plurality of participants, and initiate according to the conference type and the communication identifier of each participant a Voice over Internet Protocol conference call directed to communication devices of the plurality of participants. Other embodiments are disclosed.