Abstract:
Methods and systems provided herein allow a communication session to be established on an optimal communication network and subsequently transferred to alternative networks if conditions dictate that such a change is necessary or desirable. The types of conditions which may be considered when identifying the optimal communication network or the alternative network include conditions related to the operation of a user device, communication profiles of the user, resources available on other networks, and the like.
Abstract:
It would be beneficial to allow one or more of information, applications, desktops, and in general any information to be shared between a computer and a communications device. For example, it would be useful to be able to move a presentation from a computer to a mobile communications device. Some solutions attempt to address this by requiring a user to load the information on a laptop, USB key, burn it to an optical disk or the like, and then "open" the information on another device located at the remote destination. In one embodiment, through the use of one or more of virtualization and content translation, any information and/or applications can be exchanged between a computer and a communications device. More specifically, one embodiment utilizes metadata in conjunction with a virtualization environment to allow the exchange of information and/or applications between a personal computer and a communications device, or vice versa.
Abstract:
A call control system is provided that can determine the location of a person. From the location of the person, the call control system can temporarily associate a different phone with the person. A bridge appearance may then be changed to include the temporary association such that calls from the different phone show the person as a party to the call. Further, a routing algorithm for routing calls to phones within an enterprise may then be temporarily modified to route calls to the different phone for the person. Thus, a person may travel through the facilities of the enterprise and have important calls routed to the person wherever they may be.
Abstract:
The present invention is directed to the use of a multi-tiered security architecture that includes vendor-operated global security services and policy servers able to exchange security events and mitigation measures.
Abstract:
A push model notification and access mechanism to "push" the contents of a voice, fax, e-mail or unified mailbox to a wireless device such as a cellular (24) where this information is locally cached and almost instantly displayed so that the user can interact with the mailbox content locally without the need to set up or maintain a network connection with a messaging service (20). The user may then send a command through the wireless device (24) to the server (20) to access particular items of the content list of the mailbox which is refreshed at every new message notification or after the mailbox has been accessed by the user using more traditional methods such as by telephone call.
Abstract:
An event that changes the security of a communication session between communication endpoints is determined. The event that changes the security of the communication session between the communication endpoints occurs after the communication session is established. For example, the event may be where a user has enabled a speakerphone. In response to determining the event that changes the security of the communication session between the communication endpoints, a message is sent to the communication endpoints that indicates a changed security level. The communication endpoints display the changed security level to the participants of the communication session. For example, the changed security level when the speakerphone is enabled may indicate that the communication session is now unsecure.
Abstract:
It would be beneficial to allow one or more of information, applications, desktops, and in general any information to be shared between a computer and a communications device. For example, it would be useful to be able to move a presentation from a computer to a mobile communications device. Some solutions attempt to address this by requiring a user to load the information on a laptop, USB key, burn it to an optical disk or the like, and then "open" the information on another device located at the remote destination. In one embodiment, through the use of one or more of virtualization and content translation, any information and/or applications can be exchanged between a computer and a communications device. More specifically, one embodiment utilizes metadata in conjunction with a virtualization environment to allow the exchange of information and/or applications between a personal computer and a communications device, or vice versa.
Abstract:
A call control system is provided that can determine the location of a person. From the location of the person, the call control system can temporarily associate a different phone with the person. A bridge appearance may then be changed to include the temporary association such that calls from the different phone show the person as a party to the call. Further, a routing algorithm for routing calls to phones within an enterprise may then be temporarily modified to route calls to the different phone for the person. Thus, a person may travel through the facilities of the enterprise and have important calls routed to the person wherever they may be.
Abstract:
A method is provided for detecting interactions between call-related and web- enabled features. In some embodiments, communication application components are configured to transmit an indication to a feature interaction detector every time a feature is invoked by the user. When the interaction detector receives an indication that a feature is being invoked, it compares the invoked feature against features that have previously been invoked (or executed) and determines whether the invoked feature interacts with any of the features that have been previously executed.
Abstract:
The present invention is directed to the use of a multi-tiered security architecture that includes vendor-operated global security services and policy servers able to exchange security events and mitigation measures.