Abstract:
Embodiments of the present invention are directed to a communication system that provides various automated operations, including searches of public and private resources for third party information and presentation of the located third party information by a mashup and preparation of a mashup to combine different communication modes or modes in a common session.
Abstract:
Embodiments of the present invention are directed to a communication system that provides various automated operations, including searches of public and private resources for third party information and presentation of the located third party information by a mashup and preparation of a mashup to combine different communication modes or modes in a common session.
Abstract:
A camera can be associated with each conference participant endpoint. The camera, either frame or video-based, can monitor and detect one or more of gestures, facial recognition, emotions, and movements of the conference participant. Based on the detection of one or more of these triggering events, a correlation to an action corresponding the triggering event can be evoked. For example, if a participant raises their hand, e.g., a triggering event, the system can recognize that this is a request to speak. The participant can then be queued in the system based, for example, relative to other participants' requests. When the other participants have finished speaking, and it is the time for the user who raised their hand to speak, the system can optionally queue the user by modifying the endpoint with which they are associated.
Abstract:
A visual and/or audible beacon is provided by an access device or an external device to assist emergency response personnel to locate the person that initiated the emergency call. A communication server that handled the emergency call can cause lights on the access device to blink in a specified pattern, so that emergency personnel may more easily locate the access device that was used to place the emergency call. The communication server can also cause the access device to output a series of audible tones that may be used to locate the access device that was used to place the emergency call. Emergency response personnel may control the audible/visual beacon through the communication server to cause the beacon to be selectively activated or deactivated as necessary. Optionally the beacon may be turned off from the access device as well.
Abstract:
Methods and apparatus are disclosed for dynamically selecting the number of audio channels to mix per listener in an audio processor, such as a server-based three-dimensional audio mixer, as a function of any reasonable measurement of the load on the audio processor.
Abstract:
MP-BGP VPN infrastructure based on IETF RFC 4364/2547 is used to configure a layer 2 VPN on an IP network. VRFs for the VPN are configured on Ethernet switches and service IP addresses are associated with each configured VRF. The service IP addresses are exchanged to enable VPN traffic to be encapsulated for transport over the IP network. To enable a L2 VPN to be established, a VPN-VLAN ID will be configured for the L2 VPN and import/export route targets for the VPN-VLAN will be set in each VRF and UNI-VLAN included in the VPN. The VPN-VLAN will be announced to all PEs using MP-iBGP with export route targets set for this VPN-VLAN. Once the VPN-VLAN is learned on a logical port, the PE will perform MAC learning on that logical port and treat the logical port as part of the L2 VLAN.
Abstract:
PRIVACIDADE APRIMORADA E CONTROLE DE AGENTE EM UMA SESSÃO DE CONAVEGAÇÃO As modalidades descritas no presente documento fornecem sistemas e um método para implantar controle de privacidade em um ambiente de conavegação. Em uma modalidade particular, um método fornece receber uma instrução em um servidor de conavegação para iniciar uma sessão de conavegação para um site da web com um primeiro cliente e um segundo cliente. O método fornece, ainda, receber primeiras configurações de privacidade do primeiro cliente, em que as primeiras configurações de privacidade indicam como o site da web deve ser apresentado no segundo cliente. O método fornece também apresentar o site da web no primeiro cliente e apresentar o site da web no segundo cliente com base nas primeiras configurações de privacidade.
Abstract:
MANIPULAÇÃO DE FALHA DE PLANO DE CONTROLE SEM FIO EM UM EMPREGO EM PLANO DIVIDIDO Um método, aparelho e produto de programa de computador para a provisão de uma manipulação de recuperação após uma falha de plano de controle sem fio em um emprego de plano dividido são apresentados. Um primeiro AP em um emprego de plano dividido detecta uma falha de um dispositivo de plano de controle sem fio (WCP) . O primeiro AP oculta uma SSID em sinais de orientação difundidos pelo primeiro AP. o primeiro AP armazena uma informação para unidades móveis (MUs) existentes que se desassociam após a detecção da falha do WCP. O primeiro AP responderá a sondas de MUs existentes; e, também, responderá a sondas de MUs que tenham sua informação armazenada no AP, de modo que o primeiro AP pareça oculto de novas MUs enquanto é exposto para as MUs existentes.
Abstract:
Verfahren, umfassend:Empfang, durch einen Prozessor, einer Anforderung eines ersten Anwenders,eine zweite Kommunikationssitzung mit einem zweiten Anwender einzurichten, wobei die Anforderung eine Höchstdauer der zweiten Kommunikationssitzung spezifiziert; undErmittlung, ob die Anforderung auf der Basis dieser Höchstdauer und auf der Basis von Anwesenheitsinformationen über den zweiten Anwender erfüllt werden soll, wobei die Ermittlung, ob die Anforderung erfüllt werden soll, auch auf einem Kalendereintrag einer ersten Kommunikationssitzung basiert, der eine erste Endzeit der ersten Kommunikationssitzung umfasst, wobei die erste Endzeit des Kalendereintrags der ersten Kommunikationssitzung basierend darauf, dass der zweite Anwender die erste Kommunikationssitzung vor der ersten Endzeit beendet, in eine zweite Endzeit umgewandelt wird, und wobei die Anforderung basierend auf der umgewandelten zweiten Endzeit erfüllt wird.
Abstract:
A process for updating a second agent about a call in a contact center comprises receiving a call at the contact center and connecting the call to a device associated with a first agent of the contact center. A processor is used to configure a list of keywords to detect during the call, and when a key word is detected (e.g., using a speech analyzer), a snippet of the call based on the detected keywords is identified. The snippets are presented to a second agent through a device associated with the second agent. The call is then connected to the device associated with the second agent.