Abstract:
A facility for integrating data in conversations is provided. In various embodiments, the facility sends a first message to a responding computing device to begin a conversation, receives a second message associated with the conversation from the responding computing device, determines whether the received message contains an indication of data that is to be associated with the conversation and, when the received message contains an indication of data that is to be associated with the conversation, renders the data. The facility can comprise an application server that receives from an initiator a first message associated with a conversation and responds to received messages, a conversation component that handles messages associated with the conversation, and an integration component that determines whether there is data that is to be associated with the conversation and, if so, adds an indication of the data to a second message that it sends to the initiator.
Abstract:
Policies are applied to specific data rather than to an entire computing device that contains the specific data. Access to the specific data is controlled by the policies utilizing various password or other authentication credential requirements, selective data caching, data transmission, temporary data storage, and/or pre-defined conditions under which the specific data is to be erased or rendered inaccessible. Policies may be defined by an administrator and pushed to a mobile computing device, whereat the policies are enforced.
Abstract:
Established multimodal conversations are enabled to be parked within an enhanced communication system such that a subscriber of the system can be notified through a variety of means and enabled to retrieve selected or all modalities for continuing the conversation. Different modalities may be parked together or separately. While waiting for the subscriber to retrieve the conversation, a participant may receive audio, video, presentation, or other forms of content as playback.
Abstract:
Techniques to manage digital telephones are described. An apparatus may comprise a digital telephone management component having a telephone interface module operative to receive security information in the form of a personal identification number (PIN) for an operator or device. The digital telephone management component may also comprise a telephone security module communicatively coupled to the telephone interface module, the telephone security module operative to receive encrypted security credentials from a computing device, and decrypt the encrypted security credentials with the PIN. The digital telephone management component may further comprise a telephone authentication module communicatively coupled to the telephone security module, the telephone authentication module operative to authenticate the digital telephone using the security credentials. Other embodiments are described and claimed.
Abstract:
The claimed subject matter provides a system and/or a method that facilitates redirecting an instant messaging session or an instant messaging communication. An interface component can receive a portion of data related to an instant messaging session, wherein the portion of data is associated with an instant messaging communication. A delegation component can automatically route the instant messaging session to a delegate for receipt of the instant messaging communication based upon a rule.
Abstract:
To provide a user with better experience of cooperation between an electronic business card processing program and a communication program when exchanging electronic business cards. Electronic business cards are stored in a DB server, which is one of storages for a communication program, as well as an electronic business card local file. Thus, even if a PC is a company's PC, for example, the electronic business cards can be viewed by accessing the DB server from another PC or the like outside an office. Further, the electronic business card processing program operates with the communication program as backend, however, the electronic business card processing program may not be installed on a PC in some cases. Even in such a case, the communication program alone can display received electronic business cards that are stored in the communication program local file on the screen of a display.
Abstract:
Graphical visual representations of electronic business cards may be generated from associated contact file information. Electronic business cards may be sent and received over digital media. Contacts information associated with received electronic business cards may be used for adding to or updating information contained in a recipient's electronic contact files.
Abstract:
Graphical visual representations of electronic business cards may be generated from associated contact file information. Electronic business cards may be sent and received over digital media. Contacts information associated with received electronic business cards may be used for adding to or updating information contained in a recipient's electronic contact files.
Abstract:
Conversation rights for multi-modal communications are managed and enforced in an enhanced communication system. Through physical and/or software components, rights are assigned to a communication session and related components upon user request. Permitted participants of the session are provided access tools such as decryption keys. Restrictions based on the assigned conversation rights are extended to preserved recordings and associated documents of the communication session.
Abstract:
Techniques to manage digital telephones are described. An apparatus may comprise a digital telephone management component having a telephone interface module operative to receive security information in the form of a personal identification number (PIN) for an operator or device. The digital telephone management component may also comprise a telephone security module communicatively coupled to the telephone interface module, the telephone security module operative to receive encrypted security credentials from a computing device, and decrypt the encrypted security credentials with the PIN. The digital telephone management component may further comprise a telephone authentication module communicatively coupled to the telephone security module, the telephone authentication module operative to authenticate the digital telephone using the security credentials. Other embodiments are described and claimed.