Abstract:
The present invention is directed to methods of and systems for adaptive networking that monitors a network resource of a network. The method monitors an application performance. The method categorizes a first subset of traffic of the network. The categories for the first subset include trusted, known to be bad, and suspect. The method determines an action for a second subset of traffic based on the category for the first subset of traffic. Some embodiments provide a system for adaptive networking that includes a first device and traffic that has a first subset and a second subset. The system also includes a first resource and a second resource for the transmission of the traffic. The first device receives the traffic and categorizes the traffic into the first and second subsets. The first device assigns the first subset to the first resource. Some embodiments provide a network device that includes an input for receiving incoming traffic, an output for sending outgoing traffic, a categorization module that categorizes incoming traffic, and a resource assignment module that assigns the categorized traffic for a particular resource. A traffic category for the device includes suspect traffic.
Abstract:
The present invention is directed to a presence and availability system including: (a) an input (e.g., an interface) operable to receive an agent report from a context sensing agent in a host entity associated with a person, the agent report comprising presence information and the person having an address in an associated name space; (b) a tracking agent (154) operable to tag at least some of the presence information with at least one classification tag; and (c) a policy agent (158) operable to determine presence information to be provided to a requestor based on the at least one classification tag.
Abstract:
A method and apparatus are disclosed for delivering enhanced caller identification services to a called party. Caller ID information is extended to include a user document address that is a pointer or hyperlink to a user document containing additional information about the calling party. The user document address may be, for example, a uniform resource locator (URL) identifying an Internet document or a database address identifying a database document or entry. The user document generally contains information that the calling party would like to be presented to the called party and may be stored by the called party or accessed over a network. The user document can be (i) a static document; (ii) a document created in accordance with predefined default document content rules; or (iii) a dynamically generated document based on one or more rules that alter the content of the document.
Abstract:
A method and apparatus are disclosed for delivering messages to one or more intended recipients based on the presence, preferences or location of the recipients. Text-based messages, such as instant messages, can be delivered to one or more intended recipients by means of i a voice call to a voice-capable device associated with the recipients ii a voice mail message to a voice mail box associated with the recipients or iii a text or voice message, as appropriate, that is delivered upon the availability of one or more intended recipients. An instant message originating as a text message is converted to speech, if necessary, before being delivered to the intended recipient. The speech corresponding to the text of the message is played out once the call is answered or once the voice mail message is retrieved. The invention thus enables the delivery of messages to be routed and scheduled based on the location and availability of the intended recipient.
Abstract:
The present invention is directed to a system and method for determining one or more credentials of a network device. The system and method select a first network device from among a plurality of network devices, access a credential repository (108), contact the first network device, and test the validity of the first set of credentials. The credential repository (108) comprises a first set of credentials corresponding to the first network device. If user provides invalid or no credentials, a candidate credential queue (112) can be used to guess a valid second set of credentials when the first set of credentials is not valid.
Abstract:
A communications system featuring a remote security server (120) is provided. The system allows the validation of requests for access to a communications network (112) to be performed implemented, without the need to distribute a security algorithm to individual client devices. In addition, changes to the security algorithm can easily be made, because such changes need only be made in the security server itself, and in the communications server (116) to which access is desired. The present invention is particularly useful in connection with communication services provided as part of a private branch exchange.
Abstract:
The present invention provides a method and system for controlling call volume into a call center. The method and system provides the contacting entity with a file of information for viewing that encourages or discourages continuance of the contact or initiation of another contact with the call center. This is accomplished by adding or omitting features from the file such as contact buttons or icons, messages, and the like. The architecture determines which type of file to provide a contacting entity based on such factors as the staffing level of the call center, the busyness of the call center, the value of the contact and/or contacting entity, and the like.
Abstract:
The present invention is directed to a network switch that determines when specific content is hot and directs flow to one or more cache servers. The architecture of the present invention can include a cache and a digest generator to store predetermined objects in the cache based on the digest generated by the digest generator.
Abstract:
The present integrated work management engine orchestrates all forms of work relating to the servicing of customer requests across the entire business enterprise by integrating disparate communication system components, applications and information storage systems. The system also integrates the real time operation of the front office customer communications and the batch data processing mode of the back office. Work arrives on multiple access channels and is automatically mapped to a process flow that specifies the task and the customer agent who is best equipped to handle the work request.
Abstract:
The present integrated work management engine orchestrates all forms of work relating to the servicing of customer requests across the entire business enterprise by integrating disparate communication system components, applications and information storage systems. The system also integrates the real time operation of the front office customer communications and the batch data processing mode of the back office. Work arrives on multiple access channels and is automatically mapped to a process flow that specifies the task and the customer agent who is best equipped to handle the work request.