Abstract:
Conferences are a popular way to hold meetings and presentations when the participants are not required to be physically together. However, the quality of a conference can vary based on a particular user's endpoint configuration, connection, network, conference content, and other factors. Providing a user with the ability to indicate a quality issue, as determined by the user, allows other users and systems to become aware that a user is experiencing quality issues and optionally take action to correct the issue.
Abstract:
Disclosed herein are systems, methods, and computer-readable storage device for managing message threads. An example system configured to practice this method can first identify a usage pattern of a user interacting with a message thread. Next, based on that usage pattern, the system can analyze messages in the message thread to identify a high-priority message. Then the system highlights the high-priority message when the system renders the message thread on a display. The messages can be email messages, text messages, instant messages, etc. The system can further associate the high-priority message with a repository, and grant a repository user, access to the high-priority message.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing meeting roster awareness for participants in a conference. An example system configured to practice this method can first identify participants in a conference, and retrieve, from a source external to the conference, information describing relationships between the participants. Then the system can compute, based on the information, a relationship graph assigning a relationship strength for at least two of the participants. The system provides an indication of the relationship strength to one of the participants, such as providing an indication of relationships of which other participants are not aware. Sources external to the conference can include a social network, a communication history, an organizational chart, a directory, or group membership, for example.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for detect adjunct peripherials, and coordinating their media capabilities (as a preparation to be able to signal their capabilities). The host device and the peripherials can synchronize wall clocks. The system sets up a call (or receive a call) from a remote host device, and requests the peripherials to check for network connectivity to the remote host device (connectivity check). This check can be done by using a STUN/TURN procedure. The system establishes direct connectivity between the peripherials and the remote host device and monitors lip sync by transferring RTCP messages between the host device and the peripherials and instructing display and playback periphrials/sub systems to align lip sync.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for predicting the subject, logistics, and resources of associated with a communication event. Predictions and suggestions can occur prior to, during, or in response to communication events. The user can confirm the prediction or suggestion via user input such as a click or a voice command. The system can analyze past behavior patterns with respect to the subject, logistics and resources of communication events, followed by preparing ranked listings of which subjects, logistics, and resources are most likely to be used in a given situation. The predicted logistics may then include people to invite, time and date of the meeting, its duration, location, and anything else useful in helping potential participants gather together. The resources may include files attached, files used, communication event minutes, recordings made, Internet browsers and other programs which may be utilized by the user.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for contextual calendaring. Contextual calendaring can schedule meetings with varying states of blocking time slots based on users' behavior with respect to the participants, topics, and tasks or context of the meeting. For example, host H invites A for a meeting with the text “we must demo our ‘one-click video’ on Friday.” The contextual calendaring system knows that A isn't available on Friday, so can prioritize the task for A on Friday relative to the demo participants and schedule a ‘firm hold’ or can suggest an alternative person based on the topic and prior context who is available for the demo. The system can mine context information, and identify, based on the context information, a desired attendee and a priority. The system can place a soft hold on the calendar for the desired attendee based on the priority.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for detect adjunct peripherals, and coordinating their media capabilities (as a preparation to be able to signal their capabilities). The host device and the peripherals can synchronize wall clocks. The system sets up a call (or receive a call) from a remote host device, and requests the peripherals to check for network connectivity to the remote host device (connectivity check). This check can be done by using a STUN/TURN procedure. The system establishes direct connectivity between the peripherals and the remote host device and monitors lip sync by transferring RTCP messages between the host device and the peripherals and instructing display and playback peripherals/sub systems to align lip sync.
Abstract:
Negotiation of a future communication through a personal virtual assistant is provided. A trigger command is received. The trigger command identifies a communication received for a recipient from a sender. Schedule information is accessed. The schedule information is related to the recipient of the received communication. A plurality of options is presented to the sender. The plurality of options are for arranging a future communication between the sender and the recipient, and include at least one option determined based on the accessed schedule information. A selection of an option for arranging a future communication is received. The selected option is executed to arrange the future communication.
Abstract:
A security event that is associated with one or more communication devices is detected. For example, the security event may be an unexpected change in data being sent from a communication device outside an enterprise. In response to detecting the security event, a Virtual Service Network (VSN) is created that isolates one or more communication devices that may pose a security risk. A corrective action to mitigate the security event is then implemented. For example, the corrective action may be to dynamically instantiate a firewall on the VSN that blocks the transfer of data from the communication device outside the enterprise. This allows an administrator to review the security event and take further action if necessary. Because the VSN with the firewall is created dynamically, the network remains secure while the security event is investigated.
Abstract:
Providing data resource services within enterprise systems for resource level sharing among multiple applications, and related methods, systems, and computer-readable media are disclosed. In one embodiment, a method for providing a data resource service within an enterprise system is provided. The method includes receiving a user data request from a web application having application logic located outside of an enterprise system to access user data stored in memory within the enterprise system. The method further includes accessing the user data stored in the memory within the enterprise system in response to the user data request from the web application. The method also includes providing access to the user data stored in the memory within the enterprise system to the web application in response to the user data request.