Abstract:
A server is configured to provide a service that manages access to communication sessions supported by at least one communication service and to which user devices connect. The service assigns to users registered with the service respective communication identifiers that the users, and unregistered users of the service, use to access the communication sessions via user devices. The service maps each communication identifier to a list of communication sessions, if any, in which the respective user is currently participating and/or is scheduled to participate. The service receives from a user device a join request from a requester. The join request indicates a particular communication identifier of a particular user registered with the service and a requester identifier. The service connects the user device to a communication session, if any, based on the particular communication identifier and the requester identifier.
Abstract:
A method for securing an enterprise application on a computing device includes: defining at least one monitored action, where the monitored action is an access of sensitive information in the enterprise application, defining a maximum number of instances of the at least one monitored action to be allowed while the computing device is not secured by a device-level lock, detecting at least one instance of the at least one monitored action, determining whether the computing device is secured by the device-level lock, and if according to the determining, the computing device is not secured by the device-level lock: displaying a warning message in response to the instances, incrementing a warning counter in response to the detecting, and if the warning counter exceeds the maximum number of the instances, preventing access to the enterprise application.
Abstract:
The present technology allow for a user's portable device to automatically join a videoconference without any action by a user. A collaboration service can be aware of portable devices in a conference room that is an endpoint for a video conference, and learn of identities associated with the portable devices present in the conference room. After the video conference is initiated in the conference room, all devices that are in communication with the collaboration service can also be automatically joined to the conference. Since all conference participants in the conference room have their own portable device that is joined to the conference the portable devices in the conference room act as a second screen available to the video conference. As such video from the conference can be directed to a common conference room display, while conference materials can be displayed separately on the portable devices. Additionally, each conference participant's identity can be added to a conference participant roster automatically.
Abstract:
A stack fusion architecture enables a cloud provider to provide Software-as-a-Service (SaaS) offerings to multiple organizations. Each organization operates a Infrastructure-as-a-Service (IaaS) platform and is associated with an organization domain. A cluster of software/communication services is deployed to each platform. Each IaaS platform is deployed to a data center and includes compute, storage, and network resources and an IaaS operating system. Users registered to an organization domain have access limited to the cluster uniquely associated with that domain. The architecture includes a globally accessible domain-to-cluster map used to map each cluster to the associated domain. A locally accessible user-to-cluster map is stored in each cluster to map that cluster to each user registered to the domain uniquely associated with that cluster. The architecture enables communication between users provisioned on different clusters and registered to different domains without exposing private information to the cloud provider.
Abstract:
Systems, methods, and devices are disclosed for cognitive collaboration systems on a hybrid node. A query is received by a virtual assistant running on a public cloud, and it is determined whether the query pertains to data available on a public cloud resource, or the query pertains to data available on a private cloud resource. When it is determined that the query pertains to the data available on the public cloud resource, the query is interpreted by using a first model trained on at least one machine learning technique on data from the public cloud. When it is determined that the query pertains to the data available on the private cloud resource, the query is interpreted by using a second model trained on at least one machine learning technique on the data from the private cloud.
Abstract:
A server or other computing device manages meetings in a virtual meeting room on behalf of a virtual meeting room owner. A request is received from an attendee to join a meeting in the virtual meeting room. A determination is made, based on configurations set by the virtual meeting room owner, whether to connect the attendee to a virtual waiting room. The attendee is connected to the virtual waiting room in accordance with the configurations set by the virtual meeting room owner.
Abstract:
A server or other computing device manages meetings in a virtual meeting room on behalf of a virtual meeting room owner. A request is received from an attendee to join a meeting in the virtual meeting room. A determination is made, based on configurations set by the virtual meeting room owner, whether to connect the attendee to a virtual waiting room. The attendee is connected to the virtual waiting room in accordance with the configurations set by the virtual meeting room owner.
Abstract:
A conference system includes a controller and clusters of media nodes. Each media node performs media packet processing operations and connects with other media nodes and client devices. The controller sends to a client device contact information for candidate clusters. The controller receives from the client device a measure of reachability to each candidate cluster as determined by the client device using the contact information. The controller receives from the client device a request to join a communication session. Responsive to the request, the controller determines a best cluster among the candidate clusters to which the client should connect for the communication session based on the measures of reachability to the candidate clusters, and selects a media node in the best cluster. The controller sends to the client device contact information for the media node to enable the client device to connect to the media node for the communication session.
Abstract:
In one embodiment, a method implemented on a video conference participant device includes: receiving video conference data for a video conference session, performing at least one of the following diagnostic tests: verifying receipt of a presenter image from a presenter video conference device where the presenter video conference device is in use by a participant of the video conference meeting, the participant designated as a presenter for said video conference meeting, verifying receipt of shared desktop content from the presenter video conference device, or verifying receipt of audio data from the presenter video conference device; and transmitting results of said performing to said presenter video conference device.
Abstract:
A stack fusion architecture enables a cloud provider to provide Software-as-a-Service (SaaS) offerings to multiple organizations. Each organization operates a Infrastructure-as-a-Service (IaaS) platform and is associated with an organization domain. A cluster of software/communication services is deployed to each platform. Each IaaS platform is deployed to a data center and includes compute, storage, and network resources and an IaaS operating system. Users registered to an organization domain have access limited to the cluster uniquely associated with that domain. The architecture includes a globally accessible domain-to-cluster map used to map each cluster to the associated domain. A locally accessible user-to-cluster map is stored in each cluster to map that cluster to each user registered to the domain uniquely associated with that cluster. The architecture enables communication between users provisioned on different clusters and registered to different domains without exposing private information to the cloud provider.