Abstract:
Communication requests added to a conversation are routed directly to a user without following the pre-configured routing rules for the user during a breakthrough period. The breakthrough period may last for the duration of the conversation or for some other period of time. A conversation may be initiated using any supported type of communication. For example, if a user initially sets up an IM conversation with a remote user, then when a voice call is made to the user from the remote user, the voice call is routed directly to the user without applying the routing rules that are configured for the user. Once the breakthrough period has elapsed, the routing rules become active again and are applied to communications received from the remote user that are directed to the user.
Abstract:
Independent telephony systems are integrated by using symmetric forking from both systems. Calls received by either system are forked to the other system. Thus, a call can be accepted by one of the systems, using its external interfaces, and presented to all devices in both systems. Each system is enabled to leverage internal call control advanced features to enhance overall user experience. Internally inserted parameters to call requests are used between the two systems for preventing endless loop of calls between the integrated systems.
Abstract:
A hierarchical address book for an organization is implemented where employees are represented by user objects and departments are represented by department objects. Computer-readable media include executable instructions for displaying and navigating the hierarchical address book. Computer-readable media also include executable instructions for ordering a list of recipients of an electronic mail message as a function of the seniority rating of an object in the hierarchical address book.
Abstract:
Multiple instances of an incoming call in a unified communication system capable of communicating through multiple networks are provided to devices and/or applications associated with the called party. Upon acceptance or a global rejection of the incoming call through one of the end devices/applications, the remainder are provided a cancellation notice for the forked call request that includes information associated with which end device took the action, what type of action was taken, whether the action was based on automatic policy implementation.
Abstract:
Multiple instances of an incoming call in an integrated system capable of communicating through multiple networks are associated such that the called party is provided a single (merged) notification along with options to select among available call types. The call is established using a selected network and end device registered to the called user. Association of the instances is accomplished by comparing caller identity derived from a variety of information associated with the calling party. Conversation or correlation IDs are used to associate the instances as being for the same call and with other related communications such as a related instant messaging session.
Abstract:
The claimed subject matter provides a system and/or a method that facilitates redirecting an instant messaging session or an instant messaging communication. An interface component can receive a portion of data related to an instant messaging session, wherein the portion of data is associated with an instant messaging communication. A delegation component can automatically route the instant messaging session to a delegate for receipt of the instant messaging communication based upon a rule.
Abstract:
A notification system, upon receiving an indication of an event, determines whether the user has requested to suppress event notifications. When the user has requested to suppress event notifications, the notification system suppresses the event notification by not notifying the user of the event. When the user has not requested to suppress event notifications, the notification system infers whether the user wants to suppress event notifications. When the notification system infers that the user does not want to suppress event notifications, the notification system provides to the user a normal event notification. When the notification system infers that the user does want to suppress event notifications, the notification system provides to the user a modified event notification.
Abstract:
A user of a client computer submits a directory request to a server executing a server email application. The server email application is responsive to the directory request to identify a custom directory containing contact data for one or more individuals. The server email application determines whether to transfer a written form of the contact data, or whether to transfer both written and phonetic forms of the contact data to the client computer. The server email application indexes the contact data, prior to transfer, based on the written form when only the written form of contact data is being transferred to the client computer, and indexes the contact data based on both the phonetic and written forms when the written and phonetic forms of the contact data are both being transferred to the client computer.
Abstract:
A client-side signaling mechanism that allows a client to control how a telephone call is handled on a call server. The client user can create call routing rules on the client device using a client control component that manages session protocol messages. Once created, the call routing rule(s) created on the client are transmitted to the call server where a call routing component of the call server processes the rule(s) for a call related to the client. When the server receives the rule(s) and determines that the rule(s) are related to an existing call (incoming or currently in-process), the server halts current normal server rules processing for that call and executes the client-created rule(s). In one example, SIP session messages are employed for client control of server-side call forwarding.
Abstract:
Policies are applied to specific data rather than to an entire computing device that contains the specific data. Access to the specific data is controlled by the policies utilizing various password or other authentication credential requirements, selective data caching, data transmission, temporary data storage, and/or pre-defined conditions under which the specific data is to be erased or rendered inaccessible. Policies may be defined by an administrator and pushed to a mobile computing device, whereat the policies are enforced.