Abstract:
In a video conference system capable of providing multiple video streams, displayed streams for participants are configured based on automatic selection by the system (such as active speaker) and manual override by the participants. The displayed views are further enhanced by implementing duplicate detection to avoid display of duplicate streams between the automatic selections and manual selections.
Abstract:
Conversation rights for multi-modal communications are managed and enforced in an enhanced communication system. Through physical and/or software components, rights are assigned to a communication session and related components upon user request. Permitted participants of the session are provided access tools such as decryption keys. Restrictions based on the assigned conversation rights are extended to preserved recordings and associated documents of the communication session.
Abstract:
A method and system for maintaining real-time conversations over unreliable connections is provided. The reliable messaging system initiates a conversation from a sending participant to a receiving participant by sending an invitation to join the conversation to the receiving participant. Once a connection is established, the reliable messaging system associates the conversation with the connection. If the connection is lost, then the reliable messaging system attempts to restore the connection by sending an invitation to the participant that was disconnected. If the reliable messaging system is able to restore the connection, then the new connection is associated with the previous conversation, and the conversation can continue.
Abstract:
In one embodiment, a user may transfer a multimodal conversation. A multimodal conversation may have a first mode communication session and a second mode communication session. A first user point of presence may execute a first transfer of the first mode communication session with a first partner point of presence from the first user point of presence to a first target point of presence. A second user point of presence may execute a second transfer of the second mode communication session with a second partner point of presence from the second user point of presence to a second target point of presence.
Abstract:
The entry and transmission of notes to recipients along the conversation chain. Notes can be created based on an incoming caller. The notes can be transmitted to the conversation recipient for viewing before, during, and after the recipient accepts the conversation. This is facilitated by a communications client that operates to allow entry of the notes, and forwarding of the call recipient via a SIP framework. Moreover, notes previously taken and/or information provided manually and/or automatically by the communications system can be provided to an agent (e.g., ACD, receptionist) receiving the conversation, at any point in the conversation chain for quick identification not only of the conversation source but of previous information already collected.
Abstract:
Context-based call routing is provided in a unified communication system by enabling subscribers to define a routing document, which is published by the communication system to callers who subscribe to a presence of the called party. Through publication of the context-based routing information, callers are enabled to make selections between call destination options as defined by the caller and provide a subject for the requested call. The call is then routed by the system according to the caller selection allowing efficient facilitation of the communication between the caller and the called party or their designees.
Abstract:
A real-time communication system receives rich application content from a user. The real-time communication system detects that the user wants to send a message containing the application content, and determines the application that produced the content. For example, if the content was pasted using the operating system clipboard, then the pasted content may contain information indicating the application that produced it. Then the real-time communication system creates a real-time communication containing the application content and identifying the application that produced the content. For example, the real-time communication may be structured as XML that contains the application content and an application identifier. Finally, the real-time communication system sends the real-time communication to the receiving participant.
Abstract:
This document describes tools capable of enabling participants in a real-time, text-messaging conference to access text messages that they have missed, whether that be because they joined the conference late, were disconnected, or did not receive a message due to some sort of failure. Assume, for example, that a conference participant on a wireless laptop does not receive a text message because of a wireless connection failure. The tools, in one embodiment, enable the participant's laptop to notice that the text message was not received, ask for the missing text message, and receive the missing text message. The participant's laptop may then display the missing text message thereby allowing the participant to catch up with the conference and so not lose the context of the ongoing text-messaging conversation.
Abstract:
Users from one forest can share PIM data with users from another forest by replicating user account information from one forest into the other forest, including SIDs for each user account (referred to herein as a synchronization process). Using this replicated information, the sharing user wishing to share PIM data across a forest boundary can set a permission to allow the cross-forest user to access the PIM data. The sharing user adds the SID of the cross-forest user to the ACL of the sharing user's mailbox. When the cross-forest user wishes to access the PIM data from the sharing user, the cross-forest user's PIM application obtains the mailbox identifier information of the sharing user from the user's forest. With this mailbox information, the cross-forest user's PIM application can then send a request to the sharing user's mailbox server to access the PIM data.
Abstract:
Graphical visual representations of electronic business cards may be generated from associated contact file information. Electronic business cards may be sent and received over digital media. Contacts information associated with received electronic business cards may be used for adding to or updating information contained in a recipient's electronic contact files.