Abstract:
A security event that is associated with one or more communication devices is detected. For example, the security event may be an unexpected change in data being sent from a communication device outside an enterprise. In response to detecting the security event, a Virtual Service Network (VSN) is created that isolates one or more communication devices that may pose a security risk. A corrective action to mitigate the security event is then implemented. For example, the corrective action may be to dynamically instantiate a firewall on the VSN that blocks the transfer of data from the communication device outside the enterprise. This allows an administrator to review the security event and take further action if necessary. Because the VSN with the firewall is created dynamically, the network remains secure while the security event is investigated.
Abstract:
Method for scheduling and implementing an electronic meeting conducted among remotely-located users communicating with an agenda server, including: accepting a meeting agenda that includes a plurality of topics, a quorum, an identification of resources used by each topic, an identification of data used by each topic, and an identification of data produced by each topic; partitioning the meeting agenda into at least a first and second group of topics; searching for data dependencies between the first and second groups of topics; searching for resource dependencies between the first and second groups of topics; if data dependencies or resource dependencies are found between the first and second groups of topics, then repartitioning the meeting agenda until the data dependencies and resource dependencies between the first and second groups of topics are reduced below a predetermined dependency threshold; and concurrently scheduling and executing the first and second groups of topics.
Abstract:
A customer uses an in store kiosk to establish a communication session, such as a video communication session between the kiosk and an agent in a contact center. The customer can transfer the communication session to the customer's personal mobile communication device by selecting to transfer the communication session at the kiosk. A presence of the customer's personal mobile communication device is detected. The presence of the customer's personal mobile communication device can be detected by the use of various technologies, such as Near Field Communications or scanning a code on the kiosk from the mobile communication device. In response to detecting the presence of the mobile communication device the communication session is transferred from the kiosk to the mobile communication device using a communication application in the mobile communication device.
Abstract:
Method to clone a communication session from a first device to a second device, including: receiving a request to identify the communication session; rendering an information message comprising an identification of the communication session, wherein the information message is configured to be transmitted from the first device; acquiring the information message from the second device to clone the communication session onto the second device; bridging the second device to the communication session without dropping the first device from the communication session, to produce a cloned communication session; and sending a confirmation message, wherein no prior association between the first device and the second device is used during the cloning.
Abstract:
An apparatus and method for improving performance in high-availability systems are disclosed. In accordance with the illustrative embodiment, pages of memory of a primary system that are to be shadowed are initially copied to a backup system's memory, as well as to a cache in the primary system. A duplication manager process maintains the cache in an intelligent manner that significantly reduces the overhead required to keep the backup system in sync with the primary system, as well as the cache size needed to achieve a given level of performance. Advantageously, the duplication manager is executed on a different processor core than the application process executing transactions, further improving performance.
Abstract:
Embodiments disclosed herein provide methods, systems, and computer readable storage media for intelligently presenting surveillance information on a mobile device. In a particular embodiment, a method provides receiving video streams each comprising video captured of a location of a premises under surveillance. The method further provides determining a device location of the mobile device in the premises and selecting at least one video stream of the video streams based on the device location and the location captured in the video of each video stream. The method also provides transferring the at least one video stream to the mobile device.
Abstract:
A customer uses an in store kiosk to establish a communication session, such as a video communication session between the kiosk and an agent in a contact center. The customer can transfer the communication session to the customer's personal mobile communication device by selecting to transfer the communication session at the kiosk. A presence of the customer's personal mobile communication device is detected. The presence of the customer's personal mobile communication device can be detected by the use of various technologies, such as Near Field Communications or scanning a code on the kiosk from the mobile communication device. In response to detecting the presence of the mobile communication device the communication session is transferred from the kiosk to the mobile communication device using a communication application in the mobile communication device.
Abstract:
The present disclosure is directed to systems and methods that include measuring a luminance; comparing the luminance to a predetermined luminance threshold; and if the luminance is below the predetermined luminance threshold, determining a proximity to an external device.
Abstract:
Embodiments disclosed herein provide systems, methods, and computer-readable media for accessing a wearable computing system using randomized input origins for user login. In a particular embodiment, a method provides presenting a user with a first origin on which user login information is based, wherein the first origin is randomly selected from a plurality of possible origins. The method further provides, receiving first motion information from the user indicating a first position relative to the first origin that corresponds to a first element of the user login information. Upon receiving the user login information, the method provides determining whether the user login information authorizes the user to access the wearable computing system.
Abstract:
Systems, methods, and non-transitory computer-readable storage media for implementing real-time transport control protocol (RTCP) to obtain end-to-end session information. The system receives an RTCP extension that is associated with an RTCP packet in a communication session. The RTCP extension may include an instruction for transmitting RTCP data based on a triggering event. The RTCP extension can be configured to propagate along the communication session. Next, in response to the triggering event, the system can transmit the RTCP data to an address defined by the instruction as a destination address for receiving information associated with the triggering event.