Abstract:
A computing device collects data from one or more data sources. The data sources are separate from a social networking service. The computing device uses the data from the data sources to generate group membership suggestions for members of a given user's social network. Because the computing device suggests the group memberships, the given user may be more likely to assign members of the given user's social network to groups. When the given user shares posts on the social networking service, the given user can limit access to the posts to members of selected groups.
Abstract:
Activity data generated during a day or other time period on one or more computing devices is collected and aggregated. The aggregated data is then presented through an activity review user interface. The activity review user interface can be presented on a large format display device, such as a projector or television. The activity review user interface can also be navigated using natural input methods, such as gesture and voice input.
Abstract:
Activity data generated during a day or other time period on one or more computing devices is collected and aggregated. The aggregated data is then presented through an activity review user interface. The activity review user interface can be presented on a large format display device, such as a projector or television. The activity review user interface can also be navigated using natural input methods, such as gesture and voice input.
Abstract:
Users in an enhanced communication system are enabled to tag other users so that the tagging user is notified when both the tagged and tagging users meet a predefined criterion of presence states and/or available modalities to the tagging and the tagged users. The tagging user may then, optionally, initiate a multimodal session with the tagged user utilizing the set of modalities originally specified or another set.
Abstract:
A token authorizing linking to a first social network profile can be received from a first device at a second device. User input can be received at the second device to authorize linking the first social network profile with a second social network profile. In response to the user input, a social network service can be requested to link the first social network profile to the second social network profile on the social network. Also, a token request associated with a first social network profile can be received at a social network service. In response, a first token can be returned. A second token associated with a second profile can also be received. In response, it can be determined whether the second token is a valid match for the first token, and if so, then the first profile can be linked to the second profile on the social network.
Abstract:
Communication requests added to a conversation are routed directly to a user without following the pre-configured routing rules for the user during a breakthrough period. The breakthrough period may last for the duration of the conversation or for some other period of time. A conversation may be initiated using any supported type of communication. For example, if a user initially sets up an IM conversation with a remote user, then when a voice call is made to the user from the remote user, the voice call is routed directly to the user without applying the routing rules that are configured for the user. Once the breakthrough period has elapsed, the routing rules become active again and are applied to communications received from the remote user that are directed to the user.
Abstract:
Independent telephony systems are integrated by using symmetric forking from both systems. Calls received by either system are forked to the other system. Thus, a call can be accepted by one of the systems, using its external interfaces, and presented to all devices in both systems. Each system is enabled to leverage internal call control advanced features to enhance overall user experience. Internally inserted parameters to call requests are used between the two systems for preventing endless loop of calls between the integrated systems.
Abstract:
A hierarchical address book for an organization is implemented where employees are represented by user objects and departments are represented by department objects. Computer-readable media include executable instructions for displaying and navigating the hierarchical address book. Computer-readable media also include executable instructions for ordering a list of recipients of an electronic mail message as a function of the seniority rating of an object in the hierarchical address book.
Abstract:
Multiple instances of an incoming call in a unified communication system capable of communicating through multiple networks are provided to devices and/or applications associated with the called party. Upon acceptance or a global rejection of the incoming call through one of the end devices/applications, the remainder are provided a cancellation notice for the forked call request that includes information associated with which end device took the action, what type of action was taken, whether the action was based on automatic policy implementation.
Abstract:
Multiple instances of an incoming call in an integrated system capable of communicating through multiple networks are associated such that the called party is provided a single (merged) notification along with options to select among available call types. The call is established using a selected network and end device registered to the called user. Association of the instances is accomplished by comparing caller identity derived from a variety of information associated with the calling party. Conversation or correlation IDs are used to associate the instances as being for the same call and with other related communications such as a related instant messaging session.