Abstract:
The entry and transmission of notes to recipients along the conversation chain. Notes can be created based on an incoming caller. The notes can be transmitted to the conversation recipient for viewing before, during, and after the recipient accepts the conversation. This is facilitated by a communications client that operates to allow entry of the notes, and forwarding of the call recipient via a SIP framework. Moreover, notes previously taken and/or information provided manually and/or automatically by the communications system can be provided to an agent (e.g., ACD, receptionist) receiving the conversation, at any point in the conversation chain for quick identification not only of the conversation source but of previous information already collected.
Abstract:
The entry and transmission of notes to recipients along the conversation chain. Notes can be created based on an incoming caller. The notes can be transmitted to the conversation recipient for viewing before, during, and after the recipient accepts the conversation. This is facilitated by a communications client that operates to allow entry of the notes, and forwarding of the call recipient via a SIP framework. Moreover, notes previously taken and/or information provided manually and/or automatically by the communications system can be provided to an agent (e.g., ACD, receptionist) receiving the conversation, at any point in the conversation chain for quick identification not only of the conversation source but of previous information already collected.
Abstract:
An example computing device creates a resource module that acquires resource information relating to resources of the computing device and acquire quality of experience information corresponding to a quality of audio, and creates a roster module that displays a participant list including resource information relating to resources of a plurality of other computing devices connected to the teleconference and display quality of experience information corresponding to a quality of audio a user of each of the plurality of other computing devices experiences when connected to the teleconference. The device also creates a policy module configured to evaluate the resource information and quality of experience information acquired by the client resource module against rules of a teleconference policy and implement actions based on a determination that the computing device is non-compliant with one or more of the rules of the teleconference policy to control quality of audio during the teleconference.
Abstract:
An example computing device creates a resource module that acquires resource information relating to resources of the computing device and acquire quality of experience information corresponding to a quality of audio, and creates a roster module that displays a participant list including resource information relating to resources of a plurality of other computing devices connected to the teleconference and display quality of experience information corresponding to a quality of audio a user of each of the plurality of other computing devices experiences when connected to the teleconference. The device also creates a policy module configured to evaluate the resource information and quality of experience information acquired by the client resource module against rules of a teleconference policy and implement actions based on a determination that the computing device is non-compliant with one or more of the rules of the teleconference policy to control quality of audio during the teleconference.
Abstract:
Users in an enhanced communication system are enabled to tag other users so that the tagging user is notified when both the tagged and tagging users meet a predefined criterion of presence states and/or available modalities to the tagging and the tagged users. The tagging user may then, optionally, initiate a multimodal session with the tagged user utilizing the set of modalities originally specified or another set.
Abstract:
A token authorizing linking to a first social network profile can be received from a first device at a second device. User input can be received at the second device to authorize linking the first social network profile with a second social network profile. In response to the user input, a social network service can be requested to link the first social network profile to the second social network profile on the social network. Also, a token request associated with a first social network profile can be received at a social network service. In response, a first token can be returned. A second token associated with a second profile can also be received. In response, it can be determined whether the second token is a valid match for the first token, and if so, then the first profile can be linked to the second profile on the social network.
Abstract:
Communication requests added to a conversation are routed directly to a user without following the pre-configured routing rules for the user during a breakthrough period. The breakthrough period may last for the duration of the conversation or for some other period of time. A conversation may be initiated using any supported type of communication. For example, if a user initially sets up an IM conversation with a remote user, then when a voice call is made to the user from the remote user, the voice call is routed directly to the user without applying the routing rules that are configured for the user. Once the breakthrough period has elapsed, the routing rules become active again and are applied to communications received from the remote user that are directed to the user.
Abstract:
Independent telephony systems are integrated by using symmetric forking from both systems. Calls received by either system are forked to the other system. Thus, a call can be accepted by one of the systems, using its external interfaces, and presented to all devices in both systems. Each system is enabled to leverage internal call control advanced features to enhance overall user experience. Internally inserted parameters to call requests are used between the two systems for preventing endless loop of calls between the integrated systems.
Abstract:
A hierarchical address book for an organization is implemented where employees are represented by user objects and departments are represented by department objects. Computer-readable media include executable instructions for displaying and navigating the hierarchical address book. Computer-readable media also include executable instructions for ordering a list of recipients of an electronic mail message as a function of the seniority rating of an object in the hierarchical address book.
Abstract:
Multiple instances of an incoming call in a unified communication system capable of communicating through multiple networks are provided to devices and/or applications associated with the called party. Upon acceptance or a global rejection of the incoming call through one of the end devices/applications, the remainder are provided a cancellation notice for the forked call request that includes information associated with which end device took the action, what type of action was taken, whether the action was based on automatic policy implementation.