Abstract:
Suppressing one or more frequency ranges of a signal prevents the occurrence of feedback in a voice data communications application. A system recognizes a frequency range in a signal where feedback occurs, or anticipates a frequency range where feedback is anticipated. The signal includes a signal the input system generates or that the output system renders. The system suppresses the signal in the frequency range by disregarding one or more sampling bits representing the frequency range, or by applying one or more filters to attenuate or eliminate the signal in the frequency range. The system may monitor the signal to identify feedback resulting in different or additional frequency ranges and suppress the signal in the different or additional frequency ranges to prevent feedback from occurring.
Abstract:
Systems, methods, and/or techniques (“tools”) are described that sort speakers in a network-enabled conference. In some cases, this sorted list of speakers indicates which speaker is dominant. With this sorted list, a participant's communication device may provide context about the speakers. In some cases a participant's communication device has a display that presents real-time video of the speakers or other visual indicia, such as each or the most dominant speaker's name, picture, title, or location. These and other context about speakers may help participants better understand discussions in network-enabled conferences.
Abstract:
Architecture that facilitates the conveyance of a trust level when the caller makes a call, the trust level in dependence on the state of the caller system. The callee (call recipient) receives notification of the trust level and can use this information in the communication such as to request verification from the caller and/or initiate other modes of communication. A caller can authenticate the caller identity in different ways to a communication server. Based on that, the server can assign an appropriate server-verified trust level to the caller. Further, an unsecured phone controller can indicate a lower client-side defined trust level. The server verified and client-side trust levels are then sent to the callee, where the callee determines whether to allow caller access to one or more secured features based on the feature values and the trust level imposed by the callee to access those features.
Abstract:
To reduce the power consumption of a wireless communication hardware device, power conservation scheduling algorithms can be implemented. Reoccurring events, including DTIM intervals and listen intervals can be scheduled as awake times. Similarly expected response intervals can be scheduled as awake times based on information, such as round trip time, that can be passed together with data to be transmitted. The wireless communication hardware device can be placed into a doze state unless it is transmitting data, or unless it is expecting a transmission during one of the scheduled awake times.
Abstract:
An Extensible Mark-up Language (XML) schema is used to generate configuration settings files. A wireless configuration XML schema defines an XML file for configuring wireless network settings on a wireless device. A wide area network (WAN) configuration schema defines an XML file for configuring a WAN device. A local area network (LAN) configuration schema defines an XML file for configuring a LAN device. A broadband modem configuration schema defines an XML file for configuring a broadband modem device. A device configuration schema defines an XML file for reporting the configuration of a device.
Abstract:
A method and system for managing power consumption in a portable computing device having a network interface module is presented. A power management module receives inputs from other modules and determines when the network interface module is to be put in a doze state for a predetermined number of beacon intervals to conserve power consumption in the network interface module. The network interface module in a device that is associated with a network is put in the doze state after an event has occurred including when a scan has been performed, after a delayed sleep timer has expired, and after a beacon transmission has been completed and no traffic is buffered for the device. The delayed sleep time is set based on the estimated round trip time of a packet.
Abstract:
A method and system for managing power consumption in a portable computing device having a network interface module is presented. A power management module receives inputs from other modules and determines when the network interface module is to be put in a doze state for a predetermined number of beacon intervals to conserve power consumption in the network interface module. The network interface module in a device that is associated with a network is put in the doze state after an event has occurred including when a scan has been performed, after a delayed sleep timer has expired, and after a beacon transmission has been completed and no traffic is buffered for the device. The delayed sleep time is set based on the estimated round trip time of a packet.
Abstract:
A method and system for scanning in a wireless device having a wireless network interface card (NIC) is presented. The system has a scanning history table for storing scanning results and a scanning engine that adjusts the scanning period based upon a history of scanning results and commands the NIC to scan for available networks after the period has expired. The engine receives scan results from the NIC, stores the scan results in the scanning history table, determines a scanning period based upon a history of scan results, sets the scanning period, and commands the NIC to scan for available networks after the scanning period has expired. The engine is programmed to set the scanning period using an exponential function and to reset the scanning period to a default period if the scan results are different from a prior scan result or if a triggering event is received.
Abstract:
Physical presence of a mobile device in proximity to a physical meeting place can be recognized. Identifying information can be retrieved from the device, and it can be determined whether the identifying information correlates to identifying information for a profile in an invitee list for a current meeting at the meeting place. If the retrieved identifying information correlates to identifying information for the profile in the invitee list for the meeting at the meeting place, then the profile can be included as an attendee at the meeting (e.g., by including identifying information for the profile in an attendee list). The identifying information such as the attendee list may also be used to perform one or more additional acts, such as sending notifications, personalizing settings, etc.
Abstract:
Devices connected with a computer system are interrogated to detect whether they are configured and functioning. In an audio device implementation, a known audio sample is output to a loudspeaker. If the loudspeaker is properly configured and functional, an attached microphone will capture the sound corresponding to the audio sample generated by the loudspeaker. If sound corresponding to the audio sample is detected, an indication is provided to the user that the microphone and loudspeaker are operational. If no sound corresponding to the audio sample is detected, an indication is provided to the user that the loudspeaker is not enabled and additional configuration is required.