Patent application number | Description | Published |
20130266125 | SOCIAL QUALITY-OF-SERVICE DATABASE - A method, computer program product, and system for a quality-of-service history database is described. Quality-of-service information associated with a first participant in a first electronic call is determined. The quality-of-service information is stored in a quality-of-service history database. A likelihood of quality-of-service issues associated with a second electronic call is determined, wherein determining the likelihood of quality-of-service issues includes mining the quality-of-service history database. | 10-10-2013 |
20130266126 | SOCIAL QUALITY-OF-SERVICE DATABASE - A method, computer program product, and system for a quality-of-service history database is described. Quality-of-service information associated with a first participant in a first electronic call is determined. The quality-of-service information is stored in a quality-of-service history database. A likelihood of quality-of-service issues associated with a second electronic call is determined, wherein determining the likelihood of quality-of-service issues includes mining the quality-of-service history database. | 10-10-2013 |
20130279326 | QUALITY OF SERVICE PREDICTION AND CALL FAILOVER - A method, computer program product, and system for a quality-of-service history database is described. One or more characteristics of an electronic call are monitored. A current quality-of-service score is determined, based upon, at least in part, the one or more characteristics. A predicted quality-of-service score is determined based upon, at least in part, one or more of the current quality-of-service score and the one or more characteristics, wherein the predicted quality-of-service score is associated with one or more future times. A failover connection associated with the electronic call is provided. A current connection associated with the electronic call is replaced with the failover connection based upon, at least in part, one or more of the predicted quality-of-service score and a threshold quality-of-service score. | 10-24-2013 |
20130301809 | INFERRING QUALITY IN UT CALLS BASED ON REAL-TIME BI-DIRECTIONAL EXPLOITATION OF A FULL REFERENCE ALGORITHM - A method, computer program product, and computer system for inferring quality of unified telephony calls based on real-time bi-directional exploitation of a full reference algorithm. A client copy of an audio file may be received from a client device associated with a unified telephony call. The client copy of the audio file may be compared to a local copy of the audio file using a reference algorithm. A quality of service associated with the client device may be determined based upon, at least in part, a difference between the client copy of the audio file and the local copy of the audio file. | 11-14-2013 |
20130301810 | INFERRING QUALITY IN UT CALLS BASED ON REAL-TIME BI-DIRECTIONAL EXPLOITATION OF A FULL REFERENCE ALGORITHM - A method, computer program product, and computer system for inferring quality of unified telephony calls based on real-time bi-directional exploitation of a full reference algorithm. A client copy of an audio file may be received from a client device associated with a unified telephony call. The client copy of the audio file may be compared to a local copy of the audio file using a reference algorithm. A quality of service associated with the client device may be determined based upon, at least in part, a difference between the client copy of the audio file and the local copy of the audio file. | 11-14-2013 |
20140282822 | IMPLEMENTING SECURITY IN A SOCIAL APPLICATION - Implementing security in social applications includes inferring a closeness level of a connection to a user's profile of a social application based on a closeness policy and implementing a security level individualized to the connection based on the closeness level. | 09-18-2014 |
20140282845 | IMPLEMENTING SECURITY IN A SOCIAL APPLICATION - Implementing security in social applications includes inferring a closeness level of a connection to a user's profile of a social application based on a closeness policy and implementing a security level individualized to the connection based on the closeness level. | 09-18-2014 |