The field of the disclosure is resource tracking and more specifically systems and methods for identifying available resources including, among other things, space, people and equipment associated with an enterprise and obtaining access to those resources.
The present disclosure also relates generally to network-based systems for electronic collaboration sessions with at least some conferees participating from remote locations and more specifically to a system that enables a session to be initiated or scheduled and populated with content using software tools that are already familiar to most computer and communication network users.
The disclosure also describes a system that enables conferees associated with a session to add documents and files to a session queue at any time after a session is instantiated so that the queue provides a persistent repository for content related to the session that can be accessed at any time by one, a subset or all conferees associated with the session. The content including documents or files can be obtained from any digital source. Any conferee can invite any other person to associate with a session after which the invitee has full session privileges in at least some embodiments. The disclosed system, in at least some embodiments, enables conferees to control shared content during a conference in an egalitarian fashion where any conferee can open any content from the queue to share at any time and where each conferee also has the ability to independently view any document in a private window alongside a sharing window.
Conferences and meetings have evolved from gatherings or sessions in conference rooms where participants met in person in the same physical location to electronic collaboration sessions where conferees can attend and substantially fully participate in sessions electronically or “on line” from remote locations. To this end, tools have been developed that enable remote conferees to appear via audio and/or video to other conferees and to view and hear other conferees via video and audio, respectively. Tools have also been developed that enable remote conferees to share content such as documents, images, video clips, application output, web sites, etc., with other conference attendees.
One now ubiquitous content sharing tool is electronic mail commonly referred to as E-mail. As well known to almost all computer users, E-mail enables users to transmit and memorialize communications between two or more persons and also to share content (e.g., documents, images, video clips, etc.) via attachment to E-mail messages. Essentially all E-mail programs have similar features (e.g., fields, tool bars, etc.) that computer users are extremely familiar with. Familiarity with E-mail has resulted in widespread use.
While on line collaboration and communication sessions have proven very useful, known collaboration tools have several shortcomings. First, known collaboration tools often require several steps in order to set up and manage a session. For instance, assume a session initiator intends to invite seven other conferees to a session at 8 AM on Tuesday and that the session initiator, while thinking about the session, decides that the initiator wants to refer to several different sets of content during the session including two word processor documents, a video clip and two spreadsheets showing sales figures for a prior quarter and a current quarter business cycle. Here, in order to set up the session, in many cases a session initiator has to use scheduling software to schedule the session and send invitations to the seven other conferees to be invited to the session. In addition, the initiator will likely have to select and send each of the five sets of content to be delivered to the other session conferees prior to the session so that the other conferees can access that information during the session. Hereinafter, unless indicated otherwise, a content set will be referred to as a file or a record. To expedite access by other conferees the initiator may attach all five files to be shared to a single E-mail to be transmitted to the other conferees. Upon receiving the scheduling notice, each of the seven conferees needs to open the notice and accept the session to be scheduled on their calendars.
Now assume that two days after initially scheduling the Tuesday 8 AM session, the initiator identifies two other files (e.g., another word processor document and a drawing generated via a drawing application) that the initiator intends to share with others during the session. Here, the initiator may attach the other two files to another E-mail, reselect the seven other conferees and send the other files to the other conferees.
Assume that one day before the session is to commence, the conference initiator determines that one of the original five files should be swapped out and replaced by another file (e.g., perhaps a new version of the file being swapped out). Here, the initiator may send yet another E-mail to the invitees including the new file and, perhaps, a note that one of the original files should be ignored.
Also, assume that upon receiving the invite to the Tuesday 8 AM session, a first and a second of the other conferees each identifies other files that they would like to share during the session. Here, each of the first and second other conferees may attach additional files to E-mails to the other conferees and send their files with a note indicating a desire to share the files.
Next assume that two of the seven conferees invited are not available for the session. Here, the initiator may invite two other substitute conferees to the session (e.g., proxies for the two originally invited conferees that cannot attend). In this case, the initiator would also have to forward files to be shared to each of the two proxies. In addition, each other conferee that intends to share files would also have to forward files to the two proxies.
Once a session starts, all conferees connect to the session for sharing. Here, connection often requires each conferee to call into a session for audio and/or video communication. In at least some cases, during a session, each conferee is required to access shared files separately by opening E-mail attachments as other conferees refer to different files. Here, where multiple conferees shared files in different E-mails, keeping all conferees “on the same page” can be a burdensome task at best as conferees have to independently access the previously sent E-mails, access specific files currently being discussed in an accessed E-mail and then switch between files and among pages or portions of specific files as other files and sections of files are referenced.
To reduce the complexities associated with scheduling a session and synchronizing shared content during a session, systems have been developed that enable conferees to simultaneously view content shared by other conferees. For instance, web-based conferencing software has been developed whereby conferees can share files, applications, etc., by sharing output presented on display screens of their personal computing devices (e.g., desktop computers, laptop computers, tablet type computers, smart phone or personal digital assistant type computers, etc.). Here, in addition to creating an audio and/or video link between conferees, an internet or other network link is created for sharing the content where all conferees link to a session run by a server.
Some web-based systems enable a conference initiator to earmark files including documents and other content to be shared in a session so that the files can easily be accessed by the initiator during a session. For instance, where an initiator intends to share seven files, each of the seven files can be linked to the session for access by the initiator. Where an invited conferee intends to share two files, the conferee can access those files during the session period and share the files with other conferees.
While web-based systems solve some of the problems associated with prior systems, they still have several shortcomings. For instance, to initiate a session, many known systems require a conferee to pre-register with a session server to create a system account. This process often requires entry of personal information as well as a process to establish some type of linkage to a user's electronically stored contact list(s), a process to establish a link to files controlled by the conferee, and requires at least some time commitment by the conferee to enter the information and for the server to set up the account.
As another instance, after an account has been set up, to initiate a session, a conferee needs to access a system software interface (e.g., a browser page) that, in many cases, is completely unfamiliar to the conferee. Here, while effort has been made to make initiation interfaces simple and intuitive, where a user does not use the interface routinely, even a simple interface can be intimidating to use and therefore operate as a deterrent to greater use.
As another instance, while known systems enable a conferee (e.g., an initiator) to queue files for sharing during a session, known systems do not provide a universal session queue to receive all conferee files prior to and/or during a session. For instance, in a conference including eight conferees where an initiator intends to share seven files and each of the other seven conferees intends to share two files each for a total of 21 files, there is no queue for receiving all of the files. No universal session queue means conferees often cannot form an understanding of the volume of content to be shared during a session or intentions of other conferees to share files. In these cases, often times session periods end prior to conferees sharing files or valuable session time is wasted with conferees verbally bantering back and forth about intention to share files during the session.
In addition, because files are not queued in a universal queue, there is no ability for conferees to access or control other conferee files unless those files are shared by the conferee that provided the files. For instance, where a session initiator has earmarked seven files to be shared during a session, other conferees can only see and interact with files currently shared by the initiator. For example, if the initiator shares a single word processor document with other conferees, a second conferee can only see and manipulate the shared document and has no ability to access or control the other six files earmarked by the initiator to be shared.
Another problem with known systems is that real time control of remote conferee display screens is often slow as updates between linked computers have to be sent in their entirety to each computer linked to a session. Often times there is at least some latency between when actions occur on a local screen and when actions are replicated on remote screens given network capabilities, noise, etc. Any latency in content delivery is bothersome and can hamper the natural flow of information between disparately located conferees.
One other problem with known conferencing systems is that known systems often are tied to specific hardware or, more specifically, to specific display screens for sharing content. For instance, many conference spaces have dedicated display screens that are mounted within or otherwise substantially permanently secured within a conference space and that are linked to hardware switching devices for receiving content from sources. In other cases screens may be mounted to carts for movement to different locations within a larger conferencing area but the screens are still dedicated to the larger conferencing system. In many cases large flat panel display screens exist that are primarily provided for some non-conferencing purpose such as to show a video or to display a television show (e.g., CNN news network). Despite many available large display screens at many locations, those screens are typically not useable for conferencing purposes. Inability to use available large displays for conferencing purposes is especially troublesome in cases where a remote conferee is required to use a device including a small display (e.g., a smart phone or tablet type device) during a conference despite an available larger screen display in the conferee's vicinity.
Yet another problem with existing conferencing systems is that known systems only allow most conferees to use a single display screen during a session despite the fact that the information to be shared among disparately located conferees often is more than can optimally be presented on a single display screen. For instance, while there are conference spaces that have been specifically set up to use two, three or more common large display screens within a single conference space to share content among conferees within the space, in most cases remote conferees patching into these systems to participate in conference activities only have a single desktop computer screen, a laptop screen, a tablet screen, etc. Viewing content from a large display screen on a smaller screen is difficult for many conferees. Where content is shared on several large display screens in a local conference space, viewing all of that content on a smaller screen is almost impossible. Here, one option is for a remote conferee to view content from only one large screen at a time and to flip through the large screen content but that solution means that the conferee cannot see all of the content at the same time.
Years ago, most companies were regional or, where they were national, had one or more offices in each region of the country to service relatively local clients. Employees lived near the facilities they worked in and often had dedicated offices adjacent other employees they routinely worked with and had access to local resources such as conference spaces, video communication systems, printers, etc. One advantage in these cases was that employees became familiar with all available resources within a facility through routine use. Each employee knew office layouts, locations of and affordances in conference spaces, and in many cases even knew general schedules of fellow employees in their facilities (e.g., that staffing meetings were held every Monday morning from 8 AM to 9 AM in conference room AAA).
Another advantage was that the employees could quickly determine availability of resources including conference spaces and other employees. An employee could see if a light or a computer was on in another employee's office and determine if the other employee was in a facility that day. An employee could visually determine if a conference space was available.
One other advantage was that teams of people that worked on specific projects were often located in the same facility. Co-location meant that team members were able to see each other routinely and to find other team members in between team conferences to move team tasks along. To this end, with employees co-located, short impromptu meetings when two employees had open space in their schedules could happen naturally. For instance, two employees could bump into each other in a hallway and have a short conference regarding a pressing issue. As another instance, one employee could pop her head into another employee's office and, if the other employee was available, could have a short discussion about some topic or could identify a time when the short discussion could occur.
Yet another advantage was that employees could sense availability of other employees based on non-verbal tell-tale signs. For instance, if a first employee had her door shut during morning hours, other employees could sense that the first employee was busy during that time even though the first employee's schedule may have indicated availability. As another instance, based on personal conversations, employees in one facility may have known well in advance when a first employee from that facility was going to be traveling to a different facility in a different time zone and therefore that the first employee would likely be out of pocket during certain periods of the day due to the time change.
Times have changed and so have the staffing models at many large companies so that now many employees routinely travel among many different facilities nationally and internationally to attend meetings and conferences. Many employees are routinely located in unfamiliar facilities without knowledge about facility layout and affordances, locations of other employees within facilities, or any tools for assessing real time schedules of enterprise resources (e.g., conference or personal spaces, affordances within spaces, other employees, etc.). For example, an employee visiting a large Tokyo facility for the first time would be unfamiliar with locations of conference spaces within the facility as well as options for space that could be used for personal focused work as well as affordances (e.g., video capabilities, printers, etc.) within the spaces. Here, the employee also generally would not be aware of locations of personal offices of other employees within the space or of spaces temporarily (e.g., for a day) used by other specific employees within the space. Even if the employee had a map of different spaces within the facility, the employee would have no way to determine availability of the spaces for personal or group use or the locations of other employees in the facility located outside their assigned personal spaces.
Problems associated with lack of insight into resources and schedules are exacerbated by un-scheduled on the fly changes to resource schedules that are unknown to employees. For instance, a conference space may be claimed for an impromptu 25 minute meeting between two colleagues that unexpectedly bump into each other in a hall way. In this case, the conference space as well as each of the conferencing colleagues are out of pocket during the 25 minute meeting. As another instance, a conference scheduled for 60 minutes including 7 employees may be completed early after 25 minutes so that the space used for the conference as well as the 7 employees are freed up earlier than expected. Here, even if a first employee had access to an electronically maintained schedule of another employee in a conference, the unexpected schedule change would not be detected and an opportunity to communicate or inability to communicate as a function of a schedule change would not be perceived by the first employee.
To support a fluid set of employees within enterprise facilities, enterprises are routinely seeking to provide space optimized for specific uses. For instance, where employees within a facility or a section of a facility routinely engage in focused individual activities, space should be optimized for individual activities and in another section of a facility where employees routinely work in large groups (e.g., 5 or more employees), the space should be optimized to facilitate large group activities. Current systems for identifying optimized employee supporting resources are not very good.
Thus, there is a need for tools that enable employees of an enterprise to identify resources within one or more enterprise facilities as well as affordances associated with those resources and current and future availability of those resources.
There is also a need for employees to be able to set notifications for themselves or for other employees to indicate status changes (e.g., a change from available to busy or vice versa) for specific enterprise resources. There is further a need for a system that enables tracking of resource use in a simple and cost effective manner using hardware that already exists for other purposes, especially in facility areas where wireless access points or the like are not provided.
Embodiments of the present disclosure provide a system, method and program for initiating and/or scheduling an online collaboration session among a session initiator and at least some remote invitees to a session using a conventional Email system. In some cases a specific virtual mailbox address may be assigned to a session server function scheduling where any E-mail addressed to the address is used to schedule a session at a future time. Thus, here, any system user that sends an Email addressed to the mailbox can schedule a session without having to pre-register or set up a user account of some type.
In some embodiments a session initiator may be able to identify invitees by simply adding invitees to a conventional “To” or target field in an E-mail addressed to the session server scheduling function. For instance, in addition to addressing an Email to the session server scheduling function, the initiator may add seven other E-mail addresses to the address or target field to indicate seven invitees to the session. Here, because the request to initiate or schedule a session is made via an initiator's conventional E-mail account, the initiator's E-mail contact information is automatically accessible to the initiator for selecting invitees for the session. Here, when an E-mail is sent, the E-mail is transmitted to the session server which gleans the invitee list from the target field and adds the invitees to a session record. In addition to adding invitees to the session record, the server generates invite E-mails to each of the invitees requesting either that the invitee confirm that the invitee will join the scheduled session. Where an invitee agrees to join a scheduled session, the server may communicate with the invitee's scheduling software to add the session to the invitee's calendar.
In at least some embodiments other session server addresses may be associated with other session management functions. For instance, in some cases the server may support an immediate session start function whereby a user can start a session immediately by sending an e-mail to a “starsession@session.com” address.
Here, the process above for scheduling a session would be repeated to invite conferees identified in the target field to provide other functionality.
In some embodiments the invite E-mail sent to a session invitee may include a simple “Join” icon for joining a session that is progressing or that will commence shortly or may include an “Accept” or “Schedule” icon that is selectable to accept or schedule a future session.
In at least some embodiments the server may generate a session queue for each of the sessions that is scheduled where the session queue stores instances of files that may be shared by conferees during a session. Here, to add files to the session, in at least some cases a conferee may be able to add files to a queue via an Email system. For instance, where a session initiator knows that she intends to share seven files with other conferees during a session, the initiator can add those files to a session request attachment field in an E-mail. Here, advantageously, E-mail systems already include intuitive tools that most people are comfortable using for selecting and attaching files to an attachment field. Here, when the system server receives an E-mail to initiate or schedule a session, the server may obtain all attached files and automatically add those files to an associated session queue.
In at least some cases an invitee may be able to add files to a queue when the invitee accepts an invitation to join or schedule a session. In this regard, for instance, in some cases upon indicating a desire to join or schedule a session, the server may cause an E-mail system to generate and present a response E-mail to be sent by the invitee where the response E-mail is addressed to the session server and enables a conferee to add additional files to an attachment field. The response E-mail may include instructions for the invitee to add files to the session queue along with pre-canned text where the invitee confirms a desire to join or schedule the session. Again, here, the invitee's E-mail system already includes familiar tools for adding files as attachments so the invitee does not need to perform some unfamiliar process.
In at least some embodiments any conferee may be able to add files to a session queue at any time prior to, during or after a session conference using an E-mail system. For instance, a conferee may open a new E-mail template, attach files to share and address the E-mail to an “add file” mailbox associated with a session server add file function. Any attached files may be added to a session queue.
In some cases a conferee can use a web-based browser to link to a session at any time after the session has been instantiated (e.g., scheduled) and may be able to add files or documents to the session, delete documents, annotate documents, etc.
In at least some embodiments any conferee may be able to access and at least independently view any files in the queue of a session regardless of who added the file to the queue either before, during, or after a session. This feature encourages conferees to prepare for a session by becoming familiar with content other conferees intend to share and also helps conferees understand importance of content so that a natural ordering of content based on importance can occur.
In some embodiments, in addition to a document or session queue, a system interface will provide a conferee queue with images or, where available, real time video, of each conferee linked to a session. Where video is available, even where the queue only includes small representations of each conferee, slight movements and expressions of conferees can convey a lot of information. In some cases a real time video of a conferee may be opened in a sharing window or, in other cases, in a secondary window in addition to a sharing window for a better view of one of the conferees. In other cases a real time conferee video may be moved to a second display screen.
In some embodiments, during a session conference while content is being shared in a sharing window, any conferee may open any queue document or file in a private window for private viewing. The privately viewed document may be a second instance of the document being shared in the sharing window or may be a different document. Two conferees may open separate instances of the same document in their private windows and may view the same or different pages of the document simultaneously. Two conferees may open different documents in their private windows. The sharing window remains visible on all conferee views at all times. Thus, the sharing and private window arrangement enables all conferees to view any queue document at any time during a sharing conference while still having a view of the shared document.
In some embodiments, whenever a conferee links to a session, instances of every document or file in the session queue are automatically transmitted to the conferee's device and are cached in a memory associated with the device. Thereafter, quick access to any document in a private windows and quick manipulation of documents in the sharing windows of all linked devices can be facilitated.
In at least some embodiments, conferees can annotate documents in the sharing window on their device and the annotations are shown on all linked devices. In some cases conferees can annotate documents in private windows where the annotations may be automatically added to instances of the documents cached by other conference devices, may only be added to other instances of the documents upon an affirmative sharing step by a conferee, or may only be stored for private use by the conferee that generated the annotation.
In some embodiments, in addition to a session queue that is identical for all session conferees, the system may provide a private queue for each conferee for storing documents, files, etc., that the conferee is considering sharing with other conferees but that the conferee does not want to share at the current time for some reason. During a session, when a document is moved from a private queue to the session queue, a document icon for the document is added to each instance of the session queue on devices linked to the session and the document is transmitted to each of those devices for caching to facilitate quick access.
In at least some embodiments, large display screens that can be linked to a session via invitation but that cannot be used as input devices may only show the sharing window as opposed to other interface features used for session navigation. The larger version of the sharing window provides a view that is easier to see.
In at least some embodiments an image or video icon of the conferee that has opened a document in the sharing windows may be visually distinguished in some fashion to show or indicate who has current control of the sharing window. For instance, a colored shadow or other highlight about a conferee icon may indicate current control.
In some cases the system may be able to wirelessly monitor locations of conferee devices and identify proximate large display screens available to be invited to a session. The session interface may present proximate screen options to simplify the invitation process and reduce the friction associated with linking a screen to a session.
In some embodiments any conferee may be able to share her device desktop in a sharing window. By sharing a desktop, any conferee can run any application on their device and share the output of that application with other conferees. For instance, a conferee could share a word processing application, a spreadsheet application, a drawing application, etc. In some cases only the conferee sharing a desktop can control applications presented via the desktop while in other cases any conferee may be able to control any other conferee's shared desktop application.
To the accomplishment of the foregoing and related ends, the invention, then, comprises the features hereinafter fully described. The following description and the annexed drawings set forth in detail certain illustrative aspects of the invention. However, these aspects are indicative of but a few of the various ways in which the principles of the invention can be employed. Other aspects, advantages and novel features of the invention will become apparent from the following detailed description of the invention when considered in conjunction with the drawings.
While the invention is susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the invention to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the appended claims.
The various aspects of the subject disclosure are now described with reference to the annexed drawings, wherein like reference numerals correspond to similar elements throughout the several views. It should be understood, however, that the drawings and detailed description hereafter relating thereto are not intended to limit the claimed subject matter to the particular form disclosed. Rather, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the claimed subject matter.
As used herein, the terms “component,” “system” and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computer and the computer can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers or processors.
The word “exemplary” is used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects or designs.
In the description that follows, various system components and features are described in the context of different embodiments. It should be appreciated that different systems may have different complexities and therefore that some systems may only have a subset of the described components and may only provide a subset of the described features. In addition, while one or another feature may be described in the context of a specific embodiment, any of the features may be used in any of the embodiments and there will be synergies between different features and feature subsets in different embodiments.
Furthermore, the disclosed subject matter may be implemented as a system, method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer or processor based device to implement aspects detailed herein. The phrase “computer readable media” can include but is not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips . . . ), optical disks (e.g., compact disk (CD), digital versatile disk (DVD) . . . ), smart cards, and flash memory devices (e.g., card, stick). Additionally it should be appreciated that a carrier wave can be employed to carry computer-readable electronic data such as those used in transmitting and receiving electronic mail or in accessing a network such as the Internet or a local area network (LAN). Of course, those skilled in the art will recognize many modifications may be made to this configuration without departing from the scope or spirit of the claimed subject matter.
Referring now to the drawings wherein like reference numerals correspond to similar elements throughout the several views and, more specifically, referring to
Herein, an “enterprise” is a business or entity that includes resources including, among other things, conference tables, desks, credenzas, stationary or moveable wall structures, doors, video conferencing subassemblies, projectors, printers, computers, etc. In addition, resources may also include employees that work for an enterprise and/or employee time. I still other cases, resources may also include mechanical affordances that are capable of being controlled in different ways to provide different capabilities. For instance, in some cases, a set of emissive surfaces within a conference space may be controlled to facilitate any one of several different types of space use. For example, the emissive surfaces may be controlled to facilitate a leader based presentation of information at one time and controlled in a different fashion to facilitate a collaboration session wherein conferees can share content in an egalitarian fashion (e.g., each conferee can share content on any of the emissive surfaces at any time during a session without requiring another to yield control of the surface and regardless of who is currently presenting content via the surfaces). Other space control functionalities are contemplated.
In still other cases resources may include non-employee personnel located in or on an enterprise property such as, for instance, third party contractors, customers, clients, service providers, etc. Herein, unless indicated otherwise the term “employee” will be used generally to refer to an actual employee of an enterprise or some other non-employee person that is at least temporarily located on an enterprise property. In at least some embodiments different resource information may be made available to employees and non-employees. For instance, while employees may be able to view locations of all employees and non-employees in an enterprise facility, non-employees may not and may be restricted to identify a subset of available personal and conference spaces reserved for use by visiting non-employees. In other cases non-employees may have the ability to access all resource information that is accessible to employees.
In order to effectively use resources, employees need to know the resources that they have available for use, locations of the resources and, in many cases, whether or not those resources have been prescheduled or are currently occupied and therefore cannot be used during various time periods. The present disclosure describes exemplary systems and processes that may be used to track and report resource locations and use and to enable enterprise employees to access resources efficiently.
Referring still to
Database 14 includes one or more computer readable mediums and stores programs run by server 12 as well as data and other information used by server 12 to facilitate programs and methods and data that is generated through use of the programs run by server 12. Types of data stored in database 14 depend on which of several different applications are performed by server 12. For instance, some applications may only be useful for identifying locations of non-human resources (e.g., spaces, video conferencing equipment, etc.), other applications may only be useful for identifying locations of enterprise employees or non-employees, and still other applications may be used to manage all (e.g., human and non-human) resources. Where non-human resource locations are to be reported, in some cases simple descriptions of the resources suitable to distinguish one from others may suffice. In other cases where views of resources are to be provided, 2D or 3D CAD or other resource representations may be stored for generating views of spaces. Where employee locations are tracked, records for each employee may be stored including name, title, an image, etc. In addition, in some cases employee tracking or privacy preferences may be stored such as, for instance, limitations related to which other employees can track an employee's location, spaces in which location can and cannot be tracked, time periods during which employee locations can and cannot be tracked, activities during which employee locations can and cannot be tracked, etc.
In still other cases, applications may allow employees to view and modify schedules of all or a subset of enterprise resources. Here, for each resource that can be scheduled, either database 14 will store scheduling software and schedule information or server 12 will have access to scheduling applications maintained by another linked server for obtaining schedule information and manipulating resource schedules.
In still other applications it is contemplated that alarms or notifications related to various resource activities, statuses, circumstances, etc., may be rendered by server 12 to enterprise employees. For instance, an employee may want to know when another employee has entered a specific enterprise facility. As another instance, an employee may want to know when a specific conference room becomes available for use. In these and other cases, database 14 may store notification specifications for each resource indicating circumstances to track and other employees to notify. In some cases all of the above applications may be integrated into a single system package in which case relatively complex records for each resource may be stored in database 14. Other types of data required to support applications described hereafter are contemplated.
Workstation 16 is linked to server 12 for accessing output of various of the programs run by server 12 and to allow input for controlling various aspects of the programs. While workstation 16 may be stationary, in some embodiments the work station 16 may be portable and include a laptop, a table type computing device, a smart phone, etc. Server 12 is also linked to various other system components as described in greater detail hereafter.
Referring still to
Referring still to
Referring again
In at least some embodiments it is contemplated that portable personal computing devices like smart phones, tablet type devices 60 and even laptop computers may be used as the primary interface tools by system administrators and enterprise employees generally for accessing many different types of information related to enterprise resources. Hereinafter, the phrase “portable computing device” will be used to refer to portable computing devices generally.
It is contemplated that a “corporate maps” application may be stored on a device that is accessible via a corporate maps icon. To this end, see
Hereinafter, unless indicated otherwise, an employee using a portable computing device will be referred to as a device 60 user. When icon 162 is selected by a device 60 user, any of several different initial default screen shots of a subset of enterprise resources may be presented. For instance, in at least some embodiments, when icon 162 is selected, a screen shot 164 as shown in
Initially the compass icon 182 is highlighted to indicate that a compass functionality is an initial default function. Compass functionality will, it is believed, be the most routinely used functionality associated with the corporate maps application and therefore the default is to that functionality. An image of a facility map (e.g., a resource representation) is presented in field 159 which shows the location of device 60 at 166 on a graphical top plan view map of at least a portion of a facility in which the employee using device 60 is located along with the current locations of other employees within the facility subspace associated with the map to help a device 60 user locate other employees and spaces. Here, the locations of other persons within the space corresponding to the map are each indicated via a phantom circle 168a, 168b, 168c, etc.
In addition to showing employees within the mapped space near the device user 166, the view 159 also shows other resources including tables, chairs, sofas, printers, video conferencing system, etc. Here, in at least some cases, the virtual view 159 indicates real time locations of other (e.g., non-personnel) resources within the facility spaces. Thus, for instance, if a portable videoconferencing system has been moved from space 20b into second space 20e (see again
Referring again to
Referring to
Referring again to
In many cases there are spaces within facilities that are poorly served by access points or that are positioned such that signals received at access points are unable to be used to identify device 40 location accurately enough for at least some useful applications contemplated in the present disclosure. For instance, metal and other structures that form facility walls or other affordances may interfere with device 40 signals so that any signal received by an access point from a device 40 would be highly inaccurate.
Where access points are unable to receive particularly accurate signals from devices 40 but where resource locations are desirable, some other system must be used to detect resource locations. Two other data collecting systems are contemplated in this disclosure. A first system includes semi-stationary Ethernet linked data collector subassemblies and a second system includes portable computing devices 60 programmed to collect and report information from devices 40 to server 12.
Regarding the first system,
Referring to
Prior to use, satellites 50a, 50b, etc., are positioned or mounted within a facility space at locations selected to optimally obtain information transmitted by devices
40 within the space via transceivers 88. To this end, in many spaces Ethernet receptacles 54, while present, are often located at relatively low positions (e.g., at the locations of traditional power receptacles) within a space and therefore are often not well positioned for obtaining information transmitted via low energy signals from devices 40 as furniture, wall structures, or the like within a space often blocks a direct transmission path. Satellites 50a and 50b may be mounted at relatively optimal locations within a space for collecting data from devices 40. For instance, first satellite 50a may be mounted to a wall at a relatively high location within a space to have a substantially direct transmission path from many of the devices 40 located within a space and to also have a substantially direct transmission path to a base unit 52 connected at an Ethernet receptacle at a low location. Second satellite 50b may be similarly mounted, albeit at a different position within the space so that different transmission paths from devices 40 are covered within the space. To better enable communications with the base 52, the satellites 50a, 50b, etc., will, in at least some embodiments, transmit signals using higher power than tracking devices 40 so that even if furniture or the like is located within the path between a satellite and a base 52, the signal should be strong enough to be received by the base 52.
To mount a satellite 50a, in at least some embodiments each satellite will include a mounting sub-configuration. For instance, in
Referring again to
In at least some cases it is contemplated that one or the other of the base 52 and a satellite 50a may generate some signal to indicate when a rechargeable battery 84 needs to be recharged. In this regard, for instance, see again
Although not shown, in at least some embodiments the subassembly 49 may include a third or more satellites like 50a and one of the satellites may always be mounted to the base 52 for charging. The satellite mounted to the base 52 may receive transmissions from devices 40 for use by the system while charging. Here, if a remote satellite needs to be charged, the satellite mounted to the base can be swapped with the satellite that needs charging so that all satellites can remain functional at all times. In addition to providing consistent space coverage, having a system where all satellites remain functional all the time means the sensing algorithms for a subassembly 49 can be set once and be generally valid thereafter.
In some cases the subassembly 49 may cooperate to help an installer place the satellites 50a and 50b in locations where signals therefrom are receivable by the base 52. To this end, for instance, during an installation process, with base 52 connected to an Ethernet receptacle for power and with a satellite 50a fully charged, device 50a may transmit a periodic heartbeat signal to base 52. Satellite 50a can be mounted in a desired location within a space. Here, if satellite 50a is mounted in a location at which sufficiently strong signals from the satellite 50a cannot reach the base
52, the base will miss heartbeat signals from satellite 50a and can generate a chirp (or the satellite 50a can generate a chirp) sound to indicate that the mounting location is not suitable. If the chirp sound is generated, the installer can change the mounting position of the satellite until the chirping sound ceases. Thus, an installer can apply personal knowledge about a facility space to optimally position satellites for receiving device 40 signals while being guided by the base to select only locations that will work well given the mounting location of the base 52.
In cases where collector subassemblies 49 are employed, locations of the satellites 50a, 50b, etc., within a facility need to be added to the maps stored in database 16 either manually or in some automatic fashion. Manual indication may be facilitated by accessing a facility map via workstation 16 and indicating the locations of satellites 50a, 50b, etc., on the map and entering satellite unique identifiers for each indicated location. An automatic determination of satellite locations is described hereafter.
Once locations of satellites 50a, 50b are known, in at least some cases, triangulation methods may be used to determine locations of tracking devices 40 within a space. In other cases signal strength from devices 40 may be so low that only satellites 50 within a space associated with one of the devices 40 will be able to receive a signal there from. Here, locations of devices 40 will be identifiable at at least a room or separate space level.
While the system described with respect to
Regarding the second system type that includes portable computing devices 60 programmed to collect and report information from devices 40, it has been recognized that many enterprise employees use devices 60 for work and even for personal communication that have the capability to collect, retransmit and even analyze information obtained or generated by devices 40. To this end, many people now routinely use electronic devices like smart phones, tablet type devices and even laptops that are essentially always on and that include transceivers that can obtain information transmitted by devices 40 when in the general vicinity of those devices 40.
In at least some embodiments it is contemplated that portable computing devices 60 may be used to automatically obtain information from devices 40 when in an area associated with the devices 40. For instance, when device 60 is proximate device 40a in space 20b in
In at least some other cases, when information is obtained by device 60 from devices 40, the obtained information may be wirelessly passed on to server 12 either immediately if device 60 is capable of broadcasting to an access point 38 or at some subsequent time when device 60 is within a receiving range of one of the access points or a satellite 50a, 50b, etc. Where information is transmitted to an access point or satellite subsequent to collection, device 60 may store the information received from devices 40 until subsequent transmission occurs. Thus, movement of resources associated with devices 40 that are remotely located from wireless access points can be detected, stored and used to drive applications run by server 12. This type of sporadic data collection from devices 40 is particularly useful in applications that do not require a complete or immediate history of resource use or states.
In cases where collector subassemblies 49 are employed, locations of satellites 50a, 50b may be automatically determined in several ways. For instance, where a base 52 associated with a satellite 50a is linked to a specific Ethernet receptacle and the location of the receptacle is known to be within a specific facility space, it may be assumed that the satellite 50a associated with the base is in the same facility space (e.g., the same conference room). In other cases, where locations of Ethernet receptacles 54 are known and signals generated by a satellite 50a are received by more than one Ethernet linked base 52, signal strengths of the signals received by several bases 52 may be used to determine the location of the satellite 50a via triangulation or some type of statistical analysis of the signals received and the locations of the receptacles 54.
In still other cases where employees use portable electronic devices 60 within a facility, devices 60 may be programmed to collect information from satellites 50a, 50b, etc., within their vicinity and to perform a location determining program to identify locations of the satellites. Here, each device 60 would have to be able to determine its own location based on communication with access points or other signal generators (e.g., base 52 that can transmit signals from known locations of receptacles 54) or with other satellites 50a that have known locations. Then, each device 60 may run a program to assess the locations of other satellites based on signal strengths of signals received from the satellites and its own location.
The location determining process may be repeated each time a device 60 is near a satellite 50a and satellite location may routinely be rendered more precise over time. For instance, where a device 60 is initially within a space including a satellite 50a but is not near the satellite (e.g., is on the other side of a conference room), the system may only be able to accurately determine that the satellite 50a is located within one half of the space but no more. A next time a device 60 is in the space, the device may be located relatively closer to the satellite and the signals from the satellite 50a may be relatively strong. Here, the stronger signal may be useable to more precisely identify the location of the satellite. The strengths of multiple sequential signals received by one or more devices 60 may be used to triangulate and further refine the location of a satellite 50a. Here, for instance, where eight devices 60 are located within a space and their positions are known, signal strength of signals from a satellite 50a received by the eight devices 60 may be used in a triangulation process. In a similar fashion where a single device 60 is moved within a space to eight different locations over time, signal strengths associated with the eight different locations may be used to triangulate the location of the satellite.
Referring to
Referring to
In many cases a set of enterprise employees will not use portable computing devices 60 or may not have their portable devices turned on at some times. In these cases, other devices may be required to track employee locations. For instance, referring again to
In at least some embodiments of the present disclosure it is also contemplated that each or at least a subset of tracking devices 40 may be programmed to sense other information that may be useful for driving different system applications. For instance, in cases where at least some employees do not use trackable devices (e.g., portable electronic devices or trackable badges) or where an enterprise does not include systems for tracking employee locations, it may still be useful to know if and when spaces within a facility are utilized. For example, a facility manager may want to know how often and for how long specific spaces are utilized, how many employees utilize the spaces, etc. As another example, an employee searching for an unoccupied space for use may want to access a list of available and unoccupied conference spaces.
According to at least one aspect of some embodiments of the present disclosure, each device 40 may also include one or more sensors that can be used to sense state for status changes associated with resources or the environments in which those resources are deployed. For instance, referring again to
Temperature sensor 64 may measure temperature within a space (e.g., 20b) or may be positioned to detect temperature change on the surface of a chair seat or backrest member. When a person enters a space the temperature of the space will often change as the person's body heat dissipates within the space. When a person sits on a chair and contacts a chair surface, the temperature of the surface typically changes and can be sensed by a temperature sensor mounted to the chair.
Sound sensor 66 may include a microphone for detecting sound within a space proximate the device 40. The sound sensor may be tunes to the pitch and tone range of typical human voices so as to be able to distinguish human voices from other sounds.
Other sensor types are contemplated and sensor N may include, for instance, a carbon dioxide sensor to detect the level of carbon dioxide within a space, one or more pressure sensors, position sensors, etc. Here, when people enter a space, the amount of carbon dioxide typically increases and therefore a change in carbon dioxide level within a space may, in at least some cases, be used to sense use of a space by one or more people. A pressure sensor may be used to sense when a person sits within a specific seat. Each sensor is linked to processor 59 and provides information to processor 59 related to the sensed parameter.
Processor 59 is programmed to either report the sensed parameter values to server 12 or, in some cases, to analyze the sensed parameter values and report some result associated with the analyzed values. For instance, in some cases processor 59 may simply recognize when a chair (e.g., a resource) moves via a motion sensor and may report the period since the most recently detected motion to server 12. In this case, server 12 would be programmed to use the received data to determine if a space associated with the resource is occupied. For instance, one simple rule may be that if a chair moved in the last 20 seconds within a conference room, that the conference room is presumed to be occupied. In this case, if any of ten chairs within a conference space moved in the last 20 seconds, occupancy may be presumed. Where duration since last movement is provided to server 12, a single received signal may be used to identify occupancy without requiring any historical data about previous locations of resources, previous movements, etc.
Another rule may be that at least one chair must move within a space and at least one sound that is consistent with the range of a human voice needs to be detected and reported to server 12 within some threshold period for the server 12 to determine that the related space is occupied. Many other more complex rules are contemplated.
In another case processor 59 may maintain several separate rolling state change event time buckets or counters where state changes that occur in a specific time period associated with a bucket are counted. For instance, in one case a processor 59 may maintain short, intermediate and long term counts corresponding to one minute, one hour, and six hour periods. When a state change occurs, the device processor may add a count to each of the counts to maintain rolling one minute, one hour and six hour counts. The three counts may be transmitted periodically to server 12. Where the counts reflect substantially the same rate of state changes over all periods tracked, server 12 may be programmed to determine that the sensed state changes are associated with ambient noise in an associated space. However, where the counts reflect an increase in state rate changes in the short and/or intermediate duration buckets, server 12 may be programmed to determine that the sensed state change(s) is associated with true movement or some other parameter associated with occupancy of a space In still other cases server 12 may be programmed to use sensed state changes from multiple sensor devices 40 within a space to discern whether or not some condition (e.g., occupancy) occurs within a space. For instance, where substantially similar movements are sensed by each of ten sensor devices 40 on ten chairs within a space, server 12 may be programmed to determine that the similar movements are attributable to noise as opposed to individual movements of chairs and therefore to determine that an associated space is unoccupied. Many other occupancy determining protocols are contemplated. In addition, many other protocols for detecting other activities or conditions (e.g., other than occupancy) using data from sensor devices 40 are contemplated.
In at least some embodiments each device 40 cobbles together device identifying information as well as state conditions into data packets that are transmitted to server 12 via data collectors. Thus, for instance, a low energy Bluetooth data packet including device identifying information and state conditions may be transmitted periodically by each device 40. In other cases data packets may only be transmitted when a change in a sensed state is detected by a device 40. For instance, in a case where occupancy is assumed when a chair is moved within a space, device 40 may only transmit a packet once movement is detected so that satellite battery power can be conserved.
To generate dynamic virtual views of resources within facility spaces as those resources are moved within the spaces, in at least some embodiments, server 12 may have access to 2D and 3D CAD renderings of each resource used within facility spaces. For instance, in at least some cases, a 3D view of a space may be generated for use by an enterprise employee that wants to obtain a general understanding of resources within and the layout of a space prior to use. Referring to
In some cases detail within a virtual space view will be relatively granular in the sense that resources within a space may be represented generally without showing exact real life orientations and juxtapositions of the resources within the space. For instance, where a conference table and ten chairs of a specific type are located within a space to be shown in a view, the chairs may simply be virtually represented in an equispaced and aligned pattern about a conference table without showing actual locations of the chairs, orientations of the chairs, etc. Thus, a chair that is spaced from a conference table by eight feet in reality may be shown adjacent the table edge. These general virtual images may be required where only general resource location information (e.g., which space a chair is located in) can be obtained due to sensing and processing limitations.
In other cases it is contemplated that resource state information that is sensed and collected may be much more detailed including not just which space a resource is located in but also precise location within a space, precise orientation (e.g., facing the edge of a table, facing a wall, etc.). Where more detailed information is available, that information may be used by server 12 to generate a more accurate virtual view of a space by, for instance, showing precise locations of resources within a space as well as relative juxtapositions of resources. To this end, see the exemplary image 134 in
Referring to
At block 106 tracking devices 40 are associated with each resource to be tracked within an enterprise facility. Here, association includes both physical association (e.g., attachment to a chair) and virtual by correlation of a resource identity to a unique resource identifier in database 14.
At block 108, resource characteristics are sensed by devices 40. Here, it is assumed that the virtual views to be generated will include precise location and orientation of resources. Because the application is simply for generating virtual space views, the data required to drive the application is only presence, location and orientation information indicating specific locations of resources in spaces as well as orientations (e.g., no occupancy data or data that can be used to determine occupancy state) is required in this application). At block 110, devices 40 transmits data packets including resource ID, location and orientation data. At block 112 one or more data collectors 38, 49, 60 in the vicinity of a transmitting device 40 receives the transmitted data packets and provides the received packets to server 12.
At block 114, the received packets are analyzed by server 12 to identify each resource (e.g., via the device 40 identifier), resource location and orientation. At block 116, server 12 accesses the 2D and 3D resource renderings 132 and 130, respectively, in database 14 and at block 118, server 12 uses the renderings to generate 2D and 3D views. At block 120 the views are stored for subsequent use.
Although not illustrated in detail, other data for supporting other applications may be generating using a process similar to that shown in
Other circumstances in addition to occupancy maybe detected using information sensed via devices 40. For instance, the number of employees using a space may be determined by sensing movement of a subset of chairs within the space. For example, where five out of twelve chairs move routinely during a one hour meeting in a conference room, server 12 may be programmed to determine that five employees attended the meeting. Discerning other circumstances based on sensed data is contemplated.
Referring to
At block 142, a portable computing device 60 is used to generate a request that is received by server 12. At block 144, server 12 identifies the request criteria including, for instance, location (e.g., selected by an employee or automatically determined as a function of location of a device 60) of the space for which the request has been generated, query content (e.g., 3D view, 2D view, current occupancy, etc.) etc. At block 146, server 12 uses the request criteria to identify information to present and generates a view that is most consistent with the request criteria. The generated view is transmitted at 148 to the requesting computing device 60 and at block 150, the requesting device 60 displays the generated view on the device display.
Referring again to
including the employee using device 60 at 166, desks, chairs, tables, doors and other non-human resources useable by the device user and locations 168a through 168c, etc., of other enterprise employees within the represented space (each other employee is indicated by a phantom circle in the illustrated example). The device user 166 may observe view 159 to determine locations of proximate resources including space, employees and affordances and thus, the overhead view operates like a compass to orient the device user.
Again, where access points 38 (see again
Other system signals may be useable to determine device 60 and/or badge 61 locations. For instance, where it is know that a tracking device 40 is in space 20b in
Thus, the access points 38, collector subassemblies 49, portable devices 60 and tracking devices 40 together may form a web for collecting signals useable by server 12 to determine locations and other characteristics of enterprise resources using one or a plurality of different algorithms.
In at least some embodiments it is contemplated that each or at least a subset of the resource representations in view 159 may be selectable to obtain additional information about that resource. For instance, as seen in
As another example, the device 60 user may select one of the spaces presented in view 159 to obtain additional information about the space and resources or affordances located therein. For instance, where space 20b in
When employees use a resource, often times the employee develops an impression of the resource that she would like to share with others such as, for instance, a facility administrator, other employees, etc. For instance, an employee may have determined that a specific space with specific affordances was particularly attractive or useful and may want to issue a review of the space including an image(s) and comments. To this end, referring to
An exemplary review screen shot 235 is shown in
In at least some embodiments, the system may use an employee's review data to recognize an employee's preferences or favorite resources and may subsequently use that information when suggesting resources for use in the future. For instance, where an employee review indicates an overall rating of 8, 9 or 10, the system may store that information and use that information subsequently to recommend the same space when the employee is searching for a space to use during a subsequent session. In other embodiments the system may use employee review information for one space or one set of resources or affordances to recommend another set of resources or affordances. For instance, where an employee review indicates an overall rating of 8, 9 or 10 for a first space in a first facility that includes a first resource set arranged in a first arrangement, where an employee seeks a space in a second facility for a subsequent session, the system may identify the first space resource set and arrangement and suggest a second space in the second facility that has characteristics similar to the first space that is available when the employee needs a space.
Referring again to
In at least some embodiments a device 60a user may be able to select an employee's name from a name field associated with an employee representation on a space map view in order to establish communication with that employee. For instance, see
Referring again to
In at least some embodiments when an employee icon like icon 206 is selected, at least some information about the employee's current status (e.g., an employee status indicator) may be presented in addition to the communication selection field 290. For instance, referring again to
In still other cases a combination of appointments entered into an electronic scheduling program and real time sensing of employee activities may be used to determine if an employee is available or busy or has some other status. For instance, where Jill has a scheduled meeting in 45 minutes (e.g., a meeting on an electronic schedule) and is travelling toward a conference room that is 30 minutes away (sensed real time conditions), server 12 may be programmed to detect that Jill is busy and should not be disturbed. Many other rules for automatically determining current employee status are contemplated. Other statuses and related indicators are also contemplated such as “Sleep”, ‘Vacation”, etc.
Referring yet again to
Other initial or default corporate map screens are contemplated. For example, in many cases an employee may routinely work or socialize with a subset of enterprise employees on a team and the employee may desire to receive information related to each team member when the corporate maps application is first accessed. Hereinafter, the list of employees on a team will be referred to generally as a “favorites list” and the employees on the list will be referred to as “favorites”.
Referring to
Locations of remote employees are determined by systems in occupied facilities as described above and are provided to server 12. In some cases employee locations outside enterprise facilities may also be tracked using GPS or some other type other system and those locations may be used by server 12 to drive one or more applications along with facility location information for other employees.
Even inside a facility space, in some cases, a GPS system may be able to provide somewhat accurate position information for a portable computing device user. In this case, information from an external GPS system may be combined with signals from a transmitting device within a facility to more accurately determine location of the transmitting device. Many different algorithms for combining GPS and facility sensed information from stationary sensors as well as portable computing devices that obtain information from transmitting devices are contemplated.
In still other cases other systems that can indicate locations of persons outside facilities with sensing devices may be used to determine employee and other locations. For instance, where an employee is scheduled to be on a flight from Europe to the United States, a plane tracking system that identifies the location of the flight over the Ocean may be used to determine the location of the employee on the flight.
As shown, in at least some embodiments the remote view will be at least somewhat transparent so that the device 60 user can see there through to perceive underlying aspects of the graphical local facility map view. For instance, space defining walls, chairs, tables, etc., as well as phantom circles showing other employees may be observable under the remote view frame. Where remote favorites are represented in the remote view space 360, they may be located at locations where minimal or relatively unimportant information is represented in the underlying facility map view. For instance, remote favorites representations may, where possible, be placed in space 360 at locations where they do not overlap phantom circle representations of other employees. Remote employee representations may be presented at locations in space 360 that show employee locations relative to the graphical map view presented. Thus, in
In at least some cases the portion of the facility map view represented in
In the
For remote employees identified in the frame 360, in addition to name and status indications, location and time indicators are presented to help the device 60 user have some context in which to consider the favorite's current status. For instance, for Jill, the location and time indicators at 334 and 336 indicate that she is in Paris and that the local time is 5 PM while for Ralph the indicators at 344 and 346 indicate that he is in Grand Rapids and that the current time is 1 PM. Although not shown, other information about employees may be presented such as, for instance, additional information about their environments. For example, the current weather in Paris may be indicated and spatially associated with Jill or Jill's general availability or lack thereof during the next eight hours may be indicated (e.g., “Available next from 10 AM to 11 AM your time”). Time of day, weather or other environmental characteristics may also be represented as glanceable icons such as, for instance, a sun icon to indicate day and a moon icon to indicate night, a sun icon to indicate a sunny day and a cloud to indicate overcast conditions, etc.
Referring yet again to
Thus, the
In at least some embodiments the corporate maps application will enable an employee to search for any enterprise resources including space, affordances and other employees to determine locations and current status (e.g., available, busy, etc.). To this end, see again
Referring again to
Within field 271, a set of most commonly searched for resources may be presented to help a conferee quickly select search criteria. For instance, the
Referring still to
Where a space (e.g., a conference room) on the view is selected (e.g., via touch at 350 in
The reservation tool includes a time line 386 and a sliding icon 388 for selecting a time to reserve. Although not shown, already reserved time may be indicated on the time line 386 and would not be selectable by the device user. Once a time to reserve has been selected on time line 386, the device 60 user can select icon 390 to provide the reservation request to scheduling software via server 12.
Referring again to
Referring again to
In
Referring yet again to
The ability to show real time locations of resources on a map as well as to access electronic schedules of enterprise resources enables various other advantageous tools to be implemented. For instance, see
In other cases pop up activity and free time windows akin to windows 436 and 440 may be presented for each of the activity icons and lines between those icons or some subset thereof. For example, where the duration of a free time between sequential activities is less than thirty minutes the free time may not be indicated but if the free time between activities is 30 minutes or greater, the free time may be automatically indicated via a pop up window when the mobile day view is initially accessed.
In still other cases, server 12 may be programmed to indicate other information when free or available time exists within an employee's schedule. For instance, when a first employee has 30 minutes of time free between other activities, server 12 may be programmed to identify other employees that are also free and that are scheduled to be in the same general area as the first employee during the free period and may indicate that information to the first employee and, in some cases, to the other employees as well. Locations and availability of other employees may be gleaned from electronic schedules for those employees and/or via actual real time location information and sensed activity information (e.g., sensing if an employee is currently in an impromptu and unscheduled meeting with another employee). To this end, see the indicator 442 associated with the free time label 440 that indicates that two other employees are scheduled to be free and proximate during the specified free period). Which employee schedules are contemplated for notices like the 442 notice would be customizable for each employee so, for instance, an employee may only want notices related to other favorite employees or specifically selected employees as opposed to any enterprise employee.
Thus, in at least some embodiments it is contemplated that server 12 may be able to consider employee schedules as well as schedule locations and employee preferences (e.g., an employee's favorites list) when identifying opportunities for meetings to suggest to a specific employee. Where a first employee has indicated a desire to know when a second employee is going to be proximate and available or when two other employees are going to be proximate the first employee and available, server 12 may generate an indication via the mobile day view. In some embodiments a notification indicating a possible face-to-face meeting may also include a suggested space (see 442 in
It has been recognized that, in at least some cases, a device user may prefer an interface that only periodically identifies open time slots and options for filling those time slots so that the options feature is not constantly pestering the device user to fill in their schedule. For instance, in some cases, a device 60 may be programmed to only present a device user with open time slots and options for filling those slots at 7 AM in the morning when the user is eating breakfast. Here, for instance, at 7 AM on a specific morning, the system and device 60 may recognize three open time slots greater than 30 minutes for the device user at 10 AM, 1 PM and 3 PM and may automatically present a screen shot to the device user at 7 AM for the day indicating the user's schedule as well as the three open slots. Where other employees are scheduled to be in the same general location as the device user during the open time slots and have unscheduled times in their schedules, the system may indicate those employees to the device user and facilitate conferences.
Referring again to
While the graphical map based interfaces described above are useful and will be advantageous for some applications, it has been recognized that much simpler and for at least some people, more intuitive interfaces can be provided for locating and scheduling resources. For instance, in many cases simple text based interfaces may be optimal for certain applications. For this reason, in at least some cases other tools for locating enterprise resources are contemplated. For instance, another general type of corporate maps interface may indicate approximate distances between an employee using a device 60 and enterprise resources. To this end see
The exemplary information field 501 includes information that is developed based on the current location of device 60 and the employee that uses the device 60. The information in field 501 includes an image 504 of the employee using device 60 as well as the user's name and a text description of the user's current location at 506 which is presented at the top of field 501. In addition, field 501 includes a distance scale at 508 that extends downward from image 504 and that includes distance labels along the scale to indicate distance from the user presented in image 504. Thus, for instance, the exemplary scale 508 indicates 10 m, 30 m, 50 m, etc., to indicate 10, 30 and 50 meters from the location of the device 60 user. Here, the distances may be direct (e.g., as the flies) or may be most direct path distances through facility spaces.
Referring still to
A status indicator is provided just below each of the conference room indicators to indicate a current status of the conference room. For example, see indicator 515 below the Bay conference room indicator 514 that indicates that the current status of the Bay room is “booked/occupied” and the indicator 521 associated with the SF North Enclave A indicator 520 indicating that that conference room is also “booked/unoccupied”.
A vertical occupancy bar 530, 532, 534 is provided for each conference room indicator that extends between the distance scale 508 and the resource column 510 to indicate which employees are currently located within each conference room. For instance, bar 530 extends from the Bay conference room indicator 514 downward to a location just below an image 550 of employee “Mary Wilbert” to indicate that all of the employees listed in the resource column 510 between indicator 514 and image 550 as well as Mary Wilbert are currently located within the Bay conference room (se 516). Employees listed at 518 below the bar 530 are not in the Bay conference room but are approximately 10 meters from the device 60 user's location. As another instance, bar 534 indicates that Sara Armiter 552 and Ann Kilner 554 are located in the SF North Enclave B conference room indicated at 556.
In the illustrated embodiment, the occupancy bars are color coded or otherwise visually distinguished to indicate different statuses of the conference rooms. For instance, in the illustrated example in
In addition to the information described above, “favorites” indicators are provided for resources in the resource column 510 that are on a favorites list for a device 60 user. For instance, in
Referring still to
The exemplary view in
Although not shown, in at least some embodiments it is contemplated that every resource in column 510 may be presented as a hyperlink to additional information related to the resource. For instance, the Enclave A indicator 520 may be selected to open a pop up window akin to window 380 in
Referring again to
Each name in the resource list 590 is presented as a selectable hyperlink for accessing additional information about an associated employee. For instance, if the name Jimion Oguchi 596 is selected in
In at least some cases resources may be searched by specific name or a generic resource type. For instance, the Bay conference room may be searched for by typing in the name “Bay” or by typing in the phrase “conference room”, either of which should yield the Bay conference room as at least one option on a list.
Referring to
Another possible favorites view or screen shot 640 is shown in
Referring still to
In addition to being used to locate and determine the current status of enterprise resources, in at least some embodiments portable or other computing devices like device 60 may be useable to set notifications to indicate changes in resource statuses. Here, many different types of status changes are contemplated. Two general types of status changes include employee initiated changes and tracked changes. Employee initiated changes are simply messages generated from one employee to others such as a message indicating that cookies are available at a specific facility location or that some information posted in a specific conference room should be reviewed by an employee.
Tracked changes include statuses of one employee or resource that another employee has indicated should be reported via a notice. For instance, an employee's status may change from busy to available when the employee leaves a conference room in which a conference was progressing. As another instance, an employee's status may change when the employee enters a specific enterprise facility or space or when the employee moves to within 30 yards of another employee. As still one other instance, when a conference room becomes unexpectedly available because a meeting therein ends early, the status of the room may change from occupied to unoccupied or even available.
Referring to
Another function that may be performed within the system described above is to assign information or notices to specific locations within a facility that is associated therewith for some reason. For instance, where a specific travelling employee will be stationed in a remote office for a day, an administrator may want to mark the office and indicate that the employee will be generally around so that users of devices 60 can easily see the location of the space to be occupied by the employee. As another instance, where someone brings in cookies to celebrate another employee's promotion, the location of the cookies can be marked for others to see and as a guide to the cookies. To this end, see
In at least some cases when screen shot 682 is initially accessed, device 60 will present a default point of interest location corresponding to the current location of the device 60. Here, the default may be changed via touching another location on the presented map. In at least some embodiments, a favorite icon 691 may be presented in window 690 for adding all favorite employees to the recipient list for the message. In some cases a local icon 693 may be presented in window 690 for restricting the message to delivery only to recipients within a specific enterprise area such as, for instance, a local facility, a floor of a facility, an area of the floor, etc. Thus for instance, where “local” corresponds to a floor of a facility and both the local and favorites icons 693 and 691, respectively, are selected, the point of interest 698 may only be indicated to favorite employees of the device 60 user when the employees are located on the specific facility floor.
In some cases points of interest may only be set for finite periods. For instance, where a point of interest indicates cookies at a specific location, the notice related thereto may only be set to persist for 2 hours. In this regard see duration icon 689 that may be selected in
While various aspects of at least some embodiments of the present disclosure are described above in relation to different types of interfaces, still other interface types that represent the described aspects are contemplated where the other interfaces types may be more intuitive to most system users. For instance, in at least some embodiments it is contemplated that different applications may be presented for locating and communication with employees on one hand and for locating and reserving other resource types (e.g., conference spaced, personal spaces, etc.). In this regard see again
Referring to
The notifications section 716 includes a list 717 of notifications received by the device 60 user as well as a tab 722 for accessing all notifications that the device 60 user currently has pending or specified. The exemplary notification list 717 includes notifications 718 and 720. Each of the notifications includes similar information and therefore, in the interest of simplifying this explanation, only notification 718 will be described here in detail.
Notification 718 includes an image 724 of an employee associated with the notification (e.g., the employee whose status the notification is associated with), a message 726, the name of the employee associated with the notification and the time 728 that the notification was generated. Notice 718 indicates that “There are updates I'd like you to review on the whiteboard in project room 12” and that the notice was generated by Joe Brown at 7:14 AM. An expander icon 730 may be selected to expand the notice to obtain additional information. For instance, the additional information may include a map to project room 12, a schedule for project room 12, a way to access a communication application for communicating with the employee associated with the notice, etc. Notice 718 is an example of an employee initiated notice (e.g., a notice generated by one employee for a second employee) while notice 720 is a tracked notice that was set by the device 60 user to indicate when the status of a second employee has changed. Thus, notice 720 indicates that a second employee has entered a media work area at 8:21 AM.
Referring still to
To view current visibility restrictions for any employee, a visibility icon (e.g., 732, 734) for the employee may be selected in at least some embodiments. The visibility indicators 734, 732, etc., presented may depend on which device 60 user is using a device 60. For instance, a first employee may restrict visibility to a second employee but not to a third. In this case, if the second employee is using her device 60, that employee would see a restricted visibility indicator (e.g., half closed eye) while the third employee using his device 60 would see an unrestricted visibility indicator (e.g., a fully open eye) for the first employee.
The pending notifications tab 722 can be selected to access specified notifications that are currently set for the device 60 user to indicate the status of other employees to that user. To this end, when tab 722 is selected, a sub-window 740 shown in
Referring still to
Referring still to
Window 740 also includes a “Notifications (Track Me)” icon 753 that may be used to access a list of notifications that track the user of device 60 and that report to some other employee. This feature is useful for a device 60 user to determine if visibility or privacy settings should be modified. The track me list would likely be similar to the list 742 shown in
In at least some embodiments it is contemplated that a device 60 user or other enterprise employee may be able to set notifications that notify other employees of resource statuses. For instance, a first employee may set a notification to report when a second employee is within 50 meters of a third employee and may have the notice delivered to the third employee when the triggering status or parameter occurs. Similarly, a first employee may set a notification to report when a second employee is within 50 meters (e.g., a triggering status) of a third employee and may have the notice delivered to the first employee (e.g., the employee that set the notice). Similarly, a first employee may be able to set a notice for a second employee to indicate when the first employee is within some facility area, is proximate the second employee, is available and within the vicinity of the second employee, is available for a call with the second employee, etc.
It should be appreciated that any status of any enterprise resource may operate as a triggering status for a notification, that the recipient of a notification may be any enterprise employee and that any employee may be able to set any of the notifications in at least some embodiments. Thus, while not illustrated in
Referring to
Although icon 710 is a co-workers icon for searching for enterprise employees, in other embodiments the icon 710 may be a more general resources icon selectable to identify different resources proximate and available for use by a device 60 user. For instance, employees as well as conference and personal spaces may be locatable via icon 710 in some cases.
Referring still to
In addition, a notifications indication 796 and a favorites indication 798 as well as an expander icon 800 are provided for each listed employee. The notifications indication includes a count indicator 810 that indicates a number of notifications set by the device 60 user for an associated employee in the list. For instance, a “1” qualifier 810 spatially linked to the notification indicator 796 for a specific employee indicates that there is one notification specification set for the associated employee. Other notification indicators like 796 that do not include a number qualifier indicate that there are no currently set notifications for the associated employee.
A star 798 is provided for each of the employees in the favorites list because each of those employees is a favorite of the device 60 user. Again, each expander icon 800 can be selected to expand information related to the associated employee. A visibility indicator 812 is provided next to each image of an employee in the list to clearly indicate to the device 60 user whether or not notifications can currently be set for associated employees.
In at least some embodiments it is contemplated that where a notification tracking a specific employee is set but that employee is currently not visible or trackable (e.g., the employee has disabled the ability to track that employee or has at least disabled the type of tracking that the notification requires), inability to track the employee as required in the notification may be clearly indicated to a device 60 user so that the user knows not to rely on the notification features of the system. For instance, referring still to
In still other cases server 12 may be programmed to generate an e-mail, a text, a recorded voice message or some other type of communication to indicate to an employee whenever visibility required to support a set notification is disabled. Similarly, whenever one employee sets a new notification for another employee, server 12 may generate and transmit an e-mail or other communication to other the employee indicating that the notification has been set. In at least some cases the e-mail or other communication may enable the other employee to quickly and intuitively reject the new notification by, for instance, selecting a “reject” icon or the like in the e-mail. In other cases, prior to enabling a specified notification, a first employee receiving an e-mail or the like indicating that another employee has specified a notice to track the first employee may have to affirmatively agree to the tracking process via selection of an “accept” icon or the like in the electronic message.
Referring now to
Selection of an employee from any one of the lists in
In at least some embodiments setting a notification will be extremely simple and intuitive. To this end, see the set of figures beginning with
Assuming the device 60 user want to specify another notification for himself tracking status of the other employee, the device user selects icon 882 and device 60 presents the screen shot 890 in
Status based notifications include all other non-location based notifications. For instance, is an employee currently available, is the employee currently busy, is the employee's visibility status currently set to visible or hidden, etc. In at least some cases notification type will automatically default to the status type or the location type to reduce the selections required by a device 60 user by at least one. In
Referring to
In
Referring again to
Referring to
In
Referring yet again to
In at least some of the features described above the disclosed system attempts to optimize interface use by defaulting to a most likely set of selections. In other embodiments the system may be programmed to always default to likely selections to help expedite the specifying process. For instance, see again
Referring again to
Presenting space options based on general types is intuitive and can expedite use of search capabilities. See
A space list including spaces that are consistent with the selected space type at 1020 is presented at the top of the screen shot and, in the illustrated example, includes six options including, among others, a “Large” space option 1024, a “Living Room” option 106 and a “Conference Room 1” option 1022. For each option in the list, the option is presented with a status indicator. For instance, for the large space, a status indicator 1030 indicates that the space is available for the next 75 minutes while an indicator for the living room space indicates at 1032 that the space is currently booked but unoccupied. Another indicator 1034 indicates that the conference room 1 space is occupied but will be available in 15 minutes. Other status indicators indicate occupied, available, etc. Using the screen shot 1010, an employee can quickly view all spaces that meet basic criteria associated with a selected room type. While occupied spaces are indicated in
As in embodiments described above, different space options in the presented list may be colored, shaded, highlighted or otherwise visually distinguished to indicate their current statuses. For instance, as seen in
Referring to
Referring to
It has been recognized that many device 60 users prefer a natural language interface for searching for available resources. In at least some cases the room peak or other applications may be based on natural language searches as opposed to other specifying types of interfaces. To this end, see
The activity field 1064 is for specifying an activity type for the space sought which may affect which spaces are suggested as options for a device 60 user. For instance, where the activity is a video call, only spaces including hardware for facilitating a video call may be identified. The participant's field 1066 allows a user to specify a number of persons that need to be supported within the space and the time field 1068 allows the user to specify the duration of the meeting to occur. The Start field 1070 allows a user to indicate when the meeting has to start (e.g., now, tomorrow, some future date, etc.).
Any of the fields 1064, 1066, 1068 and 1070 may be selected to open a drop down selection window with options to be selected by the user. For instance, two drop down windows 1072 and 1074 are shown for fields 1064 and 1070, respectively, where a box 1076 and 1078 in each window can be moved to change the selection in the associated field 1064 or 1070. After a statement 1062 has been altered to reflect a space required by the device 60 user, a search or submit icon 1080 near the bottom of the screen shot 1060 is selectable to submit the search query to the system server 12.
Once the statement from screen shot 1060 has been submitted, server 12 identifies all facility spaces that meet the required characteristics and presents those spaces in another screen shot 1070 as a list 1072 as shown in
The screen shot in
While the interface in
As described above, in at least some cases notifications related to tracked resources may be issued via communication applications that reside outside the corporate maps, compass and room peak applications that initiate the notices. For instance, see
In addition to supporting the concepts described above, the room peak or other applications may provide other functionality to manage resources. For instance, where an employee has booked a conference space for a specific time period but has not entered the booked space within some threshold period prior to the booked period, server 12 may generate screen shot 1120 in
The rules for when to generate different text messages may be far more complex. For example, where an employee has not entered a booked space within 5 minutes prior to the booked time, if the employee is located proximate the booked space (e.g., in a hallway outside the space), server 12 may forego the text message shown in
Other views of enterprise space availability and affordances are contemplated. For instance, see the screen shot 1200 in
Referring still to
Again, while occupied and unoccupied spaces are all included in the
In
While the invention may be susceptible to various modifications and alternative forms, specific embodiments have been shown by way of example in the drawings and have been described in detail herein. However, it should be understood that the invention is not intended to be limited to the particular forms disclosed. For example, the collector subassembly 49 shown in
As another example, while many of the views described above are current or real time views of resource statuses, other embodiments contemplated may enable system users to specify a temporal aspect to a view to obtain other useful resource status information. For example, see in
As another example, see
A temporal aspect may also be added to notifications in at least some embodiments. For instance, see
In
As still one other example, when an employee adjusts privacy setting, server 12 may be programmed to indicate to that employee any notification that will be affected by the newly selected setting. In this regard, see again
In at least come cases stationary or mounted display screens may be used to present resource information and interface tools to employees instead of or in addition to portable computing devices. For instance, a Room Wizard (TM Steelcase) as manufactured and sold by Steelcase Corporation, mounted outside a conference space may present resource availability information including information akin to any of the types of information described above as well as scheduling, notification and other parameter setting tools. In still other cases Room Wizard type devices may be presented at individual desks or work spaces within a larger open space. As another instance, larger Room Wizard type screens may be presented at entry locations to various spaces such as in front of an elevator to a floor, a doorway into a specific department, etc., to greet employees, present resource information (e.g., who is on premise, open and occupied or scheduled spaces, etc.).
Referring to
While database 1522 is shown as a separate component in
Unless indicated otherwise, hereafter it will be assumed that a single entity operates the E-mail and scheduling software 1529 and the session software 1528 and that each of the device 1514 users uses the E-mail and scheduling software 1529 to facilitate E-mail communications and to electronically calendar events, sessions, etc. Nevertheless, it should be appreciated that in at least some cases different device 1514 users may be associated with different entities and therefore different users may use different E-mail and personal calendaring software to facilitate communication and calendaring functionality described hereafter.
Referring still to
According to one session scheduling function that is consistent with at least some aspects of the present disclosure, when server 1512 runs session software 1528, server 1512 can be used to schedule and manage conference sessions involving conferees at remote locations. More specifically, the session software 1528 can use E-mails from system users to schedule and manage conference sessions. To this end, at least one unique session domain name is assigned to server 1512 such that all E-mails addressed to the session domain name are received by server 1512. Different qualifiers (i.e., the portion of an E-mail address before the “@” sign) in received emails are used by server 1512 to initiate different session management functions. For instance, where the term “session” is the domain name, the qualifier “schedule” may be added to the domain to provide the address “schedule@session.com” where the server is programmed to recognize a request to schedule a new session whenever an E-mail addressed to the address “schedule@session.com” is received. As another example, whenever an E-mail addressed to “response@session.com” is received, server 1512 may be programmed to recognize a response to an invitation to participate in a session and may process the response accordingly. As still one other instance, whenever an Email addressed to “AddFile@session.com” is received, server 1512 may be programmed to recognize that files attached to the E-mail are to be added to an existing session queue and may process the response accordingly. As another instance, an Email to “startsession@session.com” may cause server 1512 to start an immediate session and E-mail to “join@session.com” may cause server 1512 to add a conferee to an ongoing session. Many other E-mail addresses may be associated with other session functionality.
Referring now to
The “To” field 1568 is used to indicate recipients of the E-mail message. As shown, one of the recipients listed in field 1568 is “schedule@session.com”. Here, the domain portion of the address (e.g., session.com) corresponds to session server 1512 in
At block 1538, the initiating conferee adds information to message field 1576 and other fields. In at least some embodiments it is contemplated that the initiating conferee may simply add conversational text to block 1576 that includes information required to schedule a conference session. Here, it is assumed that server 1512 would be able to parse the conversational text to glean information needed to schedule the session. The exemplary information in field 1576 in
Continuing, at block 1542, any additional information such as a more detailed message, an agenda for a session, etc., may be added to the E-mail in field 1576. After the initiating conferee is satisfied with the information entered into the E-mail fields in
Referring now to
Referring
In addition to including conferee and status information, the session record 1720 also includes a session file queue 1728 which stores all of the files that have been added by either the initiator or one of the conferees to be shared during the session once the session commences. Consistent with the above example, the queue 1728 lists seven files corresponding to the session initiator. In addition, other files 8 through 15 are shown listed in the queue and associated with other conference invitees. Two of the other files, File 14 and File 15, have been added to the queue by one of the tentative conferees. In at least some cases even declining conferees may add files to the queue to be considered by others during a session.
In at least some cases server 1512 may arrange files in the queue based on the status indicators associated with conferees that added the files to the queue. For instance, files may be arranged with initiator files first, accepted conferees second, tentative conferees third and declined conferees last. Other factors may be used to arrange queue files. For instance, file types may be used to arrange files, conferee characteristics (e.g., titles) may be used to arrange files, file names may be used, combinations of factors may be used. In some cases conferees may be able to designate the order of files in the queue.
Other information may be stored in the session record 1720 such as messages received from conferees in E-mails corresponding to the session, an agenda if provided by the initiator or some other conferee that was invited, etc. Although other session records are shown in simplified form in
Referring once again to
Although not shown, when a conferee initiates scheduling a conference as described above, in addition to scheduling a session in the session database 1524, the session software may also interact with scheduling or electronic calendaring software used by the initiating conferee to maintain a personal schedule. For instance, when a session is scheduled, server 1512 may transmit a meeting or session notice to the server maintaining the initiating conferee's E-mail system requesting that a session be added to the conferee's personal schedule. Similarly, when an invited conferee accepts or tentatively accepts an invitation to participate in a session as described hereafter, server 1512 may transmit a meeting or session notice to the server maintaining the Email system used by the invited conferee requesting that the session be added to the conferee's personal schedule. In the present case it is assumed that server 1512 operates all E-mail and scheduling software for all potential conferees (see
Referring still to
Referring still to
Message field 1682 includes a message composed by session server 1512 inviting the invitee to join the conference session that has been scheduled. To this end, the composed message indicates the identity of the session initiator as well as the day and time at which the session is to take place at 1686. In addition, the composed message indicates the names of conferees invited to the session at 1688 which can be gleaned from the E-mail addresses of the invitees received in the initiating E-mail by the server 1512. The message field 1682 may also include icons corresponding to each one of the files currently in the system queue at 1690. The exemplary files at 1690 include files 1 through 7. Here, it is contemplated that any one or a subset of the file icons at 1690 may be selected for accessing those files to gain additional information about what is to be presented or discussed at the scheduled session. The message field 1682 also includes an invitation at 1692 and instructions to the invitee for adding additional files to the attachment field 1680 that can be added to the queue. In at least some cases a session identifier may also be included in the invite E-mail. For instance, in
Referring still to
Referring again to
After a session is scheduled and prior to commencement, any conferee may be able to add files to the session queue at any time, even after accepting a session. To this end, see
Referring again to
Where a conferee adding files to a queue is only associated with one scheduled session, server 1512 may be programmed to use conferee identification information from the received E-mail to identify the session at block 1601. In some cases, server 1512 may simply move on to block 1610 once a single session is identified. In other cases, server 1512 may generate and transmit a confirmation E-mail to the conferee that sent the add file E-mail to confirm the conferees intent to add the files to the identified session queue. Where server 1512 identifies two or more sessions that the conferee is scheduled to participate in, server 1512 may generate and transmit a query E-mail asking the conferee to select one of the plurality of sessions to which the files should be queue for. Referring still to
While not shown, a process similar to that described above may be supported for using an E-mail system to remove files from a session queue. For instance, another E-mail address associated with server 1512 may be “RemoveFile@session.com”. In response to this type of E-mail, server 1512 may identify a session associated with the conferee and provide an E-mail including attached files previously added to the session by the conferee where files can be removed by detaching those files from the E-mail and re-sending the E-mail to server 1512 to update the queue.
In some embodiments it is contemplated that a session initiator may want to immediately start a conferencing session instead of scheduling a session for a future time period. To immediately start a conferencing session, a process similar to that described above with respect to scheduling a session may be performed. The primary differences between starting an immediate session and scheduling a session would be that, to start an immediate session, an E-mail would be transmitted to a different server mailbox, such as, for instance, “startsession@session.com” and the initiator would not have to provide information describing the session start time or date. Referring again to
If an invitee accepts an immediate session via an invite E-mail, referring still to
In at least some embodiments an immediate session invite E-mail may include a simple selectable icon or the like enabling a conferee join an ongoing session with selection of a single icon. To this end, see exemplary invite E-mail template 1712 in
In at least some embodiments it is contemplated that the information included in an E-mail to the session server to initiate (e.g., schedule or start) a new conference session may not include all of the information required to initiate the session. For example, a plain English E-mail composed by a conference initiator to initiate a session may not indicate the date on which the session is to be scheduled or may not indicate conference invitees for the session. In fact, in at least some cases it is contemplated that the process of initiating a session may be started by simply sending a start or schedule E-mail to session server 1512 without adding any information to other E-mail fields.
Where insufficient information for initiating a session is received within an E-mail, in at least some cases, session server 1512 will be programmed to request missing information from the initiating conferee. To this end, a sub-process 1730 that may be substituted for a portion of the process shown in
Referring to
At block 1732, if the minimum required session information has not been received, control passes to process block 1734 where server 1512 generates and transmits a follow-up E-mail to the initiating conferee requesting additional information. Although not shown, the follow-up E-mail may include a precanned reply E-mail with specific fields for entering required information. For instance, where an initiating conferee failed to indicate the date on which a session should be scheduled, the precanned reply E-mail may include a field labeled “date” that includes space for entering the session date. As another example, where the initiating E-mail failed to identify at least one other conference invitee, the reply E-mail may include a field labeled “invitees” and space for entering E-mail or other identifier information for invited conferees. After block 1734, control passes back up to block 1592 in
Even in cases where a conference session initiation E-mail includes all of the information required to initiate a conference, in at least some cases, server 1512 may be programmed to send a confirmation E-mail to an initiating conferee to confirm that the session should be schedule. To this end, see the exemplary sub-process 1750 in
After a session has been scheduled and invitees have responded, a few minutes before (e.g., 15 minutes) a session is scheduled to commence, an E-mail may be transmitted to each of the conferees that agreed to participate with a selectable hyperlink that, when selected, opens a browser page associated with the session (see again, for instance,
Referring now to
The conferee icons in queue 1778 include a separate icon for each of the conferees that participates in a session. In at least some embodiments each conferee icon 1778 will include an image of the associated conferee or some other identifier such as a name, an office association, etc. In at least some cases different colors will be associated with different conferees and the icons 1778 may have some colored characteristic associated with the conferee color. For instance, the border box around a first conferee icon may be red, the border around the second icon may be blue, the border around a third icon may be green, etc. Actions performed by conferees that appear on the browser page or information associated with conferees may have subtle color related earmarks to help conferees distinguish activities by other conferees. For instance if a conferee uses a drawing tool or the like to highlight content in a file presented in field 1774, the highlighting may be color coded to the conferee's related color (e.g., the conferee associated with red may highlight in red, the conferee associated with blue may highlight in blue, etc.).
Referring still to
In at least some embodiments, regardless of which conferee added a file to the session queue, any conferee may be able to select any file from the queue to open the file for common viewing in common field or sharing window 1774. Standard graphical interface tools may be used to select files. For instance, a mouse controllable pointer icon may be used to drag a file into sharing window 1774, to double click on a file icon to open the file in window 1773, etc. See
The feature that enables any conferee to take session control by opening a file in common field 1774 is referred to generally as egalitarian control because no one conferee controls who has control at any time. In effect, any conferee can assume control of the common field 1774 at any time and all conferees see the same content or file in the common field at all times and any conferee can open any queue file regardless of which conferee added the file to the queue.
When a file is opened in common or sharing window 1774, the file icon in queue 1776 is highlighted or otherwise visually distinguished from the other file icons in the queue. Where an open file has several pages as in a Power Point presentation or the like, scrolling icons 1775 and 1777 (see
In at least some embodiments any conferee may be able to open any file in the queue in either the common field 1774 or in a private window for independent and private viewing and consideration. To this end, see
cursers, etc.), an option tool or window 1800 is opened giving the conferee the option to either open file 6 in the common field 1774 by selecting icon 1802 or to open file 6 in a private viewing window by selecting icon 1804. Selection of icon 1802 opens the selected file in common window 1774. Selection of icon 1804 opens the selected file in a private viewing window as shown in
Here, private means that only the conferee that elected to open the file in the private window can see the instance of the file in the private window (i.e., no other conferee sees another conferee's private window). If two or more conferees open the same file in private windows at the same time, each can independently view a different instance of the file in their own private window. Similarly, if a file is opened in the common field and a conferee opens the same file in a private window, the conferee sees a different instance of the file than the instance viewed by all conferees in the common window. Because different conferees can view different instances of the same file at the same time, different conferees can view different parts of the same file at the same time. For instance, a first conferee may be viewing a first page of a Power Point presentation while a second conferee is viewing a tenth page of the same Power Point presentation at the same time.
Referring still to
The browser representation in
In at least some embodiments, server 1512 enables conferees to add files to or remove their files from a conference queue during a session. For instance, referring again to
Referring again to
In still other embodiments a session application may be downloaded onto a conferee's device and used to add files or other content to a session queue at any time. For instance, a session application may be downloaded to a smart phone or tablet type device that integrates with device content posting applications. For instance, here, after a picture is taken with a camera, if a conferee wants to post the picture to a session queue, the conferee can select a “Post” icon presented by the camera software interface to access sharing options for the obtained image like “Message”, “E-Mail”, “Twitter”, “Facebook”, etc. Once the session software is integrated with the posting application, another option called “Session” may be provided as a selectable icon for sharing by posting to a session queue. Here, if the “Session” icon is selected, the image may be transmitted to the session server 1512 with conferee identifying information. Where the conferee is only associated with a single scheduled conference, the image may be added to the queue automatically. If the conferee posting the image is associated with more than one scheduled session, server 1512 may respond with a query about which session queue to add the image to.
This simple application based process of adding an image to a session may be performed either prior to a session or during a session. For instance, if a conferee has a hard copy image that the conferee wishes to share with others during the session, the conferee may take an image of the hard copy with the conferee's device 1514 and post the image essentially real time to the queue for sharing. Camera videos can be shared and posted to a session queue in the same fashion. As another example, the session posting option may also be used to share a news article, an internet link, a blog site, etc. To this end, the same posting icon can be presented via a smart phone, tablet device or any other type of device and may be selected to access a session posting icon to add any content to a session queue.
Referring again to
Referring again to
Even where a display is not independently addressable, most displays have input ports (e.g., HDMI) that can receive wireless processing dongles or devices (e.g., Chrome Cast by Google) that are independently addressable. To this end, see
In at least some embodiments, a conferee simply invites display 1920 to a session in some fashion and the session server adds the invited display to the session “conferees”. Thereafter the display operates like any of the personal device displays to present session information to conferees in a large format. For example, if a conference initiator knows the address corresponding to display 1920 or can identify display 1920 in some other way useable by server 1512 to identify the display address, the address or identifier may simply be added to the target field in a session initiation Email. For instance, display 1920 may be labeled with a persistent display identifier such as “Display 22”. Here, “Display 22” may be added to the target field in the initiation Email and may be useable by server 1512 to discern the display address which is added to the list of session participants.
As another example, when dongle 1922 is inserted in the display HDMI or other port, the dongle processor may boot up software to run an application that presents an address or associated identifier via display 1920 that could be added to an E-mail target field. Here, a conferee may simply enter the displayed address into an Email target field and transmit the E-mail to server 1512.
As one other example, referring again to
In at least some cases, when a conferee initiates the process of scheduling a conference and invites other conferees to a subsequent session at a later time, server 1512 may perform additional functions to identify various resources for each or at least a subset of the invited conferees to use that are intended to enhance the subsequent session. For instance, if the session is scheduled for a Tuesday morning in two weeks from 8 AM to 10 AM, when a first conferee invites five other conferees to the session via an e-mail invite or the like as described above, for the second conferee, server 1512 or another server in the system may automatically access the personal schedule of the second conferee and determine that on the Tuesday selected for the conference, the second conferee is available at the selected time (e.g., 8 AM) and will be located in a Palo Alto office facility. Server 1512 or another system server may also access a space schedule for the Palo Alto office facility and identify that a space including one or more large flat panel displays suitable for viewing session content is available for use by the second conferee during the scheduled session time period. Here, the server may be programmed to identify the smallest space possible for the second conferee that has an optimized set of affordances so that larger spaces can be reserved for larger sets of conferees that may need conference space during the session. For instance, where a single person work station is available, the server may identify and suggest the single person space to the second conferee. The server may also take into account the second conferee's preferences also if those are stored within a system database when selecting a space for use during the session.
Referring again to
In at least some cases it is contemplated that two or more conferees invited to a session may, during the time scheduled for the session, be scheduled to be in the same general location such as the Palo Alto facility. Here, in many cases, it will make sense for conferees in the same general location to be co-located during a session. To this end, in at least some embodiments, when a session invite e-mail is generated and transmitted to conference invitees and a system server identifies spaces with suitable affordances available for invitees to use during the session, the server may be programmed to identify any conferees that will be in the same general location during the scheduled session time and may identify a space large enough and with sufficient affordances to support the sub-set of conferees at the general location. For instance, where four of the invited conferees will be located in the Palo Alto facility, the server may identify a Palo Alto space large enough to support the four conferees and may suggest the identified space in a manner akin to that described above with respect to the second conferee (see and consider again
Where a system server suggests a multi-person space for co-located conferees, after one of the co-located conferees accepts the suggested space, the system server should reserve that space and modify invite e-mails or the like to other conferees. For instance, where a session invite is transmitted to four conferees that will be located in the Palo Alto facility during the scheduled session time and the invite suggests a suitable conference space XX for the group of four conferees, one of the four conferees will open and consider the e-mail invite first. Where a first of the four conferees opens, considers and accepts the session and the suggested conference space XX, the system updates the session and schedules for the space XX and the first conferee to reflect the acceptance. Here, when a second of the four conferees to be located in Palo Alto opens her e-mail invite, the invite should reflect that space XX has been scheduled for use by the first of the four conferees in the Palo Alto facility. In this case, when the second of the four conferees accepts the invite, the second conferee may not be presented with the option to select a suitable space in the Palo Alto facility and instead, the system may simply add the space XX to the second conferee's schedule for the session at the scheduled session time.
Similarly, when the third and fourth conferees that are scheduled to be in the Palo Alto facility during the scheduled session time access their e-mail invites, the invites may reflect acceptance of a suggested space by one or more of the other conferees that will be co-located and the accepted space will be used as a default for each of those additional conferees.
Where a second subset of conferees will be co-located at a different location, a system server may perform a process similar to that described above with respect to the Palo Alto facility space to identify an optimized space for use by the second subset and that space may be suggested in e-mail invites to the second subset.
When a first of a sub-set of co-located conferees invited to a session considers a suggested multi-party space, in at least some embodiments the first conferee will be able to select a different space for the session. Here, the different space may be suitable for use by the entire co-located subset or may be a smaller space that cannot support the entire co-located conferee subset. Where the space selected is too small (e.g., a single person workstation) to support the entire co-located subset, a system server may alter continue to suggest the larger space to the other co-located conferees or another suitable space via the e-mail invites to those conferees.
Where a session is not scheduled to occur for a long time (e.g., 2 or more weeks), the system servers may not present space options for the session until some subsequent time closer to the scheduled session period. Here, for instance, one week before a session is scheduled to occur, a system server may be programmed to generate a space suggesting e-mail or other electronic notification. The space suggesting e-mail may simply include a hyperlink to a virtual space reservation tool akin to the
Where a conferee has accepted a conference space at a first facility for a session period, a system server may track scheduled locations of the conferee and if the conferee's scheduled location during the scheduled session is inconsistent with the accepted space, the system may generate an e-mail or the like to request that the conferee either confirm a desire to use the scheduled space or select a different space. Here, the server may also suggest a different space at a different location that is consistent with the conferee's scheduled location during the session. Again, the e-mail include a hyperlink to a virtual scheduling tool akin to the one shown in
In at least some embodiments it is contemplated that if conferees previously accepted a session and a space and then subsequently indicate that they will not attend the session or will not use the accepted space, a server may determine that a smaller or differently afforded space for a co-located conferee subset would be more suitable. Here, the server can identify an optimal space change for a conferee subset and generate space changing e-mails or the like to one or more of the conferee subset in a manner akin to that described above.
In at least some embodiments, after a space is scheduled for use during a subsequent session, session content including records and/or files may be automatically downloaded and cached on a memory device associated with the scheduled space some time prior to or proximate the start time of the session so that content access can be expedited.
Referring now to
The conferee queue section 1778, as described above, includes an image icon of each of the conferees that is currently linked into the session. In some cases where conferee devices include video cameras (see exemplary cameras 1519 in
When a page of a document or the like is opened in space 1774, icons 2014 and 2016 can be used to zoom out and zoom in on the image within the window. Icon 2018 can be used to return to a full page image where the currently viewed page of the document is fully exposed in sharing space 1774 for viewing. Icon 2020 can be selected to expand the sharing window 1774 to cover substantially the entire screen (e.g., so that the document and conferee queues and the on screen tools are removed from the screen). Icon 1782 can be used to invite another conferee or another screen to the session.
Referring still to
In the
When the private window 2050 is opened, additional tools for manipulating the document in the private window are provided at the top of the window. For example, in
Other tools that may be presented for use in the private window are represented as icons in
Referring still to
In other cases conferee annotations made on documents in the private window will remain private and will never be shared with other conferees. This private notation feature is useful as it would enable any conferee to think freely while taking notes on a document without concern for how annotations may be perceived by others.
In still other cases conferee notes and annotations made on documents in the private window may remain private until the conferee that authored the annotations moves a document or a page including the annotations into the sharing window 1776. By enabling a conferee to control when privately authored notes are presented to others, the system may enable a conferee to reveal private thoughts at a staged time as opposed to whenever any other conferee independently views private thought.
In still other cases, notes and annotations made in a private window may remain private and only be made public when a conferee takes some affirmative step to publish those notes to the larger group. For instance, referring again to
Other ways to empower a conferee to control when private annotations and notes are revealed to other conferees are contemplated. For instance, when a document including notes or annotations is moved to a shared window, the system may be programmed to provide a pop up window that presents the option to either show the document with or without annotations and notes. Here, the pop up window may pop up only when an annotation authoring conferee moves a document to the sharing window in some cases.
In other cases the system may be programmed so that, whenever any conferee moves a document to the sharing window, any conferee that has privately annotated an instance of the document being moved is presented with a pop up window to control if the private annotations should be shared. For instance, where five different conferees have privately annotated a ten page document in various ways, when any conferee moves an instance of the document to the sharing window, each of the five conferees that annotated the document may be presented with the pop up window for indicating if the private annotations should be shared. Here and in other cases, one or any subset of the conferees may share their private notes and if two or more share, the private notes of each sharing conferee would be added to the document in the sharing window and to each instance of the document stored by the system. In some cases the annotations may be color coded to the conferees that added the annotations. For instance, where conferee images or videos in conferee queue 1778 are highlighted with different colors, the annotations or notes may be color coded to the conferees that added the annotated or notes.
In still other cases separate notes and annotations on a document page in a private window may be published individually or as a subset of a larger group of annotations on the page. To this end, see again
In some cases a tool for selecting more than one annotation or note but not all on a page for publishing is contemplated. For instance, a lasso type selection tool may be provided so that, if there are five annotations on a page, a conferee can select two of the five by drawing a circle around the two. Thereafter the combined two annotations may be published together without the other three annotations.
Referring again to
To open a document in sharing window 1774, a conferee can select a document icon from queue 1776 and drag into window 1774. Here, the dragging action will cause a ghost version of the document icon to move along to window 1774 while the original document icon remains in queue 1776.
As shown in
When a document is moved to space 1774, the document icon in the queue may be visually distinguished in some fashion. For instance, in
Annotation, note and pointing tools may also be provided for use by conferees within the sharing window 1774. To this end, see
In at least some cases, when any conferee annotates a document page in sharing space 1774, the annotations are added to each instance of the document page shown by each of the other session linked devices essentially in real time and the annotations persist until they are erased. In other cases the annotations may be removed from a page when the document presented in space 1774 is replaced with another document. In still other cases annotations may be removed when a page in space 1774 is replaced by another page in the same document or by another document. In still other cases at least one of the drawing tools may only result in a temporary timed annotation. For instance, if the temporary drawing tool is used to apply annotation 2196 in
To use the post note tool 2211, a conferee can select icon 2211 causing a post note instance (not illustrated in
Referring still to
Referring yet again to
Referring now to
Referring to
Referring to
In some other embodiments it is contemplated that at least some subtle indication of what other conferees are doing during a session may be replicated. For instance, referring again to
Thus, in at least some embodiments, while all conferees linked to a session see the same document and page in sharing windows 1774 on their devices, each conferee has the option to view any queued document in a private window regardless of which document is in the sharing window and regardless of which documents are being viewed by other conferees in private windows.
In at least some cases it is contemplated that a conferee may not want to share a document with others in a session prior to presenting the document at a specific time during the session for some reason. For instance, a conferee may want to reveal a document for the first time during a session to make a specific impression. As another instance, a conferee may be unclear if a document will be of interest during a session and may want the option to not reveal the document until its importance becomes apparent. For example, a conferee may want to have relatively quick access to any of 40 documents during a session but may believe 5 of the 40 are important enough to be added to the common public session queue. As yet another instance, a conferee may want to privately gather many documents in a queue and then, prior to a session, may want to trim back the document set to a smaller subset for posting to the common public queue. To accommodate document gathering in a private way but nevertheless in a way that associates documents with a session, at least some embodiments of the disclosure contemplate providing a private queue for each conferee in addition to the common public queue where a conferee could select one or the other of the private and public queue for posting documents.
Referring to
In addition to being able to present documents in sharing window 1774, in at least some embodiments where conferee devices are equipped with cameras, video of conferees may be presented in space 1774. To this end see
In particularly advantageous embodiments of the present disclosure, prior to commencement of a conferencing session or just thereafter, all documents in the public session queue are transmitted to conferee devices for caching. Where the system server is “aware” of devices that will be used during a session, the server may transmit documents prior to commencement of the session. For instance, if certain conferees always use the same device or link to the same intermediate server when joining a session, document may be pre-transmitted and cached. In other cases, immediately upon a conferee linking to a session, queue documents may be cached. In most cases the caching process will only take tens of seconds and therefore can be accomplished at the beginning of a session while conferees are linking up and waiting for other conferees to join.
A simple caching process 2180 is illustrated in flow chart form in
Referring again to
In other cases, the output view may include at least some indication of who is linked to a session and/or who has control of the session at any specific time. To this end, for instance, see
In other cases at least some of the large common displays used for a session will be interactive including a touch screen or the like so that one or more conferees can interact therewith to manipulate a session in ways described herein. In these cases a view similar to the view shown in
In at least some cases it is contemplated that a location tracking system may be linked to the system server so that locations of personal and portable conferee devices used to link to sessions can be determined. Conferee device location could then be used to help a conferee identify resources available proximate a conferee's location that could be used to enhance a session. For instance, a conferee's device location and hence the conferee's location could be used to identify large display screens in the vicinity of the conferee that are available for linking to a session.
Referring again to
Referring to
It has been recognized that many common large display screens within space generally may have several different uses and the conferencing use may only be one of several uses. For instance, when not used for conferencing, a common screen may simply present a news program or may be programmed to loop through various advertisements or to present an interesting blog or may be programmed to perform any of several other functions. In these cases, a screen identifier like XJ7002 should not be presented all the time and should only be presented when a conferee is seeking a large screen for viewing a presentation. In this regard, referring again to
As described briefly above, in some cases a dongle or other portable wireless transceiver device may be linked to a common display screen to render the display addressable during a session. For instance, see
Referring also to
A process 2260 for using a dongle to link a screen to a session is shown in
It should be clear that in at least some embodiments of the present disclosure, any conferee that is invited to a session or that is linked to an ongoing session has the ability to invite large common screens to the session without having to interrupt the ongoing session and without requiring any authorization from other session conferees. In effect, a conferee can independently change her device viewing configuration without disrupting any other conferees. Similarly, any conferee that is invited to a session or that is linked to an ongoing session has the ability to invite other conferees to the session without seeking authorization from other conferees.
In at least some cases, where server 1512 can track locations of conferee devices used in a session, server 1512 may be programmed to delink from a screen when no conferees are proximate the display only screen. For instance, if conferees leave a conference room and are still participating in a conference session via their portable devices, server 1512 may delink from large display only screens in the conference room so that potentially sensitive documents are not presented in the conference room while conferees are absent.
Referring to
In some cases when a last conferee leaves a space in which a common screen is presenting a session, server 1512 will present a query in a pop up window (not illustrated) asking the conferee if the session should be delinked from the common screen. In this case, the conferee could allow the session to continue on the common screen for some reason. For instance, if the conferee is only leaving the conference space for 5 minutes the conferee may want to continue to present the session on the common screen to avoid the need to re-link to the session. As another instance, there may be conferees in the space viewing the session on the common screen that do not have personal devices linked to the session and the conferee leaving the session may not want to cut off the other unlinked conferees from the session.
In some cases when a last conferee leaves a session, the session may remain linked to the common screen but the common screen may be blanked out or otherwise may show a different scene than the session view until one of the conferees with a device linked to the session again enters the conference space. When a conferee reenters a space, the server may automatically re-present the session in its current state. In the alternative, the server may offer the conferee the choice to represent the session on the common screen in its current state.
In many cases one conferee may have access to two or more screens and may prefer to present some session content on a second personal screen during a session. For instance, many people today use both a laptop and a tablet type computing device (e.g., an Ipad, an Android pad, etc.), where each of the laptop and the tablet device includes a separate display screen. In at least some embodiments it is contemplated that a conferee may be able to invite two personal display devices to a session where the second display device can be used as a private second screen for viewing an additional document view.
Referring again to
Referring to
In the
In the
In addition to being able to invite two personal devices to a session, in at least some embodiments it is contemplated that several proximate common screens may be invited to a session so that two or more document may be viewed on the proximate screens at the same time. In this regard, see
In at least some cases a secondary common screen will only be available in systems where the server mirrors content on all secondary screens so that conferees with two screen access always see the same content on each of the first and second screens. For instance, see
In other embodiments it is contemplated that two sharing windows may be presented on each or at least a subset of conferee device displays or perhaps on all conferee device displays so that first and second documents can be viewed at one time by the subset or all of the conferees. To this end, see
In at least some cases where two large common and proximate displays are linked to a session and a conferee only has access to a single display (e.g., a portable laptop display), the single conferee display may present the screen shot in
In a case where a system server identifies space and associated affordances for use by one or more conferees during a scheduled session, the server may be programmed to automatically identify one or more large common display screens within an identified space and associate the identified screen(s) with the session prior to commencement of the session. Here, instead of requiring a conferee to identify a screen to be linked to the session, the server itself would automatically perform the linking function and initiate the session content download prior to the session commencing. Thus, for instance, where there are two large common displays in a scheduled session space, a first of the displays may be assigned as a primary display for the session and the second display may be assigned as a secondary display for the session in the space. All session content would be cached in a memory associated with the scheduled space and the single cache would be used to drive each of the primary and secondary display screens as described above. Here, as above, one or more conferees could invite one or more additional screens to the session at any time or could disassociate one or more of the screens from the session.
In at least some cases it is contemplated that one or more conference spaces will include many more screens or emissive surface fields than required to present session content. For instance, one space may include four large common display screens arranged about the walls of the space. As another instance, another space may include one large emissive surface that substantially covers a wall where smaller fields or windows can be presented on the emissive surface to simulate primary and secondary session screens. In this case, a server may be programmed to always select a default set of optimized screens or fields for presenting primary and secondary session content. Where a first, second, third and fourth common screens are located on a left wall, the left of a center wall, the right of a center wall and a right wall, respectively, the server may be programmed to select the left and right center screens (e.g., the second and third screens) as primary and secondary session screens automatically.
Each potential conferee may have a preferred screen specification that indicates screen preferences for that specific conferee. For instance, a first conferee may always want a personal laptop device to operate as a primary screen and a smaller personal tablet device to operate as a primary display screen. Here, when the first conferee is using her laptop and tablet devices during a session, the session server may present primary and secondary content on the laptop and tablet screens, respectively, automatically. As a default, if the first conferee in only using one of her table and her laptop during a session, the server may control the one device screen as a primary screen and forego the secondary screen interface tools which are, in that case, not needed.
In at least some embodiments where server 1512 supports audio and video conferencing as well as data conferencing, server 1512 may be programmed to present video of a most audibly active conferee in a session. For instance, where a first conferee speaks for two minutes followed by a second conferee for 18 seconds, the system may present video and audio of the first conferee to all linked devices for the first two minutes followed by audio and video of the second conferee for the next 18 seconds.
Referring again to
Referring again to
In at least some cases, any conferee may be able to replace any conferee video in either of the primary or secondary sharing windows by dragging a document icon from document queue 1776 to one of the primary or secondary windows or by dragging another conferee icon to one of the windows.
It has also been contemplated that there will be times when a subset of conferees linked to a session may want to share a session document amongst themselves without sharing with the larger group for some reason. For instance, referring to
least some cases it is contemplated that, to share the document in private window 2462, the first conferee can simply drag 2460 from window 2462 to the conferee icon 2464 to effectively “drop” the document from window 2462 into a side bar window as shown in
In some embodiments where a side bar is formed between two or more conferees, server 1512 will automatically delink audio between the two or more conferees that are part of the side bar from the larger session so that the side bar conferees can have a semi-private conference independent of the other conferees. In some cases, while the side bar audio is cut out of the larger session, the larger session audio may continue to be presented to the side bar conferees either at normal volume level or at some reduced volume level so that the side bar conferees can still follow the larger session while conducting their side bar. In this case the text window 2474 may not be needed. At any time during a side bar, close icon 2468 may be selected to close the side bar session. When a side bar is closed, in addition to removing the side bar window from conferee screens, full conferee audio would again commence.
It has further been recognized that, in addition to sharing documents like PDFs, JPEGS, Flash videos, etc., conferees in some cases will want to show content within the context of operating applications such as a word processor, a spread sheet application, various drawing programs, etc. One way to enable conferees to share content in operating applications is to allow a conferee to run an application on the conferee's computing device and share the conferee's device “desktop” with other conferees in a sharing window during a session.
In order to maintain a simple and intuitive interface where all features work in a similar fashion, as in the case of “fixed” documents that have a generally persistent form (e.g., PDFs, videos, etc.) and that are added to a session queue prior to sharing, prior to sharing a desktop during a session, an icon for controlling desktop sharing has to be provided in a queue on the session interface. To this end, see again
Referring to
In other cases desktop sharing in a session may be substantially restricted so that only a conferee that adds a desktop icon to a session queue can share the desktop in a sharing window. To this end, desktops are dynamic and therefore, as a conferee uses her desktop, the information presented on the desktop often is not intended for sharing in a session and instead, the desktop has to be prepared for sharing prior to the act of sharing. In this case, if any conferee could select the desktop of another conferee represented in the queue for session sharing at any time, a shared desktop could include information unintended for sharing when the act of sharing occurs. Restricting desktop icon selection to conferees that add a desktop to a session should avoid unintended desktop sharing.
Even though a desktop icon may only be selectable for sharing by a conferee that adds a desktop icon to a session queue, it is useful to include a desktop icon in queues on all session linked interface devices so that all conferees are aware that other conferees are contemplating sharing their desktops. Thus, in at least some cases, desktop icons may be presented in all session queues even though only one conferee (e.g., the conferee associated with a desktop) may be able to select each of the desktop icons for sharing. In at least some cases, while all desktop icons added to the session by any conferee may appear in each document queue, desktop icons that a specific conferee cannot select for sharing (e.g., desktop icons associated with other conferees) may be visually distinguished to indicate inability for the conferee to select. For instance, desktop icons that are not selectable by a conferee may be rendered semi-transparent to indicate that the icons cannot be selected.
In still other cases desktop icons may be added to private queues for each conferee so that only the conferee associated with the desktop sees the icon and can select the desktop icon for sharing. To this end, see again
To move a desktop into the sharing window, a conferee simply drags (or double clicks) the desktop icon 2015 (or 2013 in
Because the device associated with a shared desktop icon is linked to the session and therefore typically has a session interface akin to the interface shown in FIG. 103 open when the desktop is shared, initially the streamed desktop image will often include the interface view in its current state. Where a conferee's device is windows based and the session interface browser is open in a first window, the conferee may maximize a second window and run an application in the second window that would become the streamed desktop image.
To end desktop sharing, the conferee that is sharing the desktop can re-access the session interface in the first window and move any content object including a static document, a conferee video, etc., into the sharing window. Similarly, any other conferee can end desktop sharing by moving a content object into the sharing window. When a conferee other than the conferee that is sharing a desktop image moves another content object into the sharing window 1774, if the conferee that was sharing the desktop image is not viewing the session interface browser in a window, the window including the interface browser is automatically rendered viewable so that the conferee knows that the desktop sharing has ceased.
Where a conferee's device is screen based (e.g., different applications are opened on different screens that can be accessed one at a time as on many smart phones, tablet devices, etc.) and the session interface browser is open in a first screen, upon sharing the desktop image, the conferee may open a second screen and run an application on the second screen that would become the streamed desktop image. To end desktop sharing, the conferee that is sharing the desktop can re-access the session interface on the first screen and move any content object including a static document, a conferee video, etc., into the sharing window. Similarly, any other conferee can end desktop sharing by moving a content object into the sharing window. When a conferee other than the conferee that is sharing a desktop image moves another content object into the sharing window 1774, if the conferee that was sharing the desktop image is not viewing the session interface browser on a screen, the screen including the interface browser is rendered viewable so that the conferee knows that the desktop sharing has ceased and to give the conferee a view of the session that is consistent with the view seen by other linked conferees.
Although not shown, in at least some cases, there may be a way for one or any conferee linked to a session to end desktop sharing by, in effect, blanking content in the sharing window so that no content is shared in that window. In this manner desktop sharing could be ended without requiring sharing of other content in the sharing window to avoid possible confusion if there is no other content that a conferee would like to share at the specific time.
In other cases, when a conferee shares a desktop by dragging the desktop icon into the sharing window on an interface browser, the conferee's device may automatically minimize the interface browser so that whatever is “below” the browser on the conferee's device is immediately viewable on the conferee's device display and therefore is immediately streamed to server 1512 and on to the other session linked devices for sharing. This process eliminates the intermediate step of streaming the session interface to all conferees that has to be minimized prior to sharing the intended desktop content. Thus, here, a conferee intending to share a desktop application would open the desktop application in a second window or on a second screen and prepare the application. For instance, where a drawing program is to be shared, the drawing program would be opened in the second window or on the second screen and then the session interface browser in the first window (e.g., a window in addition to the window in which the session browser is operating) or on the first screen would be used to drag the desktop icon to the sharing window 1774. Upon sharing the desktop, the first window or screen would be minimized and the second window or screen showing the session browser including the prepared drawing application would be shared.
In still other embodiments an intermediate step prior to sharing would occur to enable a conferee to confirm that a desktop is ready to share or to prepare the desktop prior to sharing. For instance, the intermediate step may include presenting the current state of a conferee's desktop in a private view so that the conferee can confirm that the desktop is in condition for sharing. To this end, in
In addition to showing the current state of the conferee's desktop, the
If the desktop is shared, during the sharing process, in at least some embodiments the device sharing the desktop presents a persistent sharing control overlay for ending the desktop sharing activity. To this end see the exemplary screenshot 2255 in
While the system described above requires a conferee to affirmatively add a desktop icon to a queue prior to sharing a desktop from the conferee's device, in other cases a desktop icon may automatically be added to the session document queue or to the private queue for each conferee interface device linked to a session. Thus, for instance, in a case where desktop icons are located in private queues, each of ten conferees linked to a session would have a unique desktop icon in his or her private queue (see again
In some embodiments only a conferee sharing a desktop can control the applications run on the conferee's desktop. For instance, where a conferee shares a word processor document via a session interface, the conferee can manipulate the document by adding text, changing fonts and font size, highlighting text, adding a table, etc., but other conferees viewing the desktop shared in a sharing window 1774 of a session interface can only watch the application being manipulated.
In other cases it is contemplated that any conferee may be able to interact with any application that is shared by another conferee via a shared desktop. To this end see again
As pointing icon 2027 is moved about on the desktop shown in
To enable the conferee associated with icon 2313 to control the streaming desktop shared by the conferee associated with icon 2311, the precise locations of any activity on the image of the shared desktop in space 1774 are identified and commands related to the activities are correlated with the locations and the locations and commands are transmitted to the conferee device that generates the desktop. For instance, referring again to
Upon receiving locations and associated commands, those locations and commands are used by the operating system and applications on the device generating the desktop to drive the operating system and the applications. For instance, the command to generate a pointing icon is used to create a pointing icon on the desktop image at the associated location on the desktop image, the command to click at a point in a word processor document is used to generate a cursor at the associated location, and the commands indicating locations and associated letters that comprise a word are used to drive the word processor program to add the letters at the associated locations in the document. As the commands and associated locations are converted into changes to the desktop image, the resulting new desktop images are streamed to the server 1512 and on to the session linked devices to be shared among the session conferees. In these cases, the session browsers are equipped to obtain commands for controlling the operating system and applications run by a device linked to a session and can transmit those commands to the operating system and applications to be performed to control the operating system and applications to change a desktop image essentially in real time.
In other embodiments where a software application is ubiquitous so that every device or at least a sub-set of devices linked to a session have the application loaded or can obtain free access to the application (e.g., internet based word processors, spread sheets, etc.), when an application is shared, each device may open its own instance of the application and load up a document from the shared application for viewing and interaction. Here, any conferee input from any conferee may be streamed to each session linked device and may be used to update the device specific instance of the application and shared document. This type of system where a shared application is run by each linked device and an instance of a shared document on the application is stored on each linked device, like the cached documents, can expedite the process of sharing the application, the related document and any edits, annotations, etc. made to the document.
In at least some embodiments, it is contemplated that any time a conferee has the session application open in a browser window or on a browser screen, the system may present a session overlay or border for sharing the conferee's desktop image or adding the desktop to the session queue whenever the conferee is viewing a window or screen other than the session window or screen. Thus, for instance, referring again to
Here, the conferee may switch to another application open on yet a different screen and the overlay including icons 2700 and 2702 would be persistently presented. Once the conferee opens an application that the conferee would like to share, the conferee can simply select icon 2702 to start streaming the conferee's current desktop image to the session server and on to the session linked devices for sharing in the sharing window. Once sharing commences, desktop sharing can be halted in any of the ways described above (e.g., selection of a cancel icon 2277 as in
Here, while an application in a screen is being shared, the sharing conferee can control the application to change content and the changes would be presented to other linked conferees. In addition, the sharing conferee could switch to a different screen in which a different application is open and that application would be shared with session linked conferees. When the conferee switches to a different application to share, the overlay shown in
It has been recognized that, instead of sharing content via dynamic applications (e.g., a spreadsheet, a word processor application, a drawing application, etc.) via desktop sharing, in at least some cases a conferee will want to share only an application without sharing an entire desktop. For instance, while a conferee is using a smart phone, a tablet type device, a laptop or the like, oftentimes information will appear on the device screen that is out of the control of the conferee. For example, an instant message window may pop up to present a message from a friend at any time or a meeting or appointment reminder window may pop up at any time. As another instance, a conferee may prefer sharing on an application by application basis as opposed to a dynamic desktop so that the conferee does not inadvertently and unintentionally share an application or content in the application.
In addition, it has been recognized that in many cases conferees will want the ability to privately peruse content or a document associated with a dynamic application that another conferee places in a session queue in a manner akin to that described above with respect to static documents at any time prior to, during or after a session period. Thus, for instance, it would be useful in many cases for a first conferee to add a first word processor document that exists in a dynamic application to a session queue for access via the application during a session and for any conferee invited to the session to be able to view the first word processor document even if the conferee cannot access or control the application on the first conferee's device.
In at least some embodiments it is contemplated that the system will enable any conferee to add a document or file to a queue where, at the time the document or file is added to the queue, the document or file only exists as content in a dynamic application. Here, upon adding a document to the queue, in at least some cases, the document is added in a format that captures the content of the document in a persistent fashion which is independently accessible by any conferee at any time unless the document is affirmatively removed from the session queue. For instance, in at least some cases a PDF or JPEG of the document may be generated and added to the queue to be accessed by any conferee. In this case, the PDF or other format document in the queue may represent the document itself or, in other cases, may represent screen shots of the output of the dynamic application including the content (e.g., a specific document) to be shared presented within the application itself. Documents generated for the queue in this fashion are cached for quick access by any of the session linked devices.
Once an application and associated content is added to the session queue as a document, in addition to any conferee being able to open the document in a private window, any conferee may also move the document into the sharing window via double clicking the document, dragging an icon associated with the document from the queue to the sharing window, etc. When the document is opened in a private window, in at least some embodiments, the document is opened in a static form as opposed to within the application associated with the document so that, when in private view, none of the conferees can use the associated application to alter the content of the document.
In at least some cases, whenever any conferee opens a document associated with a dynamic application in the sharing window, the application associated therewith is automatically run and the document is opened within the application in the sharing window so that any conferee may edit the document using the application in the sharing window. Here, when a document is edited in a sharing window, in at least some cases, the edits to the document are stored on the device of the conferee that added the original document to the queue and a new persistent (e.g., a PDF) version of the document is generated and stored in the queue as part of the session record for subsequent access.
In other embodiments, when a document or file associated with a dynamic application is added by a first conferee to a session queue, only the first conferee may be able to edit the document despite the capability of other conferees to access the shared persistent version of the document. For instance, when a word processor application and associated word process document is shared by a first conferee by placing the application/document in a session queue and the document is represented as a PDF (e.g., in a persistent form), conferees other than the first conferee may only be able to access the PDF version of the document. Here, when a second conferee shares the document in the sharing window, only the PDF version of the document may be presented.
If, however, the first conferee shares the document from the queue by dragging the document to the sharing window, the system may automatically cause the first conferee's device to run the application associated with the shared document, load the shared document and start to stream the shared document to the session server to be passed on to the other session linked devices. Here, once the document is opened in the associated application and the application and document are being streamed to the other linked devices, the first conferee can used the conferee's device to manipulate or edit the document within the application and those manipulations are shared with the other conferees via their devices essentially in real time.
In this case, because only the application as opposed to the first conferee's complete desktop is shared, any pop up windows will only appear on the first conferee's device and not within the shared session window or space. Similarly, if the first conferee opens a second screen or window to access a second application while the document and first application open in a first screen or window are being shared, the contents in the second screen or window are not shared.
In at least some embodiments it is contemplated that any conferee may be able to add two or more applications and related content (e.g., a document) to a session queue. For instance, a first conferee may add each of a first word processor document in a word processor application and a first spreadsheet in a spreadsheet application to a session queue. Thereafter, the first conferee may be able to access any of the applications in the queue at any time to open the application and related document for private viewing, sharing, etc.
Referring again to
Referring still to
Referring yet again to
In at least some cases it may be that a window overlay or border including session control icons would only be provided for a top window when windows are layered on top of each other to avoid confusion or so that space on a display screen is not taken up by too many session control icons. Thus, for instance, in
In at least some cases, after a conferee shares an application and content associated therewith, the conferee can navigate to other windows or screens including the session interface or some other application program to perform other tasks while the shared application and content are continually presented via the shared windows. Thus, for example, in
Referring to
Referring still to
It has been recognized that a smart phone or tablet type device or even a camera that is capable of wireless communication represent particularly advantageous devices for generating content to be shared in a session. To this end, a session application may be loaded on to a smart phone that enables a conferee to quickly and easily upload images obtained via the phone camera to a session queue. Referring to
To add one or more images to a queue, first the conferee uses screen arrows 2510 and 2512 or some other on screen navigation tool like a swiping action to locate the images to be added to the queue. Images to be added can be tagged via selection of an on screen check box 2514. Once images to add to the queue have been selected, the conferee selects session upload icon 2508. In at least some embodiments, when icon 2508 is selected, an interface for selecting one of several existing session queues or to start a new session queue is provided as shown in
It has also been recognized that it would be helpful if the conferencing system were able to distinguish new files in a queue from old files. Here, the terms “new” and “old” may mean different things in different systems. For instance, a new document to a specific conferee may mean a document added to the queue since the last time the conferee accessed the session queue. As another instance, a new document to a specific conferee may mean a document that has never been opened while the conferee was logged into a session regardless of whether or not the document was in the queue the previous time the conferee logged into the session. As still one other instance, even if a document has been viewed by a conferee, if the document has been changed via annotation, addition of a note, etc., the document may be considered “new” to a conferee.
In at least some embodiments documents that are new to a conferee may be highlighted or otherwise visually distinguished in some fashion. For instance, in
Where several conferees are logged into a session at the same time, the highlighting to indicate “new” documents may be different for each conferee. For instance, a first conferee may have been logged in for each of five conferences related to a session while a second conferee only logged in for two of the five. In this case it is highly likely that the first conferee has viewed more queue documents than the second conferee and therefore the second conferee would have more document icons highlighted as “new” than the first conferee.
Instead of highlighting new documents in the session queue, the system may present two queues, one including new documents and the other including old documents. In this case the interface including both queues may look a lot like the interface in
In some embodiments a conferee may be able to cause the system to highlight documents added to a queue by that conferee or any one conferee or sub-set of conferees so that those documents can be easily distinguished. For instance, see
It has further been recognized that it would be advantageous for at least some conferees to be able to look back at session conferences/meetings and see the sequence of various aspects of document manipulation. For instance, a conferee may want to see the sequence by which documents have been added to a session queue, the sequence in which documents have been accessed in session conferences, who posted and who accessed the documents, etc. To this end, in at least some embodiments a “History” icon 2548 as shown in
When icon 2548 is selected, referring also to
Meeting icons 2582 are also provided on the view that indicate specific points in time at which session conferences occurred. Here, a session conference may
include any session during which two or more conferees were logged on to a conference at the same time, during which more than half of the conferees associated with a session logged on, during which one or more documents have been shared among at least two or more conferees, or any other criteria that indicates a threshold level of activity. Each icon 2582 may operate as a hyperlink to other information about a session conference including a list of conferees that attended, documents reviewed and applications run, times related to document sharing and a log of additional activities.
Referring still to
Referring to
In any of the historical views shown in
Second, the system enables conferees to add content including documents and files to a session queue at any time including prior to a session conference, during a session conference or after a conference has ended. The queue can persist indefinitely and operate as a repository for any content that may be of interest to conferees that participate in a session. The queue can be added to or trimmed down to only maintain what is important to conferees at any time.
Third, in at least some cases the system enables any conferee to add new conferees to a session without requiring consent from any other conferees and without disturbing other conferees associated with a session. For instance, where five people are participating in a session conference, a first of the five can invite a sixth conferee independent of the other four conferees. As another instance, the first conferee could initiate a separate session conference with the sixth conferee without the other four conferees attending so that the first conferee could get the sixth conferee up to speed on session activities independent of the other conferees.
Fourth, in at least some embodiments, any conferee can add additional display screens or devices to a session independent of other conferees and without disturbing other conferees. For instance, a first conferee using a hand held device like a smart phone, a tablet, etc., may, during a session conference, move to a location where the first conferee has access to a large flat panel display screen. Recognizing the advantage of viewing a session via a large display screen, the first conferee can invite the screen via an address or identifier associated with the screen to the session conference. Thereafter, shared documents and files are also presented on the large screen that was added to the session.
Fifth, the system may help a conferee find an available large display screen that can be invited to a session. To this end, the locations of many personal devices can be tracked as a user moves about in a building, on a campus, etc. when a conferee logs on to a session or prior to when a conferee is scheduled to attend a session, the system may identify the location of the conferee's device as well as the locations of available large display screens and may offer to schedule or commence use of one or more screens by the conferee during the session.
Sixth, at least some embodiments of the disclosed system enable each conferee to separately view queued session documents in private windows while still having the ability to view a currently shared document in a sharing window. This enables each conferee to view and examine one document when the conferee independently determines that the document may be of interest without disturbing other conferees.
Seventh, in some embodiments private queues are provided for each conferee to enable conferees to gather possible documents for a session without worrying about others viewing the documents and either being confused or passing judgment. Private queue documents can be shared subsequently in session in a sharing window and may be moved to the session queue for access by all.
Eighth, in some systems all queued documents are cached by all conferee devices that link to a session to expedite sharing, moving between documents, etc. When a session is over, the cached documents are removed from the conferee device memories and instances of the queued documents are only persistently stored by the session server.
Ninth, in at least some embodiments, conferees can share their device desktops (e.g., the current screen shot on their device display) with other conferees in a sharing window. Here, as in the case of sharing documents, any conferee can assume control of the sharing window from other conferee simply by opening the conferee's desktop in the sharing window.
It has further been recognized that once a server or set of system servers have access to space/affordance specifications, space and employee or conferee schedules, session schedules and session content, other useful services and products can be provided for helping people manage their time efficiently and effectively. For instance, one additional service may be a day planner service that helps a user plan her daily activities based on her schedule, tasks to perform, available space and affordances, locations of other people, etc. In this regard, assume that, in addition to scheduled activities like conference session, telepresence meetings, appointments, etc., a first employee has a weekly list of aspirational tasks that the first employee would like to accomplish during the week during unscheduled time periods. Here, the phrase “aspirational tasks” is used to refer to tasks that the first employee wants to accomplish but that have not formally been associated with a time slot during which to complete the tasks. Here, if a task is not accomplished, the task simply remains on the list until affirmatively removed by the first employee. The first employee's task list may be updated at any time and a system server may automatically schedule a recurring time for the first employee to update the task list by adding tasks, deleting tasks, reprioritizing tasks, etc. For example, the recurring time may always be at 9 AM on Saturday morning. In other cases, a system server may recognize when the first employee has some unscheduled time in her schedule and may present the task list for consideration and updating during an unscheduled period. In some cases where the first employee wants to see her task list once a week, the server may wait until the next unscheduled period after 7 days has passed since the last time the first conferee considered her task list and may present the list or a link (e.g., a hyperlink via an e-mail notice) to the task list for consideration at that time.
For the purposes of this example, assume that for Lisa Dempsy, the first employee, a task list includes (1) Individually review session 00001 content; (2) Review session 00003 content with John Sargent prior to the end of the week; (3) Teleconference with Tom Giles; (4) Confer with Jamie White—Session 00004; and (5) Make travel arrangements for June trip to Shanghai; and (6) Call ABC corporation purchasing agent about new agreement. Also assume that a server is programmed to review the first employee's schedule every morning at 8 AM and to suggest activities for unscheduled periods. Also assume that the first employee's schedule indicates that, on Tuesday, May 6, the first employee has several scheduled activities but that there are first and second one hour periods open in the first employees schedule between 9 AM and 10 AM and between 3 PM and 4 PM, respectively In at least some embodiments of the present disclosure, the system server that manages the day planner service may be programmed to identify the first and second open periods and identify the tasks in the first employee's task list and may suggest one or more of the task list tasks to fill one or more of the first and second open periods. In addition, the server may be programmed to use the first conferee's schedule to identify the first employee's locations during the first and second open periods and may also access a facility space schedule and identify open spaces proximate the scheduled locations for the first employee during the first and second open periods. The server may also identify resources or affordances associated with the open spaces. The server may also examine the tasks on the task list and determine if any particular resources are required or may be optimal for facilitating any of the tasks. For instance, in the case of the second exemplary task above (e.g., Review session 00003 content with John Sargent prior to the end of the week), a space including at least one large common display screen may be optimal, in the case of the third exemplary task above (e.g., Teleconference with Tom Giles), a space including a telepresence system including a camera, speakers, special lighting and a large display screen may be optimal.
In this example, the server may send an e-mail to the first conferee at 8 AM each day as scheduled indicating open schedule times during the day for the first employee as well as the first employee's task list supplemented by additional information such as a suggested space or spaces for at least a subset of the tasks on the list that are optimized and located near where the first employee is scheduled to be during an associated unscheduled time slot. Where a task requires one or more employees or other persons in addition to the first employee, the system may also automatically check schedules for each of the other employees and select a time slot for the task based at least in part on the schedules of multiple employees. Thus, in the example described above, a system server may, for each open slot or period in the first employee's schedule for a specific day, present a list of task options that may be slotted for the open time where the resources required or needed to optimize use of the time for the specific tasks are all available.
Referring to
In
Location descriptor 3034 indicates a suggested location or space that can be reserved for Lisa Dempsy to facilitate an associated task 3030. Here, the system server will identify a likely optimal location for the task based on, among other things, Lisa Dempsy's scheduled locations just prior to and just after the open time slot 3004 as well as resources needed to complete the task 3030. Here, resources to complete the task may include affordances within a space as well as other employees needed to complete the task. For instance, where a task requires a telepresence system, an identified space would optimally include a telepresence system. In
In
For at least some tasks, an employee's personal portable device may work well to complete the task and in those cases, the task may always be presented as a selectable option on list 3008. Thus, for instance, tasks 3018 and 3020 in
In addition to the tasks from an employee's task list, other options for an open schedule slot may also be presented. For instance in
Leave open option 3026 can be selected to simply leave unscheduled time slot 3004 open. Other option 3028 can be selected to specify some other activity during slot 3004.
Once an option from list 3008 is selected for slot 3004, the option is entered into the slot 3004 and the appearance of the slot is altered to indicate a different status. To this end, where the conference with Jamie White option 3016 in
Referring still to
Referring still to
Referring yet again to
Once Lisa Dempsy is finished selecting tasks and options for slots in her Daily schedule, “save” icon 3060 can be selected to store the selections. After selections are stored, in the case of tasks that involve session content review, just prior to the scheduled time slot, session content may be cached within a memory associated with the space so that when Lisa Dempsy enters the space at the scheduled time, the session content can be quickly accessed and reviewed.
While not shown, it is contemplated that tasks on an employee's task list may be prioritized in some fashion so that when tasks are presented to the employee each morning at 8 AM, high priority tasks are placed at the top of the list. Similarly, a due date/time may be assigned to some or each of the tasks on a task list in some embodiments where the date/time specify at least a target time at which the task should be completed. Here, the date/time may be used by a system server to prioritize tasks within a list or even to reduce a task list down to a smaller number of high priority tasks based on when they need to be accomplished.
While described as a day planner service, it should be appreciated that the task presentation process may be performed at other times such as, for instance, weekly, monthly, etc. In addition, while the task list is described above as being presented at a specific time each day, in other embodiments the time at which the list is presented may depend upon some sensed or perceived parameter. For instance, where a service user is scheduled to be in a meeting at the time the task list is to be presented, a system server may delay presenting the task list until the user has some unscheduled time to consider the list. As another instance, where the service user is scheduled at the time the task list is to be presented, the server may identify an earlier time temporally proximate the time at which the list is to be presented and may present the list at the earlier time. In still other cases, real time sensed activities of the service user may be sensed via cameras or other sensor devices within space and the list may be presented at a time at which a server discerns that the user is free to consider the list and her schedule. The particular embodiments disclosed above are illustrative only, as the invention may be modified and practiced in different but equivalent manners apparent to those skilled in the art having the benefit of the teachings herein. Furthermore, no limitations are intended to the details of construction or design herein shown, other than as described in the claims below. It is therefore evident that the particular embodiments disclosed above may be altered or modified and all such variations are considered within the scope and spirit of the invention. Accordingly, the protection sought herein is as set forth in the claims below.
Thus, the invention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the following appended claims. To apprise the public of the scope of this invention, the following claims are made:
This application is a continuation of U.S. patent application Ser. No. 16/842,152, which is titled “Method and System for Facilitating Collaboration Sessions,” which was filed on Apr. 7, 2020, which is a continuation of U.S. patent application Ser. No. 14/640,288, which is titled “Method and System for Facilitating Collaboration Sessions,” which was filed on Mar. 6, 2015, which is related to and claims the benefit of priority to U.S. provisional patent application No. 62/059,602, which is titled “Method and System for Locating Resources and Communicating Within an Enterprise,” and which was filed on Oct. 3, 2014, U.S. provisional patent application No. 61/994,372, which is titled “Method and System for Facilitating Collaboration Sessions,” and which was filed on May 16, 2014, and U.S. provisional patent application No. 61/949,696 which is titled “Method and System for Initiation and Creation of Collaboration Session,” and which was filed on Mar. 7, 2014.
Number | Name | Date | Kind |
---|---|---|---|
4751399 | Koehring | Jun 1988 | A |
5050077 | Vincent | Sep 1991 | A |
5086385 | Launey | Feb 1992 | A |
5097672 | Takenaka | Mar 1992 | A |
5293097 | Elwell | Mar 1994 | A |
5406176 | Sugden | Apr 1995 | A |
5455487 | Mix | Oct 1995 | A |
5476221 | Seymour | Dec 1995 | A |
5489827 | Xia | Feb 1996 | A |
5717856 | Carleton | Feb 1998 | A |
5872924 | Nakayama | Feb 1999 | A |
5898579 | Boys | Apr 1999 | A |
5915091 | Ludwig | Jun 1999 | A |
5933597 | Hogan | Aug 1999 | A |
6038542 | Ruckdashel | Mar 2000 | A |
6064976 | Tolopka | May 2000 | A |
6100663 | Boys | Aug 2000 | A |
6140921 | Baron | Oct 2000 | A |
6144942 | Ruckdashel | Nov 2000 | A |
6177905 | Welch | Jan 2001 | B1 |
6266612 | Dussell | Jul 2001 | B1 |
6266691 | Watanabe | Jul 2001 | B1 |
6288716 | Humpleman | Sep 2001 | B1 |
6297621 | Hui | Oct 2001 | B1 |
6304068 | Hui | Oct 2001 | B1 |
6342906 | Kumar | Jan 2002 | B1 |
6360101 | Irvin | Mar 2002 | B1 |
6361173 | Vlahos | Mar 2002 | B1 |
6424623 | Borgstahl | Jul 2002 | B1 |
6434158 | Harris | Aug 2002 | B1 |
6434159 | Woodward | Aug 2002 | B1 |
6466234 | Pyle | Oct 2002 | B1 |
6487180 | Borgstahl | Nov 2002 | B1 |
6501364 | Hui | Dec 2002 | B1 |
6532218 | Shaffer | Mar 2003 | B1 |
6546419 | Humpleman | Apr 2003 | B1 |
6548967 | Dowling | Apr 2003 | B1 |
6587782 | Nocek | Jul 2003 | B1 |
6691029 | Hughes | Feb 2004 | B2 |
6724159 | Gutta | Apr 2004 | B2 |
6760412 | Loucks | Jul 2004 | B1 |
6760749 | Dunlap | Jul 2004 | B1 |
6803744 | Sabo | Oct 2004 | B1 |
6839417 | Weisman | Jan 2005 | B2 |
6850837 | Paulauskas | Feb 2005 | B2 |
6888438 | Hui | May 2005 | B2 |
6906495 | Cheng | Jun 2005 | B2 |
7000660 | Chen | Feb 2006 | B2 |
7003728 | Berque | Feb 2006 | B2 |
7027995 | Kaufman | Apr 2006 | B2 |
7042196 | Ka Lai | May 2006 | B2 |
7043532 | Humpleman | May 2006 | B1 |
7084758 | Cole | Aug 2006 | B1 |
7124164 | Chemtob | Oct 2006 | B1 |
7139976 | Kausik | Nov 2006 | B2 |
7149776 | Roy | Dec 2006 | B1 |
7163263 | Kurrasch | Jan 2007 | B1 |
7180503 | Burr | Feb 2007 | B2 |
7212414 | Baarman | May 2007 | B2 |
7221937 | Lau | May 2007 | B2 |
7239110 | Cheng | Jul 2007 | B2 |
7248017 | Cheng | Jul 2007 | B2 |
7266383 | Anderson | Sep 2007 | B2 |
7268682 | Bialecki, Jr. | Sep 2007 | B2 |
7293243 | Ben-Shachar | Nov 2007 | B1 |
7340769 | Baugher | Mar 2008 | B2 |
7370269 | Prabhu | May 2008 | B1 |
7393053 | Kurrasch | Jul 2008 | B2 |
7394405 | Godden | Jul 2008 | B2 |
7421069 | Vernon | Sep 2008 | B2 |
7474058 | Baarman | Jan 2009 | B2 |
7475078 | Kiilerich | Jan 2009 | B2 |
7495414 | Hui | Feb 2009 | B2 |
7499462 | MacMullan | Mar 2009 | B2 |
7518267 | Baarman | Apr 2009 | B2 |
7519664 | Karaki | Apr 2009 | B2 |
7522878 | Baarman | Apr 2009 | B2 |
7525283 | Cheng | Apr 2009 | B2 |
7526525 | Hagale | Apr 2009 | B2 |
7554316 | Stevens | Jun 2009 | B2 |
7554437 | Axelsen | Jun 2009 | B2 |
7576514 | Hui | Aug 2009 | B2 |
7577522 | Rosenberg | Aug 2009 | B2 |
7590941 | Wee | Sep 2009 | B2 |
7605496 | Stevens | Oct 2009 | B2 |
7612528 | Baarman | Nov 2009 | B2 |
7615936 | Baarman | Nov 2009 | B2 |
7619366 | Diederiks | Nov 2009 | B2 |
7622891 | Cheng | Nov 2009 | B2 |
7634533 | Rudolph | Dec 2009 | B2 |
7639110 | Baarman | Dec 2009 | B2 |
7639514 | Baarman | Dec 2009 | B2 |
7639994 | Greene | Dec 2009 | B2 |
7643312 | Vanderelli | Jan 2010 | B2 |
7649454 | Singh | Jan 2010 | B2 |
7664870 | Baek | Feb 2010 | B2 |
7689655 | Hewitt | Mar 2010 | B2 |
7693935 | Weber | Apr 2010 | B2 |
7707249 | Spataro | Apr 2010 | B2 |
7714537 | Cheng | May 2010 | B2 |
7715831 | Wakefield | May 2010 | B2 |
7734690 | Moromisato | Jun 2010 | B2 |
7735918 | Beck | Jun 2010 | B2 |
7741734 | Joannopoulos | Jun 2010 | B2 |
7810025 | Blair | Oct 2010 | B2 |
7825543 | Karalis | Nov 2010 | B2 |
7844306 | Shearer | Nov 2010 | B2 |
7847675 | Thyen | Dec 2010 | B1 |
7849135 | Agrawal | Dec 2010 | B2 |
7863861 | Cheng | Jan 2011 | B2 |
7868482 | Greene | Jan 2011 | B2 |
7868587 | Stevens | Jan 2011 | B2 |
7869941 | Coughlin | Jan 2011 | B2 |
7873470 | Baba | Jan 2011 | B2 |
7881233 | Bieselin | Feb 2011 | B2 |
7885925 | Strong | Feb 2011 | B1 |
7893953 | Krestakos | Feb 2011 | B2 |
7896436 | Kurrasch | Mar 2011 | B2 |
7898105 | Greene | Mar 2011 | B2 |
7904209 | Podgorny | Mar 2011 | B2 |
7915858 | Liu | Mar 2011 | B2 |
D636333 | Kulikowski | Apr 2011 | S |
7925308 | Greene | Apr 2011 | B2 |
7925525 | Chin | Apr 2011 | B2 |
7932618 | Baarman | Apr 2011 | B2 |
7941133 | Aaron | May 2011 | B2 |
7941753 | Meisels | May 2011 | B2 |
7948448 | Hutchinson | May 2011 | B2 |
7952324 | Cheng | May 2011 | B2 |
7953369 | Baarman | May 2011 | B2 |
7965859 | Marks | Jun 2011 | B2 |
7973635 | Baarman | Jul 2011 | B2 |
7973657 | Ayed | Jul 2011 | B2 |
7989986 | Baarman | Aug 2011 | B2 |
7999669 | Singh | Aug 2011 | B2 |
8004235 | Baarman | Aug 2011 | B2 |
8021164 | Epstein | Sep 2011 | B2 |
8022576 | Joannopoulos | Sep 2011 | B2 |
8024661 | Bibliowicz | Sep 2011 | B2 |
8026908 | Ku | Sep 2011 | B2 |
8028020 | Huck | Sep 2011 | B2 |
8032705 | Klitsner | Oct 2011 | B2 |
8035255 | Kurs | Oct 2011 | B2 |
8035340 | Stevens | Oct 2011 | B2 |
8039995 | Stevens | Oct 2011 | B2 |
8040103 | Hui | Oct 2011 | B2 |
8041586 | Jethani | Oct 2011 | B2 |
8049301 | Hui | Nov 2011 | B2 |
8054854 | Poslinski | Nov 2011 | B2 |
8055310 | Beart | Nov 2011 | B2 |
8055644 | Crowley | Nov 2011 | B2 |
8057069 | Mangiardi | Nov 2011 | B2 |
8061864 | Metcalf | Nov 2011 | B2 |
8069100 | Taylor | Nov 2011 | B2 |
8069465 | Bartholomay | Nov 2011 | B1 |
8073614 | Coughlin | Dec 2011 | B2 |
8076800 | Joannopoulos | Dec 2011 | B2 |
8076801 | Karalis | Dec 2011 | B2 |
8081083 | Hinterlong | Dec 2011 | B2 |
8084889 | Joannopoulos | Dec 2011 | B2 |
8091029 | Gay | Jan 2012 | B1 |
8093758 | Hussmann | Jan 2012 | B2 |
8097983 | Karalis | Jan 2012 | B2 |
8097984 | Baarman | Jan 2012 | B2 |
8102235 | Hui | Jan 2012 | B2 |
8106539 | Schatz | Jan 2012 | B2 |
8112100 | Frank | Feb 2012 | B2 |
8115448 | John | Feb 2012 | B2 |
8116681 | Baarman | Feb 2012 | B2 |
8116683 | Baarman | Feb 2012 | B2 |
8117262 | Kumar | Feb 2012 | B2 |
8120311 | Baarman | Feb 2012 | B2 |
8126974 | Lyle | Feb 2012 | B2 |
8127155 | Baarman | Feb 2012 | B2 |
8129864 | Baarman | Mar 2012 | B2 |
8138875 | Baarman | Mar 2012 | B2 |
8140701 | Rajan | Mar 2012 | B2 |
8141143 | Lee | Mar 2012 | B2 |
8149104 | Crum | Apr 2012 | B2 |
8150449 | Onozawa | Apr 2012 | B2 |
8159090 | Greene | Apr 2012 | B2 |
8164222 | Baarman | Apr 2012 | B2 |
8170946 | Blair | May 2012 | B2 |
8174152 | Baumann | May 2012 | B2 |
8180663 | Tischhauser | May 2012 | B2 |
8188856 | Singh | May 2012 | B2 |
8200520 | Chen | Jun 2012 | B2 |
8204272 | Marks | Jun 2012 | B2 |
8204935 | Vernon | Jun 2012 | B2 |
8209618 | Garofalo | Jun 2012 | B2 |
8214061 | Westrick, Jr. | Jul 2012 | B2 |
8219115 | Nelissen | Jul 2012 | B1 |
8222827 | Kuennen | Jul 2012 | B2 |
8223508 | Baarman | Jul 2012 | B2 |
8228025 | Ho | Jul 2012 | B2 |
8228026 | Johnson | Jul 2012 | B2 |
8234189 | Taylor | Jul 2012 | B2 |
8238125 | Fells | Aug 2012 | B2 |
8239890 | Kooman | Aug 2012 | B2 |
8259428 | Mollema | Sep 2012 | B2 |
8262244 | Metcalf | Sep 2012 | B2 |
8266535 | Brown | Sep 2012 | B2 |
8269456 | Hui | Sep 2012 | B2 |
8270320 | Boyer | Sep 2012 | B2 |
8280453 | Beart | Oct 2012 | B2 |
8280948 | Chen | Oct 2012 | B1 |
8290479 | Aaron | Oct 2012 | B2 |
8296669 | Madonna | Oct 2012 | B2 |
8299753 | Hui | Oct 2012 | B2 |
8300784 | Choi | Oct 2012 | B2 |
8301077 | Xue | Oct 2012 | B2 |
8301079 | Baarman | Oct 2012 | B2 |
8301080 | Baarman | Oct 2012 | B2 |
8304935 | Karalis | Nov 2012 | B2 |
8315561 | Baarman | Nov 2012 | B2 |
8315621 | Lau | Nov 2012 | B2 |
8315650 | Lau | Nov 2012 | B2 |
8324759 | Karalis | Dec 2012 | B2 |
8327410 | Andersen | Dec 2012 | B2 |
8338990 | Baarman | Dec 2012 | B2 |
8339274 | Van De Sluis | Dec 2012 | B2 |
8341532 | Ryan | Dec 2012 | B2 |
8346166 | Baarman | Jan 2013 | B2 |
8346167 | Baarman | Jan 2013 | B2 |
8350971 | Malone | Jan 2013 | B2 |
8351856 | Baarman | Jan 2013 | B2 |
8352296 | Taneja | Jan 2013 | B2 |
8354821 | Cheng | Jan 2013 | B2 |
8362651 | Hamam | Jan 2013 | B2 |
8364400 | Coughlin | Jan 2013 | B2 |
8370516 | Salesky | Feb 2013 | B2 |
8373310 | Baarman | Feb 2013 | B2 |
8373386 | Baarman | Feb 2013 | B2 |
8375103 | Lin | Feb 2013 | B2 |
8380255 | Shearer | Feb 2013 | B2 |
8380786 | Hoffert | Feb 2013 | B2 |
8385894 | Takehara | Feb 2013 | B2 |
8390669 | Catchpole | Mar 2013 | B2 |
8395282 | Joannopoulos | Mar 2013 | B2 |
8395283 | Joannopoulos | Mar 2013 | B2 |
8400017 | Kurs | Mar 2013 | B2 |
8400018 | Joannopoulos | Mar 2013 | B2 |
8400019 | Joannopoulos | Mar 2013 | B2 |
8400020 | Joannopoulos | Mar 2013 | B2 |
8400021 | Joannopoulos | Mar 2013 | B2 |
8400022 | Joannopoulos | Mar 2013 | B2 |
8400023 | Joannopoulos | Mar 2013 | B2 |
8400024 | Joannopoulos | Mar 2013 | B2 |
8407289 | Chen | Mar 2013 | B2 |
8410636 | Kurs | Apr 2013 | B2 |
8415897 | Choong | Apr 2013 | B2 |
8421407 | Johnson | Apr 2013 | B2 |
8423288 | Stahl | Apr 2013 | B2 |
8432062 | Greene | Apr 2013 | B2 |
8438333 | Edwards, III | May 2013 | B2 |
8441154 | Karalis | May 2013 | B2 |
8441354 | Padmanabhan | May 2013 | B2 |
8443035 | Chen | May 2013 | B2 |
8446046 | Fells | May 2013 | B2 |
8446450 | Mauchly | May 2013 | B2 |
8450877 | Baarman | May 2013 | B2 |
8456509 | Khot | Jun 2013 | B2 |
8457888 | Ranford | Jun 2013 | B2 |
8461719 | Kesler | Jun 2013 | B2 |
8461720 | Kurs | Jun 2013 | B2 |
8461721 | Karalis | Jun 2013 | B2 |
8461722 | Kurs | Jun 2013 | B2 |
8461817 | Martin | Jun 2013 | B2 |
8466583 | Karalis | Jun 2013 | B2 |
8471410 | Karalis | Jun 2013 | B2 |
8473571 | Penner | Jun 2013 | B2 |
8476788 | Karalis | Jul 2013 | B2 |
8482158 | Kurs | Jul 2013 | B2 |
8482160 | Johnson | Jul 2013 | B2 |
8484494 | Siegel | Jul 2013 | B2 |
8487480 | Kesler | Jul 2013 | B1 |
8489329 | Coughlin | Jul 2013 | B2 |
8494143 | DeJana | Jul 2013 | B2 |
8497601 | Hall | Jul 2013 | B2 |
8499119 | Balraj | Jul 2013 | B2 |
8504663 | Lowery | Aug 2013 | B2 |
8508077 | Stevens | Aug 2013 | B2 |
8510255 | Fadell | Aug 2013 | B2 |
8519668 | Hui | Aug 2013 | B2 |
8527549 | Cidon | Sep 2013 | B2 |
8527610 | Koike | Sep 2013 | B2 |
8528014 | Reynolds | Sep 2013 | B2 |
8531153 | Baarman | Sep 2013 | B2 |
8531294 | Slavin | Sep 2013 | B2 |
8533268 | Vernon | Sep 2013 | B1 |
8538330 | Baarman | Sep 2013 | B2 |
D692010 | Verghese | Oct 2013 | S |
8552592 | Schatz | Oct 2013 | B2 |
8554476 | Coughlin | Oct 2013 | B2 |
8554477 | Coughlin | Oct 2013 | B2 |
8558411 | Baarman | Oct 2013 | B2 |
8558693 | Martin | Oct 2013 | B2 |
8560024 | Beart | Oct 2013 | B2 |
8560128 | Ruff | Oct 2013 | B2 |
8560232 | Coughlin | Oct 2013 | B2 |
8567048 | Singh | Oct 2013 | B2 |
8569914 | Karalis | Oct 2013 | B2 |
8587153 | Schatz | Nov 2013 | B2 |
8587154 | Fells | Nov 2013 | B2 |
8587155 | Giler | Nov 2013 | B2 |
8593105 | Baarman | Nov 2013 | B2 |
8594291 | Bieselin | Nov 2013 | B2 |
8596716 | Caruso | Dec 2013 | B1 |
8598721 | Baarman | Dec 2013 | B2 |
8598743 | Hall | Dec 2013 | B2 |
8600670 | Kim | Dec 2013 | B2 |
8604714 | Mohan | Dec 2013 | B2 |
8610400 | Stevens | Dec 2013 | B2 |
8610530 | Singh | Dec 2013 | B2 |
8618696 | Kurs | Dec 2013 | B2 |
8618749 | Kuennen | Dec 2013 | B2 |
8618770 | Baarman | Dec 2013 | B2 |
8620484 | Baarman | Dec 2013 | B2 |
8620841 | Filson | Dec 2013 | B1 |
8621245 | Shearer | Dec 2013 | B2 |
D697477 | Jonas, III | Jan 2014 | S |
8622314 | Fisher | Jan 2014 | B2 |
8629578 | Kurs | Jan 2014 | B2 |
8629755 | Hashim-Waris | Jan 2014 | B2 |
8630741 | Matsuoka | Jan 2014 | B1 |
8631126 | Veiseh | Jan 2014 | B2 |
8638062 | Baarman | Jan 2014 | B2 |
8643326 | Campanella | Feb 2014 | B2 |
8650600 | Ogle | Feb 2014 | B2 |
8653927 | Singh | Feb 2014 | B2 |
8659417 | Trundle | Feb 2014 | B1 |
8660790 | Stahl | Feb 2014 | B2 |
8665310 | Verthein | Mar 2014 | B2 |
8666051 | Gilzean | Mar 2014 | B2 |
8667401 | Lozben | Mar 2014 | B1 |
8667452 | Verghese | Mar 2014 | B2 |
8669676 | Karalis | Mar 2014 | B2 |
8669844 | Walker | Mar 2014 | B2 |
8670018 | Cunnington | Mar 2014 | B2 |
8680960 | Singh | Mar 2014 | B2 |
8683345 | Lee | Mar 2014 | B2 |
8686598 | Schatz | Apr 2014 | B2 |
8686647 | Ono | Apr 2014 | B2 |
8687452 | Kishibe | Apr 2014 | B2 |
8688100 | Aaron | Apr 2014 | B2 |
8690362 | Wendt | Apr 2014 | B2 |
8692410 | Schatz | Apr 2014 | B2 |
8692412 | Fiorello | Apr 2014 | B2 |
8692639 | Baarman | Apr 2014 | B2 |
8692641 | Singh | Apr 2014 | B2 |
8692642 | Singh | Apr 2014 | B2 |
8694026 | Forstall | Apr 2014 | B2 |
8694165 | Smith | Apr 2014 | B2 |
8694597 | Raj | Apr 2014 | B1 |
8698590 | Singh | Apr 2014 | B2 |
8698591 | Singh | Apr 2014 | B2 |
8700060 | Huang | Apr 2014 | B2 |
8707546 | Singh | Apr 2014 | B2 |
8710948 | Singh | Apr 2014 | B2 |
8712858 | Blair | Apr 2014 | B2 |
8713112 | Hewitt | Apr 2014 | B2 |
D705745 | Kurs et al. | May 2014 | S |
8716903 | Kurs | May 2014 | B2 |
8717400 | Ranganath | May 2014 | B2 |
8719070 | Jabbour | May 2014 | B2 |
8723366 | Fiorello | May 2014 | B2 |
8729737 | Schatz | May 2014 | B2 |
8731116 | Norconk | May 2014 | B2 |
8737950 | Jonsson | May 2014 | B2 |
8742625 | Baarman | Jun 2014 | B2 |
8743171 | Hiller | Jun 2014 | B2 |
8743198 | Padmanabh | Jun 2014 | B2 |
8756348 | Beel | Jun 2014 | B2 |
8760007 | Joannopoulos | Jun 2014 | B2 |
8760008 | Joannopoulos | Jun 2014 | B2 |
8760265 | Krueger | Jun 2014 | B2 |
8766484 | Baarman | Jul 2014 | B2 |
8766485 | Joannopoulos | Jul 2014 | B2 |
8766487 | Dibben | Jul 2014 | B2 |
8767032 | Rodman | Jul 2014 | B2 |
8768309 | Robbins | Jul 2014 | B2 |
8772971 | Joannopoulos | Jul 2014 | B2 |
8772972 | Joannopoulos | Jul 2014 | B2 |
8772973 | Kurs | Jul 2014 | B2 |
8782527 | Karlson | Jul 2014 | B2 |
8788448 | Fadell | Jul 2014 | B2 |
8792912 | Gits | Jul 2014 | B2 |
8797159 | Kirkpatrick | Aug 2014 | B2 |
8810379 | Murphy | Aug 2014 | B2 |
8812028 | Yariv | Aug 2014 | B2 |
8813196 | Weller | Aug 2014 | B2 |
8819136 | Vernon | Aug 2014 | B1 |
8819138 | Houston | Aug 2014 | B2 |
8825597 | Houston | Sep 2014 | B1 |
8838681 | Motes | Sep 2014 | B2 |
8842153 | Ranganath | Sep 2014 | B2 |
8843816 | Stull | Sep 2014 | B2 |
8849914 | Bove | Sep 2014 | B2 |
8856256 | Srinivasan | Oct 2014 | B1 |
8866619 | Knibbe | Oct 2014 | B2 |
8872432 | Kercso | Oct 2014 | B2 |
8875195 | Ogle | Oct 2014 | B2 |
8878439 | Noguchi | Nov 2014 | B2 |
8884742 | Gits | Nov 2014 | B2 |
8887069 | Tipirneni | Nov 2014 | B2 |
8896656 | Epstein | Nov 2014 | B2 |
8898231 | Crawford | Nov 2014 | B2 |
8904293 | Bastide | Dec 2014 | B2 |
8909702 | Golovchinsky | Dec 2014 | B2 |
9098502 | Horling | Aug 2015 | B1 |
9140555 | Andersson | Sep 2015 | B1 |
9176214 | Berrett et al. | Nov 2015 | B2 |
9204251 | Mendelson | Dec 2015 | B1 |
9247828 | Cvek | Feb 2016 | B2 |
9339106 | Epstein | May 2016 | B2 |
9380682 | Mead | Jun 2016 | B2 |
9465524 | Epstein | Oct 2016 | B2 |
9642219 | Mead | May 2017 | B2 |
9703274 | Li | Jul 2017 | B2 |
9716861 | Poel | Jul 2017 | B1 |
9766079 | Poel | Sep 2017 | B1 |
9852388 | Swieter | Dec 2017 | B1 |
9871978 | Epstein | Jan 2018 | B1 |
9877266 | Knas | Jan 2018 | B1 |
9921726 | Sculley | Mar 2018 | B1 |
9955316 | Jampani | Apr 2018 | B2 |
9955318 | Scheper | Apr 2018 | B1 |
9980112 | Newby | May 2018 | B1 |
10021530 | Sigal | Jul 2018 | B2 |
10038952 | Labrosse | Jul 2018 | B2 |
10044871 | Bargetzi | Aug 2018 | B2 |
10057963 | Mead | Aug 2018 | B2 |
10121113 | Swieter et al. | Nov 2018 | B1 |
10161752 | Poel | Dec 2018 | B1 |
10225707 | Scheper | Mar 2019 | B1 |
10353664 | Poel | Jul 2019 | B2 |
10433646 | Schmidt et al. | Oct 2019 | B1 |
10459611 | Sculley et al. | Oct 2019 | B1 |
10614694 | Zwier et al. | Apr 2020 | B1 |
10634503 | Hill | Apr 2020 | B2 |
10664772 | Poel | May 2020 | B1 |
10733371 | Baloga et al. | Aug 2020 | B1 |
10860954 | Yeluguri et al. | Dec 2020 | B1 |
10970662 | Swieter | Apr 2021 | B2 |
11085771 | Scheper | Aug 2021 | B1 |
11150859 | Poel | Oct 2021 | B2 |
11212898 | Mead et al. | Dec 2021 | B2 |
11402216 | Scheper et al. | Aug 2022 | B1 |
11402217 | Scheper et al. | Aug 2022 | B1 |
20010051885 | Nardulli | Dec 2001 | A1 |
20020015097 | Martens | Feb 2002 | A1 |
20020130834 | Madarasz | Sep 2002 | A1 |
20030097284 | Shinozaki | May 2003 | A1 |
20030103075 | Rosselot | Jun 2003 | A1 |
20030107498 | Drennan | Jun 2003 | A1 |
20030218537 | Hoch | Nov 2003 | A1 |
20040001095 | Marques | Jan 2004 | A1 |
20040015401 | Lee et al. | Jan 2004 | A1 |
20040051644 | Tamayama | Mar 2004 | A1 |
20040051813 | Marmaropoulos | Mar 2004 | A1 |
20040141605 | Chen | Jul 2004 | A1 |
20040153504 | Hutchinson | Aug 2004 | A1 |
20040210933 | Dresti | Oct 2004 | A1 |
20040215694 | Podolsky | Oct 2004 | A1 |
20040261013 | Wynn | Dec 2004 | A1 |
20050018826 | Benco | Jan 2005 | A1 |
20050027581 | Kjesbu | Feb 2005 | A1 |
20050071213 | Kumhyr | Mar 2005 | A1 |
20050144259 | Buckley | Jun 2005 | A1 |
20050160368 | Liu | Jul 2005 | A1 |
20050197877 | Kalinoski | Sep 2005 | A1 |
20050218739 | Maddin | Oct 2005 | A1 |
20050235329 | Karaoguz | Oct 2005 | A1 |
20050273372 | Bowne | Dec 2005 | A1 |
20050273493 | Buford | Dec 2005 | A1 |
20060009215 | Bogod | Jan 2006 | A1 |
20060015376 | Sattler | Jan 2006 | A1 |
20060021363 | Mizukoshi | Feb 2006 | A1 |
20060026502 | Dutta | Feb 2006 | A1 |
20060045107 | Kucenas | Mar 2006 | A1 |
20060080007 | Gerard | Apr 2006 | A1 |
20060080432 | Spataro | Apr 2006 | A1 |
20060168618 | Choi | Jul 2006 | A1 |
20060218027 | Carrion | Sep 2006 | A1 |
20070008181 | Rollert | Jan 2007 | A1 |
20070094065 | Wu | Apr 2007 | A1 |
20070118415 | Chen | May 2007 | A1 |
20070136095 | Weinstein | Jun 2007 | A1 |
20070162315 | Hodges | Jul 2007 | A1 |
20070197239 | Sane | Aug 2007 | A1 |
20070198744 | Wensley | Aug 2007 | A1 |
20070216131 | Potappel | Sep 2007 | A1 |
20070226034 | Khan | Sep 2007 | A1 |
20070282661 | Franco | Dec 2007 | A1 |
20070288291 | Earle | Dec 2007 | A1 |
20080028323 | Rosen | Jan 2008 | A1 |
20080091503 | Schirmer | Apr 2008 | A1 |
20080120370 | Chan | May 2008 | A1 |
20080122635 | Fujikawa | May 2008 | A1 |
20080162198 | Jabbour | Jul 2008 | A1 |
20080184115 | Back | Jul 2008 | A1 |
20080201664 | O | Aug 2008 | A1 |
20080239994 | Xiong | Oct 2008 | A1 |
20080244417 | Simpson | Oct 2008 | A1 |
20080288355 | Rosen | Nov 2008 | A1 |
20080291021 | Bhogal | Nov 2008 | A1 |
20080300660 | John | Dec 2008 | A1 |
20090019367 | Cavagnari | Jan 2009 | A1 |
20090055234 | Li | Feb 2009 | A1 |
20090066486 | Kiekbusch | Mar 2009 | A1 |
20090094533 | Bozionek | Apr 2009 | A1 |
20090106567 | Baarman | Apr 2009 | A1 |
20090146982 | Thielman | Jun 2009 | A1 |
20090164581 | Bove | Jun 2009 | A1 |
20090210822 | Schindler | Aug 2009 | A1 |
20090212637 | Baarman | Aug 2009 | A1 |
20090265280 | Taneja | Oct 2009 | A1 |
20090271713 | Stull | Oct 2009 | A1 |
20090286556 | Yumoto | Nov 2009 | A1 |
20090300174 | Floris | Dec 2009 | A1 |
20090327227 | Chakra | Dec 2009 | A1 |
20100017245 | Kristiansen | Jan 2010 | A1 |
20100037151 | Ackerman | Feb 2010 | A1 |
20100070334 | Monteverde | Mar 2010 | A1 |
20100088239 | Blair | Apr 2010 | A1 |
20100102640 | Joannopoulos | Apr 2010 | A1 |
20100127575 | Joannopoulos | May 2010 | A1 |
20100133918 | Joannopoulos | Jun 2010 | A1 |
20100133919 | Joannopoulos | Jun 2010 | A1 |
20100133920 | Joannopoulos | Jun 2010 | A1 |
20100153160 | Bezemer | Jun 2010 | A1 |
20100153983 | Philmon | Jun 2010 | A1 |
20100179854 | Shafer | Jul 2010 | A1 |
20100187911 | Joannopoulos | Jul 2010 | A1 |
20100207458 | Joannopoulos | Aug 2010 | A1 |
20100219694 | Kurs | Sep 2010 | A1 |
20100219791 | Cheng | Sep 2010 | A1 |
20100231340 | Fiorello | Sep 2010 | A1 |
20100235216 | Hehmeyer | Sep 2010 | A1 |
20100256823 | Cherukuri | Oct 2010 | A1 |
20100259110 | Kurs | Oct 2010 | A1 |
20100274855 | Wassingbo | Oct 2010 | A1 |
20100277121 | Hall | Nov 2010 | A1 |
20100283600 | Herbert | Nov 2010 | A1 |
20100308939 | Kurs | Dec 2010 | A1 |
20100315483 | King | Dec 2010 | A1 |
20100319066 | Berry | Dec 2010 | A1 |
20110043049 | Karalis | Feb 2011 | A1 |
20110072482 | Lau | Mar 2011 | A1 |
20110074346 | Hall | Mar 2011 | A1 |
20110084804 | Khorashadi | Apr 2011 | A1 |
20110088056 | Ansari | Apr 2011 | A1 |
20110095618 | Schatz | Apr 2011 | A1 |
20110121920 | Kurs | May 2011 | A1 |
20110126127 | Mariotti | May 2011 | A1 |
20110149809 | Narayanaswamy | Jun 2011 | A1 |
20110153738 | Bedingfield | Jun 2011 | A1 |
20110223899 | Hiraide | Sep 2011 | A1 |
20110225563 | Kim | Sep 2011 | A1 |
20110231216 | Fyke | Sep 2011 | A1 |
20110244798 | Daigle | Oct 2011 | A1 |
20110267002 | Baarman | Nov 2011 | A1 |
20110270952 | Ray | Nov 2011 | A1 |
20110295392 | Cunnington | Dec 2011 | A1 |
20110296465 | Krishnan | Dec 2011 | A1 |
20120007441 | John | Jan 2012 | A1 |
20120016678 | Gruber | Jan 2012 | A1 |
20120022909 | Ayatollahi | Jan 2012 | A1 |
20120032484 | Cvek | Feb 2012 | A1 |
20120032522 | Schatz | Feb 2012 | A1 |
20120062345 | Kurs | Mar 2012 | A1 |
20120068549 | Karalis | Mar 2012 | A1 |
20120068832 | Feldstein | Mar 2012 | A1 |
20120072030 | Elliott | Mar 2012 | A1 |
20120078676 | Adams | Mar 2012 | A1 |
20120086284 | Capanella | Apr 2012 | A1 |
20120086867 | Kesler | Apr 2012 | A1 |
20120089722 | Enholm | Apr 2012 | A1 |
20120091794 | Campanella | Apr 2012 | A1 |
20120091795 | Fiorello | Apr 2012 | A1 |
20120091796 | Kesler | Apr 2012 | A1 |
20120091797 | Kesler | Apr 2012 | A1 |
20120091819 | Kulikowski | Apr 2012 | A1 |
20120091820 | Campanella | Apr 2012 | A1 |
20120091949 | Campanella | Apr 2012 | A1 |
20120091950 | Campanella | Apr 2012 | A1 |
20120098350 | Campanella | Apr 2012 | A1 |
20120112531 | Kesler | May 2012 | A1 |
20120112532 | Kesler | May 2012 | A1 |
20120112534 | Kesler | May 2012 | A1 |
20120112535 | Karalis | May 2012 | A1 |
20120112536 | Karalis | May 2012 | A1 |
20120112538 | Kesler | May 2012 | A1 |
20120112668 | Van de Sluis | May 2012 | A1 |
20120112691 | Kurs | May 2012 | A1 |
20120119569 | Karalis | May 2012 | A1 |
20120119575 | Kurs | May 2012 | A1 |
20120119576 | Kesler | May 2012 | A1 |
20120119698 | Karalis | May 2012 | A1 |
20120136572 | Norton | May 2012 | A1 |
20120139355 | Ganem | Jun 2012 | A1 |
20120143639 | Rollert | Jun 2012 | A1 |
20120184338 | Kesler | Jul 2012 | A1 |
20120192084 | Dura | Jul 2012 | A1 |
20120204272 | Svensson | Aug 2012 | A1 |
20120206050 | Spero | Aug 2012 | A1 |
20120206096 | John | Aug 2012 | A1 |
20120216129 | Ng | Aug 2012 | A1 |
20120223573 | Schatz | Sep 2012 | A1 |
20120228952 | Hall | Sep 2012 | A1 |
20120228953 | Kesler | Sep 2012 | A1 |
20120228954 | Kesler | Sep 2012 | A1 |
20120228960 | Karalis | Sep 2012 | A1 |
20120229592 | White | Sep 2012 | A1 |
20120233205 | McDermott | Sep 2012 | A1 |
20120235500 | Ganem | Sep 2012 | A1 |
20120235501 | Kesler | Sep 2012 | A1 |
20120235502 | Kesler | Sep 2012 | A1 |
20120235503 | Kesler | Sep 2012 | A1 |
20120235504 | Kesler | Sep 2012 | A1 |
20120235505 | Schatz | Sep 2012 | A1 |
20120235566 | Karalis | Sep 2012 | A1 |
20120235633 | Kesler | Sep 2012 | A1 |
20120235634 | Hall | Sep 2012 | A1 |
20120239117 | Kesler | Sep 2012 | A1 |
20120239202 | Voysey | Sep 2012 | A1 |
20120242159 | Lou | Sep 2012 | A1 |
20120243158 | Gentil | Sep 2012 | A1 |
20120248886 | Kesler | Oct 2012 | A1 |
20120248887 | Kesler | Oct 2012 | A1 |
20120248888 | Kesler | Oct 2012 | A1 |
20120248981 | Karalis | Oct 2012 | A1 |
20120254909 | Serdiuk | Oct 2012 | A1 |
20120256494 | Kesler | Oct 2012 | A1 |
20120274586 | Southworth | Nov 2012 | A1 |
20120284672 | Madonna | Nov 2012 | A1 |
20120313449 | Kurs | Dec 2012 | A1 |
20120313742 | Kurs | Dec 2012 | A1 |
20120324589 | Nukala | Dec 2012 | A1 |
20120331108 | Ferdowsi | Dec 2012 | A1 |
20120331394 | Trombley-Shapiro | Dec 2012 | A1 |
20130007949 | Kurs | Jan 2013 | A1 |
20130013750 | Butler | Jan 2013 | A1 |
20130018952 | McConnell | Jan 2013 | A1 |
20130018953 | McConnell | Jan 2013 | A1 |
20130020878 | Karalis | Jan 2013 | A1 |
20130033118 | Karalis | Feb 2013 | A1 |
20130038402 | Karalis | Feb 2013 | A1 |
20130041973 | Zhou | Feb 2013 | A1 |
20130054863 | Imes | Feb 2013 | A1 |
20130057364 | Kesler | Mar 2013 | A1 |
20130062966 | Verghese | Mar 2013 | A1 |
20130069441 | Verghese | Mar 2013 | A1 |
20130069543 | Mohan | Mar 2013 | A1 |
20130069753 | Kurs | Mar 2013 | A1 |
20130073094 | Knapton | Mar 2013 | A1 |
20130080255 | Li | Mar 2013 | A1 |
20130088154 | Van Hoof | Apr 2013 | A1 |
20130099587 | Lou | Apr 2013 | A1 |
20130113249 | Cvek | May 2013 | A1 |
20130117158 | Cvek | May 2013 | A1 |
20130157509 | Srivastava | Jun 2013 | A1 |
20130167039 | Howell | Jun 2013 | A1 |
20130171981 | Woo | Jul 2013 | A1 |
20130175874 | Lou | Jul 2013 | A1 |
20130181541 | Karalis | Jul 2013 | A1 |
20130198653 | Tse | Aug 2013 | A1 |
20130199420 | Hjelm | Aug 2013 | A1 |
20130200721 | Kurs | Aug 2013 | A1 |
20130208186 | Malone | Aug 2013 | A1 |
20130218829 | Martinez | Aug 2013 | A1 |
20130221744 | Hall | Aug 2013 | A1 |
20130234481 | Johnson | Sep 2013 | A1 |
20130234531 | Budgett | Sep 2013 | A1 |
20130241439 | Nishigaki | Sep 2013 | A1 |
20130246901 | Massano | Sep 2013 | A1 |
20130249410 | Thompson | Sep 2013 | A1 |
20130262687 | Avery | Oct 2013 | A1 |
20130278073 | Kurs | Oct 2013 | A1 |
20130278074 | Kurs | Oct 2013 | A1 |
20130278075 | Kurs | Oct 2013 | A1 |
20130278631 | Border et al. | Oct 2013 | A1 |
20130283325 | Chiniara | Oct 2013 | A1 |
20130300353 | Kurs | Nov 2013 | A1 |
20130304924 | Dhara | Nov 2013 | A1 |
20130307349 | Hall | Nov 2013 | A1 |
20130314543 | Sutter | Nov 2013 | A1 |
20130320773 | Schatz | Dec 2013 | A1 |
20130325526 | Tyler | Dec 2013 | A1 |
20130334892 | Hall | Dec 2013 | A1 |
20130334973 | Wagenaar Cacciola | Dec 2013 | A1 |
20140002012 | McCauley | Jan 2014 | A1 |
20140021798 | Kesler | Jan 2014 | A1 |
20140026025 | Smith | Jan 2014 | A1 |
20140028112 | Hui | Jan 2014 | A1 |
20140032327 | Prakash | Jan 2014 | A1 |
20140035378 | Kesler | Feb 2014 | A1 |
20140035704 | Efe | Feb 2014 | A1 |
20140044281 | Ganem | Feb 2014 | A1 |
20140044293 | Ganem | Feb 2014 | A1 |
20140046713 | Harvey et al. | Feb 2014 | A1 |
20140049118 | Karalis | Feb 2014 | A1 |
20140052974 | Masters | Feb 2014 | A1 |
20140054961 | Metcalf | Feb 2014 | A1 |
20140058778 | McLarty | Feb 2014 | A1 |
20140062211 | Hamam | Mar 2014 | A1 |
20140067865 | Kirigin | Mar 2014 | A1 |
20140074930 | Kumashio | Mar 2014 | A1 |
20140084703 | Hall | Mar 2014 | A1 |
20140084859 | Hall | Mar 2014 | A1 |
20140091636 | Ofstein | Apr 2014 | A1 |
20140091756 | Ofstein | Apr 2014 | A1 |
20140103738 | Campanella | Apr 2014 | A1 |
20140108084 | Bargetzi | Apr 2014 | A1 |
20140108956 | Varenhorst | Apr 2014 | A1 |
20140109210 | Borzycki | Apr 2014 | A1 |
20140111304 | Hashim-Waris | Apr 2014 | A1 |
20140135648 | Holoien | May 2014 | A1 |
20140139426 | Kryze | May 2014 | A1 |
20140149519 | Redfern | May 2014 | A1 |
20140150059 | Uchida | May 2014 | A1 |
20140159589 | Pandharipande | Jun 2014 | A1 |
20140159652 | Hall | Jun 2014 | A1 |
20140164934 | Yang | Jun 2014 | A1 |
20140167618 | Wang | Jun 2014 | A1 |
20140175898 | Kurs | Jun 2014 | A1 |
20140181704 | Madonna | Jun 2014 | A1 |
20140181935 | Beckmann | Jun 2014 | A1 |
20140195149 | Yang | Jul 2014 | A1 |
20140195291 | Aaron | Jul 2014 | A1 |
20140195805 | Koo | Jul 2014 | A1 |
20140203659 | Madawala | Jul 2014 | A1 |
20140203921 | Baker | Jul 2014 | A1 |
20140215551 | Allain | Jul 2014 | A1 |
20140217785 | Arens | Aug 2014 | A1 |
20140223313 | Aebi | Aug 2014 | A1 |
20140225978 | Saban et al. | Aug 2014 | A1 |
20140229578 | Chu | Aug 2014 | A1 |
20140236659 | Hapse | Aug 2014 | A1 |
20140244043 | Foster | Aug 2014 | A1 |
20140253813 | Bakar | Sep 2014 | A1 |
20140259047 | Bakar | Sep 2014 | A1 |
20140269531 | Luna | Sep 2014 | A1 |
20140274005 | Luna | Sep 2014 | A1 |
20140277757 | Wang | Sep 2014 | A1 |
20140277763 | Ramachandran | Sep 2014 | A1 |
20140278057 | Berns | Sep 2014 | A1 |
20140282013 | Amijee | Sep 2014 | A1 |
20140285113 | Huang | Sep 2014 | A1 |
20140297758 | Kidron | Oct 2014 | A1 |
20140300277 | Ono | Oct 2014 | A1 |
20140302795 | Chacon | Oct 2014 | A1 |
20140354429 | Henderson | Dec 2014 | A1 |
20140365568 | Huang | Dec 2014 | A1 |
20150005011 | Nehrenz | Jan 2015 | A1 |
20150012843 | Ouyang et al. | Jan 2015 | A1 |
20150015399 | Gleckler | Jan 2015 | A1 |
20150035440 | Spero | Feb 2015 | A1 |
20150069915 | Ogawa | Mar 2015 | A1 |
20150085063 | Fish | Mar 2015 | A1 |
20150149929 | Shepherd | May 2015 | A1 |
20150179012 | Sharpe | Jun 2015 | A1 |
20150193739 | Min | Jul 2015 | A1 |
20150195620 | Buchner et al. | Jul 2015 | A1 |
20150200982 | Velagaleti | Jul 2015 | A1 |
20150201480 | Ogawa | Jul 2015 | A1 |
20150229644 | Nozawa | Aug 2015 | A1 |
20150234468 | Hwang | Aug 2015 | A1 |
20150296594 | Blum | Oct 2015 | A1 |
20150301727 | Miyazawa | Oct 2015 | A1 |
20150324754 | Bathiya | Nov 2015 | A1 |
20150330780 | Yuzawa | Nov 2015 | A1 |
20150369612 | Nishimura | Dec 2015 | A1 |
20150370272 | Reddy | Dec 2015 | A1 |
20160044071 | Sandholm | Feb 2016 | A1 |
20160049064 | McNabb | Feb 2016 | A1 |
20160162844 | Rachuri | Jun 2016 | A1 |
20160171566 | Pugh | Jun 2016 | A1 |
20160231731 | Carver et al. | Aug 2016 | A1 |
20160253048 | Silcock | Sep 2016 | A1 |
20160304013 | Wolas | Oct 2016 | A1 |
20160327922 | Sekiguchi | Nov 2016 | A1 |
20160342950 | Pignataro | Nov 2016 | A1 |
20170046113 | Noyes et al. | Feb 2017 | A1 |
20170060350 | Zheng et al. | Mar 2017 | A1 |
20170083275 | Shin | Mar 2017 | A1 |
20170208664 | Mead | Jul 2017 | A1 |
20170223312 | McNelley et al. | Aug 2017 | A1 |
20170238401 | Sadwick et al. | Aug 2017 | A1 |
20170293458 | Poel | Oct 2017 | A1 |
20170314803 | Jacobson et al. | Nov 2017 | A1 |
20180004178 | Haines | Jan 2018 | A1 |
20180107444 | Dunn | Apr 2018 | A1 |
20180137369 | Roth | May 2018 | A1 |
20180143025 | Kurata | May 2018 | A1 |
20190053012 | Hill | Feb 2019 | A1 |
20190118838 | Lequio et al. | Apr 2019 | A1 |
20190141291 | McNelley et al. | May 2019 | A1 |
20190272141 | Poel | Sep 2019 | A1 |
20190294018 | Shrivastava | Sep 2019 | A1 |
20190370700 | Ludwig et al. | Dec 2019 | A1 |
20200007921 | Ojala | Jan 2020 | A1 |
20200049509 | Hill | Feb 2020 | A1 |
20200096346 | Dhandapani et al. | Mar 2020 | A1 |
20200096573 | Cha | Mar 2020 | A1 |
20200116493 | Colburn | Apr 2020 | A1 |
20200250879 | Foster | Aug 2020 | A1 |
20200272163 | Ha et al. | Aug 2020 | A1 |
20210027208 | Clark et al. | Jan 2021 | A1 |
Number | Date | Country |
---|---|---|
2011203137 | Jul 2011 | AU |
2013203919 | May 2013 | AU |
2013203947 | May 2013 | AU |
102239633 | Nov 2011 | CN |
102439669 | May 2012 | CN |
102870338 | Jan 2013 | CN |
0935263 | Aug 1999 | EP |
2367146 | Sep 2011 | EP |
2388977 | Nov 2011 | EP |
2439686 | Apr 2012 | EP |
20140007006 | Jan 2014 | KR |
2007008646 | Jan 2007 | WO |
2008118178 | Oct 2008 | WO |
2009085896 | Jul 2009 | WO |
2009108958 | Sep 2009 | WO |
2009108959 | Sep 2009 | WO |
2010093997 | Aug 2010 | WO |
2011034759 | Mar 2011 | WO |
2011099873 | Aug 2011 | WO |
2011112795 | Sep 2011 | WO |
2012037279 | Mar 2012 | WO |
2012170278 | Dec 2012 | WO |
2013008252 | Jan 2013 | WO |
2013059441 | Apr 2013 | WO |
2013112185 | Aug 2013 | WO |
2013122483 | Aug 2013 | WO |
2014007656 | Jan 2014 | WO |
2014011059 | Jan 2014 | WO |
2014035260 | Mar 2014 | WO |
2014035263 | Mar 2014 | WO |
2014038966 | Mar 2014 | WO |
2014054953 | Apr 2014 | WO |
2014094107 | Jun 2014 | WO |
2014139781 | Sep 2014 | WO |
2017142541 | Aug 2017 | WO |
2019133264 | Jul 2019 | WO |
Entry |
---|
T. Marrinan et al., “SAGE2: A new approach for data intensive collaboration using Scalable Resolution Shared Displays,”10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Miami, FL, USA, 2014, pp. 177-186, doi: 10.4108/icst.collaboratecom.2014.257337 (Year: 2014). |
C. Lomas et al “Collaboration Tools”, Educause Learning Initiative, advancing learning through IT innovation. Available at http://www.ccti.colfinder.org/sites/default/files/PreService_International/resources/KD/M4/U4/Collaboration%20Tools.pdf (Year: 2008). |
L. Ah Kun. “Co-present photo sharing on mobile devices” MobileHCI '07: Proceedings of the 9th international conference on Human computer interaction with mobile devices and servicesSep.2007pp. 277-284https://doi.org/10.1145/1377999.1378019 (Year: 2007). |
The notification collage: posting information to public and personal displays, Conference on Human Factors in Computing Systems , ISBN 1-58113-327-8,(Mar. 31-Apr. 5, 2001),514-521 (Year: 2001). |
NFS Technology Group, Rendezvous—Technology for Meeting Room, Desk Scheduling and Event Management, http://myrendezvous.net/rendezvous-event-booking-software/calendar-management/, Mar. 1, 2016, 2 pages. |
Cisco, WebEx Meeting Center User Guide For Hosts, Presenters, and Participants, Version 8.23, Copyright 1997-2011 Cisco and/or its affiliates. |
Citrix, GoToMeeting User Guide, Copyright 2015 Citrix Systems. |
Citrix, GoToWebinar User Guide, Copyright 2015 Citrix Systems. |
CiviCRM Books: User and Administrator Guide for Version 4.5, Published Sep. 2014, http://book.civicrm.org/user/current/email/scheduled-reminders/. |
Davis, A Careful Return: How A Global Pandemic Changed a Workplace Design Firm's Office Spaces—And Its Business Direction Toward Safety-Tech Solutions, AV Technology, 2020, 13(6), 15(3), https://dialog.proquest.com/professional/printviewfile?accountid=131444, 3 pages. |
Events and Room Reserve Scheduled Task Setup for Email Notifications, Article No. 268, Apr. 22, 2013, http://kb.evanced.info/article.php?id=268. |
Oin.me forum and FAQ, Apr. 3, 2014. |
Krumm, et al., The NearMe Wireless Proximity Server, UbiComp 2004, The Sixth International Conference on Ubiquitous Computing, pp. 283-300, Sep. 7-10, 2004. |
Lee, TechnicLee—My Thoughts on Technology, Business, and Innovation, Posted in Outlook, Scripting, Jan. 20, 2012, http://techniclee.wordpress.com/2012/01/20/sending-a-meeting-reminder-email-in-outlook/. |
NFS Technology Group, Rendezvous—Technology for Meeting Room, Desk Scheduling and Event Management, http://myrendezvous.net/rendezvous-event-booking-software/calendar-management/. |
Oracle Communications, Oracle Data Sheet—Calendar Server, Copyright 2015 Oracle and/or its affiliates, http://www.oracle.com/us/industries/communications/communications-calendar-server-ds-071728.pdf. |
Stirworks, Inc., The Height-Adjustable, Standing Stir Kinetic Desk, http://www.stirworks.com/, Copyright 2015 Stirworks, Inc., 6 pages. |
Tam, et al., A Framework for Asynchronous Change Awareness in Collaborative Documents and Workspaces, International Journal of Human-Computer Studies, 2006, 64:583-598. |
Number | Date | Country | |
---|---|---|---|
62059602 | Oct 2014 | US | |
61994372 | May 2014 | US | |
61949696 | Mar 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16842152 | Apr 2020 | US |
Child | 17407800 | US | |
Parent | 14640288 | Mar 2015 | US |
Child | 16842152 | US |