In the workplace, coworkers and collaborators schedule meetings to discuss business matters, such as status and strategy for various collaborative projects. In-person, face-to-face meetings offer the advantages of direct, personal interaction among meeting participants. Online meetings can allow participants to share documents on individual computer screens, and are especially useful for meetings among participants in diverse locations.
It can be difficult for collaborators to opportunistically plan meetings with other collaborators on the same project and team. Individual collaborators can be preoccupied with time-sensitive projects, or unavailable due to travel, etc. The greater the number of potential meeting participants, the more difficult it can be to select and schedule mutually agreeable meeting times. Further difficulties and frustrations are encountered if one or more collaborators become unavailable, causing the meeting time to be rescheduled. This can result in delays that impact efficiency and hamper forward progress of a collaborative project.
Typically, collaborators can select and schedule meeting times using conventional means, based on foreseeable opportunities. Computer calendar applications can assist potential meeting participants in selecting common meeting opportunities in the future based on availability information indicated in the calendars. However, comparing calendars can be an iterative, manual process among potential participants. The process is repeated if a meeting is to be rescheduled.
The aforementioned process does not allow the collaborators to identify or select other suitable meeting times, in the event of changes in individual schedules. For example, an earlier meeting opportunity can arise if one or more collaborators become available due to cancellations or other schedule changes. Such opportunities can be lost unless the collaborators manually compare schedules.
Additionally, it can be desirable to invite other meeting participants based on interest or expertise. However, it can be difficult to identify and schedule such individuals unless a person is directly suggested by one of the collaborators. As a result, opportunities for adding value or improving efficiency can be lost.
The following presents a simplified summary in order to provide a basic understanding of some novel embodiments described herein. This summary is not an extensive overview, and it is not intended to identify key/critical elements or to delineate the scope thereof. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is presented later.
The disclosed architecture provides predictive collaboration that identifies and selects opportunities for meetings and other collaborative events among potential candidates. The architecture automatically collects and examines various available meta information for collaborators. This meta information can include presence information, calendar information, availability information, location, time zone, expertise of an individual, relationship to other meeting candidates, and any interest tags, for example. The architecture dynamically compares this information to identify potential collaboration opportunities for the collaborators and other meeting candidates.
In addition to meetings, the herein disclosed architecture can provide other tools for predictive collaboration, such as opportunities to connect different people and/or groups working on similar or related projects. This can include an unscheduled ad hoc collaboration and other events. For example, a first user can be working on a new social networking project, and can tag user interest as “social networking” or “people,” for example. A second user creates a social networking event for people to discuss trends of social networking in an enterprise. The architecture can automatically notify the first user of an opportunity to collaborate with the second user during this event.
To the accomplishment of the foregoing and related ends, certain illustrative aspects are described herein in connection with the following description and the annexed drawings. These aspects are indicative of the various ways in which the principles disclosed herein can be practiced and all aspects and equivalents thereof are intended to be within the scope of the claimed subject matter. Other advantages and novel features will become apparent from the following detailed description when considered in conjunction with the drawings.
The disclosed architecture enables a user to define candidates of a collaboration session, and the manner or modality of communication in a system that identifies collaboration opportunities, including meeting time, place, and modalities, for example. The modality of communication can include an online meeting, a telephone conference call, or a face-to-face meeting, for example. The modality of communication can also include instant messaging, a group conversation, a topic-based persistent chat room discussion, and an email in which two or more users are connected for collaboration, but not necessarily in realtime, for example.
Meta information of the candidates is aggregated from multiple sources to identify collaboration opportunities and compute an opportunity window for the collaboration session. The meta information can include online presence, availability information, a calendar schedule, geographic location, time zone, expertise, and profile related information. Candidates for the collaboration session can be tagged based on common interests, team membership, or project information, for example. In this way, a predictive model for availability is built for the collaboration session candidates.
The candidates are notified of the opportunity window for scheduling of the collaboration session. The candidates can also be contacted for an ad hoc collaboration or a non-realtime collaboration in which email or a persistent chat room exchange can be used for collaboration and to exchange information, subsequent to a prediction of the possibility of two or more candidates working on a similar interest project.
Reference is now made to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding thereof. It may be evident, however, that the novel embodiments can be practiced without these specific details. In other instances, well known structures and devices are shown in block diagram form in order to facilitate a description thereof. The intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the claimed subject matter.
The definition component 102 can also define priorities and thresholds for the candidates 112, indicating a specific number of candidates and/or certain individuals important to the collaboration session 106, so that the collaboration session 106 can go forward in the event that some of the candidates 112 cannot be available to participate.
As illustrated in
As also illustrated in
As also illustrated in
As illustrated in
The aforementioned types of meta information 304 can be obtained from different sources, not limited to the components indicated in
As also illustrated in
As also illustrated in
As also illustrated in
As also illustrated in
Predictive collaboration in accordance with the herein disclosed embodiments enables a collaboration organizer a simple and easy approach to find and connect with other individuals, thereby enhancing productivity and saving time for information workers. The disclosed embodiments obtain and process meta information of individuals such as availability, free times and busy times, location, time zone, expertise and other profile related information, etc. While employing meta information, it can still take several attempts to find suitable opportunities to collaborate with the individuals. The disclosed embodiments simplify the experience of connecting and collaborating with others in a common social or professional network.
Scenarios follow herewith that describe solutions available through the herein disclosed embodiments. Consider that USER1 seeks to meet with USER2 and USER3, and uses the disclosed architecture to proactively compute a meeting opportunity. The architecture uses calendar data and realtime availability data to identify and suggest the next available window of opportunity for both USER 2 and USER3. Manually scheduling a collaboration session using the calendar represents a static snapshot of a point in time. Instead, the architecture dynamically looks for upcoming slots of availability, and accounts for schedule changes on the calendars of both USER2 and USER 3.
In another scenario, USER1 desires to discuss information with USER2 and looks for an opportunity to meet online. Using the presences state of both USER1 and USER2, the architecture computes when both USER1 and USER2 are available online In a still further scenario, the architecture can use location information to notify USER1 if USER2 is available in the office for a face-to-face meeting. The location information can include a login on an office machine, presence status, and/or geographic location, etc.
In an additional scenario, USER1 is working on a media project with collaborators located in different locations. USER1 has not planned a meeting but knows the collaborators are planning to be in town. USER1 uses the system to find a window of opportunity for a face-to-face meeting while the collaborators are in town. The architecture watches for availability, location, calendar, and other information for USER1 and the other team members, and suggests one or more windows of opportunity for the meeting.
In yet another scenario, USER1 likes to keep connected to a business network. The architecture gives USER1 recommendations on possible lunch meetings with individuals based on mutual availability. The aforementioned scenarios are presented by way of example. Other scenarios can be contemplated without departing from the disclosed embodiments.
Included herein is a set of flow charts representative of exemplary methodologies for performing novel aspects of the disclosed architecture. While, for purposes of simplicity of explanation, the one or more methodologies shown herein, for example, in the form of a flow chart or flow diagram, are shown and described as a series of acts, it is to be understood and appreciated that the methodologies are not limited by the order of acts, as some acts may, in accordance therewith, occur in a different order and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all acts illustrated in a methodology may be required for a novel implementation.
As used in this application, the terms “component” and “system” are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component can be, but is not limited to being, a process running on a processor, a processor, a hard disk drive, multiple storage drives (of optical, solid state, and/or magnetic storage medium), an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a server and the server can be a component. One or more components can reside within a process and/or thread of execution, and a component can be localized on one computer and/or distributed between two or more computers. The word “exemplary” may be used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects or designs.
Referring now to
The computing system 1500 for implementing various aspects includes the computer 1502 having processing unit(s) 1504, a system memory 1506, and a system bus 1508. The processing unit(s) 1504 can be any of various commercially available processors such as single-processor, multi-processor, single-core units and multi-core units. Moreover, those skilled in the art will appreciate that the novel methods can be practiced with other computer system configurations, including minicomputers, mainframe computers, as well as personal computers (e.g., desktop, laptop, etc.), hand-held computing devices, microprocessor-based or programmable consumer electronics, and the like, each of which can be operatively coupled to one or more associated devices.
The system memory 1506 can include volatile (VOL) memory 1510 (e.g., random access memory (RAM)) and non-volatile memory (NON-VOL) 1512 (e.g., ROM, EPROM, EEPROM, etc.). A basic input/output system (BIOS) can be stored in the non-volatile memory 1512, and includes the basic routines that facilitate the communication of data and signals between components within the computer 1502, such as during startup. The volatile memory 1510 can also include a high-speed RAM such as static RAM for caching data.
The system bus 1508 provides an interface for system components including, but not limited to, the memory subsystem 1506 to the processing unit(s) 1504. The system bus 1508 can be any of several types of bus structure that can further interconnect to a memory bus (with or without a memory controller), and a peripheral bus (e.g., PCI, PCIe, AGP, LPC, etc.), using any of a variety of commercially available bus architectures.
The computer 1502 further includes storage subsystem(s) 1514 and storage interface(s) 1516 for interfacing the storage subsystem(s) 1514 to the system bus 1508 and other desired computer components. The storage subsystem(s) 1514 can include one or more of a hard disk drive (HDD), a magnetic floppy disk drive (FDD), and/or optical disk storage drive (e.g., a CD-ROM drive DVD drive), for example. The storage interface(s) 1516 can include interface technologies such as EIDE, ATA, SATA, and IEEE 1394, for example.
One or more programs and data can be stored in the memory subsystem 1506, a removable memory subsystem 1518 (e.g., flash drive form factor technology), and/or the storage subsystem(s) 1514 (e.g., optical, magnetic, solid state), including an operating system 1520, one or more application programs 1522, other program modules 1524, and program data 1526.
Generally, programs include routines, methods, data structures, other software components, etc., that perform particular tasks or implement particular abstract data types. All or portions of the operating system 1520, applications 1522, modules 1524, and/or data 1526 can also be cached in memory such as the volatile memory 1510, for example. It is to be appreciated that the disclosed architecture can be implemented with various commercially available operating systems or combinations of operating systems (e.g., as virtual machines).
The aforementioned application programs 1522, program modules 1524, and program data 1526 can include the computer-implemented system 100, the definition component 102, the preferences 104, the collaboration session 106, the prediction component 108, the opportunities 110, and the candidates 112 of
The aforementioned application programs 1522, program modules 1524, and program data 1526 can further include the system 800, which comprises additional components such as the collaboration component 802, the modality component 804, the modalities of communication 806, the opportunity window 808, and the notification component 810 of
The storage subsystem(s) 1514 and memory subsystems (1506 and 1518) serve as computer readable media for volatile and non-volatile storage of data, data structures, computer-executable instructions, and so forth. Computer readable media can be any available media that can be accessed by the computer 1502 and includes volatile and non-volatile media, removable and non-removable media. For the computer 1502, the media accommodate the storage of data in any suitable digital format. It should be appreciated by those skilled in the art that other types of computer readable media can be employed such as zip drives, magnetic tape, flash memory cards, cartridges, and the like, for storing computer executable instructions for performing the novel methods of the disclosed architecture.
A user can interact with the computer 1502, programs, and data using external user input devices 1528 such as a keyboard and a mouse. Other external user input devices 1528 can include a microphone, an IR (infrared) remote control, a joystick, a game pad, camera recognition systems, a stylus pen, touch screen, gesture systems (e.g., eye movement, head movement, etc.), and/or the like. The user can interact with the computer 1502, programs, and data using onboard user input devices 1530 such a touchpad, microphone, keyboard, etc., where the computer 1502 is a portable computer, for example. These and other input devices are connected to the processing unit(s) 1504 through input/output (I/O) device interface(s) 1532 via the system bus 1508, but can be connected by other interfaces such as a parallel port, IEEE 1394 serial port, a game port, a USB port, an IR interface, etc. The I/O device interface(s) 1532 also facilitate the use of output peripherals 1534 such as printers, audio devices, camera devices, and so on, such as a sound card and/or onboard audio processing capability.
One or more graphics interface(s) 1536 (also commonly referred to as a graphics processing unit (GPU)) provide graphics and video signals between the computer 1502 and external display(s) 1538 (e.g., LCD, plasma) and/or onboard displays 1540 (e.g., for portable computer). The graphics interface(s) 1536 can also be manufactured as part of the computer system board.
The computer 1502 can operate in a networked environment (e.g., IP) using logical connections via a wired/wireless communications subsystem 1542 to one or more networks and/or other computers. The other computers can include workstations, servers, routers, personal computers, microprocessor-based entertainment appliance, a peer device or other common network node, and typically include many or all of the elements described relative to the computer 1502. The logical connections can include wired/wireless connectivity to a local area network (LAN), a wide area network (WAN), hotspot, and so on. LAN and WAN networking environments are commonplace in offices and companies and facilitate enterprise-wide computer networks, such as intranets, all of which may connect to a global communications network such as the Internet.
When used in a networking environment the computer 1502 connects to the network via a wired/wireless communication subsystem 1542 (e.g., a network interface adapter, onboard transceiver subsystem, etc.) to communicate with wired/wireless networks, wired/wireless printers, wired/wireless input devices 1544, and so on. The computer 1502 can include a modem or has other means for establishing communications over the network. In a networked environment, programs and data relative to the computer 1502 can be stored in the remote memory/storage device, as is associated with a distributed system. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers can be used.
The computer 1502 is operable to communicate with wired/wireless devices or entities using the radio technologies such as the IEEE 802.xx family of standards, such as wireless devices operatively disposed in wireless communication (e.g., IEEE 802.11 over-the-air modulation techniques) with, for example, a printer, scanner, desktop and/or portable computer, personal digital assistant (PDA), communications satellite, any piece of equipment or location associated with a wirelessly detectable tag (e.g., a kiosk, news stand, restroom), and telephone. This includes at least Wi-Fi (or Wireless Fidelity) for hotspots, WiMax, and Bluetooth™ wireless technologies. Thus, the communications can be a predefined structure as with a conventional network or simply an ad hoc communication between at least two devices. Wi-Fi networks use radio technologies called IEEE 802.11x (a, b, g, etc.) to provide secure, reliable, fast wireless connectivity. A Wi-Fi network can be used to connect computers to each other, to the Internet, and to wire networks (which use IEEE 802.3-related media and functions).
Referring now to
The environment 1600 also includes one or more server(s) 1604. The server(s) 1604 can also be hardware and/or software (e.g., threads, processes, computing devices). The servers 1604 can house threads to perform transformations by employing the architecture, for example. One possible communication between a client 1602 and a server 1604 can be in the form of a data packet adapted to be transmitted between two or more computer processes. The data packet may include a cookie and/or associated contextual information, for example. The environment 1600 includes a communication framework 1606 (e.g., a global communication network such as the Internet) that can be employed to facilitate communications between the client(s) 1602 and the server(s) 1604.
Communications can be facilitated via a wire (including optical fiber) and/or wireless technology. The client(s) 1602 are operatively connected to one or more client data store(s) 1608 that can be employed to store information local to the client(s) 1602 (e.g., cookie(s) and/or associated contextual information). Similarly, the server(s) 1604 are operatively connected to one or more server data store(s) 1610 that can be employed to store information local to the servers 1604.
What has been described above includes examples of the disclosed architecture. It is, of course, not possible to describe every conceivable combination of components and/or methodologies, but one of ordinary skill in the art may recognize that many further combinations and permutations are possible. Accordingly, the novel architecture is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the term “includes” is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.
This application is a continuation of, claims the benefit of and priority to previously filed U.S. patent application Ser. No. 12/486,753 filed on Jun. 18, 2009, entitled “PREDICTIVE COLLABORATION”, which is hereby incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
Parent | 12486753 | Jun 2009 | US |
Child | 15245418 | US |