In the workplace and other business settings, it is beneficial to schedule meetings among coworkers, collaborators, managers, sales representatives, and other members of the organization. Meetings are used for discussing ongoing projects, business development, planning, strategies, review of past performance, and analysis of trends, for example.
It can be difficult to plan meetings since attendees can be out of the office on business or personal matters, or in the office focused on important projects, project deadlines, or dealing with other unexpected situations that require attention. Such daily dynamics can affect the ability to maintain scheduled meetings and further exacerbate meeting scheduling where many participants are intended to be in attendance.
Systems exist where a user (a publisher) can expose presence information in which a status of the user indicates an availability to communicate with other users. The other network users (or watchers) can subscribe to the presence information of the user in order to monitor the presence state.
Presence systems enable watchers to tag a publisher user to receive a presence notification when the presence state of the publisher user changes, such as when the user becomes available for communications. However, such presence systems can only monitor individual users and cannot be used for monitoring a group of users.
The following presents a simplified summary in order to provide a basic understanding of some novel embodiments described herein. This summary is not an extensive overview, and it is not intended to identify key/critical elements or to delineate the scope thereof. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is presented later.
To that end, architecture is disclosed for enabling a watcher user to receive a notification for availability of a group of users on a network, in order to plan and coordinate a meeting, for example. A “meeting” as described herein can include any communications session such as a communication session scheduled for a future date/time or an ad hoc communication session initiated instantly by a group of users, for example. A group of users can be tagged and the presence state of the group is monitored, to detect changes in status as a group. Upon determining that the group of users is available, the watcher user is notified of the availability. Additionally, a meeting can be tagged that already has an associated list of meeting attendees.
The watcher user can also tag a group of users to communicate or discuss (e.g., an ad hoc conversation) rather than coordinate a meeting time. The watcher can tag a group of people and the system can notify the watcher user when all members of the group are available or online. The watcher user can tag a meeting that has multiple participants having the same intention of receiving a notification when all participants are available or online. In an additional scenario, the watcher user can receive notification when the watcher user is also available, rather than receive a notification when the watcher user is busy. The tag can be a smart tag to notify when all parties are available free.
By tagging a meeting to a group for presence, the meeting can start automatically as soon as the group of users is available. In this manner, a meeting does not have to be delayed such that available participants are held waiting until the entire group of users or a quorum thereof joins the meeting. By tagging the meeting, the meeting can start when the entire group of users is available, and the entire group is notified at the same time. For example, the telephones of each of the group members can ring automatically at the same time to provide notification. Each of the users can pick up their phones to join the conference.
In addition to tagging a group of users or a meeting, the user can also leave a note as a reminder of the context (reason or purpose) of why the user made the tag. The context information can be included in the availability notification. The context note can be left manually by the user. Alternatively, the context can be auto-populated by the system.
To the accomplishment of the foregoing and related ends, certain illustrative aspects are described herein in connection with the following description and the annexed drawings. These aspects are indicative of the various ways in which the principles disclosed herein can be practiced and all aspects and equivalents thereof are intended to be within the scope of the claimed subject matter. Other advantages and novel features will become apparent from the following detailed description when considered in conjunction with the drawings.
The disclosed architecture enables users of a communications framework to be tagged as a group for participation in a communications session. A context (reason or purpose) is indicated for tagging the contacts, to serve as a reminder of the purpose of the communications session. The status of the contacts is monitored to detect an availability status of the contacts, and to determine when the contacts are concurrently available to participate in the communications session. A notification is sent to a watcher user or meeting organizer of the availability status of the contacts, at which time the communication session can be initiated. The context can be presented in the notification with the availability status of the contacts. The status can be monitored by subscribing to presence information of the contacts. A contact list can be maintained to identify the contacts to be tagged and can include metadata related to each contact.
Reference is now made to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding thereof. It may be evident, however, that the novel embodiments can be practiced without these specific details. In other instances, well known structures and devices are shown in block diagram form in order to facilitate a description thereof. The intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the claimed subject matter.
As also illustrated in
As also illustrated in
Note that it is also within contemplation of the disclosed architecture that the tagging user is given a cumulative notification of the contacts becoming available. In other words, the notification process can be manipulated based on the composition of the contact group; as the contacts change state, the tagging user receives notification of two contacts being available, then three contacts, then four contacts, and so on, until all contacts are available. Alternatively, the composition can include tagging user can set a minimum number of the contacts (e.g., five) or a percentage (e.g., seventy percent) to begin cumulative notification. Still further, the notification can be sent based on a change in composition where more important contacts become available, such as in a project manager versus a staff stenographer, for example. Thus, the tagging user can decide that when most or all of the contacts deemed essential for the meeting or conference are available, the notification is sent, even though not all tagged contacts are available. The composition can also include an optional set of contacts, the required set of contacts.
As also illustrated in
As also illustrated in
As also illustrated in
In the event that not all the contacts 104 can be available within a suitable opportunity window, it is also to be appreciated that the notification 110 can be sent when certain selected contacts 104 become available. The meeting can convene when a threshold number of contacts 104 are available, for example, upon obtaining a quorum (a simple majority). Alternatively, the meeting can convene when key personnel become available, such as a project manager or expert, for example. Certain contacts 104 can be tagged on the basis of a prioritization. For example, certain tagged contacts 104 can be on a “required list” and selected on the basis of expertise, position in management, or whether a contact is otherwise essential to the meeting agenda. Non-essential contacts 104 can either forego the meeting if unavailable, or change schedules to become available if required participants become available. In this manner, a notification 110 can be sent out and a meeting can convene though not all contacts 104 are available.
As also illustrated in
As additionally illustrated in
As also illustrated in
As also illustrated in
Scenarios follow herewith explaining a process of tagging and notification in accordance with the herein disclosed embodiments. In one scenario, a group of individuals can be tagged. A user plans to meet with three team members when available. A single alert notification on the team members can be set so that the tagging user is notified when all three are available at same time.
In another scenario, a meeting can be tagged. User A has a meeting scheduled with Users B, C, and D. User A tags that meeting for a status alert to discuss topics with the participants before the meeting. The next time when all three attendees are available, User A gets notified. This will enable User A to start an ad hoc conversation with B, C, and D prior to the meeting, for example, and/or post meeting.
In an additional scenario, context can be passed for tagged contacts or meetings. While tagging a group of contacts or meetings, a user can either pass the context explicitly by leaving a note or context can be computed automatically based on available meeting information.
Included herein is a set of flow charts representative of exemplary methodologies for performing novel aspects of the disclosed architecture. While, for purposes of simplicity of explanation, the one or more methodologies shown herein, for example, in the form of a flow chart or flow diagram, are shown and described as a series of acts, it is to be understood and appreciated that the methodologies are not limited by the order of acts, as some acts may, in accordance therewith, occur in a different order and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all acts illustrated in a methodology may be required for a novel implementation.
In accordance with the flow of
As used in this application, the terms “component” and “system” are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component can be, but is not limited to being, a process running on a processor, a processor, a hard disk drive, multiple storage drives (of optical, solid state, and/or magnetic storage medium), an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a server and the server can be a component. One or more components can reside within a process and/or thread of execution, and a component can be localized on one computer and/or distributed between two or more computers. The word “exemplary” may be used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects or designs.
Referring now to
The computing system 900 for implementing various aspects includes the computer 902 having processing unit(s) 904, a system memory 906, and a system bus 908. The processing unit(s) 904 can be any of various commercially available processors such as single-processor, multi-processor, single-core units and multi-core units. Moreover, those skilled in the art will appreciate that the novel methods can be practiced with other computer system configurations, including minicomputers, mainframe computers, as well as personal computers (e.g., desktop, laptop, etc.), hand-held computing devices, microprocessor-based or programmable consumer electronics, and the like, each of which can be operatively coupled to one or more associated devices.
The system memory 906 can include volatile (VOL) memory 910 (e.g., random access memory (RAM)) and non-volatile memory (NON-VOL) 912 (e.g., ROM, EPROM, EEPROM, etc.). A basic input/output system (BIOS) can be stored in the non-volatile memory 912, and includes the basic routines that facilitate the communication of data and signals between components within the computer 902, such as during startup. The volatile memory 910 can also include a high-speed RAM such as static RAM for caching data.
The system bus 908 provides an interface for system components including, but not limited to, the memory subsystem 906 to the processing unit(s) 904. The system bus 908 can be any of several types of bus structure that can further interconnect to a memory bus (with or without a memory controller), and a peripheral bus (e.g., PCI, PCIe, AGP, LPC, etc.), using any of a variety of commercially available bus architectures.
The computer 902 further includes storage subsystem(s) 914 and storage interface(s) 916 for interfacing the storage subsystem(s) 914 to the system bus 908 and other desired computer components. The storage subsystem(s) 914 can include one or more of a hard disk drive (HDD), a magnetic floppy disk drive (FDD), and/or optical disk storage drive (e.g., a CD-ROM drive DVD drive), for example. The storage interface(s) 916 can include interface technologies such as EIDE, ATA, SATA, and IEEE 1394, for example.
One or more programs and data can be stored in the memory subsystem 906, a removable memory subsystem 918 (e.g., flash drive form factor technology), and/or the storage subsystem(s) 914 (e.g., optical, magnetic, solid state), including an operating system 920, one or more application programs 922, other program modules 924, and program data 926.
Generally, programs include routines, methods, data structures, other software components, etc., that perform particular tasks or implement particular abstract data types. All or portions of the operating system 920, applications 922, modules 924, and/or data 926 can also be cached in memory such as the volatile memory 910, for example. It is to be appreciated that the disclosed architecture can be implemented with various commercially available operating systems or combinations of operating systems (e.g., as virtual machines).
The aforementioned application programs 922, program modules 924, and program data 926 can include the computer implemented system 100 and the components and entities thereof such as the tagging component 102, the contacts 104, the communications session 106, the notification component 108, and the notification 110 of
The aforementioned application programs 922, program modules 924, and program data 926 can also include the system 400 and the components and entities thereof such as the tagging component 102, the communications session 106, the context component 204, the context 202, the contacts 104, the status change component 304, the availability status 402, the notification component 108, and the notification 110 of
The storage subsystem(s) 914 and memory subsystems (906 and 918) serve as computer readable media for volatile and non-volatile storage of data, data structures, computer-executable instructions, and so forth. Computer readable media can be any available media that can be accessed by the computer 902 and includes volatile and non-volatile media, removable and non-removable media. For the computer 902, the media accommodate the storage of data in any suitable digital format. It should be appreciated by those skilled in the art that other types of computer readable media can be employed such as zip drives, magnetic tape, flash memory cards, cartridges, and the like, for storing computer executable instructions for performing the novel methods of the disclosed architecture.
A user can interact with the computer 902, programs, and data using external user input devices 928 such as a keyboard and a mouse. Other external user input devices 928 can include a microphone, an IR (infrared) remote control, a joystick, a game pad, camera recognition systems, a stylus pen, touch screen, gesture systems (e.g., eye movement, head movement, etc.), and/or the like. The user can interact with the computer 902, programs, and data using onboard user input devices 930 such a touchpad, microphone, keyboard, etc., where the computer 902 is a portable computer, for example. These and other input devices are connected to the processing unit(s) 904 through input/output (I/O) device interface(s) 932 via the system bus 908, but can be connected by other interfaces such as a parallel port, IEEE 1394 serial port, a game port, a USB port, an IR interface, etc. The I/O device interface(s) 932 also facilitate the use of output peripherals 934 such as printers, audio devices, camera devices, and so on, such as a sound card and/or onboard audio processing capability.
One or more graphics interface(s) 936 (also commonly referred to as a graphics processing unit (GPU)) provide graphics and video signals between the computer 902 and external display(s) 938 (e.g., LCD, plasma) and/or onboard displays 940 (e.g., for portable computer). The graphics interface(s) 936 can also be manufactured as part of the computer system board.
The computer 902 can operate in a networked environment (e.g., IP) using logical connections via a wired/wireless communications subsystem 942 to one or more networks and/or other computers. The other computers can include workstations, servers, routers, personal computers, microprocessor-based entertainment appliance, a peer device or other common network node, and typically include many or all of the elements described relative to the computer 902. The logical connections can include wired/wireless connectivity to a local area network (LAN), a wide area network (WAN), hotspot, and so on. LAN and WAN networking environments are commonplace in offices and companies and facilitate enterprise-wide computer networks, such as intranets, all of which may connect to a global communications network such as the Internet.
When used in a networking environment the computer 902 connects to the network via a wired/wireless communication subsystem 942 (e.g., a network interface adapter, onboard transceiver subsystem, etc.) to communicate with wired/wireless networks, wired/wireless printers, wired/wireless input devices 944, and so on. The computer 902 can include a modem or has other means for establishing communications over the network. In a networked environment, programs and data relative to the computer 902 can be stored in the remote memory/storage device, as is associated with a distributed system. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers can be used.
The computer 902 is operable to communicate with wired/wireless devices or entities using the radio technologies such as the IEEE 802.xx family of standards, such as wireless devices operatively disposed in wireless communication (e.g., IEEE 802.11 over-the-air modulation techniques) with, for example, a printer, scanner, desktop and/or portable computer, personal digital assistant (PDA), communications satellite, any piece of equipment or location associated with a wirelessly detectable tag (e.g., a kiosk, news stand, restroom), and telephone. This includes at least Wi-Fi (or Wireless Fidelity) for hotspots, WiMax, and Bluetooth™ wireless technologies. Thus, the communications can be a predefined structure as with a conventional network or simply an ad hoc communication between at least two devices. Wi-Fi networks use radio technologies called IEEE 802.11x (a, b, g, etc.) to provide secure, reliable, fast wireless connectivity. A Wi-Fi network can be used to connect computers to each other, to the Internet, and to wire networks (which use IEEE 802.3-related media and functions).
The illustrated aspects can also be practiced in distributed computing environments where certain tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules can be located in local and/or remote storage and/or memory system.
Referring now to
The environment 1000 also includes one or more server(s) 1004. The server(s) 1004 can also be hardware and/or software (e.g., threads, processes, computing devices). The servers 1004 can house threads to perform transformations by employing the architecture, for example. One possible communication between a client 1002 and a server 1004 can be in the form of a data packet adapted to be transmitted between two or more computer processes. The data packet may include a cookie and/or associated contextual information, for example. The environment 1000 includes a communication framework 1006 (e.g., a global communication network such as the Internet) that can be employed to facilitate communications between the client(s) 1002 and the server(s) 1004.
Communications can be facilitated via a wire (including optical fiber) and/or wireless technology. The client(s) 1002 are operatively connected to one or more client data store(s) 1008 that can be employed to store information local to the client(s) 1002 (e.g., cookie(s) and/or associated contextual information). Similarly, the server(s) 1004 are operatively connected to one or more server data store(s) 1010 that can be employed to store information local to the servers 1004.
What has been described above includes examples of the disclosed architecture. It is, of course, not possible to describe every conceivable combination of components and/or methodologies, but one of ordinary skill in the art may recognize that many further combinations and permutations are possible. Accordingly, the novel architecture is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the term “includes” is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.