A method and apparatus for assuring telecommunication reliability by receiving from each of a plurality of control entities factors concerning priority of each of the plurality of control entities; determining a priority score for each of the plurality of control entities; detecting lose of communication with a one of the plurality of control entities from which the media connectivity endpoint presently receives control information; selecting another one of the plurality of control entities having the highest priority score; and requesting the selected other one of the plurality of control entities to supply control information.
Unified Greeting Service For Telecommunications Events
Gregory D. Weber - Westminster CO, US David S. Mohler - Arvada CO, US
Assignee:
Avaya Inc. - Basking Ridge NJ
International Classification:
H04M 11/00
US Classification:
379 8814, 379 76, 379 8822
Abstract:
A technique is disclosed that enables a telecommunications user to initially enter a greeting message in a single media format such as either voice or text. Subsequently, this greeting message is used by a server in response to any communication event that arrives for the user, such as a voice call or an email message, regardless of the media format of the arriving communication event. When the server receives arrival notifications of various communication events, it generates a customized greeting message in response to that event and in the same media format as the event itself. In other words, the server represents a previously-prepared outgoing voice or text message i) as a voice message in response to an incoming voice call and ii) as a textual message in response to an email, SMS text message, or instant message.
Next Generation Integration Between Different Domains, Such As, Enterprise And Service Provider Using Sequencing Applications And Ims Peering
The present invention provides mechanisms for sharing user information, including user authentication information, across communication networks and more specifically across networks separated by one or more Session Border Controllers (SBCs). The authentication of a user at one network can be leveraged by the second network to invoke one or more applications at the second network in connection with administering a communication session for the user.
Failover Based On Sending Communications Between Different Domains
David L. Chavez - Broomfield CO, US Gregory D. Weber - Westminster CO, US
Assignee:
Avaya Inc. - Basking Ridge NJ
International Classification:
G01R 31/08
US Classification:
370241, 370225, 370356, 714 421
Abstract:
A first communication device detects a failure on a communication channel of a primary network. Based on the failure, the first communication device sends communications directed to a second communication device to a secondary network. A secondary network domain controller sends the communications to the primary network via a different communication channel. This can be done by looking at an identifier such as an IP address. This can also happen based on being able to communicate between the secondary network and the primary network via the different communication channel. The primary network then sends the communication to the second communication device. In addition, communications from the second communication device are routed in a similar manner to the first communication device. Sending the communications back into the primary network allows users to have access to features not provided by the secondary network.
Frank J. Boyle - Denver CO, US Gordon Brunson - Broomfield CO, US David Chavez - Broomfield CO, US Stephen Durney - Broomfield CO, US Gregory Weber - Westminster CO, US
Assignee:
Avaya Inc. - Basking Ridge NJ
International Classification:
H04L 9/32
US Classification:
713158
Abstract:
A proxy server causes an authentication authority to authenticate a client in response to a first Session Initiation Protocol (SIP) request of the client on a connection. It does not cause the client to be authenticated in response subsequent requests on the connection as long as the underlying connection is not broken, the subsequent requests are on behalf of the same client, the client has not been removed from the system, the client's password has not changed, a “safety net” timer has not expired, or any other policy that the server chooses to enforce. This eliminates the overhead of constant re-authentication in response to each SIP request.
Embodiments of the disclosure provide a mobile-specific intermediary replacement for the toll free service. This mobile intermediary entity or service can provide four primary call invocation types. Namely, calls can be invoked through a dialer of the mobile device, through a web interface accessed through the mobile device, through a mobile application executing on the mobile device, or through a personal assistant of similar service. The mobile intermediary entity or service can also provide rich, supplementary services for mobile callers. These services can include but are not limited to menu navigation, call continuity, caller geo-location awareness, and awareness of the caller's mobile network operator's identifier. Services natively provided by the called enterprise, such as call conferencing, can also be provided within the call.
Embodiments of the disclosure provide a mobile-specific intermediary replacement for the toll free service. This mobile intermediary entity or service can provide four primary call invocation types. Namely, calls can be invoked through a dialer of the mobile device, through a web interface accessed through the mobile device, through a mobile application executing on the mobile device, or through a personal assistant of similar service. The mobile intermediary entity or service can also provide rich, supplementary services for mobile callers. These services can include but are not limited to menu navigation, call continuity, caller geo-location awareness, and awareness of the caller's mobile network operator's identifier. Services natively provided by the called enterprise, such as call conferencing, can also be provided within the call.
System And Method For Binding A Virtual Desktop Infrastructure Host And Media Soft Client Together
- Santa Clara CA, US Gregory D. Weber - Westminster CO, US
International Classification:
H04L 29/08 G06F 9/455
Abstract:
Methods and systems are provided that utilize the functionality of an end user device in binding a virtual desktop infrastructure (VDI) media client on an end user device with a VDI host client on a VDI server. In particular, the native operating system (OS) on the end user device may take a screen-shot of a quick response (QR) code displayed to a graphical user interface of the end user device. The end user device may provide information associated with the screen-shot of the QR code to a collaboration server where the collaboration server binds the VDI media client together with the VDI host client upon verifying the information associated with the screen-shot of the QR code.
1749 Boxwood Ct southwest, Ocean Isle Beach, NC 28469
Industry:
Chemicals
Work:
Airgas - Long Beach, CA since 2012
Division Controller
United States Masters Swimming since 2003
Registrar
Sabre Industries, Inc. 2010 - 2012
Finance Director - Reporting & Operations
Thomas & Betts - Greater Memphis Area 2008 - 2010
Division Controller
Emerson Industrial Automation - EGS - Greater Chicago Area 2000 - 2008
Controller
Education:
State University of New York at Buffalo
MBA, Finance
Niagara University
BBA, Accounting & Finance
Skills:
Managerial Finance Financial Reporting Financial Analysis Sarbanes Oxley Act Management Internal Controls Cost Accounting Budgets Accounting Sap Finance Process Improvement Erp Financial Accounting Mergers and Acquisitions Manufacturing Strategy Auditing Internal Audit Analysis Corporate Finance Due Diligence Gaap Accounts Payable Six Sigma Tax Strategic Financial Planning Payroll Ifrs Management Consulting Us Gaap Oracle Epicor Hyperion Enterprise Budgeting Erp Design Financial Planning Sox Multi Site Audit
Interests:
Usat Member Memeber United States Masters Swimming (Usms) Triathlon
Spalding Hardware Lockport, NY Nov 2008 to Aug 2012 Store ManagerGui's Lumber Niagara Falls, NY Sep 2000 to Nov 2008 Hardware ManagerSadlo Lumber Company
Nov 1996 to Aug 2000 Hardware ManagerRKB Enterprising Elmira, NY Oct 1988 to Aug 1996 Dealer Sales Representative
Education:
Niagara County Community College Sanborn, NY 1975 Associate's in Criminal Justice
Name / Title
Company / Classification
Phones & Addresses
Gregory Weber Owner
The Webers Design General Contractors-Single-Family Houses
1314 Oak Hill Pl, South Pasadena, CA 91030
Gregory Weber Ops Mgr
Blastco Incorporated
Gregory J. Weber
POLYMER NETWORK, INC
Gregory J. Weber
WEBER LAWN CARE, LLC
Gregory Weber Assistant Secretary
AVAYA FEDERAL SOLUTIONS, INC Manufacturing · Computer and Electronic Product Manufacturing · Communications Equipment Manufacturing · Sale Of Advanced Voice And Data Communications Products And Related Services · Mfg Telephone/Telegraph Appartus · Mfg Telephone/Telegraph Apparatus
"It is 100 percent certain that someone will make this appeal," said Gregory Weber, a water law expert at University of the Pacific's McGeorge School of Law in Sacramento, who is not involved with the council.
Date: Mar 24, 2013
Category: Business
Source: Google
Youtube
Borgata Poker Open: Greg Weber Among The "Alm...
Greg Weber is a full-time firefighter who makes the most of his free t...
Duration:
1m 33s
For-Closure: Poetry versus Reality By Gregory...
A recording of the poem "For-Closure" by Gregory Weber of the Philadel...
Duration:
8m 45s
Weber: Complete Piano Sonatas
This album contains the complete piano sonatas by Weber, presented by ...
Duration:
2h 3m 22s
The Best of Weber
Carl Maria Friedrich Ernst von Weber (18 or 19 November 1786 5 June 1...
Duration:
1h 7m 20s
Author of Treating Anxiety Blog, Greg Weber, ...
Greg Weber talks about his goals for the Treating Anxiety blog at Heal...
Duration:
2m 35s
Gregory Weber - appearance
Name Look - Gregory Weber - appearance. In this video we present "Greg...