US20160028671A1 - Adaptor Based Communication Systems, Apparatus, and Methods - Google Patents
Adaptor Based Communication Systems, Apparatus, and Methods Download PDFInfo
- Publication number
- US20160028671A1 US20160028671A1 US14/737,908 US201514737908A US2016028671A1 US 20160028671 A1 US20160028671 A1 US 20160028671A1 US 201514737908 A US201514737908 A US 201514737908A US 2016028671 A1 US2016028671 A1 US 2016028671A1
- Authority
- US
- United States
- Prior art keywords
- message
- recipient
- adaptor
- adaptors
- messages
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/06—Message adaptation to terminal or network requirements
- H04L51/066—Format adaptation, e.g. format conversion or compression
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1895—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for short real-time information, e.g. alarms, notifications, alerts, updates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/224—Monitoring or handling of messages providing notification on incoming messages, e.g. pushed notifications of received messages
-
- H04L51/36—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/56—Unified messaging, e.g. interactions between e-mail, instant messaging or converged IP messaging [CPM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
Systems, methods, and apparatus for sending electronic messages. One embodiment provides methods which include accepting a message in a disparate source-message-type. The recipient, a recipient-message-type, and the source-message-type are determined and, responsive thereto, adaptors are selected for changing the message from the source-message-type to the recipient-message-type. The message is adapted and versions of the adapted message are sent to the recipients. The message types correspond to permutations of technologies and user preferences associated with the messages. Moreover, the message could be an emergency notification, part of a campaign, etc. Quality of service (QOS) measurements regarding the message can be gathered and different adaptors can be dynamically selected responsive thereto. Further, third-party adaptors can be accepted and rules can be implemented pursuant to which the third-party adaptors will be used. In some cases the message can further comprise data in differing formats on which the adaptors are used.
Description
- Hurricane Sandy (New Jersey, 2012) demonstrated that, even in today's high-technology environment, communication systems remain fragile, prone to damage, and capable of being overwhelmed by events. More particularly, during that storm, telephone, cable television, Internet, and other communication networks suffered severe damage. This damage caused a situation in which hundreds of thousands of people, if not millions, could not communicate with one another or with people outside of the storm-affected area. On a similar note, commercial organizations could not reach their employees, customers, and suppliers. Indeed, at one point, it was reported that brokerage firms at the New York Stock Exchange were experiencing difficulty executing trades because key personnel could not be contacted. Worse still, government officials, first-responders, and other critical personnel could not send warnings, updates, instructions, etc. to the storm victims.
- While Hurricane Sandy posed a dramatic challenge to the affected communication systems, it does not require an epic storm to cause communication problems. Indeed, real-time communications and failures thereof can be critical to the success of any organization and, more particularly, those whose owners wish to build smarter enterprises. With personnel, processes, communication devices, etc. in many of these enterprises spread around the world, the communication challenges can be immense. Communication failures can disrupt these organizations leading to undelivered products/services, dissatisfied customers, confusion in the market place, etc.
- Most people in organizations (commercial or otherwise) who wish to communicate merely want to express their thoughts relative to whatever mission, job, goal, etc. that they might be attempting to fulfill. Yet, to do so, they must consider a number of factors that are more or less irrelevant to those actual thoughts. For instance, the communication device they use to express themselves might be relatively powerful with a full set of user interface features. In contrast, the device with which the recipients might prefer to receive their messages could be comparatively limited. In one such scenario the person generating a message might be using a desktop computer with a full keyboard and an email program with a complete graphical user interface while their intended recipients might be using rudimentary cellular phones with limited capabilities for receiving messages. In this case, the cellular phones might be effectively limited to receiving SMS (Short Message Service) messages. Thus, to communicate successfully, the sender might need to format their messages in such a way that they will display properly on the more limited devices. Of course, the sending party might not even be aware of the recipients' limitations thereby creating an even higher possibility of communication failure.
- Moreover, even non-technical issues pose communication challenges. For instance, one or more of the parties involved in an attempted communication might understand a language different than that understood by the sender. In such cases, the sender might need to have a translation performed before sending the message. Additionally, user preferences can also play a role in limiting the ability of people to communicate. Of course, some people prefer to receive fully formatted emails. Others prefer Twitter messages while others prefer to receive POTS (Plain Old Telephone System) system calls. Thus, while a particular sender might be able to communicate effectively with some of their intended recipients, it is increasingly likely (with the continuing proliferation of communication technologies) that their communications with at least some intended recipients will suffer.
- Additionally, communicating in real-time can be one of the keys for building a smarter enterprise. Many enterprises have to deal with people, processes, and communication devices that span numerous countries, time zones, cultural divides, languages, legal systems, as well as various enterprise and/or user related rules and preferences. To make matters more complex (and the likelihood of communication difficulties all the more likely), various communication-related trends and disruptive technologies continue to wash across the world. For instance, a few years ago Twitter had not yet been invented. Now in some settings it is vital for successful, real-time communications. Yet, having differing communication strategies to accommodate all of these factors can be prohibitively expensive.
- The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosed subject matter. This summary is not an extensive overview of the disclosed subject matter, and is not intended to identify key/critical elements or to delineate the scope of such subject matter. A purpose of the summary is to present some concepts in a simplified form as a prelude to the more detailed disclosure that is presented herein.
- The current disclosure provides systems, apparatus, methods, etc. for communicating among various users, communication devices, etc. and more particularly for exchanging messages between various disparate users, disparate devices, etc. using a number of disparate communication technologies via dynamically selected message adaptors. Embodiments take care of the delivery of messages in an efficient and effective manner across continents, languages, delivery mechanisms, communication devices, and time zones. Embodiments provide integrated auditing and tracking capabilities such as those related to FINRA (Financial Industry Regulatory Authority) compliance while providing intelligence, flexibility, and insight into such communications. Moreover, embodiments free users from accommodating the communications hurdles discussed herein. Instead, embodiments allow users to concentrate on the content of their message and/or on their target audiences.
- As alluded to above, 2012 posed a number of challenges to the United States. These challenges included emergencies, tragedies, and the ongoing financial crisis. From the destruction and havoc wrought by Hurricane Sandy, an out break of meningitis, the Dark Moon Rising massacre, the Sandy Hook Elementary School shooting, to ongoing budgetary negotiations (or lack thereof) between Congress and the President, various organizations found themselves responding to rapidly changing threats, events, situations, etc. Such events, no matter how tragic, seem likely to recur at unpredictable times and places. Thus, a need will continue to exist for mass communication and/or emergency notification systems to help minimize risk and damage, to help maximize safety, and to keep organizations running despite the aforementioned potential sources (and others) of communication failures.
- For instance, as reported by the New York Times, “If there is one lesson transit officials have learned from Hurricane Sandy, it is that in the Internet era, keeping riders up to date is just as important as tracks and rolling stock. Blow it, and they will let you know. As workers raced to bring washed-out tracks, flooded tunnels and swamped electrical equipment back online, they also faced the daunting task of keeping millions of riders informed of conditions and schedules that sometimes shifted by the minute, using tools that included Facebook, Twitter, Flickr and YouTube.” Rivera, Ray, “Social Media Strategy Was Crucial as Transit Agencies Coped With Hurricane.” The New York Times, 14 Dec. 2012.
- Embodiments provide communication and/or notification systems, apparatus, methods, etc. that are flexible, expandable, and extensible. These embodiments also help users manage risk and minimize damages while responding to emergencies and managing potentially complex and/or fluid situations. For instance, embodiments allow government, commercial, and other organizations to quickly and effectively notify their constituents during emergencies and other urgent situations. Embodiments also allow organizations to automatically communicate with employees, partners, and other stakeholders as well as improving organizational continuity.
- Some embodiments provide systems and methods for sending electronic messages. One embodiment provides a method which includes accepting a message in a source-message-type. The recipient, the source-message-type, and a recipient-message-type are determined dynamically and, responsive thereto, adaptors are dynamically selected for adapting the message from the source-message-type to the recipient-message-type (which can be disparate from one and other). In such methods, the message adaptation is also made and the adapted message is sent to the recipient. The message types of the current embodiment correspond to permutations of user (sender, recipient, and/or otherwise) preferences (including their preferred human languages) and communications technologies at various levels of the OSI model (or other models) of communication systems. Note that many preferences, as they relate to the current embodiment, happen to deal with the higher levels of such models where at users typically have, express, and/or select their preferences. Quality of service (QOS) measurements regarding the message can be gathered and different adaptors can be selected responsive thereto. Moreover, where communications rely on third-party networks/services, service-related terms and/or routing schemes can be negotiated in real-time or near real time. Further, third-party adaptors can be accepted and rules can be implemented pursuant to which the third-party adaptors will be used. In some cases the message can include unstructured data on which the adaptors operate. Another embodiment provides a system with a network interface, a processor, and a memory in communication with one another. The memory stores processor executable instructions which when executed by the processer cause the processor to perform methods such as those disclosed herein.
- To the accomplishment of the foregoing and related ends, certain illustrative aspects are described herein in connection with the annexed figures. These aspects are indicative of various non-limiting ways in which the disclosed subject matter may be practiced, all of which are intended to be within the scope of the disclosed subject matter. Other advantages and novel and/or obvious features will become apparent from the following detailed disclosure when considered in conjunction with the figures and are also within the scope of the disclosure.
- The detailed description is described with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number usually identifies the figure in which the reference number first appears. The use of the same reference numbers in different figures usually indicates similar or identical items.
-
FIG. 1 illustrates a system for communicating using various disparate communication technologies. -
FIG. 2 illustrates another system for communicating using various disparate communication technologies. -
FIG. 3 illustrates another system for communicating using various disparate communication technologies. -
FIG. 4 illustrates a flowchart of a method for communicating using various disparate communication technologies. -
FIG. 5 illustrates a flowchart of another method for communicating using various disparate communication technologies. -
FIG. 6 illustrates a flowchart of yet another method for communicating using various disparate communication technologies. -
FIG. 7 illustrates a flowchart of still another method for communicating using various disparate communication technologies. - This document discloses systems, apparatus, methods, etc. for communicating among various users, devices, etc. and more particularly for exchanging messages between various disparate users, disparate devices, etc. using a number of disparate communication technologies via dynamically selected message adaptors.
- Generally, with heretofore available systems, a sender sends a message or notification of some sort directly to a recipient. Since many senders and/or recipients (herein “users”) are human, ideally, most messages are sent in a message type and a human language that both of their communication devices and the users can handle and understand. Clearly, that does not always occur. Moreover, as the number of recipients increases for any given message, the chances increase that at least one recipient will not be able to understand the message due to differences between the language and message type in which the message was sent and the language and message type which that recipient is prepared to handle. Further, as the number of different communication processes, networks, devices, etc. increase so does the chance that the message will be partly or wholly incompatible with some device, protocol, user, etc. involved. Thus, when a person (or machine, process, etc.) attempts to send a mass notification, it is almost a certainty that some compatibility issues will result.
- With heretofore available systems, message senders seeking to communicate to disparate recipients with disparate communications devices over disparate communication systems had to send out mass notification messages in a repetitive, silo-like fashion. In other words, users would cut and paste the same content into numerous messages each being hand-tailored for the myriad of technological, human-level, (and other) permutations involved. They would then send these messages out as quickly as human involvement would allow.
- Such approaches suffer a number of challenges. First, managing the multiple distribution outlets or channels requires a large investment in time and resources. Moreover, gaps in coverage could still result even after spending the time to log into, or otherwise access, each outlet. Inconsistency and errors, of course, also tend to creep into such numerous hand-tailored messages.
- Secondly, if creating these messages involves accessing secure, privileged, proprietary, or confidential information, the talent pool from which to draw personnel will likely be circumscribed by the need to limit access to that sensitive information. Accordingly, it might prove difficult to find someone (or a team) possessing the skills needed to access each one of the various outlets involved and to perform each of the necessary hand-tailoring steps. Moreover, these individuals might not have the proper passwords, accounts, etc. for each of the outlets. Maintaining these accounts might also be time-consuming particularly if personnel turnover occurs in the responsible organization with systems heretofore available.
- Thirdly, with such approaches, accountability can become problematic. When several or more individuals are involved, proving who sent a particular message, when, and in which message type might be difficult. Knowing who received the message (and when and where they did so) can also pose similar problems. In addition, should the sending of a version of a message have been omitted previously available systems might yield little, or no. visibility into that oversight.
- Next, while social networks provide a convenient forum through which a message might go viral (thereby speeding its dissemination), social networks also have particular issues associated with them. More specifically, once a message enters a social network, users can modify, spoof, hack it, or take some other malicious action with respect to it. The sender of a particular message therefore might not be able to adequately protect their brand, the message, its privacy, etc. using previously available systems.
- Additionally, obtaining meaningful metrics using previous approaches can also be challenging. One metric that poses a challenge to gather is determining and quantifying which of the intended recipients has received (their version of) a particular message. While some information along these lines might be available, it tends to be ad hoc and disorganized. Obtaining actionable information from it could therefore become a resource intensive project. Without this metric and other analytics, meaningful decision making might be difficult to make and/or error prone. Embodiments can help users solve or otherwise deal with some or all of these issues among others.
- More specifically, embodiments allow government, commercial, and other organizations to quickly and effectively notify their potentially numerous constituents during emergency and other situations. Embodiments also allow these organizations to automatically communicate with employees, partners, and other stakeholders as well as improving organizational continuity. Embodiments do so in a variety of contexts too while adding intelligence, flexibility, and insight into communications made accordingly.
- Embodiments also enable organizations to comply with various communications-related regulations. More specifically, certain regulations require particular organizations to communicate statistics about certain topics to affected individuals so that they can glean insights into those organizations. The U.S. Clery Act is an instance of such regulations and requires colleges and universities to disclose information regarding on-campus crime. Embodiments enable school officials to comply with the Clery Act by distributing (over systems provided by embodiments) annual security reports to students and employees and by providing publically accessible crime logs. Timely warnings of specific incidents (and trends) can also be distributed via systems, apparatus, and methods of the current embodiment. Thus, in the event that an incident occurs, these schools and their students and employees will likely be better equipped to deal with the situation. Embodiments therefore increase campus safety and safety in other areas.
- In other scenarios, embodiments can help government officials respond to natural disasters such as hurricanes. More specifically, incident management teams can help ready themselves for deployment by using systems, apparatus, and methods of the current embodiment to notify team members that they might be needed. The types of team members that might be notified include emergency medical responders, fire department personnel, law enforcement officers, etc. To complicate matters, these team members might be distributed across one or more states and might also be traveling thereabout. Even so, when these team members deploy to emergency areas in their own states or elsewhere, these large undertakings can be managed in part or in whole via systems of embodiments. This result can occur even though team members might be mostly volunteers that are deployed on timelines that impose surprises and inconveniences on them. Notifications can be sent to them thereby enabling the volunteers to coordinate their deployment with their families, employers, etc. Doing so and providing feedback to their deployment leaders of course takes time and effort. Both of which can be reduced in accordance with the current disclosure.
- Such notifications and the resulting responses can be handled via most ad hoc (or arbitrarily) assembled combinations of land-line phones, cellular phones, text messaging services, email, social networks (such as Facebook), Twitter, etc. in accordance with embodiments. Furthermore, the notifications and responses can be coordinated in real-time even though they might be numerous and might be coming from (and going to) disparate communication devices. As a result, deployment leaders can report their deployment readiness back to the commanding authorities without undue delay. Embodiments can allow for such results even in the face of blackouts, debris in the streets, etc. and the resulting inability of repair crews to clear the way and/or restore infrastructure. Thus, response, rescue, and recovery efforts can begin sooner and can achieve better results (as measured by rescued victims, saved property, etc.) using systems of the current embodiment.
- Systems and methods of embodiments can also be used to aid in preparing for and coping with events other than emergencies. For instance, Formula 1 racing and other entertainment events can draw hundreds of thousands of visitors. Systems of the current embodiment can allow local governments to reach out to the numerous visitors and residents of the area during such events. Even county governments and county associations (which can be fragmented because of their inter-agency nature) can coordinate activities. Consider a typical county fire department association which is usually composed of a dozen or so members from differing fire departments, cities, etc. Even such fragmented organizations can communicate and work together using systems of the current embodiment to integrate their disparate communication systems. Thus, where an event crosses jurisdictional lines, ad hoc response teams can respond effectively in an integrated, inter-operable manner.
- For instance, the approximately 63 wild fires in Texas that started over the 2011 Labor Day weekend represent a group of related incidents that embodiments can help users deal with. During those wild fires, numerous municipal fire departments, police departments, and disaster management offices had to coordinate their own activities along with those of the National Forest Service (NFS), the Federal Emergency Management Agency (FEMA), the National Weather Service (NWS), various county offices, and even charities such as the Red Cross. Embodiments would enable communications across these disparate jurisdictions (and attendant communication systems) without the end users necessarily having to change their preferred communication devices, technologies, human-level preferences, etc. Indeed, embodiments allow for integration and inter-operability with IPAWS (Integrated Public Alert and Warning Systems), CMAS (Commercial Mobile Alert Systems), and like systems. Thus, systems and methods of the current embodiment can assist in notifications related to natural disasters (hurricanes, tornadoes, snowstorms, etc.) hazardous material events (chemical spills, disease outbreaks, etc.), law and order events (Amber Alerts, terrorist threats, etc.), and in other situations.
- The current disclosure provides embodiments in which dynamically selected adaptors, working in conjunction with certain rules, are ordered and applied to an incoming message to transform it into one or more message instances suitable for delivery to the various recipients and in message types which the recipients can handle. The adaptors also respond to attributes associated with the senders and recipients in adapting the incoming message to the recipient-message-types. These user attributes include users' communication preferences, their current and/or default location, and their availability among other considerations. Thus, embodiments help enable flexible and intelligent communication of messages and/or notifications and the resulting responses between the parties involved in the communication.
- The adaptors of embodiments include communication adaptors, transformation adaptors, process adaptors, collaboration adaptors, and analytical adaptors. Communication adaptors of the current embodiment adapt a message originating in a message type associated with one communication technology to a message type suitable for forwarding via another communication technology. Thus, one communication adaptor might transform an email message for transmission to users in Latin America via SMS. Another communication adaptor could adapt an email declaring a tornado warning so that it becomes an analog signal capable of triggering a legacy tornado siren.
- Transformation adaptors can perform a variety of functions such as translating a message (or its contents) from one human language to another, filtering profanity, etc. Process adaptors manipulate the delivery of the message in some manner such as scheduling its delivery. Meanwhile, as their name implies, analytical adaptors perform analysis related to the messages upon which they operate. For instance, an analytical adaptor could detect trends associated with the message such as the rate at which responses are being received.
- Systems of the current embodiment also provide an interface through which third parties can create adaptors and the rules governing their selection and application to various messages. Thus, should a third party develop some new communication technology, that party could develop one or more adaptors (and associated rules) and register the same with the system. In that way, should a message arrive via that new communication technology, the system can dynamically select the appropriate third party adaptor, execute it, and deliver the adapted message accordingly. Additionally, messages destined for delivery via that third-party technology can be adapted accordingly on the fly without user intervention.
- Furthermore, systems of the current embodiment can also associate metrics with each of the adaptors. These metrics can include measurements related to communication-related costs, reliability, capacity, current network status, access control, location compatibility, etc. Moreover, from these metrics, the system can derive QOS measurements and dynamically select adaptors responsive to those measurements. In the alternative, or in addition, the system of the current embodiment can negotiate with third-party networks/services responsive to changes in QOS metrics related to these systems/services. In some embodiments, the system can assign a rating to various messages related to the authenticity of the message and/or value of the content to the sender (and/or some or all of the recipients). Moreover, the system can use these ratings to prioritize messages.
- In the alternative, or in addition, the system could substitute adaptors based on business reasons. For instance, suppose a company wishes to expand an advertising campaign from Latin America to a broader audience. In this case, systems of the current embodiment could initiate a substitution of a communication adaptor for delivering SMS messages to recipients in Latin America to a communication adaptor for delivering SMS messages to a world-wide community. In another scenario, some particular third-party network/service might spontaneously alter their prices and/or QOS related terms which of course would affect the costs and/or QOS related to messages handled by systems of embodiments. The system of the current embodiment could respond by (re) negotiating these terms and or dynamically substituting various adaptors so that the messages could be re-routed in light of these third-party changes.
- Some embodiments provide systems which process “unstructured” data in certain scenarios. For instance, should a notification message be sent regarding some event or condition, various responses might include a variety of unstructured content. In one scenario a tornado warning might be sent out and recipients might respond spontaneously with video or still images of the storm. Their responses could also indicate the status of the tornado (on the ground or not, its size, strength, etc.). Likewise, their responses might include communications via various social networks. In the alternative, or in addition, their “responses” might involve their unilateral decision to respond via a communication channel unrelated to the original message regarding the event. Adaptors could be implemented in these systems to recognize, capture, process, etc. some or all of these types of unstructured data thereby providing a more comprehensive understanding of the storm (or event) than might be possible otherwise and (often) in less time. Adaptors can also be created that combine such unstructured information with structured information to provide insights into the corresponding situations, events, conditions, etc. In one scenario, the information derivable from communications within a social network could be analyzed with respect to a particular FEMA or other government notification to determine how rescue, recovery, and restoration operations are proceeding.
- Turning now to the drawings,
FIG. 1 illustrates a system for communicating using various disparate communication technologies. Among other components of thesystem 100,FIG. 1 illustratesusers 101,adaptation subsystem 102,source 104,region 106, broadcasttelevision network 108, siren/loud speaker 110,cellular telephone network 112, POTS (Plain Old Telephone System)network 114, satellite-basedcommunication network 116,cellular phone 118,message 122,communication failure 124, notification orincoming message 126, adaptedmessages interface 133,processor 134,memory 135,adaptors 136, adaptor sets 138, 140, and 142,dynamic adaptor selector 144,rules module 146,adaptor library 148, andresponse 150. - Briefly, in the current embodiment, the
system 100 operates as follows. A user acting as or with asource 104 creates anincoming message 126 and sends it to theadaptation subsystem 102. Thedynamic adaptor selector 144 inspects theincoming message 126 and determines from it (or other information available to the dynamic adaptor selector 144) the type of message that it happens to be, its intended recipients, and perhaps its source. From that information (as is disclosed elsewhere herein), thedynamic adaptor selector 144 selects one ormore adaptors 136 and places them in an order which it determines to form one or more adaptor sets 138, 140, and 142. Moreover, thedynamic adaptor selector 144 creates each adaptor set 138 to correspond to one or more intended recipients that happen to share all characteristics that determine the make up of that adaptor set 138 (including its ordering). Theadaptation subsystem 102 then processes the incoming message with each adaptor set 138, 140, and 142 to create the corresponding adaptedmessages adaptation subsystem 102 therefore sends these adaptedmessages - Furthermore, one or more of the recipients might choose to send a
response 150 to thesource 104 in some scenarios. Of course, some recipients might not be able to, or might choose not to, send a response to thesource 104. Indeed, some recipients might not receive the message 126 (or their corresponding version of it) or might not be able to read, interpret, etc. the same. In some cases, therefore, someresponses 150 might be sent and some might not. Theresponses 150 that are sent traverse thesystem 100 in a manner generally similar to how theincoming message 126 traversed thesystem 100. Theadaptation subsystem 102 of the current embodiment treats theseresponses 150 as incoming response messages and processes them with the dynamically selectedadaptors 136. Of course, provisions can be made invarious adaptors 136 such thatresponses 150 are recognized as such and are associated with the originalincoming messages 126. Metrics can then be gathered regarding theresponse 150, the response rate, etc. - Moreover, the
adaptation subsystem 102 can instrument various points throughout thesystem 100 to measure how theoverall system 100 performs as well as how itself performs. These measurements can occur on any given message, any portion of thesystem 100, etc. Thus, theadaptation subsystem 102 of the current embodiment measures the quality of service (QOS) provided by thesystem 100 and, if desired, dynamically changes the selections of theadaptors 136, message pathways, etc. to adjust for changes in the QOS of thesystem 100 as well as in changes in the incoming message(s) 126 and/or user preferences. Furthermore,system 100 can instrument various third-party networks/services to determine and/or respond to their QOS. - With continuing reference to
FIG. 1 , at this juncture, it might be desirable to consider aspects of some of the components ofsystem 100 in more detail. First, thesystem 100 can spread over or serve aregion 106. Thatregion 106 can be any size but for the purposes of illustration,FIG. 1 illustrates the region around the state of Texas. Perhaps interestingly, thatregion 106 contains areas where English is the predominant language and areas where Spanish (Mexico for instance) and French or French-Creole (such as Louisiana) are spoken widely enough to be of note. Note also thatregion 106 spans numerous jurisdictional lines including several state lines, many county and municipal limits, and national boundaries (between the U.S. and Mexico) and even geographic boundaries (here, the coastline of the Gulf of Mexico). - Additionally,
users 101 in the region employ a number of communication technologies as represented by a few illustrative technologies shown byFIG. 1 . For instance, a television network 108 (illustrated as a television transmission tower) represents one form of wireless broadcast technology even though many others (such as AM, FM, and short wave radio) exist.FIG. 1 also illustrates that theregion 106 can include siren/loud speakers 110. These (and other technologies) can be in communication with IPAWS/CMAS and like systems. In this case, the siren/loud speaker 110 can serve as a last-minute/last-mile device to alert thosenearby users 101 to certain notifications (such as, tornado and other violent weather warnings). -
POTS network 114 represents that even somewhat older technologies can be employed insystem 100. Of course, even older legacy (for instance telegraph systems) can be employed incommunication system 100. Of course,cellular telephone network 112 illustrates that newer or emerging technologies can be used insystem 100. And, of course, Internet-based technologies such as social networks, Twitter, email systems, SMS systems, etc. can be integrated intosystem 100 byadaptation subsystem 102. “Social media” can also be employed insystem 100 since, if for no other reason, various social media tend to be Internet-based forms of communications and/or messages conveyed by various social media tend to piggyback on other communication technologies. Source 104 (illustrated as a desktop computer) also indicates that such technologies can be used incommunication system 100. - In the absence of
adaptation subsystem 102, though, communications can be prone to failure. For instance, one or more of the physical lines (wires, fiber optic cables, etc.) linking the various corresponding devices can be damaged or inoperative either in whole or in part. But, other non-technical and/or human-level issues can causecommunication failures 124 in thesystem 100. Such as a particularincoming message 126 might be sent or transmitted in a message type not suitable for one or more of the intended recipients. For instance, it might be sent in a language that the particular user cannot understand. In the alternative, or in addition, if one of the recipients happens to be handicapped (such as being blind or deaf) that recipient might be effectively unable to receive the message despite perhaps flawless technical performance by previously available systems. That message could also, or in the alternative, be delivered at a time or in a way such that it is effectively unavailable to one or more of the intended recipients. For instance, someone might “call” usingPOTS network 114 when no one happens to be home and any recorder there is unpowered. - Even non-technical issues might cause a
communication failure 124 incommunication system 100 in the absence ofadaptation subsystem 102. In some scenarios, thesource 104 might generatemessages 122 in one language (possibly English) and some of the intended recipients might only understand a second language (possibly Spanish or French-Creole). Thus, despite flawless technical performance,system 100 might effectively fail in such situations were it not foradaptation subsystem 102. - With continuing reference to
FIG. 1 , aspects ofadaptation subsystem 102 are disclosed herein. For instance, thesource 104 might include any sort of person, process, device, communication technology, etc. that can generate theincoming messages 126. Of course, someconvenient sources 104 would be desktop computers, laptop computers, notebook computers, tablets, smart phones, etc. But other communication technologies and devices are likely to arise and can be used withcommunication subsystem 102 as is further disclosed elsewhere herein. Moreover, pre-existing, pre-digital, legacy or “old” technologies such astelevision networks 108, siren/loud speakers 110,cellular telephone systems 112,POTS systems 114, satellite-basedcommunication systems 116,cellular phones 118, etc. can generate input “messages” 126 as well. For instance a POTS voice message could be directed to theadaptation subsystem 102 as anincoming message 126.Adaptation subsystems 102 of the current embodiment are configured (in terms of hardware, software, firmware, etc. and combinations thereof) to acceptincoming messages 126 of these various message types. Though, in some embodiments,adaptation subsystem 102 is configured to adapt messages between various pre-dominantly human-level message types. - Accordingly, the
user 101 of thesource 104 might have a preferred or pre-configured type ofincoming message 126 which they ordinarily send. Of course, that message type might change or be changed from time-to-time. Yet, the sendinguser 101 need not concern themselves with the potential consequences of such changes. Theadaptation subsystem 102 detects these changes (or can be informed of the same) and adapts theincoming messages 126 accordingly. - Moreover,
incoming messages 126 can convey a wide variety of data, information, content, etc. Someincoming messages 126 will be SMS messages which carry only textual information. Otherincoming messages 126 will be email messages formatted fully in accordance with the application(s) which generated them conveying at least textual information. That information, though, might be formatted in many different ways and might be accompanied by other content. For instance, someincoming messages 126 might have attachments or convey multimedia content such as audio, visual, audio/visual, etc. files. - As is further disclosed herein,
incoming messages 126 can also convey “unstructured data.” Unstructured data, in the current embodiment, being content that does not match the format of the content of theincoming message 126 and/or does not match the content expected in ananticipated response 150. In some scenarios, some users might responds to an SMS message by sending jpg files. In other scenarios, unstructured data arises because the original message might have conveyed a response form which some users ignored and instead responded with an SMS message. - In the alternative, or in addition, some
incoming messages 126 are “notifications” that can serve to alert theadaptation subsystem 102 to generate a message. Of course, such notifications can be automatically generated by thesource 104 via some sensor sensing an incident, via a campaign triggering various messages (whether social media messages or not). Upon receiving such a notification, thecommunication subsystem 102 can generate the actual message to be “input” into theadaptation subsystem 102. For illustrative purposes, though,FIG. 1 shows only anincoming message 126. Also, it might be worth noting that, the ultimate “source” of theincoming message 126 might be ahuman user 101 rather than a machine or a computer. Although, either type ofsource 104 and others are within the scope of the current disclosure. - All of these considerations, and others too numerous for recitation here, result in each message (whether an
incoming message 126, aresponse 150, or otherwise) being of a given message type. As those skilled in the art understand, communication systems and the messages therein can be characterized by the various technologies used in their implementation. For instance, the Open Systems Interconnect (OSI) model characterizes communication systems in terms of seven “layers:” the application, presentation, session, transport, network, data link, and physical layers. Of course, other models exist such as the TCP/IP (Transport Control Protocol/Internet protocol) model which also characterizes communication systems in terms of certain layers, namely the application, transport, Internet, and physical layers. Of course, other models can be used to characterize communication systems and the messages therein without departing from the scope of the current disclosure. While somesystems 100 of some embodiments can be configured to perform adaptations at any/all such levels,systems 100 of other embodiments can be configured to perform adaptations at levels that tend to involve more human-level preferences. - Furthermore, numerous protocols, specifications, standards, and the like (hereinafter “communication technologies”) define differing ways in which a message can originate, propagate, and be received via a communication system based on some particular permutation of these communication technologies. Thus, in an
open communication system 100 such as the one illustrated byFIG. 1 , each message has associated therewith a permutation of these various technologies along with user preferences (such as the human language in which it is created). Herein each such permutation is termed a “message-type.” Clearly, a user attempting to manually alter anincoming message 126 to create the various versions thereof for more than even a few message types would likely find themselves overwhelmed.Adaptation subsystem 102 of the current embodiment relieves theuser 101 of such burdens and dynamically creates the numerous versions of theincoming message 126 having the message types deemed reasonable likely to be received and understood by the various recipients despite the various technologies and user preferences involved in the communication. - As illustrated in
FIG. 1 ,adaptation subsystem 102 can be a server or other type of apparatus capable of executing programs or collections of processor executable instructions for carrying out various methods disclosed herein. Moreover,adaptation subsystem 102 includes theprocessor 134 and thememory 135 in communication therewith and storing such instructions.FIG. 1 also schematically illustrates that theinterface 133 communicates with theprocessor 134 and with thesources 104 and various receiving devices. Thus, theadaptation subsystem 102 executes thedynamic adaptor selector 144 as well as theadaptors 136 themselves insystems 100 of the current embodiment. - Regarding the
adaptors 136, thesystem 100 includes thelibrary 148 ofadaptors 136.FIG. 1 illustrates that thelibrary 148 resides externally from theadaptation subsystem 102 although it could reside internally within the same. In any event, it contains a number ofadaptors 136 of various kinds. For instance, some adaptors translate message content from one human language to another.Other adaptors 136 adapt messages so that they can be received, displayed, or otherwise accessed by differing communications devices such as, but not limited to, those illustrated byFIG. 1 .Other adaptors 136 might re-format an incoming message 126 (or some version thereof) to suit a different protocol than its original protocol. Thus, a particular adaptor might accept a fully formatted emailincoming message 126 and strip it of information, content, formatting, metadata, etc. until it becomes suitable for forwarding as an SMS or Twitter message. Moreover, thelibrary 148 can contain and acceptadaptors 136 created by third parties. Thus, in some cases, entities other than those who might own orcontrol adaptation subsystem 102 can create and loadadaptors 136 into thelibrary 148 for adaptation to/from communication technologies which they create. - With continuing reference to
FIG. 1 , thedynamic adaptor selector 144 of the current embodiment provides several functions. For instance, thedynamic adaptor selector 144 examinesincoming messages 126 to determine information which might be useful in selecting theadaptors 136. It also either monitors or gathers QOS measurements related to the performance ofsystem 100. As theadaptation subsystem 102 receives, generates, or otherwise acceptsincoming messages 126, thedynamic adaptor selector 144 examines the QOS measurements, the intended recipients (and the source 104) of theincoming messages 126 and the message types associated with the sendingusers 101, the receivingusers 101, and their communication devices. From such information, thedynamic adaptor selector 144 determines whichadaptors 136 to use to change theincoming message 126 into adaptedmessages messages - These determinations can be based on rules stored in the
rules module 146, database, etc. The rules stored therein define the conditions under which one ormore adaptors 136 might be used to change theincoming messages 126 into adaptedmessages adaptor library 148 and therules module 146. When thedynamic adaptor selector 144 detects a newincoming message 126 it checks various conditions, reads the rules in therules module 146, and applies the same to select theadaptors 136. These rules can specify the adaptors 136 (and/or types of adaptors) that some or all of theadaptors 136 should follow, precede, operate in parallel with, etc. In other words, the rules can enable thedynamic adaptor selector 144 to select an ordering of theadaptors 136 for creating a particular version of the incoming message 126 (that is, a particular adapted message 128). Moreover, because conditions can change and because thedynamic adaptor selector 144 can be cognizant of these changes in real, or near real-time, thedynamic adaptor selector 144 can respond to changing conditions. Hence, it operates in a dynamic manner without necessarily requiringusers 101 to intervene when conditions change. - Still with reference to
FIG. 1 , theadaptation subsystem 102 can output the adaptedmessages system 100. It can also receive the responses 150 (if any). And, if someresponses 150 arrive,adaptation subsystem 102 can process them in a manner similar to the manner in which it treats other incoming (from its perspective) messages. Thus, without necessarily requiring human intervention,communications subsystem 102 can acceptincoming messages 126, adapt them as might be appropriate for various intended recipients, send the adaptedmessages 128 to those intended recipients, and process theresponses 150. It can also do so while gathering QOS measurements and dynamically adjusting its operations responsive thereto and without need for human assistance or intervention. -
FIG. 2 illustrates another system for communicating using various disparate communication technologies. More specifically, in heretofore available communication systems 200 amessage 122 would be sent from asource 104 to acellular phone 118 associated with aparticular user 101. If 1) themessage 122 as it left thesource 104 happens to be compatible with the particularcellular phone 118, 2) the intended recipient happened to be using thatcommunication device 118 at that time, 3) the communications technologies involved were compatible and available, and 4) a number of other compatibility and/or human-level preference-related issues happened to resolve successfully, the recipient would receive and be able to understand themessage 122 as-sent. Thus,communication failures 124 would be unlikely to occur in this scenario. But, with the continuing proliferation of communication technologies, it is unlikely that all compatibility issues will be resolved successfully. Furthermore, system and network failures, weather, malware, hackers, human-level preference issues and a number of other factors can combine with technical compatibility issues to render delivery of themessage 122 effectively uncertain. To improve the chances thatmessages 122 are effectively delivered to the intended recipient in a predictable form compatible with their human-level preferences, adaptation subsystems 102 (seeFIG. 1 ) can be added to existingcommunication systems 200. -
FIG. 3 illustrates another system for communicating using various disparate communication technologies. More specificallyFIG. 3 illustratesadaptation subsystem 302 which includes or communicates withdynamic adapting module 308, third-party networks 310,QOS metrics 312,campaigns 314,incidents 316,templates 318,apriori messages 320, ad hocmessages 322,sender preferences 323,recipient preferences 324, third-party network conditions 325,message content 327,analytics adaptor 337,message parser 352, device event/change 354, network event/change 356, QOS event/change 358,dynamic change 360,dynamic change 362,dynamic change 364, and GUI (Graphical User Interface) 366 which defines or acceptspolygon 368 andcircle 370. - In the current embodiment, the
dynamic adapting module 308 is illustrated as currently executing adaptor sets 338, 340, 342, and 343. Furthermore, thedynamic adaptor selector 344 coordinates variousdynamic changes communication system 300. Thesedynamic changes dynamic adapting module 308. Of course, whileFIG. 3 illustrates thedynamic adapting module 308 as a particular entity it can be the case that the dynamic adapting module is distributed among various processors, computers, etc. No matter how thedynamic adapting module 308 happens to be configured, it functions to adaptincoming messages 126 from their as-is or as-received message types to message types deemed likely to result in the message (or the content thereof) reaching the intended recipients in useful form (including in many cases being in accordance with their human-level preferences). - The third-
party networks 310 of the current embodiment reside outside of thecommunication subsystem 302 yet interface with it. Nonetheless, the third-party networks 310 include networks based on a number of different communication technologies including those represented by television broadcasting systems, sirens, loud speakers, cellular telephony systems, POTS systems, satellite-based systems, social networks, etc. The adaptedmessages party networks 310 as conditions in (or affecting) each of these networks permit. Indeed,FIG. 3 illustrates that adaptedmessage 333 propagates further than adaptedmessage 332, even further than adaptedmessage 330, and yet further still than adaptedmessage 330. - For instance, suppose a sender wishes to communicate with many people in a disaster area. The
POTS system 114 might have failed completely meaning thatmessages 328 conveyed thereby go nowhere with zero penetration into the effected area. Some cellular towers though might still be operating in which casecellular telephone messages 330 might get to at least a few recipients thereby providing some penetration. An Internet server or two might still be operating meaning that someemail messages 332 might get through to additional recipients thereby providing more penetration. Yet, despite the disaster, an A.M.radio message 333 might still be able to penetrate fairly deeply (to anyone with an A.M. radio no matter how primitive). The foregoing scenario, thus, demonstrates that for mass notification scenarios having multiple communication channels, outlets, technologies, etc. can be of value to those with a desire, need, want, etc. to communicate. - With continuing reference to
FIG. 3 , theanalytic adaptors 337 of the current embodiment operate to generate theQOS metrics 312. More specifically, thedynamic adaptor selector 344 can insertanalytic adaptors 337 into some or all of the adaptor sets 338, 340, 342, and 343 to gather QOS metrics associated with theincoming message 326 and/or thecommunication system 300. Someanalytic adaptors 337 can insert cookies and/or other tracking mechanisms into the adaptedmessages messages QOS metrics 312. -
FIG. 3 also illustratescertain campaigns 314. Thesecampaigns 314 relate to business or business-like activities although the scope of the current disclosure includes other types of campaigns. Somecampaigns 314 that can be included inadaptation subsystem 302 include advertising campaigns, marketing campaigns, fund raising campaigns, etc. As a result, thesecampaigns 314 have associated therewithcertain message templates 318, certainapriori messages 320, certain recipients (or groups of recipients), etc. Moreover,users 101 who act as senders ofincoming messages 326 can trigger the beginnings, endings, and certain events, milestones, etc. associated with thecampaigns 314. Each of which can cause theadaptation subsystem 302 to generate correspondingincoming messages 326 and to also operate on them as it would otherincoming messages 326. -
Incidents 316 operate in manner some what similar to the way that campaigns 314 do. However,incidents 316 usually arise from unplanned, often unpredictable occurrences in contrast tocampaigns 314. In other cases, though, an automated system could initiate anincident 316. A particular scenario that could cause a user, instead of an automated system, to initiate anincident 316 would be a new form of terrorist attack for which no automated system had been set up to detect. On the other hand, an automatic seismic detector could trigger anincident 316 associated with an earthquake withoutuser 101 intervention. No matter how an incident gets triggered,adaptation subsystem 302 could respond by issuing anincoming message 326 based on amessage template 318 or it could initiate one based on anapriori message 320. - Whether a
campaign 314 orincident 316 happens to be involved, anotification 317 can trigger theadaptation subsystem 302 to instantiate atemplate 318 based message or a message prepared apriori by the sending user 101 (an apriori message 320). In cases in which a sendinguser 101 has designated that anapriori message 320 is desired (such as when some sensor triggers the message), thecommunication subsystem 302 sends theapriori message 320 to thedynamic adaptor selector 344 as anincoming message 326. In cases in which a sending user has designated that atemplate 318 based message is desired, theadaptation subsystem 302 generates a message based on the user-designatedtemplate 318. Of course, theadaptation subsystem 302 can populate thetemplate 318 with data related to theapplicable campaign 314 and/orincident 316. In addition, or in the alternative, theadaptation subsystem 302 can add recipients to the distribution list, remove them therefrom, or otherwise alter the distribution list in manners previously selected by the sender forsuch incidents 316 or campaigns 318. - With ongoing reference to
FIG. 3 , theadaptation subsystem 302 also accommodates ad hocmessages 322. These ad hocmessages 322 include those messages which a user 101 (or perhaps an automated system) generates without the aid of atemplate 318 orapriori message 320 stored within (or otherwise accessible to) theadaptation subsystem 302. For instance, auser 101 can manually enter an ad hocmessage 322 and submit it to theadaptation subsystem 302. Such ad hoc messages 322 (as well as thetemplates 318 and/or apriori messages 320) can contain unstructured data and/or unsolicited inputs if desired. -
Adaptation subsystem 302 also includes or maintains tables, databases, etc. which storesender preferences 323 andrecipient preferences 324. These preferences indicate howvarious users 101 prefer to send and/or receive messages. As such, they can be manually entered by theusers 101, an administrator, or others. In some embodiments, theadaptation subsystem 302 can monitoruser 101 behavior to determine or learn their preferences and more specifically, those at a human level such as preferred languages, preferred application categories (for instance, email, chat, instant messenger, word processing applications), preferred applications within those application categories), etc. - With continuing reference to
FIG. 3 , theadaptation subsystem 302 also includes a table or database for storing third-party network conditions 325. In the alternative, or in addition, theadaptation subsystem 302 can communicate with such third party communications networks 310 (or rather their associated control computers) to obtain information regarding these third-party networks 310. Of course this table or database can also store information regarding conditions within theadaptation subsystem 302. More specifically, the third-party network conditions include information regarding the various pathways through the third-party networks,QOS metrics 312 for the same, costs for bandwidth on those pathways, (planned or unplanned) outage information, pricing, available bandwidth, etc. Moreover, various rules can be implemented to respond to changes to the foregoing information. In some scenarios, rules cause theadaptation subsystem 102 to detect changes in pricing, available bandwidth, etc. in various third-party networks 310 and/or services. Responsive thereto, these rules can cause theadaptation subsystem 102 to re-route various messages and/or negotiate new terms of service with the changed third-party network 310 and/or service. - With regard to the
dynamic adaptor selector 344 of the current embodiment, it contains amessage parser 352. Themessage parser 352 accepts variousincoming messages 326 including those arising fromtemplates 318,apriori messages 320, ad hocmessages 322 and/or messages arising from other sources or in other manners. Themessage parser 352 examines theincoming messages 326 and/or metadata associated therewith to determine certain information that can aid thedynamic adaptor selector 344 in its activities. For instance, themessage parser 352 of the current embodiment examines the headers (or similar structures) of theincoming messages 326 and determines the intended recipients. In some scenarios, themessage parser 352 could infer from context what certain attributes of the incoming message might be and create corresponding metadata with which to characterize the incoming message type. With this information, thedynamic adaptor selector 344 can access therecipient preferences 324 to determine how various recipients prefer their messages to be delivered. Themessage parser 352 can also parse theincoming messages 326, determine who the sender is, access their preferences amongstsender preferences 323; and apply those preferences when applicable. Moreover, themessage parser 352 of the current embodiment parses the incoming message 326 (and/or its metadata) to determine the message type thereof. In some cases, the message parser also examines the source or channel through which theincoming message 326 arrives to aid in some or all of these determinations. Themessage parser 352 of the current embodiment makes the resulting information available to theadaptation subsystem 302. - Still with reference to
FIG. 3 , theadaptation subsystem 302 provides ways for the senders to select their intended recipients. For instance, thetemplates 318 andapriori messages 320 can provide pre-arranged groups of recipients and/or thecampaigns 314 and/or incidents can be associated with groups of recipients if desired. Of course, senders can define theirad hoc messages 322 and the intended recipients thereof as they see fit within the capabilities provided by whatever message creation application they might be using. - In addition, or in the alternative, the
GUI 366 can allow senders to select their recipients graphically. In some embodiments, theGUI 366 can present an image corresponding to a region 306 (which the sender can select). Over the image of theregion 306, theGUI 366 can allow the user to draw apolygon 368,circle 370, or control of some other arbitrary or user-defined shape. Responsive to that control, theGUI 366 can cause the sender's communication device to select those recipients known to be within the corresponding area inregion 306 or can examine theuser preferences FIG. 3 , thepolygon 368 could correspond to a hurricane watch or warning zone and all persons within those areas could be grouped as intended recipients of anapriori message 320 regarding hurricanes in that area. In another scenario, a company might wish to initiate a campaign centered on a particular city (perhaps Austin, Tex.). In which case, a user in the company could draw thecircle 370 about Austin thereby defining as recipients for that campaign 314 a population in and around Austin, Tex. Thus,communication system 300 can treat the polygon 368 (or other shape) as an input from the user. However, thesystem 100 can also cause a corresponding output to appear on theGUI 366 so that the user can see and/or adjust their selection. - For an ad hoc
message 322, theadaptation subsystem 302 of the current embodiment can operate as follows. At some point auser 101 decides to send the ad hocmessage 322. Thatuser 101 accesses asource 304 communication device of some sort that might be any type of communication device now known or yet to be developed. Moreover, thatuser 101 can select a communication application of some type that would also be selected from among the known (and yet to be developed) communication applications. Of course, the user could also select other human-level aspects of the message (for instance, the user could start typing the message in English or could speak the same in English thereby exhibiting two human-level preferences: speech verse text and English verse another human language). Thus, from the perspective of theadaptation subsystem 302, the message type of the ad hocmessage 322 would be an arbitrary message type. Nonetheless, theuser 101 prepares the ad hoc message (including defining its recipients if desired) and sends it via theadaptation subsystem 302. - The
adaptation subsystem 302 routes the ad hocmessage 322 to themessage parser 352. Or, if desired, the sendinguser 101 can direct the ad hoc message toward themessage parser 352. In either case, themessage parser 352 can separate the ad hocmessage 322 into two or more parts: one including the content of the ad hocmessage 322 and the other containing the header, metadata, etc. associated with the ad hocmessage 322. Thecontent 327 it forwards to thedynamic adapting module 308 while retaining the header (et al.) for further consideration. - The
message parser 352 can also extract from the ad hocmessage 352 the list of intended recipients and the sender (if desired). Themessage parser 352 can also identify the message type of the incoming message if it is not completely provided or defined in its header. Of course, themessage parser 352 can be configured to detect many known message types and can be configured to make “best fit” determinations when a message of a partially or entirely unknown message type arrives. In addition, or in the alternative, those who develop new message types (in whole or in part) can register their message types with theadaptation subsystem 302 so that themessage parser 352 can be configured to recognize and respond to new corresponding message types. - With some or all of that information in hand, the
dynamic adaptor selector 344 applies the rules from the rules module to the ad hocmessages 322. More specifically, thedynamic adaptor selector 344 looks up the recipient andsender preferences dynamic adaptor selector 344 therefore knows the message type of the ad hocmessage 322 and the message types that the recipients prefer. Moreover, thedynamic adaptor selector 344 has access to the rules in therules module 146. Thedynamic adaptor selector 344 considers the various rules, determines which ones are applicable, and applies them to the ad hocmessage 122 as input to themessage parser 352. Thus, thedynamic adaptor selector 344 selects a set of adaptor sets 338, 340, 342, or 343 to change the ad hocmessage 122 from its incoming message type to one or more of the adaptedmessages - A few words regarding message types might be in order at this juncture. Message types encompass a number of variables that define a message (excepting its content). More specifically, a message is often created in a human language, is formatted (and has a syntax) according to the application which was used to create it, and (at least at some points) incorporates features related to the technologies used to accept, record, transport, etc. it. Of course, a variety of frameworks or models exist which attempt to categorize each one of the various factors that contribute to a particular message type. For instance, the OSI model defines seven “layers” of communication systems. Each layer of which might affect one or more message types due to the communication technologies applicable at that layer. These OSI layers include the application, presentation, session, transport, network, data link, and physical layers. Likewise, there exist various layers within the TCP/IP model. Plus, various manufacturer/vendors have created their own proprietary messaging frameworks. For instance, Apple Inc. has created a proprietary set of networking protocols used in its communication devices. Of course, user preferences also play a role at a human-level and perhaps elsewhere. All of these factors contribute to the number of permutations of combinations of technologies potentially associated with any given message.
- Referring still to
FIG. 3 , the ad hocmessage 322 as received by themessage parser 352 will have a message type defined by one combination of the foregoing sets of protocols, human languages,sender preferences 323,recipient preferences 324, etc. Each of the recipient-message-types will have another combination of protocols, languages,recipient preferences 324, etc. associated therewith. Thedynamic adaptor selector 344 therefore detects the incoming message-type, identifies the recipient message type(s), and (by applying the rules) selects a set ofadaptors 336 with which to adapt the ad hocmessage 322 into one or more adaptedmessages - With continuing reference to
FIG. 3 , themessage parser 352 of the current embodiment has identified that the ad hocmessage 322 has at least 4 recipients associated therewith. Hence, it has selected four adaptor sets 338, 340, 342, and 343 to apply to the ad hocmessage 327. Of course, it could be the case that more than four intended recipients exist for the ad hocmessage 322. But, it might also be the case that some of the recipient-message-types corresponding to these recipients happen to be identical. To detect such cases, thedynamic adaptor selector 344 can (after determining the recipient-message-types involved) compare the various recipient-message-types to identify duplicates (or near duplicates). Thus, the dynamic adaptor selector could select a particular adaptor set 338, 340, 342, or 343 and apply it to the ad hocmessage 322 for such a group of intended recipients with the same or similar recipient-message-types. Where recipient-message-types have enough commonality thedynamic message adaptor 344 can group thecommon adaptors 336 into a shared sub-pathway for the corresponding (and intermediate) versions of the message. The output of which would then branch to the parallel pathways and/or theadaptors 336 therein selected to finalize the corresponding adapted messages 328 (for instance). - The
dynamic adaptor selector 344 can also place theadaptors 336 in each of thesets dynamic adaptor selector 344. Or, the ordering might result from an interplay between both and/or other factors. In most cases, though, thedynamic adaptor selector 344 selects theadaptors 336 and loads them into thedynamic adapting module 308 of the current embodiment. - As soon as the
first adaptor 336 of a given set ofadaptors incoming message 326 can begin. For instance, suppose that a fully or partially formatted email message arrives at themessage parser 352. Consider further that one of the intended recipients prefers receiving a tweet in the given situation. The rules might cause thedynamic adaptor selector 344 to first apply an email-to-Twitter adaptor to parse the ad hocmessage 322 to a bare minimum of characters ofcontent 327. This adaptation might occur first because the author of the adaptor 336 (and corresponding rules) realized that stripping thecontent 327 of the ad hocmessage 322 to a minimal Twitter message might save processing bysubsequent adaptors 336. Thus, the email-to-tweet adaptor 336 could operate early in the order with its output being a string of 140 or fewer characters. - The
next adaptor 336 applied via the rules might then be a language translation adaptor. Themessage parser 352 might have recognized the possible desirability of such an adaptor selection because of a rule that watches for incoming messages in one human language paired with a recipient who has a preference to receive messages in another human language. Thus, thesecond adaptor 336 to be applied via adaptor set 338 could be a language translation adaptor.Other adaptors 336 could then be selected via the rules and designated for the adaptor set 338 in accordance with the rules. Of course, the author might have also wanted to reverse the ordering such that the translation happens first and, then, the shortening to a tweet occurs. - Adaptor set 340 might represent a simpler adaptation of the input ad hoc
message 322 than previously disclosed. Perhaps, in this situation, the corresponding recipient(s) prefer to receive messages in the language in which the ad hocmessage 322 happens to have been sent or has fewer preferences for which adaptation is desired. Adaptor set 342 illustrates an even simpler adaptation scheme in which application of the rules results in only twoadaptors 336 being applied to thecontent 327 of the ad hocmessage 322. - With continuing reference to
FIG. 3 , adaptor set 343 illustrates a case in which only oneadaptor 336 happens to have been selected for the adaptation desired for a particular recipient. Indeed, it is possible where the detected message type of the ad hocmessage 322 and a particular recipient message type are the same that noadaptors 336 are applied to thecontent 327 of the message. Instead, thedynamic adapting module 308 might pass the ad hocmessage 322 to that recipient as themessage parser 352 received it. However, it might also be the case that an administrative user of theadaptation subsystem 302 might desire to apply ananalytic adaptor 337 to each adaptedmessage party networks 310 for delivery. That administrative action could be applied to even those messages that pass through theadaptation subsystem 302 without otherwise being adapted. - Still with reference to
FIG. 3 , similar processes could unfold when acampaign 314 orincident 316 triggers a message. In the case of a campaign, ahuman user 101 might determine that the time has arrived to send a message to the targets of the campaign. Or that decision might have been automated. However, the decision occurs to send a campaign related message, theadaptation subsystem 302 allows the user to select whether atemplate 318 or anapriori message 320 is to be sent. In the case that anapriori message 320 is to be sent, theadaptation subsystem 302 causes that message to be generated and routed to themessage parser 352. Themessage parser 352 could default to handling theapriori message 320 as disclosed with reference to ad hocmessages 322. Or, if desired, the creator of the campaign 314 (or theapriori message 320 or template 318) could have established a particular rule in therules module 146 related to thecampaign 314. Such a pre-arranged rule could potentially speed the processing of the resulting message since it could cause thedynamic adaptor selector 344 to apply that rule and then trigger thedynamic adapting module 308 to immediately commence processing of the resulting message (without waiting for thedynamic adaptor selector 344 to consider other rules). -
Incidents 316 could be handled in a somewhat similar manner although the trigger for the incident might not be manual. Instead, some instrument, metric, orsensor 374 might establish the occurrence of anincident 316. For instance, auser 101 could have established that any reading above some threshold on a particular seismometer (or sensor 374) would indicate that an earthquake is occurring. Hence, an earthquake incident could be declared with either a template-based or aprioriincoming message 326 being issued. Or, if some third-party network 310 suffered a failure of some type, thedynamic adaptor selector 308 could respond by routing adapted messages around the affected communication links. In this situation, the rules might also indicate that such occurrences be detected by a givensensor 374 and that a set ofadaptors 336 corresponding to the new pathway be applied to the message. -
FIG. 3 also illustrates that aparticular campaign 314 might involve some social media aspects. For instance, a company might wish to launch anadvertising campaign 314 employing Facebook, Twitter, and/or LinkedIn messages among other types ofsocial media 372 messages. The company could have set up one ormore templates 318,apriori messages 320, and/or other messages of desiredsocial media 372 types which thesystem 100 could populate with data pertaining to thecurrent campaign 314. Each suchsocial media 372 message would then propagate throughcommunication system 300 withappropriate adaptors 336 being selected according to circumstances (and the applicable rules) by thedynamic adaptor selector 344. Responsive to the varioussocial media 372 messages sent bycommunication system 300, the various recipients might sendresponses 350 back to thecommunication system 300 as desired which when then be processed as disclosed elsewhere herein. - For instance, suppose that a municipality in an area prone to flash flooding were to launch a mobile application for alerting users to suddenly appearing high water. The municipality could launch a
campaign 314 that would result in numerous messages being sent to many users alerting them to the existence of the application and asking that reports of high water be sent to a given address, phone number, etc. Users who are out and about in the flood prone areas could then generateresponses 350 of ad hoc nature reporting various instances of high water. Rules could causedynamic adaptor selector 344 to identify such responses received by thecommunication system 300 and route these responses to some module. The module, program, application, etc. could cull from the ad hocresponses 350 unstructured data such as photographs, video, etc. and associate them with free-form reports accompanying the unstructured data in theresponses 350. From the collection ofsuch responses 350, the module could build a potentially comprehensive view of the flooding situation in the area. - Thus,
FIG. 3 illustrates the dynamic nature of theadaptation subsystem 302 and more particularly thedynamic adaptor selector 344 and thedynamic adapting module 308. As those skilled in the art understand,communication systems 300 can be complex systems subject to predictable and unpredictable events. Aparticular user 101 might switch off one device (such as their cellular phone) and turn on another (for instance, a laptop computer). Or a storm might obliterate portions of one or more third-party networks 310. Thus, adaptedmessages party network 310. In a somewhat similar vein, a QOS metric 312 associated with some portion of thecommunication system 300 might change thereby crossing some quality threshold (either for better or for worse). - Thus, rules can be implemented in
rules module 146 to causedynamic adaptor selector 344 to respond to such events, changes, etc. For instance, a rule could exist that causesQOS metrics 312 to be gathered regarding which communication devicesvarious users 101 might be using (or at least, which ones are in communication with the communication subsystem 302). Should these QOS metrics indicate that a particular communication device associated with a particular user has been deactivated, lost communication, or its communication capabilities have degraded, a rule could cause thedynamic adaptor selector 344 to recognize that a device event/change 354 has occurred. As a result, thedynamic adaptor selector 344 could implementdynamic change 360 thereby swapping out device-related-adaptor 336A for a different device-related adaptor 336B. The intent of the swap being to perhaps restore, improve, modify, etc. the ability to communicate with thatuser 101 despite their change of communication devices. - Similarly, a rule and/or
QOS metrics 312 could be implemented to monitor thecommunication system 300 for network events/changes 356. Thus, should one of the third-party networks 310 suffer an outage (whether total or partial), thedynamic adaptor selector 344 could detect the network event/change 356, substitute one network adaptor 336D (associated with the failed third-party network 310) for another network adaptor 336C (associated with another third-party network 310). Thus, even though a particularadapted message 330 could not be delivered per the original adaptor set 340, the modifiedadaptor set 340 could adapt that message for delivery via a substitute third-party network 310. Of course such network-based adaptors might also cause the message to be routed to hardware suitable to deliver the message to the newly associated third-party network. Similar on-the-fly adaptor 336 substitutions can be executed for mere degradations of the third-party networks 310. - Yet another illustrative scenario involves QOS related events and or changes. For instance, another rule could be registered with the
rules module 146 to monitorQOS metrics 312 for QOS events/changes 358. In one scenario, if delivery of a particularadapted message 333 happens to be taking too long on an otherwise healthy third-party network 310 and a particular healthy communication device, thedynamic adaptor selector 344 could detect that type of QOS event/change 358 and respond accordingly. In some cases that might mean substitutingadaptors 336. In other cases that might mean adding anadaptor 336 to an adaptor set. Yet, in other cases, it might result in removing (without replacing) an adaptor 336E from anadaptor set 342. For instance, suppose that a QOS metric for a particular third-party network 310, communication device, etc. improves. In that case, the adaptation associated with a particular adaptor 336E of a particularadapted message 332 might no longer be necessary or desirable. That adaptor 336E could then be removed from the adaptor set 342 thereby conserving computing resources associated with thedynamic adapting module 344. In addition, or in the alternative, a QOS metric could relate to pricing information for use of a third-party network 310. Should it change, various rules might cause theadaptation subsystem 302 to negotiate terms of service with that third-party network 310 and/or to route traffic message traffic to/from it. - With continuing reference to
FIG. 3 , thedynamic adapting module 308 of the current embodiment will selectvarious adaptors 336 responsive to the message type of theincoming message 326, the message type(s) preferred by the recipient, and conditions in and/or affecting thecommunication system 300. More specifically, device, network, and QOS events/changes dynamic adaptor selector 344 to alter the mix of adaptors 336 (and routing mechanisms) executing in thedynamic adapting module 308. Thus, even thoughincoming messages 326 of disparate message types might be targeted at a variety of recipients (who collectively prefer that set of disparate message types), theadaptation subsystem 302 can adapt theincoming messages 326 and deliver them in a more robust, reliable manner than heretofore possible. - Of course, at some point, one or more of the recipients might respond to one of the adapted
messages response 350 can be routed to theadaptation subsystem 302 just as any otherincoming message 326. Thedynamic adaptor selector 344 would then parse theresponse 350, select an appropriate set ofadaptors response 350 as an adaptedmessage 328 intended for the sender of the originalincoming message 326 and perhaps others. Having considered embodiments providing illustrative communication systems, it might now be helpful to consider methods in accordance with various embodiments. -
FIG. 4 illustrates a flowchart of a method for communicating using various disparate communication technologies. More specifically,FIG. 4 illustrates a method wherein a person, company, organization, automated process, etc. determines that it might be desirable to send a mass communication to a large number of intended recipients. These recipients may or may not belong to any particular group or organization, might be widely distributed geographically, and might be using (or prefer to use) disparate communication technologies through which they receive their messages. They might also have disparate human-level user preferences associated with their communications. - With continuing reference to
FIG. 4 ,method 400 begins with one or more message triggers. In some cases anincident 316 might occur or be detected as shown byreference 402. In other cases, an active portion of acampaign 314 might commence. Seereference 404. In the alternative, or in addition, anevent user 101 to send a message to numerous recipients. As a result, the user 101 (or the adaptation subsystem 302) generates anincoming message 326 from either atemplate 318 or anapriori message 320 although theincoming message 326 could be an ad hocmessage 322. Of course one or more types ofsocial media 372 and/orsensors 374 might be involved in generating the desire for a message or messages. Seereference 408. In any case, theincoming message 326 of embodiments will have associated therewith certain attributes whether expressly defined or inferable from the context of the message. These attributes, or metadata regarding the same, can be used to select rules with which to select various adaptors. - For each such message,
message parser 352 accepts theincoming message 126 and begins parsing it as shown atreference 410. More specifically,message parser 352 can parse the incoming message to identify information, attributes, etc. likely to help identify (or at least relate to) the incoming message type (and perhaps suitable outgoing message types as well). Of course some of this metadata can be inferred from context and/or other sources. For instance, a message originating from a POTS telephone would be of a message type at least defined by an audio or perhaps analog message type. Moreover,dynamic adaptor selector 344 can determine various user (sender and/or receiver) preferences to apply in selecting the various adaptors as disclosed elsewhere herein). Thedynamic adaptor selector 344 applies various rules from therules module 146 to the parsed information (the metadata) which it has obtained from theincoming message 326 and/or inferred from its context (see reference 412). As a result of applying the rules, thedynamic adaptor selector 344 selects and orders the various adaptor sets 338, 340, 342, and 343 that will likely suffice to adapt theincoming message 326 to a corresponding set of acceptable message types for the various recipients. Seereference 414. - The
dynamic adaptor selector 344 loads the selectedadaptors 336 into thedynamic adapting module 308 in thesets message parser 352 passes thecontent 327 of theincoming message 326 to thedynamic adapting module 308 which then executes theadaptors 336 in the various adaptor sets 338, 340, 342, and 343 and in the indicated orders or sequences. Seereference 416. In addition, thedynamic adapting module 308 routes the adapted messages to the third-party networks 310 associated with the various adaptor sets 338, 340, 342, and 343. Seereference 418. Of course, there might be times that responses are received and treated as additionalincoming messages 326 as shown atreference 420. Additionally, theadaptation subsystem 302 might have instrumented the original message (of a particular response) so that the response is recognized as a response. - Note that the
communication subsystem 302 gathersQOS metrics 312 and determines, via the rules, whether an adaptor change might be desirable asmethod 400 unfolds (see reference 424). If so,method 400 can repeat fromreferences 412 and/or 414 whereby the adaptor sets 338, 340, 342, and/or 343 might be modified according to the rules. If not,method 400 can continue as indicated atreference 426. Note also thatmethod 400 can operate with respect to more than one message at a time and, indeed, can be operating at differing references for differing messages if desired. Moreover,method 400 can repeat in whole or in part as conditions warrant it, a user desires it, some message trigger occurs, another message arrives, and/ormethod 400 can repeat in whole or in part. Otherwise,method 400 can end. Seereference 428. -
FIG. 5 illustrates a flowchart of another method for communicating using various disparate communication technologies.Method 500 can begin whenmessage parser 352 accepts anincoming message 326 from some source. Seereference 502. Themessage parser 352 then examines theincoming message 326 and determines whether it complies with one or more known message types by determining and/or examining its attributes. If not, themessage parser 352 might select a best-fit message type for theincoming message 326. In the alternative, or in addition, themessage parser 352 can apply various rules from the rules module 146 (selected based on the message attributes) to determine how to handle anincoming message 326 of unknown or uncertain message type. Seereference 504. In any case, themessage parser 352 of the current embodiment attempts to parse theincoming message 326. - More specifically, the
message parser 352 parses theincoming message 326 and identifies the sender (see reference 506). With the sender identified, themessage parser 352 looks up the communication preferences of the sender as illustrated byreference 508. In parallel, if desired, themessage parser 352 determines the identities of the various recipients and looks up their communication preferences as shown, respectively, atreference dynamic adaptor selector 344 can determine (via application of various rules) whether anevent reference 515. - With the foregoing types of information as inputs, the
dynamic adaptor selector 344 can look up which rules apply to theincoming message 326. Moreover, it can use the metadata (for instance, attributes, user preferences, and the like) which it parsed from the incoming message and/or inferred from context. Seereference 516. It then, according to the applicable rules, selects theadaptors 336 and orders them as shown at, respectively, references 518 and 520. Thedynamic adaptor selector 344 can then build the adaptor sets 338, 340, 342, and/or 343 called for by the rules. Seereference 522. - In the meantime, the
message parser 352 can identify thecontent 327 of theincoming message 326 and forward it to thedynamic adapting module 308 as indicated atreference 523. From there, in the current embodiment, thedynamic adapting module 308 can execute theadaptors 336 in the adaptor sets 338, 340, 342, and 343 and in their respective orderings to produce the adaptedmessages reference 524. - The
adaptation subsystem 302 can then await one ormore responses 350 from the various recipients. If aresponse 350 is received, theadaptation subsystem 302 can process the response as it would any otherincoming message 326. It can also, having determined that a particularincoming message 326 is aresponse 350 to a previousincoming message 326, save an indication that that particular response was received and acquireQOS metrics 310 and other metrics regarding the response. For instance, it can compile statistics related to how many recipients have responded, the time it took, etc. Seereference 526. - As suggested above, while
method 500 occurs, theadaptation subsystem 302 can be gatheringQOS metrics 312. If theQOS metrics 312 are outside of acceptable limits (being either above or below some selected thresholds) thenmethod 500 can repeat fromreference 516 at which various rules are applied to determine how to respond to the QOS event/changes 358. For instance, if theQOS metrics 312 which do not meet the limits relate to a third-party network 310 (or service) then theadaptation subsystem 302 can negotiate with that third-party network 310 (or others) for different service terms. If not,method 500 can repeat in whole or in part by, for instance, waiting for another message to process. Seereferences 528 to 530. Otherwise,method 500 can end. -
FIG. 6 illustrates a flowchart of yet another method for communicating using various disparate communication technologies.Method 600 illustrates one of many ways in which auser 101 can send a mass notification to even a worldwide team and which is intended to reach each recipient at a particular local time peculiar to the corresponding recipient. More specifically, theuser 101 can log in to the adaptation subsystem 302 (if security or access control is desired). Seereference 602. Of course, things other than users can cause a message or messages to be sent. For instance, various sensors, devices, incidents, campaigns, etc. can causecommunication system 300 of embodiments to generate and/or process messages. If some such device does initiate (or otherwise participate in method 600) that device and/or theadaption subsystem 302 can be configured to provide a corresponding “login” or access to theadaptation subsystem 302. Next, in the current embodiment, theuser 101 can select from a menu either aparticular incident 316 or aparticular campaign 314 with which the message is associated. Of course, the message could also be an ad hocmessage 322 unaffiliated with anyparticular incident 316 orcampaign 314. Seereference 604. For scenarios in which a device participates inmethod 600, the device and/r adaptation subsystem 302 can be configured to detect and respond to user selected incidents, campaign events, etc. with template-based and/or apriori messages. -
Method 600 can continue with theadaptation subsystem 302 presenting to the user a list of groups and/or individual recipients to whom the message should be sent. For scenarios in which a device participates inmethod 600, it can be configured to respond to such lists and/or the particular incident, campaign event, etc. can cause theadaptation subsystem 302 to select a corresponding list of recipients. Seereference 606. In addition, or in the alternative, thecommunication subsystem 602 can present to the user 101 a graphical representation of some geographic region. If the user selects the geographic option, then the user can graphically select an area in the region by drawing either acircle 370,polygon 368, or some other shape indicating a region into which to send the message. In some embodiments, thecommunication subsystem 302 presents a list of regions into which to send the message from which theuser 101 selects the desired region or regions. Seereference 608. Either way, theuser 101 can select the recipient(s) of the message. Seereference 610. - The
user 101 can then select from among thetemplates 318 and apriori 320 messages or can indicate that they wish to create an ad hocmessage 322. Regardingtemplates 318, some of them can come associated with a particular group or community of recipients and can be pre-defined to be sent in one or more selected languages. In the current embodiment, thecommunication subsystem 302 can present the template 318 (in one or more of the selected languages) thereby enabling theuser 101 to customize the template-basedincoming message 326. Moreover, thecommunication subsystem 302 can present to theuser 101 an option whereby theuser 101 indicates a desire to have the resulting message translated (and into which languages). Note that if a translation(s) is requested by theuser 101 or is suggested by the rules, thedynamic adaptor selector 344 of the current embodiment will select theappropriate adaptors 336 to affect the translation during its adaptation. Seereference 612. - Moreover, as illustrated at
reference 614, theadaptation subsystem 302 can present to theuser 101 options associated with selecting the communication media over which to deliver the message. Moreover, some templates/communities can have associated therewith one or more pre-selected communication media through which to deliver associated messages. These communication media/technologies include, but are not limited to, email, SMS, voice (over a telephony system whether POTS, PSTN, VOIP, etc.). The communication media/technology can also include social networks such as Facebook, Twitter, LinkedIn, various blogs, etc. They can also include device-oriented communication media such as those associated with desktop computers (LAN, WAN, etc.), automated and/or networked signage, cellular telephones, etc. Other available communication media include sirens, alert beacons, fire alarms, etc. which can be considered either legacy, analog, or both types of communication media. Note that should a user wish to add a communication media/technology to those available in theadaptation subsystem 302, they can do so by registering appropriate rules, adaptors, etc. with theadaptation subsystem 302. Of course, if a user creates a technology requiring new hardware, that hardware can be added to theadaptation subsystem 302 rather than to each of the third-party networks 310 and or communication devices in use in thecommunication system 300. Similar provisions can be made for other human-level preferences. For instance, the user can indicate the human language to be used, the application types to employ, specific applications within those types, etc. Thus,communication systems 300 allow users flexibility in choosing which human-level preferences they use to send messages. - In scenarios in which a device participates in
method 600, that device and/or theadaptation subsystem 302 can be configured to select the communications medium/media over which the message(s) are to be sent. Moreover, if desired, theadaptation subsystem 302 can be configured to test the corresponding communication paths and/or inquire of thethird party networks 310 whether availability, bandwidth, etc. exists for such communication paths.Adaptation subsystem 302 can also, or in the alternative, query some or all of the third party networks 310 (even those not necessarily selected for delivery of the message) to determine the current contractual terms related to the delivery of the message. Adaptation subsystem can, responsive to the QOS parameters that might be affected by the current terms, re-route the message, negotiate for better terms, etc. - In some embodiments, the
communication subsystem 302 can also present to theusers 101 options relating to scheduling the delivery of a message to its recipients. For instance, one option could be delivery of the message without delay (other than that associated with its progress through the communication system 300). In other words, delivery in real or near-real time. Another option could allow for delivery of the message to one or more recipients at a given global time irrespective of the time zone(s) in which the recipients and/or sender might be located. Yet another option allows for the sender to select that some or all of the various versions of the message be delivered at a particular local time (each recipient receiving the message at that time, their local time). Thus, theuser 101 can select from among these options to schedule delivery of the message with thedynamic adaptor selector 344 selectingappropriate adaptors 336 to affect the scheduled deliveries. Moreover, these scheduling options can also be considered human-level preferences although devices participating inmethod 600 can also be selected to select or define message delivery times. Seereference 618. - At
reference 620,FIG. 6 illustrates thatmethod 600 includes allowing theuser 101 to confirm that they wish the message to be sent. In some cases, theadaptation subsystem 302 could therefore present to the user (and/or participating device) the message as-built according to the sending user's selections and/or preferences. The user 101 (and/or participating device) could then confirm to theadaptation subsystem 302 that the message is acceptable or not. If theusers 101 seek to make changes to the message,method 600 can repeat in whole or in part as indicated atreference 620. But, if desired,method 600 can proceed with thedynamic adapting module 308 adapting the message for delivery and sending the resulting message versions to the third-party networks 310 for delivery. Seereference 622.Method 600 can then be repeated or it can end as might be desired. -
FIG. 7 illustrates a flowchart of still another method for communicating using various disparate communication technologies.Method 700 of the current embodiment can begin byadaptation subsystem 302 receiving an incoming message 226 atreference 702. If more than one group of users (or more than one geographic) area has been selected to which to target theincoming message 326, theadaptation subsystem 302 can place the recipients in each group onto a master recipient list. Furthermore, thecommunication system 302 can be configured to parse the master list of recipients and remove duplicates to, for instance, reduce downstream processing. Seereference 704. - In some embodiments, the
adaptation subsystem 302 can retrieve communication preferences of the sending user 101 (and of the receivingusers 101 if desired). If those preferences, or selected options associated with a particularincoming message 326 indicate some scheduling preference (for instance, the message is to be delivered at some specific local time for each recipient), then theadaptation subsystem 302 can retrieve the time zones in which each recipient is currently located and other pertinent attributes of theusers 101 involved. For instance, it can retrieve a list of communication “values” associated with each recipient. These values can include such information as their POTS phone numbers, cellular telephone numbers, fax numbers, email addresses, Twitter addresses, social network identifiers, etc. Seereference 706. With continuing reference toFIG. 7 ,method 700 can continue by searching the list of communication values for duplicate entries. In this manner, the number of messages being sent to any given device (and/or account, address, user, etc.) can be reduced to one if desired. It might also be worth noting that some or all of these communication values could reflect certain human-level preferences such as at which phone number or email address a user might wish to be contacted. Seereference 708. - Next, the
dynamic adaptor selector 344 of the current embodiment selects thoseadaptors 336 which the rules fromrules module 146 indicate would be suitable for this particular message. The selection, of course, can be based on the communication technologies involved, user preferences, real-time or near real-time QOS metrics 312, etc. Depending on the message type of theincoming message 326 and these other considerations, the selectedadaptors 336 can includecommunication adaptors 336 to adapt the incoming message for delivery as an SMS message, a voice message, a fax message, an email message, etc. over appropriate communications media.Communication adaptors 336 typically adapt the message so that it is compliant with the communication medium/media over which it is expected to be delivered to the recipient/communication endpoint. Thus, they often remove, add, and/or modify pre-message and post-message constructs associated with the message. - Note also that the rules can determine the order in which the
adaptors 336 will be applied to theincoming message 326 and any branches in the processing path of various versions of the message. Communication adaptors 336 (such as those in the current embodiment) typically precede other types ofadaptors 336 according to most sets of applicable rules although that is not always the case. At some point, theadaptors 336 can then be loaded into thedynamic adapting module 308. - In the alternative, or in addition, the
various adaptors 336 can be executing in thedynamic adapting module 308 more or less continuously or in some standby state (when not in use) if desired. If this situation is the case, then thedynamic adaptor selector 344 can direct the incoming message 326 (and its subsequent versions) to thefirst adaptor 336 in an adaptor set and activate it. Once thatadaptor 336 adapts the message according to the function of theadaptor 336, thedynamic adaptor selector 344 can direct the adapted version of the message (and subsequently adapted versions) to thenext adaptor 336 in the particular adaptor set. Of course, if the processing path for an incoming message branches to two ormore adaptors 336, thedynamic adaptor selector 344 can direct versions of the message version at the branch to the subsequent adaptors 336 (plural) in the various parallel pathways. Thus typically, thedynamic adaptor selector 344 directs the message to one ormore communication adaptors 336 first and then to other adaptors as might be desired. For instance, anincoming message 326 received in email form but destined for a recipient who prefers SMS messages might have atransformation adaptor 336 applied to it. Thattransformation adaptor 336 could shorten the incoming message to 140 characters or less via certain grammatical/abbreviation processes and/or add an URL (Uniform Resource Locator) or perhaps a hash tag that would lead to the text of the originalincoming message 326. Thus, the communication andother adaptors 336 could be applied to theincoming message 326. See respectively references 708 and 710. - In addition, or in the alternative, the message (or various versions of it) can have a
process adaptor 336 applied to it. In some cases, the process adaptor could schedule delivery of the various versions of the message to the recipients. Seereference 712. At this point, in some embodiments,certain adaptors 336 related to adapting the message from/tosocial media 372 could be applied. For instance, a message intended for delivery via Twitter could have acommunications adaptor 336 applied to it as well as atransformation adaptor 336 to shorten it to 140 characters or less. Other messages intended for delivery via communication media not ordinarily considered to convey messages per se (sirens, broadcast messages such as tornado warnings, programmable signs, etc.) could be adapted by appropriately configuredadaptors 336. Note that even these communication media do convey “messages” (for instance, a siren can indicate that severe weather is approaching). - In addition, or in the alternative, certain high-level (or globally applicable)
transformation adaptors 336 could adapt the message. For instance, anadaptor 336 could check for unauthorized (foul, obscene, abusive, etc.) language. Other adaptors could perform checks to determine whether proprietary or sensitive information might be contained in the message. If so delivery of the message could be stopped, the message could be censored, words could be replaced, etc. by these transformation adaptors. Moreover, these transformation adaptors could reflect certain human-level preferences for instance some users might prefer to not receive messages containing foul language. - Often, it might be desired to apply an
analytic adaptor 336 to the message before it leaves thedynamic adapting module 308 or at other times. Theseanalytic adaptors 336 typically function to instrument the message orcommunication system 300 such that theadaptation subsystem 302 can more easily obtainQOS metrics 312 regarding it. For instance, cookies could be added to HTML compatible message versions so that the recipient's communication device could be queried for delivery-related information. While not necessary for the practice of many embodiments, theseanalytic adaptors 336 can be applied as thelast adaptor 336 in a particular adaptor set. Seereference 718. - Once the
adaptation subsystem 302 forwards the message (or rather its adapted versions) to the third-party networks 310, it can monitor theQOS metrics 312 to determine whether acommunication failure 124 might have occurred (or is occurring or is about to occur) to one or more of the message versions. If so, theadaptation subsystem 302 can repeatmethod 700. More specifically, theadaptation subsystem 302 can be configured to maintain a backup or default set ofadaptors 336 for use with a particular template or apriori message and/or for a particular senders, recipient groups, etc. Thesebackup adaptors 336 could be applied to theincoming message 326 during another attempt to deliver the message. Seereference method 700 can repeat in whole or in part. Seereference 724. Otherwisemethod 700 can end if desired. - Embodiments allow users to communicate with each other despite their use of disparate communication technologies and their varying preferences. Moreover, embodiments reduce the time and resources users expend in doing so while reducing gaps in coverage and improving accountability. Embodiments also allow users to communicate sensitive, privileged, secure, etc. content without necessarily needing to form teams with associated access privileges to create adapted messages. Additionally, embodiments allow users to avoid (if desired) disadvantages associated with social networks and instead make mass notifications through predictable, secure, reliable, and accountable communication systems. Embodiments also provide increased visibility into the operation of communication systems by gathering QOS measurements and making the same available to various users. Embodiments also provided communication systems that dynamically adapt messages for mass notifications.
- Although the subject matter has been disclosed in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts disclosed above. Rather, the specific features and acts described herein are disclosed as illustrative implementations of the claims.
Claims (22)
1. (canceled)
2. In an environment in which electronic messages are sent in a plurality of disparate source-message-types and in which disparate recipient-message-types are associated with corresponding recipients, a method comprising:
accepting a message in one of the disparate source-message-types using a processor wherein at least one recipient is associated with the message;
determining the recipient and the message types using the processor;
responsive to the determination of the recipient and the message types, selecting a set of adaptors to change the message from the source-message-type to the recipient-message-type using the processor;
changing the message to the recipient-message type using the set of adaptors and the processor; and
sending the adapted message to the recipient.
3. The method of claim 2 wherein the recipient is one of a plurality of recipients selected by their geographic proximity.
4. The method of claim 2 wherein the message types correspond to arbitrary permutations of communication technologies and user preferences associated with the messages.
5. The method of claim 2 wherein the set of adaptors includes one or more of a communications adaptor, a transformation adaptor, a process adaptor, a collaboration adaptor, or an analytic adaptor.
6. The method of claim 2 further comprising receiving a response message from the recipient and repeating the method on the response message.
7. The method of claim 2 further comprising accepting a third-party adaptor, implementing a rule pursuant to which the third-party adaptor is used to change the accepted message to the adapted message pursuant to the rule and adapting the message accordingly.
8. The method of claim 2 wherein the message is responsive to a message trigger selected from the group consisting of an incident, a sensor, a metric, and a campaign and wherein the recipients are selected responsive to the message trigger.
9. The method of claim 2 wherein the message is a portion of an emergency notification and the recipients are selected apriori based on an emergency associated with the emergency notification.
10. The method of claim 2 further comprising determining a user selected preference to determine the recipient-message-type.
11. The method of claim 2 further comprising measuring a user selected quality of service (QOS) associated with the method wherein the QOS measurement pertains to one or more of network cost, network reliability, network capacity, network current status, access control, or location compatibility.
12. The method of claim 11 further comprising replacing one of the adaptors with a different adaptor responsive to the QOS measurement, the changing of the accepted message to the recipient-message-type being with the different adaptor.
13. The method of claim 2 wherein the adapted message further comprises data in a plurality of differing formats and wherein the adapting of the accepted message further comprises using the adaptors on the data in the differing formats.
14. (canceled)
15. An apparatus for operation in an environment in which electronic messages are sent in a plurality of disparate source-message-types and in which disparate recipient-message-types are associated with corresponding recipients, the apparatus comprising:
an interface;
a processor in communication with the interface; and
a memory in communication with the processor and storing processor readable instructions which when executed by the processor cause the processor to execute a method comprising:
accepting one of the messages in one of the disparate source-message-types from the interface wherein a plurality of recipients are associated with the message;
determining the recipients, the source-message-type, and the recipient-message-types;
responsive to the determination of the recipient and the message types, selecting a plurality of sets of adaptors stored in the memory with which to change the message from the source-message-type to the recipient-message-types;
changing the message to the recipient-message-types using the plurality of sets of adaptors; and
sending the adapted messages to the intended recipients via the interface.
16. The apparatus of claim 15 wherein the message types correspond to arbitrary permutations of communication technologies and user preferences associated with the messages.
17. The apparatus of claim 15 wherein the method further comprises measuring a user selected quality of service (QOS) associated with the method wherein the QOS measurement pertains to one or more of network cost, network reliability, network capacity, network current status, access control, a delivery time, a delivery attempt, or location compatibility.
18. The apparatus of claim 17 wherein the method further comprises replacing one of the adaptors with a different adaptor responsive to the QOS measurement, the changing of the accepted message to the recipient-message-type being associated with the different adaptor.
19. The method of claim 15 wherein the adapted message further comprises data in a plurality of differing formats and wherein the adapting of the accepted message further comprises using an adaptor on the data in the differing formats.
20. The apparatus of claim 15 accepting a third-party adaptor, implementing a rule pursuant to which the third-party adaptor is used to change the accepted message to the adapted message pursuant to the rule and adapting the message accordingly.
21. The apparatus of claim 15 wherein the adapted message further comprises unstructured data and wherein the adapting of the accepted message further comprises using the adaptors on the unstructured data.
22. In an environment in which electronic messages are sent in a plurality of disparate source-message-types, a method comprising:
accepting a message in one of the disparate source-message-types using a processor wherein at least one recipient is associated with the message;
determining the recipient and the source-message-type using the processor;
responsive to the determination of the recipient and the source-message-type selecting a set of adaptors to change the message from the source-message-type to a recipient-message-type using the processor;
changing the message to the recipient-message type using the set of adaptors and the processor; and
sending the adapted message to the recipient.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/737,908 US20160028671A1 (en) | 2013-03-15 | 2015-06-12 | Adaptor Based Communication Systems, Apparatus, and Methods |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/837,386 US9083668B2 (en) | 2013-03-15 | 2013-03-15 | Adaptor based communications systems, apparatus, and methods |
US14/737,908 US20160028671A1 (en) | 2013-03-15 | 2015-06-12 | Adaptor Based Communication Systems, Apparatus, and Methods |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/837,386 Continuation US9083668B2 (en) | 2013-03-15 | 2013-03-15 | Adaptor based communications systems, apparatus, and methods |
Publications (1)
Publication Number | Publication Date |
---|---|
US20160028671A1 true US20160028671A1 (en) | 2016-01-28 |
Family
ID=51533517
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/837,386 Expired - Fee Related US9083668B2 (en) | 2013-03-15 | 2013-03-15 | Adaptor based communications systems, apparatus, and methods |
US14/737,908 Abandoned US20160028671A1 (en) | 2013-03-15 | 2015-06-12 | Adaptor Based Communication Systems, Apparatus, and Methods |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/837,386 Expired - Fee Related US9083668B2 (en) | 2013-03-15 | 2013-03-15 | Adaptor based communications systems, apparatus, and methods |
Country Status (1)
Country | Link |
---|---|
US (2) | US9083668B2 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10206079B1 (en) * | 2015-09-30 | 2019-02-12 | Groupon, Inc. | System and method for notification transmission and confirmation management |
US10469436B2 (en) * | 2015-11-20 | 2019-11-05 | Accenture Global Solutions Limited | Managing messaging services |
US10749833B2 (en) * | 2016-07-07 | 2020-08-18 | Ringcentral, Inc. | Messaging system having send-recommendation functionality |
US11321522B1 (en) | 2017-08-04 | 2022-05-03 | Grammarly, Inc. | Artificial intelligence communication assistance for composition utilizing communication profiles |
US10863525B1 (en) * | 2019-08-28 | 2020-12-08 | At&T Intellectual Property I, L.P. | Overcoming carrier aggregation signaling overhead when FirstNet QoS policies are enforced |
US11691646B2 (en) | 2020-02-26 | 2023-07-04 | Here Global B.V. | Method and apparatus for generating a flood event warning for a flood prone location |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030028380A1 (en) * | 2000-02-02 | 2003-02-06 | Freeland Warwick Peter | Speech system |
US7175225B2 (en) * | 2002-10-18 | 2007-02-13 | Wilhelm Karmann Gmbh | Motor vehicle with a convertible roof |
US20070263791A1 (en) * | 2006-04-06 | 2007-11-15 | Qwest Communications International Inc. | Selectable greeting messages |
US20080147738A1 (en) * | 2006-12-19 | 2008-06-19 | Celeritasworks, Llc | Campaign awareness management systems and methods |
US20080154700A1 (en) * | 2006-12-19 | 2008-06-26 | Celeritasworks, Llc | Campaign awareness management systems and methods |
US20090284530A1 (en) * | 2006-12-19 | 2009-11-19 | Celeritasworks, Llc | Campaign awareness management systems and methods |
US20100003945A1 (en) * | 2006-06-13 | 2010-01-07 | Celltick Technologies Ltd. | Cellular emergency notification service |
US20110270880A1 (en) * | 2010-03-01 | 2011-11-03 | Mary Jesse | Automated communications system |
US20110276640A1 (en) * | 2010-03-01 | 2011-11-10 | Mary Jesse | Automated communications system |
US8175225B2 (en) * | 2007-06-11 | 2012-05-08 | International Business Machines Corporation | Preventing emergency communication system notification congestion |
US20120124480A1 (en) * | 2010-11-12 | 2012-05-17 | Sap Ag | Systems and methods for generating customized user interfaces |
US20130197898A1 (en) * | 2012-02-01 | 2013-08-01 | Electronics And Telecommunications Research Institute | Method and apparatus for translation |
US20130244621A1 (en) * | 2012-03-15 | 2013-09-19 | Solavei Llc | Mobile service distribution and provisioning architecture |
US20130282543A1 (en) * | 2012-04-20 | 2013-10-24 | Solavei Llc. | Compensation based on entity groups |
US20140155017A1 (en) * | 2012-12-04 | 2014-06-05 | At&T Intellectual Property I, Lp | Supplemental rescue resources |
US20140164536A1 (en) * | 2012-05-21 | 2014-06-12 | Ivy Corp. | Automated announcement-and-bulletins system |
Family Cites Families (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6851115B1 (en) * | 1999-01-05 | 2005-02-01 | Sri International | Software-based architecture for communication and cooperation among distributed electronic agents |
US7036128B1 (en) * | 1999-01-05 | 2006-04-25 | Sri International Offices | Using a community of distributed electronic agents to support a highly mobile, ambient computing environment |
CA2272739C (en) * | 1999-05-25 | 2003-10-07 | Suhayya Abu-Hakima | Apparatus and method for interpreting and intelligently managing electronic messages |
US6820237B1 (en) * | 2000-01-21 | 2004-11-16 | Amikanow! Corporation | Apparatus and method for context-based highlighting of an electronic document |
US6823331B1 (en) * | 2000-08-28 | 2004-11-23 | Entrust Limited | Concept identification system and method for use in reducing and/or representing text content of an electronic document |
US6654689B1 (en) * | 2000-11-06 | 2003-11-25 | Weather Central, Inc. | System and method for providing personalized storm warnings |
US7259694B2 (en) * | 2001-02-26 | 2007-08-21 | International Business Machines Corporation | Wireless communication system and method to provide geo-spatial related event data |
US7181017B1 (en) * | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
US7165093B2 (en) * | 2001-06-22 | 2007-01-16 | Xerox Corporation | Active electronic messaging system |
US7034691B1 (en) * | 2002-01-25 | 2006-04-25 | Solvetech Corporation | Adaptive communication methods and systems for facilitating the gathering, distribution and delivery of information related to medical care |
US20030143974A1 (en) * | 2002-01-30 | 2003-07-31 | Randy Navarro | Emergency warning indication over a wireless network |
US7130887B2 (en) * | 2002-04-18 | 2006-10-31 | Bernel Goldberg | Method and system for generating separate e-mail transmissions to copied recipients for providing additional information |
US7062723B2 (en) * | 2002-05-20 | 2006-06-13 | Gateway Inc. | Systems, methods and apparatus for magnifying portions of a display |
US7069259B2 (en) * | 2002-06-28 | 2006-06-27 | Microsoft Corporation | Multi-attribute specification of preferences about people, priorities and privacy for guiding messaging and communications |
US20060041505A1 (en) * | 2002-10-11 | 2006-02-23 | 900Email Inc. | Fee-based message delivery system |
US7194249B2 (en) * | 2003-01-31 | 2007-03-20 | Qwest Communications International Inc. | Methods, systems and apparatus for providing urgent public information |
US20040193617A1 (en) * | 2003-03-28 | 2004-09-30 | Adler Robert M. | Geographically specific advisory alert broadcasting system |
US7409428B1 (en) * | 2003-04-22 | 2008-08-05 | Cooper Technologies Company | Systems and methods for messaging to multiple gateways |
US7136661B2 (en) * | 2003-07-08 | 2006-11-14 | Lucent Technologies Inc. | Weather alert notification to mobile station upon weather alert occurrence during a time period |
US7301914B2 (en) * | 2004-06-15 | 2007-11-27 | Motorola, Inc. | Method and apparatus for sending a multicast message |
US7864930B2 (en) * | 2004-12-27 | 2011-01-04 | Bce Inc. | Systems and methods for registration and retrieval of voice mail contact information |
CA2571843C (en) * | 2004-12-27 | 2014-12-30 | Bce Inc. | Methods and systems for rendering voice mail messages amenable to electronic processing by mailbox owners |
US7529850B2 (en) * | 2005-03-11 | 2009-05-05 | International Business Machines Corporation | Method and system for rapid dissemination of public announcements |
US7933385B2 (en) * | 2005-08-26 | 2011-04-26 | Telecommunication Systems, Inc. | Emergency alert for voice over internet protocol (VoIP) |
US20080301190A1 (en) * | 2007-06-01 | 2008-12-04 | Kendall Gregory Lockhart | Integrated system and method for implementing messaging, planning, and search functions in a mobile device |
US8094038B2 (en) * | 2007-11-06 | 2012-01-10 | At&T Intellectual Property I, L.P. | Systems and methods for providing location-specific information |
WO2009070861A1 (en) * | 2007-12-06 | 2009-06-11 | Suhayya Abu-Hakima | Processing of network content and services for mobile or fixed devices |
US9301088B2 (en) * | 2008-05-14 | 2016-03-29 | International Business Machines Corporation | Comprehensive tsunami alert system via mobile devices |
US20120327837A1 (en) * | 2011-06-24 | 2012-12-27 | Velleros, Inc. | Method, apparatus and system for providing emergency alerts to mobile devices |
-
2013
- 2013-03-15 US US13/837,386 patent/US9083668B2/en not_active Expired - Fee Related
-
2015
- 2015-06-12 US US14/737,908 patent/US20160028671A1/en not_active Abandoned
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030028380A1 (en) * | 2000-02-02 | 2003-02-06 | Freeland Warwick Peter | Speech system |
US7175225B2 (en) * | 2002-10-18 | 2007-02-13 | Wilhelm Karmann Gmbh | Motor vehicle with a convertible roof |
US20070263791A1 (en) * | 2006-04-06 | 2007-11-15 | Qwest Communications International Inc. | Selectable greeting messages |
US20100003945A1 (en) * | 2006-06-13 | 2010-01-07 | Celltick Technologies Ltd. | Cellular emergency notification service |
US20080147738A1 (en) * | 2006-12-19 | 2008-06-19 | Celeritasworks, Llc | Campaign awareness management systems and methods |
US20080154700A1 (en) * | 2006-12-19 | 2008-06-26 | Celeritasworks, Llc | Campaign awareness management systems and methods |
US20090284530A1 (en) * | 2006-12-19 | 2009-11-19 | Celeritasworks, Llc | Campaign awareness management systems and methods |
US8175225B2 (en) * | 2007-06-11 | 2012-05-08 | International Business Machines Corporation | Preventing emergency communication system notification congestion |
US20110276640A1 (en) * | 2010-03-01 | 2011-11-10 | Mary Jesse | Automated communications system |
US20110270880A1 (en) * | 2010-03-01 | 2011-11-03 | Mary Jesse | Automated communications system |
US20120124480A1 (en) * | 2010-11-12 | 2012-05-17 | Sap Ag | Systems and methods for generating customized user interfaces |
US20130197898A1 (en) * | 2012-02-01 | 2013-08-01 | Electronics And Telecommunications Research Institute | Method and apparatus for translation |
US20130244621A1 (en) * | 2012-03-15 | 2013-09-19 | Solavei Llc | Mobile service distribution and provisioning architecture |
US20130282543A1 (en) * | 2012-04-20 | 2013-10-24 | Solavei Llc. | Compensation based on entity groups |
US20140164536A1 (en) * | 2012-05-21 | 2014-06-12 | Ivy Corp. | Automated announcement-and-bulletins system |
US20140155017A1 (en) * | 2012-12-04 | 2014-06-05 | At&T Intellectual Property I, Lp | Supplemental rescue resources |
Also Published As
Publication number | Publication date |
---|---|
US20140280659A1 (en) | 2014-09-18 |
US9083668B2 (en) | 2015-07-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20160028671A1 (en) | Adaptor Based Communication Systems, Apparatus, and Methods | |
US10601761B2 (en) | Generating guest suggestions for events in a social networking system | |
US9762462B2 (en) | Method and apparatus for providing an anti-bullying service | |
US10592695B1 (en) | Staggered secure data receipt | |
US10375242B2 (en) | System and method for user notification regarding detected events | |
Ross et al. | The diffusion of crisis-related communication on social media: an empirical analysis of Facebook reactions | |
US9985920B2 (en) | Event notification | |
US20120066345A1 (en) | Emergency communications platform | |
US9569467B1 (en) | Intelligent news management platform and social network | |
US9262908B2 (en) | Method and system for alerting contactees of emergency event | |
US9904704B2 (en) | System and method for controlling audience data and tracking | |
US10554597B1 (en) | Message management and message modification application | |
Valecha et al. | An exploration of collaboration over time in collective crisis response during the Haiti 2010 earthquake | |
US20080162692A1 (en) | System and method for identifying and blocking sexual predator activity on the internet | |
Hon et al. | Cyberbullying detection system on twitter | |
US20130145289A1 (en) | Real-time duplication of a chat transcript between a person of interest and a correspondent of the person of interest for use by a law enforcement agent | |
US11244117B2 (en) | Automatic message pre-processing | |
US20100226486A1 (en) | Method of informing a teleconference participant that a person-of-interest has become active within the teleconference | |
US10608977B1 (en) | Message management and message modification application | |
Reilly et al. | A strategy for communication between key agencies and members of the public during crisis situations | |
Lindsay | Social media for emergencies and disasters: Overview and policy considerations | |
US11570303B2 (en) | Managing telephone based channel communication in a group-based communication system | |
US20230102182A1 (en) | Incident Management System | |
WO2019221060A1 (en) | Assist system and assist method | |
Allen et al. | Harris County Office of Homeland Security & Emergency Management (HCOHSEM) Information Management Analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |