Systems and methods to parse message for providing alert at device

ABSTRACT

In one aspect, a device includes a processor and storage accessible to the processor. The storage bears instructions executable by the processor to parse content of a message and determine, based on the parsing of content of the message, whether to provide a notification using the device. The instructions are also executable by the processor to provide the notification responsive to a determination, based on the parsing of content of the message, to provide the notification using the device.

BACKGROUND

Often times, users will silence their smart phones during an event ormeeting. However, as recognized herein, sometimes those users will notremember to turn the smart phone's ringer and notifications back onafterwards. As also recognized herein, this can have undesiredconsequences in that a user may not being notified of a situationrequiring their immediate attention, such as a medical emergency or animportant telephone call from the school of the user's child. There arecurrently no adequate solutions to the foregoing computer-related,technological problem.

SUMMARY

Accordingly, in one aspect a device includes at least one processor andstorage accessible to the at least one processor. The storage bearsinstructions executable by the at least one processor to parse contentof a message and determine, based on the parsing of content of themessage, whether to provide a notification using the device. Theinstructions are also executable by the at least one processor toprovide the notification responsive to a determination, based on theparsing of content of the message, to provide the notification using thedevice.

In another aspect, a method includes receiving a message at a firstdevice and parsing contents of the message to determine whether to issuean alert using the first device. The method also includes determining,based on the parsing, whether to issue the alert using the first device.The method then includes issuing, based on determining to issue thealert using the first device, the alert using the first device.

In still another aspect, a computer readable storage medium that is nota transitory signal includes instructions executable by at least oneprocessor to parse contents of a message and identify, based on theparsing, an urgent situation indicated in the message. The instructionsare also executable by the at least one processor to provide, based onthe identification, a notification at a first device.

The details of present principles, both as to their structure andoperation, can best be understood in reference to the accompanyingdrawings, in which like reference numerals refer to like parts, and inwhich:

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an example system in accordance withpresent principles;

FIG. 2 is a block diagram of an example network of devices in accordancewith present principles;

FIG. 3 is a flow chart of an example algorithm in accordance withpresent principles;

FIG. 4 is an example illustration in accordance with present principles;and

FIGS. 5-9 are example user interfaces (UIs) in accordance with presentprinciples.

DETAILED DESCRIPTION

With respect to any computer systems discussed herein, a system mayinclude server and client components, connected over a network such thatdata may be exchanged between the client and server components. Theclient components may include one or more computing devices includingtelevisions (e.g., smart TVs, Internet-enabled TVs), computers such asdesktops, laptops and tablet computers, so-called convertible devices(e.g., having a tablet configuration and laptop configuration), andother mobile devices including smart phones. These client devices mayemploy, as non-limiting examples, operating systems from Apple, Google,or Microsoft. A Unix or similar such as Linux operating system may beused. These operating systems can execute one or more browsers such as abrowser made by Microsoft or Google or Mozilla or another browserprogram that can access web pages and applications hosted by Internetservers over a network such as the Internet, a local intranet, or avirtual private network.

As used herein, instructions refer to computer-implemented steps forprocessing information in the system. Instructions can be implemented insoftware, firmware or hardware, or combinations thereof and include anytype of programmed step undertaken by components of the system; hence,illustrative components, blocks, modules, circuits, and steps aresometimes set forth in terms of their functionality.

A processor may be any conventional general purpose single- ormulti-chip processor that can execute logic by means of various linessuch as address lines, data lines, and control lines and registers andshift registers. Moreover, any logical blocks, modules, and circuitsdescribed herein can be implemented or performed with a general purposeprocessor, a digital signal processor (DSP), a field programmable gatearray (FPGA) or other programmable logic device such as an applicationspecific integrated circuit (ASIC), discrete gate or transistor logic,discrete hardware components, or any combination thereof designed toperform the functions described herein. A processor can be implementedby a controller or state machine or a combination of computing devices.

Software modules and/or applications described by way of flow chartsand/or user interfaces herein can include various sub-routines,procedures, etc. Without limiting the disclosure, logic stated to beexecuted by a particular module can be redistributed to other softwaremodules and/or combined together in a single module and/or madeavailable in a shareable library.

Logic when implemented in software, can be written in an appropriatelanguage such as but not limited to C# or C++, and can be stored on ortransmitted through a computer-readable storage medium (that is not atransitory, propagating signal per se) such as a random access memory(RAM), read-only memory (ROM), electrically erasable programmableread-only memory (EEPROM), compact disk read-only memory (CD-ROM) orother optical disk storage such as digital versatile disc (DVD),magnetic disk storage or other magnetic storage devices includingremovable thumb drives, etc.

In an example, a processor can access information over its input linesfrom data storage, such as the computer readable storage medium, and/orthe processor can access information wirelessly from an Internet serverby activating a wireless transceiver to send and receive data. Datatypically is converted from analog signals to digital by circuitrybetween the antenna and the registers of the processor when beingreceived and from digital to analog when being transmitted. Theprocessor then processes the data through its shift registers to outputcalculated data on output lines, for presentation of the calculated dataon the device.

Components included in one embodiment can be used in other embodimentsin any appropriate combination. For example, any of the variouscomponents described herein and/or depicted in the Figures may becombined, interchanged or excluded from other embodiments.

“A system having at least one of A, B, and C” (likewise “a system havingat least one of A, B, or C” and “a system having at least one of A, B,C”) includes systems that have A alone, B alone, C alone, A and Btogether, A and C together, B and C together, and/or A, B, and Ctogether, etc.

The term “circuit” or “circuitry” may be used in the summary,description, and/or claims. As is well known in the art, the term“circuitry” includes all levels of available integration, e.g., fromdiscrete logic circuits to the highest level of circuit integration suchas VLSI, and includes programmable logic components programmed toperform the functions of an embodiment as well as general-purpose orspecial-purpose processors programmed with instructions to perform thosefunctions.

Now specifically in reference to FIG. 1, an example block diagram of aninformation handling system and/or computer system 100 is shown that isunderstood to have a housing for the components described below. Notethat in some embodiments the system 100 may be a desktop computersystem, such as one of the ThinkCentre® or ThinkPad® series of personalcomputers sold by Lenovo (US) Inc. of Morrisville, N.C., or aworkstation computer, such as the ThinkStation®, which are sold byLenovo (US) Inc. of Morrisville, N.C.; however, as apparent from thedescription herein, a client device, a server or other machine inaccordance with present principles may include other features or onlysome of the features of the system 100. Also, the system 100 may be,e.g., a game console such as XBOX®, and/or the system 100 may include awireless telephone, notebook computer, and/or other portablecomputerized device.

As shown in FIG. 1, the system 100 may include a so-called chipset 110.A chipset refers to a group of integrated circuits, or chips, that aredesigned to work together. Chipsets are usually marketed as a singleproduct (e.g., consider chipsets marketed under the brands INTEL®, AMD®,etc.).

In the example of FIG. 1, the chipset 110 has a particular architecture,which may vary to some extent depending on brand or manufacturer. Thearchitecture of the chipset 110 includes a core and memory control group120 and an I/O controller hub 150 that exchange information (e.g., data,signals, commands, etc.) via, for example, a direct management interfaceor direct media interface (DMI) 142 or a link controller 144. In theexample of FIG. 1, the DMI 142 is a chip-to-chip interface (sometimesreferred to as being a link between a “northbridge” and a“southbridge”).

The core and memory control group 120 include one or more processors 122(e.g., single core or multi-core, etc.) and a memory controller hub 126that exchange information via a front side bus (FSB) 124. As describedherein, various components of the core and memory control group 120 maybe integrated onto a single processor die, for example, to make a chipthat supplants the conventional “northbridge” style architecture.

The memory controller hub 126 interfaces with memory 140. For example,the memory controller hub 126 may provide support for DDR SDRAM memory(e.g., DDR, DDR2, DDR3, etc.). In general, the memory 140 is a type ofrandom-access memory (RAM). It is often referred to as “system memory.”

The memory controller hub 126 can further include a low-voltagedifferential signaling interface (LVDS) 132. The LVDS 132 may be aso-called LVDS Display Interface (LDI) for support of a display device192 (e.g., a CRT, a flat panel, a projector, a touch-enabled display,etc.). A block 138 includes some examples of technologies that may besupported via the LVDS interface 132 (e.g., serial digital video,HDMI/DVI, display port). The memory controller hub 126 also includes oneor more PCI-express interfaces (PCI-E) 134, for example, for support ofdiscrete graphics 136. Discrete graphics using a PCI-E interface hasbecome an alternative approach to an accelerated graphics port (AGP).For example, the memory controller hub 126 may include a 16-lane (x16)PCI-E port for an external PCI-E-based graphics card (including, e.g.,one of more GPUs). An example system may include AGP or PCI-E forsupport of graphics.

In examples in which it is used, the I/O hub controller 150 can includea variety of interfaces. The example of FIG. 1 includes a SATA interface151, one or more PCI-E interfaces 152 (optionally one or more legacy PCIinterfaces), one or more USB interfaces 153, a LAN interface 154 (moregenerally a network interface for communication over at least onenetwork such as the Internet, a WAN, a LAN, etc. under direction of theprocessor(s) 122), a general purpose I/O interface (GPIO) 155, a low-pincount (LPC) interface 170, a power management interface 161, a clockgenerator interface 162, an audio interface 163 (e.g., for speakers 194to output audio), a total cost of operation (TCO) interface 164, asystem management bus interface (e.g., a multi-master serial computerbus interface) 165, and a serial peripheral flash memory/controllerinterface (SPI Flash) 166, which, in the example of FIG. 1, includesBIOS 168 and boot code 190. With respect to network connections, the I/Ohub controller 150 may include integrated gigabit Ethernet controllerlines multiplexed with a PCI-E interface port. Other network featuresmay operate independent of a PCI-E interface.

The interfaces of the I/O hub controller 150 may provide forcommunication with various devices, networks, etc. For example, whereused, the SATA interface 151 provides for reading, writing or readingand writing information on one or more drives 180 such as HDDs, SDDs ora combination thereof, but in any case the drives 180 are understood tobe, e.g., tangible computer readable storage mediums that are nottransitory, propagating signals. The I/O hub controller 150 may alsoinclude an advanced host controller interface (AHCI) to support one ormore drives 180. The PCI-E interface 152 allows for wireless connections182 to devices, networks, etc. The USB interface 153 provides for inputdevices 184 such as keyboards (KB), mice and various other devices(e.g., cameras, phones, storage, media players, etc.).

In the example of FIG. 1, the LPC interface 170 provides for use of oneor more ASICs 171, a trusted platform module (TPM) 172, a super I/O 173,a firmware hub 174, BIOS support 175 as well as various types of memory176 such as ROM 177, Flash 178, and non-volatile RAM (NVRAM) 179. Withrespect to the TPM 172, this module may be in the form of a chip thatcan be used to authenticate software and hardware devices. For example,a TPM may be capable of performing platform authentication and may beused to verify that a system seeking access is the expected system.

The system 100, upon power on, may be configured to execute boot code190 for the BIOS 168, as stored within the SPI Flash 166, and thereafterprocesses data under the control of one or more operating systems andapplication software (e.g., stored in system memory 140). An operatingsystem may be stored in any of a variety of locations and accessed, forexample, according to instructions of the BIOS 168.

The system 100 may also include a telephony transceiver 195 accessibleto the processor 122, such as a wireless cellular telephony transceiver,for telephone communication over one or more telephone networks inaccordance with present principles. The telephone networks may include,for example, wireless cellular networks operated by respective telephoneservices providers.

Additionally, though not shown for clarity, in some embodiments thesystem 100 may include a gyroscope that senses and/or measures theorientation of the system 100 and provides input related thereto to theprocessor 122, as well as an accelerometer that senses accelerationand/or movement of the system 100 and provides input related thereto tothe processor 122. Still further, the system 100 may include an audioreceiver/microphone that provides input from the microphone to theprocessor 122 based on audio that is detected, such as via a userproviding audible input to the microphone, and a camera that gathers oneor more images and provides input related thereto to the processor 122.The camera may be a thermal imaging camera, a digital camera such as awebcam, a three-dimensional (3D) camera, and/or a camera otherwiseintegrated into the system 100 and controllable by the processor 122 togather pictures/images and/or video.

Further, the system 100 may include a GPS transceiver that is configuredto communicate with at least one satellite to receive/identifygeographic position information and provide the geographic positioninformation to the processor 122. However, it is to be understood thatanother suitable position receiver other than a GPS receiver may be usedin accordance with present principles to determine the location of thesystem 100.

It is to be understood that an example client device or othermachine/computer may include fewer or more features than shown on thesystem 100 of FIG. 1. In any case, it is to be understood at least basedon the foregoing that the system 100 is configured to undertake presentprinciples.

Turning now to FIG. 2, example devices are shown communicating over anetwork 200 such as the Internet in accordance with present principles.It is to be understood that each of the devices described in referenceto FIG. 2 may include at least some of the features, components, and/orelements of the system 100 described above. Indeed, any of the devicesdisclosed herein may include at least some of the features, components,and/or elements of the system 100 described above.

FIG. 2 shows a notebook computer and/or convertible computer 202, adesktop computer 204, a wearable device 206 such as a smart watch, asmart television (TV) 208, a smart phone 210, a tablet computer 212, anda server 214 such as an Internet server that may provide cloud storageaccessible to the devices 202-212. It is to be understood that thedevices 202-214 are configured to communicate with each other over thenetwork 200 to undertake present principles.

Referring to FIG. 3, it shows example logic that may be executed by adevice such as the system 100 and/or a user's smart phone in accordancewith present principles. Beginning at block 300, the smart phone mayreceive a voice message or access a stored voice message. The voicemessage may be from a caller that called about an urgent situation towhich the user of the smart phone should be made aware, where the userdid not answer the call itself. The voice message may be stored at thesmart phone or at a server operated by an entity that provides telephoneservices to the smart phone, such as a wireless cellular carrier. Fromblock 300 the logic may then proceed to block 302.

At block 302 the smart phone may parse and/or scan contents of the voicemessage and then at block 304 identify any urgent or emergency situationthat might be indicated in the voice message. In one example, theparsing and identification may be performed using speechrecognition/audio analysis software, or using speech-to-text software toconvert audio of the voice message to text. Keyword recognition may thenbe used to identify words or phrases from the recognized speech orconverted text that might indicate an emergency or urgent situation. Thekeywords may be stored in a database accessible to the smart phone andmay include words and phrases such as “emergency”, “principal”, “I'msick”, and “This is doctor . . . ”. Additionally or alternatively, theparsing/scanning and identification may be performed using artificialintelligence software to determine whether the voice message indicatessomething requiring urgent action or an emergency situation.

Metadata regarding the call may also be parsed/analyzed to determinewhether the metadata indicates an urgent or emergency situation. Forinstance, the identity of the caller may be used to determine if anurgent or emergency situation exists, where certain callers or types ofcallers may be associated with urgent or emergency situations. Forinstance, callers from schools and callers from hospitals may always bedeemed as indicative of an urgent or emergency situation existing. Theidentity of the caller itself may be determined by using a calleridentification (ID) feature on the smart phone or provided by thetelephone services provider, and/or by identifying the number itself andthen executing an Internet search to determine the identity of thecaller.

Then, responsive to the operation performed at block 304, the logic mayproceed to block 306 where the smart phone may determine whether anurgent or emergency situation exists. The determination may be based on,for example, whether the artificial intelligence software returned anindication at block 304 that an urgent or emergency situation exists, orwhether a keyword or phrase from the database described above wasmatched at block 304 to a word or phrase in the voice message. Anegative determination at diamond 306 may cause the logic to proceed toblock 308 where the logic may end. However, responsive to an affirmativedetermination at diamond 306, the logic may proceed to block 310.

At block 310 the smart phone may provide either or both of an audiblealert/notification and a visual alert/notification at the smart phoneitself. In either case, the alert may indicate that the urgent oremergency situation requires the attention of the user. Examples ofthese alerts will be discussed below in reference to other figures. Fromblock 310 the logic may continue to block 312.

At block 312 the smart phone may provide an alert or notification toanother device being used by the user and/or to a contact of the usersuch as a designated emergency contact. For example, if network activityfrom the user's laptop computer is detected, the smart phone maytransmit an alert over the network to the laptop so that information canbe presented audibly or visually at the laptop that indicates that theurgent or emergency situation requires the attention of the user. Thevoice message itself may even be forwarded to the laptop. As anotherexample, the smart phone may transmit an alert to the user's spouse'sdevice, as might have been previously designated by the user using a UIsuch as the settings UI 900 shown in FIG. 9 (though this particularfeature is not shown in FIG. 9 for simplicity). From block 312 the logicmay then proceed to block 314.

Then, at block 314, the next time a telephone call or text message isreceived at the smart phone from the same telephone number that was usedto provide the voice message, the smart phone may present an indicationof the subsequent incoming telephone call or text message. For instance,even if the smart phone's ringer has been placed on silent, the smartphone may override the silent setting and activate the smart phone'sringer to indicate a telephone call or text message from the same numberthat is currently incoming. As another example, even if the smart phoneis in a “do not disturb” mode, the smart phone may override the mode toprovide a visual alert such as illuminating a light-emitting diode (LED)on the smart phone or illuminating the smart phone's display to visuallypresent a text message that is received from the same number thatpreviously provided an urgent voice message.

Before moving on to the description of other figures, it is to beunderstood in reference to FIG. 3 that the example logic discussed abovemay also be executed by a server of the smart phone's telephone servicesprovider. For example, the server may parse/scan a voicemail that itstores so that the user of the smart phone may access it when the userwishes. The server may then identify an urgent or emergency situationand issue alerts to one or more of the end-user's connected devices andeven issue commands to change settings of the end-user's smart phone sothat a subsequent incoming communication may be indicated at the smartphone as discussed above in reference to block 314.

Now describing FIG. 4, it shows an example illustration 400 of anaudible alert or notification being provided in accordance with presentprinciples. A user 404 is shown watching audio video content presentedon a television 402 while the user 404 sits on a couch 406 in the livingroom of a personal residence. The user's smart phone 408 is shownsitting on a table 410 adjacent to the couch 406. The smart phone 408 isshown as providing an audible alert 412 via a speaker on the smart phone408 based on the smart phone 408 determining that an urgent/emergencysituation exists and/or based on receiving such information from anotherdevice such as a server as discussed herein. In this example, theaudible alert 412 is “urgent message received”.

FIG. 5 shows an example of a user interface (UI) 500 that may bepresented on the display of a user's smart phone to provide a visualalert to the user in accordance with present principles. The UI 500 mayinclude an indication 502 that an urgent/emergency situation exists. TheUI 500 may also include an indication 504 of a source or caller thatleft a voice message for the user from which the urgent/emergencysituation was identified.

Additionally, a selector 506 may be presented on the UI 500. Theselector 506 may be selected (e.g., using touch input or input using acursor) to command the smart phone to automatically present text of thevoice message as may have been converted from the audio of the voicemessage using speech-to-text software. A selector 508 may also bepresented, with the selector 508 being selectable to command the smartphone to automatically present the audio of the voice message itselfusing speakers on the smart phone.

Now in reference to FIG. 6, it shows another example UI 600. However, incontrast to FIG. 5, the UI 600 of FIG. 6 may be presented on a deviceother than a smart phone at which an urgent/emergency voice message wasreceived and/or other than the smart phone at which the correspondingcall itself was received. For example, the UI 600 may be presented onthe display of a user's laptop or tablet computer while being used bythe user for another purpose such as browsing the Internet or creating aword processing document. As shown, the UI 600 may include an indication602 that an urgent/emergency situation exists. The UI 600 may alsoinclude an indication 604 identifying the device to which thecorresponding voice message or text message was directed and identifyinga source or caller whom left the voice message/text message.

The UI 600 may also include a selector 606. The selector 606 may beselected to provide a command to automatically present text of thevoice/text message at the other device (e.g. laptop or tablet). Aselector 608 may also be presented, with the selector 608 being selectedto provide a command to automatically present audio of the voice/textmessage at the other device. For example, either of these commands maycause the smart phone to forward the text or audio of the message itselfto the other device for presentation at the other device.

Continuing the detailed description in reference to FIG. 7, it shows yetanother example UI 700. The UI 700 may present text of a voice messageor text message that has been received and that indicates anurgent/emergency situation. For example, the UI 700 may be presented atthe appropriate device responsive to selection of either of the selector506 or selector 606.

The UI 700 may indicate that something urgent requires the attention ofthe user via an indication 702. Text 704 of the voice message or textmessage may also be presented so that a user may read the text 704. If avoice message, a selector 706 may also be presented on the UI 700. Theselector 706 may be selected to command the device to automaticallypresent the audio of the voice message.

FIG. 8 shows yet another example UI 800 that may be presented on thedisplay of a smart phone in accordance with present principles. The UI800 may include an indication 802 that a telephone call or text messageis currently incoming to the smart phone. The UI 800 may also include anindication 804 that an urgent message was received earlier in the sameday from the same number associated with the incoming telephone call ortext message. Thus, it is to be understood that in some examples the UI800 may be presented if an urgent message was previously received nomore than a threshold time before the time of the incoming telephonecall or text message. The threshold may be, e.g., twelve hours before orone day before.

If an incoming telephone call, the UI 800 may include a selector 806that is selected to answer the incoming telephone call. If an incomingtext message, the selector 806 may be selected to view the incoming textmessage using the smart phone's display.

Additionally, a selector 808 and a selector 810 may be presented as partof the UI 800. The selector 808 may be selected to command the smartphone to automatically present text of the previously received voicemessage or text message. Selector 810 may be selected to command thesmart phone to automatically present audio of the previously receivedvoice message or text message. If the selector 810 were selected and themessage were a text message, text-to-speech software may be used toconvert the text message to audio for presentation.

Now in reference to FIG. 9, an example UI 900 is shown that may bepresented on the display of a device undertaking present principles,such as the display of a smart phone. The UI 900 may be for configuringsettings of the device. Each of the options to be discussed below may berespectively selected by directing touch or cursor input to thecorresponding check box shown adjacent to each option.

As shown, a first option 902 may be presented as part of the UI 900. Thefirst option 902 may be selected to enable/configure the device toprovide urgent notifications in accordance with present principles. Forexample, the option 902 may be selected to enable the device toundertake the logic of FIG. 3 and/or present any of the UIs shown inFIGS. 5-8. The option 902 may be accompanied by a setting 904 at which auser may enter, to input box 906, a number of times that suchnotifications should be provided for a given urgent message. Forinstance, should a user input the number four into box 906, the devicemay be configured to present a notification of an urgent text messagefour times subsequent to the initial notification of the incoming textmessage, with each subsequent time separated by an equal length ofpredetermined time (such as half an hour).

The UI 900 may also include a setting 908 for selecting various types ofsituations for which to provide notifications/alerts in accordance withpresent principles, as might be identified using artificial intelligenceor keyword recognition. As examples, option 910 may be selected toconfigure the device to provide notifications/alerts for medicalemergencies, and option 912 may be selected to configure the device toprovide notifications/alerts for communications from schools.

Still in reference to FIG. 9, the UI 900 may also include a setting 914for selecting types of notifications/alerts to be provided by thedevice. As examples, option 916 may be selected to configure the deviceto provide audible notifications/alerts as disclosed herein, and option918 may be selected to configure the device to provide visualnotifications/alerts as disclosed herein.

Additionally, the UI 900 may include an option 920 that is selectable tocommand the device to provide notifications/alerts to other devices whenthose other devices are determined to be in use by a user as disclosedherein. For instance, selection of option 920 may enable/configure thedevice to execute the step described above in reference to block 312.Still further, the UI 900 may include an option 922 that is selectableto present incoming communications from a same number from which anurgent message was previously received, even if the device may have beenplaced in a silent or “do not disturb” mode as disclosed herein. Forinstance, selection of option 922 may enable/configure the device toexecute the step described above in reference to block 314.

Before concluding, it is to be understood that present principles applyfor identifying an urgent or emergency situation not just from voicemessages and text messages but also for identifying an urgent oremergency situation from an email message or a message using aparticular messaging application or service such as Skype, Lync, WeChat,Facebook, Twitter, etc.).

Also before concluding, it is to be understood that although a softwareapplication for undertaking present principles may be vended with adevice such as the system 100, present principles apply in instanceswhere such an application is downloaded from a server to a device over anetwork such as the Internet. Furthermore, present principles apply ininstances where such an application is included on a computer readablestorage medium that is being vended and/or provided, where the computerreadable storage medium is not a transitory, propagating signal and/or asignal per se.

It is to be understood that whilst present principals have beendescribed with reference to some example embodiments, these are notintended to be limiting, and that various alternative arrangements maybe used to implement the subject matter claimed herein. Componentsincluded in one embodiment can be used in other embodiments in anyappropriate combination. For example, any of the various componentsdescribed herein and/or depicted in the Figures may be combined,interchanged or excluded from other embodiments.

What is claimed is:
 1. A first device, comprising: at least oneprocessor; and storage accessible to the at least one processor andbearing instructions executable by the at least one processor to: parsecontent of a message; determine, based on the parsing of content of themessage, to provide a notification using the first device; identify asecond device as being currently in use by a user, the second devicebeing different from the first device; and provide the notification tothe second device based on the determination to provide the notificationusing the first device and based on the identification of the seconddevice as being currently in use by the user.
 2. The first device ofclaim 1, wherein the notification indicates that an emergency situationrequires the attention of a user.
 3. The first device of claim 1,wherein the message is parsed at least in part using speech-to-textsoftware and keyword recognition.
 4. The first device of claim 1,wherein the message is parsed at least in part using artificialintelligence software to determine whether the message indicatessomething requiring urgent user action.
 5. The first device of claim 1,wherein the notification indicates that an audible alert is to beprovided at the second device.
 6. The first device of claim 1, whereinthe notification indicates that a visual alert is to be provided at thesecond device.
 7. The first device of claim 1, wherein the notificationis a first notification, and wherein the instructions are executable bythe at least one processor to: present a second notification at thefirst device at a later time, the second notification pertaining to anincoming telephone call received from a telephone number that is thesame telephone number that was used to provide the message.
 8. A method,comprising: receiving, at a first device, a message; parsing contents ofthe message to determine whether to issue an alert using the firstdevice; determining, based on the parsing, to issue the alert using thefirst device, identifying a second device as being currently in use by auser, the second device being different from the first device, andissuing, based on the determining to issue the alert using the firstdevice and based on the identifying of the second device as beingcurrently in use by the user, the alert to the second device using thefirst device.
 9. The method of claim 8, wherein the alert indicates thatsomething urgent requires the attention of a user.
 10. The method ofclaim 8, wherein the message is parsed at least in part using speechrecognition software and keyword recognition.
 11. The method of claim 8,wherein the first device is an end-user device, and wherein the alert isalso issued by presenting the alert at the first device.
 12. The methodof claim 8, wherein the alert comprises an indication of an incomingcommunication the next time a communication is received from a telephonenumber that is the same telephone number that was used to provide themessage.
 13. A computer readable storage medium (CRSM) that is not atransitory signal, the computer readable storage medium comprisinginstructions executable by at least one processor to: receive, at afirst device, a message; parse contents of the message; determine, basedon the parsing, to issue a notification; identify a second device asbeing currently in use by a person, the second device being differentfrom the first device; and issue, based on determination to issue thenotification and based on the identification of the second device asbeing currently in use by the person, the notification to the seconddevice.
 14. The first device of claim 1, wherein the instructions areexecutable by the at least one processor to: determine, based on a typeof caller from which the message is received, whether to provide thenotification using the first device.
 15. The method of claim 8,comprising: issuing, based on determining to issue the alert using thefirst device, plural alerts at regular intervals using the first device.16. The CRSM of claim 13, wherein the message comprises one or more of:a text message, a voice message.
 17. The first device of claim 1,wherein the identification of the second device as being currently inuse by the user is based at least in part on detection of networkactivity by the second device.
 18. The method of claim 8, wherein theidentifying the second device as being currently in use by the user isbased at least in part on detecting network activity by the seconddevice.
 19. The CRSM of claim 13, wherein the first device is a server.20. The CRSM of claim 13, wherein the first device is an end-userdevice.