Communication request notification extension

ABSTRACT

One embodiment provides a method, the method including: detecting, using a notification extension system, an incoming communication request on an information handling device; identifying, using the notification extension system, an environmental context of a user with respect to the information handling device; determining, using the notification extension system and based upon the environmental context of the user, the user is unable to answer the incoming communication request within a default communication request notification length; and extending, using the notification extension system, based upon the environmental context of the user, and responsive to determining the user is unable to answer the incoming communication request, a length of the communication request notification.

BACKGROUND

With more and more people working remotely, the use of communicationapplications and meeting applications has increased. These applicationsare installed on an information handling device (e.g., computer system,smartphone, tablet, etc.) and utilize the Internet or other wirelessconnection as the communication transmission medium. Additionally,companies and other entities are frequently moving from hardwiredtelephone systems to voice-over-Internet-protocol (VOIP) systems. Theuse of these communication/meeting applications and VOIP systemstypically adds extra steps when answering an incoming communicationrequest. Additionally, since the applications transmit the communicationover the Internet, different modes of communication are possible, forexample, video calls, audio calls, and the like.

BRIEF SUMMARY

In summary, one aspect provides a method, the method including:detecting, using a notification extension system, an incomingcommunication request on an information handling device; identifying,using the notification extension system, an environmental context of auser with respect to the information handling device; determining, usingthe notification extension system and based upon the environmentalcontext of the user, the user is unable to answer the incomingcommunication request within a default communication requestnotification length; and extending, using the notification extensionsystem, based upon the environmental context of the user, and responsiveto determining the user is unable to answer the incoming communicationrequest, a length of the communication request notification.

Another aspect provides an information handling device, the informationhandling device including: a processor; a memory device that storesinstructions that, when executed by the processor, causes theinformation handling device to: detect, using a notification extensionsystem, an incoming communication request on the information handlingdevice; identify, using the notification extension system, anenvironmental context of a user with respect to the information handlingdevice; determine, using the notification extension system and basedupon the environmental context of the user, the user is unable to answerthe incoming communication request within a default communicationrequest notification length; and extend, using the notificationextension system, based upon the environmental context of the user, andresponsive to determining the user is unable to answer the incomingcommunication request, a length of the communication requestnotification.

A further aspect provides a product, the product including: acomputer-readable storage device that stores executable code that, whenexecuted by a processor, causes the product to: detect, using anotification extension system, an incoming communication request on theinformation handling device; identify, using the notification extensionsystem, an environmental context of a user with respect to theinformation handling device; determine, using the notification extensionsystem and based upon the environmental context of the user, the user isunable to answer the incoming communication request within a defaultcommunication request notification length; and extend, using thenotification extension system, based upon the environmental context ofthe user, and responsive to determining the user is unable to answer theincoming communication request, a length of the communication requestnotification.

The foregoing is a summary and thus may contain simplifications,generalizations, and omissions of detail; consequently, those skilled inthe art will appreciate that the summary is illustrative only and is notintended to be in any way limiting.

For a better understanding of the embodiments, together with other andfurther features and advantages thereof, reference is made to thefollowing description, taken in conjunction with the accompanyingdrawings. The scope of the invention will be pointed out in the appendedclaims.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 illustrates an example of information handling device circuitry.

FIG. 2 illustrates another example of information handling devicecircuitry.

FIG. 3 illustrates an example method for extending a length of anincoming communication request notification based upon an environmentalcontext of the user with respect to the device receiving the incomingcommunication request.

DETAILED DESCRIPTION

It will be readily understood that the components of the embodiments, asgenerally described and illustrated in the figures herein, may bearranged and designed in a wide variety of different configurations inaddition to the described example embodiments. Thus, the following moredetailed description of the example embodiments, as represented in thefigures, is not intended to limit the scope of the embodiments, asclaimed, but is merely representative of example embodiments.

Reference throughout this specification to “one embodiment” or “anembodiment” (or the like) means that a particular feature, structure, orcharacteristic described in connection with the embodiment is includedin at least one embodiment. Thus, the appearance of the phrases “in oneembodiment” or “in an embodiment” or the like in various placesthroughout this specification are not necessarily all referring to thesame embodiment.

Furthermore, the described features, structures, or characteristics maybe combined in any suitable manner in one or more embodiments. In thefollowing description, numerous specific details are provided to give athorough understanding of embodiments. One skilled in the relevant artwill recognize, however, that the various embodiments can be practicedwithout one or more of the specific details, or with other methods,components, materials, et cetera. In other instances, well knownstructures, materials, or operations are not shown or described indetail to avoid obfuscation.

While it is desirable to be able to communicate with others usingdifferent modes of communication and using applications informationhandling devices, it can increase the length of time it takes a user toanswer an incoming communication request. Many applications require theuser to take additional steps to answer a call rather than simplyanswering the call. For example, the user may have to put on or adjust aheadset and then press a button to answer the communication request. Asanother example, the user may have to wake the information handlingdevice and provide an input to answer the communication request. Also,since many of these devices are used because a user is working remotely,the user may be away from the device when the communication requestcomes in. In the time it takes the user to get situated to answer thecommunication request, the request may have ended. This causes the userto have to take additional steps to call the requestor back or send amessage that they are now available.

While conventional techniques may provide a notification that acommunication request was missed, the conventional techniques do notprovide a technique for extending the length of the notificationcorresponding to the communication request. Rather, the length of thenotification (e.g., the number of rings, the time the notification ringsor is visible, etc.) is set to a default value. While a user can changethe settings to lengthen this notification time, the notification timeis set for each communication request that is received and does not varydepending on the request type and/or an environmental context of theuser. Additionally, the person who is sending the communication requestdoes not know if the user is unavailable or is attempting to answer therequest.

Accordingly, the described system and method provides a technique forextending a length of an incoming communication request notificationbased upon an environmental context of the user with respect to thedevice receiving the incoming communication request. A notificationextension system detects an incoming communication request on aninformation handling device. The communication request may be receivedthrough an application of the device, for example, a call application, ameetings application, a video call application, or the like. Thecommunication request may also be of different types, for example, asimple phone call, a video call, or the like.

In response to detecting the communication request, the notificationextension system identifies an environmental context of a user withrespect to the information handling device receiving the request. Theenvironmental context may identify a current activity of the user, adistance of a user from the device, a location of the user with respectto the device, and/or the like. Based upon the environmental context,the system determines the user is unable to answer the incomingcommunication request within a default notification length. In otherwords, the system determines that the user will be unable to get therequest answer in the length of time that the notification is usuallyactive. In response to determining the user will be unable to answer therequest quickly enough before it ends, the system extends the length ofthe notification. The length of time that the notification is extendedfor may be based upon one or more factors, for example, the type of theincoming communication, the environmental context of the user, and thelike. Thus, the length of time that the notification is extended for mayvary from request to request based upon the different factors.

Therefore, a system provides a technical improvement over traditionalmethods for incoming communication notifications. The described systemis able to extend the length of a notification corresponding to acommunication request based upon an environmental context of the user.The length of the notification may also be extended based upon a type ofthe communication request, since different communications request typesmay require different actions by the user. Thus, the described systemallows for extending the notification which is not possible usingconventional systems. Additionally, since the notification length isbased upon the environmental context and/or the communication type, thenotification length can be dynamically changed for each request that isreceived, unlike conventional techniques where the notification lengthis set to a single value for all requests. Additionally, the systemnotifies the requestor that the notification length has been extended toallow the user time to answer the request, which is not performed by theconventional systems. Accordingly, the described system provides a userto receive notifications regarding communication requests in a mannerthat allows the user to answer the request while it is being receivedwithout having to call the requestor back and the requestor is notifiedthat the user is attempting to answer the request, thereby saving timefor both the user and the requestor.

The illustrated example embodiments will be best understood by referenceto the figures. The following description is intended only by way ofexample, and simply illustrates certain example embodiments.

While various other circuits, circuitry or components may be utilized ininformation handling devices, with regard to smart phone and/or tabletcircuitry 100, an example illustrated in FIG. 1 includes a system on achip design found for example in tablet or other mobile computingplatforms. Software and processor(s) are combined in a single chip 110.Processors comprise internal arithmetic units, registers, cache memory,busses, input/output (I/O) ports, etc., as is well known in the art.Internal busses and the like depend on different vendors, butessentially all the peripheral devices (120) may attach to a single chip110. The circuitry 100 combines the processor, memory control, and I/Ocontroller hub all into a single chip 110. Also, systems 100 of thistype do not typically use serial advanced technology attachment (SATA)or peripheral component interconnect (PCI) or low pin count (LPC).Common interfaces, for example, include secure digital input/output(SDIO) and inter-integrated circuit (I2C).

There are power management chip(s) 130, e.g., a battery management unit,BMU, which manage power as supplied, for example, via a rechargeablebattery 140, which may be recharged by a connection to a power source(not shown). In at least one design, a single chip, such as 110, is usedto supply basic input/output system (BIOS) like functionality anddynamic random-access memory (DRAM) memory.

System 100 typically includes one or more of a wireless wide areanetwork (WWAN) transceiver 150 and a wireless local area network (WLAN)transceiver 160 for connecting to various networks, such astelecommunications networks and wireless Internet devices, e.g., accesspoints. Additionally, devices 120 are commonly included, e.g., awireless communication device, external storage, etc. System 100 oftenincludes a touch screen 170 for data input and display/rendering. System100 also typically includes various memory devices, for example flashmemory 180 and synchronous dynamic random-access memory (SDRAM) 190.

FIG. 2 depicts a block diagram of another example of informationhandling device circuits, circuitry or components. The example depictedin FIG. 2 may correspond to computing systems such as personalcomputers, or other devices. As is apparent from the description herein,embodiments may include other features or only some of the features ofthe example illustrated in FIG. 2 .

The example of FIG. 2 includes a so-called chipset 210 (a group ofintegrated circuits, or chips, that work together, chipsets) with anarchitecture that may vary depending on manufacturer. The architectureof the chipset 210 includes a core and memory control group 220 and anI/O controller hub 250 that exchanges information (for example, data,signals, commands, etc.) via a direct management interface (DMI) 242 ora link controller 244. In FIG. 2 , the DMI 242 is a chip-to-chipinterface (sometimes referred to as being a link between a “northbridge”and a “southbridge”). The core and memory control group 220 include oneor more processors 222 (for example, single or multi-core) and a memorycontroller hub 226 that exchange information via a front side bus (FSB)224; noting that components of the group 220 may be integrated in a chipthat supplants the conventional “northbridge” style architecture. One ormore processors 222 comprise internal arithmetic units, registers, cachememory, busses, I/O ports, etc., as is well known in the art.

In FIG. 2 , the memory controller hub 226 interfaces with memory 240(for example, to provide support for a type of random-access memory(RAM) that may be referred to as “system memory” or “memory”). Thememory controller hub 226 further includes a low voltage differentialsignaling (LVDS) interface 232 for a display device 292 (for example, acathode-ray tube (CRT), a flat panel, touch screen, etc.). A block 238includes some technologies that may be supported via the low-voltagedifferential signaling (LVDS) interface 232 (for example, serial digitalvideo, high-definition multimedia interface/digital visual interface(HDMI/DVI), display port). The memory controller hub 226 also includes aPCI-express interface (PCI-E) 234 that may support discrete graphics236.

In FIG. 2 , the I/O hub controller 250 includes a SATA interface 251(for example, for hard-disc drives (HDDs), solid-state drives (SSDs),etc., 280), a PCI-E interface 252 (for example, for wireless connections282), a universal serial bus (USB) interface 253 (for example, fordevices 284 such as a digitizer, keyboard, mice, cameras, phones,microphones, storage, other connected devices, etc.), a networkinterface 254 (for example, local area network (LAN)), a general purposeI/O (GPIO) interface 255, a LPC interface 270 (for application-specificintegrated circuit (ASICs) 271, a trusted platform module (TPM) 272, asuper I/O 273, a firmware hub 274, BIOS support 275 as well as varioustypes of memory 276 such as read-only memory (ROM) 277, Flash 278, andnon-volatile RAM (NVRAM) 279), a power management interface 261, a clockgenerator interface 262, an audio interface 263 (for example, forspeakers 294), a time controlled operations (TCO) interface 264, asystem management bus interface 265, and serial peripheral interface(SPI) Flash 266, which can include BIOS 268 and boot code 290. The I/Ohub controller 250 may include gigabit Ethernet support.

The system, upon power on, may be configured to execute boot code 290for the BIOS 268, as stored within the SPI Flash 266, and thereafterprocesses data under the control of one or more operating systems andapplication software (for example, stored in system memory 240). Anoperating system may be stored in any of a variety of locations andaccessed, for example, according to instructions of the BIOS 268. Asdescribed herein, a device may include fewer or more features than shownin the system of FIG. 2 .

Information handling device circuitry, as for example outlined in FIG. 1or FIG. 2 , may be used in devices such as tablets, smart phones,personal computer devices generally, and/or electronic devices, whichmay be used in systems for extending a notification length for acommunication request. For example, the circuitry outlined in FIG. 1 maybe implemented in a tablet or smart phone embodiment, whereas thecircuitry outlined in FIG. 2 may be implemented in a personal computerembodiment.

FIG. 3 illustrates an example method for extending a length of anincoming communication request notification based upon an environmentalcontext of the user with respect to the device receiving the incomingcommunication request. The method may be implemented on a system whichincludes a processor, memory device, output devices (e.g., displaydevice, printer, etc.), input devices (e.g., keyboard, touch screen,mouse, microphones, sensors, biometric scanners, etc.), image capturedevices, and/or other components, for example, those discussed inconnection with FIG. 1 and/or FIG. 2 . While the system may includeknown hardware and software components and/or hardware and softwarecomponents developed in the future, the system itself is specificallyprogrammed to perform the functions as described herein to extend acommunication notification length based upon an environmental context ofa user. Additionally, the notification extension system includes modulesand features that are unique to the described system.

At 301, the notification extension system detects an incomingcommunication request on an information handling device. For ease ofreadability, the incoming communication request will be referred toherein as a call. However, this is not intended to limit this disclosureto only a call, as other communication requests can employ the describedsystem, for example, spontaneous meeting requests, group communications,and the like. Additionally, a call may be a telephone call, video call,meeting request call, or other type of call. Additionally, for ease ofreadability, the example information handling device used herethroughout will be a computer or other similar computing system.However, this is not intended to limit the disclosure to only a computersystem as other devices, for example, smart phones, tablet, smartwatches, smart TVs, smart boards or projectors, and the like, can beutilized in the described system.

The incoming communication request may be received through anapplication on the information handling device. The application may be acall application that simply allows for incoming and outgoing calls. Theapplication may also be an application that provides more functionality,for example, video calls, screen sharing, and the like. Thus, theapplication may be a dedicated call application, meeting application,video call application, or any other type of application that allows forreal-time communication between a user and a requestor. For ease ofreadability, the person receiving the communication request will bereferred to as the user and the person sending the communication requestwill be referred to as the requestor.

The notification extension system may integral to the call application,for example, as an add-on extension, or may be a stand-alone applicationthat is able to communicate with and provide instructions to the callapplication. Additionally, or alternatively, the notification extensionsystem may be a combination of stand-alone application and callapplication extension. In this scenario, a small part of the system maybe integrated into the call application and the processing and analysispart of the system may be a stand-alone application. This combinationmay prevent the notification extension system from slowing down the callapplication by requiring the call application to support and run theanalysis and processing of the notification extension system.

At 302 the notification extension system identifies an environmentalcontext of the user (i.e., the person receiving the communicationrequest) with respect to the information handling device. Theenvironmental context essentially identifies an ability of the user toanswer the incoming communication request within a predetermined time,specifically, the default time that a notification of the incomingcommunication request will be active. In other words, the environmentcontext defines what the user is doing and where the user is locatedwith respect to the information handling device, thereby defining theability of the user to answer the call within a particular length oftime. Thus, the environmental context may be an activity being performedby the user, a distance of the user from the device, a location of theuser within the environment with respect to the device, and the like.Accordingly, the notification extension system may employ one or moresensors to monitor and/or track the user within the environment. Thesensors may be integral to or operatively coupled to the informationhandling device and/or notification extension device, if different thanthe information handling device. Additionally, or alternatively, thesensors may be operatively coupled to or communicate with another devicethat is in communication with the information handling device and/ornotification extension device, if different than the informationhandling device, for example, devices within an Internet of Things (IoT)system.

Some example sensors may include motion sensors, proximity sensors,distance sensors, device sensors, image capture devices, microphones,speakers, and the like. As an example use case, when the call isreceived the user may be away from the computer getting a drink out ofthe refrigerator. The user can hear the notification, but is far enoughfrom the computer that they will not be able to answer before thenotification stops. To identify that the user is at the refrigerator,the system may utilize a sensor on the refrigerator that identifies thatthe refrigerator door is open, an image capture device to identify thatthe user is in the kitchen, and a proximity sensor to determine the useris away from the computer. As another example use case, when a videocall request is received, the system may detect that the user is notwearing appropriate clothing for the video call using an image capturedevice.

Thus, the system may employ and utilize any sensors that are accessibleto the system that may assist in determining an environmental context ofthe user. Identifying an environmental context may include identifying alocation of the user within the environment with respect to theinformation handling device, for example, a distance between the userand the device, whether the user is in a location that would prevent theuser from hearing the notification (e.g., there are walls and/or floorsbetween the user and the device, whether there are other sounds that maymake the notification hard to hear, etc.), an activity being performedby the user, and/or the like.

At 303, the notification extension system determines, based upon theenvironmental context of the user, whether the user is unable to answerthe incoming communication request within a default communicationrequest notification length. In other words, the system determines ifthe user is able to answer the call before the notificationcorresponding to the call ends. To determine if the user is able toanswer the call before the notification ends, the system may utilize oneor more algorithms. The one or more algorithms allow the system to makecorrelations between environmental contexts (e.g., activities,distances, locations, etc.) and a length of time it takes a user toanswer a call for that environmental context. The determination may beunique to the user employing the system. In other words, while in oneenvironmental context one user could answer the call, in the sameenvironmental context a different user would not be able to answer thecall. Thus, when the system is able, the determination is unique to theuser. The system may not be able to make a unique determination if thesystem does not have a history of the user in a particular or similarenvironmental context.

One algorithm that the system may employ is a simple calculation. Thesystem may determine the distance a user is from the device. Based uponhistorical information, the system may know how long it takes the userto traverse the distance. The distance may be determined using adistance sensor or may be calculated from a position of the user. Thedistance calculation may take into account a path that the user has totraverse to reach the device instead of a direct distance. In otherwords, the system can take into account if the user has to go aroundobjects, go to a doorway to move between rooms, go up or down stairs,and the like.

In addition to the distance, the system may take into account anyactions that the user has to perform to answer the call. For example, ifthe user has to don and adjust a headset, the system takes into accountthe time it takes to perform this task. As another example, if the userwas washing their hands and now has to dry their hands, the system maketake into account the time it takes to dry their hands. The system mayhave default time values for particular or common tasks. Additionally,or alternatively, to determine how long a task takes, the system mayemploy a learning algorithm that learns how long it takes the user toperform tasks. Thus, the system may monitor the user as the userperforms tasks to determine how long it takes the user to perform thetask. The data captured during the monitoring may then be used to updatestored or default information regarding time for tasks.

The system may also employ a crowd-sourcing algorithm wherecrowd-sourced information is utilized to determine a length of time toperform a task and/or to make correlations between environmentalcontexts and lengths of times that users have take to answer a call foran environmental context. The crowd-sourced information may befrequently updated with new or updated information. Additionally, thecrowd-sourced information may be sorted or filtered based uponcharacteristics of the user and users making up the crowd-sourcedinformation. Characteristics may include characteristics of the user(e.g., age, geographical location or region, gender, etc.),characteristics of the environment (e.g., size or layout of anenvironment, other people within the environment, etc.), characteristicsof the device (e.g., the application, call type, components installed onthe device, etc.), or any other characteristics that may impact how longit takes a user to answer a call for an environmental context.

Another algorithm that the system may employ is a machine-learning modelor algorithm. The machine-learning model can be trained using historicalinformation that identifies a length of time to perform a task and/oridentifies environmental contexts (e.g., activities, distances,locations, etc.) of the user and lengths of time to answer a call thatcorrespond to these environmental contexts of the user. As the userutilizes the notification extension system, the machine-learning modelcan automatically ingest information related to environmental contextsof the user and lengths of time to answer a call correlating to theenvironmental contexts to further refine the machine-learning model. Themodel may also take into account other information, for example,characteristics of the device, characteristics of the user,characteristics of the environment, and the like. Thus, themachine-learning model may be trained to be unique to the user.

Once the system determines how long it will take the user to answer thecall, the system can compare this length of time to the defaultcommunication request notification length. In other words, the systemcompares the length of time it expects the user will take to answer thecall to the length of time the notification is set to be active. If thecalculated length of time is greater than the default length of time,the system may determine the user will be unable to answer the call inthe default length of time. If, on the other hand, the calculated lengthof time is less than the default length of time, the system maydetermine the user will be able to answer the call in the default lengthof time. If the calculated length of time is equal to the default lengthof time, the system may determine that the user may or may not make itto the answer the call in the default length of time.

If the system determines that the user will be able to answer the callin the default time at 303, the notification extension system may takeno action with respect to the notification length at 305. The system mayalso take no action if the calculated length of time is equal to thedefault length of time. However, whether the system takes an action inthis scenario may be chosen by the user. The system may also default toa conservative action, which would be to extend the length of thenotification at 304. The system may also extend the notification at 304if the system determines that the user will be unable to answer the callin the default notification length of time. In other words, at 304, thenotification extension system extends, based upon the environmentalcontext of the user, and responsive to determining the user is unable toanswer the incoming communication request, a length of the communicationrequest notification.

Extending the length of the notification includes extending the timethat the notification is active, thereby allowing the user additionaltime to answer the call. The time length of extension may be a defaultvalue, for example, a particular number of rings, a particular timelength, or the like. On the other hand, the time length of extension maybe different for different environmental contexts of the user. In otherwords, depending on what the user is doing, where the user is locatedwithin an environment, a position of the user with respect to thedevice, and the like, the time length of extension may vary. Thus, thelength of time extension is dynamic for different environmentalcontexts. Additionally, or alternatively, the length of time extensionmay be unique to the user. Thus, the length of time extension is basedupon information of the user, thereby providing an individualized lengthof time extension.

The length of time extension may also be based upon other factors, forexample, a type of the incoming communication. Different communicationtypes (e.g., video call, meeting call request, telephone call, etc.) mayrequire the user to be in different levels of preparedness. For example,a video call may require the user to be dressed in a particular way. Ifthe user is not properly dressed, answering the video call can entailgetting properly dressed, thereby extending the amount of time a userneeds to answer the video call. However, if, in the same scenario, thecall were a simple telephone call, the user does not have to getproperly dressed and can answer the call more quickly. Thus, differentcommunication types may require different length of time extensions forthe notification.

The algorithms used to make the determination regarding whether a useris able to answer the call in the default time may also provide inputinto how long the length of time extension should be. Since thedetermination provides a calculated length of time for the user toanswer the call, the system may use this calculated value to extend thecommunication notification time to or past the calculated value. Forexample, if the machine-learning algorithm determined that it will takethe user an additional five second above the default value to answer thecall, the system may extend the notification active time an additionalfive seconds. The system may also extend the notification active timefor the calculated value plus a buffer value, for example, one second,two seconds, or the like. Thus, using the previous example plus a buffervalue of two seconds, the system would extend the notification activetime seven seconds (i.e., five second for the calculated value plus twoseconds for the buffer value). Accordingly, the machine-learning model,crowd-sourced information, and other algorithms used in thedetermination step may provide input or identify a length of time forthe notification extension.

In addition to extending the notification, the notification extensionsystem may also notify the requestor that the notification active timeis being extended. This allows the requestor to know to stay on the callas it is ringing and not hang up prematurely. In other words, thisprovides an indication to the requestor that the user is actively tryingto answer the call, but it is taking longer than normal to do so. Thisprevents the requestor from hanging up or assuming the user isunavailable to answer the communication request. The system may alsonotify the requestor of the expected time that the user will answer thecall. This notification information can be based upon the calculatedvalues and how long the system has extended the notification for.

As will be appreciated by one skilled in the art, various aspects may beembodied as a system, method or device program product. Accordingly,aspects may take the form of an entirely hardware embodiment or anembodiment including software that may all generally be referred toherein as a “circuit,” “module” or “system.” Furthermore, aspects maytake the form of a device program product embodied in one or more devicereadable medium(s) having device readable program code embodiedtherewith.

It should be noted that the various functions described herein may beimplemented using instructions stored on a device readable storagemedium such as a non-signal storage device that are executed by aprocessor. A storage device may be, for example, an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system,apparatus, or device, or any suitable combination of the foregoing. Morespecific examples of a storage medium would include the following: aportable computer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), an optical fiber, a portable compact disc read-onlymemory (CD-ROM), an optical storage device, a magnetic storage device,or any suitable combination of the foregoing. In the context of thisdocument, a storage device is not a signal and is not to be construed asbeing transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire. Additionally, the term “non-transitory” includes allmedia except signal media.

Program code embodied on a storage medium may be transmitted using anyappropriate medium, including but not limited to wireless, wireline,optical fiber cable, radio frequency, et cetera, or any suitablecombination of the foregoing.

Program code for carrying out operations may be written in anycombination of one or more programming languages. The program code mayexecute entirely on a single device, partly on a single device, as astand-alone software package, partly on single device and partly onanother device, or entirely on the other device. In some cases, thedevices may be connected through any type of connection or network,including a local area network (LAN) or a wide area network (WAN), orthe connection may be made through other devices (for example, throughthe Internet using an Internet Service Provider), through wirelessconnections, e.g., near-field communication, or through a hard wireconnection, such as over a USB connection.

Example embodiments are described herein with reference to the figures,which illustrate example methods, devices and program products accordingto various example embodiments. It will be understood that the actionsand functionality may be implemented at least in part by programinstructions. These program instructions may be provided to a processorof a device, a special purpose information handling device, or otherprogrammable data processing device to produce a machine, such that theinstructions, which execute via a processor of the device implement thefunctions/acts specified.

It is worth noting that while specific blocks are used in the figures,and a particular ordering of blocks has been illustrated, these arenon-limiting examples. In certain contexts, two or more blocks may becombined, a block may be split into two or more blocks, or certainblocks may be re-ordered or re-organized as appropriate, as the explicitillustrated examples are used only for descriptive purposes and are notto be construed as limiting.

As used herein, the singular “a” and “an” may be construed as includingthe plural “one or more” unless clearly indicated otherwise.

This disclosure has been presented for purposes of illustration anddescription but is not intended to be exhaustive or limiting. Manymodifications and variations will be apparent to those of ordinary skillin the art. The example embodiments were chosen and described in orderto explain principles and practical application, and to enable others ofordinary skill in the art to understand the disclosure for variousembodiments with various modifications as are suited to the particularuse contemplated.

Thus, although illustrative example embodiments have been describedherein with reference to the accompanying figures, it is to beunderstood that this description is not limiting and that various otherchanges and modifications may be affected therein by one skilled in theart without departing from the scope or spirit of the disclosure.

What is claimed is:
 1. A method, the method comprising: detecting, usinga notification extension system, an incoming communication request on aninformation handling device; identifying, using the notificationextension system, an environmental context of a user with respect to theinformation handling device; determining, using the notificationextension system and based upon the environmental context of the user,the user is unable to answer the incoming communication request within adefault communication request notification length; and extending, usingthe notification extension system, based upon the environmental contextof the user, and responsive to determining the user is unable to answerthe incoming communication request, a length of the communicationrequest notification.
 2. The method of claim 1, wherein the identifyingan environmental context of the user comprises identifying, using one ormore sensors, a location of the user within the environment with respectto the information handling device.
 3. The method of claim 1, whereinthe identifying an environmental context of the user compriseidentifying, utilizing one or more sensors, an activity of the userwithin the environment.
 4. The method of claim 1, wherein a length ofthe extension of the communication request notification is different fordifferent environmental contexts of the user.
 5. The method of claim 1,wherein a length of the extension of the communication requestnotification is different for different communication typescorresponding to the incoming communication request.
 6. The method ofclaim 1, wherein a length of the extension of the communication requestnotification is unique to the user.
 7. The method of claim 1, furthercomprising providing a notification to a user sending the incomingcommunication request that the length of the notification has beenextended.
 8. The method of claim 1, wherein the determining comprisesutilizing a machine-learning model to determine that the user will beunable to answer the incoming communication request within the defaultcommunication request notification length.
 9. The method of claim 8,wherein the machine-learning model identifies a length of the extensionof the communication request notification.
 10. The method of claim 1,wherein the incoming communication request comprises a communicationrequest through a communication application installed on the informationhandling device.
 11. An information handling device, the informationhandling device comprising: a processor; a memory device that storesinstructions that, when executed by the processor, causes theinformation handling device to: detect, using a notification extensionsystem, an incoming communication request on the information handlingdevice; identify, using the notification extension system, anenvironmental context of a user with respect to the information handlingdevice; determine, using the notification extension system and basedupon the environmental context of the user, the user is unable to answerthe incoming communication request within a default communicationrequest notification length; and extend, using the notificationextension system, based upon the environmental context of the user, andresponsive to determining the user is unable to answer the incomingcommunication request, a length of the communication requestnotification.
 12. The information handling device of claim 11, whereinthe identifying an environmental context of the user comprisesidentifying, using one or more sensors, a location of the user withinthe environment with respect to the information handling device.
 13. Theinformation handling device of claim 11, wherein the identifying anenvironmental context of the user comprise identifying, utilizing one ormore sensors, an activity of the user within the environment.
 14. Theinformation handling device of claim 11, wherein a length of theextension of the communication request notification is different fordifferent environmental contexts of the user.
 15. The informationhandling device of claim 11, wherein a length of the extension of thecommunication request notification is different for differentcommunication types corresponding to the incoming communication request.16. The information handling device of claim 11, wherein a length of theextension of the communication request notification is unique to theuser.
 17. The information handling device of claim 11, furthercomprising providing a notification to a user sending the incomingcommunication request that the length of the notification has beenextended.
 18. The information handling device of claim 11, wherein thedetermining comprises utilizing a machine-learning model to determinethat the user will be unable to answer the incoming communicationrequest within the default communication request notification length;and wherein the machine-learning model identifies a length of theextension of the communication request notification.
 19. The informationhandling device of claim 11, wherein the incoming communication requestcomprises a communication request through a communication applicationinstalled on the information handling device.
 20. A product, the productcomprising: a computer-readable storage device that stores executablecode that, when executed by a processor, causes the product to: detect,using a notification extension system, an incoming communication requeston the information handling device; identify, using the notificationextension system, an environmental context of a user with respect to theinformation handling device; determine, using the notification extensionsystem and based upon the environmental context of the user, the user isunable to answer the incoming communication request within a defaultcommunication request notification length; and extend, using thenotification extension system, based upon the environmental context ofthe user, and responsive to determining the user is unable to answer theincoming communication request, a length of the communication requestnotification.