摘要:
An approach is provided for enabling the accounting of closures to support query requests established by a device. A computation processing and accounting infrastructure determines one or more closures based, at least in part, on a query request. One of the one or more closures based, at least in part, on one or more predetermined policies is selected to generate a response to the query.
摘要:
An approach is provided for enabling the accounting of closures to support query requests established by a device. A computation processing and accounting infrastructure determines one or more closures based, at least in part, on a query request. One of the one or more closures based, at least in part, on one or more predetermined policies is selected to generate a response to the query.
摘要:
An approach for enabling advertising content to be processed for use in connection with an application based on one or more policies is described. An advertising component determines one or more user interface state changes associated with one or more applications executing at a device. The advertising component then determines one or more policies for presenting advertisement information at the one or more applications, the device, or a combination thereof. Processing of the one or more policies is then performed to determine advertisement information for presentation at the one or more applications, the device, or a combination thereof based, at least in part, on the one or more user interface state changes.
摘要:
An approach is provided for integrating applications on demand to display and manipulate a semantic resource. An integrating application causes, at least in part, reception of a request for a semantic resource, and determines whether the semantic resource is known to a first application. The integrating application discovers one or more properties of the semantic resource based, at least in part, on the determination. The integrating application identifies a second application associated with the semantic resource based, at least in part, on the one or more properties. The integrating application causes, at least in part, presentation of the semantic resource through the second application.
摘要:
An approach is provided for integrating applications on demand to display and manipulate a semantic resource. An integrating application causes, at least in part, reception of a request for a semantic resource, and determines whether the semantic resource is known to a first application. The integrating application discovers one or more properties of the semantic resource based, at least in part, on the determination. The integrating application identifies a second application associated with the semantic resource based, at least in part, on the one or more properties. The integrating application causes, at least in part, presentation of the semantic resource through the second application.
摘要:
In an instant messaging system, message latency is reduced by initiating traffic channel set-up at a receiving device concurrently while a sending device is generating the instant message. When a user begins generating an instant message, the sending device transmits a service request to a payload and connection server to indicate that an instant message is pending. Upon receipt of the service request, the payload and connection server notifies the receiving device so that the receiving device can initiate traffic channel set-up concurrently while the instant message is being recorded. When the traffic channel is established, the receiving device polls the server. If the instant message is not yet received by the payload and connection server when the polling request is received, the payload and connection server waits a predetermined period of time to receive the pending instant message and forwards the instant message when it is received.
摘要:
A method for concealing and revealing sensitive data on an electronic communications device is disclosed. The electronic communications device comprises a plurality of keys, a display upon which a series of characters are adapted to be displayed, the series of characters forming a character string and composed by input operation of a subset of the plurality of Keys, and a processor for implementing at least one module that includes at least one security component. The module i) receives the series of characters during an entry period, the series of characters forming a character string, the entry period comprised of at least one activity period during which the character string is displayed and one inactivity period during which the character string is obscured, ii) detects an inactivity event during the at least one activity period, the activity period ending when the inactivity event has been detected and iii) detects an activity event during the at least one inactivity period, the inactivity period ending when the activity event has been detected. The module may also iv) detect a completion of composition event, the entry period ending when the composition completion event has been detected and v) conceal permanently the character string after the entry period ends.
摘要:
An approach is provided for managing resources. One or more policy rules for managing one or more resources of an application executing at a device are determined. The one or more policy rules are determined to be applied for selecting the one or more resources from among a set of resources.
摘要:
A computing system, method and product comprising a server, a mobile device comprising a client interconnected with the server via a data network, the client identified by a credential which is unavailable to the client and an intermediate node interconnected to the client and the server via the data network wherein the credential is available to the intermediate node. Upon reception of a service request from the client at a first server address the server redirects the client to transmit the service request to a second server address via the intermediate node together with a token, wherein the intermediate node appends a credential identifying the client to the redirected service request and the token and relays the redirected service request, the token and the credential to the second server address.
摘要:
An approach is presented for facilitating automated processing of targeted (push) notification messages for integration with notification recipients of different type and function. A universal notification platform receives data for identifying one or more notification recipients, one or more attributes of the one or more notification recipients, or a combination thereof. It then processes the data along with one or more other attributes pertaining to one or more service providers of the notification recipients in order to determine one or more rules for specifying routing of one or more notification messages to the one or more notification recipients by one or more information sources.