摘要:
An approach is provided for managing digital video recorders. One or more parameters related to a digital video recorder are retrieved. A configuration message is generated, at a set-top box, for transmission over a data network to a data repository. The set-top box is coupled to the digital video recorder. The configuration message specifies the one or more parameters.
摘要:
An approach is presented for providing the authorized transfer of a mobile device. A platform receives a request to modify ownership status information for a mobile device, and generates in response to the request, a sale identifier based on the ownership status, wherein the sale identifier provides verification that the mobile device can be subject to a transfer of ownership, and specifies device information associated with the mobile device.
摘要:
A device may perform audio signal collision detection configured to receive first audio information from a first device and receive second audio information from a second device over a communications network. The device may be further configured to identify a collision of the first audio information and the second audio information, and to address the collision by adjusting at least one of an audio attenuation level and a communications latency of the second audio information responsive to identification of the collision, and store the operational parameters to an adjustment profile system.
摘要:
A method includes receiving a communication from a management domain associated with managing a cellular communication network. The method also includes determining whether the communication corresponds to a polling signal from the management domain, and generating a first ping for transmission to a data center associated with managing virtual private networks (VPNs) in the cellular network in response to determining that the received signal corresponds to the polling signal. The method may further include generating a second ping for transmission via an encrypted path in the cellular communication network in response to determining that the received signal corresponds to the polling signal and that data is ready to be transmitted via the encrypted path. The first ping and the second ping may be used to ensure that cellular connections through the cellular communication network are operating properly.
摘要:
A network may include a first customer edge (CE) router and a second CE router. The first CE router may run an external border gateway protocol (EBGP) to exchange routing information with a first provider edge (PE) router that is in a first multi-protocol label switching (MPLS) network and may run an interior gateway protocol (IGP) to exchange routing information with the second CE router. The second CE router may run the IGP to exchange routing information with the first CE router and may run the EBGP to exchange routing information with a second PE router in a second MPLS network.
摘要:
A network may include a first customer edge (CE) router and a second CE router. The first CE router may run an external border gateway protocol (EBGP) to exchange routing information with a first provider edge (PE) router that is in a first multi-protocol label switching (MPLS) network and may run an interior gateway protocol (IGP) to exchange routing information with the second CE router. The second CE router may run the IGP to exchange routing information with the first CE router and may run the EBGP to exchange routing information with a second PE router in a second MPLS network.
摘要:
A network device receives, from a first mobile communication device via a cellular network, a message to attempt initiate the set-up of data transfer via a local wireless connectivity method. The network device determines a proximity within the cellular network of the first mobile communication device with respect to a second mobile communication device that is the target of the data transfer, and determines a geographic proximity of the first mobile communication device with respect to the second mobile communication device. The network device remotely enables, from the network device, the first mobile communication device and the second mobile communication device to transfer data between them via the local wireless connectivity method instead of via the cellular network based on the determined network proximity or geographic proximity.
摘要:
An approach for providing cloud-based profile access is described. A profile platform receives, at a cloud-based service platform, a request for a device profile from a mobile device, wherein the device profile specifies information relating to configuration of a graphical user interface and one or more applications associated with the mobile device, determines context data for the mobile device, selects one of a plurality of device profiles based on the determined context data, and generates a control message specifying the selected device profile for configuring the mobile device.
摘要:
An approach for providing notifications to caregivers based on the detected presence of a child in a car seat is described. Physical presence of an object within a car seat is detected. A determination is made that a proximity threshold between a mobile device and the car seat is satisfied based on the presence information, range information associated with the mobile device, or a combination thereof. A notification message is generated in response to the detected physical presence of the object to indicate the presence of the object in the car seat based on the determination. Initiation of the transmission of the notification message to a mobile device within a predetermined proximity of the car seat is performed.
摘要:
A method includes receiving a communication from a management domain associated with managing a cellular communication network. The method also includes determining whether the communication corresponds to a polling signal from the management domain, and generating a first ping for transmission to a data center associated with managing virtual private networks (VPNs) in the cellular network in response to determining that the received signal corresponds to the polling signal. The method may further include generating a second ping for transmission via an encrypted path in the cellular communication network in response to determining that the received signal corresponds to the polling signal and that data is ready to be transmitted via the encrypted path. The first ping and the second ping may be used to ensure that cellular connections through the cellular communication network are operating properly.