摘要:
A conference call management method and system. The method includes receiving by a computer processor from a conference call administrator, a command for enabling a first conference call. The computer processor enables the first conference call thereby allowing telecommunications between the conference call administrator and a first participant. The computer processor locks the first conference call such that additional participants are unable to access the first conference call. The computer processor receives from a second participant, a conference call request for accessing a second conference call and routes the second participant to a virtual holding area. The computer processor enables the second conference call and routes the second participant from the virtual holding area to the second conference call.
摘要:
The present invention provides a system and method for disabling an electrical device (e.g., that utilizes a data networking protocol such as 802.1X). Specifically, under the present invention, the electrical device is connected to a power socket of a power delivery network via a power bar. When disablement of a particular device is desired, the device is located by an authentication server (that communicates with the power bar over the power delivery network) using information stored in a devices information database. Once the particular device is located, an instruction to disable it is sent from the authentication server to a component, which then disables the device via the power bar.
摘要:
Embodiments of the present invention provide a solution to optimize data transfer between a mobile device and a cloud storage provider. Specifically, embodiments of the present invention may select one or more files for transfer from the mobile device to a cloud storage device based on an analysis of a set (at least one) of factors such as: (1) the percentage of local storage being consumed on the mobile device; (2) the mobile device's billing plan, and whether file transfer will cause the billing plan to be exceeded; (3) a capacity of a link between the mobile device and the cloud storage provider; (4) dates of last access for files stored on the mobile device; and/or (5) a battery power remaining in the mobile device (if applicable). Any files selected based on an analysis of these factors can be transferred via the link and deleted from the mobile device. Typically, a file is a candidate for transfer if it has not been accessed recently (e.g., within a certain time period), the link and billing plan can accommodate the transfer of the file (e.g., determined based on the size of the file), and there is sufficient power to make the file transfer.
摘要:
An additional session is established for voice over internet protocol communication between a pair of endpoints in a network, wherein a current session is already established between the endpoints and is currently used for data packet communication between endpoints. Qualities of each of the sessions for voice over internet protocol communication are assessed and compared, and the endpoints signaled to select the session having the higher assessed quality as a current session for further data packet communication between the endpoints, and to remove the lower quality session from use as a session for the further data packet communication between the endpoints, or to use the lower quality session as a secondary session for data communication between the endpoints. More particularly, the assessed qualities of each of the current and additional sessions meet a basic requirement defined to provide voice over internet protocol data packet communication between the endpoints.
摘要:
Embodiments of the present invention relate to an approach for reconfiguring interrelationships between components of virtual computing networks (e.g., a grid computing network, a local area network (LAN), a cloud computing network, etc.). In a typical embodiment, a set of information pertaining to a set of components associated with a virtual computing network is received in a computer memory medium or the like. Based on the set of information, a graphical representation (e.g., hierarchical tree) depicting the set of interrelationships between the set of components is generated. When a failure in the virtual computing network is detected, at least one of the set of interrelationships between the set of components is reconfigured based on the graphical representation and the set of rules to address the failure.
摘要:
A conference call management method and system. The method includes receiving by a computer processor from a conference call administrator, a command for enabling a first conference call. The computer processor enables the first conference call thereby allowing telecommunications between the conference call administrator and a first participant. The computer processor locks the first conference call such that additional participants are unable to access the first conference call. The computer processor receives from a second participant, a conference call request for accessing a second conference call and routes the second participant to a virtual holding area. The computer processor enables the second conference call and routes the second participant from the virtual holding area to the second conference call.
摘要:
An embodiment of the invention provides a method for controlling computing resources using visual positioning on a graphical user interface. More specifically, a computer resource is displayed as a symbol and applications are displayed as objects on the graphical user interface. Input is received from a user, wherein the input includes movement of the symbol and/or movement of at least one of the objects on the graphical user interface. The computer resource is allocated with a processor based on the input. This includes allocating more of the computer resource to a first application and less of the computer resource to a second application when the distance between the symbol and a first object representing the first application is reduced, and when the distance between the symbol and a second object representing the second application is increased.
摘要:
A method and system for controlling access to a resource. Visual representations of the resource and an entity are included in a display. Assignments of an access control requirement to the resource visual representation and an attribute to the entity visual representation are received. A movement in the display of the entity visual representation to a position proximate to a boundary of the resource visual representation is detected. The attribute assigned to the entity visual representation is determined to satisfy the access control requirement assigned to the resource visual representation. The entity is permitted to access the resource based on the attribute satisfying the access control requirement. A movement in the display of the entity visual representation across the boundary and a placement of the entity visual representation within the boundary of the resource visual representation are permitted based on the entity being permitted to access the resource.
摘要:
Disclosed are a method, system and computer program product for managing unintentional disconnection of a communication device. A system detects a first device to a transmission has been unintentionally disconnected from an ongoing communication with a second communication device. The connected second device is signaled regarding the disconnection. Recording of a disconnection voicemail message for the disconnected first communication device is enabled before disconnecting the second communication device. The second device may set an expiration time on the disconnection voicemail message. Upon resumption of service, the disconnected first device is informed of a new voicemail message left by the second device during the disconnection. A disconnection-specific voicemail greeting may be recorded by a user of the disconnected first device's system for use when a disconnection occurs. The disconnection-specific voicemail greeting is played to the connected second device when disconnection occurs.
摘要:
A utility within a mobile device or other device computes and provides an optimal mobile coverage route. The device receives a stating point/location and a destination point/location. The mobile device downloads a provider's mobile coverage information, accesses historical data stored by the mobile device, and obtains user feedback from the provider. The optimal mobile coverage route is then computed at the device, and the optimal mobile coverage route is provided via one of the following: a web site, or a text message (SMS) to, a voice operated feed, or any direct feed to the user of the mobile device. The computed optimal mobile coverage route is then used by the user of the mobile device when communicating with another mobile device while travelling from the starting point to the end point.