Abstract:
One or more implementations can include methods, systems and computer readable media for multi-threaded multipath processing. In some implementations, the method can include determining that a next hop for a destination includes a first next hop and a second next hop. The method can also include generating a first packet having a first destination address based on a nickname of a remote switch and on an identifier of a first path. The method can further include generating a second packet having a second destination address based on the nickname of the remote switch and on an identifier of a second path.
Abstract:
One or more implementations can include methods, systems and computer readable media for elastic wireless control planes. In some implementations, the method can include evaluating one or more elastic wireless control plane mode factors, and partitioning each of a plurality of access points into one of an active mode group and a sleep mode group based on the evaluating. The method can also include determining a number of wireless control plane instances needed based on the partitioning. The method can further include activating the number of wireless control plane instances and shutting down any excess wireless control plane instances beyond the number.
Abstract:
A system for automated routing or work requests is provided. Particularly, a system for routing work requests in a distributed computing system to minimize an energy cost associated with operating the system is provided. A resource utilization module configured to receive resource utilization information; the resource utilization information including indications of utilization corresponding to a plurality of computing resources is disclosed. Furthermore, an energy consumption module configured to receive energy consumption information; the energy consumption information including indications of energy consumption corresponding to the plurality of computing resources is disclosed. Additionally, a routing module configured to route a work request to one of the plurality of computing resources based at least in part on the received utilization information and the received energy consumption information to minimize energy costs of the plurality of computing resources is disclosed.
Abstract:
The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification.
Abstract:
A first communication session is created with a first application written in first language. A change is detected in first variables in the first application. The first variables are retrieved from the first application in response to detecting a change in the first variables. The first communication session is transferred to a second application written in a second language. A change is detected in a second variable in the second application. The second variable is retrieved from the second application in response to detecting the change in the second variable. A common pair of variables are matched between the first variables and the second variable. The first communication session and the transferred first communication session are associated as a common communication session in response to matching the common pair of variables. One or more of the first plurality of variables is then used by the second application.
Abstract:
Providing origin insight via Session Traversal Utilities for Network Address Translation (STUN) messages for web applications, and related methods, systems, and computer-readable media are disclosed herein. In one embodiment, a method for providing origin insight for web applications via STUN messages comprises determining an origin identifier for a web application attempting to send a STUN message to a STUN server; generating the STUN message incorporating the origin identifier for the web application; and transmitting the STUN message to the STUN server. In another embodiment, a method for providing STUN services to web applications comprises receiving a STUN message from a web client, and extracting an origin identifier for a web application. Provision of a STUN service to the web application is determined based on the origin identifier. If the STUN service should not be provided, the STUN message is rejected or disregarded; otherwise the STUN message is processed.
Abstract:
A contact center system can receive messages from consumers. The system can then interact with the consumer or customer using a dialog. Before conducting the session with the consumer, past interactions using the dialog are reviewed to determine words, phrases, and other information that caused the dialog to be successful. The information is stored as norms. Upon beginning a new interaction with the dialog, the norms and the past successful dialogs are retrieved and compared to the active dialog while the interaction is on-going. The comparison is then used to ensure that the present active dialog will lead to a successful outcome or to resolve any issued if the outcome is not likely to be successful.
Abstract:
Disclosed herein are systems, methods, and computer-readable storage media for identifying and remediating risky source files. An example system configured to practice the method can gather data describing each file in a source code repository, and generate, using a weighted algorithm based on empirical relationships between the data and customer-found defects, a risk score for each file in the source code repository, wherein the weighted algorithm prioritizes factors based on predictiveness of defects. Then the system can generate a list of files having risk scores above a threshold, and make risk-mitigation recommendations based on the risk scores. A file can include a single file or a collection of files such as a module. The system can identify, for each file in the list of files having risk scores above the threshold, a respective risk type, and make the risk-mitigation recommendation for each file based on the respective risk type.
Abstract:
Embodiments generally relate to enabling configuration in networks. In one embodiment, a method includes receiving a message from an edge configuration device, wherein the message contains shortest path bridging (SPB) configuration information. The method also includes performing an intermediate system-to-intermediate system (IS-IS) configuration in response to receiving the message.
Abstract:
Techniques to dynamically generate real time frequently asked questions from forum data are described. In one embodiment, for example, an apparatus may comprise a preprocessor, a validator, a data module, and a list regenerator. The preprocessor may be operative to receive a user entry to a forum and to generate a processed entry. The validator may be operative to receive the processed entry, to receive an accuracy rating for the processed entry from a data module, and to forward the processed entry for inclusion in an existing frequently-asked-questions (FAQ) list based on the accuracy rating and rules. The data module may be operative to receive the processed entry and to determine the accuracy rating of the processed entry. The list regenerator may be operative to receive the processed entry and to regenerate the existing FAQ list into an updated FAQ list including the processed entry. Other embodiments are described and claimed.