Abstract:
A system and method are disclosed for facilitating a custom ring in connection with a call. A ring tone delivery system may include an interface operable to receive a calling signal that indicates a request to place a call from a calling party to a communication device of a called party. The system may also include a network node communicatively coupled to the interface. The network node may be operable to determine whether the calling party is able to use a calling party selected ring tone. The network node may also be operable to determine whether the communication device will accept the calling party selected ring tone. The network node sends the calling party selected ring tone to the communication device when the calling party is able to use the calling party selected ring tone and when the communication device will accept the calling party selected ring tone.
Abstract:
Exemplary embodiments relate to methods, systems, and computer program products for providing quality of service brokering in a network. Methods include receiving a data packet at a router in an Internet protocol (IP) network. The data packet includes a data packet QoS class and a data packet destination. A storage mechanism that includes possible routes to the data packet destination at the data packet QoS class is accessed. One of the possible routes is selected. The data packet is transmitted along the selected route to the data packet destination.
Abstract:
Aspects of the subject disclosure may include, for example, identifying a first user associated with a first mobile device, and determining a first user type associated with the first user. Further embodiments can include identifying a first identity associated with the first user based on the first user type and identifying a second identity associated with the first user based on the first user type. Additional embodiments can include providing first alternate content to the first mobile device to mask the first identity and providing second alternate content to the first mobile device associated with the second identity. Other embodiments are disclosed.
Abstract:
Concepts and technologies are disclosed herein for decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment. A computer system includes a processor that can execute computer-executable instructions to perform various operations. The processor can perform operations to provide security services to one or more customer platforms. The operations can include receiving a network security software component from a security service provider, and deploying the network security software component within a distributed computing environment so that the network security software component can be executed by a computing resource of the distributed computing environment to provide a security service to the customer platform(s). The network security software component includes a software component that has been decoupled from a hardware component of a network security device by the security service provider.
Abstract:
A method for transferring content includes requesting the content from a serving peer and sending the content to a requesting peer. Requesting the content includes sending a request to a tracker, receiving a request token, a path identifier, and a first peer identifier from the tracker, and sending a request message to a second peer. The first peer identifier includes an identity of a first peer, and the request message includes the request token, the path identifier, and the first peer identifier. Sending the content includes receiving the request token and the path identifier from a third peer, sending a return message to a fourth peer, and transferring the content from the serving peer to the requesting peer through a transfer path. The return message includes the path identifier and a second peer identifier. The second peer identifier includes an identity of a fifth peer. The transfer path includes at least the second, fourth, and fifth peers.
Abstract:
A method includes receiving demand information for a first segment of a media content item and receiving demand information for a second segment of the media content item. The method includes assigning the first segment to a first set of distribution nodes of a media content distribution system based at least partially on the demand information for the first segment and based at least partially on a first cost function and assigning the second segment to a second set of distribution nodes of the media content distribution system based at least partially on the demand information for the second segment and based at least partially on a second cost function. The media content distribution system includes a plurality of distribution nodes and each distribution node is configured to provide media content items to at least some of a plurality of endpoints.
Abstract:
A system and method disclosed for using and updating a database of template responses for a live agent in response to user communications. The method includes computing an average string distance between each response from a live agent and a template, use to generate the response, modifying the computed average string distance based on a customer satisfaction score associated with each response and selecting a response that minimizes the computed average string distance and maximizes customer satisfaction. Upon receiving a further communication on a certain issue, the system presents a prototype response that has been added to the template database to the live agent for use in generating a response to the further communication that reduces handling time and increases customer satisfaction.
Abstract:
Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for generating personalized user models. The method includes receiving automatic speech recognition (ASR) output of speech interactions with a user, receiving an ASR transcription error model characterizing how ASR transcription errors are made, generating guesses of a true transcription and a user model via an expectation maximization (EM) algorithm based on the error model and the respective ASR output where the guesses will converge to a personalized user model which maximizes the likelihood of the ASR output. The ASR output can be unlabeled. The method can include casting speech interactions as a dynamic Bayesian network with four variables: (s), (u), (r), (m), and encoding relationships between (s), (u), (r), (m) as conditional probability tables. At each dialog turn (r) and (m) are known and (s) and (u) are hidden.
Abstract:
Disclosed herein are systems, computer-implemented methods, and computer-readable media for sampling network traffic. The method includes receiving a plurality of flow records, calculating a hash for each flow record based on one or more invariant part of a respective flow, generating a quasi-random number from the calculated hash for each respective flow record, and sampling flow records having a quasi-random number below a probability P. Invariant parts of flow records include destination IP address, source IP address, TCP/UDP port numbers, TCP flags, and network protocol. A plurality of routers can uniformly calculate hashes for flow records. Each router in a plurality of routers can generate a same quasi-random number for each respective flow record and uses different values for probability P. The probability P can depend on a flow size. The method can divide the quasi-random number by a maximum possible hash value.
Abstract:
Exemplary embodiments of the invention include methods, systems, and storage mediums for optimizing a device. The method includes detecting a suboptimal condition associated with the device and analyzing the suboptimal condition in light of selected operator preferences and device-related data. In response to the analysis, the method includes modifying a configuration of the device, the current state of said device, a current state of a networked device associated with said device, or a configuration of a networked device associated with said device. Alternatively, in response to the analyzing, the method includes notifying the operator of the suboptimal condition. The selected operator preferences include at least one of personality settings, expert level settings, communications means settings, intrusion level settings, and reactive/predictive settings.