摘要:
Techniques for dynamically adjusting volume during a call are provided. A gateway is provided that allows a call between a first device and a second device. The call may be routed through a first network and a second network. The first network may be PSTN network and the second network may be a VOIP network. An indication may be received at the gateway that indicates a call characteristic should be adjusted for the call. For example, the indication may indicate the volume or echo should be adjusted. The gateway may then adjust the volume or eliminate echo during the call based on the indication. The adjustment is affected during the call at the first device and the second device. For example, the gateway may dynamically adjust the gain for the call resulting in a change in the call characteristic.
摘要:
In one embodiment, a method of allowing a user to roam from one wireless network and interact with an Internet-based application is disclosed. The method comprises establishing a connection between a wireless mobile device and a first wireless network, wherein the connection allows the wireless mobile device to interact with an Internet-based application; tracking a state of interaction between the wireless mobile device and the Internet-based application; terminating the connection between the wireless mobile device and the first wireless network; establishing a connection between the wireless mobile device and a second wireless network; and sending, to the Internet-based application, data representing a state of interaction of the wireless mobile device with the Internet-based application prior to terminating the connection between the wireless mobile device and the first wireless network.
摘要:
Techniques for determining a status of a streaming delivery of content are provided. During the streaming delivery of content between a device and a content provider, commands may be sent between the device and a content provider in order to facilitate the delivery of content. These commands may be intercepted by a command interpreter. The commands are then analyzed to determine a delivery status for the streaming delivery of content. For example, the sequence of commands may provide an indication as to whether the streaming delivery of content was successful or not. Based on the commands, the command interpreter determines if the streaming delivery of content should be considered successful from a billing standpoint. For example, a user that requested the streaming delivery of content may be billed based on whether the streaming delivery of content is considered successful or not.
摘要:
Device agents and methods are disclosed. In one embodiment, the method comprises monitoring, at an access device, at least a subset of device activity. The method further comprises detecting an activity satisfies at least one condition specified by a policy and executing at least one action in the policy associated with the satisfied condition.
摘要:
A technique includes providing a service blueprint associated with a multitenant service to manage the lifecycle of a set of at least one existing cloud service. The blueprint is associated with recipes to orchestrate application programming interfaces to manage the lifecycle.
摘要:
A system (100) includes an application model (140) to characterize a given application (110) for deployment on a cloud (130). A deployment manager (120) analyzes an application requirement for the given application (110) based on the application model (140) and policies (150) associated with the given application (110) to substantially match infrastructure resources (160) in the cloud (130) to fulfill the application requirement. A test manager (170) is employed to configure and launch a test suite of application deployments for the given application (110) via the deployment manager (120).
摘要:
A computer system that attempts to establish an alternative network link upon failing to establish a requested network link is described. The computer system may encounter conditions where access to numerous networks, in particular wireless networks, is not available. Rather than only providing an error message to the user upon a failed attempt to establish the requested network link, the computer system determines whether the user has designated an alternative network link in case the requested network link cannot be established, whereas the alternative network link is selected from the plurality of network links that the computer system is configured to support. If an alternative network link has been designated, the computer system attempts to establish the alternative network link. Hence, the user experience is made smooth and uneventful when the requested network link cannot be established.
摘要:
A computer system that attempts to establish an alternative network link upon failing to establish a requested network link is described. The computer system may encounter conditions where access to numerous networks, in particular wireless networks, is not available. Rather than only providing an error message to the user upon a failed attempt to establish the requested network link, the computer system determines whether the user has designated an alternative network link in case the requested network link cannot be established, whereas the alternative network link is selected from the plurality of network links that the computer system is configured to support. If an alternative network link has been designated, the computer system attempts to establish the alternative network link. Hence, the user experience is made smooth and uneventful when the requested network link cannot be established.
摘要:
A computer system that attempts to establish an alternative network link upon failing to establish a requested network link is described. The computer system may encounter conditions where access to numerous networks, in particular wireless networks, is not available. Rather than only providing an error message to the user upon a failed attempt to establish the requested network link, the computer system determines whether the user has designated an alternative network link in case the requested network link cannot be established, whereas the alternative network link is selected from the plurality of network links that the computer system is configured to support. If an alternative network link has been designated, the computer system attempts to establish the alternative network link. Hence, the user experience is made smooth and uneventful when the requested network link cannot be established.
摘要:
An identity management tool provides identity management across multiple domains, providing a single access point not only for information for runtime, network, and service layer information, but also for systems such as business support systems (BSS), operational support systems (OSS), and third party systems. The identity management tool creates a unified user profile that maps customer identities across the various domains, and presents the information in a virtual directory wherein the information appears to come from a single source, creating a central data hub for the various systems. This aggregation provides for the same experience and service across various access networks and using various channels. Such an architecture allows billing and service information to be shared with subscription and customer information, even though the data is substantially unrelated data from disparate data sources, without the need to combine schemas or aggregate the data into a single data store.