摘要:
Systems, methods, and machine-readable media are disclosed for providing customization to routing of messages in a system where routing is based on stored addresses, such as, for example, a Session Initiation Protocol (SIP) system. In one embodiment, a method of providing customized routing of messages can comprise receiving a message to a target endpoint at a system for signaling between endpoints. The system can have one or more stored addresses (Target SIP URIs) for each of a plurality of endpoints. One or more target Sip URIs for the target endpoint can be determined from the stored target SIP URIs. One or more policies can be applied to the one or more target SIP URIs for the target endpoint. The one or more policies can comprise a set of one or more conditions and one or more actions associated with each condition.
摘要:
Policies can combine the efficiency of rule sets with the flexible expression power of workflow engines, as well as advantages of other programming languages and engines. Consistent modelling of policy rules is provided across different levels, such as network, control, and service levels. In one system, a policy module can orchestrate rule set and workflow engines in order to evaluate different conditions of a policy. In another embodiment, a hybrid language can be used that allows rule set and other variables to be used in a business process container, workflow and other variables to be used in a rule set container, rule set and business process variables to be used in other containers. In this way, a subset of conditions in a policy can be evaluated using multiple languages and/or engines in order to enforce or evaluate a policy.
摘要:
Systems, methods, and machine-readable media are disclosed for using past presence information to help determine a current presence of a user. In one embodiment, determining presence of a user on one or more devices or networks can comprise periodically querying a plurality of devices to determine a presence of the user on one or more of the plurality of devices. An indication of the presence of the user on the one or more of the plurality of devices can be received and presence information related to the indication of the presence of the user on the one or more devices can be stored. A request for a presence of the user can be received and, in response, the stored presence information can be retrieved. The stored presence information and, in some cases, current presence information can be provided in response to the request for the presence of the user.
摘要:
Techniques for providing services to a mobile device not offered on the device are provided. The techniques include intercepting a message from a mobile device at a server. It is then determined if a service should be performed, where the service is not offered on the mobile device. A confirmation message is sent to the mobile device requesting confirmation that the service should be performed. The message is sent in a channel that the mobile device can communicate through. If a reply message is received from the mobile device, it is determined if an action should taken based on the reply message. For example, a confirmation message may ask if the service should be performed and if the answer is yes, the service is then performed.
摘要:
A folder or file on the first computing device to be synchronized with a second, portable computing device is selected by a first icon corresponding to the folder or file being dragged and dropped to overlap with a second icon corresponding to data management software running on the first computing device. Both the first icon and the second icon are displayed on the user interface provided by the data management software. A folder or file on the second computing device to be synchronized with the first computing device is located at a predetermined location in the second computing device for synchronization with the first computing device. The selected folder or file is partitioned into a plurality of segments. The synchronization of the selected folder or file is performed in terms of these segments while maintaining a count of the number of segments that were synchronized.
摘要:
Systems, methods, and devices for secure communications across multiple protocols are disclosed. In one embodiment, the method comprises receiving, at an access device, an encryption key. The access device analyzes the communication to determine a portion of the communication to be encrypted and to determine an additional portion of the communication to remain unencrypted by the first encryption process. The method further comprises encrypting the portion of the communication using the first encryption process and the encryption key, and transmitting the communication from the access device.
摘要:
Application development tools and method for building multi-channel, multi-device and multi-modal applications, and in particular, to systems and methods for developing applications whereby a user can interact in parallel with the same information via a multiplicity of channels and user interfaces, while a unified, synchronized views of the information are presented across the various channels or devices deployed by the user to interact with the information. In a preferred embodiment, application frameworks and development tools are preferably based on a MVC (Model-View-Controller) design paradigm that is adapted to provide synchronized multi-modal interactions. Multi-channel authoring can be developed using a similar methodology.
摘要:
A system for enforcing an execution policy associated with a responder includes a framework configured to enforce the execution policy of a target responder in response to a request from a requester, wherein the framework is configured to intercept a request to the target responder, wherein the framework is configured to call at least one supporting finction specified by the execution policy, and wherein the framework is configured to pass the request to the target responder after the call to the one supporting function is successful.
摘要:
An intelligent use-friendly keyboard interface that is easily adaptable for wide variety of functions and features, and also adaptable to reduced size portable computers. Speech recognition and semantic processing for controlling and interpreting multiple symbols are used in conjunction with programmable switches with embedded LCD displays. Hidden Markov models are employed to interpret a combination of voice and keyboard input.
摘要:
A technique includes providing a service blueprint associated with a multitenant service to manage the lifecycle of a set of at least one existing cloud service. The blueprint is associated with recipes to orchestrate application programming interfaces to manage the lifecycle.