摘要:
An n-ways conferencing system using only the participants' telephony devices and without an external conference server. A plurality of telephony devices dial in to and report their mixing capability to a connection topology manager. The connection topology manager also determines the location of each telephony device and neighboring telephony device pairs in the conference service, as each telephony device is used for mixing voice signals of its closest neighbors, and calculates a minimum conference traffic delay for each telephony device. The connection topology manager then builds a topology for the conference service based on the mixing capability, location, and minimum conference traffic delay, wherein the connection topology manager distributes a mixing computation in a substantially uniform manner across the plurality of telephony devices. When a change in the network condition is detected, the connection topology manager rebuilds the topology to bypass the change in the network condition.
摘要:
A voice-over-internet protocol (VoIP) caller verification method includes generating a challenge to be sent to a VoIP caller which needs a response from the VoIP caller prior to accepting a VoIP call, wherein the challenge includes a test pattern crafted to create a greater load at a spammer VoIP caller as compared to a human VoIP caller. A response or lack thereof is determined from the VoIP caller, and the response is analyzed relative to an acceptable response to determine whether the VoIP caller is acceptable to communicate with.
摘要:
A system and method for scalable status change detection in a network of nodes includes embedding node coordinate positions into a virtual map environment. A cluster of nodes are represented with a representative node to form a hierarchy of nodes and clusters where changes in a status of the representative node imply a status change in the nodes of the cluster. By selectively monitoring the representative nodes for the changes in status, the representative nodes create a capability for scalable monitoring of the network.
摘要:
There are provided methods and systems for authenticating a user. A method includes receiving a voice signature certificate corresponding to a setup portion of a Voice over Internet Protocol (VoIP) call. The VoIP call further has a voice conversation portion. The voice signature certificate includes a voice signature segment. The method further includes reproducing the voice signature segment to enable verification of voice continuity from the setup portion to the voice conversation portion. The verification is performing by comparing the voice signature segment to a user's voice during the voice conversation portion.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.
摘要:
A method of generating an annotated network topology of a network is described. The method includes; deriving a network topology by performing a route tracing utility between each pair of endpoints to determine the route taken by packets; initially annotating each network path with an initial value; determining the available bandwidth of a path connecting a pair of endpoints by performing Transfer Control Protocol (TCP) flows between the pair of endpoints; identifying a bottleneck link in the network path, and annotating all edges to generate an annotated network topology wherein available bandwidth annotation of links inside the network is determined using end-to-end network measurements.
摘要:
A method and system for measuring the learning ability and productivity of knowledge workers related to the delivery of services in service industry sectors, such as information technology (IT), healthcare and accounting. The method and system applies broadly to service domains that have a strong correlation between the learning ability and skill level of workers wherein the correlation affects the quality of service delivery. Utilizing data mining techniques, the method and system captures, analyzes and benchmarks individual knowledge worker's skill(s) in order to normalize individual service agent proficiencies. The normalized service agent proficiencies allows the relative learning and skill indices of the individual service agents to be determined such that the skills and learning abilities of individual service agents to be determined. The method and system allows best practices and training thresholds to be determined.
摘要:
A method is provided. The method includes the steps of: generating a model of an information technology process, wherein the process comprises a plurality of process steps and wherein the model identifies resources associated with the process; identifying dependencies on the resources for at least one process step or the plurality of process steps; perturbing the model; assessing an impact of the perturbation on the model; and reducing the impact of the perturbation on the model by utilizing at least one remedial action.
摘要:
An n-ways conferencing system using only the participants' telephony devices and without an external conference server. A plurality of telephony devices dial in to and report their mixing capability to a connection topology manager. The connection topology manager also determines the location of each telephony device and neighboring telephony device pairs in the conference service, as each telephony device is used for mixing voice signals of its closest neighbors, and calculates a minimum conference traffic delay for each telephony device. The connection topology manager then builds a topology for the conference service based on the mixing capability, location, and minimum conference traffic delay, wherein the connection topology manager distributes a mixing computation in a substantially uniform manner across the plurality of telephony devices. When a change in the network condition is detected, the connection topology manager rebuilds the topology to bypass the change in the network condition.
摘要:
An exemplary method for identifying process elements includes the steps of obtaining a plurality of relevant request-response pairs including request identifiers, mapping the request identifiers to corresponding artifacts, identifying actions based on the artifacts, and mapping the actions to process elements such that each given one of the process elements has an associated artifact