摘要:
An n-ways conferencing system using only the participants' telephony devices and without an external conference server. A plurality of telephony devices dial in to and report their mixing capability to a connection topology manager. The connection topology manager also determines the location of each telephony device and neighboring telephony device pairs in the conference service, as each telephony device is used for mixing voice signals of its closest neighbors, and calculates a minimum conference traffic delay for each telephony device. The connection topology manager then builds a topology for the conference service based on the mixing capability, location, and minimum conference traffic delay, wherein the connection topology manager distributes a mixing computation in a substantially uniform manner across the plurality of telephony devices. When a change in the network condition is detected, the connection topology manager rebuilds the topology to bypass the change in the network condition.
摘要:
A method and system for ensuring the authenticity of server returned information displayed at a client browser is provided. The method comprises receiving the server returned information at a client computer; storing a copy of the server returned information at the client computer; inspecting the server returned information for one or more locked objects; allowing the client browser to operate one or more client installed scripts; inspecting the server returned information for any modifications to the one or more locked objects; and in response to determining that the one or more client installed scripts have made modifications to the one or more locked objects, replacing the modified locked objects with unmodified versions of the locked objects from the stored copy of the server returned information.
摘要:
A framework is provided to offer composite voice applications and services. A composite application and service begins from the user dialing in via phone and ends by the user hanging up the phone. The composite interactive voice services architecture includes a session initiation protocol session service unit is in the loop of session signaling all the time starting from the time the user first dials in, during the user roaming across various voice servers, and until the end of the composite service when user hangs up the phone. This unit accepts a command and login instruction of the next interactive voice service from the previous interactive voice service. The unit has knowledge of DTMF sequences required for the user to login to next interactive voice service. The session service unit automatically accomplishes a roaming process such that composite applications and services can be achieved across various voice servers.
摘要:
An n-ways conferencing system using only the participants' telephony devices and without an external conference server. A plurality of telephony devices dial in to and report their mixing capability to a connection topology manager. The connection topology manager also determines the location of each telephony device and neighboring telephony device pairs in the conference service, as each telephony device is used for mixing voice signals of its closest neighbors, and calculates a minimum conference traffic delay for each telephony device. The connection topology manager then builds a topology for the conference service based on the mixing capability, location, and minimum conference traffic delay, wherein the connection topology manager distributes a mixing computation in a substantially uniform manner across the plurality of telephony devices. When a change in the network condition is detected, the connection topology manager rebuilds the topology to bypass the change in the network condition.
摘要:
A voice-over-internet protocol (VoIP) caller verification method includes generating a challenge to be sent to a VoIP caller which needs a response from the VoIP caller prior to accepting a VoIP call, wherein the challenge includes a test pattern crafted to create a greater load at a spammer VoIP caller as compared to a human VoIP caller. A response or lack thereof is determined from the VoIP caller, and the response is analyzed relative to an acceptable response to determine whether the VoIP caller is acceptable to communicate with.
摘要:
There are provided methods and systems for authenticating a user. A method includes receiving a voice signature certificate corresponding to a setup portion of a Voice over Internet Protocol (VoIP) call. The VoIP call further has a voice conversation portion. The voice signature certificate includes a voice signature segment. The method further includes reproducing the voice signature segment to enable verification of voice continuity from the setup portion to the voice conversation portion. The verification is performing by comparing the voice signature segment to a user's voice during the voice conversation portion.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.
摘要:
A plurality of equivalent representations of a process are identified. The process has a plurality of tasks. Each of the representations specifies a different order of the tasks. The plurality of equivalent representations are consolidated into a single representation. The single representation captures, in at least one flexible order grouping, at least two of the tasks that may be performed in more than one order. At least one constraint is specified for the at least one flexible order grouping. Techniques for merging two or more flexible representations are also provided.
摘要:
A method and system for measuring the learning ability and productivity of knowledge workers related to the delivery of services in service industry sectors, such as information technology (IT), healthcare and accounting. The method and system applies broadly to service domains that have a strong correlation between the learning ability and skill level of workers wherein the correlation affects the quality of service delivery. Utilizing data mining techniques, the method and system captures, analyzes and benchmarks individual knowledge worker's skill(s) in order to normalize individual service agent proficiencies. The normalized service agent proficiencies allows the relative learning and skill indices of the individual service agents to be determined such that the skills and learning abilities of individual service agents to be determined. The method and system allows best practices and training thresholds to be determined.
摘要:
Techniques for annotating a process are provided. The techniques include identifying one or more annotation areas, obtaining one or more items of service process information, identifying one or more annotation attributes, and using the one or more annotation areas, one or more items of service process information and one or more annotation attributes to annotate a process. Techniques are also provided for creating an interactive mechanism.