摘要:
A optical switch and switching system is provided for effecting a switchover from a first optical fiber to a second optical fiber includes a first, large scale switching component and a second, small scale switching component. The first, large scale switching component is configured to establish a cross connect between the second optical fiber and the second, small scale switching component. The second, small scale switching component may then be configured to select the cross connect following establishment of the cross connect, thereby ensuring rapid switchover from the first fiber to the second fiber, regardless of the speed of the first large scale switching component.
摘要:
Systems and methods are provided for the storage of content on a network and the delivery of content to subscriber locations. According to one system and method, content is delivered to a set-top box from a content source in the process of transmitting the same content to another set-top box. The content source instructs a shared router to duplicate the content such that the content is transmitted to the requesting set-top boxes substantially simultaneously. According to another system and method, a server and cache provide dynamic caching of content such that requests for content are satisfied from the cache if possible. If the requested content is not found in the cache, the content is requested from alternate source and added to the cache. Weight values associated with the stored files are updated such that the more frequently requested files are maintained in the cache.
摘要:
Systems and methods for document control using public key encryption are provided. An interface program serves as a software interface between user applications used to create and access documents and a data storage system that stores the documents in an encrypted form. When a document is saved for the first time, information corresponding to the destruction of that document is obtained either from a user or in accordance with predefined criteria. The document is encrypted and stored with a pointer to an encryption key on a token/key server. When the document is subsequently accessed, the interface program will read the pointer and attempt to retrieve the key. If the key has expired in accordance with the destruction policy, the document is inaccessible. Otherwise, the document is decrypted using the key. Multiple documents may be saved according to the same destruction policy and even the same key, thereby greatly enhancing the ability to “destroy” documents regardless of their location with minimal process.
摘要:
A test case management subsystem includes a data store, the data store including data relating to a network device. A network testing subsystem is configured to receive an instruction from said test case management subsystem, wherein the instruction includes the data relating to the network device, and execute an automated command line to test the network device.
摘要:
Systems and methods according to preferred embodiments enable a subscriber to participate in fantasy league competitions with other subscribers of the service, and to view other broadcasts simultaneously with fantasy league data on one or more televisions. A service provider enables the creation of a fantasy league related to real activities. One or more teams are associated with the fantasy league and players are then assigned to each of the created teams. In one embodiment, the teams are configured via a television interface and a remote control. Fantasy league data is tracked for each team based on participation of the team's assigned players in the real activities. Television broadcasts are then displayed simultaneously with fantasy league data on the television, a service that is not possible or practical in conventional television systems.
摘要:
An exemplary method includes at least on network element of a first network domain exchanging signaling and media border processing information with at least one network element of a second network domain by way of a secure packet-switched connection, exchanging service policy information with the at least one network element of the second network domain by way of the secure packet-switched connection, peering sessions associated with different service types between the first network domain and the second network domain by way of a packet-switched network-to-network interconnection interface (“NNII”) in accordance with the exchanged signaling and media border processing information, and enforcing different performance threshold specified by the service policy information for peering the sessions associated with the different service types.
摘要:
An exemplary method includes network elements associated with distinct network domains exchanging signaling and media border processing information by way of a secure packet-switched connection between the network elements, exchanging service policy information by way of the secure packet-switched connection, peering a session associated with a first service type between the distinct network domains by way of a packet-switched network-to-network interconnection interface (“NNII”) in accordance with the exchanged signaling and media border processing information, peering another session associated with a second service type between the distinct network domains by way of the packet-switched NNII in accordance with the exchanged signaling and media border processing information, enforcing a first performance threshold specified by the service policy information for peering the session associated with the first service type, and enforcing a second performance threshold specified by the service policy information for peering the other session associated with the second service type.
摘要:
Embodiments of the present disclosure are directed to a system and method for receiving first location information associated with a VoIP device having one or more geomagnetic sensor, wherein the first location information is determined using the one or more geomagnetic sensors based at least in part on the Earth's magnetic field, determining second location information associated with the VoIP device based at least in part on the first location information; storing the second location information in one or more databases; and transmitting the second location information to the VoIP device to establish a service.
摘要:
A device receives, from a calling party, a call to a Voice over Internet Protocol (VoIP) subscriber, and generates a request for the calling party to record information. The device also receives information from the calling party based on the request, and provides the information from the calling party and call handling options to the VoIP subscriber. The device further receives a response from the VoIP subscriber to the call handling options, and handles the call based on the VoIP subscriber response.
摘要:
A charging factor is determined applicable to each time interval in a period of time during which at least one data transfer was conducted. An amount of data transferred during each time interval is determined. A total charge applicable to the at least one data transfer is computed based at least in part on the charging factor applicable to each time interval and the amount of data transferred. Alternatively or additionally, a plurality of potential start times and an amount of data for a data transfer are identified. A set of time intervals associated with each of the potential start times are determined. For each of the potential start times, an estimated charge applicable to the data transfer is computed based at least in part on a charging factor applicable to each of one or more time intervals associated with the potential start time and the amount of data estimated to be transferred.