摘要:
The creation of multiple personae in mobile devices. Access to personae is controlled based on the persona that is currently active. The creation or existence of different personae helps prevent data leakage or loss, in that any or all of the following characteristics, by way of example, may be manifested: business data and applications are firewalled from applications or other items associated with personal use; connectivity of the device is controlled; resources (such cameras, GPS, other sensors, etc.) on the device are controlled; data are protected even if removable storage or the device itself are lost.
摘要:
The creation of multiple personae in mobile devices. Access to personae is controlled based on the persona that is currently active. The creation or existence of different personae helps prevent data leakage or loss, in that any or all of the following characteristics, by way of example, may be manifested: business data and applications are firewalled from applications or other items associated with personal use; connectivity of the device is controlled; resources (such cameras, GPS, other sensors, etc.) on the device are controlled; data are protected even if removable storage or the device itself are lost.
摘要:
Embodiments of the invention are related to identifying a user's intent dynamically from at least a set of metadata associated with the user, wherein the set of metadata is associated with a user input, and providing to the user a set of labeled instances on determination of a user's intent, the set of labeled instances being directly related to user's intent, where the set of labeled instances are obtained in real-time from a set of information repositories.
摘要:
A significant recent trend in the internet and mobile telephony has been the dominance of user generated content. As such, in mobile technology have permitted users to upload content onto the internet, whereby sites provide an easily accessible and manageable medium for users to share their thoughts and form a portal for media-rich exchanges. It has been found that much of what is exchanged by users in such settings is context-sensitive, ranging from users' moods and opinions, to communication about users' plans. Broadly contemplated herein, in accordance with at least one embodiment of the invention, is the employment of data mining in information repositories settings to efficiently classify an information stream in real-time and thereby discern user intent.
摘要:
A system and computer program product for enabling a secure transaction with a remote site that uses voice interaction include authenticating a remote site to enable a secure transaction, wherein authenticating the remote site comprises using a dynamically generated audio signal.
摘要:
Systems and methods provide for indexing audio content by fusing the indexes derived from a keyword stream and a large vocabulary stream search. For example, systems and methods provide for two stream searching of Spoken Web VoiceSites, wherein metadata is extracted from the VoiceSite and is used to determine a set of keywords for high precision search while a traditional standard vocabulary set is used to perform a high results, low precision search. The results of the keyword search and the standard vocabulary search are fused together to form a comprehensive, ranked list of results.
摘要:
Systems and associated methods provide for joint analytics on user level data and network level data. Systems and methods provide for accessing telecommunication network user level data and network level data and integrating analysis on both data types to produce a common result. Embodiments utilize joint analytics to generate patterns and rules concerning the content and services accessed by a user, when they are accessed, and how they are accessed.
摘要:
Selectively scanning available channels for a network connection. A computing device defines a preferred channel list for a network along with a scan ratio. The scan ratio relates the frequency that the preferred channels are scanned versus the frequency that all the channels are scanned. In an embodiment, the preferred channel list reflects channels on which the computing device has recently connected. Employing the scan ratio thereby balances power consumption with fast connection establishment. The scan ratio is also adjustable to affect power consumption and battery life of the computing device.
摘要:
Techniques for enabling a secure transaction with a remote site that uses voice interaction are provided. The techniques include authenticating a remote site to enable a secure transaction, wherein authenticating the remote site comprises using a dynamically generated audio signal.
摘要:
A middleware platform is executable by a computer to receive a request for a service, the service provided by a service application in communication with the middleware platform. The middleware platform determines, via a device adaptation component of the middleware platform, capabilities of a device subject to the request. The middleware platform selects an interface having a format that is compatible with the capabilities of the device, and provides the interface to the device in a format corresponding to the capabilities, accesses the service application responsive to the request, processes the request, and returns a response, via the interface, to the device responsive to the processing.