摘要:
Techniques for monitoring one or more transaction instances in a real-time network are provided. The techniques include obtaining one or more system log files, wherein one or more footprints left by one or more transaction instances are recorded in the one or more system log files, obtaining a transaction model, wherein the transaction model comprises one or more transaction steps and a footprint pattern corresponding with each transaction step, and using the one or more system log files and the transaction model to monitor the one or more transaction instances in a real-time network at least one of an individual level and one or more aggregate levels.
摘要:
Techniques for monitoring one or more transaction instances in a real-time network are provided. The techniques include obtaining one or more system log files, wherein one or more footprints left by one or more transaction instances are recorded in the one or more system log files, obtaining a transaction model, wherein the transaction model comprises one or more transaction steps and a footprint pattern corresponding with each transaction step, and using the one or more system log files and the transaction model to monitor the one or more transaction instances in a real-time network at least one of an individual level and one or more aggregate levels.
摘要:
Techniques for monitoring one or more transaction instances in a real-time network are provided. The techniques include obtaining one or more system log files, wherein one or more footprints left by one or more transaction instances are recorded in the one or more system log files, obtaining a transaction model, wherein the transaction model comprises one or more transaction steps and a footprint pattern corresponding with each transaction step, and using the one or more system log files and the transaction model to monitor the one or more transaction instances in a real-time network at least one of an individual level and one or more aggregate levels.
摘要:
Techniques for monitoring one or more transaction instances in a real-time network are provided. The techniques include obtaining one or more system log files, wherein one or more footprints left by one or more transaction instances are recorded in the one or more system log files, obtaining a transaction model, wherein the transaction model comprises one or more transaction steps and a footprint pattern corresponding with each transaction step, and using the one or more system log files and the transaction model to monitor the one or more transaction instances in a real-time network at least one of an individual level and one or more aggregate levels.
摘要:
Systems and methods are provided for monitoring session initiation communications without modifying the operational code of the session initiation protocol proxy servers through which the messages that constitute a given communication are routed. The inbound and outbound versions of session initiation protocol messages are identified at a plurality of proxy servers. The inbound and outbound message versions are correlated at each proxy server using user-defined correlation rules that test conditions of the message headers. The correlated inbound and outbound message versions are then examined for transformations, and these transformations are used to determine the actions taken by the appropriate proxy server on that message. These actions are used to check the proper operation of both the proxy server and the session initiation protocol communication.
摘要:
A non-invasive health monitoring system comprises a wearable central sensor and at least one wearable remote sensor in wireless communication, a portable device readily accessible to the user, and a cloud platform. Each sensor collects batches of data indicative of one or more physiological parameters of the user at a physiological parameter-specific frequency, for a pre-defined time window. The central sensor receives and processes the measured data from each sensor, and stores processed data in a memory within the central sensor. The portable device comprises a receiver wirelessly receiving the processed data and instructions from the central sensor; a processor running a mobile application handling the processed data and instructions; and a transmitter. The cloud platform receives the processed data from the transmitter; analyzes the received processed data; and transmits the results to at least one of the portable device and an authorized healthcare entity.
摘要:
A significant recent trend in the internet and mobile telephony has been the dominance of user generated content. As such, in mobile technology have permitted users to upload content onto the internet, whereby sites provide an easily accessible and manageable medium for users to share their thoughts and form a portal for media-rich exchanges. It has been found that much of what is exchanged by users in such settings is context-sensitive, ranging from users' moods and opinions, to communication about users' plans. Broadly contemplated herein, in accordance with at least one embodiment of the invention, is the employment of data mining in information repositories settings to efficiently classify an information stream in real-time and thereby discern user intent.
摘要:
A system for enabling communication between multiple cloud-based services operating on a common cloud infrastructure includes a cloud infrastructure providing cloud-based services. The cloud-based services include a first service of a first tenant and a second service of a second tenant. A live directory is located within the cloud infrastructure and aggregates and distributing sharing and availability information pertaining to one or more of the cloud-based services. A back-end network is within the cloud infrastructure and enables communication between the cloud-based services and the live directory. A wide area network enables communication between the cloud-based services and one or more remote clients. The sharing and availability information pertaining to one or more of the cloud-based services aggregated and distributed by the live directory is used to establish a back-end connection between the first service of the first tenant and the second service of a second tenant.
摘要:
A method, an apparatus and an article of manufacture for managing a subscription hierarchy in a presence system. The method includes receiving a presence information request within a presence server, wherein the request is one of a subscription request and an un-subscribe request, determining if the request corresponds to an existing subscriber in the presence server, and if so, sending a redirect message to the existing subscriber, and if not, processing the request within the presence server, and enhancing functionality of subscribers to accept and handle subscription and un-subscribe requests.
摘要:
A system and method for peer based localization system using radio technology, such as Bluetooth or Wi-Fi ad-hoc technology that enables mobile devices such as cell phones, smart phones, laptops, handheld communication devices, handheld computing devices, satellite radios, global positioning systems, PDAs, etc. to discover their physical location relative to one another. In addition, the peer based localization can use a plurality of radio technologies to increase the accuracy of the physical location estimates. Additionally or alternatively, the peer based localization technique can be combined with infrastructure based location techniques, such as triangulation, GPS, or infrastructure based Wi-Fi localization in order to transpose virtual coordinates into physical coordinates.