摘要:
A method (100) and system (30) to enable automatic generation and testing of voice applications includes generating (102) a test driver application (TDA) (32) and generating (104) a modified original voice application (34) to be tested by the TDA within a call flow builder (10). The modified application can include or generate (106) “test hooks” or more particularly DTMF tones and DTMF grammars that can be used to synchronize the modified original voice application with the TDA. The TDA can test (110) all possible paths of the modified original voice application. Note the TDA and the modified original voice application can be generated and/or tested (112) in a test environment within the call flow builder or a telephony environment. The TDA can be automatically generated (108) to exercise all possible flows where the DTMF tones define the current state and location of the modified application.
摘要:
A call completion system, method and apparatus for integrated directory assistance and voice activated dialing based upon call transfer rules. In accordance with the present invention, a call completion system can include a set of call transfer rules implicating one of a directory assistance interface and a voice activated dialer interface. The system further can include a call completion processor configured to select one of a directory assistance interface and a voice activated dialer interface based upon an evaluation of the call transfer rules for an incoming query.
摘要:
A method, system and computer program for automatically generating call flow statistics in a voice application. Embodiments of the present invention address deficiencies of the art in respect to call flow statistics generation systems and provide a novel and non-obvious method, system and computer program product for automatically generating a call flow statistics-generating application and presenting updated statistics on a call flow representation. Various statistics collection points are identified on the visual representation. Upon running of the voice application, call flow statistics are gathered and presented for each statistics collection point. Call identifiers corresponding to each call path can be selected and call paths corresponding to the selected call identifier may be highlighted and their call statistics displayed.
摘要:
One aspect of the present invention can include a method for restricting resources consumed by ghost agents. The method can include the step of associating a ghost agent with a host. A resource utilization value can be ascertained for the ghost agent and the host combined. The ascertained resource utilization value can be compared with a usage threshold. A determination can be made as to whether operations of the ghost agent are to be executed based upon the previous comparison.
摘要:
A validation method can include the step of identifying a host within a grid environment, wherein the host is a software object. A ghost agent can be associated with the host, where the ghost agent can move within the grid environment. The actions of the host can be replicated by the ghost agent. Data related to the replicated actions can be compared with validation data. Validation output can be generated based upon the comparison.
摘要:
A validation method can include the step of identifying a host within a grid environment, wherein the host is a software object. A ghost agent can be associated with the host, where the ghost agent can move within the grid environment. The actions of the host can be replicated by the ghost agent. Data related to the replicated actions can be compared with validation data. Validation output can be generated based upon the comparison.
摘要:
A method for supporting an application can include the step of receiving a problem indication relating to the application. The method can also identify a host within a grid environment, wherein a host can be a software object used by said application. A ghost agent can be associated with the host. The actions of the host can be replicated for use by the ghost agent. Data relating to the replicated actions can be recorded using the ghost agent. The indicated problem can be responded to, where the response can be based at least in part upon the recorded data.
摘要:
One aspect of the present invention can include a method for restricting resources consumed by ghost agents. The method can include the step of associating a ghost agent with a host. A resource utilization value can be ascertained for the ghost agent and the host combined. The ascertained resource utilization value can be compared with a usage threshold. A determination can be made as to whether operations of the ghost agent are to be executed based upon the previous comparison.
摘要:
A method for restricting resources consumed by a ghost agent can include the step of identifying a host, which is a software object operating within the grid environment and movable from one grid to another grid within the grid environment. The method also can include the step of associating a ghost agent with the host. The ghost agent is configured to replicate and record at least one action of the host and follows the movement of the associated host. Additionally, the ghost agent can be registered with a ghost registry of the domain in which it is disposed. Once registered, a containment policy for the domain can be received by the ghost agent. The ghost agent can be configured according to the received containment policy. The containment policy can be utilized to restrict resources that are available to the ghost agent.
摘要:
One aspect of the present invention can include a method for restricting resources consumed by ghost agents. The method can include the step of associating a ghost agent with a host. A resource utilization value can be ascertained for the ghost agent and the host combined. The ascertained resource utilization value can be compared with a usage threshold. A determination can be made as to whether operations of the ghost agent are to be executed based upon the previous comparison.