摘要:
A system, computer program and method for inspection of a system under inspection. The system may include an inspection program configured to access information available at the system under inspection and generate inspection data for the system under inspection. A runtime platform independent from the inspection program at the system under inspection is configured to limit the limit the contents of the inspection data to a maximum information content. A trusted third-party computer system may assist in selecting the inspection program and transferring the resulting inspection data.
摘要:
Various aspects relate to using structured messages within systems that implement instant messaging function in a distributed computing environment. In particular, structured information may be encoded and embedded in unstructured instant messages and communicated among one or more computer systems, networks, applications or other entities. In one aspect, instant messaging may be leveraged as middleware for application integration. Other aspects relate to using structured message information to perform functions in a distributed instant messaging system. For example, structured message information may be used to control the display of instant message information to a user, or may be used to control how the instant message information is distributed, processed, or otherwise handled by a receiving system, application or process. Other aspects relate to an interface for displaying information relating to a number of instant messaging conversations to a user. Further, aspects relate to using instant messaging in a trading environment.
摘要:
A communication network includes a switching system, an application server, and a softswitch that communicatively couples the application server to the switching system. The switching system is configured to detect a first call to a primary directory number associated with a phone line and to forward the first call to the application server. The application server is configured to instruct the softswitch to generate a second call to a RingMaster directory number associated with the phone line. And the softswitch is configured to bridge the first and second calls responsive to detection of a communication path completion to the phone line.
摘要:
Methods, systems and computer program products provide time-restricted passcode access to a restricted access area by: (a) electronically generating a time-limited visitor access passcode that is operational for a security system for a limited time duration; then (b) electronically accepting the visitor access passcode in a security entry control access device in communication with the security system to allow a user with the visitor access passcode a time-limited entry to a restricted area; then (c) automatically electronically preventing user access to the restricted area using the visitor access passcode with the security entry control access device after a certain time or expiration of a certain time period. Embodiments of the invention may be particularly useful for allowing visiting meeting participants physical access to a restricted area in a building to attend a scheduled meeting.
摘要:
A system and method transfers personalization information to a portable storage device from a first computer system, and then adds personalization information to a second computer system from the portable storage device.
摘要:
A Service Control Point (SCP) has a call list associated with the main telephone number of a called party. When a calling party attempts to contact the called party by calling the main number, but cannot reach the main number, a Service Switching Point (SSP) fires a trigger. One trigger is a T_No_Answer trigger, which is fired in response to a call to the main number that is not answered within a predefined number of rings. Another trigger is a T_Busy trigger that is fired in response to a call to the main number that is made when the main number is busy. Each trigger causes the SCP to access the call list and to cause the SSP to ring an alternative telephone number associated with the main telephone number. If this attempt to reach the called party also fails, then the SSP again fires the trigger and an attempt is made to connect the calling party to the next number on the call list. If the call list is exhausted before the calling party is connected to a number on the called party's call list, then a message can be played to the calling party. Alternatively, the calling party may be connected to a voice mailbox associated with the called party or may receive a busy tone.
摘要:
A system and method transfers personalization information to a portable storage device from a first computer system, and then adds personalization information to a second computer system from the portable storage device.
摘要:
Embodiments of the present disclosure generally relate to a menu vision aid. In one embodiment, a menu vision aid comprises a frame, a lens disposed within the frame adapted to enhance the visibility of a menu page, a light source attached to the frame adapted to provide light to a menu page; and an attachment member attached to at least one of the frame and the light source, the attachment member adapted to attach the menu vision aid to a menu page.
摘要:
Unanswered calls route to voicemail after a variable number of ring cycles based on a history with the voicemail user. The history may include the caller's identity, the user's answering history, and user preferences. If the caller is not identified, an unanswered call may go to voicemail after a default number of ring cycles. If a caller has a history of previous calls to the user/called party, that history may increase or decrease the default number of ring cycles for that caller. For example, callers whose previous calls to the voicemail user have been answered may receive more ring cycles before going to voicemail. Conversely, callers whose previous calls to the user/called party were unanswered may receive a reduced number of ring cycles before going to voicemail. The number of ring cycles may also be adjusted where the call answering history suggests the called party is unavailable during certain times.