摘要:
For location-based communication with mobile devices, a condition is received, at a device associated with a caller, where the condition has to be satisfied by a callee at a past location, the past location being a place where different callees with different mobile devices are present at different times. At the device associated with the caller, an instruction is received for making a telecommunication call to a mobile device of a potential callee in a set of potential callees, where each mobile device associated with each potential callee in set of potential callees was present at the past location at a past time, and where each potential callee in the set of potential callees satisfies the condition at the past location. Using a processor and a memory in the device associated with the caller, the telecommunication call is initiated to mobile devices associated with a subset of potential callees.
摘要:
For location-based communication with mobile devices, a condition is received, at a device associated with a caller, where the condition has to be satisfied by a callee at a past location, the past location being a place where different callees with different mobile devices are present at different times. At the device associated with the caller, an instruction is received for making a telecommunication call to a mobile device of a potential callee in a set of potential callees, where each mobile device associated with each potential callee in set of potential callees was present at the past location at a past time, and where each potential callee in the set of potential callees satisfies the condition at the past location. Using a processor and a memory in the device associated with the caller, the telecommunication call is initiated to mobile devices associated with a subset of potential callees.
摘要:
For current location-based telecommunication, an instruction is sent from a caller communication device to initiate a telecommunication with a set of destination communication devices. The instruction includes identifying information for a reference device but does not include any identifying information for the set of destination communication devices. Telecommunication data is received at the caller communication device from a destination communication device in the set of destination communication devices, where a server has established a communication channel between the caller communication device and the destination communication device based on a geolocation proximity of the destination communication devices relative to the reference device.
摘要:
A request to access to a logical location in a file stored in a content addressable storage (CAS) system can be processed by retrieving first tree data from a first node in a first hash tree that represents a first version of the file. Based on the first tree data, a second node is selected from which a CAS signature is compared to a reserved CAS signature to determine the proper file version. In response to a match, a third node is accessed in a second hash tree that represents a second version of the file. Tree data is retrieved from a third node.
摘要:
An instruction for making a call to a location is received at an application executing in a service provider system. The location is a place where different callees with different mobile devices are present at different times, and a callee is present with a mobile device at the place at a given time therefore the call is made to the mobile device of the callee in order to call the location. Using the application, a set of locations corresponding to a set of subscribers is detected. From the set of subscribers, a set of potential callees is identified. Each mobile device associated with each callee in the set of potential callees is present at the location at the given time. Using the application, the call is established between a caller's device and the mobile devices of a subset of potential callees, the subset of potential callees including the callee.
摘要:
A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. If a check frame is not inserted in the list, the memory frame handles the request directly, but if a check frame is inserted, then the check operation is performed. The check frame can be a synchronization frame that blocks access to a memory frame while the check frame is present, or the check frame may be a breakpoint, watch or exception frame that calls a suitable handling routine. Additional check frames may be chained between the interface and the memory subsystem to handle synchronization, breakpoints, memory watches or other accesses to or information gathering associated with the memory frame.
摘要:
A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. If a check frame is not inserted in the list, the memory frame handles the request directly, but if a check frame is inserted, then the check operation is performed. The check frame can be a synchronization frame that blocks access to a memory frame while the check frame is present, or the check frame may be a breakpoint, watch or exception frame that calls a suitable handling routine. Additional check frames may be chained between the interface and the memory subsystem to handle synchronization, breakpoints, memory watches or other accesses to or information gathering associated with the memory frame.
摘要:
A request to access to a logical location in a file stored in a content addressable storage (CAS) system can be handled by retrieving first tree data from a first node in a hash tree that represents the file, the first tree data including a first hash tree depth, a first CAS signature, a block size and a file size. Based on the tree data, a second node is selected from a higher level in the hash tree. Second tree data from the second node of the hash tree that represents the file is retrieved, including a second CAS signature. The second CAS signature is determined to match a reserved CAS signature, and in response, an indication that the requested logical location is unallocated within the file is provided.
摘要:
A request to access to a logical location in a file stored in a content addressable storage (CAS) system can be processed by retrieving first tree data from a first node in a first hash tree that represents a first version of the file. Based on the first tree data, a second node is selected from which a CAS signature is compared to a reserved CAS signature to determine the proper file version. In response to a match, a third node is accessed in a second hash tree that represents a second version of the file. Tree data is retrieved from a third node.
摘要:
To manage channel ownership in a publish-subscribe data processing environment, a determination is made at a first server that a subscription request from a client relates to a channel, the channel having a channel identifier. At an exchange component in a messaging middleware, a session queue associated with the client is bound to the channel. A mandatory delivery message is configured to be routed using a publisher identifier by the exchange component, the publisher identifier being related to the channel identifier. The mandatory delivery message is communicated from the first server to the exchange component to indicate an intent of the first server to become a publisher of the channel. The mandatory delivery message causes the channel ownership of the channel to be limited to a single publisher.