摘要:
A telephone of the corded or portable type includes a light source. The light source may or may not have an ability to be pivoted or swiveled to illuminate a desired portion of a room. In the case of a corded telephone, the light source may be detachable from the telephone. The light source may be automatically activated to provide emergency illumination when a power failure condition exists in a building. The light source may also be manually activated to provide a convenient illumination source for the user.
摘要:
The system and method generate a voice checklist template that contains at least one item. A revised voice checklist is generated from the voice checklist template. A request for input for an item in the revised voice checklist is sent. After receiving a response to the request the revised voice checklist is updated with the response. If the revised voice checklist is not complete, the process repeats until the revised voice checklist is complete. Once the process is complete, the revised voice checklist is stored.
摘要:
Each one of a plurality of communication devices that are located at different physical locations contains an acoustic sensor for monitoring the physical location of its communication device, and reports acoustic events detected by its acoustic sensor to a manager. The manager displays a map which shows the physical locations, the events detected by the acoustic sensor in each communication device, sent notification messages, and received response messages.
摘要:
A method and an apparatus are disclosed that provide a privilege-granting technique for enabling a service-providing domain to grant a privilege to a requesting user in a service-requesting domain. A request handler in the service-providing domain, which comprises one or more service-associated resources, receives a user request to use a service and requests a token from a privilege-granting server, in accordance with the illustrative embodiment of the present invention. Upon receiving the token that specifies a granted privilege from the privilege-granting server, the request handler extends the privilege to the requesting user. Alternatively, the request handler can request a plurality of tokens in advance from the privilege-granting server; after receiving the tokens, the request handler extends a privilege to each requesting user as the handler receives requests to use one or more services.
摘要:
A method is disclosed that enables mitigating at least some of the problems caused by a packet attack. When a first Internet Protocol (IP)-capable device is subjected to a packet attack, it indicates periodically to a second IP-capable device that certain communications with the first device are to be suspended. The periodic transmitting of the indication is performed at a slower rate than the keep-alive mechanism that is normally used to detect loss of connectivity. When the second device receives the transmitted indication, it refrains from transmitting keep-alive messages to the first device for a predetermined interval. Meanwhile, the first device also refrains from transmitting keep-alive messages to the second device for a similar interval. In transmitting the suspend indication, the illustrative embodiment seeks to prevent pairs of communicating devices that are experiencing packet attacks from continuing their operation under the erroneous assumption that each device is unavailable.
摘要:
The present disclosure is based on a multi-core or multi-processor virtualized environment that comprises both time-sensitive and non-time-sensitive tasks. The present disclosure describes techniques that use a plurality of criteria to choose a processing resource that is to execute tasks. The present disclosure further describes techniques to re-schedule queued tasks from one processing resource to another processing resource, based on a number of criteria. Through load balancing techniques, the present invention both (i) favors the processing of soft real-time tasks arising from media servers and applications, and (ii) prevents “starvation” of the non-real-time general computing applications that co-exist with the media applications in a virtualized environment. These techniques, in the aggregate, favor the processing of soft real-time tasks while also reserving resources for non-real-time tasks. These techniques manage multiple processing resources to balance the competing demands of soft real-time tasks and of non-real-time tasks.
摘要:
A contention-based network which allows real-time traffic to exist as multiple independent linked-list chains or under certain conditions to be assembled into multiple linked-list chains. A time separation is enforced between the various multiple chains, which are limited to a predetermined maximum number of stations that each can have in order to allow non-real-time stations to obtain timely access to the medium. Ones of the multiple chains may also be joined into a single chain. Blackburst contention is used to enable a chain to be reconstituted robustly from non-anticipated interruptions, such as the failure of one of its stations.
摘要:
A system is disclosed that enables the estimation of the location of a wireless terminal in a wireless network. The illustrative embodiment works without requiring modifications to be made to the wireless terminal. Furthermore, the hardware of some embodiments of the present invention can be inexpensively deployed indoors. Some embodiments of the present invention are, therefore, ideally suited for use with legacy indoor systems. The system of the illustrative embodiment of the present invention, in some embodiments, uses an offline process and an online process for location estimation. The described system, however, can be used with other techniques for location estimation.
摘要:
The present invention enables APs to communicate with CNs in a backhaul network configuration in such a manner that the network is dynamically and adaptively self-aligning in terms of bandwidth utilization. A technique known as Black bursts is adapted to a backhaul network configuration to enable access instants in communicating between APs and CNs to be automatically and dynamically self re-aligned in response to APs entering and leaving the network. Thus, APs are not required to explicitly inform each other of these changes. Real-time APs are given priority over non-real-time APs in order to ensure that real-time traffic meets bounded end-to-end delay requirements. This is accomplished by decreasing the period of time that real-time APs must wait while the channel is idle before accessing the channel relative to the time period that non-real-time APs must wait before accessing the channel. Furthermore, the present invention utilizes the Black bursts technique to resolve contentions between APs attempting to access the channel simultaneously. During this resolution process, the AP that has been waiting the longest to access the channel is given priority. That AP then waits an additional observation time period before transmitting over the channel. When a determination is made that the observation time period has expired and that the channel is idle, the AP transmits. The observation time period is periodically decreased. This causes the APs to attempt to access the channel earlier than in previous access instants, which results in additional bandwidth being evenly spread out and consumed by the remaining APs.
摘要:
An apparatus and methods are disclosed for intelligently determining when to merge transactions to backup storage. In particular, in accordance with the illustrative embodiment, queued transactions may be merged based on a variety of criteria, including, but not limited to, one or more of the following: the number of queued transactions; the rate of growth of the number of queued transactions; the calendrical time; estimates of the time required to execute the individual transactions; a measure of importance of the individual transactions; the transaction types of the individual transactions; a measure of importance of one or more data updated by the individual transactions; a measure of availability of one or more resources; a current estimate of the time penalty associated with shadowing a page of memory; and the probability of rollback for the individual transactions, and for the merged transaction.