摘要:
A system (100) includes an application model (140) to characterize a given application (110) for deployment on a cloud (130). A deployment manager (120) analyzes an application requirement for the given application (110) based on the application model (140) and policies (150) associated with the given application (110) to substantially match infrastructure resources (160) in the cloud (130) to fulfill the application requirement.
摘要:
A system (100) includes an application model (140) to characterize a given application (110) for deployment on a cloud (130). A deployment manager (120) analyzes an application requirement for the given application (110) based on the application model (140) and policies (150) associated with the given application (110) to substantially match infrastructure resources (160) in the cloud (130) to fulfill the application requirement.
摘要:
A system (100) includes a portability manager (160) to provide portability instructions to specify a change in deployment of a given application (110) on a cloud infrastructure (130). A deployment manager (120) controls deployment or lifecycle management of the given application (110) on the cloud infrastructure (130) in response to the portability instructions and based on matching cloud infrastructure resources to application requirements for the given application (110).
摘要:
A system (100) includes a portability manager (160) to provide portability instructions to specify a change in deployment of a given application (110) on a cloud infrastructure (130). A deployment manager (120) controls deployment or lifecycle management of the given application (110) on the cloud infrastructure (130) in response to the portability instructions and based on matching cloud infrastructure resources to application requirements for the given application (110).
摘要:
A system (100) includes an application model (140) to characterize a given application (110) for deployment on a cloud (130). A deployment manager (120) analyzes an application requirement for the given application (110) based on the application model (140) and policies (150) associated with the given application (110) to substantially match infrastructure resources (160) in the cloud (130) to fulfill the application requirement. A versioning manager (164) tracks changes in the given application (110) during a service lifecycle of the given application (110) and updates the application model (140) or the policies (150) in accordance with the changes.
摘要:
Systems and methods for multi-modal messaging that enable a user to compose, send and retrieve messages, such as SMS, MMS, IM or ordinary e-mail messages, for example, using one or more I/O (input/output) modalities (e.g., speech I/O and/or GUI I/O). A method for composing messages combines the advantages of a multi-modal interface (e.g., grammar-based speech and touchscreen or similar input devices) and message templates, which allows a user to construct a message with significantly less effort in a fraction of the time required by conventional methods. The user can dictate his/her messages using speech and/or GUI input, for example, based on a library of message templates which can be personalized by the user to fit his/her social interaction needs.
摘要:
Embodiments of the invention provide methods and systems for using policy enforcement for securing open devices and networks. The method includes accessing, by a policy enforcer, a plurality of policies configured to enforce network integrity and monitoring programs and/or services running on a device. The method further includes based on at least one of the plurality of policies, comparing the programs and/or services running on the device against the programs and/or services allowed by the at least one of the plurality of policies, and based on the comparison, determining that the device is running at least one program and/or service disallowed by the at least one policy. Further, the method includes in response, prohibiting access of the device to the network.
摘要:
Methods, systems, and machine-readable media are disclosed for initiating communications between entities operating in disparate environments and/or with different base protocols. According to one embodiment, a method for initiating a communication can comprise receiving a request from the first entity to initiate communications. An initiation message can be generated and formatted in a base protocol of the second entity. The base protocol of the second entity can be different from a base protocol of the first entity. The initiation message can be sent to the second entity to cause the second entity to initiate communications with a third entity in the base protocol of the second entity.
摘要:
Systems, methods, and machine-readable media are disclosed for providing customization to routing of messages in a system where routing is based on stored addresses, such as, for example, a Session Initiation Protocol (SIP) system, to pass through a firewall. In one embodiment, a method of providing customized routing of messages to pass through a firewall can comprise receiving a message from an initiating agent to a target communication identifier at a system for signaling between endpoints. The system can have one or more stored network addresses for each of a plurality of communication identifiers. One or more network addresses for the target endpoint can be determined from the stored network addresses associated to the communication identifier. One or more policies can be applied to the one or more network addresses for the target communication identifier to route the message through the firewall.
摘要:
In a method for correlating charges in a service layer and a network layer, first charging data is determined for a service layer based on content or a service purchased for a user. Second charging data for a network layer is determined based on transmission for the content or service. The first and second charging data, with any respective metadata, are correlated in order to generate a single bill for the user. This bill may be for the transmission as well as the purchase of the content or service. In the correlation, charges for the network layer and/or the service layer may be changed based on the correlation. For example, duplicative charges such as charging for the content and the traffic used to download the content may be correlated and one of the charges may be changed or removed.