摘要:
A service is described that discovers the physical locations of a computer's connections to logical networks and provides that information to applications. The service decides which method or methods for discovering physical location information are applicable to each network interface on the computer, applies those methods, and collects the results. The results are then converted into a common format. In addition to physical location, the information may include estimates of the quality and reliability of the information, such as error ranges and confidence intervals, and the methods used to gather the information. The information is made available to whatever system services and applications need it. Clients of the physical location information may be notified when the information provided to them changes or when new information becomes available. Clients may specify a threshold so that location changes of a magnitude below the threshold are not reported to them.
摘要:
A service is disclosed that discovers information about the logical networks to which a computer is connected and provides that information to applications. The information is keyed to names constructed by the service. There is a mapping between the names and the logical networks. Applications may rely on the names when selecting a configuration to use with a given logical network. The network name may be correlated with other information, such as physical network interface(s) on the computer through which the logical network is accessible, application programming interfaces of the transport protocols supported by the logical network, and the connectivity type of the logical network. Applications are notified when network information provided to them changes or when new information becomes available.
摘要:
A service is disclosed that discovers information about the logical networks to which a computer is connected and provides that information to applications. The information is keyed to names constructed by the service. There is a mapping between the names and the logical networks. Applications may rely on the names when selecting a configuration to use with a given logical network. The network name may be correlated with other information, such as physical network interface(s) on the computer through which the logical network is accessible, application programming interfaces of the transport protocols supported by the logical network, and the connectivity type of the logical network. Applications are notified when network information provided to them changes or when new information becomes available.
摘要:
A service is disclosed that discovers information about the logical networks to which a computer is connected and provides that information to applications. The information is keyed to names constructed by the service. There is a mapping between the names and the logical networks. Applications may rely on the names when selecting a configuration to use with a given logical network. The network name may be correlated with other information, such as physical network interface(s) on the computer through which the logical network is accessible, application programming interfaces of the transport protocols supported by the logical network, and the connectivity type of the logical network. Applications are notified when network information provided to them changes or when new information becomes available.
摘要:
A mediation server for controlling contents of incoming and outgoing communication information exchanged as part of a conversation is provided. The mediation server may be a centralized server between an internal (private) network and an external network, utilized for enforcing the internal network's policy and detecting a potential security compromise in the internal network. Predefined evaluation criteria are utilized to enforce internal policy or security policy within the internal network. When communication information is exchanged, the mediation server may monitor potential policy or security breaches in the communication information utilizing the predefined evaluation criteria and execute an appropriate action to prevent potential policy or security breaches.
摘要:
The claimed subject matter provides systems and/or methods that facilitate describing, communicating, utilizing, etc. a frame dependency structure in connection with real time video communication. For example, a protocol can be employed to communicate the dependency structure from a sender to a receiver. Moreover, a mechanism on a receiver side can detect frame(s) that will be rendered with artifacts if displayed due to previous frame loss; this mechanism can leverage receiver side knowledge concerning the dependency structure of the frames.
摘要:
Aspects of the present invention are directed at obtaining contextual information with a voicemail message. In accordance with one embodiment, a method is provided that obtains additional contextual information that is not obtained automatically when a voicemail message is received. More specifically, the method includes automatically obtaining a first set of contextual information from a client associated with the caller when the caller is transferred to a voicemail system. Then a determination is made regarding whether the callee requests that additional contextual information be obtained. If the callee requests that additional contextual information be obtained, the requested information is obtained from a third-party service or by prompting the caller.
摘要:
Aspects of the present invention are directed at obtaining contextual information with a voicemail message. In accordance with one embodiment, a method is provided that obtains additional contextual information that is not obtained automatically when a voicemail message is received. More specifically, the method includes automatically obtaining a first set of contextual information from a client associated with the caller when the caller is transferred to a voicemail system. Then a determination is made regarding whether the callee requests that additional contextual information be obtained. If the callee requests that additional contextual information be obtained, the requested information is obtained from a third-party service or by prompting the caller.
摘要:
A wireless access point may be configured to advertise, to mobile user devices, multiple wireless networks available through the wireless access point. For example, service set identifiers (SSIDs) may be specified within an information element (IE) of a communication such as, for example, an 802.11 beacon, broadcasted to mobile user devices. Such an IE may utilize the capability provided by IEEE 802.11 itself to use additional and flexible numbers of information elements within a beacon. Accordingly, networks that would otherwise remain hidden due to limitations of known wireless access points are made visible to mobile user devices. Configuring a wireless access point to advertise multiple available wireless networks, for example, by firmware upgrades, may serve as a viable and cost-effective interim solution and/or alternative to replacing a wireless access point with a wireless access point configured to implement virtual wireless access points.
摘要:
The invention makes possible remote control of devices in a piconet by remote users communicating over the Internet and the like by providing a proxy-bridge device. The proxy-bridge device is a bridge for sending packets to and from between an external device and a device in the piconet. Moreover, the proxy-bridge device also serves as a proxy for the external device to devices in the piconet and as a proxy for devices in the piconet accessing an external device. The proxy-bridge wireless device's protocol stack allows communications with the piconet devices within the piconet. In addition, the protocol stack allows an application to communicate with a remote device e.g., via the Internet Protocol. Thus, the proxy-bridge device, using two protocols, enables remote users discover the presence of a service offered by a device in a piconet as a logical embedded device within the proxy-bridge device and vice-versa.