摘要:
Data associated with an E.164 number mapping (ENUM) request can be received from an element of a telecommunications network. Logical trunk-group information and gateway information can be associated with the ENUM request. A call is managed by the computing element through a packet-based network based at least in part on the logical trunk-group information and the gateway information.
摘要:
Data associated with an E.164 number mapping (ENUM) request can be received from an element of a telecommunications network. Logical trunk-group information and gateway information can be associated with the ENUM request. A call is managed by the computing element through a packet-based network based at least in part on the logical trunk-group information and the gateway information.
摘要:
A system for analyzing a video file in a shortened time frame, said system comprising: a receiver (VFR) to receive a video file (VF) as an input; a Time Splitter (TR) to split the received video file according to set intervals of time depending on how fast said video is to be analyzed; a Frame splitter (FP) to split a Video Viewing Program (R) into a plurality of frames (F1, F2, . . . Fn); a Key Frame Identification mechanism (KFI) to identify key frames; and linking mechanism (LM) to cause a link to be formed with pre-populated databases and in-house libraries of images (D), of frames, which frames comprising associated tags, thereby determining a score of similar tags per video file in order to determine said genre, thereby determining multiplicity of instances for said time splitter.
摘要:
A method for implementing information quality assessment includes receiving a value relating to a predicted outcome of an event from each of an entity and at least one other entity and a reputation score for the entity and the other entity. The method also includes generating a collective prediction value for the event that reflects a collective prediction for the event. The collective prediction value is generated from predicted outcome values from the entity and the other entity. The collective prediction value is calculated as a function of reputation scores corresponding to the entity and the other entity.
摘要:
A network device implements automatic configuration of Quality of Service (QoS) parameters in response to operator specification of a relatively few and easily understandable “high level” parameters such as, for example, latency requirements or an acceptable rate of packet drops. In one implementation, a network device may receive user preference information that relates to a Quality of Service (QoS) for network traffic passing through the network device and may measure traffic patterns through the network device. The device further generates a configuration template based on the measured traffic patterns and on the user preference information transmit the data in an order of transmission that is prioritized according to a bandwidth allocation policy defined by the configuration template.
摘要:
One embodiment is directed to a system for providing wireless coverage and capacity for a public land mobile network within a building. The system comprises a pico base station comprising multiple transceiver units. The pico base station is installed in the building. The system further comprises a plurality of antennas located within the building. The plurality of antennas are located remotely from the pico base station. The pico base station is communicatively coupled to the public land mobile network. The pico base station is communicatively coupled to the plurality of antennas.
摘要:
A system for analyzing a video file in a shortened time frame, said system comprising: a receiver (VFR) to receive a video file (VF) as an input; a Time Splitter (TR) to split the received video file according to set intervals of time depending on how fast said video is to be analyzed; a Frame splitter (FP) to split a Video Viewing Program (R) into a plurality of frames (F1, F2, . . . Fn); a Key Frame Identification mechanism (KFI) to identify key frames; and linking mechanism (LM) to cause a link to be formed with pre-populated databases and in-house libraries of images (D), of frames, which frames comprising associated tags, thereby determining a score of similar tags per video file in order to determine said genre, thereby determining multiplicity of instances for said time splitter.
摘要:
A network device implements automatic configuration of Quality of Service (QoS) parameters in response to operator specification of a relatively few and easily understandable “high level” parameters such as, for example, latency requirements or an acceptable rate of packet drops. In one implementation, a network device may receive user preference information that relates to a Quality of Service (QoS) for network traffic passing through the network device and may measure traffic patterns through the network device. The device further generates a configuration template based on the measured traffic patterns and on the user preference information transmit the data in an order of transmission that is prioritized according to a bandwidth allocation policy defined by the configuration template.
摘要:
One embodiment is directed to an enterprise mobile network for providing wireless service within a coverage area associated with an enterprise using licensed radio frequency spectrum. The enterprise mobile network is configured to have local subscribers thereof. At least one local subscriber has assigned thereto a local mobile phone number and one or more other numbers (such as a PBX extension number, a public mobile phone number, and a Unified Communications end point). The enterprise mobile network is configured so that the local mobile phone number and one or more of the other numbers ring in response to incoming calls made to the local mobile phone number or the other numbers.
摘要:
A security agent monitoring and protection system is provided. A security agent on an end point computing device can be accompanied by or can load into the device's memory at startup one or more independent software processes whose primary function is to directly protect the security agent itself and take protective actions against the end point computing device should a security agent protecting the device become disabled. Protection of the security agent can be achieved in several ways, including installing the security agent with restricted permissions, making it difficult to shutdown, restarting the security agent automatically if it is halted without authorization, disabling network connectivity of the end point device if the security agent does not successfully start or restart, protecting executable and dynamic link library (DLL) files of the security agent, and controlling access to the security agent's Common Object Model (COM) interfaces. These protective aspects can also be used by the monitoring agent itself to protect it from unauthorized access or disabling, further providing protection to the device.