摘要:
A method and a system have been disclosed for the preemptive detection of occurrence of one or more faulty conditions based on the usage of one or more resources. The faulty conditions are detected during an execution of a program; the program includes at least one function. The method includes initializing Application Program Interfaces (APIs) across the at least one function. After this, calls to the APIs used within a namespace of the program are intercepted. The interception is performed by the at least one function through extended method classes. Thereafter, the usage of the resources for the at least function intercepting the APIs is checked against a corresponding predetermined threshold limit. Once the usage of the resources is checked, context of the usage of the resources is identified based on a predefined knowledge. Subsequently, the occurrence of the faulty conditions is determined based on the identification.
摘要:
The present invention provides a method and a system for providing at least one communications service to one or more service providers by a communications service provider. Communications capabilities of the communications service provider are sliced into a plurality of virtual slices and each of the plurality of virtual slices is configured for a different service provider from among the one or more service providers. At least one communications service is provided to each of the one or more service providers through a respective configured virtual slice by the communications service provider. Each of the one or more service providers further provides the communications service to a user through the respective configured virtual slice in collaboration with the communications service provider.
摘要:
A method to shape one or more features of Web 2.0 in the form of Web 2.0 solutions, using Web 2.0 realization framework, to the plurality of enterprises is disclosed. The method includes identifying the respective enterprises computing infrastructure and a business application needs of the respective enterprises. The respective enterprises current support system is also measured to find the feasibility of implementing the features of the Web 2.0. The method further comprises offering one or more Web 2.0 features to the respective enterprises based on the business activity. The method includes providing the Web Realization Cycle (WRC) for controlled implementation of Web 2.0 features to the respective enterprises.
摘要:
The present invention provides a method, test-bed and computer program product for testing an application installed on a wireless communication device. The wireless communication device communicates one or more messages wirelessly to a server through a test-bed. The test-bed is connected with the server and provides one or more testing parameters for the one or more messages. A tester, testing the application, assigns a probability to the one or more messages. Further, the tester assigns a probability to the one or more testing parameters. Thereafter, the messages are re-communicated between the server and wireless communication device through the test-bed. Subsequently, the one or more messages are identified by the test-bed and one or more wireless network conditions are emulated based on the probabilities assigned to the one or more messages and the one or more testing parameters.
摘要:
A system and method for consolidating a plurality of resources on a plurality of data processing units (DPUs) in a data processing network is provided. The method includes selecting a first DPU having a highest DPU volume among the plurality of DPUs. The method further includes calculating an angle made by a first DPU vector of the first DPU with a horizontal dimension of a multi-dimensional chart using first DPU co-ordinates from the plurality of DPU co-ordinates. Further, the method includes calculating an angle made by a first resource vector of a first resource to be assigned to the first DPU with a horizontal dimension of the multi-dimensional chart. Thereafter, the first resource is assigned to the first DPU, when a deviation of the first resource vector from the first DPU vector is minimum among the plurality of resources.
摘要:
The present invention describes a method and a computer program product for finding an impact of a change on a computer generated code. The method includes the generation of a dependency graph for the computer generated code. The dependency graph includes a plurality of nodes that are connected logically by one or more edges. The method enables an expert to assign nodal weights to the nodes, based on their importance. The method also enables the expert to assign edge weights and distribution ratios, based on the criticality of the relationship between the nodes and their distance from the root node. Thereafter, the impact of the change is found by implementing a spreading activation technique on the dependency graph. The output gathered after the activation represents the impact of the change on the computer generated code.
摘要:
A method and system to enhance the protection of the data in an user equipment and secure real time streaming of the data in the user equipment is disclosed. The method and system includes sending request by at least one user to access at least one application server. The user is provisioned to download a appropriate CMSC and a mapper into the user equipment from the application server. The method and system further comprises user sending request via an IMS network to download a data to the user equipment. The data is encrypted in the application server and is downloaded into the user equipment. The mapper identifies the appropriate CMSC, which may decrypt the data. Further, the data undergoes double decryption in real time within the user equipment before being presented in user interface. The double decryption is provisioned using the valid CMSC downloaded in the user equipment.
摘要:
Systems, methods, and computer-readable media for anonymizing data include: intercepting a communication; identifying sensitive data in the communication; transmitting the sensitive data to an anonymization engine; receiving masked data from the anonymization engine; and transmitting the masked data.
摘要:
Systems and computer-implemented methods for managing a workforce include receiving a request for support including a location of the request for support, converting the request for support into a work ticket, classifying the work ticket, allocating the work ticket to a field operative out of a set of at least one field operatives, transmitting a request for a map including data from the work ticket, receiving a map image including data relating to the work ticket, and transmitting the map image including data relating to the work ticket to the field operative.
摘要:
Systems and methods for managing underground assets are disclosed. One or more computing devices may be used to receive a request for clearance to excavate including a location identifier, resolve a location based on the location identifier, and retrieve asset data corresponding to the location from an asset location database. The asset location database can include location data regarding the positions of a plurality of assets associated with a plurality of different asset owners and may be maintained by one or more updates regarding the positions of assets from computing devices associated with the different asset owners. The systems and methods can include determining if one or more assets are buried proximate the location based on the retrieved data and transmitting data related to the determination of assets buried proximate the location.