Abstract:
A method for providing priority access to 802.11 endpoints. The method includes the steps of sending a Clear To Send (CTS) frame from a designated station, without requiring a Request to Send (RTS) frame from a first station. The CTS frame includes a field identifying the first station for commencing transmission, and a field indicating a duration of transmission. A deferring step is also performed for deferring any transmissions of stations other than the first station until after the duration indicated in the CTS frame has passed.
Abstract:
A method and apparatus are provided for network security based on a security status of a device. A security update status of a device is evaluated; and one or more of a plurality of security policies are selected to apply to the device based on the security update status. The available security philosophies may include, for example, a “protect the good” philosophy, an “encourage the busy” philosophy and a “shut off the non-compliant” philosophy. The security update status can evaluate, for example, a version level of one or more security features installed on the device or can be based on a flag indicating whether the device satisfies predefined criteria for maintaining one or more computer security protection features up-to-date.
Abstract:
A method and apparatus are disclosed that enable a call-processing server to extend a received call out to a telecommunications terminal endpoint, wherein the terminal, such as a hotel room phone, is local to and accessible only through an intermediate point, such as a hotel switchboard. Also disclosed are a method and apparatus that enable a data-processing system, such as a server, to determine whether or not to grant a telecommunications terminal endpoint one or more privileges, without some of the disadvantages of the prior art. The methods and apparatus that are taught in this disclosure can be used for extending the incoming call to the endpoint independently of or in the absence of determining whether or not to grant privileges to the endpoint.
Abstract:
An enhanced user experience during a telecommunications conference may be achieved by using components of devices associated with users as ephemeral adjuncts to a conferencing system. These components may be associated with equipment in a conference room or location such that other participants in the conference may not recognize the use of the device. The quality of a user's experience may thus be improved by using a device and associated components in close proximity to the user. Other participants in a conference may also perceive a benefit from improved intelligibility.
Abstract:
Systems and methods for constructing and maintaining a peer-to-peer overlay graph are disclosed herein. The systems and methods include adding a node to the overlay graph. Adding the node includes choosing an edge that is not connected to the node, breaking the edge and connecting the node to broken edge nodes previously connected to the edge. The process is repeating if additional connections are need and node addition data is stored for the node.
Abstract:
A method and an apparatus are disclosed that provide a privilege-granting technique for enabling a service-providing domain to grant a privilege to a requesting user in a service-requesting domain. A request handler in the service-providing domain, which comprises one or more service-associated resources, receives a user request to use a service and requests a token from a privilege-granting server, in accordance with the illustrative embodiment of the present invention. Upon receiving the token that specifies a granted privilege from the privilege-granting server, the request handler extends the privilege to the requesting user. Alternatively, the request handler can request a plurality of tokens in advance from the privilege-granting server; after receiving the tokens, the request handler extends a privilege to each requesting user as the handler receives requests to use one or more services.
Abstract:
System and method to provide location-based levels of data protection, the method including: receiving, by a receiver, login credentials of a user of a mobile device; authenticating, by use of a policy server, a credentials-based level of data access as configured by a policy; retrieving, by a geo-location module, a location of the mobile device; determining, by use of the policy server, a location-based level of data access as configured by the policy; and granting sensitive data access based upon a more restrictive limitation of the credentials-based level of data access and the location-based level of data access.
Abstract:
The present disclosure is based on a multi-core or multi-processor virtualized environment that comprises both time-sensitive and non-time-sensitive tasks. The present disclosure describes techniques that use a plurality of criteria to choose a processing resource that is to execute tasks. The present disclosure further describes techniques to re-schedule queued tasks from one processing resource to another processing resource, based on a number of criteria. Through load balancing techniques, the present invention both (i) favors the processing of soft real-time tasks arising from media servers and applications, and (ii) prevents “starvation” of the non-real-time general computing applications that co-exist with the media applications in a virtualized environment. These techniques, in the aggregate, favor the processing of soft real-time tasks while also reserving resources for non-real-time tasks. These techniques manage multiple processing resources to balance the competing demands of soft real-time tasks and of non-real-time tasks.
Abstract:
A feature activation system provides a mixed computing environment that includes a server and cloud computing. The hybrid model splits the execution of a communication feature between the cloud and the enterprise server installed at or with the enterprise. Service activation is linked to a portal that can communicate with either an intermediary system or directly with an entity executing computer programs in the cloud. When the customer desires to use a feature, the customer accesses the portal and activates the feature the enterprise desires. In the background, the portal instantiates a virtual machine, on any cloud platform, and then installs the feature with virtual machine on that cloud server. To execute feature, the enterprise server and the virtual machine exchange information between the server and the cloud and allow the feature to access the enterprise server or enterprise data. When the user has completed feature execution, the instance of the feature may be stopped and discarded and any data may be saved either at the enterprise or within the cloud.
Abstract:
A method is disclosed for adaptively and intelligently partitioning traffic among a plurality of communications channels, without injecting probe traffic into any of the channels. In accordance with the illustrative embodiment, a source node transmits traffic to a receiving node via K communications channels in accordance with partition coefficients α1, . . . , αK, and the source node receives information regarding the quality of service (QoS) provided by each of the communications channels. The source node adjusts the values of the partition coefficients α1, . . . , αK adaptively based on: the current channel QoS information, prior channel QoS information, the prior values of α1, . . . , αK, and a measure of channel independence for one or more pairs of communications channels.