摘要:
Subscriber input detected via a wireless communication device for initiating network provisioning of the wireless communication device is presented herein. A method can include receiving, via an interface of a wireless communication device, a first input from a subscriber of a wireless service associated with the wireless communication device; sending, by the wireless communication device based on the first input from the subscriber, a request for provisioning the wireless communication device via a wireless network associated with the wireless service; and outputting, via the interface of the wireless communication device, a first message including a condition for the provisioning the wireless communication device via the wireless network based on the request. In an example, the method can further include receiving, based on the request, the condition from a component of the wireless network.
摘要:
An apparatus having an agent that includes a processor and a memory coupled with the processor and communicates with at least one of a fault, configuration, accounting, performance, security module. The processor effectuates operations including determining that a service is operating properly. The processor further effectuates operations including if the service is operating properly and the service is disabled, enabling the service. The processor further effectuates operations including if the service is not operating properly, generating an alarm and if the service is enabled, disabling the service.
摘要:
In one example, a method performed by a processing system including at least one processor includes obtaining video footage of a first subject, creating a profile for the first subject, based on features extracted from the video footage, obtaining video footage of a second subject different from the first subject, adjusting movements of the second subject in the video footage of the second subject to mimic movements of the first subject as embodied in the profile for the first subject, to create video footage of a modified second subject, verifying that the video footage of the modified second subject is consistent with a policy specified in the profile for the first subject, and rendering a media including the video footage of the modified second subject when the video footage of the modified second subject is consistent with the policy specified in the profile for the first subject.
摘要:
Concepts and technologies are disclosed herein for a cross-reality safety service. A device can detect a cross-reality session associated with a user device. The cross-reality session can include a rendered environment and the user device can be located in a physical environment. Data associated with the cross-reality session can be obtained. It can be determined if a safety issue exists for the cross-reality session. If the safety issue is determined to exist for the cross-reality session, a communication can be directed to the user device, where the communication can include an update to the rendered environment, a command to end the cross-reality session, or an alert.
摘要:
Aspects of the subject disclosure may include, for example, receiving information about a task to be completed by a user, receiving information about the user and receiving information about a physical environment of the user. The subject disclosure may further include creating one or more immersion objects based on the information about the task, the information about the user and the information about the physical environment, creating an immersive environment including the one or more immersive objects and at least a portion of the physical environment of the user, and communicating to an extended reality (XR) device of the user information about the immersive environment to create an immersive experience for completion of the task by the user. Other embodiments are disclosed.
摘要:
A method and apparatus performing operations including instantiating at least one ENUM physical server instance or vENUM virtual machine, wherein the at least one vENUM virtual machine initiating an IMSI session for at least one of a service and a record. The operations further include determining when the at least one of the service and the record is operating. When the at least one of the service and the record is operating, determining if the service was disabled, and if the service was disabled, clear any alarm and announcing service disabled via input/output device. When the at least one of the service and the record is not operating, the operations may include generating an alarm via input/output device, determining if automatic disablement is permitted, and if permitted, automatically disable the at least one of the service and the record. When automatic disablement is not permitted, the operations may include prompting for a disablement instruction via an input/output device and disabling the at least one of the service and the record upon receiving the disablement instruction.
摘要:
A secure payment method includes receiving, by a payment recipient, a transaction request from a party in a transaction. The payment recipient requests a payment that is in a specified form and that is uniquely identified by a unique identification. The method includes receiving, on behalf of the payment recipient and at a payment recipient computer, the payment that is in the specified form. The payment is uniquely identified by the unique identification. The payment recipient authorizes the transaction in response to receiving the payment that is in the specified form and that is uniquely identified by the unique identification. The specified form is issued by a private third party.
摘要:
Calls placed to a call recipient bypass the terminating messaging system, creating an enhanced message in the call originator's messaging system and delivering the enhanced message using alternate routing information. A caller creates enhanced messages for a call recipient even when the call recipient's messaging system does not support such functionality. The caller also embeds stored content and/or use links in the enhanced messages to allow the message to be modified and/or deleted before it is accessed by the call recipient.
摘要:
Systems and methods to select peered border elements for a communication session based on Quality-of-Service (QoS) are disclosed. In particular, an example method includes determining a composite QoS parameter of a communication session based on weighting QoS parameters of the session, the QoS parameters including a grade of service parameter of the session and a preferred mode of communication for a voice over Internet protocol (VoIP) device of a called party; querying a telephone number mapping server for a status of each of the peered border elements; assigning the session to be handled by a selected peered border element of the peered border elements based on the composite QoS parameter and the status of each of the peered border elements; and generating a QoS authorization token to reserve network resources associated with the selected peered border element.
摘要:
An automatic message escalation system includes attaching an acknowledgement flag to a message after it is received in the message mailbox of an identified message recipient. The status of the acknowledgement flag indicates whether or not the message has been retrieved. After a given or specified period of time, the acknowledgement flag is checked to see if the message was retrieved. If the message was retrieved, the message will not be escalated. If the message was not retrieved, the message will be sent to the next message recipient on an escalation list.