Abstract:
A method embodiment includes creating, by a processor, a number of contexts for a first user, creating a list of potential contexts based on the number of contexts when the first user and a second user engage in a real-time communication, displaying the list of potential contexts to the first user.
Abstract:
A method for providing access to a private network resource comprises receiving an indication from an electronic rendezvous service that a client application has passed a first set of authentication and authorization processes. A request to access the private network resource is received from the client application. The client application is allowed to attempt to perform a second set of authentication and authorization processes based at least in part on receiving the indication from the electronic rendezvous service that the client application has passed the first set of authentication and authorization processes. The second set of authentication and authorization processes are performed, and the client application is allowed to access the private network resource based at least in part on a determination that the client application has passed the first and the second sets of authentication and authorization processes.
Abstract:
A method for providing access to a private network resource comprises receiving an indication from an electronic rendezvous service that a client application has passed a first set of authentication and authorization processes. A request to access the private network resource is received from the client application. The client application is allowed to attempt to perform a second set of authentication and authorization processes based at least in part on receiving the indication from the electronic rendezvous service that the client application has passed the first set of authentication and authorization processes. The second set of authentication and authorization processes are performed, and the client application is allowed to access the private network resource based at least in part on a determination that the client application has passed the first and the second sets of authentication and authorization processes.
Abstract:
An apparatus for communicating in a distributed system comprises an identifier space and a processor. The identifier space associates data in the distributed system with one or more ranges of values, and the processor distributes cross-locale routing and caching across local nodes in the distributed system using the one or more ranges of values. Also disclosed is a method for communicating in a distributed system. Identifiers for nodes in the distributed system are determined and are associated with locations on an identifier space. Cross-locale routing and caching across local nodes in the distributed system are distributed using the locations on the identifier space. Additionally, an apparatus for retrieving data in a distributed system comprises a processor. The processor is configured to obtain an identifier for the data, locate a position of the identifier on an identifier space, and determine a local node that is responsible for the data.
Abstract:
A method for managing information stored to a local cache comprises obtaining social network information and/or collaboration history information for a user and using the social network information and/or the collaboration history information to identify potential targets of communication for the user. The local cache is updated based at least in part on the identified potential targets of communication. Also disclosed is an apparatus for managing information stored to a local cache. The apparatus comprises an analytics engine component and an updating component. The analytics engine component is configured to determine metrics for potential targets of communication using social networking information and/or collaboration history information, and the updating component is configured to remove information corresponding to at least one of the potential targets from the local cache using the metrics.