Subscribe: Untitled
Added By: Feedage Forager Feedage Grade B rated
Language: English
application  client  communication  computer  data  device  information  media  method  network  request  server  system  user 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Untitled



System and method for transmission of data

Tue, 28 Jun 2016 08:00:00 EDT

A system and method for data communication connecting on-line networks with on-line and off-line computers. The present system provides for broadcast of up to the minute notification centric information thereby providing an instant call to action for users who are provided with the ability to instantaneously retrieve further detailed information. The notification centric portions of information is wirelessly broadcast to wireless receiving devices which are attached to computing devices. Upon receipt of the information at the personal computer, the user is notified through different multimedia alerts that there is an incoming message. Wirelessly broadcasted URL's, associated with the data, are embedded in data packets and provide an automated wired or wireless connection back to the information source for obtaining detailed data.

Methods and apparatus to determine impressions using distributed demographic information

Tue, 17 May 2016 08:00:00 EDT

An example method to monitor media exposure involves receiving, at a first internet domain, a first request from a client computer, the first request indicative of access to the media at the client computer. The example method also involves determining if the client computer is known. If the client computer is not known, a response is sent from the first internet domain to the client computer, the response to instruct the client computer to send a second request to a second internet domain, the second request to be indicative of access to the media at the client computer. If the client computer is known, an impression of the media is logged.

Apparatus and method for controlling peripheral in wireless communication system using an IP address

Tue, 16 Feb 2016 08:00:00 EST

An apparatus and method control a connection between peripheral devices in a control server of a wireless communication system providing an IP-based communication service. The method for controlling the connection between peripheral devices includes registering at least one device in a group list classified by user identification information. The method also includes, if a control node including a user identifier of the group list requests a control of any one device included in the group list, checking an IP address of the device that is requested to be controlled by the control node. The method further includes sending a control command of the control node using the IP address.

Use of generic universal resource indicators

Tue, 26 Jan 2016 08:00:00 EST

Various arrangements for creating and using generic universal resource indicators are presented. To create a generic universal resource indicator, one or more parameters of a universal resource indicator may be identified. An interface that permits a parameter of the one or more parameters to be selected and mapped to a variable may be presented. A selection of the parameter for mapping may be received. An indication of the variable to map to the parameter of the selection may also be received. The generic universal resource indicator having a generic parameter corresponding to the parameter of the selection may be created.

Software-based aliasing for accessing multiple shared resources on a single remote host

Tue, 22 Dec 2015 08:00:00 EST

In order to allow a single user registered on a single local host or other machine to access multiple shared resources on a remote host, an aliasing mechanism is employed so that multiple concurrent connections can be established by the user to a single remote host, with each connection using a different identity. Each connection can therefore be used to access a different shared resource on the remote host. In some illustrative examples, a user's identifier such as his or her machine log-in identification may be associated with two or more resource sharing aliases. As a result, two or more resource sharing sessions can be established by the user with a single remote host, with each of the sessions using a different one of the aliases. The resource sharing sessions are usually established in accordance with a resource sharing protocol such as the Server Block Message (SBM) protocol.

Integrated business system for web based telecommunications management

Tue, 24 Nov 2015 08:00:00 EST

The specification discloses a method of doing business over the public Internet, particularly, a method which enables access to legacy management tools used by a telecommunications enterprise in the management of the enterprise business to the enterprise customer, to enable the customer to more effectively manage the business conducted by the customer through the enterprise, this access being provided over the public Internet. This method of doing business is accomplished with one or more secure web servers which manage one or more secure client sessions over the Internet, each web server supporting secure communications with the client workstation; a web page backplane application capable of launching one or more management tool applications used by the enterprise. Each of the management tool applications provide a customer interface integrated within said web page which enables interactive Web/Internet based communications with the web servers; each web server, supports communication of messages entered via the integrated customer interface to one or more remote enterprise management tool application servers which interact with the enterprise management tool applications to provide associated management capabilities to the customer.

Inferring causal paths in a distributed computing environment

Tue, 03 Nov 2015 08:00:00 EST

According to one embodiment, a method comprises evaluating messages between nodes of a distributed computing environment. Based on timing relationships of the messages, probability of causal links between pairs of messages determined. Based on the determined probability, at least one causal path comprising a plurality of causal links is inferred. Further, an overall probability that the inferred causal path is accurate is determined. In certain embodiments, the overall probability is output for the corresponding causal path to provide an indication of the confidence of the accuracy of such inferred causal path.

System and method for supporting video processing load balancing for user account management in a computing environment

Tue, 29 Sep 2015 08:00:00 EDT

A system and method can support user account management in a computing environment. The computing environment can include a video encoding pool to support load balancing and a managing server, such as a privileged account manager server. The video encoding pool includes a set of nodes that are able to perform one or more video processing tasks for another node. Furthermore, the managing server can receive a request from a managed node in the computing environment for delegating a video processing task, and can select one or more nodes from the video encoding pool to load babalance and to perform the video processing task.

Trivial file transfer protocol (TFTP) accelerated file retry option

Tue, 22 Sep 2015 08:00:00 EDT

A method of transferring data using a Trivial File Transport Protocol (TFTP) includes sending first request packet from client to server, first request packet requesting that first file be transferred; transferring first file according to first request packet if first acknowledgement packet is received at client from server indicating that server can accommodate request of first request packet; sending second request packet from client to the server if transfer of first file does not complete successfully, the second request packet including TFTP option indicating that transfer of first file be retried beginning at first block after final block that was successfully transferred in response to first request packet; and retrying transfer of first file according to second request packet if second acknowledgement packet is received at client from server indicating that server can accommodate request of second request packet.

Vehicle connectivity systems, methods and applications

Tue, 15 Sep 2015 08:00:00 EDT

A vehicle communication method comprises receiving a first wireless communication that is transmitted from a first remote device and managing a transmission of the first wireless communication over a vehicle network using a configurable message list. The receiving a first wireless communication is performed by a connectivity device coupled to a communication port of the vehicle network. The managing a transmission of the first wireless communication is performed by a message manager module of the connectivity device.

Application programming interface, system, and method for collaborative online applications

Tue, 08 Sep 2015 08:00:00 EDT

An application framework including different application programming interfaces (APIs) is described which performs a variety of mobile device functions in response to API calls from applications. For example, in response to relatively simple API calls made by applications the application framework manages the complex tasks associated with invitations and matchmaking. By way of example, the details of complex transactions such as establishing peer-to-peer connections between mobile devices may be transparent to the application developer, thereby simplifying the application design process. The application framework may include an application daemon for communicating with a first set of services and an applications services module for communicating with a separate set of services. The application framework may also include a cache for caching data for each of the services based on different cache management policies driven by each of the services. The cache may be updated by push notification cache updates sent from each of the services.

Risk aware domain name service

Tue, 11 Aug 2015 08:00:00 EDT

A risk aware domain name service (DNS), which includes modulating a time to live (TTL) value associated with the DNS based at least in part on one or more DNS-related metrics associated with a DNS server providing DNS resolution is disclosed. A zone file that indicates a particular TTL value may be generated based at least in part on the one or more DNS-related metrics and provided to the DNS server.

Systems and methods for dynamically configuring communication data items

Tue, 28 Jul 2015 08:00:00 EDT

Systems and methods reconfigure data transmitted on a network, the network using a communication protocol. The systems and methods include a processor that is operable to receive data from a second device on the network; a memory medium; and a data configurator operable to dynamically reconfigure the data from the second device, with the data from the second device being in the form of a network item defined by the second device. The data configurator is operable to pass the reconfigured data to the processor and/or the memory medium in the form of a device item that is native to the device. A data design tool generates a map configuration to define a unique relationship between the network item and the device item. The map configuration includes a network representation portion for data in the network item and a device representation portion for data in the data item.

Information processing system, information processing apparatus and information processing system control method, capable of providing, regardless of execution/non-execution of an application, data usable by the application to other information processing apparatus

Tue, 28 Jul 2015 08:00:00 EDT

A CPU executes a communication partner search process for searching for a communication partner (another game machine). The CPU confirms received data content. If identification information included in the received data matches, application identification information saved in a wireless communication module is compared with application identification information included in the received data. When the pieces of application identification information match, a notice that another game machine having exchange data corresponding to the matched application identification information is found is given to a main body. Then, giving/receiving of exchange data is executed to/from another game machine.

User initiated rule-based restrictions on messaging applications

Tue, 14 Jul 2015 08:00:00 EDT

A method, system and computer program product are disclosed for user initiated rule based restrictions on sending messages from a sender to a receiver in a communications network. The receiver establishes a set of rules for the sender that allows the sender a limited number of defined messages events with the receiver. The defined message events may be messages or message sessions. When the sender attempts to send a message to the receiver, it is determined whether a message session currently exists between the sender and the receiver. If a current session exists, the rules set by the receiver are used to determine if the message is allowed to be sent to the receiver. If a session does not currently exist, the rules are used to determine whether a new session is allowed. If a new message session is allowed, a new session is established, and the message is sent to the receiver during the new session.

Facilitating context delivery during communication sessions

Tue, 07 Jul 2015 08:00:00 EDT

An approach is disclosed that facilitates context delivery during communication sessions. The approach may be implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to: render at least one service to a user device through a communication session; collect information of the communication session; and send the information of the communication session to a service provider when a call is setup between the user device and the service provider. The service provider renders the information of the communication session for viewing by the service provider.

Application distribution network

Tue, 07 Jul 2015 08:00:00 EDT

Methods and systems for remotely provisioning applications from the cloud in secure environments with robust license control failover options using a hierarchical server topology. Cloud-based servers provide applications and licenses to an organization's local servers, which in turn serve applications and licenses to end user devices. By synchronizing information including license and application provision information among the local and cloud-based servers, an organization's local servers can continue to serve applications and licenses when one or more of the organization's local servers fail.

Systems and methods for controlling error reporting and resolution

Tue, 30 Jun 2015 08:00:00 EDT

Various system and method embodiments are disclosed that include using a first node to receive messages including error information from a plurality of client computers via a computer network. Recommendations for resolving errors associated with the error information are made available to the client computers via the computer network.

Home sensor data gathering for neighbor notification purposes

Tue, 02 Jun 2015 08:00:00 EDT

In a computer-implemented method of generating event notifications, in-home data is received. The in-home data and environment data (e.g., weather, law enforcement, etc.) is generated by, or based on information generated by, a device located at a residence of an individual, and is analyzed to determine whether it is indicative of an event that should be reported to one or more neighboring residences and/or businesses. If the data is indicative of such an event, a notification is generated and transmitted to the relevant residences and/or businesses.

Printing device, mobile terminal, and computer readable recording medium for the same

Tue, 02 Jun 2015 08:00:00 EDT

A printing device includes a printing device side wireless communication unit configured to execute wireless communication with a mobile terminal, an operation acquisition unit configured to acquire user operation thereof, and a processor. The processor is configured to acquire operation data which is generated as the operation acquisition unit acquires a user operation, acquire establishment data which is generated as the printing device side wireless communication unit establishes a wireless communication with the mobile terminal, and issue a request control to control the printing device side wireless communication unit to transmit request data requesting the mobile terminal to transmit print data necessary for printing, via the wireless communication, when the establishment data is acquired, the request control being issued in accordance with the operation data as acquired.

System and method for providing digital messaging services

Tue, 26 May 2015 08:00:00 EDT

An exemplary embodiment of the invention relates to a system and method for providing digital messaging services received from multiple sources over a communications network. The system includes a client system, including a display screen coupled to a communications link; a workstation including a web browser, a memory, and a processor, said workstation coupled to said communications link; a hosting system, including a graphics server, a content server, and a scheduling server, each in communication with each other via a communications link; and a workstation and data storage device coupled to the communications link; and a data storage device for storing data utilized by said hosting system. The client system requests and receives digital messaging services from said hosting system under a subscription agreement. Digital messaging services include advertisements procured from said client system, and one or more local content providers, national advertisers, local advertisers, corporate marketing groups, and advertising agencies. Interactive digital messaging services are also available through the present invention. A user accesses these services via a variety of input devices; such as a bar code scanner, a wireless telephone or personal digital assistant, a kiosk with touch screen design, microphone, or other similar input device.

System and method for identifying exploitable weak points in a network

Tue, 26 May 2015 08:00:00 EDT

The system and method described herein may leverage passive and active vulnerability discovery to identify network addresses and open ports associated with connections that one or more passive scanners observed in a network and current connections that one or more active scanners enumerated in the network. The observed and enumerated current connections may be used to model trust relationships and identify exploitable weak points in the network, wherein the exploitable weak points may include hosts that have exploitable services, exploitable client software, and/or exploitable trust relationships. Furthermore, an attack that uses the modeled trust relationships to target the exploitable weak points on a selected host in the network may be simulated to enumerate remote network addresses that could compromise the network and determine an exploitation path that the enumerated remote network addresses could use to compromise the network.

Policy control for encapsulated data flows

Tue, 26 May 2015 08:00:00 EDT

Systems and methodologies are described that facilitate communicating encapsulation information for a related mobility protocol type utilized in communicating over a data flow with reduced specific implementation on the policy server to support different mobility protocol types. In this regard, encapsulation information can be transmitted to the policy server from a network gateway such that the policy server can forward the encapsulation information to a serving gateway along with policy rules related to a data flow type. The serving gateway can utilize the encapsulation information to detect and interpret the encapsulated data flow according to the policy rules. In this regard, the serving gateway can provide support (e.g., quality of service support) for the flow. The encapsulation information can relate to a mobility protocol type, an encapsulation header, an indication that encapsulation is required, parameters regarding locating an encapsulation header in a message, and/or the like.

Receiving device, receiving method, program, and broadcasting system

Tue, 26 May 2015 08:00:00 EDT

Disclosed herein is a receiving device for receiving AV contents, the receiving device including: an obtaining section configured to obtain a description document described in a program language for displaying contents from a server present on a network connected with the receiving device; a determining section configured to determine whether the obtained the description document is obtained from a first server managed on a broadcaster side broadcasting the AV contents; and a controlling section configured to control execution of the obtained the description document according to a result of determination by the determining section.

Dispatcher framework to provide inter-application communication

Tue, 26 May 2015 08:00:00 EDT

A dispatcher framework to provide non-blocking inter-application communication is disclosed. In various embodiments, a call to a service that is blocking with respect to the service is received from a calling process. The service is called on behalf of the calling process in a manner that does not require the calling process to remain blocked during at least a portion of a time during which the call to the service is performed.

OData service provisioning on top of GenIL layer

Tue, 26 May 2015 08:00:00 EDT

The disclosure generally describes computer-implemented methods, software, and systems for allowing provisioning of open data protocol (OData) services on top of a generic interaction layer (GenIL). One computer-implemented method includes receiving an OData-compliant request for data, determining a GenIL data provider to receive the OData-compliant request for data, determining the memory location of the data, requesting the data from the determined memory location, receiving the requested data from the determined memory location, converting, using at least one computer, the received data into an OData-compliant format, rendering an OData-compliant response, and transmitting the OData-compliant response.

State management of operating system and applications

Tue, 26 May 2015 08:00:00 EDT

A method and a processing device may be provided for state management of an operating system and applications. A framework may be provided for separating behaviorless state information from code or instructions for executing a method. Applications may have instances of state information derived from, or completely different from, instances of state information of an operating system. Instances of state information for an application may be layered over corresponding instances of state information of the operating system, such that the application and the operating system may have different views of the instances of the state information. At least one policy may be defined, which may include rules for resolving conflicts, information for providing a merged view of data from multiple repositories, default values for instances of data, as well as other information. In various implementations, referential integrity of state information may be guaranteed.

Dynamic consolidation of virtual machines

Tue, 26 May 2015 08:00:00 EDT

A method and apparatus are disclosed of monitoring a number of virtual machines operating in an enterprise network. One example method of operation may include identifying a number of virtual machines currently operating in an enterprise network and determining performance metrics for each of the virtual machines. The method may also include identifying at least one candidate virtual machine from the virtual machines to optimize its active application load and modifying the candidate virtual machine to change its active application load.

Simulated network

Tue, 26 May 2015 08:00:00 EDT

Systems, methods, and computer-readable and executable instructions are provided for providing a simulated network. Providing a simulated network can include collecting a number of network parameters for a plurality of locations and determining an application frequency of an application for the plurality of locations. Furthermore, providing a simulated network can include providing a simulated network with the number of network parameters to a number of testers of the application, wherein the number of network parameters are provided proportionally to the application frequency.

Virtualizing embedded devices

Tue, 26 May 2015 08:00:00 EDT

A device virtualization system is described herein that separates common computer processing tasks of an embedded device from the application-specific peripherals of the embedded device to allow at least some functions of the device to be offloaded to servers or other computing devices. The device virtualization system greatly simplifies management, configuration, and control of virtual embedded devices. Because much of the software of the device runs on the virtualization server, information technology (IT) personnel can be assigned to manage the virtualization server and to apply any updates and diagnose any problems that occur. Moreover, a single server or group of servers can be used to provide virtualization services for a wide variety of virtualized embedded devices for a wide variety of users. Thus, the system enhances the usefulness of embedded devices and allows a longer lifetime and wider variety of uses than embedded devices today.

Systems and methods for dynamic development and deployment of computing applications using blueprints

Tue, 26 May 2015 08:00:00 EDT

Systems and methods for dynamic development and deployment of computing applications including a development framework, a visual design subsystem, and a deployment subsystem, where at runtime the deployment subsystem is operable to dynamically deploy a computing application realized by a blueprint by sending a request at runtime for graphs and components instantiated by the blueprint.

System and method for using state replication between application instances to provide a collaborative desktop environment

Tue, 26 May 2015 08:00:00 EDT

Described herein are systems and methods for enabling a collaborative remote desktop environment. The system includes a computing device and a first application instance that has an application state associated therewith. The first application instance includes, or is associated with, a current state component and application data/data files. The system further includes an application launcher that is used to instantiate a second application instance operating either on the same or on a different computing device. The second application instance similarly has an application state associated therewith and is associated with the application launcher. Upon receiving a request from the second user to interact with the first application instance, the application state and the application data/data files are communicated to the application launcher, and the application launcher instantiates the second application instance so that its state is substantially identical to that of the first application instance.

Information processing system

Tue, 26 May 2015 08:00:00 EDT

An information processing system includes a CPU that is connected to a bus; a device that is connected to the bus; a memory that is accessed by the CPU or the device; and a power mode control circuit that sets a power consumption mode. The power mode control circuit sets the power consumption mode based on first information that indicates a cache hit or a cache miss of a cache memory in the CPU and second information that indicates an activated state or a non-activated state of the device.

Host controller

Tue, 26 May 2015 08:00:00 EDT

The present disclosure includes methods, devices, and systems for controlling a memory device. One method for controlling a memory device embodiment includes storing device class dependent information and a command in one or more of host system memory and host controller memory, setting a pointer to the command in a register in a host controller, directing access to the one or more of host system memory and host controller memory with the memory device via the host controller; and executing the command with the memory device.

Interfaces for digital media processing

Tue, 26 May 2015 08:00:00 EDT

APIs discussed herein promote efficient and timely interoperability between hardware and software components within the media processing pipelines of media content players. A PhysMemDataStructure API facilitates a hardware component's direct access to information within a memory used by a software component, to enable the hardware component to use direct memory access techniques to obtain the contents of the memory, instead of using processor cycles to execute copy commands. The PhysMemDataStructure API exposes one or more fields of data structures associated with units of media content stored in a memory used by a software component, and the exposed fields store information about the physical properties of the memory locations of the units of media content. SyncHelper APIs are used for obtaining information from, and passing information to, hardware components, which information is used to adjust the hardware components' timing for preparing media samples of synchronously-presentable media content streams.

Method to publish remote management services over link local network for zero-touch discovery, provisioning and management

Tue, 26 May 2015 08:00:00 EDT

A system, method, and computer-readable medium are disclosed for realizing server management functionalities in the absence of a routable Internet Protocol (IP) network address of a remote access controller (RAC). A first device, which is operatively coupled to a link-local network, generates a Multicast Domain Name System (mDNS) IP multicast query message, which it then sends to a second device on the link-local network. In response, the second device, which comprises a RAC, returns its link-local IP address to the first device.

Proximity detection for media proxies

Tue, 26 May 2015 08:00:00 EDT

A method of detecting proximity between a media proxy and a client uses a proximity probe to query a plurality of media proxies, forcing the media proxies to respond to a proximity server. The proximity server uses an algorithm to determine which media proxy is closest to the client based on the responses. In an alternate embodiment, the same sorts of proximity probes may be used to determine if two media endpoints have a direct connection such that they may bypass a media proxy.

Method for continuous, frame-specific click-stream recording

Tue, 26 May 2015 08:00:00 EDT

A method for tracking a user's movements between network addresses can include, subsequent to a request for a (current) network address from a user, receiving the network address and an identifier for a region associated with the network address. The method can also include locating a record that contains the identifier for the region and a time that immediately precedes the request for the network address from the user. The record may further contain a prior network address. The method can further include generating an entry for a table that includes the identifier for the region, the current network address, and the prior network address. A server computer or a client computer can generate the entry. Improved accountability and improved user profile accuracy can be obtained with the method. A data processing system readable medium can comprise code that includes instructions for carrying out the method.

Router-based dispersed storage network method and apparatus

Tue, 26 May 2015 08:00:00 EDT

A method begins by a router receiving data for storage and interpreting the data to determine whether the data is to be forwarded or error encoded. The method continues with the router obtaining a routing table when the data is to be error encoded. Next, the method continues with the router selecting a routing option from the plurality of routing options and determining error coding dispersal storage function parameters based on the routing option. Next, the method continues with the router encoding the data based on the error coding dispersal storage function parameters to produce a plurality of sets of encoded data slices. Next, the method continues with the router outputting at least some of the encoded data slices of a set of the plurality of sets of encoded data slices to an entry point of the routing option.

System and method for session sweeping between devices

Tue, 26 May 2015 08:00:00 EDT

An improved system and method are disclosed for peer-to-peer communications. In one example, the method enables an endpoint to sweep an ongoing communication session to another endpoint by transferring session information between the endpoints.

Dynamically configuring and verifying routing information of broadcast networks using link state protocols in a computer network

Tue, 26 May 2015 08:00:00 EDT

A technique dynamically configures and verifies routing information of broadcast networks using link state protocols in a computer network. According to the novel technique, a router within the broadcast network receives a link state protocol routing information advertisement from an advertising router, e.g., a designated router or other adjacent neighbor. The router learns of a next-hop router (“next-hop”) to reach a particular destination from the advertisement, and determines whether the next-hop is located within the same broadcast network (e.g., subnet) as the designated router. If so, the router further determines whether the next-hop is directly addressable (i.e., reachable), such as, e.g., by checking for link adjacencies to the next-hop or by sending request/reply messages (e.g., echo messages or “ping” messages) to the next-hop. In the event the next-hop for the destination is not directly addressable by the router (e.g., no adjacency or reply), the router installs a route to the destination via the designated router. Otherwise, the router installs a route to the destination via the next-hop.

Data transfer method, system and protocol

Tue, 26 May 2015 08:00:00 EDT

A method for transmitting blocks of data in data packets from a first device on a network to a second device on the network comprising the steps of, providing a File Transmitter Application in communication with the first device, which File Transmitter Application is adapted to control the transmission of the blocks of data in data packets on the network, including the timing of the commencement of the transmission of the data blocks on the network, providing a File Receiver Application in communication with the second device and in communication with the File Transmitter Application, which File Receiver Application is adapted to transmit Acknowledgment data to the File Transmitter Application relating to the receipt of data blocks received at the second device, commencing the transmission of a first data block from the first device to the second device, by way of the network and commencing the transmission of the second data block from the first device to the second device, by way of the network.

Internet streaming and dynamic reconfiguration of user displays

Tue, 26 May 2015 08:00:00 EDT

Internet streaming from broadcast radio or television stations is described wherein triggers for dynamic content from internal or external systems cause an encoder system to generate command messages, and to optionally synchronize those command messages with any delays associated with the triggering events. Command messages are delivered through a streaming media distribution system to client media players which obtain or present the dynamic content, in association with any desired configuration changes to the appearance of the media player or the method or manner in which the dynamic content is presented.

Streaming playback and dynamic ad insertion

Tue, 26 May 2015 08:00:00 EDT

There is provided a system and method for dynamically generated client side streaming playlists. There is provided a method comprising receiving a request to stream a video asset for playback, retrieving, from a network, a video asset playlist corresponding to the video asset and an ad campaign playlist, generating a consolidated video playlist including the video asset playlist and the ad campaign playlist, and processing the consolidated video playlist using a media playback framework to stream a plurality of video files from the network for decoding and output to a display. Discontinuity tags within the video asset playlist may be utilized as insertion points for portions of the ad campaign playlist. The consolidated video playlist may be accessed through a local HTTP web server, advantageously allowing the use of commonly installed media playback framework models such as QuickTime X to trigger adaptive bitrate support through HTTP Live Streaming.

View selection in a vehicle-to-vehicle network

Tue, 26 May 2015 08:00:00 EDT

In V2V or other networks in which multiple video cameras can share video data, a network participant ordinarily has the option of selecting a particular video data stream (either generated by local cameras or received from other network participants. To facilitate the process of selecting a video data stream for presentation, the user's vehicle (in a V2V network) receives video data streams generated by other network participants along with identifiers indicating the video data stream actually being presented to the sender. The receiving system identifies the received video data stream by the greatest number of network participants and displays the identified video data stream on the user's in-vehicle video display.

Portable communication device for providing phone calling service

Tue, 26 May 2015 08:00:00 EDT

A portable communication device for phone calling is herein disclosed and enabled. The portable communication device includes a USB interface for connecting to an external USB port of a computing device for enabling phone calling services using the portable communication device. Upon connecting the portable communication device to the external USB port of the computing device, a phone calling software component or data stored in the portable communication device may execute for enabling phone calling services. The portable communication device may also include one or more ports, and may include an interface for Ethernet connection for connecting to the Internet and for making phone calls without the need for connecting the portable communication device to the external USB port. The portable communication device may further include a Wi-Fi wireless component for local wireless communication, and may be implemented as an adapter-sized dongle for providing phone calling services.

Managed access to media services

Tue, 26 May 2015 08:00:00 EDT

Methods, apparatuses and systems directed to account-based access to media services are described. A media access controller server validates a voucher for an offer of network content and issues a token permitting access to the content. A media access manager server validates the token and invokes a playlist-generation step at a publishing point, and returns the content to a user's media player. A custom plug-in on the media access manager may enforce terms of service imposed by the publisher, such as a maximum number of simultaneous streams permitted by a single voucher, or a time window for use of the voucher. Streams whose voucher's end time has expired are terminated by the plug-in.

Policy-based application management

Tue, 26 May 2015 08:00:00 EDT

Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.

Data retrieval in a two-way network

Tue, 26 May 2015 08:00:00 EDT

A system receives a first request for data associated with a data stream received over a first network from a remote source and then determines when the requested data will be available based on analyzing the data stream. The system communicates a second request for the requested data over a second network to the remote source when the requested data will not be available from the data stream within a threshold time and receives the requested data from the remote source over at least one from the list including the first network and the second network.

Methods and apparatus for using a distributed message bus for ad hoc peer-to-peer connectivity

Tue, 26 May 2015 08:00:00 EDT

A method and apparatus for using an ad hoc peer-to-peer distributed message bus is provided. The method may include determining, by a local bus node, using a first power level communication protocol, that a remote bus node is available, obtaining, by the local bus node, connection information from the remote bus node using a second power level communication protocol, wherein the connection information comprises connection information for one or more remote endpoints associated with the remote bus node, and generating one or more local virtual endpoints, wherein each of the one or more local virtual endpoints corresponds to each of the one or more remote endpoints, and wherein the remote endpoint is described with reference to a well-known name, unique to the remote endpoint.